H04W84/005

Bearer modification for V2X Communications

A vehicle to everything application function (V2X AF) transmits a DIAMETER AA-request command to a policy and charging rule function (PCRF). The DIAMETER AA-request command comprises: an attribute value pairs (AVP) identifying a V2X application, and one of more quality of service (QoS) parameters. The one of more quality of service (QoS) parameters indicate a QoS of a V2X bearer for the V2X application employed by a wireless device. The PCRF decides one or more policy and charging control (PCC) provisions for the QoS provided for the V2X application identified by the AVP. The PCRF transmits a DIAMETER command to a policy charging enforcement function (PCEF). The DIAMETER command comprises the one or more PCC provisions for the QoS. The PCEF enforces the one or more PCC provisions for the QoS on a plurality of packets transmitted via the V2X bearer to the wireless device.

CONTEXT PREPARATION FOR CONSECUTIVE CONDITIONAL HANDOVERS
20220053399 · 2022-02-17 ·

A method includes determining, by a source base station, based on at least one of a measurement report received from a terminal device and a mobility trajectory of the terminal device, a prepared cell list that includes a set of cells where the terminal device is capable of handover. The method includes sending at least one required context for the handover to the set of cells in the prepared cell list. The method also includes receiving acknowledgement from the set of cells. The method further includes sending a handover complete message, which contains the prepared cell list, to the terminal device, wherein the prepared cell list provides a capability for the terminal device to make a number of handovers when the terminal device is within a coverage area of the set of cells.

RESOURCE HANDLING FOR NR V2X BASED ON SPLIT OF CU-DU
20220053478 · 2022-02-17 ·

A method and apparatus for resource handling for new radio (NR) vehicle-to-everything (V2X) based on split of central unit (CU) and distributed unit (DU) is provided. A dedicated signaling based resource allocation and a broadcast signaling based resource allocation can be provided. A gNB-CU and/or gNB-DU allocates a V2X resource based on a type of the wireless device.

Drone Base Station Companion
20170288768 · 2017-10-05 ·

Use of a drone base station companion increases diversity gain in a communications system to reduce error rates and the probability of the need for a retransmission due to channel fading. An apparatus includes a drone base station companion configured as a relay between a base station in a first cell and wireless user equipment in the first cell. The drone base station companion includes a wireless receiver path configured to receive a wireless communication including data from the base station. The drone base station companion includes a wireless transmitter path configured to transmit the data to the wireless user equipment. The drone base station companion may include a second wireless receiver path configured to receive a second wireless communication including the data from the wireless user equipment. The drone base station companion may include a second wireless transmitter path configured to transmit the second data to the base station.

Cooperative Automated Vehicle System

A cooperative-vehicle system suitable to operate an automated vehicle in a courteous or cooperative manner includes an object-detector and a controller. The object-detector is used by the host-vehicle to detect an other-vehicle attempting to enter a travel-lane traveled by the host-vehicle. The controller is in communication with the object-detector. The controller is configured to control motion of the host-vehicle. The controller is also configured to adjust a present-vector of the host-vehicle to allow the other-vehicle to enter the travel-lane. The decision to take some action to allow the other vehicle to enter the travel-lane may be further based on secondary considerations such as how long the other-vehicle has waited, a classification of the other-vehicle (e.g. an ambulance), an assessment of how any action by the host-vehicle would affect nearby vehicles, the intent of the other-vehicle, and/or a measure traffic-density proximate to the host-vehicle.

METHOD AND NETWORK NODE FOR TRANSMITTING IP ADDRESS INFORMATION, AND METHOD AND USER EQUIPMENT FOR RECEIVING IP ADDRESS INFORMATION
20170289098 · 2017-10-05 · ·

Provided is a method for making it impossible to track a vehicle performing vehicle-to-everything (V2X) communication through a network. The network may allocate the same IP address to all UEs performing V2X communication. Since the UEs performing V2X communication transmit data using the same IP address, an application server cannot track a vehicle transmitting corresponding data.

SYNCHRONIZATION FOR VEHICLE (V2X) COMMUNICATIONS
20170289934 · 2017-10-05 ·

A wireless terminal comprises sidelink controlling circuitry and transmitting circuitry. The sidelink controlling circuitry is configured to select a reference source. The transmitting circuitry is configured to transmit sidelink synchronization signal (SLSS) based on the reference source. In a case that a timing reference is Global Navigation Satellite System (GNSS) and the GNSS is reliable according to a comparison with a threshold value, the sidelink controlling circuitry is configured to select GNSS as the reference source.

METHOD AND APPARATUS FOR V2X COMMUNICATION IN NEXT GENERATION MOBILE COMMUNICATION SYSTEM

The present disclosure relates to a communication technique and a system for integrating IoT technology with a 5G communication system which supports a higher data transfer rate than does a 4G system. The present disclosure can be applied to intelligent services (for example, smart homes, smart buildings, smart cities, smart cars or connected cars, health care, digital education, retail businesses, security and safety related services, etc.) on the basis of 5G communication technology and IoT-related technology. According to the present disclosure, a method and a UE for performing same, a base station communicating with the UE, and a method performed by the base station can be provided, the method comprising the steps of: transmitting sidelink UE information including information related to new radio (NR) sidelink communication to the base station; receiving an RRC message including configuration information related to the NR sidelink communication from the base station; and performing the sidelink communication on the basis of the configuration information related to the sidelink communication, wherein the configuration information includes a list of sidelink grant configuration information for each bandwidth part (BWP), the list of the sidelink grant configuration information includes at least one sidelink grant information, and the sidelink grant information includes a sidelink grant information identifier, the number of hybrid automatic repeat request (HARQ) processes, sidelink time resource information, or sidelink frequency resource information.

Localization using converged platforms

In one aspect of the invention, a method for determining the location of a device is described. The method involves using one or more signal emitting platforms, which are capable of performing a wide variety of operations. In some embodiments, for example, the signal emitting platform is capable of physical movement. Various embodiments relate to signal emitting platforms, devices, systems, servers, computer code, methods and techniques for determining the location of a device.

System and Method for Mobile Identity Protection for Online User Authentication

An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g. BLUETOOTH or Wi-Fi) or long-range wireless interfaces (e.g. cellular or WiMAX) to detect the presence or location of the wireless device and it's proximity to the secure system to be accessed. The wireless device incorporates a unique identifier and secure authentication key information associated with the user of the wireless device. An authentication result is generated and may be used for a variety of applications. The application may process the result and determine the degree of access for which the entity or individual is allowed.