Patent application number | Description | Published |
20080220740 | Blacklisting of unlicensed mobile access (UMA) users via AAA policy database - In one embodiment, while being connected to the network, a security issue may be detected and associated with the device. The device may be placed on a blacklist for the security issue. The blacklist is a list that is used to deny service for the device when it attempts to connect. Thus, the device is disconnected from the network. Identification information for the device is added to the blacklist at the authentication server. If the device attempts to reconnect to the network, the request is received at the authentication server. The authentication server can then check the blacklist and deny the request for access to the network if the identification information is on the blacklist. This denial is determined without sending the request to the HLR. Accordingly, the HLR is protected in that requests from a device that may be considered a security issue are not sent to the HLR. | 09-11-2008 |
20080235783 | P-GANC OFFLOAD OF URR DISCOVERY MESSAGES TO A SECURITY GATEWAY - In one embodiment, a security gateway receives an IPSec Initiation (IPSec INIT) request from a client. The security gateway may communicate with a AAA server to authenticate the client. After authentication, the security gateway intercepts a URR Discovery request from the client. The security gateway determines registration information for a response to the registration request. The registration information may be information on where the client can locate a D-GANC. A response is generated using the determined information and sent to the client. The response to the discovery request is performed without communicating with a P-GANC. Accordingly, a security gateway is used to authenticate the client and also to respond to the discovery request. This does not require that a P-GANC function be deployed in a network. Thus, cost and processing power may be saved. | 09-25-2008 |
20080254794 | GW coupled SIP proxy - In one embodiment, a method can include: (i) performing an initial authentication with a mobile device in an access gateway, the access gateway being a point of attachment; (ii) forwarding a first message from the mobile device to an edge proxy; (iii) receiving a second message from the edge proxy; and (iv) returning a modified version of the second message to the edge proxy for a final authentication of the mobile device. | 10-16-2008 |
20080275943 | APPLICATION LOAD BALANCING FOR DIFFERENT DOMAINS - In one embodiment, a method includes receiving a message associated with a device in a first domain. An identifier is determined for the device. The message is then sent to a load balancer where the message includes the identifier. The load balancer is then configured to send the message to a network device in a plurality of network devices. The network device is configured to process messages from the device. A second message may be received at the load balancer from a second domain. The second message may include the identifier for the device. The load balancer may then send the second message to the selected network device such that the first message and the second message are processed by the same network device. | 11-06-2008 |
20080317053 | LOAD-BALANCED NSAPI ALLOCATION FOR iWLAN - In one embodiment, a load balancer receives a message from a tunnel termination gateway (TTG) associated with a mobile device. The load balancer may receive messages from a plurality of TTGs. A gateway node in a plurality of gateway nodes in which to send the message is determined. The load balancer then assigns a NSAPI for use by the gateway node. For example, the NSAPI may be associated with a tunnel that is generated between the TTG and GGSN. The load balancer ensures that the assigned NSAPI is not currently in use at the gateway node. Thus, no overlapping of NSAPIs may occur even though the load balancer is processing messages from multiple TTGs for multiple gateway nodes. | 12-25-2008 |
20090023426 | INTELLIGENT REAL ACCESS POINT NAME (APN) SELECTION USING VIRTUAL APNS - In one embodiment, a first access request is received from a mobile device. The access request may be received through a first access medium for a virtual access point name (APN). A session is created with a service using a first real access point name (APN) for the mobile device. A second access request is received through a second type of access medium. The request may be received through a second virtual APN. A session is determined that is active for the mobile device through the first access medium and the second access request is assigned the first real APN even though the request is received through a second access medium. The continuity of the connection may then be maintained because the first real APN is still being used. In this case, a handoff of the connection from the first access network to the second access network is performed while the connection to the service is maintained through the first real APN. | 01-22-2009 |
20090086971 | SELECTIVE SECURITY TERMINATION IN NEXT GENERATION MOBILE NETWORKS - Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data packets to a base station in a mobile network. The mobile network can subsequently determine at which node in the network to terminate the cipher in part according to the capabilities provided and deliver the determined location to the UE. The determined cipher termination location can be provided in response to a request to initiate communications, the initial request can specify the capabilities. The UE can utilize the location to support disparate types of networks and to intelligently deal with hand-offs and other functions of the mobile network. | 04-02-2009 |
