T-Mobile Innovations LLC

United States of America

Back to Profile

1-9 of 9 for T-Mobile Innovations LLC Sort by
Query
Patent
Canada - CIPO
Aggregations Reset Report
Date
2021 2
2020 3
Before 2020 4
IPC Class
G06F 21/44 - Program or device authentication 2
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 2
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 2
H04W 88/08 - Access point devices 2
G06F 21/60 - Protecting data 1
See more
Found results for  patents

1.

WIRELESS COMMUNICATION SERVICE DELIVERY OVER CO-LOCATED GATEWAY USER PLANES

      
Document Number 03155872
Status In Force
Filing Date 2020-10-16
Open to Public Date 2021-05-20
Grant Date 2022-10-18
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Bertz, Lyle T.
  • Waters, Brian David

Abstract

In a wireless communication network (100, 1000), a Gateway Control Plane (GW-C) (140, 640, 641, 642, 940) receives a session request for a User Equipment (UE) (101, 102, 103, 601, 1001) from an Access Point (AP) (111, 112, 113, 611, 1011, 1012) that serves the UE. The GW-C transfers a DNS request having an AP ID and network data. A Domain Name System (DNS) (150, 650, 651) translates the AP ID and the network data into an AGW-U ID and an EGW-U ID for co-located GW-Us. The GW-C receives a DNS response and transfers GW control signals using the AGW-U ID and the EGW-U ID. The co-located AGW-U (121, 122, 123) and EGW-U (131, 132, 133) serve the UE responsive to the control signals. In some examples, the selected AGW-U and EGW-U are co-located at the network edge near the AP

IPC Classes  ?

  • H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
  • H04W 88/16 - Gateway arrangements

2.

WIRELESS NETWORK ACCESS TO WIRELESS NETWORK SLICES OVER A COMMON RADIO CHANNEL

      
Document Number 03154173
Status In Force
Filing Date 2020-10-14
Open to Public Date 2021-05-06
Grant Date 2023-03-14
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Mansour, Nagi A.
  • Ozozlu, Akin
  • Alam, Noman Muzaffar
  • Cvetojevic, Sreten

Abstract

A wireless access node (110, 310, 610) serves wireless user devices (101, 301, 601, 602, 603) with different services over a common radio channel (130, 330, 630). The different services are supported by different wireless network slices (121, 122, 123, 124, 521, 522, 523, 524, 621, 622, 623). The wireless access node determines service subchannels (131, 132, 133, 134) in the radio channel based on location and time. The wireless access node schedules resource blocks from the subchannels for their corresponding services. If a subchannel for one service is full, then the wireless access node schedules the remaining data for the service in the unscheduled resource blocks of the other subchannels if any. The wireless access node wirelessly exchanges data for the services with the wireless user devices over the scheduled resource blocks in the subchannels of the radio channel. The wireless access node exchanges the data with the wireless network slices that support the services.

IPC Classes  ?

3.

WIRELESS ACCESS POINT ASSISTANCE TO WIRELESS USER DEVICES FOR WIRELESS COMMUNICATION NETWORK SELECTION

      
Document Number 03137467
Status In Force
Filing Date 2020-05-14
Open to Public Date 2020-11-19
Grant Date 2022-09-27
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Cai, Zheng
  • Fang, Zheng
  • Wang, Yu

Abstract

A wireless access point (110, 510) assists wireless user devices (100, 400) when the user devices select wireless communication networks. In the wireless access point (110, 510), a baseband unit (112, 512) generates a broadcast block that comprises a cell identifier for the wireless access point (110, 510), wireless communication network identifiers, and network selection information that individually characterizes the wireless communication networks. The network selection information may comprise individualized access parameters for different Land Mobile Networks (PLMNs). In the wireless access point (110, 510), a radio transceiver (111, 511) wirelessly broadcasts the broadcast block to the wireless user devices (100, 400). The wireless user devices (100, 400) receive the broadcast block and select their wireless communication networks based on the network selection information in the broadcast block. The radio transceiver (111, 511) wirelessly receives user signaling from the wireless user devices (100, 400) that indicates their selected wireless communication networks. The baseband unit (112, 512) transfers network signaling that indicates the selected wireless communication networks for the wireless user devices (100, 400).

IPC Classes  ?

  • H04W 48/12 - Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel

4.

