Patent application number | Description | Published |
20120084831 | METHOD AND APPARATUS FOR PROVIDING PRIVACY MANAGEMENT IN MACHINE-TO-MACHINE COMMUNICATIONS - A method, non-transitory computer readable medium and apparatus for processing a request from a server of a machine-to-machine service provider are provided. For example, the method receives the request from the server of the machine-to-machine service provider to communicate with a machine-to-machine device, determines whether to authorize the request based upon a policy in a privacy database, and enables communications between the server of the machine-to-machine service provider and the machine-to-machine device if the request is authorized based upon the policy. | 04-05-2012 |
20130077534 | METHOD AND APPARATUS FOR DYNAMIC SERVICE PROVISIONING FOR MACHINE TO MACHINE (M2M) DEVICES IN A COMMUNICATIONS NETWORK - A method and non-transitory computer readable medium for provisioning services for machine to machine communication devices in a communications network. For example, the method receives a request from a third party service provider to provision a service to a user of the third party service provider, determines whether a communication network service provider of the communications network and the third party service provider have a pre-existing agreement to provision the service, and provisions the service of the third party service provider to the user via the communications network in accordance with the pre-existing agreement, wherein the user is a subscriber of the communication network service provider. | 03-28-2013 |
20130137399 | HOME NETWORKING USING LTE RADIO - A single identity and billing relationship can be employed for multiple UE (user equipment) associated with a subscriber. Specifically, each of the multiple UEs can employ LTE (Long Term Evolution) radio technology to authenticate and register with a femto access point. Further, the transport level billing associated with the multiple UE can be facilitated by the femto access point by employing a femto id (identity) and/or credentials. Moreover, the femto access point can be employed by the multiple UEs as a network hub and can be employed by the UEs to perform authentication to connect to a core network. In addition, the femto access point can determine an authorized IP cloud associated with a registered UE and allow the registered UE to access only the authorized IP cloud. | 05-30-2013 |
20130139215 | METHOD AND APPARATUS FOR MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 05-30-2013 |
20130258949 | ROAMING SUPPORT FOR WIRELESS ACCESS SUBSCRIBER OVER FIXED IP ACCESS NETWORKS - Roaming support for wireless access subscribers over fixed IP access networks is provided herein. An authentication component can authenticate a subscription of a multi-mode device across different network architectures. A policy component can provide at least a portion of a service-level policy agreement to enable or disable services or policies associated with a multi-mode device at the fixed IP access network on a per session basis. | 10-03-2013 |
20140128036 | HOME NETWORKING USING LTE RADIO - A single identity and billing relationship can be employed for multiple UE (user equipment) associated with a subscriber. Specifically, each of the multiple UEs can employ LTE (Long Term Evolution) radio technology to authenticate and register with a femto access point. Further, the transport level billing associated with the multiple UE can be facilitated by the femto access point by employing a femto id (identity) and/or credentials. Moreover, the femto access point can be employed by the multiple UEs as a network hub and can be employed by the UEs to perform authentication to connect to a core network. In addition, the femto access point can determine an authorized IP cloud associated with a registered UE and allow the registered UE to access only the authorized IP cloud. | 05-08-2014 |
20140150054 | METHOD AND APPARATUS FOR A MASTER PRIVACY POLICY MECHANISM IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for providing a master privacy policy in a communications network are disclosed. For example, the method receives a privacy control parameter to configure a master privacy policy, stores the master privacy policy in the communications network, and applies the master privacy policy to configure a third party service provider privacy policy for a third party service provider based upon the master privacy policy. | 05-29-2014 |
20140161256 | SECURITY FOR NETWORK LOAD BROADCASTS OVER CELLULAR NETWORKS - A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load information, where the cellular network load information is encrypted. The method then decrypts the cellular network load information using a decryption key and performs a task responsive to the network load information that is decrypted. | 06-12-2014 |
20140162645 | Network-Assisted Device-Based Intelligent Radio Access Control - Concepts and technologies are described herein for a network-assisted device-based radio access control. According to one aspect disclosed herein, a mobile device selects one or more radio access networks (“RANs”) to connect to, based upon network conditions, policies, user profiles, local device information, and/or other information. The mobile device can receive network load information from multiple RANs. The mobile device can also receive one or more policies from a radio access technology (“RAT”) selection system. The mobile device can also obtain local device information such as, but not limited to, mobility state information, performance measurement information, battery utilization information, channel quality information, applications, and/or a user override selection. | 06-12-2014 |
20150079925 | METHOD AND APPARATUS FOR POLICY MANAGEMENT IN A COMMUNICATION SYSTEM - A system that incorporates the subject disclosure may perform, for example, operations including monitoring events relating to activities by a plurality of communication devices, content sources supplying content to the plurality of communication devices, and network conditions during content exchanges between the plurality of communication devices and the content sources, tagging the events to generate tagged events, detecting an event initiated by a communication device of the plurality of communication devices, obtaining tagged event information from the tagged events according to the event detected, generating a policy according to the tagged event information, and transmitting the policy to a policy enforcement function system to facilitate a communication session between the communication device and the content source according to the policy. Other embodiments are disclosed. | 03-19-2015 |
