Patent classifications
H04L12/16
MACHINE-TO-MACHINE (M2M) TERMINAL, BASE STATION, METHOD, AND COMPUTER READABLE MEDIUM
A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.
MACHINE-TO-MACHINE (M2M) TERMINAL, BASE STATION, METHOD, AND COMPUTER READABLE MEDIUM
A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.
Systems and methods for determining secure network paths
In one embodiment, an apparatus includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the apparatus to perform operations including determining a path through a plurality of provider nodes within a provider network and determining that the path through the plurality of provider nodes within the provider network is secure. The operations also include receiving, from a customer node, a Resource Reservation Protocol (RSVP) path message comprising an attribute for a security request. The operations further include routing the RSVP path message along the path of the plurality of provider nodes.
Systems and methods for determining secure network paths
In one embodiment, an apparatus includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors. The one or more computer-readable non-transitory storage media include instructions that, when executed by the one or more processors, cause the apparatus to perform operations including determining a path through a plurality of provider nodes within a provider network and determining that the path through the plurality of provider nodes within the provider network is secure. The operations also include receiving, from a customer node, a Resource Reservation Protocol (RSVP) path message comprising an attribute for a security request. The operations further include routing the RSVP path message along the path of the plurality of provider nodes.
Methods for Transmitting and Receiving Data in 5G NR Device Based on Data/Service Tagging from Application Processor
Techniques and devices for service-specific tagging of data by an application processor (AP) of a user equipment device (UE). A first indication may be sent from the UE to a baseband processor (BB) of the UE of one or more quality of service preferences for an upcoming data session, and the BB may configure one or more layers of the BB according to the quality of service preferences. The BB may further communicate with a network to establish protocols for the quality of service preferences. The BB may determine one or more network conditions, and may transmit feedback from the BB to the AP related to the determined network conditions. In response, the AP may send a second indication of one or more updated quality of service preferences to the BB based at least in part on the feedback received from the BB.
Methods for Transmitting and Receiving Data in 5G NR Device Based on Data/Service Tagging from Application Processor
Techniques and devices for service-specific tagging of data by an application processor (AP) of a user equipment device (UE). A first indication may be sent from the UE to a baseband processor (BB) of the UE of one or more quality of service preferences for an upcoming data session, and the BB may configure one or more layers of the BB according to the quality of service preferences. The BB may further communicate with a network to establish protocols for the quality of service preferences. The BB may determine one or more network conditions, and may transmit feedback from the BB to the AP related to the determined network conditions. In response, the AP may send a second indication of one or more updated quality of service preferences to the BB based at least in part on the feedback received from the BB.
Machine-to-machine (M2M) terminal, base station, method, and computer readable medium
A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.
Machine-to-machine (M2M) terminal, base station, method, and computer readable medium
A Machine-to-machine (M2M) terminal (11) comprises a radio communication unit (111) and a controller (112). The radio communication unit (111) is configured to communicate with a base station (13). The controller (112) is configured to change at least one of a cell selection operation, a cell reselection operation, and a handover operation according to whether a specific coverage enhancement processing is required or according to whether the specific coverage enhancement processing is supported by at least one of a cell (13) in which the M2M terminal (11) camps on and a neighbouring cell (14) of the cell (13) which the M2M terminal (11) camps on. It is thus possible to provide an improved technique for allowing the M2M terminal that is supporting a special coverage enhancement processing for M2M terminals to camp on an appropriate cell.
Discovery mechanism for communication in wireless networks
Techniques for discovering a device in a wireless network are described herein. For example, a first device may send a network discovery solicitation message to a second device to solicit a communication relationship (e.g., request connection to a parent). The network discovery solicitation may include one or more information elements that indicate a channel function associated with the first device and a listening window during which the first device will be listening for communications. The second device may use the channel function to frequency hop and send a network discovery message to the first device during the listening window. The network discovery message may include one or more information elements to establish a sampled schedule for the first device moving forward.
Data isolation and two-factor access control
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.