20110019582 | Coordinated Neighbor Discovery of Radio Access Point Devices and Macro Base Stations - Techniques are provided for coordinated neighbor discovery in a wireless network served by radio access point devices that provide service in relatively small coverage areas in the wireless network. A controller apparatus sends to radio access point devices, data identifying a group of radio access point devices to which each radio access point device is assigned. The controller apparatus sends coordinating data for a neighbor discovery session during which a particular radio access point device in the group is configured to transmit a signal at maximum power during a time interval while all other radio access point devices in the group are configured to attempt to receive the signal, and to repeat the same during other time intervals during the neighbor discovery session when a different particular radio access point is configured to transmit a signal at maximum power until all of the radio access point devices in a group have transmitted. Each radio access point device generates discovery results data for signals received from one or more other radio access point devices during the neighbor discovery session. A neighbor list is generated for each radio access point device based on the discovery results. The neighbor list comprises a list of identifiers of radio access point devices that are candidates for handover of service. | 01-27-2011 |
20110019612 | PICOCELL SYSTEM WITH LOCAL VOICE MEDIA SUPPORT - A methodology includes servicing a voice call between mobile User Equipment and an Enterprise Session Initiation Protocol (SIP) Services Environment using, at least in part, Voice over Internet Protocol Multimedia Subsystem (VoIMS), detecting that the User Equipment is moving out of range of Radio Access Point (RAP) infrastructure servicing the User Equipment, and in response to detecting, initiating a procedure to hand out the voice call and anchor the voice call in a Mobile Switching Center (MSC) of a macro service provider. | 01-27-2011 |
20110019638 | Scrambling Code Allocation and Hand-In For Wireless Network Radio Access Points - Techniques are provided herein to allow more than a fixed number of radio access point devices to be deployed within a macro cell. At a controller apparatus, a registration request is received from a radio access point device configured to operate in a wireless network to serve one or more wireless client devices in the wireless network in respective relatively small coverage areas. The registration request comprises a macro cell identifier associated with a macro base station apparatus configured to operate in the wireless network to serve one or more wireless client devices in a relatively large coverage area, a radio access point cell identifier associated with the radio access point device, and a particular primary scrambling code selected for use by the radio access point device. When the particular primary scrambling code is not available for use, methods are provided to allocate it in a shared manner but without degrading handover service. | 01-27-2011 |
20110039560 | SYSTEM AND METHOD FOR PROVIDING ACCESS IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes evaluating geolocation information associated with a mobile node and using the geolocation information to identify a femtocell capable of providing network access to the mobile node. A primary scrambling code is provided to the mobile node for operation in an idle mode. The method also includes communicating a secondary scrambling code to initiate access to the femtocell by the mobile node when operating in an active mode. In more particular embodiments, the secondary scrambling code is included in a broadcast message that includes a femtocell identifier associated with the femtocell. The femtocell is identified from a plurality of femtocells based on geolocation information associated with the femtocell. The primary scrambling code is part of a range of primary scrambling codes allocated to a plurality of femtocells within a macro network coverage area. | 02-17-2011 |
20110090815 | SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed. | 04-21-2011 |
20110119740 | SYSTEM AND METHOD FOR PROVIDING ENTERPRISE INTEGRATION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving a request to authenticate an end user in a service provider network, and evaluating the request to identify the end user as belonging to an enterprise network. A tag is generated for a packet associated with a flow for the end user in the enterprise network. Routing occurs for subsequent packets associated with the flow between the enterprise network and the end user. The subsequent packets associated with the flow are not routed through the service provider network. In more particular embodiments, the end user is authenticated in the enterprise network after being authenticated in the service provider network. In addition, traffic for the end user can be separated based on one or more tags identified within the flow. A plurality of flows can be classified based on a customer identification (CID). The tag can be a virtual local area network (VLAN) tag generated at a base station. | 05-19-2011 |
