Methods and systems are provided herein for facilitating Rich Communication Services (RCS) error messaging in a non-RCS capable network. It is determined that a first device and a second device are communicating using encrypted RCS messaging in a terrestrial network. It is then determined that the second device has transitioned from the terrestrial network to a non-terrestrial network. A determination is made that the first device has sent an encrypted RCS message intended for the second device. Based on the second device transitioning to the non-terrestrial network that does not support the encrypted RCS messaging, an error message is communicated to the first device indicating that the encrypted RCS message cannot be received by the second device.
Systems and methods are provided for using morphology to determine a confidence level of a civic address associated with an enhanced 911 call. After a request by a public safety answer point (PSAP) for a civic address corresponding to user equipment (UE) initiating a call for emergency services is received at a node, the node receives from the UE a geodetic location corresponding to the UE. The geodetic location corresponding to the UE is utilized to retrieve morphology information from a database. Based at least in part on the morphology information, a confidence level of the civic address can be determined. Upon the confidence level of the civic address satisfying a configurable threshold, the civic address is provided to the PSAP.
A wireless communication system modifies wireless network slice information for a wireless communication user. The wireless communication system detects a modification to the wireless network slice information for the wireless communication user. In response to the modification detection, the wireless communication system transfers a slice information modification message to a wireless communication device for the wireless communication user. The wireless communication system detects a failure of the slice information modification message sent to the wireless communication device. In response to the failure detection, the wireless communication system transfers another slice information modification message to the wireless communication device.
A telecommunication network management system. The system comprises an incident reporting application that creates incident reports pursuant to alarms on network elements of a telecommunication network and wherein one of the incident reports is associated with a large-scale event (LSE), wherein the LSE incident report identifies alarms at a plurality of different network elements as associated with the LSE; and an incident management application that analyzes attributes of cell sites identified in the LSE incident report as impacted by the LSE, determines that at least 75% of the cell sites receive backhaul service from a same alternative access vendor (AAV) and that at least one backhaul circuit of the at least 75% of the cell sites is in an alarmed state, causes the incident reporting application to record a root cause of the LSE incident report as an AAV fault.
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
5.
Penetration Testing in Zero Trust Network Environment
A method comprises generating, by a test application in a test system of the zero trust network, a test packet comprising a unique token identifying the penetration test based on a test log, wherein the test log indicates that the penetration test is to be performed on a communication between a source microsegment and a target microsegment, transmitting, by the test application, the test packet to a policy enforcement point in the target microsegment, wherein a result log stores data, in association with the unique token, regarding at least one of a reception or processing of the test packet by the policy enforcement point, and comparing, by a log application in the test system, the test log and the result log to determine that the test packet has impermissibly passed through the policy enforcement point or been processed by the policy enforcement point.
The technology described herein improves management of the optimization of a device configuration associated with one or more wireless communication technologies. An analysis is performed using performance data and device capability information for a plurality of user devices. An optimal device configuration associated with one or more wireless communication technologies is determined for one or more identified user devices of the plurality of user devices. The one or more identified user devices are instructed to operate using the determined optimized device configuration.
A method of managing execution of a secure application is disclosed. The method comprises receiving an initial profile of an wireless communication device (WCD) by a secure application manager executing on a computer system, storing the initial profile by the secure application manager in a datastore; receiving a request comprising a current profile of the WCD by the secure application manager from an API of a secure application executing on the WCD to invoke an operation of a secure application; comparing the current profile of the WCD by the secure application manager to the initial profile of the WCD stored in the immutable record in the datastore; and in response to determining that the current profile of the WCD matches the initial profile of the WCD, passing the request to invoke an operation of the secure application by the secure application manager to the secure application for execution.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Methods and systems for providing mobile broadband services to high speed rail are provided. The method begins with determining that a user equipment (UE) is moving at a speed between a first threshold and a second threshold between a first location and a second location. The first and second thresholds may be selected to encompass typical speed ranges of high speed rail operation. Next, the method continues with identifying a set of access points between the first location and the second location. Then, the method continues with predicting an access point from the set of access points at which to transmit data to the access point. Because high speed rail uses a fixed track, the predicting may be performed in advance. The method concludes with dynamically selecting the access point from the set of access points based on at least one predefined antenna steering pattern to maintain antenna bandwidth.
Methods and systems are provided for providing a children at play live indicator. A user device corresponding to a user is initially registered with a safety device. When the user device is within a configurable range of the safety device, an indication is received. A parent may configure the configurable range at a children at play service via a parent device. Based on the user device being within the configurable range of the safety device, the safety device emits a visual or audible indicator. Additionally or alternatively, a warning indicating the user device is within the configurable range of the safety device may be communicated to the user device, the parent device, or a connected vehicle approaching the safety device.
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
Systems, methods and devices are provided for subscriber prioritization upon initial attachment. Methods include receiving notification of an initial attach request from a wireless device at a subscriber locator function (SLF) and performing a database lookup at the SLF. Methods further include obtaining a subscriber priority from the database lookup and transmitting the subscriber priority from the SLF to a network component responding to the initial attach request from the wireless device.
A method for implementing a slice security zone (SSZ) in a 5G network. The method comprises storing by an SSZ function executing on a first network server an SSZ security profile of the SSZ in a secure storage function, receiving by the SSZ function from a slice management function a slice registration request comprising information relating to a slice security profile of a slice managed by the slice management function, if the slice security profile complies with the SSZ security profile, storing by the SSZ function a slice registration association between the slice and the SSZ in the secure storage function, and sending by the SSZ function to the slice management function a slice registration response comprising information relating to whether the slice was registered in the SSZ.
H04W 12/48 - Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
Aspects provided herein provide methods, apparatus, and a non-transitory computer storage medium storing computer instructions for vehicle disturbance alerting in a network. The method begins with receiving a vibration alert from a sensor installed in a vehicle. The sensor may be an accelerometer, gyroscope, or motion-capable sensor and is in communication with a low power radar sensor that is also installed in the vehicle. A low power radar sensor is activated in response to the vibration alert. At least one radar signature is received from the low power radar sensor. The radar signature is then compared with at least one driver radar signature. The driver radar signature is recorded when a driver occupies a driver seat position and operates the vehicle. Based on the comparison, a determination is made whether to issue a vehicle disturbance alert.
B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
B60R 25/104 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device characterised by the type of theft warning signal, e.g. visual or audible signals with special characteristics
B60R 25/20 - Means to switch the anti-theft system on or off
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
B60R 25/32 - Detection related to theft or to other events relevant to anti-theft systems of vehicle dynamic parameters, e.g. speed or acceleration
G01S 13/88 - Radar or analogous systems, specially adapted for specific applications
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
13.
