Patent application number | Description | Published |
20100261491 | COMMUNICATION NETWORK TERMINAL SUPPORTING A PLURALITY OF APPLICATIONS - A method includes transferring data between a mobile station for communicating over a mobile communications network and a server in the Internet having a connection to the mobile communications network. The transfer of data includes providing at least a portion of a page on the Internet in the form of code, the code including a telephone number of the mobile station as hidden information, receiving the code in the mobile station in a first user message where the first user message is a short message service message, and interpreting the code in the mobile station to cause the mobile station to display information corresponding to the page on the Internet on the mobile station, wherein the information to be displayed on the mobile station does not include the hidden information. | 10-14-2010 |
20110222445 | ENHANCEMENT OF USER EQUIPMENT RECEIVER SENSITIVITY - The exemplary embodiments of the invention provide in one aspect thereof an apparatus that includes a controller configurable with a radio frequency receiver. The controller is further configurable to monitor downlink signal quality of a user equipment. The controller is further configurable to compare the downlink signal quality to a threshold value and, if the downlink signal quality is less that the threshold value, to switch operation of the user equipment from a full duplex frequency division duplex mode of operation to a half duplex frequency division duplex mode of operation. The exemplary embodiments may be realized at one or both of the user equipment or a base station. The result of switching operation of the user equipment results in an increase in user equipment receiver sensitivity. | 09-15-2011 |
20120258745 | COMMUNICATION NETWORK TERMINAL SUPPORTING A PLURALITY OF APPLICATIONS - A method includes transferring data between a mobile station for communicating over a mobile communications network and a server in the Internet having a connection to the mobile communications network. The transfer of data includes providing at least a portion of a page on the Internet in the form of code, the code including a telephone number of the mobile station as hidden information, receiving the code in the mobile station in a first user message where the first user message is a short message service message, and interpreting the code in the mobile station to cause the mobile station to display information corresponding to the page on the Internet on the mobile station, wherein the information to be displayed on the mobile station does not include the hidden information. | 10-11-2012 |
20130182623 | METHOD AND APPARATUS FOR SCHEDULING AN UPLINK DATA TRANSMISSION - A method, apparatus and computer program product are provided to schedule the uplink grant in a manner that efficiently utilizes uplink resources. In the context of a method from the perspective of the user equipment, an indication regarding data to be transmitted is received and a scheduling request is caused to be provided via a control channel. The scheduling request is configured to indicate a size of the data to be transmitted. In response to a grant, data may be caused to be transmitted via allocated uplink resource blocks. In the context of a method from the perspective of a base station, a scheduling request including an indication of the requested size of the uplink grant is received via a control channel. The method may cause the grant to be provided to a user equipment and, in response, may receive data from the user equipment via allocated uplink resource blocks. | 07-18-2013 |
20140106757 | APPARATUS AND METHOD FOR USE IN A COMMUNICATION NETWORK - There is provided a method, comprising: acquiring, by a user terminal capable of performing proximity services with at least one other user terminal, an indication that a handover from a source cell to a target cell is to be performed; and acquiring a capability indication on whether or not a target node of the target cell is capable to support the proximity services. | 04-17-2014 |
Patent application number | Description | Published |
20080225776 | Apparatus, methods, and computer program products providing unsolicited HARQ for system information in the downlink - In one non-limiting, exemplary embodiment, incremental HARQ combining is performed in the DL for system information (e.g., the BCCH) without the interactive ACK/NACK responses that are an element of conventional HARQ. Instead, a number of unsolicited HARQ repeats are sent. That is, one or more HARQ incremental repeats of the BCCH frame are sent without any ACK/NACK feedback (e.g., from the UE). In one non-limiting, exemplary embodiment, a method includes: transmitting a system information message from a base station to a user equipment; and retransmitting the system information message as an unsolicited HARQ message from the base station to the user equipment, wherein the unsolicited HARQ message is not triggered by an indication from the user equipment. In further exemplary embodiments, the system information message is retransmitted as the unsolicited HARQ message in order to maintain a target BLER within a coverage area of the base station. | 09-18-2008 |
20080233963 | Apparatus, method and computer program product providing auxiliary handover command - An auxiliary handover message is sent from a target eNB to a UE being handed over from a source eNB. The auxiliary handover message includes a context identifier that is established between the source eNB and the UE, which the source eNB provides to the target eNB during context data exchange when preparing for the handover. The UE uses the context identifier to verify that the auxiliary handover message is valid. Various approaches are detailed for minimizing signaling overhead and minimizing the time the UE must monitor the separate channel for the auxiliary handover message in the event the UE does not properly receive the original handover message from the source eNB. The context identifier may be a random number, a C-RNTI, an eNB-ID, or a token. The auxiliary handover command sent from the target eNB may be the context identifier with or without a copy of the handover command. | 09-25-2008 |
20080313300 | METHOD AND APPARATUS FOR PROVIDING SYSTEM INFORMATION - An approach is provided for distributing system information. A determination is made whether repetition rate associated with system information exceeds a predetermined threshold. The repetition rate specifies frequency of transmission of the system information to a terminal over a network. The scheduling information for the system information is transmitted to the terminal if the threshold is satisfied. | 12-18-2008 |
