Patent classifications
H04L69/24
METHOD AND APPARATUS FOR IDENTIFYING IN-CALL CAPABILITY FEATURES
A method and apparatus are provided for identifying In-Call capability features. The method includes sending, by a Mobile Originated(MO), a call request message to a Mobile Terminated(MT), wherein the call request message comprises information regarding In-Call capability features of the MO; receiving, by the MO, a call response message from the MT, wherein the call response message comprises information regarding In-Call capability features of the MT; and performing, by the MO, In-Call capability negotiation with the MT.
METHOD AND APPARATUS FOR IDENTIFYING IN-CALL CAPABILITY FEATURES
A method and apparatus are provided for identifying In-Call capability features. The method includes sending, by a Mobile Originated(MO), a call request message to a Mobile Terminated(MT), wherein the call request message comprises information regarding In-Call capability features of the MO; receiving, by the MO, a call response message from the MT, wherein the call response message comprises information regarding In-Call capability features of the MT; and performing, by the MO, In-Call capability negotiation with the MT.
DYNAMICALLY ROUTING CODE FOR EXECUTING
Code may be dynamically routed to computing resources for execution. Code may be received for execution on behalf of a client. Execution criteria for the code may be determined and computing resources that satisfy the execution criteria may be identified. The identified computing resources may then be procured for executing the code and then the code may be routed to the procured computing resources for execution. Permissions or authorization to execute the code may be shared to ensure that computing resources executing the code have the same permissions or authorization when executing the code.
Reducing memory footprint after TLS connection establishment
For connection establishment, a system allocates memory that will be occupied by the data and handshake sub-protocol infrastructure that facilitates establishing a TLS connection. After connection establishment, the system allocates memory space for the data and record sub-protocol infrastructure that facilitates the asynchronous communication of application traffic. The memory space for the TLS session (i.e., the communication information separate from the handshake) has a substantially smaller footprint than the memory space for the TLS handshake. The TLS handshake memory space can be released and recycled for other connections while application communications use the smaller memory space allocated and populated with the TLS session data and infrastructure.
Multimedia Priority Service for Wireless Devices
A method may include receiving, by a wireless device from an access and mobility management function (AMF), a registration accept message comprising one or more configuration parameters of the wireless device. The method may also include receiving, by the wireless device from the AMF, a wireless device configuration update command that includes a parameter for a multimedia priority service (MPS) configuration of the wireless device. The method may further include sending, by the wireless device to the AMF, a packet data unit (PDU) session establishment request after receiving the parameter for the MPS configuration of the wireless device.
Multimedia Priority Service for Wireless Devices
A method may include receiving, by a wireless device from an access and mobility management function (AMF), a registration accept message comprising one or more configuration parameters of the wireless device. The method may also include receiving, by the wireless device from the AMF, a wireless device configuration update command that includes a parameter for a multimedia priority service (MPS) configuration of the wireless device. The method may further include sending, by the wireless device to the AMF, a packet data unit (PDU) session establishment request after receiving the parameter for the MPS configuration of the wireless device.
Indication of error vector magnitude capability
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first device may generate an indication of an error vector magnitude (EVM) capability of the first device, where the first device is configured to transmit a positioning reference signal. The first device may transmit the indication to a second device. Numerous other aspects are described.
Indication of error vector magnitude capability
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first device may generate an indication of an error vector magnitude (EVM) capability of the first device, where the first device is configured to transmit a positioning reference signal. The first device may transmit the indication to a second device. Numerous other aspects are described.
Configuring a protocol in a virtual private network
A method for configuring a protocol in a virtual private network (VPN) service environment, the method including receiving, from a user device, device information associated with operation of the user device during an established VPN connection; determining, based at least in part on the device information, a given VPN protocol from among a plurality of VPN protocols for utilization during the established VPN connection; and transmitting, to the user device, information associated with the given VPN protocol to enable the user device and a VPN server to utilize the given VPN protocol during the established VPN connection. Various other aspects are contemplated.
Configuring a protocol in a virtual private network
A method for configuring a protocol in a virtual private network (VPN) service environment, the method including receiving, from a user device, device information associated with operation of the user device during an established VPN connection; determining, based at least in part on the device information, a given VPN protocol from among a plurality of VPN protocols for utilization during the established VPN connection; and transmitting, to the user device, information associated with the given VPN protocol to enable the user device and a VPN server to utilize the given VPN protocol during the established VPN connection. Various other aspects are contemplated.