Systems and methods for cell-level beamforming mode adaptation
Methods, media, and systems are provided for adapting a beamforming mode based on channel state information. The methods, media, and systems receive, at a base station associated with an antenna array, the channel state information from one or more devices. Based on the channel state information, the methods, media, and systems determine whether an uplink signal measurement is above a first threshold and whether a downlink signal measurement is above a second threshold. Based on whether the uplink signal measurement is above the first threshold and whether the downlink signal measurement is above the second threshold, the methods, media, and systems instruct one or more antenna elements corresponding to the antenna array to schedule wireless transmissions utilizing closed-loop beamforming or open-loop beamforming.
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Systems, methods, and devices are disclosed herein for an application service that utilizes a large language model (LLM) to assist with performing management tasks associated with a wireless communications network. In an implementation, the application service receives natural language input indicative of a management task to complete with respect to the network. The application service identifies a context of the management task, which helps constrain the LLM to the appropriate domain(s). The application service generates a prompt that incorporates the task and the context and submits the prompt to the LLM. The application service receives from the LLM a reply that includes a plan that details a series of steps and associated resources of the domain for completing the management task. Upon receiving the LLM's reply, the application service performs the management task based on the provided plan.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
G06F 40/40 - Processing or translation of natural language
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Systems, methods and devices are provided for facilitating integration of haptic notifications with existing applications, particularly mobile applications. A method includes accessing, by a wireless device storing an application, a haptic notification library including haptic notifications and further accessing code correlating the haptic notifications from the haptic notification library with standard notifications within the application. The method further includes providing the correlated haptic notifications during execution of the application by the wireless device.
The technology described herein relates to N7 call flow in a standalone architecture. In embodiments, a computing system may comprise a Session Management Function (SMF) for management of a network session of a network, a first Policy Control Function (PCF) for policy management of network resources of the network, and a second PCF for policy management of the network resources of the network. The SMF can receive information from the first PCF and the second PCF via a first interface. In embodiments, an existing Packet Data Unit (PDU) session between a user device and the computing system is identified. The first PCF can determine, based on received indications, to transmit policy update information to the SMF. Based on a failure to transmit the policy update information to the SMF, the first PCF can transmit the policy update information to the second PCF for transmission to the SMF.
The technology described herein relates to Security Operations Center (SOC) operations in a standalone architecture. In embodiments, the SOC comprises a producer that communicates with a first Network Repository Function (NRF) and a second NRF over a network repository function service-based interface. In embodiments, the producer (e.g., a Session Management Function, a Policy Control Function) can monitor heartbeats received from the first NRF and the second NRF. The first NRF, in some embodiments, can transmit a notification to the producer indicating that the first NRF is out-of-service. In some embodiments, the first NRF can also transmit another notification to the producer that indicates the first NRF is in-service. Based on the producer receiving the notification that the first NRF is out-of-service, the producer can suspend the monitoring of the heartbeats sent by the first NRF.
A wireless communication network exchanges user data with a User Equipment (UE) over a set of Public Mobile Land Networks (PLMNs). The wireless communication network detects excessive PLMN switching by the UE among the set of the PLMNs, and in response, directs the UE to use a subset of the PLMNs to inhibit the excessive PLMN switching. The wireless communication network exchanges subsequent data with the UE over the subset of the PLMNs.
Systems, methods and computer-readable mediums are provided for resource monitoring and optimization within a network. Monitoring network resource usage can be based on time of day, cell loading conditions, wireless device location, and cell size. Through the monitoring, methods include determining proportions of the network resources utilized by the wireless devices within the network for voice over new radio (VoNR), voice over LTE (VoLTE) and data services during the monitoring. Based on this determination, methods provided herein reallocate the network resources based on the monitored resource usage and the proportions.
A method for automatically managing user access to resources of a communication system. The method includes receiving by a requester interface of an automated resource access manager a request by a user for access to a resource of the communication system, the access request communicated from user equipment (UE) of the user to the requester interface, and providing automatically by an approver interface of the automated resource access manager the access request to UE of an approver associated with the requested resource, the requested resource including a requested application of the communication system. The method additionally includes receiving by the approver interface either a granting of access to the requested application or a denial of access to the requested application, and providing automatically, by the requester interface, the user access to the requested application in response to receiving by the approver the granting of access to the requested application.
A wireless User Equipment (UE) selects a network slice. When in idle mode, the wireless UE wirelessly indicates the selected network slice to a serving wireless access node. In response, the wireless UE wirelessly receives a node identifier for another wireless access node that is co-located with the serving wireless access node and that supports the selected network slice. The wireless UE wirelessly communicates in parallel with the serving wireless access node and the other wireless access node to use the selected network slice.
Methods are provided for delivering goods to a connected vehicle using unmanned aerial vehicles (UAVs). Upon receiving a request comprising instructions to deliver a package to a customer, a connection is established between the connected vehicle paired to a user device and the UAV authorized to deliver the package to an interface of the connected vehicle. The connection enables data corresponding to the connected vehicle to be communicated to the UAV. In aspect, the data comprises speed and direction of the connected vehicle allowing an optimal route to intercept the connected vehicle to be determined.
A method for throughput estimation and troubleshooting includes collecting RF parameters from wireless gateway devices. The method additionally includes estimating a throughput of multiple wireless gateway devices based on collected RF parameters and maintaining a profile including RF parameters and estimated throughput over time. The method further includes troubleshooting for selected wireless gateway devices based on the throughput estimate.
Various embodiments comprise a wireless access node configured to steer a wireless user device to a RAT type. The wireless access node comprises radio circuitry and node circuitry. The radio circuitry receives a measurement report from a wireless user device for a first RAT type and a second RAT type. The sampling rate for the first measured signal strength is different than the sampling rate for the second measured signal strength. The node circuitry applies a calibration factor to the second measured signal strength to normalize the second measured signal strength with the first measured signal strength. The node circuitry compares the normalized second measured signal strength to the first measured signal strength. The radio circuitry wirelessly transfers an attachement instruction to the wireless user device to attach to the first RAT type or the second RAT type based on the comparison.
The technologies discussed herein relate to methods, systems, media, etc., for automatically triggering a user device action based on utilizing one or more ethanol sensor devices. In embodiments, an ethanol sensor device can detect ethanol vapor concentrations and determine whether the concentration is above a threshold. In embodiments, the ethanol sensor device can transmit the detected concentrations to one or more servers, which can cause the user device to initiate an action based on a concentration level that is above the threshold. For example, the server can provide one or more ride hailing services, such that the server initiates the user device action that includes providing, for display on a user interface of the user device, one or more selectable ride hailing transportation options from a location corresponding to the user device. In some embodiments, the server provides services corresponding to physical or mental health.
A core network server for defining authentication credentials and authenticating a wireless communication device according to WIFI communication protocols includes a central processing unit (CPU) and a non-transitory memory comprising executable instructions that when executed by the CPU, causes the core network server to receive an encrypted authentication request from a wireless communication device; send the encrypted authentication request to an authentication server based on one or more attributes in the encrypted authentication request; receive an indicator of a specialized network slice associated with the wireless communication device based on sending the encrypted authentication request; communicate authentication messages to the wireless communication device according to one or more network functions of the specialized network slice; and authenticate the wireless communication device according to the specialized network slice responsive to communicating the authentication messages.
