Patent application number | Description | Published |
20110205964 | TIMED FINGERPRINT LOCATING FOR IDLE-STATE USER EQUIPMENT IN WIRELESS NETWORKS - Systems and techniques for determining the location of user equipment (UE) in a wireless network are disclosed. These techniques leverage geometric calculations for an overlaid bin grid framework mapping the wireless network area to store differential values for each frame of the bin grid framework for each pair of relevant NodeBs. A timing offset can be determined, such that when a time value from a target UE is accessed, the location can be quickly determined with minimal real time computation. In an aspect, the time value from an idle-state target UE can be accessed. The target UE time value can be searched among pre-computed differential value data sets indexed by relevant NodeB site pairs to return sets of frames that can facilitate converging on a location for the target UE. Intersecting frames can represent the geographic location of the UE in the wireless network. Further, the data can be leveraged to correct timing in the network. | 08-25-2011 |
20110207470 | TIMED FINGERPRINT LOCATING IN WIRELESS NETWORKS - Systems and techniques for determining the location of user equipment (UE) in a wireless network are disclosed. These techniques leverage geometric calculations for an overlaid bin grid framework mapping the wireless network area to store differential values for each frame of the bin grid framework for each pair of relevant NodeBs. A timing offset can be determined, such that when a time value from a target UE is accessed, the location can be quickly determined with minimal real time computation. In an aspect, the target UE time value can be search for in the pre-computed differential value data set indexed by a relevant NodeB site pair to return a set of frames (forming a hyperbola between the site pair) that can be intersected with a second set of frames for a second NodeB site pair for the same UE. The intersecting frames can represent the location of the UE in the wireless network. Further, the data can be leveraged to correct timing in the network. | 08-25-2011 |
20110275364 | DEVICE-DRIVEN INTELLIGENCE AND FEEDBACK FOR PERFORMANCE OPTIMIZATION AND PLANNING OF A SERVICE NETWORK - System(s), device(s), method(s), and user interfaces are provided to enable a subscriber device to report network operation conditions, such as network performance incidents, to receive feedback from the network related to the incident and available or possibly available solutions, and to produce network intelligence suitable for network planning and network performance enhancement. Reporting of network performance incidents can be characterized by location and time of occurrence, wherein these intelligence is provided by the user device. Feedback provided by the network is based on the network performance data received as part of reporting an incident. The reporting described herein enables a network operator to generate network planning intelligence based on actual network performance as experienced at the subscriber level. | 11-10-2011 |
20120144057 | MOBILE DEVICE APPLICATION FOR AUTOMATIC FILTERING OF TRANSMITTED DATA CONTENT - A communications device is provided. This includes a processor adapted to receive one or more identified data sources from at least one network database. An applications component is configured to determine one or more network applications that communicate with the processor based in part on the one or more identified data sources. A filter can be configured to at least partially disable data exchanges to the one or more identified data sources during communications with at least one of the one or more network applications. | 06-07-2012 |
20120252489 | TIMED FINGERPRINT LOCATING IN WIRELESS NETWORKS - Systems and techniques for determining the location of user equipment (UE) in a wireless network are disclosed. These techniques leverage geometric calculations for an overlaid bin grid framework mapping the wireless network area to store differential values for each frame of the bin grid framework for each pair of relevant NodeBs. A timing offset can be determined, such that when a time value from a target UE is accessed, the location can be quickly determined with minimal real time computation. In an aspect, the target UE time value can be search for in the pre-computed differential value data set indexed by a relevant NodeB site pair to return a set of frames (forming a hyperbola between the site pair) that can be intersected with a second set of frames for a second NodeB site pair for the same UE. The intersecting frames can represent the location of the UE in the wireless network. Further, the data can be leveraged to correct timing in the network. | 10-04-2012 |
20120264397 | Selective Establishment of Radio Access Bearers to Support Simultaneous Voice and Data Communications in a Mobile Telecommunications Network - Systems, methods, and computer-readable media are for selectively establishing radio access bearers configured to support simultaneous voice and data communications in a mobile telecommunications network. An exemplary method includes receiving a request to initiate a data session at a mobile device that is currently engaged in a voice session and, in response to receiving the request, determining if the mobile device is capable of supporting a radio access bearer configured to simultaneously support the data session and the voice session. The method further includes allowing or denying establishment of the radio access bearer based upon the determination. | 10-18-2012 |
