A data communication system characterizes the use of a wireless network slice by wireless communication devices. The data communication system receives requests from the wireless communication devices to use the wireless network slice. The data communication system determines that the use of the wireless network slice by the wireless communication devices would be unauthorized, and in response, serves the wireless communication devices using the wireless network slice. The data communication system identifies a characteristic of the wireless network slice responsive to serving the wireless communication devices using the wireless network slice.
H04W 48/18 - Selecting a network or a communication service
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
H04W 48/16 - DiscoveringProcessing access restriction or access information
2.
ONBOARDING POLICY CHARGING FUNCTIONS IN WIRELESS NETWORKS
Technology is disclosed herein for onboarding a policy charging function (PCF) of a wireless network to replace another network PCF. In an implementation, a network repository function (NRF) determines that a first PCF is offline or unavailable and identifies at least one other network function which is subscribed to the first PCF. The NRF instructs the network function to replace an identity of the first PCF with an identity of a second PCF in a PCF profile maintained by the network function. The network function, in response to the instruction, sends to the second PCF session information for active sessions associated with the first PCF along with a flag indicating that the active sessions are active. The second PCF receives the session information and rebuilds the active sessions in a database. The second PCF then manages the active sessions based on the session information in place of the first PCF.
Embodiments of the present disclosure are directed to systems and methods for converting communications from one form to another based on a set of user preferences. A user device may receive a communication in a first form, and based on a set of user preferences associated with the user device, the communication in the first form may be converted to a second form. For example, a first user device may communicate a text communication to a second user device. Said text communication may then be converted into an audio communication based on the user preference. By way of another example, a first user device may communicate an audio communication to a second user device. Said audio communication may then be converted into a text communication based on the user preferences.
A system and method for signaling bandwidth combination set (BCS) values in a wireless communication network are disclosed. Signaling may be used by a radio access network (RAN) to signal whether it supports a particular BCS, its highest-order supported BCS, or a list of supported BCS values. In response to the UE receiving an indication of the RAN's capabilities, the UE may communicate a commonly-supported BCS to the RAN. Accordingly, the disclosed approach enhances CA negotiation and improves system performance by preventing BCS mismatches and lowering UE signaling overhead by allowing the UE to report only combinations that the RAN can support. The described techniques apply to cellular networks and other wireless technologies, such as Wi-Fi multi-link operation (MLO).
A method comprises determining, by an alarm management system, that an alarm parameter exceeds a threshold value, transmitting, by the alarm management system, a throttle alarm to an incident reporting application in the communication network, in which the throttle alarm indicates that the second alarms describing the common incident will be throttled at the alarm management system for the throttle period, storing, by the throttle application, second alarms describing a common incident at a data store accessible by the alarm management system during a throttle period instead of forwarding the second alarms to a processing entity, transmitting, by the alarm management system, at pre-defined time intervals during the throttle period, an interval alarm report, and transmitting, by the incident management system to an incident reporting system, a throttled alarm report.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
A system and method for signaling fallback bandwidth combination set (BCS) values in a wireless communication network are disclosed. A user equipment (UE) transmits a capability message comprising a primary BCS value and at least one fallback BCS value to a base station. The fallback BCS signaling may be persistent or triggered based on network conditions, such as roaming or a lack of BCS support from the base station. The fallback BCS values may be transmitted within the same message as the primary BCS value or in a separate message, either as a second feature set or an independent message. This approach enhances carrier aggregation adaptability and ensures optimal network performance. The described techniques apply to cellular networks and other wireless technologies, such as Wi-Fi multi-link operation (MLO).
Systems and methods are provided for managing cell capacity for fixed wireless devices. An example method may include monitoring a number of fixed wireless devices on a frequency band served by an access node. If the number of fixed wireless devices on that frequency band exceeds a threshold, a notification may be transmitted to one or more neighboring access nodes. The notification may include the number of fixed wireless devices being served by the access node on the frequency band as well as the details of the frequency band that is serving the fixed wireless devices.
Systems and methods for geolocation-based network slice allocations for dynamic edge computing resource management are provided. In some embodiments, a network function of an operator core network may orchestrate one or more service augmentation platforms on network edge servers based on identifying event(s) where UE use the telecommunications network to access cloud-based service from an edge server within a threshold proximity of the event(s). Orchestration of the service augmentation platform(s) may be based in part on determining a network service classification for the event(s) based on event data collected about the event(s). A network slice for accessing the service augmentation platforms may be granted to UE by the network function based in part on the UE geographic proximity to the location associated with the scheduled events. The network function may de-orchestrate the service augmentation platform based on the end of the event as indicated by the event data.
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
Systems, methods, and computer-readable media herein dynamically adjust the policies used within a core network. These policies are determine based on the identification of a user device being a reduced capability device and the data requirements for that device. A correlation between the type of reduced capability device and the data requirements is used to derive data-drive insights using a near-real time RAN intelligence controller. The data used to determine these insights and policies are based near-real time sources.
A communication system receives a network identifier for a communication network from a user apparatus. The communication system receives an application identifier for a user application that uses the communication network from the user apparatus. The communication system receives an application username that identifies a user of the user application from the user apparatus. The communication system receives a request that indicates the network identifier from another user apparatus, and in response, transfers the application identifier and the application username to the other user apparatus.
In some examples, a wireless communication network receives information from a wireless communication device that characterizes a memory call in the wireless communication device. The wireless communication network authorizes the memory call based on the information. The wireless communication network transfers an authorization to the wireless communication device. The wireless communication device performs the memory call in response to the authorization.
Various embodiments comprise a wireless communication network to notify wireless user devices of available network slices. The wireless communication network comprises a network analytics service and slice notification system. The network data analytics service receives data generated by a diagnostics application hosted by a wireless user device that characterizes user behavior. The network data analytics service correlates the user behavior to a wireless network slice that the user device is not authorized to use. The slice notification system generates slice notification that identifies the wireless network slice. The slice notification system delivers the slice notification to the wireless user device wherein the wireless user device receives and displays the slice notification.
Methods and systems provided herein optimize usage of RRC inactive state. A method includes identifying a wireless device supporting a radio resource configuration (RRC) inactive state and determining, based on a wireless device profile or an active application utilized by the wireless device that the wireless device is not eligible to utilize the RRC inactive state. The method further includes selectively deactivating a capability for RRC inactive state and RNA paging for the wireless device based on the determination.