Systems and methods are provided for managing uplink transmission power (UTP) plans for user devices. A manager can assess UTP adjustment criteria to determine if an updated UTP plan should be activated for the user device. UTP plans may need to be updated when devices are transmitting too much power or not enough in order to be received by a telecommunications network. Updated UTP plans can increase or decrease the power transmitted by the device.
H04W 52/14 - Separate analysis of uplink or downlink
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
28.
SANCTUARY ANTENNA FOR FREQUENCY DIVISION DUPLEX CARRIER DEGRADATION DUING TIME DIVISION DUPLEXING SOUNDING REFERENCE SIGNAL ANTENNA SHARING
Methods, systems, and a non-transitory computer-readable medium that provide a sanctuary antenna for mitigating FDD carrier degradation during TDD antenna sharing are provided. The method begins with determining that the carrier degradation will occur during at least one FDD receive signal slot in a FDD frequency band on at least one antenna of the TDD frequency band based on the at least one FDD receive signal slot coinciding with at least one scheduled TDD transmit slot. Then, based on the determining, switching at least one scheduled FDD receive signal slot from the at least one antenna of the TDD frequency band to a sanctuary antenna occurs. The sanctuary antenna is used for a duration of at least one sounding reference signal (SRS) symbol.
The technologies discussed herein relate to methods, systems, media, etc., for transmitting out-of-band signals to initiate a user device trigger. In embodiments, an out-of-band node is configured to wirelessly transmit out-of-band signals to a user device that is within a threshold distance of the out-of-band node. For example, an out-of-band signal can include an ultrasonic wave. In some embodiments, two or more out-of-band nodes are positioned in an indoor room of a building. In embodiments, the transmitted out-of-band signals transmitted by the out-of-band node can include encoded data, which was received by the out-of-band node over a network from one or more servers, wherein the encoded data, when received by a user device via the out-of-band signal, triggers the user device to initiate an action. For example, the action may include automatically opening an application and initiating an update to a telecommunications service.
Systems and methods are provided for dynamically optimizing EN-DC networks and include a first node, a second node, and one or more processors. The one or more processors are configured to receive data indicating that a first set of bands is present within a first sector and determine a high priority band from the first set of bands within the first sector. The system also identifies a first set of devices within a sector and defines a time frame for receiving data indicating a number of instances in which each device connected to the high priority band. A first status report comprising data indicating the number of instances each device connected to the high priority band is received and a performance rating is determined for the high priority band. The time frame for receiving data may be adjusted based on the performance rating and data from the first status report.
Systems, methods, and devices for managing network resources perform and/or comprise: setting a communication threshold; monitoring a communication parameter for a wireless device connected to a network, wherein the wireless device is configured for communicating with the network using a first communication technology and for communicating with the network using a second communication technology; receiving a resource status from the network; and in response to a determination that the communication parameter is below the communication threshold and based on the resource status, causing the wireless device to switch from communicating with the network using the first communication technology to communicating with the network using the second communication technology.
A method of installing an API in a user equipment (UE). The method comprises sending a request from the UE for an API to a distributed application executing on a computer system, wherein the request defines a context of the UE; receiving a template smart contract by the UE from the distributed application, wherein the template smart contract is identified by the distributed application based on the context of the UE and wherein the template smart contract defines a manifest for fetching a plurality of API smart contract components from a ledger data store and defines instructions for building the API by executing at least some of the API smart contract components; executing the at least some of the API smart contract components by the UE, whereby the API is built by the UE; and executing the API by the UE, whereby the UE accesses an application service.
Methods and systems for preserving network capacity by successively sharing content serially using an event protocol are provided. The method begins with monitoring the RF signal conditions for user devices at an event. A first user device with RF signal conditions above a threshold is identified. A second user device within a predetermined distance from the first user device and is within predetermined RF signal conditions is also identified. The second user device is requesting a download of the same content as the first device. The first and second user devices are synchronized using an event protocol. The event protocol may automatically perform the synchronization and may use a handshaking protocol as part of the synchronization process. Once the event synchronization is complete the first device transmits the content to the second device. The synchronizing may be repeated with successive user devices to serially deliver the common content to the successive user devices at the event.
According to aspects herein, methods and systems for providing multiple channel bundling for mobile phone satellite cellular systems are provided. More particularly, after a node comprising at last one time division duplex (TDD) layer and a frequency division duplex (FDD) layer determines a user equipment (UE) supports dual bands, the node initiates bundling of downlink communications over the FDD layer and a portion of the TDD layer. Additionally, the node instructs the UE to communicate uplink communications over the FDD layer and not uplink slots of the TDD layer. In this way, link budget is improved because only low band (FDD) is utilized in uplink communications from the UE to the node. Moreover, additional bandwidth is provided in downlink communications from the node to the UE because low band is bundled with the downlink slots of mid band (TDD).
A method for configuring a network of a communication system to secure applications executable on user equipment (UE) connectable to the network. The method includes receiving a predefined first traffic signature corresponding to a first application, and configuring a network traffic monitoring tool to detect an activation of the first application executing on the UE. The method additionally includes configuring the network traffic monitoring tool to monitor active traffic manifested on the network associated with the first application, configuring a traffic signature comparison tool to detect a security breach associated with the first application, and configuring an alarm tool issue an alarm and/or act against the first application.
A collector ambient electromagnetic power harvesting (AEPH) device for collecting and forwarding data is disclosed. The device includes an antenna, an AEPH circuit converting RF energy from the antenna into electrical power, and a memory and a controller powered by the AEPH circuit. The controller receives in a first RF signal information from a reporter AEPH device, including data and the reporter ID. The controller stores the data in the memory with an association to the reporter ID. The controller receives in a second RF signal an interrogation signal. In response, the controller transmits a response via the antenna including the reporter ID and data in the memory associated with the reporter ID. The interrogation signal may be received and the response transmitted in a first RF band and/or communication protocol, and the information may be received in a second RF band and/or communication protocol.
A data communication system serves a wireless communication device over a Non Third Generation Partnership Project (non-3GPP) network slice. The data communication system receives a request for the non-3GPP slice from the wireless communication device over a non-3GPP access node. The data communication system exchanges network signaling with a 3GPP network. The data communication system receives an authorization from the 3GPP network for the wireless communication device to use the non-3GPP network slice. The data communication system establishes a Virtual Private Network (VPN) for the wireless communication device over the non-3GPP access node in response to the authorization from the 3GPP network. The data communication system exchanges user data with the wireless communication device over the VPN. The data communication system exchanges the user data with a non-3GPP communication system over the VPN or another VPN for the non-3GPP communication system.