WIRELESS MEDIA CONFERENCING

      
Document Number 03122283
Status In Force
Filing Date 2019-12-17
Open to Public Date 2020-06-25
Grant Date 2023-08-22
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Raghunathan, Sathyanarayanan
  • Sekar, Muthukumaraswamy
  • Vijayakumar, Maheswaran
  • Majjara, Suresh

Abstract

A wireless network (110, 310, 314) transfers UE information to an authorization server (120, 320). The authorization server (120, 320) generates an expected result based on a random number and secret key in response to the UE information. The authorization server (120, 320) transfers the expected result and the random number to the wireless network (110, 310, 314) which transfers the random number to the UE (101, 301). The wireless network (110, 310, 314) receives an authentication result from the UE (101, 301) and authenticates the UE (101, 301) by matching the authentication result to the expected result. In response to network authentication, the wireless network (110, 310, 314) transfers the expected result to a conferencing server (130, 330). The conferencing server (130, 330) receives the authentication result from the UE (101, 301) and registers the UE (101, 301) by matching the authentication result to the expected result. The conferencing server (130, 330) establishes media conferences for the UE (101, 301). The wireless network (110, 310, 314) exchanges media for the UE (101, 301). Advantageously, the wireless network (110, 310, 314) efficiently eliminates redundant authentication tasks from the authorization server (120, 320) and conferencing server (130, 330).

IPC Classes  ?

  • G06F 21/44 - Program or device authentication
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
  • H04L 65/1016 - IP multimedia subsystem [IMS]
  • H04L 65/1073 - Registration or de-registration
  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
  • H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
  • H04W 12/06 - Authentication

5.

CONTROL OVER MULTIPLE USER MULTIPLE INPUT MULTIPLE OUTPUT (MU-MIMO) BY DEVICE TYPE AND LOCATION

      
Document Number 03116927
Status In Force
Filing Date 2019-11-19
Open to Public Date 2020-05-28
Grant Date 2021-08-03
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Marupaduga, Sreekar
  • Narendran, Rajveen

Abstract

A wireless communication network (100) enhances Multiple Input Multiple Output (MIMO) for wireless user devices (501) that have multiple device types. The wireless communication network (100) has wireless access points (111-112, 311) that store MIMO geofences for the device types. The wireless access points(lll-112, 311) select MIMO geofences for the wireless user devices (501) based on the device types. The wireless access points( 111-112,311) exchange Single User (SU) MIMO signals and Multiple User (MU) MIMO signals with the wireless user devices (501) based on the selected MIMO geofences and device locations. The wireless access points(lll-112, 311) transfer MIMO information characterizing the exchange of the MU-MIMO signals and the SU-MIMO signals. A MIMO control system (120, 420) processes the MIMO information to determine geofence modifications based on MU-MIMO gains and SU-MIMO gains for the device types at the device locations. The MIMO control system (120, 420) transfers the geofence modifications to the wireless access points (111-112, 311). The wireless access points( 111-112, 311) update their MIMO geofences based on the geofence modifications.

IPC Classes  ?

  • H04B 7/0452 - Multi-user MIMO systems
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

6.

DYNAMIC WIRELESS NETWORK ARCHITECTURE TO SERVE UPLINK-CENTRIC AND DOWNLINK-CENTRIC USER APPLICATIONS

      
Document Number 03090423
Status In Force
Filing Date 2019-03-14
Open to Public Date 2019-09-19
Grant Date 2022-03-15
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Cai, Zheng
  • Fang, Zheng
  • Kazeminejad, Saied
  • Wang, Yu

Abstract

In a wireless network (100), a Distributed Unit (DU) (111) receives Uplink (UL) data from User Equipment (UE) (101) and a Central Unit (CU) (112) receives Downlink (DL) data for the UE (101). When DL-centric applications (314, 514) in the UE (101) use the DL, the CU (112) executes most radio protocols for the network applications (514) and the DU (111) executes a few radio protocols for the network applications (314). When the DL-centric applications (314, 514) use the UL, the DU (111) executes the radio protocols for the network applications (314, 514) and the CU (112) transfers the UL data to the core (113). When UL-centric applications (514) in the UE (101) use the DL, the CU (112) routes the DL data to the DU (111), and the DU (111) executes the radio protocols for the network applications (314, 514). When the UL-centric applications (314, 514) use the UL, the DU (111) executes a few radio protocols for the network applications (314) and the CU (112) executes most radio protocols for the network applications (514) to route the data to the core (113). Advantageously, the DU (111) and the CU (112) are optimized to process UL/ DL data for a user application (314, 514) based on whether the user application (314, 514) is UL-centric or DL-centric.

IPC Classes  ?

7.