20110151886 | SYSTEM AND METHOD FOR PROVIDING RESOURCE MANAGEMENT IN A NETWORK ENVIRONMENT - An example method includes receiving data from a femto access point; evaluating resources being used by a macro network in which the femto access point resides; determining whether the femto access point is operating in a constrained bandwidth mode; and reserving particular resources for the femto access point to use for its communications, where the particular resource is allocated from available resources within the macro network. In a more particular embodiment, where those resources refer to spectrum resources, the method includes allocating spectrum resources between femto and macrocellular systems. In other embodiments, the method includes identifying a total throughput associated with the femto access point and one or more macro network cells, where a change in reserving particular frequencies is executed based on determining the total throughput being higher than a current throughput. The data from the femto access point can include path loss data and geolocation data. | 06-23-2011 |
20110228673 | SYSTEM AND METHOD FOR PROVIDING RATE CONTROL IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes identifying a bandwidth parameter associated with a network link. The method includes evaluating a bandwidth request associated with user equipment, the bandwidth request is associated with a session, which involves the user equipment and which implicates the network link. The bandwidth request can be modified based on the bandwidth parameter that was identified. In more detailed embodiments, one or more header extensions in one or more packets are evaluated in order to assist in identifying the bandwidth parameter. The one or more header extensions can include a selected one of packet sequence numbers, an average packet transmission rate, an average packet receiving rate, and a packet reception error rate. In other examples, modifying the bandwidth request can include downgrading the bandwidth request to lower a bit rate based on the bandwidth parameter identified for the network link. | 09-22-2011 |
20120108287 | Scrambling Code Allocation and Hand-In for Wireless Network Radio Access Points - Techniques are provided to allow more than a fixed number of radio access point devices to be deployed within a macro cell. At a controller apparatus, a registration request is received from a radio access point device configured to operate in a wireless network to serve one or more wireless client devices in the wireless network in respective relatively small coverage areas. The registration request comprises a macro cell identifier associated with a macro cell base station configured to operate in the wireless network to serve one or more wireless client devices in a relatively large coverage area, a radio access point cell identifier associated with the radio access point device, and a particular primary scrambling code selected for use by the radio access point device. When the particular primary scrambling code is not available for use, methods are provided to allocate it in a shared manner but without degrading handover service. | 05-03-2012 |
20120195210 | SYSTEM AND METHOD FOR COORDINATING FEMTO INTERFERENCE IN A NETWORK ENVIRONMENT - An example method includes receiving interference information associated with a plurality of femto access points operating in a macro network; evaluating the interference information; determining that an interference threshold has been exceeded based on the interference information; and communicating signaling information to a particular femto access point to reduce an interference level based on the interference information. | 08-02-2012 |
20120201137 | SYSTEM AND METHOD FOR MANAGING CONGESTION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes identifying an Internet protocol (IP) address for a serving gateway; establishing a link between the serving gateway and a congestion notification element; monitoring packets in order to identify whether a differentiated services code point (DSCP) bit has been set in the packets; determining that a threshold associated with congestion in a network has been exceeded; and communicating a signal to the serving gateway associated with the congestion. The serving gateway can be configured to correlate the congestion with identifiers associated with end users operating in the network, where the serving gateway communicates a signal to a network element to reduce the congestion. | 08-09-2012 |
20120207022 | SYSTEM AND METHOD FOR SYNCHRONIZING QUALITY OF SERVICE IN A WIRELESS NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving a plurality of status signals, for a plurality of radio links, at a microwave device; detecting a bandwidth anomaly based on the status signals; and communicating a quality of service (QoS) control signal, which is based on the bandwidth anomaly, to a gateway coupled to at least one of the radio links. | 08-16-2012 |
20120287784 | SYSTEM AND METHOD FOR INTEGRATED QUALITY OF SERVICE IN A WIRELESS NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow. | 11-15-2012 |
20130010686 | SYSTEM AND METHOD FOR SUBSCRIBER MOBILITY IN A CABLE NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes creating a service flow with an endpoint over a wireless link coupled to a backhaul; notifying a mobility anchor of a location associated with the endpoint; relaying control packets between the endpoint and an access gateway; and relaying bearer packets between the endpoint and the mobility anchor, where the bearer packets are exchanged with the endpoint over a locally terminated bearer tunnel and the bearer packets are exchanged with the mobility anchor using Proxy Mobile Internet Protocol. | 01-10-2013 |