Aspects herein provide systems, methods, and media for terrestrially controlling whether user devices are allowed to or preventing from accessing and utilizing a non-terrestrial network. Using geofencing and time-based threshold techniques, a terrestrial network component determines and control whether user devices within a geofence should be prevented from accessing and utilizing the non-terrestrial network in order to avoid overloading the capacity of the non-terrestrial network. The terrestrial network component sends an indication and/or error to the non-terrestrial network for delivery to the user device to prevent the access. When the user device receives the indication and/or error from a satellite, for example, the user device that is within the geofence is caused to access and utilize the terrestrial network instead of the non-terrestrial network.
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
A method is provided of updating Subscriber Identity Module (SIM) data in a user equipment (UE) associated with a wireless communication service provider. An entitlement server receives a UE SIM update inquiry from a UE, the inquiry including UE identifying information and UE stored SIM configuration identifying information. The entitlement server sends a SIM update inquiry to a SIM configuration repository, the inquiry including the UE identifying information and the UE stored SIM configuration identifying information. The entitlement server receives a SIM status message from the SIM configuration repository, the message indicating whether SIM configuration data stored in the SIM configuration repository is more recent than the UE stored SIM configuration. The entitlement server sends a SIM update response to the UE, the UE SIM update response including the SIM status message.
A wireless communication network wirelessly receives a slice indicator from a wireless communication device. The wireless communication network selects an Artificial Intelligence (AI) engine based on the slice indicator. The wireless communication network may select the AI engine by selecting a wireless network slice that comprises the AI engine based on the slice indicator. The wireless communication network wirelessly receives user data from the wireless communication device for the wireless network slice. The wireless communication network transfers the user data to the selected AI engine. The selected AI engine generates an AI output based on the user data.
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Methods for mitigating interference between satellite networks and terrestrial cellular networks are provided. Interference may occur when a UE uses an extraterrestrial network when a terrestrial network is available. A method of mitigating interference between an extraterrestrial network and a terrestrial network begins with detecting, by an extraterrestrial access point, that at least one terrestrial access point located within a first geographical area is attempting to communicate with the extraterrestrial access point. The extraterrestrial access point then determines that the first geographical area is covered by at least one terrestrial network. The determining that the first geographical area is covered by at least one terrestrial network may use a dataset of terrestrial network access points. Once the first geographical area has been determined to be covered by at least one terrestrial network, the extraterrestrial access point ceases transmissions to the first geographical network.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to modify an amount of power to be utilized on the uplink channel between another user device and the base station. This power modification technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite by blanking of physical resource blocks that are being used on the same or an overlapping radio frequency spectrum by user devices communicating with terrestrial base stations via a telecommunications network. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to blank physical resource blocks on the uplink channel(s) that correspond to the portions of the radio frequency spectrum at issue. This blanking technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite by blanking of physical resource blocks that are being used on the same or an overlapping radio frequency spectrum by user devices communicating with terrestrial base stations via a telecommunications network. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to blank physical resource blocks on the uplink channel(s) that correspond to the portions of the radio frequency spectrum at issue. This blanking technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Aspects herein provide systems, methods, and media for mitigating uplink degradation, noise, and/or other interference experienced between a user device and a satellite. When the uplink degradation, noise, and/or other interference is below a signal quality threshold, the telecommunications network identifies base stations with coverage areas that overlap with the coverage area of the satellite. The telecommunications network instructs and causes those base stations to modify an amount of power to be utilized on the uplink channel between another user device and the base station. This power modification technique reduces or prevents uplink degradation, noise, and/or other interference experienced between a user device and a satellite and caused by communications between other user devices and the terrestrial base stations.
Embodiments of the present disclosure are directed to systems and methods for group-based filtering of user devices on a wireless network. Upon a request from a user device to access a requested network service, a device specific identifier associated with the user device is used to determine one or more groups associated with the user device. Based on any access restrictions for the one or more groups associated with the user device, the requested network service may be selectively authorized or provided.
H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
Systems and methods are provided for outputting audible sound processed with a hearing loss compensation algorithm for listening by a user of user smart phone. A method includes receiving live digital micro electrical-mechanical system (MEMs) sound data from a speaker phone. The method further includes processing, at a subscribed user smart phone, the live digital MEMS sound data from the speaker smart phone in accordance with a hearing loss compensation algorithm. The subscribed user smart phone generates and outputs audible sound waves for the live digital for listening by the user of the subscribed user smart phone.
H04M 1/60 - Substation equipment, e.g. for use by subscribers including speech amplifiers
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
The present disclosure describes a system and method for managing site configuration in a radio access network (RAN) environment. Trigger events are identified through data analysis, including network congestion, signal degradation, or performance deviation. Upon detecting a trigger event, specific site configuration data associated with the event is extracted from the RAN node. The extracted site configuration data is utilized to generate a new configuration file, ensuring the seamless update of network settings while maintaining the integrity of the RAN.
Systems, methods, and computer-readable media herein generate an E911 location report based on a vertical uncertainty and horizontal uncertainty associated with a device-based hybrid (DBH) location and an assisted global positioning system (A-GPS) location received from a UE device. The uncertainties may be compared determine which portions of the DBH location and the A-GPS location to include in a location report sent to a PSAP. A location report including the location information associated with the lower uncertainty can be sent to a PSAP, thus providing the most relevant and accurate information so that first responders can more effectively locate a distressed caller.
Systems, methods and devices are provided for cell outage compensation optimization. Methods include monitoring, by a cell outage compensation analyzer, events between wireless devices and an access node deploying a cell within a radio access network. The method additionally includes determining relevant events indicative of a cell outage from the monitored events and forwarding forwarding the relevant events to a cell outage compensation optimization agent within a core network. The method additionally includes generating, at the cell outage compensation optimization agent, a real time status of the cell based on the events and providing an approval at the cell outage compensation optimization agent prior to allowing performance of cell outage compensation procedures.
Systems and methods are provided for 5G and aircraft altimeter radar co-existence that provides optimum and more accurate protection radius and optimum wireless access node (gNodeB) power setting level for safe interference levels. The strength of a signal from a wireless access node at the location of the radar altimeter is determined. The strength of the signal at the location of the radar altimeter is compared to a threshold to determine if the threshold is satisfied. In response to the strength of the signal satisfying the threshold, one or more parameters for the signal, including transmitter power level, are changed.
A method of initiating actions based on analyzing automated fix actions in a telecommunication network management system, the method comprising obtaining, by an incident management application executing on a computer system, prior incident reports associated with a plurality of historical incidents from a database, wherein the prior incident reports comprise one or more recommended corrective actions taken or to be taken to resolve the historical incidents; evaluating, by the incident management application, the prior incident reports to determine a severity level of the prior incident reports and/or an effectiveness value of the one or more recommended corrective actions; prioritizing actions to be taken automatically or by NOC personnel based on the severity level and/or the effectiveness value; and initiating a corrective action to be taken automatically or by the NOC personnel to resolve an active incident report based on the prioritization.