MULTI-ANTENNA CONTROL IN WIRELESS USER DEVICES

      
Document Number 03081580
Status In Force
Filing Date 2018-11-14
Open to Public Date 2019-06-27
Grant Date 2020-10-06
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Ozozlu, Akin
  • Mansour, Nagi A.
  • Hart, Kevin Almon
  • Alam, Noman Muzaffar

Abstract

A battery-powered wireless communication device (110, 411, 511) has internal antennas (601-609, 701-702). In the wireless communication device (110, 411, 511), transceiver circuitry (111, 402, 502-503, 600) wirelessly receives external antenna data that indicates on/off status, reserve battery power, and geometric earth-orientation for the individual antennas in a different wireless communication device (120). Baseband circuitry (112, 401, 501) determines internal antenna data that indicates the on/off status, reserve battery power, and geometric earth-orientation for the internal antennas (601-609, 701-702). The baseband circuitry (112, 401, 501) executes a user application that generates and consumes user data. The baseband circuitry (112, 401, 501) selects a set of the internal antennas (601-609, 701-702) to serve the user application based on the internal antenna data and the external antenna data. The transceiver circuitry (111, 402, 502-503, 600) wirelessly exchanges the user data over the selected set of the internal antennas (601-609, 701-702).

IPC Classes  ?

  • H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
  • H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
  • H04W 52/02 - Power saving arrangements
  • H04W 92/18 - Interfaces between hierarchically similar devices between terminal devices

8.

HARDWARE-TRUSTED WIRELESS DATA COMMUNICATIONS OVER A WIRELESS RELAY

      
Document Number 03056258
Status In Force
Filing Date 2018-04-06
Open to Public Date 2018-10-18
Grant Date 2019-12-31
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Paczkowski, Lyle Walter
  • Schnellbacher, George Jason

Abstract

A wireless relay (110, 310, 400, 510, 600) serves User Equipment (UE) (101) with hardware- trusted wireless data communications over Institute of Electrical and Electronics Engineers (IEEE) 802.11 links (121, 321, 323) and Long Term Evolution (LTE) links (121, 322, 324). The wireless relay maintains hardware-trusted wireless backhaul links (122, 325, 326) to a data network (120). The wireless relay (110, 310, 400, 510, 600) broadcasts an IEEE 802.11 Service Set Identifier (SSID) (131, 321, 323) and a Long Term Evolution (LTE) Network Identifier (NID) (131, 322, 324). The UE wirelessly transfers a hardware-trusted attachment request (132, 321, 322) using the 802.11 SSID or the LTE NID. The wireless relay (110, 310, 400, 510, 600) validates hardware-trust of the UE (101), and in response, establishes a hardware-trusted attachment of the UE (101). The wireless relay (110, 310, 400, 510, 600) exchanges user data with the UE (101) using hardware-trusted circuitry (401-402, 601-602). The wireless relay (110, 310, 400, 510, 600) exchanges the user data over hardware-trusted wireless backhaul links (122, 325, 326).

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 12/46 - Interconnection of networks
  • H04W 76/11 - Allocation or use of connection identifiers

9.

HARDWARE TRUSTED DATA COMMUNICATIONS OVER SYSTEM-ON-CHIP (SOC) ARCHITECTURES

      
Document Number 03052055
Status In Force
Filing Date 2018-03-06
Open to Public Date 2018-10-04
Grant Date 2020-11-03
Owner T-MOBILE INNOVATIONS LLC (USA)
Inventor
  • Marquardt, Ronald R.
  • Paczkowski, Lyle Walter
  • Rajagopal, Arun

Abstract

A System-On-Chip (SOC) (100, 700, 1000) exchanges hardware trusted data communications. A Central Processing Unit (CPU) (101, 702, 1003) executes an internal application (1, 731, 812, 1010). A transceiver (111, 711, 1021-1024) receives a data message from an external data application (3, 732, 811) for the internal data application (1, 731, 812, 1010). The message has encrypted user data and an encrypted hardware trust certificate for the external data application (3, 732, 811). The transceiver (112, 711, 1021-1024) decrypts the hardware trust certificate for the external data application (3, 732) and transfers the decrypted hardware trust certificate to a SOC kernel in a CPU (103, 701, 1003). The transceiver (112, 711, 1021-1024) decrypts the user data. The SOC kernel validates the decrypted hardware trust certificate for the external data application (3, 732, 811) and notifies the transceiver (112, 711, 1021-1024). The transceiver (112, 711, 1021-1024) transfers the decrypted user data to the CPU (101, 702, 1003) for delivery to the internal data application (1, 731, 812, 1010) responsive to the notification from the SOC kernel.

IPC Classes  ?

  • G06F 21/44 - Program or device authentication
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/60 - Protecting data
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system