Patent classifications
H04W76/16
Techniques for configuring bandwidth parts for multiple-subscription communication devices
Aspects described herein relate to communicating, based on a first subscription, with a first Radio Access Technology (RAT) over a bandwidth part (BWP) in a set of one or more configured BWPs, tuning a transceiver away from the BWP to a second frequency to communicate, based on a second subscription, with a second RAT for a period of time, tuning, after the period of time, the transceiver back to a selected BWP to communicate with the first RAT, and handling BWP parameters during or based on the tune away or tune back.
Techniques for configuring bandwidth parts for multiple-subscription communication devices
Aspects described herein relate to communicating, based on a first subscription, with a first Radio Access Technology (RAT) over a bandwidth part (BWP) in a set of one or more configured BWPs, tuning a transceiver away from the BWP to a second frequency to communicate, based on a second subscription, with a second RAT for a period of time, tuning, after the period of time, the transceiver back to a selected BWP to communicate with the first RAT, and handling BWP parameters during or based on the tune away or tune back.
On-demand security for network resources or nodes, such as for a wireless 5G network
The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
On-demand security for network resources or nodes, such as for a wireless 5G network
The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
System, method, and computer program for proactive 5G leg estimation
As described herein, a system, method, and computer program are provided for proactive 5G leg estimation. During an initial access procedure by a user equipment on a 4G leg of a 4G-LTE network, an eNodeB of the 4G-LTE network computes a parameter for the user equipment. Further, the eNodeB of the 4G-LTE network conditionally allows an addition of a 5G leg to the 4G-LTE network for the user equipment, based on the parameter computed for the user equipment.
PROVIDING ALTERNATE COMMUNICATION PROXIES FOR MEDIA COLLECTION DEVICES
Described herein are techniques that may be used to facilitate interactions between a media collection device and a remote computing device via the use of a proxy device. Such techniques may comprise establishing a first communication session between a media collection device and a proxy device via a short-range communication channel, transmitting, by the media collection device to the proxy device, status information via the first communication session, at least a portion of the status information subsequently forwarded by the proxy device to a remote computing device, determining that the media collection device is to be activated, upon determining that the media collection device is to be activated, establishing a second communication session between the media collection device and the remote computing device via a long-range communication channel, and transmitting, by the media collection device to the computing device, media content via the second communication session.
Cooperation between nodes operating in licensed and unlicensed spectrum for channel access in unlicensed spectrum
This disclosure pertains to a method for operating a terminal (10) in a wireless communication network. The method comprises performing a Listen-Before-Talk, LBT, procedure on at least one LBT communication link of a set of LBT communication links, wherein performing the LBT procedure is based on 475 information received by the terminal (10), the received information pertaining to operational conditions of the LBT communication links of the set of LBT communications links. The disclosure also pertains to related devices and methods.
Method of processing establishment of MA PDU session, and AMF node and SMF node
A disclosure of the present specification provides a method for processing establishment of a protocol data unit (PDU) session by an access and mobility management function (AMF) node. The method may include a step of receiving a PDU session establishment request message from a user equipment (UE) via either a first access or a second access. The PDU session establishment request message may include information indicative of a multi access (MA) PDU session. The method may include a step of selecting a session management function (SMF) node supporting the MA PDU session on the basis of the information indicative of the MA PDU session. The method may include a step of sending the PDU session establishment request message to the SMF node supporting the MA PDU session.
5G new radio de-registration procedures
Apparatuses, systems, and methods for a wireless device to perform methods for de-registration of the wireless device from a first access type over a second access type. Methods also include procedures for maintaining state machines associated with both access types as well as procedures to determine a connection for re-transmitting a de-registration request and to avoid collisions between procedures associated with the first and second access types. Further, methods include an information element configured to indicate which access type has been de-registered.
Device and method for controlling transmission power of electronic device in wireless communication system
The disclosure relates to a device and a method for controlling transmission power of an electronic device in a wireless communication system. An electronic device may include: a housing; at least one radio frequency integrated circuit (RFIC) disposed in the housing and configured to support a first radio access technology (RAT) and a second RAT; a first communication processor electrically or operationally connected to the at least one RFIC; a second communication processor electrically or operationally connected to the at least one RFIC and the first communication processor; and at least one memory which is operationally connected to the first communication processor and the second communication process or is a part of at least one of the first communication processor or the second communication processor, and which is configured to store a first threshold value related to the at least one RFIC.