H04W76/06

Mobile application volatility management for situational applications

A method for managing situational mobile applications of high volatility in a mobile computing device includes first defining a policy specifying under which context a mobile application is to remain installed in a mobile computing device. Thereafter, the policy is loaded into memory of the device and a geolocation is determined for the device. In this regard, the geolocation may include a location of the device, or a present time and date for a location of the device. The policy then is applied to the determined context and, in response to a determination from the application of the policy that the mobile application is to be uninstalled based upon a location of the device being outside of a designated geographic area in which the mobile application had been installed in the device, the mobile application is automatically uninstalled from the device.

METHODS FOR FAST, SECURE AND PRIVACY-FRIENDLY INTERNET CONNECTION DISCOVERY IN WIRELESS NETWORKS

A method and system for verifying Internet connectivity at an access point in a fast, secure, and privacy-friendly manner. During operation, the system may perform passive network discovery, challenge response discovery, and/or active discovery to verify Internet connectivity for a mobile device. Passive network discovery involves the mobile device using a public key of a server to decrypt a time value to verify Internet connectivity. The mobile device receives the encrypted time value as part of the server's signed timing information in an overloaded WiFi beacon frame. Challenge response discovery involves the mobile device sending an encrypted challenge to servers, and a server returns a correct response to the challenge to confirm Internet connectivity. Active discovery involves a mobile device sending HTTP GET requests to a randomly selected set of servers without including a user agent, and a server may send an HTTP REPLY to confirm Internet connectivity.

MANAGING RADIO RESOURCE CONTROL (RRC) CONNECTIONS BASED ON RADIO BEARER ATTRIBUTES
20170208647 · 2017-07-20 ·

A base station may establish a radio resource control (RRC) connection with a first user device. The base station may determine a bearer attribute of a bearer associated with the RRC connection and the first user device. The base station may determine that the bearer attribute satisfies a set of conditions, and may analyze multiple bearer attributes associated with multiple established RRC connections. The base station may select a terminable RRC connection, of the multiple established RRC connections, based on analyzing the multiple bearer attributes. The terminable RRC connection may be associated with a second user device that is different from the first user device, and the terminable RRC connection may be different from the RRC connection. The device may terminate the terminable RRC connection based on selecting the terminable RRC connection.

RADIO LINK FAILURE PROCESSING METHOD AND APPARATUS THEREFOR

The present disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as long term evolution (LTE). A method for processing a radio link failure (RLF) by a user equipment (UE) supporting a dual-connectivity communication system is provided. The method includes determining a state of a radio link with a first base station using a reference signal, transmitting to a second base station, when the radio link with the first base station fails, a message indicating that the radio link with the first base station fails, redetermining the state of the radio link with the first base station using a reference signal of the first base station during a predetermined time, and switching, after the predetermined time, a data transmission line when the radio link with the first base station fails.

CAMERA CONTROL AND IMAGE STREAMING
20170208296 · 2017-07-20 ·

Camera control and image streaming are described, including) at least one camera or an apparatus associated with at least one camera. The camera or apparatus is configured to receive or detect a tag; determine that the tag is associated with the camera, which may be controlled by, managed by, or otherwise associated with the apparatus; determine that the tag is associated with a device or user; and establish a communication with the device or user based on the tag. The communication may include streaming a view through a lens of the camera to the device or user. The tag may allow the device or user to request capturing one or more images or a video using the camera. The tag may automatically trigger capturing of one or more images or a video using the camera.

Method and apparatus for releasing connection in wireless communication system

A method and apparatus of releasing a connection in a wireless communication system is provided. A user equipment (UE) establishes a radio resource control (RRC) connection with a specific establishment cause, receiving paging indicating connection release and release information including an establishment cause or a logical channel priority, and releasing the RRC connection depending on the establishment cause or the logical channel priority included in the release information.

Apparatus and method for managing radio resource control connection in wireless communication system supporting device to device scheme

A method to manage a Radio Resource Control (RRC) connection in an evolved NodeB (eNB) in a wireless communication system supporting a Device to Device (D2D) scheme is provided. The method includes starting an inactivity timer to control a User Equipment (UE) to transition into an RRC idle state after setting up an RRC connection with the UE. The method also includes allocating a D2D resource to the UE when a resource request message to request the D2D resource for a direct communication between UEs is received from the UE. The method further includes transmitting a resource response message including information related to the allocated D2D resource to the UE and stopping the inactivity timer. The method includes releasing the allocated D2D resource and restarting the inactivity timer based on a predetermined option.

System and method for data network reassignment

Managing data resource utilization in a wireless network environment comprising a first data network and a second data network is described herein. The described management infrastructure and method incorporates monitoring data usage of a wireless network subscriber over the first data network, determining that the data usage over the first data network meets a specified threshold, and, in response to the determination that usage has reached the specified threshold, administratively disconnecting the wireless network subscriber from the first data network so as to cause a data session of the wireless network subscriber to be reassigned to the second data network.

Releasing connections with local GW when UE moves out of residential/enterprise network coverage
09713196 · 2017-07-18 · ·

A method, system and device are provided for managing LIPA and/or SIPTO connection releases when UE moves out of residential/enterprise network coverage in case service continuity is not supported for the LIPA/SIPTO PDN connection(s). To address problems caused by not providing service continuity for LIPA/SIPTO PDN connections, the PDN connection/PDP context created in the HeNB/HNB by the MME/SGSN includes context information related to the UE indicating whether such connection is a LIPA PDN connection PDN connection or not. In addition, each UE may be configured to reconnect or not reconnect to the PDN corresponding to a certain APN or service, depending on how the PDN connection was disconnected by the network.

Session aware access point load balancing

The present disclosure discloses a method and a network device for session aware access point load balancing. Specifically, a network device monitors data corresponding to a plurality of client devices associated with a first access point. Then, the network device determines whether the data matches particular criteria. Responsive to determining that the data matches the particular criteria, the network device select at least a first client device of the plurality of client devices for disassociation and/or de-authentication. Moreover, the network device causes disassociation and/or de-authentication of the first client device from the first access point.