Patent classifications
H04W36/365
Conditional handover procedures
A method for a conditional handover (CHO) is described in some of the present embodiments. The method may receive from a source base station (e.g., a gNB or an eNB) one or more CHO commands that each is associated with one or more triggering conditions for a CHO to a target cell associated with a target base station (e.g., a target gNB or a target eNB). The method may continuously evaluate the triggering condition(s) associated with each received (and valid) CHO command. When the method determines that at least one of the triggering conditions has been fulfilled, the method may execute the CHO command that is associated with the triggering condition in order to connect to one or more candidate target cells associated with the CHO command.
PROVIDING SIGNAL QUALITY INFORMATION FOR A NON-PRIMARY BASE STATION
The subject matter described in this disclosure can be embodied in methods and systems for providing signal quality information for a non-primary base station. A computing device identifies a first quality of wireless communication between a first base station and the computing device. The computing device identifies, while remaining in communication with the first base station, a second quality of wireless communication between a second base station and the computing device. The computing device determines that the second quality of wireless communication is better than the first quality of wireless communication. The computing device continues to communicate with the first base station after having determined that the second quality of wireless communication is better than the first quality of wireless communication. The computing device provides, while continuing to communicate with the first base station, an indication that wireless communication with the computing device has the second quality of wireless communication.
Agentless network access reconciliation
Systems and methods are provided for efficient and automated control of software permissions and access to network resources across a complex enterprise environment. Systems may include an access reconciliation tool that provides functionality for propagating changes to user access credentials. Credential changes may be initiated on a local computer server. Credential changes may then be pushed from the local server to a distribution system and from the distribution system to an access rights management server. The reconciliation tool may accept a secure file transfer file from the distribution system to update user's current access. The access rights management server may coordinate storage of the credential changes in a centralized database. A password management tool may be provided that synchronizes user account passwords across servers for human and non-human accounts. The password management tool may replace an agent running on each local server with automated scripting for implementing password synchronization.
INTELLIGENT INDICATORS OF DYNAMIC CONNECTIVITY ALTERNATIVES
Systems and methods herein recognize that form factors executing personal computer (PC) operating systems experience limited connectivity when traveling between WiFi connections and/or wired connections. Not only does this limit research capabilities of the PC form factor while between WiFi and/or wired connections, but the limitations place data integrity at risk. Systems and methods herein monitor for conditions that cause data integrity risks and seamlessly implement solutions that resolve, reduce, and/or manage identified data integrity risk conditions at least by simplifying a user's ability to identify and connect to networks, which offer data integrity risk solutions.
METHOD, APPARATUS, TERMINAL AND STORAGE MEDIUM FOR MEASUREMENT REPORT
A method for sending a measurement report, includes: after receiving an enable signal of a second network, a first modem starting up a timer and sending a startup signal to a second modem; when the timer expires, the first modem sending a tracking area update (TAU) request to a network side device; the first modem receiving a measurement configuration sent by the network-side device, and instructing the second modem after startup to measure the second network according to the measurement configuration to obtain a measurement report; and reporting the measurement report to the network-side device.
Handoff Between Bot and Human
A method that enables handoff between a bot and human is described herein. The method includes monitoring a conversation between a user and a first bot to detect a trigger, wherein the trigger is detected by assessing one or more factors associated with the user, wherein assessing the one or more factors comprises a determination that a user frustration level exceeds a predetermined threshold. The method also includes, in response to a detected trigger, determining a type of a handoff to be executed, wherein the handoff is to a second bot or a human support agent and the type of handoff is based on an experience of the user. Additionally, the method includes executing the determined handoff to the second bot or a human support agent, wherein the second bot or a human support agent engages the user in conversation to execute functionality desired by the user.
Method and system for user initiated inter-device, inter-system, and inter-internet protocol address handoff
Apparatus and method by which Internet Protocol (IP) traffic can be transferred (i.e. handoff) between two different terminals operating according to two different technology standards in two different systems with two different IP addresses. For example, a session handoff can be made between a terminal in Wireless Local Area Network (WLAN) a terminal in a 3GPP UMTS or between a terminal in CDMA2000 and a terminal in a 3GPP UMTS. These terminals can be either physically separate entities or logical entities that are encapsulated within a common enclosure.
Offline security value determination system and method
A method includes receiving, by a server computer, data of a communication device; training, by the server computer, a neural network model based on the data of the communication device and communication device metadata from one or more additional communication devices, to generate a machine learning model configured to determine, based on a metadata associated with an application, a security value related to an indication of a security threat; and transmitting the machine learning model to the communication device. The communication device can use the machine learning model to determine the security value, by inputting the metadata associated with the application, as a vectorized data into the machine learning model. The communication device can determine whether to run or install the application based upon the security value.
METHOD AND SYSTEM OF SWITCHING BETWEEN MOBILE NETWORKS
A method of switching between mobile networks comprises the steps of: receiving, by a server, a mobile network switching request from the communication terminal input by a user; outputting, by the server, a list of mobile networks where the communication terminal is currently located to the user in response to receiving the mobile network switching request from the communication terminal; acquiring, by the communication terminal, a switched-to mobile network selected by the user from the list of mobile networks; allocating, by the server, a SIM card corresponding to the switched-to mobile network to the communication terminal; and switching, by the communication terminal, a switched-from mobile network to the switched-to mobile network by means of the SIM card. The problems in the prior art of being unable to freely change a virtual subscriber identity model card and switch a corresponding mobile network are effectively solved, thereby improving the user experience.
Path switching method and apparatus based on user text information
Disclosed is a path switching method and apparatus based on user text information, including that: (401) when a UE is switched into an inactive state on a source random access network (RAN) node and paging of the UE is initiated by the source RAN node, a target RAN node receives a resume request message sent by the UE, and sends a user text obtain request message to the source RAN node; (402) the target RAN node receives a user text obtain response message sent by the source RAN node, where the user text obtain response message carries user text information on the source RAN node; (403) after a data transmission channel is established between the source RAN node and the target RAN node according to information carried in the user text obtain request message, the target RAN node receives data cached locally and forwarded by the source RAN node.