20120289250 | TIMED FINGERPRINT LOCATING FOR IDLE-STATE USER EQUIPMENT IN WIRELESS NETWORKS - A user equipment (UE) location in a wireless network can be determined by leveraging geometric calculations for an overlaid bin grid framework mapping the wireless network area to store differential values for each frame of the bin grid framework for each pair of relevant NodeBs. A timing offset can be determined, such that when a time value from a target UE is accessed, the location can be quickly determined with minimal real time computation. In an aspect, the time value from an idle-state target UE can be accessed. The target UE time value can be searched among pre-computed differential value data sets indexed by relevant NodeB site pairs to return sets of frames that can facilitate converging on a location for the target UE. Intersecting frames can represent the geographic location of the UE in the wireless network. Further, the data can be leveraged to correct timing in the network. | 11-15-2012 |
20120302223 | Selective Prioritization of Voice Over Data - Systems, methods, and computer-readable media are described herein for allowing a user or a service provider to selectively prioritize voice communications over data communications. By selectively prioritizing voice communications over data communications, the number of dropped calls in the mobile telecommunications network can be significantly reduced. | 11-29-2012 |
20130007058 | DYNAMIC CONTENT SELECTION THROUGH TIMED FINGERPRINT LOCATION DATA - The disclosed subject matter provides for employing timed fingerprint location (TFL) information in dynamically selecting a subset of content from a set of content. TFL information can provide location information for user equipment without employing conventional location techniques. As such, TLF information can provide for location-centric selection of content. Further, secondary information correlated to TFL information can be received and employed in dynamic content subset selection. In an aspect, rules can be employed to predict the future location of a user equipment such that dynamic content selection can be tailored to the predicted future position of the user equipment. Moreover, privacy components can be employed to limit the propagation of sensitive information. | 01-03-2013 |
20130023274 | SELECTION OF A RADIO ACCESS TECHNOLOGY RESOURCE BASED ON RADIO ACCESS TECHNOLOGY RESOURCE HISTORICAL INFORMATION - The disclosed subject matter provides for selecting a radio access technology resource based on historical data related to the radio access technology resource. Location information can be employed to determine a radio access technology resource. Historical information related to the radio access technology resource can then be employed to determine the suitability of the radio access technology resource. A set of radio access technology resources can be ordered or ranked to allow selection of a suitable radio access technology resource from the set. Incorporation of historical information can provide for additional metrics in the selection of a radio access technology resource over simple contemporaneous radio access technology resource information. In some embodiments timed fingerprint location (TFL) information can be employed to determine a location. | 01-24-2013 |
20130023281 | SELECTION OF A RADIO ACCESS BEARER RESOURCE BASED ON RADIO ACCESS BEARER RESOURCE HISTORICAL INFORMATION - The disclosed subject matter provides for selecting a radio access bearer resource based on historical data related to the radio access bearer resource. Location information can be employed to determine a radio access bearer resource. Historical information related to the radio access bearer resource can then be employed to determine the suitability of the radio access bearer resource. A set of radio access bearer resources can be ordered or ranked to allow selection of a suitable radio access bearer resource from the set. Incorporation of historical information can provide for additional metrics in the selection of a radio access bearer resource over simple contemporaneous radio access bearer resource information. In some embodiments timed fingerprint location (TFL) information can be employed to determine a location. | 01-24-2013 |
20130036037 | FRAUD ANALYSIS FOR A LOCATION AWARE TRANSACTION - The disclosed subject matter provides for fraud analysis for a location aware transaction. In an aspect, location information can be associated with historical fraud events. The location of user equipment can be analyzed against historical fraud information to facilitate determination of a fraud factor value. The fraud factor value can reflect a determination related to the likelihood of fraud occurring in the present transaction based on the historic fraud events at the same or similar location as the present location of the user equipment. The determination can be based on fraud rules. Further aspects provide for abstraction of the fraud factor to limit exposure of personal information associated with wireless carrier subscribers in fraud analysis for a location aware transaction. | 02-07-2013 |
20130053023 | TICKETING MOBILE CALL FAILURES BASED ON GEOLOCATED EVENT DATA - Providing for identifying and ticketing mobile network communication errors according to geographic position of the errors is described herein. By way of example, communication errors, such as dropped calls, can be tracked and recorded as a function of position of a mobile terminal affected by a dropped call. A number of these errors within a given location is compared with historic error data to determine statistically anomalous instances of communication errors. Upon identifying such an anomaly, an error ticket can be generated that identifies a geographic region associated with the error. Particularly, the geographic region can be independent of radio access network infrastructure, which is conventionally used as a means of locating events within a mobile network. A geographic error ticket can, in some aspects of the subject disclosure, facilitate discovery and troubleshooting of errors that originate at least in part from unknown or unanticipated sources. | 02-28-2013 |