Embodiments of the present disclosure are directed to systems and methods for enhancing connections between user equipment (UE) and a base station. Particularly in order to mitigate the poor angular spread of higher frequency signaling, a second set of signals may be transmitted to a UE using a different polarization than a first set of signals. Depending on one or UE-specific parameters, the second set of signals may comprise a different data stream than a first set of signals to facilitate spatial multiplexing, or the second set of signals may comprise the same data stream as the first set of signals to facilitate spatial diversity.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
A wireless communication system controls a wireless communication device in a visited wireless communication network. A network database stores a slice indicator for a visited wireless network slice in the visited wireless communication network. A network controller receives a request from the visited wireless communication network for the wireless communication device, and in response to receiving the request, the network controller retrieves the slice indicator for the visited wireless communication network from the network database and transfers the slice indicator to the wireless communication device over the visited wireless communication network. The wireless communication device communicates using the visited wireless network slice in the visited wireless communication network in response to receiving the slice indicator.
Systems and methods are provided for managing LTE fallback for wireless devices. The methods include monitoring the temperature of a wireless device and determining that the wireless device is using a network slice. The methods further include transmitting a notification from the wireless device indicating the temperature of the wireless device and indicating parameters for the network slice in response to the temperature of the wireless device rising to meet a first temperature threshold. The methods further include establishing an LTE session for the wireless device in accordance with a performance profile for the wireless device based, at least in part, on the parameters for the network slice.
Systems and methods for geolocation-based network slice allocations for dynamic edge computing resource management are provided. In some embodiments, a network function of an operator core network may orchestrate one or more service augmentation platforms on network edge servers based on identifying event(s) where UE use the telecommunications network to access cloud-based service from an edge server within a threshold proximity of the event(s). Orchestration of the service augmentation platform(s) may be based in part on determining a network service classification for the event(s) based on event data collected about the event(s). A network slice for accessing the service augmentation platforms may be granted to UE by the network function based in part on the UE geographic proximity to the location associated with the scheduled events. The network function may de-orchestrate the service augmentation platform based on the end of the event as indicated by the event data.
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
In emergency or search-and-rescue operations, user devices such as phones may transmit signals that indicate people may be located nearby. The signals can be detected by one or more rover devices, which can explore dangerous terrain for indications of people to be rescued. The user devices can activate an application that conserves battery power while emitting a signal, in some cases in a round robin configuration to further conserve power. The rover devices, or other devices that make contact with the user devices, can collect and manipulate data about the user devices to aid a rescue operation.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
A communication device includes a central processing unit (CPU); a non-transitory memory; and an RFID application stored on the non-transitory memory and comprising executable instructions that when executed by the CPU, cause the communication device to be configured to provide the communication device in an environment; receive a radio frequency (RF) signal from an RFID reader at a plurality of locations in the industrial environment, wherein the RF signal comprises a frequency in the cellular frequency range; determine a receive signal strength (RSS) of the RF signal at each of the plurality of locations; determine the RSS of the RF signal at each of the plurality of locations; and generate a map of an RFID read zone in the industrial environment based on the RSS of the RF signal at the plurality of locations.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
20.
CONTROL OF A WIRELESS COMMUNICATION DEVICE IN A VISITED WIRELESS COMMUNICATION NETWORK
A wireless device is controlled in a visited wireless network. A network database stores a prioritized network list for the visited wireless network. A network controller receives a request from the visited wireless network for the wireless device, and in response, retrieves the prioritized network list for the visited wireless network from the network database. The network controller transfers the prioritized network list to the wireless device over the visited wireless network. The network controller stores the prioritized network list for the visited wireless network in a controller memory. The network controller receives another request from the visited wireless network for the wireless device, and in response, retrieves the prioritized network list for the visited wireless network from the controller memory. The network controller transfers the prioritized network list to the wireless device over the visited wireless network. The wireless device wirelessly communicates based on the prioritized network list.
Embodiments of the present disclosure are directed to systems and methods for mitigating atmospheric ducting within a wireless telecommunication network. The methods include monitoring uplink frequency segments to establish a noise plus interference (N+I) baseline, comparing the average interference of initial uplink symbols against this baseline, and detecting a predetermined threshold of interference. Upon exceeding this threshold, the method entails a comprehensive monitoring of all uplink symbols to identify a downhill shape pattern indicative of ducting interference. Responsive to this detection, the system dynamically implements one or more mitigation techniques.
Systems, methods, and computer-readable media are described herein to which dynamically provide an optimized mechanism for switching uplink waveforms within a cellular network. An uplink profile generally indicates the number of transmission ports and what uplink waveform is used by a user device to transmit to a base station. Power headroom, channel conditions and signal to interference plus noise are used to modify the uplink profile. These input may be compared to upper and lower threshold values to provide the optimal conditions to switch from a Cyclic Prefix Orthogonal Frequency Division Multiplexing waveform to a Direct Fourier Transform Spread Orthogonal Frequency Division Multiplexing waveform.
H04W 52/14 - Separate analysis of uplink or downlink
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
23.
NEAR REAL-TIME NETWORK SERVICE DEPLOYMENT ACROSS DIFFERENT WIRELESS COMMUNICATION PROTOCOLS
Systems and methods are provided for causing a prospective provisioning, in near real-time, of various wireless communication protocol databases based on subscribers meeting particular criteria for respective wireless communication protocols. In operation, some aspects are directed to receiving an indication that a first provisioning client associated with a first subscriber has provisioned a first database to access a first service. In response to the receiving, these aspects include automatically read at least a second database to determine whether the second database has already been provisioned to access the first service. At least partially in response to determining that the second database has not already been provisioned to access the first service, these aspects automatically transmit a request to provision the second database such that at least the first subscriber can access the first service using a second wireless communication protocol and a first wireless communication protocol.
Methods provided herein include extending coverage for a group of devices. The method includes maintaining a default block error rate (BLER) target and lowering the default BLER target to an adjusted BLER target for a specific device type. The method further includes applying the adjusted BLER target to the specific device type, thereby extending coverage for the specific device type. The method further includes generating and transmitting new information elements to extend coverage and allow access for the specific type.
A system comprises a user communication device, a content management server, and a friction free download (FFD) proxy server. The user communication device is configured to send identification information of the user communication device; receive web content in a first web application; send an FFD installation request to the FFD proxy server; download the second web application; and install the second web application during an active session of the first web application. The content management server is configured to send the web content. The FFD proxy server is configured to register the content management server and the user communication device; receive the FFD installation request; authenticate the user communication device during the application session of the first web application; send the second proxy routing information; and send notification information indicating a status of the FFD installation of the second web application.
A wireless communication network serves wireless data services to wireless user devices. In the wireless communication network, communication circuitry receives a registration from a source Network Repository Function (NRF) for a registering Network Function (NF). The communication circuitry transfers the registration to processing circuitry. The processing circuitry determines when the source NRF has an excessive amount of the NF type. When the source NRF does not have the excessive amount of the NF type, the processing circuitry a registration approval to the communication circuitry. The communication circuitry transfers the registration approval to the source NRF. When the source NRF has an excessive amount of the NF type, the processing circuitry selects a target NRF based on the geolocation of the registering NF. The processing circuitry transfers a registration redirection that indicates the target NRF to the communication circuitry. The communication circuitry transfers the registration redirection to the source NRF.
