Patent application number | Description | Published |
20090061821 | Pico cell home mode operation - Identification of radio coverage of a mobile station (MS) via a pico cell, such as an IP-BTS in a user premises (e.g. residence or business customer location), enables a mobile/wireless service provider to differentiate between coverage under a pico cell and coverage under a macro network. In a disclosed example, when the MS requests registration/authentication through a pico cell, a related signaling message includes a pico cell identifier (pID). A home location register (HLR) is provisioned with a pID, so that the HLR can decide to accept or reject the registration/authentication requests. For example, if the particular MS is provisioned for services from a specific pico cell, the HLR will grant the registration/authentication and allow the network to process calls for the mobile station through the identified pico cell. This enables the provider to allow discounted services through pico cell, e.g. as a replacement for a landline. | 03-05-2009 |
20100165928 | UTILIZATION OF MULTIPLE ACCESS POINTS TO SUPPORT MULTIPLE APPLICATIONS AND SERVICES - A method that includes establishing a connection with a default access point, transmitting a request to access or utilize an application, a service, or a resource, receiving a response to the request that includes a location of a serving access point that provides the application, the service, or the resource, establishing a connection with the serving access point, and receiving an assignment of a network address that is anchored by the serving access point. | 07-01-2010 |
20100250414 | INTER-LAYER PARAMETER LIAISON SYSTEMS AND METHODS - An exemplary method includes generating an access record associated with a data session provided by at least one access layer element over an access network, generating an application record associated with an application provided by at least one application layer element over the access network, transmitting data representative of a correlation parameter associated with application from the at least one application layer element to the at least one access layer element via an inter-layer liaison subsystem, and inserting the correlation parameter associated with application and received from the at least one application layer element via the inter-layer liaison subsystem in the access record. In some examples, the method further includes correlating the access record and the application record based on the correlation parameter associated with the application. Other exemplary inter-layer parameter liaison methods and systems are also disclosed. | 09-30-2010 |
20110070902 | SHORT MESSAGING SERVICE DELIVERY ARCHITECTURE IN HYBRID LTE/CDMA/GSM NETWORKS - A method includes a network device receiving a request from a user, to deliver a service messaging service (SMS) message, to another user, where the other user is roaming; sending, to a first device, a user registration query; receiving, from the first device and by the network device, a user registration response, where the user registration response indicates whether the other user, in which the SMS message is to be delivered, is registered with zero networks, one network, or two networks; forwarding, by the network device, the SMS message associated with the request, via at least one of the one network or the two networks, when the user registration response indicates that the other user is registered with at least one of the one network or the two networks; and sending to a second device, by the network device, another user registration query, when the user registration response indicates that the other user is registered with zero networks. | 03-24-2011 |
20110136471 | MANAGEMENT OF CDMA CREDENTIALS ON A SMART CARD - A method is performed by a user device and a smart card inserted into the user device. The method includes storing, in the smart card, information to permit the user device to communicate with a particular network; identifying a first smart card identifier associated with the smart card; identifying a second smart card identifier associated with a previous smart card inserted into the user device; comparing the first smart card identifier and the second smart card identifier to generate a first comparison result; pushing, by the smart card and to the user device, the information when the first comparison result indicates that the first smart card identifier matches the second smart card identifier; and obtaining, by the user device, access to the particular network using the information received from the smart card. | 06-09-2011 |
20110142015 | REGISTERING WITH SIP SERVERS FOR IMS USING A FULLY QUALIFIED DOMAIN NAME - A fully qualified domain name may be used to identify a session initiation protocol server with which a client device may connect to IMS services in a network. In one implementation, a network device may receive a request to register a client device for IMS services. The network device may determine a fully qualified domain name corresponding to one or more SIP servers that process SIP signaling packets for the client device and transmit a message initiating resolution of the fully qualified domain name into a plurality of IP addresses. | 06-16-2011 |
20110182249 | DATA OFFLOADING AT WIRELESS NODE - A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers. | 07-28-2011 |
20110282931 | DYNAMIC INTERNET PROTOCOL REGISTRY FOR MOBILE INTERNET PROTOCOL BASED COMMUNICATIONS - A server device configured to store an Internet protocol (IP) registry, the registry includes information for a user device, the information includes particular identifiers for the user device, an IP address for the user device, and a particular access point name (APN), where the particular APN corresponds to a service, an application, a network, or data used by the user device; receive a query that includes identifiers and an APN; perform, using the IP registry, an operation to identify the information, for the user device, based on the identifiers and the APN; obtain the information for the user device, when the identifiers match the particular identifiers stored in the IP registry and when the APN matches the particular APN stored in the IP registry; and send, to an application server, the information for the user device, where the IP address permits the application server to communicate with the user device. | 11-17-2011 |