A container, a closure, and a product system. The system comprises the container; the closure; the product stored in the container and retained within the container by the closure; a first ambient electromagnetic power harvesting (AEPH) chip affixed between the container and the closure in such a way that removing the closure destroys an antenna of the first AEPH chip, wherein the first AEPH chip stores a first authentication code; and a second AEPH chip affixed to one of the container or the closure, wherein the second AEPH chip stores a second authentication code, a reader authorization code, and sourcing information in a static memory portion, wherein the sourcing information identifies the product, the place of manufacture of the product, the date of manufacture of the product, and an identity of the manufacturer of the product.
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
54.
Service communication proxy (SCP) that serves network topology data
A Service Communication Proxy (SCP) serves network topology data. The SCP comprises communication circuitry and Application Programming Interface (API) circuitry. The communication circuitry receives Network Function (NF) messages from sending NFs for delivery to an NF type. The communication circuitry routes the NF messages to receiving NFs of the NF type. The communication circuitry maintains network topology data responsive to the routing of the NF messages from the sending NFs to the receiving NFs. The API circuitry receives an API call for the network topology data. The API circuitry retrieves the network topology data from the communication circuitry. The API circuitry transfers an API response having the network topology data.
A battery system. The battery system comprises an electric battery and a radio frequency identity (RFID) chip. The electric battery comprises an internal metal plate and an exterior package skin. The RFID chip is retained by the exterior package skin of the electric battery and comprises a non-transitory memory, a processor, a radio transceiver coupled to the processor, an antenna, a first impedance matching component coupling the radio transceiver to the antenna, and a second impedance matching component coupling the internal metal plate of the electric battery to the radio transceiver, wherein the radio transceiver is configured to transmit radio frequency signals through the second impedance matching component to the internal metal plate and the internal metal plate is configured to radiate the radio frequency signals as radio waves.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
Embodiments of the present disclosure are directed to systems and methods for limiting user equipment (UE) capability information messaging received by an extraterrestrial base station (EBS). One or more broadcast signals are transmitted from the EBS and detected by a UE. Upon detecting the broadcast signals, the UE requests to attach to the EBS. In aspects, the EBS will first authenticate the UE's identity. Then, a capability enquiry message is transmitted to the UE specifying what information the EBS would like and requesting that carrier aggregation information not be included. The UE then sends a UE capability information message without carrier aggregation information, thereby reducing the UE capability information transmitted between the UE and the EBS.
Embodiments of the present disclosure are directed to systems and methods for limiting user equipment (UE) capability information messaging received by an extraterrestrial base station (EBS). One or more broadcast signals are transmitted from the EBS and detected by a UE. Upon detecting the broadcast signals, the UE requests to attach to the EBS. In aspects, the EBS will first authenticate the UE's identity. Then, a capability enquiry message is transmitted to the UE specifying what information the EBS would like (e.g. information limited to the one frequency band supported by the EBS). The UE then sends a UE capability information message comprising only the information requested from the EBS, thereby reducing the UE capability information transmitted between the UE and the EBS.
Systems and methods are provided for optimizing N10 interface messaging. Specifically, registration messages, de-registration messages, and the like can be dynamically controlled such that communication is prevented. Said messages are communicated via an N10 interface between a Unified Data Management function (UDM) and a Session Management function (SMF) in a 5G network. Additionally, subscription information, user profile information, etc., is also communicated via the N10 interface. Thus, the N10 interface can easily become overloaded or congested. Aspects herein provide mechanisms to avoid additional congestion of the N10 interface by intelligently eliminating specific messages communicated to the UDM via the N10 interface.
Systems and methods are provided for optimizing N10 interface messaging. Specifically, registration messages, de-registration messages, and the like can be dynamically controlled such that communication is prevented. Said messages are communicated via an N10 interface between a Unified Data Management function (UDM) and a Session Management function (SMF) in a 5G network. Additionally, subscription information, user profile information, etc., is also communicated via the N10 interface. Thus, the N10 interface can easily become overloaded or congested. Aspects herein provide mechanisms to avoid additional congestion of the N10 interface by intelligently eliminating specific messages communicated to the UDM via the N10 interface.
Systems, methods, and computer-readable media are provided for performing a caching action based on end-user cues. An indication corresponding to the intent of a user is initially detected at a sensor associated with a display providing content. Based on the indication and historical information, the intent of the user is predicted. A caching action corresponding to additional content is provided based on the intent of the user. For example, the caching action may be to preemptively cache the additional content. Alternatively, the caching action is to cease preemptively caching the additional content.
H04L 67/5683 - Storage of data provided by user terminals, i.e. reverse caching
G06F 3/0487 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
The present technology relates to a method and system for providing fixed wireless access (FWA) services to user devices in a cellular network. The system is configured to receive signal data from the user device operating within the coverage area of the cell site and analyze the signal data to identify characteristics that indicate the user device is a FWA device. Upon determining that the user device is a FWA device, the controller switches the user device to a virtual anchor point associated with the cell site, enabling the device to connect to the network using FWA services. The virtual anchor point is associated with the cell site and may be established through a virtual gateway.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
62.
MICROSERVICE-BASED ACCESS TO WIRELESS COMMUNICATION SYSTEMS
A wireless communication device accesses a wireless communication network. The wireless communication device identifies an application identifier. The wireless communication device calls an Application Programming Interface (API) with the application identifier to identify a microservice API. The wireless communication device calls the microservice API to identify a hardware identifier. The wireless communication device transfers the hardware identifier to obtain access to the wireless communication network.
Embodiments of the present disclosure are directed to systems and methods for limiting user equipment (UE) capability information messaging received by an extraterrestrial base station (EBS). An EBS is configured to broadcast signals on a single RF band for a single carrier. One or more broadcast signals are transmitted from the EBS and detected by a UE. Upon detecting the broadcast signals, the UE requests to attach to the EBS. In aspects, the EBS will first authenticate the UE's identity. Then, a capability enquiry message is transmitted to the UE specifying what information the EBS would like (e.g. information limited to the single RF band that the EBS is configured for). The UE then sends a UE capability information message comprising only the information requested from the EBS, thereby reducing the UE capability information transmitted between the UE and the EBS.
Embodiments of the present disclosure are directed to systems and methods for providing anticipated satellite coverage information for a user equipment. Using a dataset of anticipated coverage areas associated with one or more satellites locally stored on a user equipment (UE) and a location of the UE, the UE can determine its location relative to a satellite coverage area. Various information can then be displayed by the UE, including an amount of time until the UE enters the satellite coverage area and how long it will be in the coverage area-allowing a user to plan calls and data sessions for times and durations that are more likely to be successful based on a connection with a satellite.
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
G01S 19/05 - Cooperating elements; Interaction or communication between different cooperating elements or between cooperating elements and receivers providing aiding data
H04W 48/16 - Discovering; Processing access restriction or access information
65.