A method of providing a communication service to a radio frequency identity (RFID) tag reader. The method comprises allocating network slice resources of a telecommunication network for the reader by a controller by sending a first message to a network slice selection function (NSSF) in the network, wherein the controller is an application that executes on a computer system in the network; providing a communication channel between the reader and an enterprise inventory control system via the allocated network slice resources; monitoring messages in the communication channel by the controller; analyzing the messages by the controller; determining by the controller a network slice resource need of the communication channel that differs from a current allocation of network slice resources based on the analyzing; and adapting the communication channel by the controller by sending messages to the NSSF to allocate different network slice resources associated with the communication channel.
H04W 48/18 - Selecting a network or a communication service
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
A quantum communication system for enabling secured communications between non-quantum equipped and quantum equipped devices comprises a non-quantum equipped network device configured to transmit a connection request, a quantum authentication server configured to verify a connection between the non-quantum equipped network device and a quantum network gateway, the quantum network gateway enabling communications between the non-quantum equipped network device and the quantum authentication server. The quantum network gateway includes at least one quantum processor, and a quantum application, which when executed by the quantum processor, cause the quantum application to receive, from the non-quantum equipped network device, a request to communicate with an application server, generate a quantum token, transmit the quantum token to the quantum authentication server for authentication of the communication request, and set up, a communication tunnel between the quantum network gateway and the application server for communicating on behalf of the non-quantum equipped network device.
A quality of experience QoE server associated with a home wireless communication service network. The QoE server comprises a QoE application that, when executed by the QoE server, receives an indication of a location of a user equipment (UE), wherein the UE is subscribed to receive wireless communication service with the home network and that the UE is in a roaming operation mode, searches a geo-location database using the indication of the location of the UE, based on searching the geo-location database, determines that the home network or a preferred network is located proximate to the indication of the location of the UE, and sends a request to the UE to perform a refresh operation, wherein the UE initiates a scan of cell site frequencies, detects a cell site associated with the home network or the preferred network, and attaches wirelessly to the cell site.
Various embodiments comprise a wireless access node to group component carriers for carrier aggregation. In some examples, the wireless access node comprises node circuitry and radio circuitry. The node circuitry selects primary and secondary cell candidates based on carrier aggregation capability, transmit power, and radio frequency measurements for a wireless user device. The node circuitry filters the cell candidates based on the bandwidth, loading, and data buffer status for the cell candidates. The node circuitry selects a primary cell and at least one secondary cell from the filtered cell candidates based on an operator defined rule, interference, and cell Key Performance Indicators (KPIs) for the selected primary cell and the at least one selected secondary cell. The radio circuitry wirelessly indicates the selected primary cell and the selected secondary cell(s) to the wireless user device to use for carrier aggregation.
Systems and methods for dynamic utilization-based network slice allocation management for user equipment applications are provided. In some embodiments, a slice estimation engine may be implemented to evaluate the network traffic and other application activity data associated with an application running on the UE to determine an operating mode of the application. The slice estimation engine may trigger the UE to request an adjustment to its network slice allocation configurations based on the evaluation. To determine whether or not an application should be reconfigured for a new network slice, the slice estimation engine may evaluate processes that are running on the UE. The slice estimation engine may comprise one or more slice assessment algorithms that determine which slice from a set of available network slices would optimally serve the application based on the network traffic characteristics associated with the application's current mode of operation.
In some examples, a method includes obtaining, by a file handling application, a file; automatically providing, by the file handling application, a notification of the upload of the file; automatically determining, by the file handling application, a rule set for applying to the file; handling, automatically by the file handling application and without human intervention, the file based on the rule set; interfacing, by the file handling application, with a project management application to automatically update a status of a project associated with the file based on actions taken by the file handling application; responsive to each interaction by the file handling application with the file, automatically logging, in a searchable database by the file handling application, each action taken by the file handling application with respect to the file to create an audit history for the file.
A wireless communication device. The wireless communication device comprises a radio transceiver; a first processor; a first non-transitory memory; and a subscriber identity module (SIM). The SIM comprises a second processor, a second non-transitory memory storing network keys that the radio transceiver uses to authenticate to a cell site, and an applet stored in the second non-transitory memory. When executed by the second processor, the applet sends a request to know where the wireless communication device is to the first processor, receives an answer from the first processor containing a cell global identifier (CGI) of a first cell site that the radio transceiver is attached to and containing a received signal strength of the first cell site, determines that the received signal strength of the first cell site is below a predefined threshold, and sends a refresh command to the first processor.
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
Systems and methods for dynamic utilization-based network slice allocation management for user equipment applications are provided. In some embodiments, a slice estimation engine may be implemented to evaluate the network traffic and other application activity data associated with an application running on the UE to determine an operating mode of the application. The slice estimation engine may trigger the UE to request an adjustment to its network slice allocation configurations based on the evaluation. To determine whether or not an application should be reconfigured for a new network slice, the slice estimation engine may evaluate processes that are running on the UE. The slice estimation engine may comprise one or more slice assessment algorithms that determine which slice from a set of available network slices would optimally serve the application based on the network traffic characteristics associated with the application's current mode of operation.
Systems, methods and devices are provided for improving network performance by performing optimizations to minimize inter-radio access technology (IRAT) transitions. A method includes tracking the IRAT transitions in conjunction with correlating variables, identifying excessive IRAT transitions meeting a threshold and performing an optimization based on the identification and the correlating variables.
An autonomous appliance configured to operate in a facility. The autonomous appliance includes a chassis including a motor configured to move the autonomous appliance within the facility and a radio frequency identification (RFID) tag reader configured to communicate with infrastructure RFID tags attached to fixed infrastructure and with product RFID tags attached to product containers. The RFID tag reader emits an RF signal that provides ambient RF power to the infrastructure RFID tags and the product RFID tags. The autonomous appliance includes at least one actuator configured to manipulate the product containers and a controller coupled to the RFID tag reader and configured to read information from the infrastructure RFID tags and the product RFID tags. The controller adapts the behavior of the autonomous appliance relative to a first product container based on the read information.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G05D 1/244 - Arrangements for determining position or orientation using passive navigation aids external to the vehicle, e.g. markers, reflectors or magnetic means
G05D 101/15 - Details of software or hardware architectures used for the control of position using artificial intelligence [AI] techniques using machine learning, e.g. neural networks
G05D 107/70 - Industrial sites, e.g. warehouses or factories
Systems, methods, and devices are provided for network slice prioritization for wireless devices during network overload conditions. Methods include receiving notification of network overload conditions and receiving notification of an attach request from a wireless device at unified data management (UDM). The UDM obtains a priority network slice for the wireless device from a unified data repository (UDR). The priority network slice for the wireless device is shared with one or more 5G core network functions, such as access and mobility function (AMF), session management function (SMF), short message service function (SMSF), and policy control function (PCF).