20150103755 | UTLIZING EXPLICIT CONGESTION NOTIFICATION FOR NETWORK SELECTION - Explicit congestion notification (ECN) bits that have traditionally been utilized in end to end congestion mitigation can be redefined to identify and compare congested and uncongested wireless accesses. Accordingly, mobile devices or other user equipment can leverage ECN data in order to make intelligent network selection, e.g., selecting a network with no congestion over one in a congested state. Accordingly, an application executing at the mobile device can send or receive data via the selected network that is selected based on ECN data. | 04-16-2015 |
20150106878 | System And Method For Providing A Content Delivery Network Via A Motor Vehicle - A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network. | 04-16-2015 |
20150119101 | Access Network Discovery and Selection Function Enhancement with Cell-Type Management Object - Concepts and technologies described herein relate to an enhancement to an access network discovery and selection function (“ANDSF”) with a cell-type management object (“MO”) within an ANDSF MO tree. According to one aspect disclosed herein, a system including an ANDSF can generate a policy for network selection. The policy can include network selection criteria based upon a cell-type. The cell-type may be a small cell cell-type, a macro cell cell-type, or a multi-standard metro cell (“MSMC”) cell-type. The network selection criteria can be further based upon WI-FI availability. The system can send the policy to a mobile device. The mobile device can utilize the policy to select a network. In some embodiments, the network selection criteria includes network load information, local device information, user profile information, or some combination thereof. | 04-30-2015 |
Patent application number | Description | Published |
20100099455 | NETWORK IDENTITY AND TIMEZONE (NITZ) FUNCTIONALITY FOR NON-3GPP DEVICES - A system that provisions a multimode mobile or converged device with local time information and network provider identification when the multimode mobile device is operating within the purview of a wireless local area network (WLAN). The system includes components that receive protocol data and that extract network provider identification from the received protocol data as well as utilizing the received protocol data to ascertain the local time. | 04-22-2010 |
20100185537 | HOME NETWORKING USING LTE RADIO - A system and methodology that facilitates management of a single identity and billing relationship for multiple UE (user equipment) associated with a subscriber is provided. Specifically, each of the multiple UEs can employ LTE (Long Term Evolution) radio technology to authenticate and register with a femto access point. Further, the transport level billing associated with the multiple UE can be facilitated by the femto access point by employing a femto id (identity) and/or credentials. Moreover, the femto access point can be employed by the multiple UEs as a network hub and can be employed by the UEs to perform authentication to connect to a core network. In addition, the femto access point can determine an authorized IP cloud associated with a registered UE and allow the registered UE to access only the authorized IP cloud. | 07-22-2010 |
20100205293 | COMPREHENSIVE POLICY FRAMEWORK FOR CONVERGED TELECOMMUNICATIONS NETWORKS - The subject innovation relates to systems and/or methodologies for comprehensive policy based service delivery. A policy plane is provided as a comprehensive way to manage operator policies for most all IP and/or service flows (e.g., IMS and non-IMS) under varying network conditions, while keeping in view user preferences, user subscriptions, service requirements, terminal capabilities (e.g., including converged terminals), network capabilities (e.g., 3gpp and non-3gpp accesses inter-working with 3gpp), session transfer policies, service aware roaming, and so forth. The policy plane can be generated through harmonization of existing components (e.g., discussed infra), and creation of new policy aspects where desired (e.g., policies for identity and charging management in personal area network, etc.). The policy plane works to close gaps between standards, operator requirements, and user requirements. | 08-12-2010 |
20100235877 | POLICY-BASED PRIVACY PROTECTION IN CONVERGED COMMUNICATION NETWORKS - System(s) and method(s) that employ deep packet inspection (DPI) of data flow relating to a requested service associated with a communication device to facilitate customizing the service or results provided by the service are presented. A service request can be received by a gateway identification of the service is attempted. If the service is identified, a privacy rule(s), which is contained in a user privacy profile of a user associated with the communication device, is analyzed to determine whether the privacy rule(s) applies to the service. If the privacy rule(s) is applicable, a DPI engine performs DPI on the data flow, in accordance with the privacy rule(s), to obtain information that can be used to customize the service or results provided by the service. The user can specify the level of DPI to be applied. A default rule can specify that no DPI is performed on the data flow. | 09-16-2010 |
20100303064 | HANDLING EMERGENCY CALLS USING EAP - A user (terminal) is allowed to make an emergency voice-over-Internet Protocol (VoIP) phone call through an access network, such as a wireless local area network (WLAN) using Extensible Authentication Protocol (EAP). The emergency call can be made with or without authentication credentials and is identified by the user's terminal transmitting a Network Access Identifier (NAI) having a user part and/or realm part that indicates the emergency nature of the call, such as e911@e911.com. In response to such an NAI, the caller can be immediately granted limited authentication for the purpose of connecting to an emergency call center. Alternatively, the user (terminal) can be authenticated through networks supporting emergency calls, such as the user's home network, if the terminal indicates to the access network authentication server a preference or requirement for using such networks. The call can be routed to the emergency call center either directly or via one or more intermediary networks, such as networks that support emergency VoIP phone calls. | 12-02-2010 |
