Patent classifications
H04W88/12
System and Method for Implementing Network Experience Shifting
Novel tools and techniques are provided for implementing network experience shifting, and, in particular embodiments, using either a roaming or portable hypervisor associated with a user or a local hypervisor unassociated with the user. In some embodiments, a network node in a first network might receive, via a first network access device in a second network, a request from a user device to establish roaming network access, and might authenticate a user associated with the user device, the user being unassociated with the first network access device. Based on a determination that the user is authorized to access data, content, profiles, and/or software applications that are accessible via a second network access device, the network node might establish a secure private connection through a hypervisor or container communicatively coupled to the first network access device to provide the user with access to her data, content, profiles, and/or software applications.
WIRELESS ACCESS POINT MANAGING APPARATUS
A wireless access point managing apparatus that includes a radio, and wireless communication control circuitry that communicates information via the radio between the wireless access point managing apparatus and one or more electronic devices so as to provide a wireless access point to a network for the electronic devices. Processing circuitry performs access point management including: communicating with a separate apparatus that provides another wireless access point to the network; performing a determination as to whether shutdown of the wireless access point of the separate apparatus is appropriate; and sending a shutdown instruction to the separate apparatus if shutdown is determined to be appropriate, the shutdown instruction being an instruction to cause the separate apparatus to shut down a wireless access point radio in the separate apparatus.
WIRELESS ACCESS POINT MANAGING APPARATUS
A wireless access point managing apparatus for achieving power savings by turning off access points that are not providing the high signal quality. The wireless access point determines whether a first signal quality level is at or above a threshold level, and if so, sends a power-up signal to a second access point, and determines whether the first signal quality level is higher or lower than a second quality level, i.e., the level from the second access point, transfers a streaming session to the second access point if the first signal quality level is lower than second signal quality level. If the first signal quality level is higher than the second signal quality level, the apparatus sends a power-down signal to the second access point.
Access Control Apparatus, System, and Method
Embodiments of the present invention relate to the communications field, and provide an access control apparatus, system, and method. The method includes: receiving a first service chain forwarding rule sent by a controller; receiving a first packet sent by a classifier; and when a service chain identifier carried in the first packet matches a first service chain identifier in the first service chain forwarding rule, forwarding the first packet to a first access network element according to a first identifier.
Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
DEVICE BLOCKING TOOL
A wireless device blocking tool includes a user interface, a location engine, and a connection engine. The user interface receives at least one of a MAC address and an IP address of a device. The location engine communicates a query to an access control server, receives a response from the access control server, and determines, based on the response, whether the device connected to a network through a wireless connection or a wired connection. If the device connected through the wireless connection, the location engine determines a WLC through which the device connected and if the device connected through the wired connection, the location engine determines a switch through which the device connected. The connection engine connects to the determined WLC if the device connected through the wireless connection and connects to the determined switch if the device connected through the wired connection.
DEVICE BLOCKING TOOL
A device blocking tool includes a user interface, a location engine, and a connection engine. The user interface receives at least one of a MAC address of a device and an IP address of the device. The location engine communicates a query to an access control server, receives a response, and determines, based on the response, that the device connected to a network through a wired connection. In response to a determination that the device connected through the wired connection, the location engine determines a switch through which the device connected. The location engine also determines a VLAN through which the device connected and determines, based on a type associated with the VLAN, that the device is an IP telephone. The connection engine connects to the determined switch in response to the determination that the device connected through the wired connection.
Uplink control in a wireless communication network
A method and system are provided having an uplink control structure and a pilot signal having minimal signal overhead for providing channel estimation and data demodulation in a wireless communication network. The uplink control structures enable mobile terminals to communicate with corresponding base stations to perform various functions including obtaining initial system access, submitting a bandwidth request, triggering a continuation of negotiated service, or providing a proposed allocation re-configuration header. A dedicated random access channel is provided to communicatively couple the base station and the mobile terminal so that the mobile terminal can select a random access signaling identification. A resource request is received at the base station to uplink resource information from the mobile terminal and an initial access information request is received from the mobile terminal to configure the base station connection. Pilot signals with varying density configurations are provided to include low density symbol patterns for multiple contiguous resource blocks and high density symbol patterns for single resource blocks.
Method and radio network node for determining route update radius
The present disclosure provides a method implemented by a radio network node for determining a Route Update Radius (RUR) for a Radio Base Station (RBS) and the radio network node. The method comprises determining a first radius (RUR_CCH) which defines a largest circular area centered at the RBS and excluding a first number of RBSs among the RBS's neighboring RBSs, wherein CCH occupancies for the first number of RBSs are higher than a CCH occupancy threshold. The method further comprises determining a second radius (RUR_ACH) which defines a smallest circular area centered at the RBS and covering a second number of RBSs among the RBS's neighboring RBSs, wherein ACH occupancies for the second number of RBSs are higher than an ACH occupancy threshold. The RUR is determined based on a comparison between the first radius (RUR_CCH) and the second radius (RUR_ACH).
Network handover method, device, and system
In a network handover method, after UE located on an LTE network initiates a request message that requests CSFB, an MME instructs an enodeB to move the UE from the LTE network to a 2G or 3G network, and requests an MSC to hand over the UE from the LTE network to a CS domain of the 2G or 3G network for the CSFB, so that the 2G or 3G network allocates a CS domain resource to the UE. Further, by determining that an IMS voice session does not exist, it is identified that the handover of the UE from the LTE network to the CS domain of the 2G or 3G network is triggered by the CSFB, so as to ensure that handover from the LTE network is properly performed.