Patent classifications
H04L65/4061
IOPS FUNCTIONAL MODEL FOR MISSION CRITICAL SERVICES
Disclosed herein is a method and a wireless device for enabling isolated operation for public safety, IOPS, mission critical, MC, operation in an IOPS system, the wireless device comprising processing circuitry configured to operatively provide an IOPS MC application plane function, wherein: an IOPS MC connectivity client is configured to operatively support a first reference point between the IOPS connectivity client and an IOPS connectivity function in the IOPS MC system, which first reference point is used for at least one of: user registration transactions and IOPS discovery procedures; and an IOPS service client is configured to operatively support a second reference point between the IOPS MC service client and an IOPS packet distribution function in the IOPS MC system, which second reference point is used to carry IP packets between the IOPS MC service client and the IOPS packet distribution function based on unicast transmissions.
ESTABLISHING A SESSION INITIATION PROTOCOL SESSION
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
ESTABLISHING A SESSION INITIATION PROTOCOL SESSION
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
METHOD AND TERMINAL FOR IMPLEMENTING COMMUNICATION
Provided is a method performed by a terminal of performing communication, the method including generating a private call setup request message including a call identifier information element (IE), a caller IE, a callee IE, and a call type IE set to an emergency private call, based on receiving a user indication to upgrade a call to emergency call, wherein the terminal is in an in-progress private call state; setting a proximity-based services (ProSe) per-packet priority corresponding to the emergency private call; transmitting, to another terminal, the private call setup request message; starting a timer relating to private call request retransmission based on the emergency call setup request message; and entering an in-progress emergency private call state from the in-progress private call state.
METHOD AND TERMINAL FOR IMPLEMENTING COMMUNICATION
Provided is a method performed by a terminal of performing communication, the method including generating a private call setup request message including a call identifier information element (IE), a caller IE, a callee IE, and a call type IE set to an emergency private call, based on receiving a user indication to upgrade a call to emergency call, wherein the terminal is in an in-progress private call state; setting a proximity-based services (ProSe) per-packet priority corresponding to the emergency private call; transmitting, to another terminal, the private call setup request message; starting a timer relating to private call request retransmission based on the emergency call setup request message; and entering an in-progress emergency private call state from the in-progress private call state.
SYSTEM AND METHOD FOR ESTABLISHING FIRST-TO-ANSWER CALL IN MISSION CRITICAL PUSH TO TALK COMMUNICATION
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments herein provide a system for establishing a first-to-answer call in a Mission Critical Push to Talk (MCPTT) communication. The system includes a MCPTT originating client configured to initiate a first-to-answer call and transmit a first-to-answer call request to a MCPTT server. The system includes the MCPTT server configured to receive the first-to-answer call request from the MCPTT client.
Communication between half duplex and full duplex systems
A method in which a media server detects a media stream from a gateway which is only capable of sending a stream from a half duplex source. Call setup, such as a floor request from the gateway or the half duplex source, is not required. The media server then blocks media streams from full duplex sources to create half duplex communication, without using a buffer. Once the stream from the gateway has ended, the server detects streams from other sources and restores full duplex communication. A communication server carries out the method and is capable of detecting whether or not the server is connected to a half duplex source, such as a Land Mobile Radio (LMR) gateway, and then altering behavior according to that source. In doing so, the server enables either half duplex or full duplex operation, depending upon whether the source data originates from the half duplex source.
Dual fallback hardened VoIP system with signal quality measurement
A hardened VoIP system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing LMR systems, a secure voice platform ensures malicious software, unauthorized access and brute force security attacks will not compromise the voice communications of the system. The VoIP system is engineered to ensure graceful system degradation in the event of maintenance activities, natural disasters and failure modes. The hardened VoIP system offers the functions a LMR trunking system while utilizing broadband connections. Private calls, group calls, Emergency Alarms with covert monitoring capability, scanning and priority scanning may be incorporated into the system. The system includes a VoIP controller that serves as a trunking controller, manages available VoIP based conference bridges, and assigns them as needed to the parties involved in each voice call. The system includes multiple fallback methods that may be prioritized based on pre-failure analytics.
METHODS AND SYSTEMS TO SHARE FUNCTIONAL ALIAS IN MISSION CRITICAL VIDEO
A method for managing a Mission Critical Video (MCVideo) group call is provided. The method includes transmitting by at least one sender user equipment (UE) in the MCVideo group call, a MCVideo message to an MCVideo Server, receiving, by at least one receiver UE in the MCVideo group call, the MCVideo message from the MCVideo server, wherein at least one of a plurality of functional alias identification (ID) is encoded and included in the MCVideo message, and decoding, by the at least one receiver UE in the MCVideo group call, the at least one of the plurality of functional alias ID from the MCVideo message.
Anomaly database system for processing telemetry data
In some examples, an anomaly database system is provided for processing metrics in telemetry data. An example anomaly database system comprises a continuous data management (CDM) node, the CDM node including a metrics library for sending out system metrics in a sparse manner and a statistics relay for receiving streaming metrics from nodes in a node cluster, the node cluster including the CDM node, the statistics relay pushing the received metrics to a metrics collector. A sparse consumers module pulls metrics, from the metrics collector, pushed to the metrics collector by the statistics relay.