20120020260 | DATA OFFLOADING WITH DISTRIBUTED IP MANAGEMENT AND ROUTING - A method performed by a wireless node includes receiving policies for data offloading; identifying a user associated with a data flow to which a user device is attached; determining whether data offloading is permitted for the user based on the policies; and performing data offloading when it is determined that data offloading is permitted for the user, wherein data offloading includes routing the data flow away from at least one of a higher layer traffic aggregation device relative to the wireless node or a higher hierarchical controlling device relative to the wireless node. | 01-26-2012 |
20120030143 | CHARGING FOR DATA OFFLOADING - A method performed by a wireless node including receiving charging policies for data offloading; performing data offloading with respect to a user data flow; generating charging information associated with data offloading based on the charging policies; and sending the charging information to at least one of an on-line charging function or an off-line charging function. | 02-02-2012 |
20120036282 | SMART CARD DRIVEN DEVICE CONFIGURATION CHANGES - A smart card determines if the smart card has been inserted into a device, and retrieves a device identifier and at least one application configuration value from the device if the smart card has been inserted into the device. The smart card compares the retrieved device identifier and the at least one application configuration value with a device identifier and at least one application configuration value previously stored in the smart card. The smart card causes the retrieved device identifier and the at least one application configuration value to be sent to an Over The Air (OTA) server if the comparison indicates that the retrieved device identifier or the at least one application configuration value is different than the previously stored device identifier or the at least one application configuration value, so that the OTA server can supply application parameter changes to the mobile device for future device operation. | 02-09-2012 |
20120042058 | IP POOL NAME LISTS - A method including receiving a session request associated with a user equipment (UE); selecting one or more network address pool name lists based on a type of service to be provided to the UE; selecting one or more network address pool names from the one or more network address pool name lists based on a priority associated with the one or more network address pool names; selecting one or more network addresses from the one or more network address pool names; assigning the one or more network addresses to the UE; and establishing a session with the UE. | 02-16-2012 |
20120106443 | UNIVERSAL INTEGRATED CIRCUIT CARD ACTIVATION IN A HYBRID NETWORK - A universal integrated circuit card (UICC) may include a universal subscriber identity module (USIM); a code division multiple access (CDMA) subscriber identity module (CSIM); a memory to store instructions; and a processor. The processor may execute instructions to determine a type of wireless access network available to a user equipment (UE) associated with the UICC; perform activation of the UICC using the USIM, in response to detecting a CDMA enhanced High Rate Packet Data (eHRPD) network, a Global System for Mobile Communication (GSM) access network, or a Long Term Evolution (LTE) access network; and perform activation of the UICC using the CSIM, in response to detecting an available CDMA access network other than a CDMA eHRPD access network. | 05-03-2012 |
20120106533 | UNIVERSAL INTEGRATED CIRCUIT CARD UPDATES IN A HYBRID NETWORK - A universal integrated circuit card (UICC) may include a universal subscriber identity module (USIM); a code division multiple access (CDMA) subscriber identity module (CSIM); a memory to store instructions; and a processor. The processor may execute instructions to determine a type of wireless access network available to a user equipment (UE) associated with the UICC; perform updates of the UICC using the USIM, in response to detecting a CDMA enhanced High Rate Packet Data (eHRPD) network, a Global System for Mobile Communication (GSM) access network, or a Long Term Evolution (LTE) access network; and perform updates of the UICC using the CSIM, in response to detecting an available CDMA access network other than a CDMA eHRPD access network. | 05-03-2012 |
20120157047 | SELF-SUBSCRIPTION AND SELF-REACTIVATION TO A NETWORK - A method including receiving a network access request that includes an international mobile subscriber identity (IMSI) stored by a smart card associated with a user device; determining whether self-subscription to a service plan or reactivation of a suspended service plan is permitted based on self-activation data, wherein the self-activation data includes a mapping between IMSIs and data that indicates a granting or a denying of network access; selecting network access rights based on the self-activation data when it is determined that self-subscription to the service plan or reactivation of the suspended service plan is permitted; generating a temporary user profile based on the selected network access rights; and providing limited network access to the user device, wherein the limited network access permits a user to self-subscribe to the service plan or reactivate the suspended service plan. | 06-21-2012 |
20120188941 | EMERGENCY SUPPORT FOR VOICE OVER INTERNET PROTOCOL (VOIP) OVER MIXED MACRO AND FEMTO NETWORKS - A device receives, from an emergency call server (ECS), a query that includes a telephone number, a femto global positioning system (GPS) identifier, and an Internet protocol (IP) address associated with a user equipment (UE) placing an emergency call. The device obtains a serving cell E-UTRAN cell global identifier (ECGI) of the UE based on the query, and determines whether the ECGI is a macro ECGI associated with a base station or a femto ECGI associated with a femto cell. | 07-26-2012 |
20120191536 | RECOMMENDATIONS BASED ON REAL-TIME USAGE INFORMATION - A method including receiving a request for a service or an application from a user device associated with a customer; determining a type of service or a type of application; providing the service or the application; performing real-time tracking of the customer's usage of the service or the application based on the type of service or the type of application; generating one or more recommendations pertaining to the service or the application based on the real-time tracking; and sending the one or more recommendations to the customer via the user device. | 07-26-2012 |
