Zongrui Ding
Zongrui Ding, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20130203394 | METHOD AND APPARATUS TO SUPPORT M2M CONTENT AND CONTEXT BASED SERVICES - Devices, computer readable media, and methods for supporting services at an application service layer (ASL) are disclosed. The ASL may be a machine-to-machine (M2M) services capability layer (SCL). Content functions may interpret the data to generate a semantic description of the data. Semantic information associated with data may be stored. Context aware functions may process the semantic description of the data to generate lower level contextual cues. Context aware reasoning functions may process the lower level contextual cues to deduce higher level context. An application or a second ASL may use the contextual cues and the situational context to trigger an action. The ASL may create a trigger condition based on a received message. The ASL may invoke a function based on detecting a trigger condition. The ASL may perform a command based on a received command. The ASL may use a objective function and feedback to control a device. | 08-08-2013 |
20130279373 | METHOD AND APPARATUS FOR PROVIDING AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM TRIGGERING SERVICE - A method and apparatus are described for providing triggering services over multiple access networks. A triggering service server (TSS) architecture includes a triggering identity function (TIF) which maintains a database of device and application identifier mappings across multiple access networks, triggering capabilities and triggering preferences. The TSS also includes a triggering decision function (TDF) that uses information from the TIF and determines how triggers should be performed towards a device and/or an application hosted on a particular device. The TSS also includes triggering gateways (T-GWs) that perform triggering in different domains. A “not-registered-triggerable” state may be used to indicate whether an entity, such as a device, application or user can receive triggers although it is not registered in a specific access network. Methods and apparatus are also described for implementing various unassisted triggering and assisted triggering procedures using wireless transmit/receive units (WTRUs), application servers (ASs) and service capability servers (SCSs). | 10-24-2013 |
20140067902 | METHOD AND APPARATUS FOR USING MULTIPLE UNIVERSAL RESOURCE IDENTIFIERS IN M2M COMMUNICATIONS - A method and apparatus may use multiple URIs (MU) in a single request message for machine-to-machine (M2M) communication networks. Multiple single URI (SU)-type request messages may be received from an application client (e.g. a constrained application protocol (CoAP)/hypertext transfer protocol (HTTP) client) at a (CoAP/HTTP) intermediary node. The multiple SU-type request messages may be aggregated into a single MU-type request message at the intermediary node, and the single MU-type request message may be transmitted to a (CoAP/HTTP) server. A multiple value (MV)-type response message may be received from the (CoAP/HTTP) server. The MV-type response message may be deaggregated into multiple single value (SV)-type response messages. The multiple SV-type response messages may be transmitted to the (CoAP/HTTP) client. | 03-06-2014 |
20140372774 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 12-18-2014 |
20140372775 | Context And Power Control Information Management For Proximity Services - Management of context and power control information enables different power control schemes for point-to-point or point-to-multipoint based on proximity services or applications. Context information may be defined as situation data about a service or application that is used to help define a power control scheme to be implemented. Power control information may be defined as control or status data for power control, which can be used for reporting or controlling the transmitting power of a peer in a P2P network. Context and power control information may be managed across multiple layers such as the application layer, service layer, media access control layer, or physical layer. Context and power control information is updated and exchanged between or among peers for context-related power control in proximity services. | 12-18-2014 |
20140376521 | Cross-Layer And Cross-Application Acknowledgment For Data Transmission - Systems and methods may integrate acknowledgments, such as application-level acknowledgments and medium access control layer acknowledgments. In an embodiment of a cross-layer acknowledgment method, a medium access control layer acknowledgment and application-layer acknowledgment may be integrated as a single medium access control layer acknowledgment. In an embodiment of a cross-application acknowledgment method, an application-layer acknowledgment for a first application and application-layer acknowledgment for a second application may be integrated into a single medium access control layer frame. | 12-25-2014 |
Zongrui Ding, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20140379804 | CONTEXT MANAGEMENT - Systems, methods, and apparatus embodiments are described herein for context information management at the medium access control layer. In one embodiment, a system comprises a plurality of peers which communicate via peer-to-peer communications. In the system, context information may be exchanged at the MAC layer. Examples of context information include, without limitation, location information, mobility information, device capability, user information, an application category, multi-hop information, a channel condition, application information, association identifiers, and device information. Each of the plurality of peers may include a context manager that resides on each peer device. For example, a first context manager that resides on a first peer of the plurality of peers may exchange context information with a second context manager that resides on a second peer of the plurality of peers. In another example embodiment, the first peer, and in particular the first context manager that resides on the first peer, can retrieve the context information from a layer that is different than the MAC layer. | 12-25-2014 |
20150019717 | CONTEXT-AWARE PROXIMITY SERVICES - Disclosed herein are a variety of systems, operations, MAC primitives, and procedures for context-aware Peer-to-Peer communications and multi-application Peer-to-Peer communications. An example system for a context-aware Peer-to-Peer communications system may include a physical and Medium Access Control (PHY/MAC) layer and an upper layer above the PHY/MAC layer. The PHY/MAC layer may include at least one of a discovery function, an association function, a data transceiving function, a channel management function, a general scan function, a synchronization function, a power control function, or management and reporting function. The upper layer may be one of a service layer or an application layer. | 01-15-2015 |
20150023164 | Capillary Device Charging - When a capillary network device connects to user equipment and the user equipment establishes or modifies a bearer to support traffic from the capillary device, the user equipment may request that the network provide some indication that the user equipment will not be charged for the traffic. The network may indicate to the user equipment that the flow is sponsored or that the user equipment will otherwise not be charged for the flow. Existing messages between a UE/GW, P-GW, PCRF, and an application server (AS) may be modified and new messages may be used so that the user equipment can request a guarantee of sponsorship or of non-charging and so that the AS may indicate to the user equipment that the flow is sponsored. The messaging can also be used by user equipment on its own behalf. | 01-22-2015 |