Patent application number | Description | Published |
20080219257 | Device for Controlling the Implementation of Functions in a Service Device Belonging to an Internet Communication Network Core - An device (A) is dedicated to controlling the implementation of functions linked with providing at least one communication service to at least one communication terminal (T | 09-11-2008 |
20080267128 | Handover from E-UTRAN to UTRAN/GERAN CS - The present invention relates to a method for a handover of a UE (User Equipment) currently engaged in a voice call. More particularly, the invention relates to a handover from 1) a packet based radio where Voice Service is provided via VoIP over the radio and is controlled via Session Initiation Protocol (SIP) based signalling (e.g. LTE, E-UTRAN or WIMAX radio) to 2) a radio access network where Voice Service can be only provided via circuit switched (CS) domain (a visited mobile switching centre (VMSC) is needed) such as legacy 3GPP UMTS Terrestrial Radio Access Network (UTRAN)/GSM/Edge Radio Access Network (GERAN) coverage. A MSC-S entity acting as a Packet Core Control Node on a Packet Switched (PS) network and as an Anchor Visited Mobile Switching Centre (VMSC) for a handover to a Circuit Switched (CS) network on the CS domain side is proposed, the MSC-S preparing a new path with a remote UE-B and a CS domain handover towards a target legacy radio coverage before requesting a UE-A to execute the handover. | 10-30-2008 |
20080311913 | METHOD FOR MOBILITY MANAGEMENT IN A SYSTEM ARCHITECTURE SUPPORTING MOBILITY BETWEEN DIFFERENT ACCESS SYSTEMS - One object of the present invention is a method for Mobility Management MM in a system architecture supporting mobility between different access systems having separate Core Network CN-level MM entities while using common MM Area, said method comprising a step of:
| 12-18-2008 |
20100279646 | METHOD FOR TRANSMITTING URGENT ALERT MESSAGES TO SETS OF MOBILE TERMINALS LOCATED IN CELLS OF A RADIO COMMUNICATION NETWORK, AND RELATED RADIO NETWORK CONTROLLER - The invention concerns a radio network controller (BSCI), for a radio access communication network, comprising processing means (MT), upon receiving from an alarm centre (CA) a message of a first SMS-CB type associated with a selected class of alarm of a selected level, containing an alarm text message addressed to mobile terminals (T) located in at least one selected cell controlled thereby, for interrupting transmission to the mobile terminals, located in each selected cell, of any message of SMS-CB type associated with a class of level lower than that of the selected alarm class, and optionally all other communication of said terminals (for example, telephone calls thereof), so that the first message may be broadcast to the mobile terminals which are located in each selected cell controlled thereby and so that some at least of said mobile terminals should transmit an alarm signal (for example radio) and display the alarm text message contained in the first message. | 11-04-2010 |
20110158121 | EXPLICIT INDICATION OF BEARERS SUBJECT TO VOICE CALL CONTINUITY - A method, user equipment and a network entity are disclosed. The method comprises the steps of: determining which of a plurality of packet bearers carry voice media components for handover between a packet-switched network and a circuit-switched network to ensure voice call continuity; and notifying an entity that will said enforce voice call continuity for which of said plurality of packet bearers carry said voice media components. | 06-30-2011 |
20130183968 | Method For Mobility Management In A System Architecture Supporting Mobility Between Different Access Systems - A method for Mobility Management MM in a system architecture supporting mobility between different access systems having separate Core Network CN-level MM entities while using common MM Area, the method comprising a step of: when a User Equipment UE leaves the coverage of a first one of the access systems where it is in a Non Radio Connected state as seen from Radio Access Network RAN, but seen in Connected State from CN-level MM entity, for the coverage of a second one of the access systems where it is in Idle state as seen from CN-level MM entity, putting the UE into Idle state as seen from CN-level MM entity of said first access system. | 07-18-2013 |
20140134996 | NETWORK MONITORING OF USER EQUIPMENT EVENTS - Embodiments of the claimed subject matter provide a method for supporting network monitoring of user equipment events. Some embodiments of the method include receiving, at a home subscriber server (HSS) in a public land mobile network (PLMN), a request to monitor one or more events associated with one or more users. The request is used to configure, activate, or deactivate delivery of reports from one or more entities in the PLMN to a monitor collection entity in response to the event(s). Some embodiments of the method also include configuring one or more profiles in the HSS associated with the user(s) based on the request and providing the request to monitor the event(s) associated with the user(s) to one or more serving nodes for user equipment associated with the user(s). | 05-15-2014 |
20140273958 | METHOD OF PROVIDING USER EQUIPMENT WITH ACCESS TO A NETWORK AND A NETWORK CONFIGURED TO PROVIDE ACCESS TO THE USER EQUIPMENT - The method of operating a network includes receiving, by an authentication, authorization and accounting (AAA) proxy of the network, authentication information for user equipment from a first wireless access point, the AAA proxy being a proxy for an authentication, authorization and accounting (AAA) server in a radiocommunication network, transmitting, by the AAA proxy, at least the received authentication information to the radiocommunication network, receiving, by the AAA proxy, first key information from the radiocommunication network, generating, by the AAA proxy, second key information based on the first key information and third key information based on the second key information, storing, by the AAA proxy, the first and second key information, and transmitting, by the AAA proxy, the third key information to the first wireless access point, the third key information allowing the user equipment access to a network via the first wireless access point. | 09-18-2014 |