20120233357 | SMART CARD DRIVEN DEVICE CONFIGURATION CHANGES - A smart card determines if the smart card has been inserted into a device, and retrieves a device identifier and at least one application configuration value from the device if the smart card has been inserted into the device. The smart card compares the retrieved device identifier and the at least one application configuration value with a device identifier and at least one application configuration value previously stored in the smart card. The smart card causes the retrieved device identifier and the at least one application configuration value to be sent to an Over The Air (OTA) server if the comparison indicates that the retrieved device identifier or the at least one application configuration value is different than the previously stored device identifier or the at least one application configuration value, so that the OTA server can supply application parameter changes to the mobile device for future device operation. | 09-13-2012 |
20120258690 | MANAGEMENT OF CDMA CREDENTIALS ON A SMART CARD - A method is performed by a user device and a smart card inserted into the user device. The method includes storing, in the smart card, information to permit the user device to communicate with a particular network; identifying a first smart card identifier associated with the smart card; identifying a second smart card identifier associated with a previous smart card inserted into the user device; comparing the first smart card identifier and the second smart card identifier to generate a first comparison result; pushing, by the smart card and to the user device, the information when the first comparison result indicates that the first smart card identifier matches the second smart card identifier; and obtaining, by the user device, access to the particular network using the information received from the smart card. | 10-11-2012 |
20130100804 | DATA OFFLOADING AT WIRELESS NODE - A method performed by a wireless node includes receiving a data flow associated with user devices; performing a packet inspection of the data flow; determining whether a network address of the wireless node matches another network address associated with the data flow; converting the other network address to a layer 2 identifier when the other network address matches the network address; establishing a bearer link within the wireless node based on the layer 2 identifier; and offloading the data flow from layers of a network, which are higher relative to the wireless node, to the bearer link, wherein the data flow does not traverse the layers. | 04-25-2013 |
20130152178 | SECURE ENTERPRISE SERVICE DELIVERY - A device receives enterprise information associated with enterprises supported by a network, and determines enterprise identifiers for one or more enterprises identified in the enterprise information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the enterprise identifiers. | 06-13-2013 |
20130157700 | NON-ACCESS STRATUM (NAS) TRANSPARENT MESSAGING - A device receives, from an application server, a message destined for a user equipment, and reformats the message into a non-access stratum (NAS) transparent message. The device also provides, to a home subscriber server, a query for an identification of a mobility management entity serving the user equipment, and receives, from the home subscriber server, the identification of the mobility management entity serving the user equipment. The device further provides the NAS transparent message to the identified mobility management entity, where the mobility management entity forwards the NAS transparent message to the user equipment. | 06-20-2013 |
20130252584 | AUTOMATIC OSCILLATING BIP SESSION FOR SIM SELF-REACTIVATION - A method and article of manufacture to reactivate a user identity card for a mobile station that communicates with a network is described. The user identity card is initially activated with the network. The user identity card has a unique identifier. Activation includes communicating with the mobile station from the network and programming the user identity card with network parameters. The network parameters programmed on the user identity card are then cleared after a preset period of time. The user identity card is reset to an unactivated state and then the user identity card can be reactivated with the network. | 09-26-2013 |
20130254395 | EQUIPMENT IDENTITY REGISTRATION - Method, device, and storage medium for receiving a request to attach to a network from a device; obtaining a user identifier and a device identifier; identifying an enhanced type allocation code identifier based on the device identifier; storing enhanced type allocation code identifiers; determining if network access is granted or denied based on whether a correlation exists between the user identifier and the enhanced type allocation code identifier; and granting network access in response to a determination that the correlation exists between the user identifier and the enhanced type allocation code identifier. | 09-26-2013 |
20140056257 | UTILIZATION OF MULTIPLE ACCESS POINTS TO SUPPORT MULTIPLE APPLICATIONS AND SERVICES - A method that includes establishing a connection with a default access point, transmitting a request to access or utilize an application, a service, or a resource, receiving a response to the request that includes a location of a serving access point that provides the application, the service, or the resource, establishing a connection with the serving access point, and receiving an assignment of a network address that is anchored by the serving access point. | 02-27-2014 |
20140140268 | INTELLIGENT EMERGENCY SESSION HANDLING - An access control device may include logic configured to receive a request from a user device to set up a packet connection for an emergency session to a packet data network via an access network. The logic may be further configured to determine a location associated with the user device; identify a public safety answering point associated with the determined location; determine whether a connection capacity associated with the identified public safety answering point has been reached; and reject the request to set up the packet connection for the emergency session, in response to determining that the connection capacity associated with the identified public safety answering point has been reached. | 05-22-2014 |
