Abstract:
Providing secure radio information transfer over a mobile radio bearer by generating one or more secret keys, applying symmetric encryption to unencrypted radio information to generate encrypted radio information, applying a keyed hash operation to the unencrypted radio information using the generated one or more secret keys to generate a message digest, and transmitting both the encrypted radio information and the message digest over a network.
Abstract:
Information is determined affecting data presentation of part of a data stream to a user application on a UE, and may be EC information and/or QoE information caused at least by the data presentation. The information is sent from the UE toward a content server from which the data stream is received by the UE. At radio network element(s), radio timer information corresponding to data transmission of part of the data stream from a base station to a UE is determined and sent (e.g., possibly with the energy consumption information and/or QoE information) to other radio network elements and/or to the content server. The content server can adjust streaming strategy of the data stream based on the information received, and the radio network element(s) can perform power aware scheduling and/or radio timer adjustments based on received EC information and/or the QoE information.
Abstract:
Certain embodiments of the invention generally relate to mobile communications. For example, some embodiments relate to mechanism(s) to support operator assisted parental control of encrypted traffic in wireless networks. A method may include receiving parental control policy information of a subscriber from a network entity in a core network, and initiating parental control policy enforcement according to the parental control policy information. The parental control policy enforcement is initiated in at least one of a mobile network entity or an application service provider.
Abstract:
A method comprises determining if a failure has occurred in a first path, an offload application server functionality being provided in said first path and if so, causing routing of said data via a second different path which bypasses said offload server functionality.
Abstract:
Various communication systems may benefit from appropriate handling of secure data. More specifically, certain packet-based communication systems may benefit from a mechanism to support coordinated packet delivery of one or more encrypted sessions. A method can include identifying metadata for an application flow, wherein the application flow is encrypted. The method can also include publishing the metadata in a core network, wherein the metadata is unencrypted when published.
Abstract:
A method includes, at an applications server, analyzing application flows with respect to at least one device connected to a network; at the application server, generating an adaptive timer value based on application flows of the at least one device; sending the adaptive timer value to at least one server; sending, from the at least one server, the adaptive timer value to the at least one device; and adopting, at the at least one device, the adaptive timer value.
Abstract:
Systems, methods, apparatuses, and computer program products for cooperative application and network insight operations in wireless networks are provided. One method includes, during application content delivery to a user equipment (UE) associated with a network, monitoring and/or collecting instantaneous radio information from a network node and computing at least cell load and throughput for the network. The method may then include sending the collected radio information, cell load, and throughput information to an application server that is delivering content to the user equipment (UE).