Patent application number | Description | Published |
20100128722 | QUEUING MECHANISMS FOR LTE ACCESS AND SAE NETWORKS ENABLING END-TO-END IMS BASED PRIORITY SERVICE - A system and method for queuing emergency telecommunication service requests prevent dropped connections by sending messages to nodes requesting the emergency telecommunication service that the request has been queued. This allows for an orderly queuing process and allows congestion related issues to be overcome without preempting existing network traffic. | 05-27-2010 |
20110201307 | ACCESS CONTROL FOR M2M DEVICES - A system for restricting Machine-to-Machine devices from accessing system resources in a 3GPP compliant network without adversely affecting the access of human operated devices makes use of a new network function that instructs all devices that are internally identified as M2M devices to block access. As such, M2M and H2H devices can be assigned to the same access classes, as presently required, but need not be access barred under the same circumstances. | 08-18-2011 |
20110201365 | M2M GROUP BASED ADDRESSING USING CELL BROADCAST SERVICE - A system for providing machine-to-machine (M2M) messaging in a 3GPP environment makes use of the existing cell broadcast service, optionally with extensions, to allow for M2M enabled devices to be set in groups and sent messages in an efficient manner that can reduce traffic, and provide for less battery drain. | 08-18-2011 |
20110268026 | DEVICE FOR LOW PRIORITY HANDLING - The embodiments herein relates to a method in a transceiver ( | 11-03-2011 |
20120246325 | NETWORK NODE AND METHOD TO CONTROL ROUTING OR BYPASSING OF DEPLOYED TRAFFIC DETECTION FUNCTION NODES - A network is described herein which can control, through subscriber profile data and/or policy preconfigured control data, whether deep packet inspection for data flow/s for an Internet Protocol-Connectivity Access Network (IP-CAN) session established by an end user should take place, or not, according to a defined “User Privacy Policy”, and, in the former case, to which traffic detection function (TDF) node the data flow(s) should be directed. | 09-27-2012 |
20120290452 | METHOD AND APPARATUS FOR AUTHORIZING A TRANSACTIONAL SERVICE BY A POLICY AND CHARGING CONTROL ARCHITECTURE - The present invention faces the issue of authorizing transactional services by a Policy and Charging Control system. To this end, the present invention provides for an apparatus carrying out a method of authorizing transactional services and comprising: an authorization requester for submitting a transactional service authorization request with a user identifier and a transactional service identifier, and an authorizer for receiving the transactional service authorization request. This authorizer comprises: a PCRF server for authorizing the transactional service based on subscription and service data, an OCS for authorizing the transactional service based on credit authorization, and a decider for deciding service authorization for the transactional service based on the authorizations respectively made by the PCRF server and OCS. The authorizer of this apparatus is also arranged for submitting a transactional service authorization response to the authorization requester with a decision on service authorization for the transactional service. | 11-15-2012 |
20130003576 | Node and method for communications handling - Example embodiments disclosed herein may be directed towards a system, and corresponding method, for sending machine-to-machine (M2M) application specific parameters. These parameters may allow a network operator to guide M2M application behaviour in accordance with potentially limited recourses in the network. These parameters may also be used to provide IPv6 address information to a gateway node and/or M2M server and/or Service Capability Server (SCS). | 01-03-2013 |
20140013383 | NETWORK NODE AND METHOD TO CONTROL ROUTING OR BYPASSING OF DEPLOYED TRAFFIC DETECTION FUNCTION NODES - A network is described herein which can control, through subscriber profile data and/or policy preconfigured control data, whether deep packet inspection for data flow/s for an Internet Protocol-Connectivity Access Network (IP-CAN) session established by an end user should take place, or not, according to a defined “User Privacy Policy”, and, in the former case, to which traffic detection function (TDF) node the data flow(s) should be directed. | 01-09-2014 |