H04L61/4588

Method for estimating the time-varying energy balance of a collection of energy sinks, harvesters, and storage devices

An embodiment of the invention includes a non-transitory computer-readable medium storing instructions that, when executed by a computer, cause the computer to carry out a method for scheduling at least one activity to achieve a time-varying energy balance of a power system. A mission plan for a mission is received. The mission plan includes at least one activity and at least one route. Each route of the at least one route includes at least one time and at least one location. A plurality of power load identifications is received for at least one time-varying power load for use in the mission plan. A plurality of energy storage device identifications is received for at least one energy storage device. Based on the plurality of power load identifications, a power requirement required to complete the mission plan is determined using the at least one power load. Based at least in part on the mission plan and the plurality of energy storage device identifications, an available power for the mission is determined. The at least one activity along the at least one route is scheduled based on the power requirement and the available energy.

EDGE CACHING OF HTTPS CONTENT VIA CERTIFICATE DELEGATION

Mechanisms may be used for edge caching Hypertext Transfer Protocol Secure (HTTPS) content via an owner-endorsed proxy. The edge servers of a mobile-content distribution network (CDN) may work as the proxy that dynamically gets the means to serve HTTPS content through rights delegated by content owners. Mechanisms may include dynamically assigning a domain with a Canonical name (CNAME) record in DNS based on the popularity of the domain at an edge server. Each edge server from the plurality of edge servers may be associated with a mobile content distribution (mobile-CDN) network, via the mobile-CDN, the right to establish a transport layer security (TLS) session is delegated to the edge server on behalf of the content owner, so that the HTTPS request to the content server may be served by the edge server. A mechanism to restrict the scope of HTTPS content served through the delegated right is presented as well.

METHOD, TERMINAL AND NETWORK-SIDE ACCESS DEVICE FOR REPORTING PLMN
20170289904 · 2017-10-05 · ·

The present invention discloses a method, a terminal and a network-side access device for reporting PLMN. The method includes: receiving, by a terminal, a PLMN identifier list sent by a network-side access device; selecting, by the terminal, a first PLMN identifier from the PLMN identifier list, so as to connect with the network-side access device; and after the terminal is connected with the network-side access device, labeling, by the terminal, a second PLMN identifier preset in the terminal as a selected PLMN identifier and reporting the selected PLMN identifier to the network-side access device, wherein the first PLMN identifier is different from the second PLMN identifier. The present invention solves the technical problem of limitation of operation on PLMN reporting due to adopting the conventional PLMN reporting manner.

SYSTEMS AND METHODS FOR VERIFIED MESSAGING VIA SHORT-RANGE TRANSCEIVER
20220053004 · 2022-02-17 ·

Systems and methods for verified messaging through the interaction involving a short-range transceiver, such as a contactless card, a client device and a server are presented. Verified messaging may be provided in the context of using a client device to receive a user identifier from the user's short-range transceiver, such as a contactless card, and sending a messaging request with the user identifier to a server, which may look up client device information and compare with data about the client device accompanying the request. Matching received client device information to stored client device data based on a user identifier obtained from a short-range transceiver provides an enhanced ability to verify that the client device corresponds to the user associated with the short-range transceiver.

CLIENT DEVICE BASED SOLUTION FOR HANDLING MAC RANDOMIZATION

A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized.

Method for Generating a Common Identifier for a Wireless Device in at Least Two Different Types of Networks
20170245143 · 2017-08-24 ·

The proposed technology generally relates to wireless communication, and more specifically to a method for generating an identifier for a wireless device (30), a method for identifying a wireless device (30) in a wireless communication environment, a method for assisting in the exchange of information for a wireless device (30) between at least two different types of wireless networks such as a WLAN (10) and a cellular network (20), a method for linking context information of a wireless device (30) between different types of wireless networks, and a method for supporting access selection and/or mobility decision in a wireless communication environment, as well as corresponding systems, apparatuses, communication devices, network nodes, computer programs, and computer program products. The proposed technology is based on an identifier of Medium Access Control, MAC, address format, wherein the identifier of MAC address format enables identification of the wireless device (30) in the WLAN (10), and the common identifier also represents information that enables identification of the wireless device (30) in the cellular network (20).

USER EQUIPMENT REGISTRATION METHOD, ENTITY, SYSTEM AND COMPUTER STORAGE MEDIUM
20170238122 · 2017-08-17 ·

Disclosures are a user equipment (UE) registration method, entity, system and a computer storage medium. The method comprises: a common service entity (CSE) in a UE sending an equipment registration request to a machine type communication-inter working function entity (MTC-IWF), wherein the equipment registration request contains an identifier of the UE in an underlying network, an application port identifier of the UE, an identifier of a machine-to-machine/man (M2M) service provider subscribed to by the UE, and an identifier of an application entity (AE) of the M2M service provider.

Selective Call Connection System With In-Flight Control
20170237702 · 2017-08-17 ·

Systems and methods for selectively providing messages to users equipment (UEs) are disclosed. Different types of messages can be associated with different statuses for each UE based on user preferences, network settings, or plan parameters. UEs can be available to receive some types of messages, but not other types of messages, depending on the UE's current connection type, location, or plan parameters. Messages sent to multiple UEs associated with the same service account can be sent based on the availability of each UE to receive the message. Messages are not sent to UEs that are not available to receive that type of message. UEs connected to a common network can enable messaging services to other UEs associated with a common service account or network identity. Messaging services can be available despite each UEs availability to other types of messages.

Method and system for efficiently locating in a database a user profile in an IMS network

Method and system for processing a request associated with a user from a requesting node to an answering node in a telecommunications network. A repository is associated with the answering node, the repository including a data structure including a plurality of user profiles associated with a plurality of users. In the answering node a user profile of the plurality of user profiles is associated with the user. The method comprising the steps of assigning a unique user index to each user profile in the data structure, wherein the user index is representative of the location of the user profile within the data structure, communicating at least one user index to the requesting node, incorporating the user index in the request by the requesting node, transmitting the request from the requesting node to the answering node, and retrieving the user profile associated with the user associated with the request by the answering node on the basis of the user index.

CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES
20220038575 · 2022-02-03 ·

An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.