A method comprises obtaining signature data associated with a network element using a predictive model based on historical radio access data describing a prior incident at the network element in the radio access network, wherein the signature data indicates a pattern of the historical radio access data associated with the prior incident at the network element, inputting current radio access data into the predictive model to obtain a prediction output based on the signature data, wherein the prediction output indicates data regarding a predicted incident at the network element, a predefined time period in which the predicted incident is likely to occur, and a preventative resolution to the predicted incident, and generating a service report indicating at least one of the predicted incident at the network element, the predefined time period, or the preventative resolution.
Aspects herein provide for generating customized messaging to deliver accurate composite allocations for available telecommunication services of a user device. In aspects, middleware intelligently determines composite allocations for data, voice, and/or roaming, for example, by executing a summation instruction that combines corresponding parameter thresholds for a base service and one or more supplemental services. A message can be customized with the composite allocation and communicated to the user device with an accurate indication of available data, voice, and/or roaming services that are available. Subsequent messages can be similarly customized and communicated that include updated allocations and/or alerts, in aspects.
A video presentation device having an embedded cellular radio. The device comprises a processor, a non-transitory memory, a cellular radio antenna, a cellular radio transceiver, a display screen, and an application, stored in the non-transitory memory. When executed by the processor, the application sends a network attach request message via the cellular radio transceiver and the cellular radio antenna to a cell site to request a cellular radio communication link from the cell site, wherein the network attach request message comprises credentials from an electronic subscriber identity module (eSIM) stored in the non-transitory memory and wherein the eSIM is associated with a cellular communication service subscription account; after attaching to the cell site, sends a video content request to a video content source via the cellular radio transceiver and the cellular radio antenna; receives the requested video content; and presents the requested video content on the display screen.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04B 17/309 - Measuring or estimating channel quality parameters
H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
41.
NETWORK SLICE PRIORIZATION FOR IMS APPLICATION SERVERS
Systems, methods, and devices are provided for network slice prioritization for wireless devices during network overload conditions. Methods include receiving notification of network overload conditions and receiving notification of an attach request from a wireless device at home subscriber service (HSS). The HSS obtains a priority network slice for the wireless device from a unified data repository (UDR). The priority network slice for the wireless device is shared with one or more IMS application servers, such as interrogating call session control function (I-CSCF) serving call session control function (S-CSCF), and telephony application server (TAS).
Systems and methods are provided for dynamically managing service levels in a wireless network. Methods include receiving, by a UDM, from a UDR, existing service levels for one or more wireless devices. The methods further include receiving, by the UDM, from the UDR, UDSP rules for the one or more wireless devices. The methods further include applying the UDSP rules to the existing service levels to yield resultant service levels for the one or more wireless devices.
The technology described herein controls what a user hears while in a virtual reality environment. A user may be exposed to multiple audio sources while in the virtual reality environment. All of these competing audio sources need to be combined to produce the audio content output to the user. Further, various entities have an interest in the user hearing different audio content. The interest can be expressed through settings made available by the VR platform. The VR platform can provide user settings, landowner settings, and platform settings. The sound settings can change based on where the user's avatar is located in the VR environment. For example, when the user's avatar is located on virtual property owned by an entity other than the VR platform or user, then entities sound-preferences are considered along with the user's sound preferences, and VR platform's sound preferences.
Systems and methods are provided for preventing user equipment from communicating with non-approved third-party sites, such as simulators or IMSI catchers. Using criteria to determine whether signals are associated with approved sources, such as a base station, or non-approved sources, such as bad actors, embodiments are able to identify bad actors and prohibit attempted connections. User equipment (UE) can use a blacklist, or graylist, of sites to avoid, which conserves time and resources. Because a UE avoids third-party sites, the UE communicates with approved network devices and is able to successfully access emergency services.
Systems and methods are provided for authenticating account modifications in a wireless network. Methods include detecting a request to modify an account of an account holder, at an authentication portal. The methods further include transmitting a request to generate a one-time password (OTP) to an identity provider, wherein the request to generate the OTP includes a confirmation flag indicating that confirmation by the account holder is required before generating the OTP. The methods further include transmitting an SMS message to the account holder identifying the request to modify the account and requesting a positive confirmation from the account holder to authorize the requested account modification. The methods further include transmitting the OTP via SMS to the account holder upon receiving the positive confirmation from the account holder.
Methods and systems for restricting communication services over a network. The method includes detecting a Session Initiation Protocol (SIP) register message originating from a specific network Public Land Mobile Network (PLMN) that is included in a restricted PLMN list identified by a P-Access-Network-Information header (P-ANI). The method further includes implementing a policy to remove RCS and presence capability feature tags from a subsequent SIP register message. The lack of feature tags to Serving Call Session Control Function (S-CSCF) will prohibit triggering of Third Party Registration to different application servers.
The technology disclosed herein relates to beamforming muting. In embodiments, methods, systems, and computer storage media can transmit, via at least one antenna array using a listening mode for interference detection, a plurality of signals along a plurality of vectors of a coverage area. For example, the plurality of signals may be transmitted via an azimuth sweep from −90 to +90 degrees. Based on transmitting the plurality of signals, an interference above a predetermined threshold can be detected, the interference corresponding to a satellite earth station. Based on the interference, at least one beam of the antenna array can be identified for muting (e.g., based on a determined angle of arrival associated with the interference, based on the plurality of vectors used for the interference detection, based on an azimuth corresponding to the interference, etc.).
Systems and methods are provided for improving spectral efficiency in a wireless network. The methods include determining that one or more reduced capability devices are using a network slice. The methods further include determining that the spectral efficiency of the network slice has dropped below a spectral efficiency threshold. The methods further include reducing a radio resource partitioning ratio of the one or more reduced capability devices to non-reduced capability devices.
Methods, systems, and a non-transitory computer-readable medium that provide methods, systems, and computer-readable media that dynamically allocating network resources to devices in a network are provided. The method begins with determining an allocation of network resources to a user device accessing a service. The determining may be based on an anticipated quality of service (QoS) for the service. The anticipated QoS may be based on a user using the full capabilities of the service. The method then continues with dynamically re-allocating the allocation of network resources based on an actual use of the network resources for the service. The dynamic re-allocation of network resources may be based on an uplink message from the UE, wherein the uplink message contains information about the network resources being used for the call.