Call Session Control Function (CSCF) reselection in wireless communication networks
Various embodiments comprise a wireless communication network to support Internet Protocol Multimedia Subsystem (IMS) voice calling. In some examples, the wireless communication network comprises Call Session Control Function (CSCF) circuitry and E.164 Number Mapping (ENUM) circuitry. The CSCF circuitry receives a Mobile Originating Session Initiation Protocol (MO IMS) invite message from an originating User Equipment (UE). The CSCF circuitry performs an ENUM query for the destination number to route the invite to the terminating UE network. The ENUM circuitry responds with routing information and realm information for the terminating UE. The CSCF circuitry stores the realm type in association with the MO SIP invite and transfers the MO SIP invite. The CSCF circuitry receives an error response from the peer network for the SIP invite. The CSCF circuitry determines if retry is allowed based on the realm type. If retry is allowed, the CSCF circuitry transfers a retry request.
Methods and systems for restricting communication services over a network. The method includes detecting a Session Initiation Protocol (SIP) register message originating from a specific network Public Land Mobile Network (PLMN) that is included in a restricted PLMN list identified by a P-Access-Network-Information header (P-ANI). The method further includes implementing a policy to remove RCS and presence capability feature tags from a subsequent SIP register message. The lack of feature tags to Serving Call Session Control Function (S-CSCF) will prohibit triggering of Third Party Registration to different application servers.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
Embodiments of the present disclosure are directed to systems and methods for multi-domain cell selection and handover that give a preference to terrestrial radio access network (RAN) nodes over satellite nodes. During cell search and selection, a user equipment (UE) may select a terrestrial base station over a satellite RAN node even though a connection with the satellite node may have better key performance indicators. During handovers, a UE may be instructed to handover to a terrestrial base station earlier than normal based on a determination the UE's serving cell is a satellite, or to handover later than normal based on a determination the serving cell is terrestrial and the neighboring cell is a satellite node.
Technology, including systems, methods, and devices, is disclosed herein to page a user device for communication with a wireless network. In an implementation, a mobility management function of the wireless network receives a request to page a user device. The mobility management function determines a set of network base stations to page the user device and sends, via the set of network base stations, a page to the user device. The set of network base stations is determined by filtering a base station history associated with the user device according to a filtering rule which includes the base station most recently in communication with the device. In some implementations, a set of base stations to page the user device is determined by filtering the base station history according to the time of the request during the trailing week.
Technology is disclosed herein for registering a user device for access to a wireless network. In an implementation, a session manager of a wireless network receives a registration request for access to the network from a user device. The session manager determines a workflow configuration for the access based on parameters relating to the registration request. Prior to sending a request for an access session to a policy enforcement function, the session manager selects a traffic routing function of the wireless network for device access to the network and requests a traffic management session from the traffic routing function. The session manager sends a request for an access session to the policy enforcement function which includes traffic routing information. The session manager sends the user device information by which the user device can access the wireless network.
Systems and methods are provided for controlling user equipment (UE) access of a non-terrestrial network (NTN) such as a satellite network. The method includes executing an applet on a subscriber identification module (SIM) of the UE. The method receives public land mobile networks (PLMN) available to the UE at the SIM. The method determines the only PLMN available is a forbidden NTN PLMN (FPLMN) maintained by the SIM. In response to determining the only PLMN available is an NTN FPLMN, removing the PLMN from the FPLMN maintained by the SIM and refreshing the SIM and causing the UE to acquire the NTN PLMN.
Systems, methods, and processing nodes for managing network topology perform and/or comprise: receiving user metrics associated with a community of interest; obtaining network-associated requirements for each of a plurality of services deployed on a network, at least a portion of the plurality of services being metaverse services; obtaining computing-system-associated requirements for each of the plurality of services; and based on the user metrics, the network-associated requirements, and the computing-system-associated requirements, generating a network-site implementation plan recommendation that minimizes one or more cost functions.
The technology disclosed herein relates to dashboards for a multi-network management system. In embodiments, the multi-network management system that is in communication with a plurality of network managers can receive at least one key performance indicators (KPI) for each radio access network (RAN) node of each of the plurality of network managers (e.g., wherein each of the plurality of network managers are managing a plurality of RAN nodes). The multi-network management system can also determine a capacity for each of the plurality of network managers based on the at least one KPI received. In embodiments, the capacity can also be determined based on the RAN node capabilities associated with each network manager. Accordingly, a dashboard can be displayed, via a user interface, the dashboard comprising a capacity icon for a determined capacity of a network manager.
H04W 24/02 - Arrangements for optimising operational condition
H04L 41/0681 - Configuration of triggering conditions
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
73.
CAPACITY MANAGEMENT FOR NETWORK MANAGEMENT SYSTEMS
The technology disclosed herein relates to systems, methods, media, other types of technologies, or one or more combinations thereof, for enhancing network capacity management and other types of network management. In embodiments, a connection with network operation systems (e.g., network managers) can be established using a multi-network management system. For example, the multi-network management system can transmit or receive signals to or from each radio access network (RAN) node that is in communication with each of the network operation systems. The multi-network management system can also receive network performance data (e.g., key performance indicators (KPIs)) for each RAN node. Based on the network performance data, the multi-network management system can determine a degradation for at least one RAN node. Based on the degradation, the multi-network management system can adjust a rate at which one of the network managers receives additional network performance data from the at least one RAN node.
Embodiments of the present disclosure are directed to systems and methods for avoiding or mitigating co-channel interference between terrestrial and satellite radio access networks (RANs). Based on a determination that co-channel interference is occurring between a set of signals communicated with a satellite RAN and a set of signals communicated with a terrestrial base station, one or more co-channel mitigation procedures may be executed. The co-channel mitigation procedures function to limit or eliminate the overlap between the satellite and terrestrial signals on the same frequency band that can negatively affect wireless communication sessions with UEs-particularly for UEs attached to the satellite RAN.
A system and method of managing network resources is provided, in which a resource usage threshold for an access node to which a wireless device is connected, wherein the wireless device is configured for communication in both of a first communication mode and a second communication mode is set; a resource usage of the access node in the first communication mode is monitored; the monitored resource usage to the resource usage threshold is compared; and in response to a determination that the resource usage exceeds the resource usage threshold, the wireless device is caused to switch from the first communication mode to the second communication mode.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Various embodiments comprise a wireless access node to inhibit access point data congestion. In some examples, the wireless communication network comprises node circuitry and radio circuitry. The radio circuitry wirelessly exchanges user data with a wireless user device for a low latency data service. The node circuitry exchanges the user data with a network user plane. The node circuitry measures a queue status for downlink data transmission to the wireless user device. The node circuitry generates a queue report that indicates the queue status. The radio circuitry wirelessly transfers the queue report to the wireless user device. The wireless user device receives the queue report and wirelessly transfers uplink signaling indicating the queue report to the wireless access node for delivery to a congestion control application server.
