CONNECTEM INC. Patent applications |
Patent application number | Title | Published |
20160142366 | METHOD AND SYSTEM FOR AUTOMATIC PROVISIONING OF ENTERPRISE PRIVATE NETWORK OVER 3G/4G MOBILE WIRELESS NETWORKS WHILE MAINTAINING RESPECTIVELY CONSISTENT IDENTITIES - An intelligent mechanism to map the public user identity into the private user identity inside the mobile network is defined. The identity mapping logic supports M:N mapping where M and N can be any natural number while a user or device can still be identified without ambiguity in the network and all the protocols are handled according to the standard specifications. Such ID mapping can be used to create virtual private networks, to provide flexibility in usage of identities, to save the scarce type of identities, and to map the identities between private enterprise identity and mobile network identity. As a result MSIDSN translation, support of private static IP address and support for network initiated communication becomes much easier. | 05-19-2016 |
20160065644 | METHOD AND SYSTEM FOR EFFICIENT ENRICHMENT OF UPPER LAYER PROTOCOL CONTENT IN TRANSMISSION CONTROL PROGRAM (TCP) BASED SESSIONS - A gateway system employing a redirect mechanism at upper layer protocols over Transmission Control Protocol (TCP) in a packet network to circumvent problems related to alteration of TCP sequence number due to header enrichment. The gateway system increases the size of a redirect message by the size of the header enrichment and thereby brings TCP sequence number on both ends in sync despite adding the header enrichment information. | 03-03-2016 |
20150256436 | METHOD AND SYSTEM FOR SEAMLESS SCTP FAILOVER BETWEEN SCTP SERVERS RUNNING ON DIFFERENT MACHINES - A Stream Control Transmission Protocol (SCTP) cluster of multiple SCTP-servers is defined in such manner that some of the servers are assigned Active Role where others are assigned Standby Role with the purpose of ensuring uninterrupted SCTP-connections between the SCTP-cluster and any number of SCTP-clients. The Standby Servers use the same Internet Protocol (IP)-address(es) on the SCTP bound interfaces as their assigned Active Server. The Active Servers are effectively communicating to the SCTP-clients, where the Standby Servers are communicating to their assigned Active SCTP-Server using a separate backchannel TCP-connection. Over that backchannel connection the Standby Server receives regular updates from the Active Server. These updates hold enough information so that the Standby Server could locally simulate SCTP-negotiations and create SCTP-associations as if the SCTP-negotiations were performed directly with the SCTP-Clients. In this manner the Standby Servers are fully synchronized and ready in case of an Active Server failure to continue the SCTP-communications without any interruption. This handover does not involve any subsequent action from the SCTP-clients so that the SCTP-clients are unaware that such a handover took place. | 09-10-2015 |
20140349611 | Method and System for Selective and Secure interaction of BYOD (Bring Your Own Device) with Enterprise network through mobile wireless networks - A mechanism to allow provisioning and use of BYOD (Bring Your Own Device) for authorized access in the enterprise network through a 3G/4G/Wi-Fi access network is provided. A brokering entity in the mobile packet core is provisioned for each authorized employee with enterprise specific rules for security and steering of user traffic. An Enterprise Container is defined as entity on the User Equipment that is self-contained virtual machine with enterprise sanctioned applications. An intelligent mechanism for and steering of signaling and traffic from such BYOD devices to the brokering entity is defined. At any time by using the personal container or the default behavior of the user equipment the user can get mobile service as if the Enterprise Container did not exist. Further, when such employment relationship is terminated the user's BYOD needs to be restored to its pre-employment functionality. | 11-27-2014 |
20140269345 | METHOD AND SYSTEM FOR NETWORK TROUBLESHOOTING AND IMPROVING KPI OF MOBILE DATA NETWORK - A mechanism to allow operators to automatically populate a knowledgebase with protocol characteristics of each mobile device type. In case a mobile device fails to complete signaling dialogue, it logs the messages exchanged till the point the failure occurred. On such failure it triggers a notification so that network operator is alerted with the fact that new device type is failing to get access to the network due to protocol error. Such notification can be used to debug the issue and correct the problem or update customer care information base so that when the affected customer calls, a Customer Service Representative has adequate information to explain to the customer. | 09-18-2014 |
20140056132 | METHOD AND SYSTEM FOR SIGNALING SAVING ON RADIO ACCESS NETWORKS USING EARLY THROTTLING MECHANISM FOR COMMUNICATION DEVICES - An intelligent system and a method in a packet network to utilize the radio network resource and the core network resource in an optimized way so that more high priority, critical devices are granted access to the network while throttling the low priority, non-critical devices with the same given resource. The system collects all the necessary information from the signaling exchange between the radio access network and the core network and takes the device subscription characteristics and statically or dynamically defined throttling behavior rules into consideration to choose the optimal behavior to handle the requests from devices at any given time including deciding to reject the requests for certain types of devices under certain network conditions while granting the requests for other types of devices. This early throttling mechanism effectively increases the network resources, especially radio access network resources for high priority devices so that the quality of service does not change for those high priority devices even under network congestion condition. | 02-27-2014 |
20130021972 | METHOD AND SYSTEM FOR OPTIMIZED HANDLING OF CONTEXT USING HIERARCHICAL GROUPING (FOR MACHINE TYPE COMMUNICATIONS) - A hierarchical data structure for signaling and data handling at a packet core network is defined. A hierarchical data structure is applied to both persistent and dynamic information to support a type of devices that share the same characteristics. Subscription database, context information, and policy rule information is comprised of group level information and device level information. Group level information contains the information the devices that belong to the group share. Device level information contains the device specific information that is different from group level information. When a device belonging to a group requests access to a packet network or performs a procedure that changes the mobility or session state of the device, context management unit works with authentication unit, subscription database unit, and policy decision unit to construct a right information for the device to handle the control and user data traffic. | 01-24-2013 |