20120033583 | Policy-Based Network and Service Domain Selection for Legacy Non-IP Telecommunication Services Over Heterogeneous Networks - A method includes receiving, by a policy manager, a legacy service request for a terminal disposed in an access area including a plurality of networks. The method includes determining, by the policy manager, an optimal delivery network from the plurality of networks to handle the legacy service request. The method includes transmitting, by the policy manager, the legacy service request to the optimal delivery network. The method includes forwarding, by the optimal delivery network, the legacy service request to the terminal disposed in the access area. | 02-09-2012 |
20120034916 | POLICY ENABLED ROAMING GATEWAY IN A COMMUNICATION NETWORK - Systems, methods, and apparatus for centrally managing service related information within a roaming environment are presented herein. A decision component can be configured to decide, based on information associated with a service level agreement, whether to accept, reject, or dynamically negotiate a communication service requested via a mobile device roaming within a visited network. Furthermore, an analysis component can be configured to map one or more parameters related to a quality of the communication service to one or more service policies as a function of the information. Moreover, a distribution component can be configured to distribute the one or more service policies to one or more policy servers of the network; or forward information of the one or more service policies to another network. | 02-09-2012 |
20120135712 | HOME NETWORKING USING LTE RADIO - A system and methodology that facilitates management of a single identity and billing relationship for multiple UE (user equipment) associated with a subscriber is provided. Specifically, each of the multiple UEs can employ LTE (Long Term Evolution) radio technology to authenticate and register with a femto access point. Further, the transport level billing associated with the multiple UE can be facilitated by the femto access point by employing a femto id (identity) and/or credentials. Moreover, the femto access point can be employed by the multiple UEs as a network hub and can be employed by the UEs to perform authentication to connect to a core network. In addition, the femto access point can determine an authorized IP cloud associated with a registered UE and allow the registered UE to access only the authorized IP cloud. | 05-31-2012 |
20120245955 | Notifying of Health Events in Peer Environments - Methods, systems, and products notify of health events. Personal health information is stored in memory of a mobile communications device. A peer device is discovered through a wireless personal data network. The peer device is queried for anonymous health information. The anonymous health information is aggregated with the personal health information to produce aggregated health information. The aggregated health information is stored in the memory of the mobile communications device. | 09-27-2012 |
20120286959 | Automated Allergy Alerts - Devices, systems, and methods are disclosed which relate to utilizing a wireless communication device which receives allergy information from network nodes. The wireless communication device contains an allergy profile for the user. When the wireless communication device receives allergy information this allergy profile is referenced to determine if any allergens near the user may cause a problem for the user. If allergens exist to which the user is allergic, a visual, aural, and/or tactile alert is output on the wireless communication device. | 11-15-2012 |
20120293322 | Mobile Device Supported Medical Information Services - A wireless telecommunications system can receive position information associated with a wireless mobile device of a user and a medical access point name from the wireless mobile device, can determine a gateway based on the position information and the access point name, can receive medical information associated with the user from the wireless mobile device via the gateway, and can provide, based on the medical information and the position information, the medical information to a computer system of a medical facility. The medical information can include drug allergies, food allergies, health issues, physician contact information, emergency contact information, and/or a preferred medical facility, among others. The medical information can be useful in providing medical aid to the user of the wireless mobile device if the user is not able to communicate via verbal means, via written means, and/or via sign means. | 11-22-2012 |
20120304250 | POLICY-BASED PRIVACY PROTECTION IN CONVERGED COMMUNICATION NETWORKS - System(s) and method(s) that employ deep packet inspection (DPI) of data flow relating to a requested service associated with a communication device to facilitate customizing the service or results provided by the service are presented. A service request can be received by a gateway identification of the service is attempted. If the service is identified, a privacy rule(s), which is contained in a user privacy profile of a user associated with the communication device, is analyzed to determine whether the privacy rule(s) applies to the service. If the privacy rule(s) is applicable, a DPI engine performs DPI on the data flow, in accordance with the privacy rule(s), to obtain information that can be used to customize the service or results provided by the service. The user can specify the level of DPI to be applied. A default rule can specify that no DPI is performed on the data flow. | 11-29-2012 |
20120320824 | System and Method for Providing a Content Delivery Network via a Motor Vehicle - A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content distribution network is low. The cache server determines that the motor vehicle is turned off, broadcasts a wireless signal as part of a wireless network when the motor vehicle is turned off, and provides a device access to the content cached in the cache server via the wireless network. | 12-20-2012 |