20130109407 | SHARING TIMED FINGERPRINT LOCATION INFORMATION | 05-02-2013 |
20130110392 | AUTOMATIC TRAVEL TIME AND ROUTING DETERMINATIONS IN A WIRELESS NETWORK | 05-02-2013 |
20130115888 | RECEIVED SIGNAL STRENGTH INDICATOR SNAPSHOT ANALYSIS - The disclosed subject matter provides for received signal strength indicator (RSSI) snapshot analysis. RSSI snapshot analysis can be independent of determining location/map information. An RSSI snapshot can be analyzed in view of historic RSSI information to determine a probability that a local wireless resource correlated with the historical RSSI information is instantly available. Machine learning can be employed to train an inference component to facilitate in determining the probability. In an aspect, the state of a wireless radio can be controlled based on the probability and this can reduce the energy consumption of the user equipment by facilitating intelligent enablement of a wireless radio. | 05-09-2013 |
20130115915 | LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL - The disclosed subject matter provides for sharing a network access credential based on location information. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials. | 05-09-2013 |
20130267179 | Remote Control Of Mobile Devices To Perform Testing Of Wireless Communications Networks - A remote testing and control system sends instructions to perform a test to a mobile device, receives test results from the mobile device in response to the instructions, presents the test results within a user interface so that that the test results are viewable by a user, and receives an input to control the test results. The test results may be received and presented within the user interface in real-time. The instructions to perform the test may be scheduled to be sent at a specified time. | 10-10-2013 |
20130288711 | TIMED FINGERPRINT LOCATING IN WIRELESS NETWORKS - A location of user equipment (UE) in a wireless network is determined. Geometric calculations are leveraged for an overlaid bin grid framework mapping the wireless network area to store differential values for each frame of the bin grid framework for each pair of relevant NodeBs. A timing offset can be determined, such that when a time value from a target UE is accessed, the location can be quickly determined. The target UE time value can be searched for in the pre-computed differential value data set indexed by a relevant NodeB site pair to return a set of frames (forming a hyperbola between the site pair) that can be intersected with a second set of frames for a second NodeB site pair for the same UE. The intersecting frames can represent the location of the UE in the wireless network and timing in the network is correctable based on the data. | 10-31-2013 |
20130310065 | LOCATION ESTIMATION OF A MOBILE DEVICE IN A UMTS NETWORK - The present disclosure provides devices, systems, and methods to utilize relative timing offset information reported by one or more mobile devices. When coupled with AGPS information reported by one or more mobile devices, the offset information is be used to calibrate calculations and subsequently to locate all 3G mobiles with GPS-like accuracy, whether or not a GPS receiver is available on said mobile device being located. A determination of a propagation delay between one or more cell sites and a mobile device is reported to a network and used to calibrate unknown information such as a timing offset, to improve the accuracy of a detected location. The relative timing offset can be applied to determine a location for all other mobile devices within the area served by the known base station. The present disclosure utilizes this method in conjunction with information crowd-sourced from a plurality of mobile devices. | 11-21-2013 |
20130337824 | TIMED FINGERPRINT LOCATING AT USER EQUIPMENT - Systems and techniques for determining the location of user equipment (UE) in a wireless network are disclosed. These techniques leverage geometric calculations for an overlaid local bin grid framework mapping an area of a wireless network to stored differential values for each frame of the local bin grid framework for pairs of relevant NodeB radios. A timing offset can be determined, such that when a time value from the UE is accessed, the location can be quickly determined with minimal real time computation. In an aspect, the UE time value can be searched for in the pre-computed differential value data set indexed by a relevant NodeB radio pair to return a set of frames that can be intersected with a second set of frames for a second NodeB radio pair for the UE. The intersecting frames can represent the location of the UE in the wireless network. | 12-19-2013 |
20140029521 | CODE PLANNING FOR WIRELESS COMMUNICATIONS - Scrambling code conflicts can be mitigated by primary scrambling code reuse that minimizing a potential interference Primary scrambling codes are applied to a first set of cells located in a portion of the network being considered. A second set of cells are evaluated for primary scrambling code reuse based on a distance parameter and/or a coverage area. If the distance parameter is greater than a defined distance, primary scrambling code reuse can be applied. If all distance parameters evaluated are less than the distance parameter, a length of the distance parameter is reduced and the distance between cells is reevaluated. | 01-30-2014 |
