Abstract:
A wireless communication device (110, 610, 800) receives a first user instruction to execute a first application (111-113, 611-612, 809) requiring first wireless communications. The device (110, 610, 800) selects a first wireless protocol for the first wireless communications based on the first application (111-113, 611-612, 809). A transceiver (116, 616, 801) in the device (110, 610, 800) exchanges the first wireless communications with a first wireless communication access node (101-103, 601-602) using the first wireless protocol and monitors a first paging channel of the first wireless protocol. A paging receiver (117, 617, 802) monitors a second paging channel of a second wireless protocol in response to the application-based selection of the first wireless protocol.
Abstract:
A wireless communication device (101, 302, 500) comprises first processing circuitry (104, 304, 504) configured to execute an RF operating system (106, 306, 506) and second processing circuitry (114, 314, 514) configured to execute an open operating system (116, 316, 516), wherein the first processing circuitry (104, 304, 504) is linked to a secure memory device (105, 305, 505) inaccessible to the second processing circuitry (114, 314, 514). The RF operating system (106, 306, 506) is configured to receive protected data and store the protected data in the secure memory device (105, 305, 505). The open operating system (116, 316, 516) is configured to receive a request for the protected data from one of a plurality of user applications (117, 317-318, 517) and transfer the request to the RF operating system (106, 306, 506). In response to the request for the protected data, the RF operating system (106, 306, 506) is configured to retrieve the protected data from the secure memory device (105, 305, 505), encrypt the protected data, and transfer the encrypted protected data to the open operating system (116, 316, 516) for delivery to the one of the user applications (117, 317-318, 517) associated with the request.
Abstract:
A communication session is established, via a wireless communication link, with a mobile communication device (112, 332) that is connected to a computer system (110, 330, 500). The mobile communication device (112, 332) is enumerated by the computer system (110, 330, 500) as a locally attached mass storage device. An authentication executable file is sent to the mobile communication device (112, 332). A response generated by the computer system (110, 330, 500) executing the authentication executable file is received from the mobile communication device (112, 332). Based on the response generated by the computer system (110, 330, 500) executing the authentication executable file, access to a data file that is stored by a mass storage system (130, 340) via a network (120, 320) is granted.
Abstract:
A wireless communication device (101, 300, 500, 600, 700) optically receives an image (102, 511, 611, 711) and processes the optically received image to generate image data. The wireless communication device receives a Radio Frequency (RF) signal (113, 523, 621, 721) and processes the RF signal to derive an image data processing parameter. The image data processing parameter could be an encryption key, authentication code, access code, or some other parameter. The wireless communication device (101, 300, 500, 600, 700) processes the image data and the image data processing parameter to convert the image data into a different format. The different format could be decrypted, authenticated, accessed, or some other converted form of image data.
Abstract:
A data router (110, 410) serves User Equipment (UEs) (101-103, 401-403) over network connections to network slices (131-132, 441-444). The router (110, 410) executes an operating system (116, 611), and in response, executes router applications (117-119, 612-617) in containers (113-115, 1001-1006). The router applications (117-119, 612-617) receive a container configuration, a connection configuration, and a slice configuration from the wireless communication network (100, 400). The router applications (117-119, 612-617) transfer the container configuration to the operating system (116, 611). The operating system (116, 611) controls processing qualities of the containers (113-115, 1001-1006) based on the container configuration. The router applications (117-119, 612-617) generate and transfer the performance information for the network connections to the wireless communication network (100, 400). The router applications (117-119, 612-617) prioritize the network connections to the network slices (131-132, 441-444) based on the slice configuration. The router applications (117-119, 612-617) exchange user data with the UEs (101-103, 401-403) and exchange the user data with the network slices (131-132, 441-444) over the network connections using service qualities based on the connection configuration.
