H04W36/1446

WWAN-WLAN aggregation security

One feature pertains to a method for secure wireless communication at an apparatus of a network. The method includes receiving a user equipment identifier identifying a user equipment and a cryptographic key from a wireless wide area network node, and using the cryptographic key as a pairwise master key (PMK). A PMK identifier (PKMID) is generated based on the PMK and the two are stored at the network. A PMK security association is initialized by associating the PMK with at least the PMKID and an access point identifier identifying an access point of the apparatus. An association request is received that includes a PMKID from the user equipment, and it's determined that the PMKID received from the user equipment matches the PMKID stored. A key exchange is initiated with the user equipment based on the PMK to establish a wireless local area network security association with the user equipment.

Method of radio bearer transmission in dual connectivity
11930543 · 2024-03-12 · ·

A method of radio bearer transmission in dual connectivity for a network in a long term evolution (LTE) system comprises generating at least a packet data convergence protocol protocol data unit (PDCP PDU) by a PDCP entity of the network corresponding to a radio bearer (RB), and assigning each PDCP PDU with an identity, wherein the identity indicates which PDCP entity the PDCP PDU belongs to.

Systems, methods and apparatuses for 3G to volte roaming
11910307 · 2024-02-20 ·

A 3G/LTE proxy system may enable LTE wireless communication by a UE roaming in an LTE VPMN but associated with a 3G carrier. The system may include an EPC configured to proxy as an LTE-capable HPMN for the UE as the UE is attached to a VPLMN. The system may include a 3G MSC configured to proxy as a 3G-capable VPMN for the HPMN. The system may include a translator. The translator may be configured to translate a data communication from an LTE data standard to a 3G data standard, and vice versa. The translator may be configured to translate a text communication from an LTE text standard to a 3G text standard, and vice versa. The translator may be configured to translate a voice communication from an LTE voice standard to a 3G voice standard, and vice versa.

Transitioning a conversation between an unlicensed data network and a cellular network
10506614 · 2019-12-10 · ·

A conversation is handed over between an unlicensed data network and a cellular network. Voice conversations and/or video conversations may be seamlessly transitioned between cellular networks and unlicensed data networks (e.g., Wi-Fi), with a small transition time (e.g., less than a couple of seconds). The handover may occur from the unlicensed data network to the cellular network or from the cellular network to the unlicensed data network. During the transition between networks, cached registration data is accessed to speed up the authentication of the computing device switching networks. In some configurations, a user may specify preferences for switching between the unlicensed data and cellular networks. For instance, a user may specify a preference to use Wi-Fi networks before cellular networks or to use cellular networks before using Wi-Fi networks.

Intelligent Band Selection for Wireless Access Point
20190364566 · 2019-11-28 ·

An access system for a wireless local area network is provided. The access system initiates operation in a first frequency band of a plurality of frequency bands of the wireless local area network to provide one or more wireless client devices of the wireless local area network with access to a wireless wide area network. The access system also processes one or more association requests received in the first frequency band to identify one or more associated wireless client device. The access system also determines whether each of the one or more associated wireless client devices supports a second frequency band. The access system also sends a request to the one or more associated wireless client devices to transition from the first frequency band to the second frequency band based on determining that each of the one or more associated wireless client devices supports the second frequency band.

Information-processing apparatus, control method of information-processing apparatus, program, recording medium, portable terminal, and information-processing system
10491764 · 2019-11-26 · ·

An MFP specifies an MFP application to be started in a portable terminal and another application to be started after start of the MFP application. An NFC tag records information that allows the specified MFP application and the specified another application to be identified in the portable terminal. The portable terminal acquires the application information recorded in the NFC tag by the proximity wireless communication. The portable terminal controls a communication-connection changeover according to an application to be started based on the acquired information. At this moment, if a type of communication to be used by the MFP application and a type of communication to be used by the another application are different, the portable terminal starts the another application after making a changeover to communication connection corresponding to this another application.

SESSION CONTINUITY BETWEEN SDN-CONTROLLED AND NON-SDN-CONTROLLED WIRELESS NETWORKS

Concepts and technologies disclosed herein are directed to session continuity between software-defined network (SDN) controlled and non-SDN controlled wireless networks. In one embodiment, an SDN controller can determine that a handover of a user equipment (UE) from a base station operating under control of the SDN-controlled network to a further base station operating under control of a non-SDN-controlled network has occurred. The SDN controller can establish over an interface between the SDN controller and a packet gateway (P-GW), a tunnel through which to exchange handover data associated with the handover and a session IP address for a session in which the UE is involved. The SDN controller can provide, over the interface and through the tunnel, the handover data and the session IP address to the P-GW.

METHOD FOR ACCESSING NETWORK BY USER EQUIPMENT, AND ACCESS DEVICE
20190349823 · 2019-11-14 ·

Embodiments of the present disclosure provide a method for accessing a network by a user equipment (UE), and an access device. The method includes: sending, by a source side access device, an access indication message to a UE, where the access indication message is used to instruct the UE to access a target side access device; or sending, by a source side access device, a first notification message to a target side access device, where the first notification message is used to instruct the target side access device to send, to a UE, access information used to instruct the UE to access the target side access device; and in a process in which the UE accesses the target side access device, maintains a connection between the UE and the source side access device.

RADIO COMMUNICATION SYSTEM, BASE STATION APPARATUS, NW CONTROL APPARATUS AND CONNECTION CONTROL METHOD

A wireless communication system comprising a plurality of base station devices including a first base station device and a second base station device, wherein the first base station device connected with a terminal determines whether to continue connection with the terminal or not on a basis of a communication quality requirement of the terminal and a resource that can be provided to the terminal, and the first base station device transmits a control signal instructing connection with the second base station device to the terminal in a case where the first base station device determines not to continue the connection with the terminal.

Indirect Single Radio Voice Call Continuity

Methods, systems, and devices for wireless communications are described. An access and mobility management function (AMF) associated with a first radio access network (RAN) may identify a user equipment (UE) connected to a source base station of the first RAN. The AMF may receive a handover message including a voice call continuity handover trigger message indicating a handover of the UE to a target base station associated with a second RAN. In some examples, the AMF may transmit a bypass handover message to a second network device based a on the received handover message. In some cases, the bypass handover message may include the voice call continuity handover trigger message. In some examples, the second network device is a mobility management entity (MME) associated with an Evolved Universal Terrestrial Radio Access Network (E-UTRAN).