20140094176 | HANDOVER RELATION IDENTIFICATION UTILIZING NETWORK EVENTS - Aspects relate to automatically establishing neighbor relations for adjacent sectors based on one or more network events. The neighbor relations can be established between sectors that can be identified as inter-frequency neighbors or intra-frequency neighbors. In an aspect, the network events can be active call data events received from one or more mobile devices. The active call data events can be radio access bearer establishments and internal system releases. In another aspect, the network events can be idle call data events received from one or more mobile devices. If a first event ended on a first sector and a second event started on a second sector before expiration of an interval that started when the first event ended, the first sector and second sector can be defined as neighbors. | 04-03-2014 |
20140128064 | Managing Network Load Using Device Application Programs - Concepts and technologies are described herein for managing network load using device application programs. An illustrative method includes receiving, at a mobile device, a list of preferred combinations of location area codes (“LACs”), cell identifiers (“CIDs”), and times that data access by the mobile device is to be incentivized, determining a current LAC associated with a location area within which the mobile device is currently located, determining a current CID associated with a base transceiver station to which the mobile device is currently connected, determining a current time, and determining if the current LAC, the current cell ID, and the current time are included as a preferred combination in the list. The method also includes providing an indication that data access by the mobile device is incentivized if the current LAC, the current cell ID, and the current time are included in the list as a preferred combination. | 05-08-2014 |
20140146681 | DETECTION AND PREVENTION OF HEAVY CONGESTION IN A WIRELESS NETWORK - Detection and prevention of heavy congestion in a wireless network is disclosed herein. Radio links are monitored and if the number of radio links reaches a first threshold level, one or more network parameters are modified in order shrink a cell footprint and/or to control cell reselection. The monitored radio links can be downlink circuit switched and packet switched radio links. Alternatively or additionally, an uplink noise level can be monitored and if the uplink noise level reaches a second threshold level, the one or more network parameters can be modified, even if the number of radio links are not at the threshold level. | 05-29-2014 |
20140155080 | RESOURCE MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK - Detection of an unbalanced network load and redistribution of network traffic to balance the network load is provided herein. Load balancing across different radios in the same sector of a cell site can be facilitated through detection of the unbalance network load and changes to one or more parameters can be made to rebalance the network load. After radios within a sector are more evenly balanced, network load balancing across sectors can be facilitated. The balancing can be performed to improve system performance, reduce a dropped call rate, as well as to achieve other benefits that can provide an improved user experience as compared to systems that do not attempt to balance the network load. | 06-05-2014 |
20140155085 | Classification Of Indoor And Outdoor Telecommunications Events Of Mobile Telecommunications Networks - Concepts and technologies are described herein for the classification of indoor and outdoor telecommunications events that occur within mobile telecommunications networks. According to one aspect disclosed herein, a method for classifying telecommunications events can include receiving a data set that includes geo-location data and radio signal measurement data for a plurality of telecommunications events that have occurred within a mobile telecommunications network. The method can also include providing the data set as input to a classification model. The method can also include classifying the data set into an indoor results subset and an outdoor results subset using the classification model. The indoor results subset can include a first telecommunications event that is determined by the classification model to have occurred in an indoor location. The outdoor results subset can include a second telecommunications event that is determined by the classification model to have occurred in an outdoor location. | 06-05-2014 |
20140162629 | DYNAMIC STEERING OF TRAFFIC ACROSS RADIO ACCESS NETWORKS - Intelligent radio access technology sensing and selection are applied in a dynamic traffic steering network. Network characteristics and network policies are determined. A server sends network characteristics and network policies to user equipment devices. User equipment devices can determine a radio access technology to connect to based on network policies and network characteristics. Further, it can be determined how to select user equipment devices for connection to a radio access network via a radio access technology. In one aspect, user equipment devices dynamically select a radio access network for connection based on real-time or near real-time radio access network conditions. In another aspect, a self-organizing network can monitor and determine radio access network conditions and the radio access network conditions can be sent to user equipment devices in given cellular broadcast area. | 06-12-2014 |