Technology is disclosed herein for a negotiation framework by which a wireless network can negotiate with another network to dynamically offload data traffic corresponding to a network slice hosted by the wireless network. In an implementation, the wireless network determines that data traffic of a network slice is to be offloaded from the wireless network to another network. The wireless network identifies a visited network to host the data traffic and makes an offer to the visited network based on a negotiation framework which includes parameters for an agreement to offload the data traffic. When the visited network accepts the offer, the wireless network offloads the data traffic from the wireless network to the visited network.
Systems and methods are provided for managing handover for reduced capability devices. The methods include determining that one or more available access nodes support reduced capability devices for a handover operation for a reduced capability device. The methods further include measuring a signal strength of the one or more available access node that support reduced capability devices. The methods further include selecting a target access node based in part on the signal strength of the one or more available access nodes that support reduced capability devices. The methods further include moving the reduced capability device to the target access node.
Systems and methods are provided to optimize antenna utilization for downlink signal transmission in wireless networks. The system includes a first antenna at a standard height for regular atmospheric conditions and a second antenna at a different elevation, activated in response to detected atmospheric ducting conditions. The method involves transmitting a downlink signal using the first antenna, monitoring for atmospheric conditions and signal degradation, and switching to the second antenna upon detecting ducting. A dynamic control unit oversees the transition between antennas, ensuring signal integrity and mitigating interference. This adaptive approach enhances network reliability and service quality by addressing the challenges posed by atmospheric variability, thereby improving the user experience in wireless communication networks.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04B 7/026 - Co-operative diversity, e.g. using fixed or mobile stations as relays
H04W 28/02 - Traffic management, e.g. flow control or congestion control
In a communication network, a User Equipment (UE) simultaneously executes a first user application and a second user application. In response to executing the first user application, the UE requests a first network slice using a first user identity, and the communication network authorizes the first network slice for the UE based on the first identity. In response to executing the second user application, the UE requests a second network slice using a second user identity, and the communication network authorizes the second network slice for the UE based on the second identity. The UE and the communication network exchange first user data for the first user application with the first network slice, and simultaneously, the UE and the communication network exchange second user data for the second user application with the second network slice.
H04W 36/28 - Reselection being triggered by specific parameters by agreed or negotiated communication parameters involving a plurality of connections, e.g. multi-call or multi-bearer connections
H04W 36/32 - Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
H04W 48/18 - Selecting a network or a communication service
Systems and methods are provided for managing network layers. Network providers often define their network with pre-defined network layer priorities depending on their spectrum holdings (e.g., bandwidth) and capability of devices. User device performance metrics are valuable data points that allow for intelligent traffic steering and network layer management based on device-specific performance related to specific network layers. Location session records (LSR) data provides detailed inputs for sessions for each user device in a network. This historical data can be utilized to identify performance issues on certain network layers for specific user devices and proactively steer the devices to other network layers to improve performance.
Systems and methods are provided for providing real-time virtual viewing content of a live event to a user equipment on a wireless communications network. Source information of the live event, which is processed on an edge computing device located within a threshold distance of the live event, is provided to a first user equipment. A second user equipment requesting to view the live event is identified, and the same source information that was provided to the first user equipment is provided to the second user equipment. Based on the same source information, the first user equipment is presented with a first virtual view at a first time that is different from a second virtual view presented to the second user equipment at the first time.
H04N 21/218 - Source of audio or video content, e.g. local disk arrays
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
56.
Privilege Isolation in Managed Communication Service
A managed communication service system to restrict communication in a network based on a privilege associated to a context of the communication to provide privilege isolation. The managed communication service system comprises a processor; a memory; and an application stored in the memory that, when executed by the processor, is configured to monitor network traffic associated with the managed communication service system, determine a context of the managed communication service system based on monitoring the network traffic associated with the managed communication service system, restrict a first communication session provided by the managed communication service system based on the context to a first combination of communication privilege parameters, and restrict a second communication session provided by the managed communication service system based on the context to a second combination of communication privilege parameters.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
Systems and methods are provided for automatic data channel switching on a failure for multi-SIM devices. Multi-SIM devices can include multiple SIM profiles associated with different telecommunications network carriers. When a data channel fails, features that require data are lost. Multi-SIM devices can include a first SIM profile that enables push-to-talk (PTT) functionality while a second SIM profile does not. Upon determining that the data channel associated with the first SIM profile fails, the second SIM profile can be utilized to attach to a different data channel associated with the second SIM profile such that data is provided to a device via the second SIM profile but the first SIM profile is still utilized to enable PTT functionality.
Various embodiments comprise a wireless communication network to perform slice-based security protocol selection for Internet Protocol Multimedia Subsystem (IMS). In some examples, the wireless communication network comprises a Call Session Control Function (CSCF). The CSCF receives an IMS registration request transferred by a wireless user device, generates an authorization request that includes an Address Value Pair (AVP) requesting a slice Identifier (ID) for the wireless user device, and transfers the authorization request to a network data system. The CSCF receives an authorization response from the network data system that includes the slice ID for the wireless user device. The CSCF selects a security protocol for authenticating the wireless user device based on the slice ID. The CSCF transfers an authentication challenge for delivery to the wireless user device and establishes a secure communication channel with the wireless user device using the selected security protocol.
A method comprises receiving, by a first virtual service (VS) application in a load balancer of the communication system, client packets from a client, receiving, by a second VS application in the load balancer, test packets from a tester obtaining, by the first VS application and the second VS application, a parameter from a data store communicatively coupled to the load balancer, determining, by the first VS application, a selected pool in the load balancer toward which to forward the client packets based on a first rule programmed at the first VS application and the parameter, and determining, by the second VS application, a test pool in the load balancer toward which to forward the test packets based on a second rule programmed at the second VS application and the parameter.
Systems and methods are provided for dynamically optimizing on demand coverage at one or more coverage locations. The system includes a plurality of coverage locations, a centralized location comprising a plurality of basebands and at least one controller, a plurality of fiber cables that extend from the centralized location to the coverage locations, and one or more processors. The one or more processors are configured to receive data that identifies the number of users needing coverage at a first coverage location during a first event. Based on determining whether the number of users needing coverage at the first coverage location of the plurality of coverage locations exceeds a predetermined capacity threshold for the first coverage location for the first event is determined, the system assigns at least one additional baseband to provide additional coverage to the first location.
Systems and methods are provided for selecting an antenna amplitude taper to transmit wireless signals to a coverage area from a base station. A first interference level at a victim cell is determined when using a first amplitude taper. A second interference level at a victim cell is determined when using a second amplitude taper. Based on determining that the second interference level is less than the first interference level, the second amplitude taper is selected to transmit the wireless signals to the coverage area form the set of antenna elements at the base station.