Various embodiments comprise a wireless communication network to proactively notify user devices in response to uplink data congestion. The wireless communication network comprises an access node and a wireless user device. The access node wirelessly exchanges user data with a wireless user device and exchanges the user data with a network user plane. The access node detects a data queue for uplink user data transferred by the wireless user device and indicates the data queue to the wireless user device. The wireless user device receives the indication and schedules additional uplink data transmissions based on a data priority. The access node wirelessly exchanges additional user data with the wireless user device and exchanges the additional user data with the network user plane.
H04W 72/512 - Allocation or scheduling criteria for wireless resources based on terminal or device properties for low-latency requirements, e.g. URLLC
H04W 72/1268 - Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
78.
DOWNLINK DATA CONGESTION DETECTION FOR LOW-LATENCY SERVICES IN WIRELESS COMMUNICATION NETWORKS
Various embodiments comprise a wireless communication network to proactively notify congestion control systems in response to downlink data congestion. The wireless communication network comprises an access node and an application server. The access node wirelessly exchanges user data with a wireless user device and exchanges the user data with a network user plane for delivery to an application server. The access node detects a data queue for downlink user data transferred by the application server and received from the network user plane and indicates the data queue to the network user plane for delivery to the application server. The application server receives the indication, generates additional user data, and transfers the additional user data based on a congestion control scheme. The access node exchanges the additional user data with the network user plane for delivery to the application server and wirelessly exchanges the additional user data with the wireless user device.
Systems, methods and devices are provided for facilitating undisturbed performance during service handover thresholds. Methods include monitoring performance parameters over time for multiple types of wireless devices experiencing a handover triggering event and storing the performance parameters for the multiple types of wireless devices. The methods further include analyzing the stored performance parameters for the multiple types of wireless devices to formulate a handover plan for the multiple types of wireless devices. The method further includes generating the handover plan for the multiple types of wireless devices and utilizing the handover plan to determine whether handover default settings should be utilized or overridden.
Systems, methods, and processing nodes for managing network communications perform and/or comprise: configuring a first bandwidth part (BWP) and a second BWP for a wireless device, wherein the wireless device is configured to communicate with an access node over the first BWP; monitoring an actual value of a traffic quality parameter for communications between the wireless device and the access node using the first BWP; determining an expected value of the traffic quality parameter for communications between the wireless device and the access node using the second BWP; and in response to a determination that the expected value of the traffic quality parameter exceeds the actual value of the traffic quality parameter, instructing the wireless device to switch from communication with the access node using the first BWP to communication with the access node using the second BWP.
A system comprises a communication device and an VS server. The communication device is configured to receive, a communication message comprising a digital identifier (ID) from a source communication device; send a verification request for receiving an authentication result of the digital ID, wherein the verification request includes the digital ID; and display a visual identifier in response to receiving the authentication result. The VS server is coupled to the communication device and configured to receive, from a source communication device, first registration information of a sender, wherein the sender is associated with the source communication device; receive, from the communication device, the verification request that instructs the VS server to authenticate the communication message, wherein the communication message includes the digital ID; determine an authentication result based on the first registration information and the digital ID; and send, to the communication device, the authentication result.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 12/42 - Security arrangements using identity modules using virtual identity modules
82.
INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) SLICING IN WIRELESS COMMUNICATION NETWORKS
Various embodiments comprise wireless communication networks to support slicing in an Internet Protocol Multimedia Subsystem (IMS) core. In some examples, the wireless communication network comprises a multimedia function and a network data system. The multimedia function receives a registration request indicating a User Equipment (UE) Identifier (ID). The multimedia function queries a network data system for UE subscription information. The network data system correlates the UE ID to slice information associated with a UE and indicates the slice information to the multimedia function. The multimedia function receives the slice information from the network data system and responsively caches the slice information in association with the UE ID.
Methods and systems for mitigating the effects of overlapping bandwidth parts are provided. A wireless communication network may determine that a first and a second bandwidth parts are overlapping. In response to the determination and prior to any communications being sent in the network, the network may proactively modify the first bandwidth part communications using an orthogonal code.
A method performed by a challenge and reward system comprises obtaining a challenge to offer a user and one or more rewards associated with completing the challenge, wherein the challenge indicates one or more tasks that are to be completed by the user to claim the one or more rewards, transmitting, to the UE, an options message comprising data describing the challenge, the one or more rewards, verification requirements for the challenge, and access requirements for the challenge, determining, using a machine learning model, a confidence score of the verification data, wherein the confidence score represents a likelihood that the user successfully completed the challenge, and transmitting a code to the UE to claim one of the rewards in response to the confidence score exceeding a threshold value.
A wireless communication device generates a slice certificate having one or more slice characteristics for a wireless network slice. The wireless communication device encrypts the slice certificate with a wireless network key. The wireless communication device wirelessly transfers the encrypted slice certificate to a wireless access node, and in response, wirelessly receives user context for the wireless network slice from the wireless access node. The wireless communication device wirelessly exchanges wireless network slice data with the wireless access node based on the user context for the wireless network slice.
Aspects herein provide systems, methods, and media for dynamically switching between multiple input multiple output algorithms to improve spectral efficiency and capacity. In aspects, based on data encoding traffic, user device mobility, and coverage, a base station automatically and intelligently selects and implements a particular downlink operating schema. Using various periodicity, the base station dynamically switches between various downlink operating schemas to reflect changing conditions in the date that encodes traffic, user device mobility, and coverage.
H04B 7/06 - Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Aspects provided herein provide methods, systems, and a non-transitory computer storage media storing computer-useable instructions for communicating with an IoT device through an IoT hub. The IoT awareness hub links IoT devices with a user equipment (UE). Once linked through the IoT hub, a user may control IoT devices, including managing settings and alerts, through the UE. The IoT devices establish two-way communication with the UE through the IoT hub and may also send an alert to the UE to wake the UE from a sleep state. This alert may be used for multiple purposes, including determining if a user of the UE needs assistance due to not activating the UE for a period of time. The UE user may also control aspects of IoT device data activities and alerts through the IoT hub.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Systems, methods, and computer-readable media are provided for leveraging physical state changes of user equipment (UE) for authentication. A series of unlock gestures comprising physical state changes are received via one or more sensors of the UE. The physical state changes may comprise detecting location of the UE, changes to movement of the UE, changes to orientation of the UE, contact with the UE, a volume of audible signals, or an intensity of light. After the series of unlock gestures are interpreted at the UE, at least a portion of the UE is unlocked to perform a specific action. The specific action may comprise unlocking the UE, opening an application on the UE, causing the UE to communicate information to another device, causing fake information to be displayed by the UE, causing sensitive information to be encrypted or unavailable, or blocking a portion of functionality of the UE.