20130163424 | SYSTEM AND METHOD FOR LOAD BASED OPTIMIZATION IN COMMUNICATION NETWORKS - Systems and methods for providing load based optimizations in communication networks are provided. A network device that provides network management and exchanges control messages with other network devices in the communication network can be modified to masquerade as a radio access transceiver to obtain radio access transceiver load information. The network device can be modified to include a radio-related interface and can communicate messages with the radio access transceivers to setup a radio access transceiver connection for exchange of load information. The radio access transceiver load information can then be used in the core network to provide optimizations for the loaded radio access transceivers. The optimizations can include modifying packet flows to decrease the bandwidth needed and switching one or more packet flows to another radio access transceiver. | 06-27-2013 |
20130163434 | SYSTEMS AND METHODS FOR GATEWAY RELOCATION - Network operators have deployed multiple network devices to provide stable data services amid a rapid increase in data traffic. One way to balance data load among the multiple network devices is by distributing the user equipments across the multiple network devices using an explicit detach with reattach required procedure. However, the explicit detach with reattach required procedure can disrupt on-going data services of user equipments. This disclosure provides systems and methods of an enhanced explicit detach with reattach required procedure that reduces disruption of on-going data services due to the explicit detach with reattach required procedure. | 06-27-2013 |
20130163463 | SYSTEMS AND METHODS FOR LOAD BALANCING IN CELLULAR NETWORKS AND WIRELESS LOCAL AREA NETWORKS - Network operators are striving to find ways to provide stable video services amid a rapid increase in video data traffic. In order to provide stable video services with constrained network resources, network operators attempted to deploy multiple communication networks in parallel. However, network operators failed to effectively balance data traffic across parallel communication networks. This disclosure provides systems and methods for effectively balancing data traffic across parallel communication networks. | 06-27-2013 |
20130210409 | SYSTEM AND METHOD FOR TUNING IN HETEROGENEOUS NETWORKS - A method is provided in one example embodiment and includes receiving a radio related message including derived information for a particular cell in a heterogeneous network; and changing one or more self-optimizing network parameters of a small cell in the heterogeneous network to attract user equipment, where the change can be based on the derived information. In more specific embodiments, the derived information is provided in a relocation command message. In addition, the derived information can include cell load information for a macro cell. Certain methodologies may include receiving small cell derived information for a plurality of small cells in the heterogeneous network; and increasing a plurality of self-optimizing network parameters of the plurality of small cells in the heterogeneous network to attract a plurality of instances of user equipment, the increase can be based, at least, on information within Radio Access Network Application Part (RANAP) messages. | 08-15-2013 |
20130223240 | MULTI-INTERFACE ADAPTIVE BIT RATE SESSION MANAGEMENT - Systems and method are provided that allow an application layer client in a mobile device to manage multiple interfaces in a communication network. The multiple interfaces can include WiFi, cellular, Femto, WiMAX, Bluetooth, infrared, Ethernet, and other types of interfaces for communication in a network. The client on the mobile device can use intelligence and rules to determine how and when request fragments are communicated over the various interfaces available to the client. The intelligence can include parameters such as performance information for a particular interface and subscriber preferences. Based on this information the client can decide to use a combination of the interfaces to obtain multimedia content and render the content for display on the mobile device. By using a combination of interfaces and tracking the advantages and disadvantages of each interface, the client can make intelligent decisions in providing multimedia content to the user. | 08-29-2013 |
20130223421 | SYSTEMS AND METHODS FOR SUPPORTING MULTIPLE ACCESS POINT NAMES FOR TRUSTED WIRELESS LOCAL AREA NETWORK - Systems and methods are provided for supporting multiple access point names for trusted wireless local area network (LAN.) In one method, the method includes receiving a packet at a mobile access gateway from a UE operating in a trusted wireless LAN, determining at the mobile access gateway an access point name (APN) associated with the received packet, and analyzing a binding update list (BUL) table to identify an IP address of the UE used by the determined APN. The method further includes modifying a source IP address of the received packet to the IP address of the UE used by the determined APN, and transmitting the packet to a home network associated with the APN. | 08-29-2013 |