Aspects herein provide a system, media, and methods for/of an application that utilizes and leverages machine learning techniques, infrastructure information (e.g., existing and planned cell sites, lease agreement sites, fiber-optic networks, geographic landmarks), and collected telecommunication data, to accurately identify and determine specific solutions and specific locations for those solutions to be deployed in a geographic area. In embodiments, the application autonomously identifies an optimized specific solution type for various clusters of poor-service coverages areas within the geographic areas. The application also determines a precise location for deployment of each optimized specific solution type for each cluster.
Methods and systems for providing mobile broadband services to high speed rail are provided. The method begins with receiving, at an application programming interface (API) module on the network, a request from a user device. The request comprises a request payload that comprises a quality on demand (QoD) metric to be used in the NaaS operations. The QoD metric may be selected to provide for a desired level or service or operating quality that a developer wishes to provide. The request payload is then processed at the API module, wherein the processing determines if the network supports the QoD metric being requested. After processing, a response is transmitted from the API module to the user device, wherein the response comprises a response payload responsive to the QoD metric in the request payload.
Systems, methods, and computer-readable media herein modify the utilized communication protocol of one or more wireless base stations and/or UE devices based on signal quality information or data rate information associated with one or more UE devices. The signal quality information or data rate information of the UE devices can be analyzed by a base station and the base station can respond to changes in signal quality or data rate of the UE devices by modifying the configuration of one or more base stations and/or UE devices from a first communication protocol to a second communication protocol quality of transmissions between the UE devices and a base station.
A mobile communication device. The device comprises a processor, a non-transitory memory, a cellular radio transceiver, and an in-kind payment client application stored in the non-transitory memory. When executed by the processor, the client application initiates an in-kind payment from a first wireless communication service account that is associated with the mobile communication device to a second wireless communication service account associated with a second mobile communication device, sends a verification request message to the second mobile communication device, receives an in-kind payment verification response message from the second mobile communication device, where the response message comprises an indication of a location of the second mobile communication device and an indication of completion of an in-kind payment to the second wireless communication service account, and analyzes the indication of location of the second mobile communication device and the indication of completion of the in-kind payment.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
H04W 4/02 - Services making use of location information
Embodiments of the present disclosure relate to an adaptive data management system and methods for telecommunications networks. The system includes a method for receiving data packets and intelligently assigning them to service flows based on content type and network conditions. Different compression protocols are applied to the data packets according to their service flow. The system features a dynamic control unit configured to monitor network conditions and adjust data packet handling in real-time. This includes decompressing and re-compressing data packets to suit the current network environment and user equipment capabilities.
Embodiments of the present disclosure are directed to systems and methods for enhanced provision of push notifications in a wireless telecommunication network. In response to a push notification server providing a push notification to an external push notification service, the push notification server is provided with an indication whether the notification was delivered to a target UE or not. Using the feedback, the push notification server may carry out one or more mitigating procedures, such as instructing the target UE to refresh its push token or re-attempt delivery, if the notification was not delivered to the UE.
A radio-frequency identification (RFID) system includes RFID tags arranged in a plurality of separate rows, a RFID reader, and a computer system including a processor, a non-transitory computer readable medium, and one or more applications stored in the non-transitory computer readable medium. The one or more applications, when executed by the processor, initiate by the RFID reader a row scan, and modulate, using a beamforming control module, a configuration of a radiation beam. In addition, the one or more applications, when executed by the processor, modulate by a power control module an emission power of the reader antenna during the performance of the row scan, and detect by the RFID reader one or more of the RFID tags positioned along a row.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
69.
FREQUENCY SELECTIVE SURFACE FOR AN ACCESS POINT ANTENNA
Methods, apparatus, and a non-transitory computer readable media provide an access point antenna with an antenna radome comprising frequency selective surface elements. At least one first antenna element mounted on a first location of an antenna support structure and at least one second antenna element mounted on a second location of the antenna support structure. The antenna radome covers the access point antenna and comprises frequency selective surface components on an interior surface. The frequency selective surfaces comprise first and second frequency selective surface components that are responsive to filter unwanted radio frequency (RF) emissions that affect the first and second antenna elements. The frequency selective surfaces comprising the antenna radome may be selected based on the location and frequencies of other antennas operating near the access point antenna.
H01Q 15/00 - Devices for reflection, refraction, diffraction or polarisation of waves radiated from an antenna, e.g. quasi-optical devices
H01Q 1/42 - Housings not intimately mechanically associated with radiating elements, e.g. radome
H01Q 19/02 - Combinations of primary active antenna elements and units with secondary devices, e.g. with quasi-optical devices, for giving the antenna a desired directional characteristic Details
70.
DYNAMIC PRIORITIZATION OF MESSAGES ON THE CORE NETWORK INTERFACE
Embodiments of the present disclosure are directed to systems and methods for improved prioritization of messages exchanged within the core network. By providing priority markings customized based on the type of message being sent and/or the interface the message is sent on, a network may work more optimally in the event of network failure or reduced performance of the network.
Aspects herein capture methods, media, devices, and systems for communicating distress notifications over wireless networks. A tracking device can generate a distress notification that encodes a current location and sensor data over a wireless network, such as a satellite network, for routing to a cloud-based platform that may initiate further actions responsive to the distress notification. The tracking device can intelligently determine a quantity, a periodicity, and/or sensor data to include within various distress notification(s) based on the type of wireless network that is in-range, the power to be used by the tracking device when communicating distress notification(s) over that type of wireless network, the amount of power available and/or remaining in an integrated and/or accessory power supply of the tracking device, or any combination thereof.
Aspect herein capture methods, media, device, and systems that leverage real-time sensor data to trigger events, location tracking, and notification events using customizable configurations of a tracking device with various sensor(s).
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Aspect herein capture methods, media, device, and systems that leverage real-time sensor data to trigger events, location tracking, and notification events using customizable configurations of a tracking device with various sensor(s).
Methods for mitigating the effects of an atmospheric-based interference event on the propagation of a radio frequency (RF) signal are provided. A wireless communication network may determine that tropospheric ducting is occurring, causing radio frequencies to travel much further than anticipated. In response to the determination of tropospheric ducting interference (TDI), a user equipment (UE) connected a victim base station using standalone time domain duplexing (TDD) may be instructed to at least partially shift communications to using frequency domain duplexing (FDD). When TDI is reduced, the UE is notified the victim base station has been enabled to communicate using standalone TDD.
Various embodiments comprise a wireless communication network to inhibit network data system signaling overload. In some examples, the wireless communication network comprises primary Unified Data Registry (UDR) and secondary UDRs. The primary UDR node detects a fault condition for a secondary UDR. The primary UDR node blacklists the secondary UDR node for inter-UDR communications based on the fault condition and updates a network topology graph to remove the secondary UDR node. The primary UDR node transfers a command to another secondary UDR to blacklist the secondary UDR node and to update the network topology graph to remove the secondary UDR node. The other secondary UDR node receives the command, blacklists the secondary UDR node for inter-UDR communications, and updates the network topology graph to remove the secondary UDR node.