20140165149 | BLOCKING NETWORK ACCESS FOR UNAUTHORIZED USER DEVICES - A first server, associated with a first network, may: receive a first query from a network device associated with a second network; determine an identifier associated with the user device; provide, to a second server, a second query including the identifier; receive, from the second server, a response to the second query, the response identifying whether the identifier of the user device is being stored by the second server; and provide to the network device, a response to the first query, the response to first query identifying whether the user device is authorized to access the second network based on determining that the user device is not authorized to access the second network when the identifier is being stored by the second server or based on determining that the user device is authorized to access the second network when the identifier is not being stored by the second server. | 06-12-2014 |
20140235258 | APPLICATION SERVER AWARENESS OF DEVICE CAPABILITIES IN A WIRELESS NETWORK - Capability information, relating to hardware and/or software capabilities of different types of mobile devices, may be used to tailor services provided to the mobile device based on the particular type of mobile device. In one implementation, a device, such as an application server that provide services to mobile devices, may: receive a request from a mobile device, for services; obtaining information indicating a type of the mobile device; obtain, based on the type of mobile device, information indicating capabilities of the mobile device; and provide the services to the mobile device, in which the provided services are tailored for the mobile device based on the capabilities of mobile device. | 08-21-2014 |
20140269525 | PROVIDING LIMITED NETWORK ACCESS TO USER DEVICES - A network device is configured to receive, from a user device that is not subscribed to a network associated with the network device, a connection request identifying a particular service, of one or more services, to provide to the user device. The system may further identify a packet data network (PDN) to establish based on the particular service; identify one or more parameters, associated with the PDN and identifying a data flow, associated with the particular service, that can be provided to the user device; and establish the PDN based on the one or more PDN parameters. The PDN may permit only the data flow, associated with the particular service, to be transmitted to the user device. The system may further provide the data flow, associated with the particular service, to the user device via the PDN. | 09-18-2014 |
20140295807 | NETWORK BASED MISSED CALL NOTIFICATION - A device is configured to detect that a user device has failed to receive a call attempt for a call intended for the user device and from a calling party, and determine, based on the detection, that the calling party has not left a voicemail message associated with the call. The device is configured to store missed call information, associated with the call, and send a first missed call notification to the user device, where the first missed call notification includes the missed call information. The device is configured to detect that the user device has not received the first missed call notification, and send a second missed call notification to the user device, where the second missed call notification includes the missed call information. | 10-02-2014 |
20140307858 | RETURNING CALLS TO EMERGENCY CALLERS WITHOUT VALID TELEPHONE NUMBERS - A device is configured to detect an emergency call from a user device associated with a device identifier, the device identifier including information that identifies the user device. The device is configured to detect that the user device is not associated with a valid originating telephone number, based on detecting the emergency call. The device is configured to determine a temporary originating telephone number, based on detecting that the user device is not associated with a valid originating telephone number, and to store an association between the device identifier and the temporary originating telephone number. The device is configured to transmit the emergency call, with information identifying the temporary originating telephone number, to an emergency call device, the temporary originating telephone number permitting the emergency call device to place a return call to the user device. | 10-16-2014 |
20140348008 | IDENTIFYING BASE STATION TYPES - One or more devices may receive information that identifies a format of an identifier of a network device. The format of the identifier may indicate a portion of the identifier that identifies a type of the network device. The one or more devices may receive the identifier of the network device based on a user device connecting with the network device to communicate via the network device; determine the type of the network device connected to the user device based on the portion of the identifier and a format of the identifier that identifies the type of network device; and execute a processing instruction based on the type of network device connected to the user device. | 11-27-2014 |
20140349609 | NETWORK DEVICE ACCESS ID ASSIGNMENT AND MANAGEMENT - One or more devices may receive an instruction to generate an index for a customer associated with a base station and may generate the index based on receiving the instruction. The index may include one or more spaces to store a corresponding one or more access identifiers (IDs) used to allow a user device to connect to the base station. The one or more devices may receive an instruction to add an access ID to the index; generate the access ID based on a format of the access ID, a customer type, a customer ID, or a space ID; store the access ID in one of the one or more spaces of the index; and provide the access ID to the user device and the base station. The access ID may permit the user device to connect to the base station to access a network via the base station. | 11-27-2014 |