20130232267 | SYSTEM AND METHOD FOR RESOURCE-BASED NETWORK POLICY CONTROL IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment that includes aggregating resource availability from a plurality of network elements operating in a network; receiving a request to apply a policy to a network flow propagating in the network; and orchestrating resources to apply the policy to the network flow based on the aggregated resource availability. In more particular embodiments, the policy includes a quality of service for the network flow. In addition, the policy can include relocating subscribers accessing common content from a first gateway to a second gateway. In other instances, the policy includes relocating resources for the network flow. | 09-05-2013 |
20130250761 | SYSTEM AND METHOD FOR MODIFYING MEDIA PROTOCOL FEEDBACK LOOP BASED ON MOBILE SYSTEM INFORMATION - Systems and methods for modifying a media protocol based on subscriber and network performance information is disclosed. Media protocols such as adaptive bitrate protocol can adjust bit rates based on conditions perceived at the mobile device and with a goal of obtaining the highest bit rate possible. The media protocols residing on the mobile device do not have access to network performance information that can change rapidly and impact the experience at the mobile device. For example, congestion, radio air link interference, handoffs, and quality of service parameters can all impact the experience a user has when accessing media files from a mobile device. The requests made by a mobile device can be modified to take into account these factors to enhance the user experience. | 09-26-2013 |
20130279337 | LOAD-BALANCED NSAPI ALLOCATION FOR iWLAN - In one embodiment, a load balancer receives a message from a tunnel termination gateway (TTG) associated with a mobile device. The load balancer may receive messages from a plurality of TTGs. A gateway node in a plurality of gateway nodes in which to send the message is determined. The load balancer then assigns a NSAPI for use by the gateway node. For example, the NSAPI may be associated with a tunnel that is generated between the TTG and GGSN. The load balancer ensures that the assigned NSAPI is not currently in use at the gateway node. Thus, no overlapping of NSAPIs may occur even though the load balancer is processing messages from multiple TTGs for multiple gateway nodes. | 10-24-2013 |
20140056130 | PROVIDING INTEGRATED END-TO-END ARCHITECTURE THAT INCLUDES QUALITY OF SERVICE TRANSPORT FOR TUNNELED TRAFFIC - A method is provided in one example embodiment and includes receiving a request associated with a flow over a wireless link, where the request specifies resource requirements for the flow. The method also includes mapping an Internet protocol (IP) flow description to a plurality of tunnel IP addresses, and mapping a framed IP address to an access point (AP) tunnel endpoint address in order to establish a quality of service (QoS) for tunneled traffic. | 02-27-2014 |
20140133300 | SYSTEM AND METHOD FOR MANAGING CONGESTION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes identifying an Internet protocol (IP) address for a serving gateway; establishing a link between the serving gateway and a congestion notification element; monitoring packets in order to identify whether a differentiated services code point (DSCP) bit has been set in the packets; determining that a threshold associated with congestion in a network has been exceeded; and communicating a signal to the serving gateway associated with the congestion. The serving gateway can be configured to correlate the congestion with identifiers associated with end users operating in the network, where the serving gateway communicates a signal to a network element to reduce the congestion. | 05-15-2014 |
20140169374 | SYSTEM AND METHOD FOR PROVIDING A TRANSLATION MECHANISM IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow identifier for the flow. The method includes associating the flow identifier and the tunnel identifier to an Internet protocol (IP) address to generate a binding to be used for a network address and port translation (NAPT). In other embodiments, a routing decision is executed based on the binding between the identifiers and the IP address. The flow identifier can be a context identifier (CID), and the tunnel identifier can be a softwire tunnel ID. In yet other embodiments, the packet can be tagged as part of an encapsulation operation, which includes providing information about a network location at which the network address and port translation is to be executed. | 06-19-2014 |
20140241316 | SYSTEM AND METHOD FOR HAND-IN DISAMBIGUATION USING USER EQUIPMENT WIFI LOCATION IN A NETWORK ENVIRONMENT - An example method is provided in one example embodiment and includes receiving a handover request from a first radio network to handover a user equipment (UE) to a second radio network, wherein the handover request includes an international mobile subscriber identity (IMSI) for a user associated with the UE and a pseudo cell identifier (ID); determining a target channel configuration for the UE using the pseudo cell ID; querying a third radio network using the user IMSI to determine a location of the UE, wherein at least one access point in the third radio network is in communication with the UE; and selecting a particular target access point in the second radio network for handover of the UE based, at least in part, on the location of the UE, the target channel configuration for the UE and a location of the particular target access point. | 08-28-2014 |