Various embodiments comprise wireless communication network to register user devices with multimedia systems. In some examples, the wireless communication network comprises multimedia functions and a subscriber server. A first multimedia function receives a registration request for a wireless user device, selects the subscriber server from a plurality of available subscriber servers, and transfers a user authorization request for the user device to the subscriber server. The subscriber server receives the user authorization request and transfers a response indicating a server Identifier (ID) for the subscriber server. The first multimedia function receives the response and indicates the server ID and the registration request to a second multimedia function. The second multimedia function receives the server ID and the registration request, selects the same subscriber server based on the server ID, and transfers a multimedia authorization request to the subscriber server.
A system for ambient electromagnetic power harvesting (AEPH) chip location detection and tracking comprises an AEPH chip and a reader device. The AEPH chip comprises antennas configured to receive radio frequency waves from a cell site associated with a carrier network, rectifier circuits coupled to the one or more antennas configured to convert the radio frequency waves into power as a direct current voltage, a power storage coupled to the one or more rectifiers circuits configured to store the power, and a transceiver coupled to the power storage and configured to broadcast an identification signal using the power stored in the power storage in response to receiving the radio frequency waves from the cell site. The reader device comprises a transceiver configured to receive the identification signal from the AEPH chip, and processors coupled to the transceiver and configured to obtain a location of the AEPH chip.
H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment
H02J 50/00 - Circuit arrangements or systems for wireless supply or distribution of electric power
H02J 50/20 - Circuit arrangements or systems for wireless supply or distribution of electric power using microwaves or radio frequency waves
91.
SECURING BORDER GATEWAY PROTOCOL ROUTE PROPAGATION AND UPDATING
Embodiments of the present invention provide systems, methods, and computer storage media directed to propagating and authenticating border gateway protocol route advertisements. A trusted authority device stores and distributes routing information for various autonomous systems. The trusted authority device also issues and maintains digital certificates that are each assigned to one of the autonomous systems. The digital certificate can be utilized by autonomous systems to verify the authenticity of routing information advertised by another autonomous system. Each autonomous system can employ a routing device that can generate a route advertisement based on routing information received from the trusted authority device. The route advertisement can include a digital signature, a digital certificate, and a time-to-live value, among other things, each of which can be utilized by routing devices of other autonomous systems to determine the authenticity and validity of received routing information.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 45/00 - Routing or path finding of packets in data switching networks
System and method are disclosed for improving the position and orientation of wireless access devices, including customer premise equipment (CPE) device. One or more performance characteristics are measured at each of a series of three-dimensional positions, and then the CPE device is arranged in the position associated with the best performance characteristic(s).
Embodiments of the present disclosure are directed to systems and methods for mitigating disruptions to telecommunications networks. A call setup time is determined from a network perspective. If the call setup time is sufficiently long, one or more corrective actions are taken in order to identify and/or resolve a network problem that could be contributing to the long call setup time. The corrective action(s) can include comparing call setup time performance by geographic region, comparing network-observed call setup times to user equipment-observed call setup times, and/or initiating cell reselection procedures, for example.
H04M 3/08 - Indicating faults in circuits or apparatus
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04M 3/523 - Centralised call answering arrangements requiring operator intervention with call distribution or queuing
The technology disclosed herein relates to methods, computer storage media, systems, etc., for generating a network service indicator icon for a communication service application. For example, the communication service application can provide one or more of a voice over internet protocol call, video call, three-dimensional video calling service, messaging communication service, another type of communication service, or one or more combinations thereof, to a user device. In embodiments, a first set of data performance information for the communication service application can be received from one or more servers providing the communication service application. A data performance metric can be determined for the communication service application based on receiving the first set of data performance information. A network service indicator icon for the communication service application can be generated based on the data performance metric determined.
H04L 41/06 - Management of faults, events, alarms or notifications
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
95.
MULTIPLE USER MULTIPLE INPUT MULTIPLE OUTPUT SCHEDULER FOR FIXED WIRELESS ACCESS
Methods and systems for implementing MU-MIMO scheduling in a network are provided. The method begins with determining at least one signal condition metric for a plurality of signals used for communication between a base station and a plurality of devices. A machine learning model is trained to determine whether a device is a mobile device or a fixed wireless device using training data. The training data comprises at least one signal condition metric for the plurality of signals. Users may connect to the network by a mobile connection or through a fixed connection. An output of the machine learning model is then used to predict a type of connection to the network for each device of the plurality of devices. Then, based on the type of connection, MU-MIMO pairings are assigned to at least a portion of the plurality of devices.
A method for automated retrieval of performance data and incident resolution based on an incident report in a telecommunications carrier network comprising a radio access network. The incident report is delayed relative to the retrieved performance data, and the method includes receiving an incident report based on first data associated with a first cell site, where the first data is associated with a first time; querying the first cell site for performance data of the first cell site responsive to the incident report; receiving performance data from the first cell site responsive to the query, where the performance data is associated with a second time that is later than the first time; and implementing a control response at the first cell site responsive to the received performance data, where the control response is to resolve an incident indicated by the incident report.
A method of managing execution of a secure application is disclosed. The method comprises receiving an initial profile of an wireless communication device (WCD) by a secure application manager executing on a computer system, storing the initial profile by the secure application manager in a datastore; receiving a request comprising a current profile of the WCD by the secure application manager from an API of a secure application executing on the WCD to invoke an operation of a secure application; comparing the current profile of the WCD by the secure application manager to the initial profile of the WCD stored in the immutable record in the datastore; and in response to determining that the current profile of the WCD matches the initial profile of the WCD, passing the request to invoke an operation of the secure application by the secure application manager to the secure application for execution.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
98.
OPTIMIZATION OF SYNCHRONIZATION SIGNAL BLOCK PERIODICITY
Systems and methods are provided for synchronization signal block (SSB) periodicity optimization in a wireless network. A method includes measuring a network load and comparing the measured network load to a first predetermined threshold. The method further includes automatically adjusting an SSB periodicity when the network load meets the first predetermined threshold.
A method for testing a computer system. The method includes executing a test batch including a plurality of separate test cases, generating a plurality of test logs in response to the execution of the test batch, and identifying automatically a subset of test logs of the plurality of test logs associated with a failed test case of the plurality of test cases prior to the conclusion of the execution of the test batch. The method additionally includes sorting automatically the subset of test logs into a specific arrangement prior to the conclusion of the execution of the test batch, determining automatically a cause of the failure of the failed test case based on the arrangement of the sorted subset of test logs, and aborting the execution of the test batch based on the determination of the cause of the failure of the failed test case.
A core network comprises a data store is configured to store a record associated with a wireless communication device, wherein the record comprises a plurality of pre-provisioned security parameters related to the wireless communication device. A core authentication application at the core network is configured to receive an authentication request comprising at least one security parameter stored at both the wireless communication device and in a record at the data store, obtain a registration identifier in response to inputting the at least one security parameter received in the authentication request into a first security application, obtain a network-side authentication identifier in response to inputting the registration identifier into a second security application, and determine whether the wireless communication device is authenticated and authorized to access the carrier network when a device-side authentication identifier matches the network-side authentication identifier.