Systems and methods are provided for serving cell planning. Wireless high-speed internet (HSI) is becoming more popular as an alternative to traditional options due to convenience of installation, among other reasons. However, wireless HSI has some propagation challenges such as requiring a line-of-sight (LOS) with the serving cell as well as significant indoor penetration loss for radio signals operating at higher frequencies. Customer Premises Equipment (CPE) devices are developing that mitigate indoor propagation losses but, in order to be effective, it must be determined whether each application can maintain LOS with a serving cell. An installation tool that evaluates various network factors to advise on viability and installation of CPE and indicate an orientation to face the best serving cell would be a valuable tool to maximize effectiveness of the CPE.
Systems and methods are provided for authenticating applications in a wireless network. Methods include determining that an application uses IP authentication. The methods further include querying a policy server for information on an IP address of a client running the application, wherein the information includes a device type indicator for the IP address. The methods further include determining that the device type indicator indicates the IP address is assigned to a cellular home internet gateway. The methods further include transmitting a notification to the client running the application upon determining that the IP address is assigned to the cellular home internet gateway.
Systems and methods are provided for determining routes between geographic locations and estimating lengths thereof. When a set of geographic locations is too large to be accepted as input into drive-routing software, it is broken into smaller clusters using affinity propagation. When affinity propagation fails to yield desired results, the geographic locations are clustered using a combination of density-based and k-means clustering algorithms. The resulting clusters are provided as inputs to the drive-routing software. The routes between the clustered geographic locations are used to, for example, estimate a length of a utility needed to reach each of the geographic locations.
G06F 18/23213 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
Systems and methods are provided for selecting and dynamically adjusting beamforming techniques offered to and applied to one or more devices based on a type of the device. Specifically, a device that is determined to be stationary can utilize a different beamforming technique than a device that is determined to be mobile (i.e., not stationary). Based on the determinations of whether a device is stationary or mobile, a specific beamforming technique can be offered to that device. Further, devices that are located in a same location in the service area (e.g., both devices are located at cell edge, both are near cell, etc.) can utilize different beamforming techniques such that multiple beamforming techniques are employed in the same location.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
80.
DYNAMIC PRIORITIZATION OF MESSAGES ON THE CORE NETWORK INTERFACE
Embodiments of the present disclosure are directed to systems and methods for improved prioritization of messages exchanged within the core network. By providing priority markings customized based on the type of message being sent and/or the interface the message is sent on, a network may work more optimally in the event of network failure or reduced performance of the network.
Aspects herein capture methods, media, devices, and systems for communicating distress notifications over wireless networks. A tracking device can generate a distress notification that encodes a current location and sensor data over a wireless network, such as a satellite network, for routing to a cloud-based platform that may initiate further actions responsive to the distress notification. The tracking device can intelligently determine a quantity, a periodicity, and/or sensor data to include within various distress notification(s) based on the type of wireless network that is in-range, the power to be used by the tracking device when communicating distress notification(s) over that type of wireless network, the amount of power available and/or remaining in an integrated and/or accessory power supply of the tracking device, or any combination thereof.
H04W 4/029 - Location-based management or tracking services
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04M 1/72436 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
H04M 1/72421 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
82.
REMOTE ELECTRICAL TILT CHANGES IN A WIRELESS NETWORK
Validating RET changes in a wireless network includes receiving information associated with a RET change for use by at least one access node from a antennas in a geographic area, the RET change having at least one RET change not previously implemented in the wireless network, performing a configuration operation, in an audit mode, on the antennas to use the RET change based on a set of existing profiles for the antennas, determining if the configuration operation in the audit mode resulted in a validation error for one of the access nodes from the antennas, and performing a configuration operation, in a real time mode, on the antennas to use the RET change if it is determined that configuration operation in the audit mode did not result in a validation error.
H01Q 3/00 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system
H01Q 21/06 - Arrays of individually energised antenna units similarly polarised and spaced apart
A method for uplink layer selection includes determining a location of a multi-antenna wireless device and identifying a zone for the multi-antenna wireless device based on the location. The method further includes selecting an uplink transmission mode for each of the multiple antennas based on the identified zone
The technology disclosed herein relates to enhancing connectivity in remote locations. In embodiments, methods, systems, and computer storage media can map each of a plurality of backhauls (e.g., associated with multiple radio frequency front ends) to at least one network slice, wherein each network slice has a different link performance parameter. As one example, this mapping can provide for Time Division Duplex and Frequency Division Duplex multi-frequency, multi-layer carrier aggregation across various frequency bands (e.g., in the uplink direction). For example, various multiple link mapping (e.g., Internet Protocol layer mapping) and software functionality for transmitting particular data packets via the particular network slice based on the mapping are described herein.
H04B 7/04 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
H04W 76/15 - Setup of multiple wireless link connections
85.
PREVENTING, IDENTIFYING, AND RESOLVING CONFLICTING SESSION INFORMATION
Embodiments of the present disclosure are directed to systems and methods for improved identification and resolution of conflicting session information, such as when multiple session information entries are associated with a single session identifier. By communicating timestamps with the session information deposited in the NF component, the NF component may determine which session information is relevant to the request or which session information is stale and should be removed from its dataset.
H04L 67/146 - Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
H04L 61/4535 - Network directoriesName-to-address mapping using an address exchange platform which sets up a session between two nodes, e.g. rendezvous servers, session initiation protocols [SIP] registrars or H.323 gatekeepers
H04L 101/659 - Internet protocol version 6 [IPv6] addresses
86.
MOBILITY BASED SOUNDING REFERENCE SIGNAL PERIODICITY SELECTION
Methods provided herein include grouping wireless devices connected to an access node in a network into one of a mobile group and a stationary group when at least some of the wireless devices in the network utilize time division duplexing (TDD) and frequency division duplexing (FDD) carrier aggregation (CA) and further utilize sounding reference signal (SRS) antenna switching to send SRS to the access node from receiving antennas of the wireless devices. The method further includes adjusting a periodicity for receiving the SRS from the wireless devices belonging to the stationary group, causing the wireless devices in the stationary group to send the SRS to the access node less frequently than the wireless devices in the mobile group.
Systems and methods are provided for managing bandwidth while conserving battery in a wireless network. The methods include manipulating BWPs for the PCell and the one or more SCells based on the remaining battery life of the wireless device. With high remaining battery life, BWP sizes do not need to be restricted. With lower remaining battery life, the BWP sizes are restricted in an incremental way depending on the remaining battery life.