20090319903 | METHOD AND APPARATUS FOR DISTRIBUTING SYSTEM INFORMATION WINDOWS - An approach is provided for distributing system information. In one embodiment, the approach provides for determining an overflow condition associated with one of a plurality of system information windows, wherein the overflow condition exists if the one system information window extends to an adjacent transmission period. A next available slot within a communication channel is determined; the one system information window in the overflow condition is assigned to the next available slot. According to another embodiment, the number of system information windows to be transmitted during a longest one of a plurality of repetition periods is determined. Also, the number of system information windows corresponding to a shortest one of the repetition periods within the determined longest repetition period is determined. An average amount of the system information windows is determined based on the determined shortest repetition period and one or more available transmission periods associated with a communication channel of a network. The system information is scheduled for transmission over the communication channel according to the determined average of system information windows. | 12-24-2009 |
20130046821 | Advanced Machine-To-Machine Communications - There are provided measures for advanced machine-to-machine communications. Such measures may exemplarily includes conducting machine-to-machine packet transmission of a machine device residing in a connected mode by using a bearer connection with a security context, causing transition of the machine device from the connected mode to an intermediate mode, in which the machine device is neither in connected mode nor in idle mode, after completion of the machine-to-machine packet transmission, and keeping the security context of the connection for the intermediate mode, and causing transition of the machine device from the intermediate mode to the connected mode after elapse of an inactivity period of the machine-to-machine packet transmission, and conducting machine-to-machine packet transmission of the machine device residing in the connected mode by reactivating the bearer connection with the kept security context. | 02-21-2013 |
Patent application number | Description | Published |
20100183031 | Apparatus, Method and Computer Program Product Providing Distribution of Segmented System Information - Multiple embodiments are detailed to enable segmenting of system information SI that is sent on a shared channel, In one embodiment, information indicative of a segmentation state of at least one message that comprises system information is generated, and the information indicative of the segmentation state is transmitted to a user equipment, where the information indicative of the segmentation state is provided in one of a L1/L2 control channel, in a broadcast channel, or in a radio resource control message header. Other embodiments stipulate one bit signaling, container types to carry the segmented Sl, headers, segment lengths and other indicators. Certain embodiments specifically address how large block ETWS may be sent in E-UTRAN with low DL-SCH bandwidths. | 07-22-2010 |
20100279715 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT PROVIDING IDLE MODE DISCONTINUOUS RECEPTION - A network sends an indication of discontinuous reception period (ldle_Mode_DRX_Period) and an indication of number of paging groups (Paging_Group_Count). Paging occasions for a user equipment are determined by a predetermined formula. One exemplary formula is SFN mod IDLE_Mode_DRX_Period=(IDLE_Mode_DRX_Period div Paging_Group_Count)*(ID) mod (Paging_Group_Count); where SFN is system frame number and ID is the identifier of the user equipment, which can be IMSI or some value derived from IMSI. The UE's temporary ID is sent during a determined paging occasion, which maps to a paging channel on which the page is sent. Options for restricting the paging occasion to less than a frame, and for offsetting the paging occasions from that of the above formula are detailed. | 11-04-2010 |
20100284278 | ADAPTIVE MULTI-RATE CODEC BIT RATE CONTROL IN A WIRELESS SYSTEM - In an exemplary embodiment a method includes monitoring traffic in one or more cells; determining that the traffic in one of the cells is congested; and responsive to the determining, initiating a rate change for at least one ongoing connection within the cell. Apparatus and computer programs are also determined for both a user equipment and a network node. | 11-11-2010 |
20100323627 | APPARATUS AND METHOD FOR SIGNALING BETWEEN A USER EQUIPMENT AND A WIRELESS NETWORK - In accordance with an example embodiment of the present invention, a method is disclosed that comprises deciding at a user equipment (UE) an outage period during which the UE has limited communications with the serving base station; and sending to the serving base station a signaling message indicating the outage period. | 12-23-2010 |
20100329452 | Generation of key streams in wireless communication systems - Security key stream generation in a communication apparatus. The method includes using a count parameter and a bearer parameter as input, value of said count parameter being incremented as security key streams are generated and value of the count parameter having a finite maximum value; detecting value of the count parameter reaching a predetermined value; and responsive to the detecting, changing value of the bearer parameter into a new value, and resetting value of the count parameter to a value below the maximum value. | 12-30-2010 |
20120096519 | Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points - Methods and apparatuses are provided for avoiding denial of service attacks by rogue access points. A method may include attempting to verify activation of access stratum security by an access point based at least in part upon integrity protection information included in a received security mode command message sent by the access point, wherein a radio connection has been established with the access point. The method may further include detecting an occurrence of a security activation deadlock. The method may additionally include determining that a predefined number of security activation deadlocks with the access point have occurred. The method may also include identifying the access point as a rogue access point based at least in part upon the determination that a predefined number of security activation deadlocks with the access point have occurred. Corresponding apparatuses are also provided. | 04-19-2012 |