20140249747 | AUTOMATIC TRAVEL TIME AND ROUTING DETERMINATIONS IN A WIRELESS NETWORK - Aspects relate to automatically providing updated route and predicted travel time to allow a user to travel a shortest route between a first point and a second point. A route can be planned based on a multitude of route segments, wherein historical data related to speed is known for each of the route segments. Further, the historical data is categorized based on temporal aspects, such as time of day, day of week, as well as other aspects, such as known events that can have an influence on the speed at which each route segment can be traveled. As the user moves along the route, the planned route, as well as an anticipated travel time, are almost continually updated to provide the most up-to-date and accurate data. | 09-04-2014 |
20140258555 | MOBILE DEVICE APPLICATION FOR AUTOMATIC FILTERING OF TRANSMITTED DATA CONTENT - A communications device is provided. This includes a processor adapted to receive one or more identified data sources from at least one network database. An applications component is configured to determine one or more network applications that communicate with the processor based in part on the one or more identified data sources. A filter can be configured to at least partially disable data exchanges to the one or more identified data sources during communications with at least one of the one or more network applications. | 09-11-2014 |
20140325019 | DEVICE-DRIVEN INTELLIGENCE AND FEEDBACK FOR PERFORMANCE OPTIMIZATION AND PLANNING OF A SERVICE NETWORK - A subscriber device reports network operation conditions, such as network performance incidents, to receive feedback from the network related to the incident and available or possibly available solutions, and to produce network intelligence suitable for network planning and network performance enhancement. Reporting of network performance incidents can be characterized by location and time of occurrence, wherein this intelligence is provided by the user device. Feedback provided by the network is based on the network performance data received as part of reporting an incident. The reporting described herein enables a network operator to generate network planning intelligence based on actual network performance as experienced at the subscriber level. | 10-30-2014 |
20140376365 | DYNAMIC STEERING OF TRAFFIC ACROSS RADIO ACCESS NETWORKS - Intelligent radio access technology sensing and selection are applied in a dynamic traffic steering network. Network characteristics and network policies are determined. A server sends network characteristics and network policies to user equipment devices. User equipment devices can determine a radio access technology to connect to based on network policies and network characteristics. Further, it can be determined how to select user equipment devices for connection to a radio access network via a radio access technology. User equipment devices can dynamically select a radio access network for connection based on real-time or near real-time radio access network conditions. A self-organizing network can monitor and determine radio access network conditions and the radio access network conditions can be sent to user equipment devices in given cellular broadcast area. | 12-25-2014 |
20150045051 | SELECTION OF A RADIO ACCESS TECHNOLOGY RESOURCE BASED ON RADIO ACCESS TECHNOLOGY RESOURCE HISTORICAL INFORMATION - The disclosed subject matter provides for selecting a radio access technology resource based on historical data related to the radio access technology resource. Location information can be employed to determine a radio access technology resource. Historical information related to the radio access technology resource can then be employed to determine the suitability of the radio access technology resource. A set of radio access technology resources can be ordered or ranked to allow selection of a suitable radio access technology resource from the set. Incorporation of historical information can provide for additional metrics in the selection of a radio access technology resource over simple contemporaneous radio access technology resource information. In some embodiments timed fingerprint location (TFL) information can be employed to determine a location. | 02-12-2015 |
20150058956 | LOCATION BASED SHARING OF A NETWORK ACCESS CREDENTIAL - A network access credential can be shared among devices based on location information for a device. Location information can include timed fingerprint location information. In an aspect, location information can be associated with a location of user equipment. This location information can be correlated with network access credentials. Location information can be used to access a relevant network access credential. The relevant network access credential can be shared with other devices. In an embodiment, sharing a network access credential can be between mobile devices. In another embodiment, sharing a network access credential can be between a remote computing device and a mobile device. Sharing a credential can allow for access to a network without having to generate or input new credentials. | 02-26-2015 |
20150065160 | RADIO REPEATER SYSTEM FOR AVOIDING MOBILE DEVICE LOCATION INTERFERENCE - A radio repeater system is described that disables itself to avoid interfering with mobile network performed multilateration of mobile devices. The radio repeater provides additional network coverage for a localized area. The localized area can include enclosed spaces such as buildings or transportation terminals. The radio repeater system can monitor the signals received from cell towers, and if there are at least three signals of a predetermined signal strength, the radio repeater can disable itself to avoid interfering with mobile locating performed by the network. The radio repeater can remain disabled until the conditions that led to the disabling have passed. | 03-05-2015 |