Systems and methods are provided for authenticating wireless devices in a wireless network. Methods include maintaining, by an authentication server, one or more mapping tables, wherein the one or more mapping tables map the one or more wireless devices to data management segments. The methods further include communicating, by the authentication server, directly with the data management segments indicated in the mapping tables corresponding to the one or more wireless devices to authenticate the one or more wireless devices.
Methods, systems, and a non-transitory computer-readable medium for context aware digital vision are provided. Often, digital capture of information is tedious and prone to errors. This is sometimes the result of an image capture device blindly scanning an image without any context to what the image is or how it will be used. Aspects herein provide utilizing contextual data provided from telecommunications network data to refine digital capture of information.
Embodiments of the present disclosure are directed to systems and methods for polarization division multiple access. A polarized antenna system having a plurality of differently-polarized antennas is envisioned for wirelessly communicating with a plurality of user devices in a wireless network environment. Each polarized pair of antenna elements, using a particular frequency, will transmit signals using a polarization-frequency pair and a base station will instruct user devices which polarization-frequency pair they should tune to for processing the appropriate downlink signal. Using OFDMA with a polarized antenna system increases capacity without the need for deploying additional base stations.
H01Q 21/24 - Combinations of antenna units polarised in different directions for transmitting or receiving circularly and elliptically polarised waves or waves linearly polarised in any direction
91.
pMAX CONTROL FOR 5G MULTICARRIER, MULTIBAND SYSTEM
Methods and systems are provided for controlling the maximum transmit power of a user equipment (UE) in a multi-band environment using dedicated signaling. In one embodiment, the system receives an indication of a frequency band in which a UE is transmitting, along with corresponding uplink signal data. Based on the received data, an adjusted power level for the UE is determined, where the adjustment is based on at least one criterion selected from an interference threshold, a regulatory transmission limit, or a maximum allowable path loss for the frequency band. Following the determination, dedicated signaling is communicated to the UE, instructing it to adjust its uplink transmission power accordingly.
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04W 52/24 - TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
92.
NON-3GPP INTEROPERABILITY NETWORK FUNCTION TO SUPPORT NETWORK OFFLOADING TO 3GPP NETWORKS
Systems and methods provide an active mechanism that compares performance of Wi-Fi connectivity provided by a fixed wireless access point to cellular connectivity to determine the best option for a particular UE, based on a particular usage, at a particular point in time. Initially, an indication is received from a fixed wireless access point that is experiencing congestion that a UE has connected to the fixed wireless access point. If congestion metrics of the fixed wireless access point are determined to be above a threshold, collocated cells or neighboring cells that are not experiencing congestion are detected. Next, instructions are provided for the UE to: disconnect from the fixed wireless access point and connect to an alternate cell of the collocated cells or neighboring cells; or deprioritize Wi-Fi for a given amount of time.
A method for coverage opportunity enhancement includes identifying a wireless device within a selected network coverage area for a cellular network based on information contained in a registration request from the wireless device. The method additionally includes accessing a database to correlate the information contained in the registration request with a mobile station international subscriber director number (MSISDN). The method additionally includes sending a push notification to the MSISDN of the wireless device, the push notification indicating coverage availability of the cellular network in the selected network coverage area.
A method of authorizing an IMS call in a foreign country for a wireless communication device that has a wireless communication subscription service with a US wireless communication service provider. The method comprises receiving a request to originate an IMS call by a HSS located in the US, wherein the request is received from a first wireless communication device located outside of the US and the request identifies a first country; determining by the HSS that international IMS roaming service is allowed by the wireless communication service provider in the first country; determining by the HSS that a first wireless communication subscription service associated with the first wireless communication device allows international IMS roaming service; and sending an authorization to originate the IMS call by the HSS to the first wireless communication device, whereby the first wireless communication device is enabled to originate the IMS call in the first country.
Systems and methods for modifying quality of service (QoS) flow for devices having particular device types based on cell congestion are provided. It is determined that a congestion level of a cell associated with a node exceeds a predetermined threshold, where the cell is providing communication to at least a first device having a first device type and a second device having a second device type. Prior to transmitting a packet to a component of a wireless communications network, a header associated with the packet is modified to include an indication that the congestion level of the cell exceeds the predetermined threshold. Based on the indication that the congestion level of the cell exceeds the predetermined threshold, a QoS flow is modified for devices having the first device type but not for devices having the second device type.
Methods for mitigating the effects of an atmospheric-based interference event on the propagation of a radio frequency (RF) signal are provided. A wireless communication network may determine that tropospheric ducting is occurring, causing radio frequencies to travel much further than anticipated. In response to the determination of tropospheric ducting interference (TDI), the idle mode cell re-selection priority is adjusted to give frequency domain duplexing (FDD) priority for affected cells. When TDI is reduced, the idle mode cell re-selection priority is switched back to time domain duplexing (TDD).
Systems and methods are provided for managing bandwidth in a wireless network. The methods include monitoring a capacity usage of an uplink control channel. The methods further include lowering a bandwidth part (BWP) in one or more secondary carriers for users if the capacity usage is still above the threshold, and then downgrading a carrier aggregation level for the users if the usage capacity is still above the threshold. This process may be performed on roaming and high bandwidth users first before proceeding to regular home network users if the usage capacity of the uplink control channel is still above the threshold.
Methods, media, and systems are provided for automated delivery schedules for telecommunication networks associated with a particular provider. The methods, media, and systems identify telecommunication networks corresponding to the provider. Additionally, location data for each of the telecommunication networks is received. The location data may be associated with one or more IP addresses for each telecommunication network. Servers or server clusters are identified along with associated location data for the servers or server clusters. The servers or server clusters are also associated with the provider. The location data for each of the telecommunication networks and the location data for each of the servers or server clusters are mapped. A distance between at least one of the telecommunication networks and at least one of the servers or server clusters is determined. Based on the distance determined, a telecommunication network is assigned a delivery schedule.
In some examples, a wireless communication system comprises a user device and network elements. The user device generates user data. The user device wirelessly receives a satellite signal from a satellite. The user device determines satellite signal metrics for the satellite signal. The user device wirelessly transfers the user data and the satellite signal metrics to the network elements. The network elements determine known satellite metrics for the satellite. The network elements compare the satellite signal metrics to the known satellite metrics. The network elements to attest to the user data based on the comparison.
Embodiments of the present disclosure are directed to systems and methods for remote deauthentication of electronic devices. A virtual authentication session manager or an electronic device maintains authentication across multiple electronic devices. The virtual authentication session manager receives authentication requests from electronic devices and generates a unique ID and a readable name for each device. A user can remotely deauthenticate any of the electronic devices that have previously been authenticated.