Abstract:
A method of using a ciphering key in a mobile station (18) from a first base station (12) in a first cellular communications system controlled by a first mobile switching control (10) station to a second base station in a second, different cellular system controlled by a second mobile switching control station is described. The method comprises generating for the mobile station a cipher key for use by the mobile station during communication in the second cellular communications system. The cipher key is generated by the mobile station from a private key assigned to the mobile station for the second cellular communications system and from a random number generated by the second cellular communications system. The cipher key is then communicated to the first mobile system and a private long code is generated for use by the mobile station during communication in the first cellular communications system.
Abstract:
The application relates to mobile phone sensing and in particular to the collection of geo-tagged measurements from a plurality of mobile devices in order to generate a network map. It is time consuming and expensive to obtain exact coverage maps of a network. Typically, network operators deploy specialized field teams to collect signal information including a measurement and a location, and then compile the information into coverage maps. The problem is solved by the present application in that a plurality of user equipments such as cellular phones (100-A, ?, 100-D) record a measurement, e.g. of the signal strength, and pair this measurement with the associated location which has previously been determined by the user equipment itself, e.g. by using positioning signal from a satellite positioning system, such as GPS. In order to avoid additional traffic the information pairs are piggybacked on messages (315-A, ?, 315-D) exchanged for another purposes, in particular one which requests so-called assistance data, e.g. in the form of a satellite almanac. The pairs are then compiled into a map (440). The application is not restricted to coverage maps and signal strength measurements because the measurements also comprise e.g. sound level, light level, temperature, pressure, magnetic measurement or similar local measurement at the mobile device, which then acts as a remote sensor.
Abstract:
Operating at least one low duty cycle (LDC) controller to maintain synchronization between the LDC controller and a plurality of LDC terminals operating over a communication network using only overhead channels of the network and conforming to the protocol and timing of said network, wherein synchronization between the LDC controller and the plurality of LDC terminals is maintained separately from the protocol and timing of the communication network, and enables the LDC controller to schedule power down and wake up of the plurality of LDC terminals for durations longer than allowable under the protocol and timing of the communication network.
Abstract:
Operating at least one low duty cycle (LDC) controller to maintain synchronization between the LDC controller and a plurality of LDC terminals operating over a communication network using only overhead channels of the network and conforming to the protocol and timing of said network, wherein synchronization between the LDC controller and the plurality of LDC terminals is maintained separately from the protocol and timing of the communication network, and enables the LDC controller to schedule power down and wake up of the plurality of LDC terminals for durations longer than allowable under the protocol and timing of the communication network.
Abstract:
A method for controlling a wireless terminal operating in a hibernation cycle alternating between a wake mode and a hibernation mode includes communicating with a first wireless network during a first waking period having a first duration, and with a second wireless network during a second waking period following the first waking period. The second waking period is extended to a second duration, greater than the first duration, responsively to detecting that the second wireless network is different from the first wireless network. Network information relating to the second wireless network is received during the second waking period.
Abstract:
A network operator identifier is used to uniquely identify each network operator to support international roaming. The network operator identifier includes (1) a Mobile Country Code (MCC) that identifies the country in which a network operator belongs and (2) a Network Operator Code (NOC), which may be a Mobile Network Code (MNC), that distinguishes network operators within a given MCC. Each network operator is assigned a unique combination of MCC and NOC that distinctly identifies the network operator, and the network operator identifier can be stored in a single entry in a preferred roaming list. The base stations of each network operator broadcast the network operator identifier in signaling messages. A mobile station receives a signaling message from a base station, obtains the network operator identifier, searches its preferred roaming list for an entry with the network operator identifier, and determines whether or not the current CDMA network is accessible.
Abstract:
A network operator identifier is used to uniquely identify each network operator to support international roaming. The network operator identifier includes (1) a Mobile Country Code (MCC) that identifies the country in which a network operator belongs and (2) a Network Operator Code (NOC), which may be a Mobile Network Code (MNC), that distinguishes network operators within a given MCC. Each network operator is assigned a unique combination of MCC and NOC that distinctly identifies the network operator, and the network operator identifier can be stored in a single entry in a preferred roaming list. The base stations of each network operator broadcast the network operator identifier in signaling messages. A mobile station receives a signaling message from a base station, obtains the network operator identifier, searches its preferred roaming list for an entry with the network operator identifier, and determines whether or not the current CDMA network is accessible.
Abstract:
A method and apparatus for creating a dynamic GeoFence area by determining an instant reference point using a first set of pseudorange measurements received by a GeoFence device, defining the dynamic GeoFence area referenced to the instant reference point, determining a position fix using a second set of pseudorange measurements, and comparing the position fix to the dynamic GeoFence area. In one aspect, an alert message based on the comparison results is presented to a user.
Abstract:
A method and apparatus for creating a dynamic GeoFence area by determining an instant reference point using a first set of pseudorange measurements received by a GeoFence device, defining the dynamic GeoFence area referenced to the instant reference point, determining a position fix using a second set of pseudorange measurements, and comparing the position fix to the dynamic GeoFence area. In one aspect, an alert message based on the comparison results is presented to a user.
Abstract:
Apparatus and methods of differentiated data session access on a wireless communication device and dynamic source determination of provisioning information on a wireless communication device are disclosed. User Identity Modules (UIMs) are provisioned such that network-service applications resident on the wireless device are associated with a corresponding application profile within the UIM. Each networkservice application has a corresponding network address identifier defined within the user profile. The network address associated with the identifier is used to establish a data session for the corresponding network service application. By providing for application-specific network addresses, service providers and/or network operators can differentiate between what services a user is accessing during a data session. In addition, the UIMs may be provisioned with priority category identifiers that allow the associated network-service application to be prioritized for data session establishment.