Abstract:
A wireless communication system (100) beamforms an uplink from an airborne transceiver (113, 114, 614, 1014, 1114, 1214) to a terrestrial transceiver (131, 132, 631). The airborne transceiver comprises antennas that have an antenna type an aperture beamwidth. The airborne transceiver transfers a transceiver ID to the terrestrial transceiver. The terrestrial transceiver initiates aerial uplink beamforming for the antenna type and the aperture beamwidth based on the airborne transceiver ID. The terrestrial transceiver determines uplink beamforming metrics and altitude for the airborne transmitter. The terrestrial transceiver generates an uplink beamforming instruction and an uplink power instruction for the antenna type and the aperture beamwidth of the airborne transceiver based on the uplink beamforming metrics and altitude. The terrestrial transceiver transfers the uplink beamforming instruction and the uplink power instruction to the airborne transceiver. The airborne transceiver beamforms, amplifies, and transmits an uplink wireless signal to the terrestrial transceiver per the uplink beamforming instruction and the uplink power instruction.
Abstract:
A wireless communication network (100, 400) hands-over wireless User Equipment (UE) (101, 401) from a serving cell (111, 411) to a neighbor cell (112, 411). The serving cell wirelessly exchanges data with the wireless UE and determines uplink interference for a radio band. The serving cell wirelessly transfers an uplink interference offset to the wireless UE that indicates the uplink interference at the serving cell for the radio band (131). The wireless UE uses the uplink interference offset to trigger a handover request to the serving cell. The handover request indicates downlink signal strength at the wireless UE for the serving cell. The serving cell initiates a handover to a neighbor cell responsive to a combination of the downlink signal strength at the wireless UE and the uplink interference for the serving cell falling below a handover threshold. After the handover, the neighbor cell wirelessly exchanges data with the wireless UE over a different radio band (132).
Abstract:
In a wireless communication network (100, 1000), a Gateway Control Plane (GW-C) (140, 640, 641, 642, 940) receives a session request for a User Equipment (UE) (101, 102, 103, 601, 1001) from an Access Point (AP) (111, 112, 113, 611, 1011, 1012) that serves the UE. The GW-C transfers a DNS request having an AP ID and network data. A Domain Name System (DNS) (150, 650, 651) translates the AP ID and the network data into an AGW-U ID and an EGW-U ID for co-located GW-Us. The GW-C receives a DNS response and transfers GW control signals using the AGW-U ID and the EGW-U ID. The co-located AGW-U (121, 122, 123) and EGW-U (131, 132, 133) serve the UE responsive to the control signals. In some examples, the selected AGW-U and EGW-U are co-located at the network edge near the AP.
Abstract:
A wireless access node (110, 310, 610) serves wireless user devices (101, 301, 601, 602, 603) with different services over a common radio channel (130, 330, 630). The different services are supported by different wireless network slices (121, 122, 123, 124, 521, 522, 523, 524, 621, 622, 623). The wireless access node determines service subchannels (131, 132, 133, 134) in the radio channel based on location and time. The wireless access node schedules resource blocks from the subchannels for their corresponding services. If a subchannel for one service is full, then the wireless access node schedules the remaining data for the service in the unscheduled resource blocks of the other subchannels if any. The wireless access node wirelessly exchanges data for the services with the wireless user devices over the scheduled resource blocks in the subchannels of the radio channel. The wireless access node exchanges the data with the wireless network slices that support the services.
Abstract:
A Network Function Virtualization (NFV) Software-Defined Network (SDN) (100, 500, 600) communicates across network boundaries with other NFV SDNs to support a data communication service. An NFV orchestrator (111) transfers forwarding graphs for service, NFV, and SDN Network-to-Network Interfaces (NNIs) to an SDN controller (112). The SDN controller (112) converts the forwarding graphs into forwarding instructions and transfers the forwarding instructions for the service, NFV, and SDN NNIs to an NFV SDN switching system (113). The NFV orchestrator (111) uses the NFV NNI to transfer its forwarding graphs over the NFV SDN switching system (113) across the network boundary to another NFV orchestrator (121). The SDN controller (112) uses the SDN NNI to transfer its forwarding instructions over the NFV SDN switching system (113) across the network boundary to another SDN controller (122). The NFV SDN switching system (113) uses the service NNI to transfer user data across the network boundary to another NFV SDN switching system (123).