At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Wireless communication system having mobility-based content delivery
A portable subscriber access unit includes a wireless transceiver and a processor. The processor controls the transceiver, determines a mobility state of the...
M2M gateway collocated with a base station using a CPRI connection
A system may include a machine-to-machine (M2M) gateway. The M2M gateway may receive M2M information associated with an M2M application. The M2M gateway may...
Method for optimizing the capabilities of an ad hoc telecommunication
A method is provided for optimizing the adaptation of communication routes in a network consisting of wireless communication nodes, with transfer of information...
System and method for buffer status reporting for multi-stream aggregation
Embodiments are provided herein for enabling buffer status reporting for Multi-stream aggregation (MSA) in wireless networks. In an embodiment, a user equipment...
Wireless communication terminal and communication method for measuring a
channel quality indicator (CQI)
To measure the channel quality of the own cell accurately in a condition where there is no interference from a neighbor cell. A wireless communication terminal...
Pocket-size PIM inspector
A method for detecting passive intermodulation (PIM) using a PIM analyzing device is provided. The PIM analyzing device transmits two signals comprising first...
Radio communication system, interference measurement method, radio base
station apparatus, and user terminal
The present invention is designed to provide a radio communication system, an interference measurement method, a radio base station apparatus, and a user...
Neighbor cell interference estimation
A system for estimating interference on a cellular network includes a processor and a non-transitory computer readable medium with computer executable...
Method of processing network configuration data
A method and system for comparing network configuration data stored in a wireless communication network with parameters that depend on the physical...
Determination of download throughput of wireless connection with compound
Technologies are generally described to determine a download throughput of a wireless connection in an environment hosting multiple wired and wireless...
Methods, systems, and computer readable media for determining a metric of
radio frequency channel quality for...
Methods, systems, and computer readable media for determining a metric of radio frequency channel quality for idle channels are disclosed. One method includes...
Cell and evolved node B station outage restoration tool
During scheduled or unscheduled wireless communication outage, restoration of crucial or critical cell site devices and/or base station device are prioritized....
Technique for evaluating events in a telecommunication network
A technique for evaluating events in a telecommunication network based on an occurrence of a plurality of the events in the telecommunications network is...
Self-optimizing network (SON) system for mobile networks
A device receives subscriber records for mobile devices associated with a mobile network, and receives performance data associated with the mobile network in...
Integrated circuit for radio transmission of ACK/NACK signal
It is possible to improve the CQI reception performance even when a delay is caused in a propagation path, a transmission timing error is caused, or a residual...
Systems and methods for receiver based clear channel assessment
Systems, methods, and devices for performing clear channel assessment at a receiving device are described herein. In some aspects, the receiving device...
Adaptive beamforming techniques in long term evolution networks
Systems, methods, and computer-readable media for providing adaptive beamforming techniques in LTE networks are provided. In embodiments, the method includes...
Method and apparatus for planning base station controllers in a wireless
A method and apparatus for providing planning of a plurality of base station controllers in a wireless network are disclosed. For example, the method obtains...
System and methods for obtaining ubiquitous network coverage
Implementations described and claimed herein provide a system and methods for determining a minimum number of communication nodes to substantially cover a...
Link adaptation method supervised by the selection of an interference
The invention relates to a link adaptation method for a cellular or heterogeneous wireless telecommunications system. The communications of the system are...
Method and apparatus for providing user equipment access to TV white space
resources by a broadband cellular...
A broadband cellular network (BCN) provides a user equipment (UE) access to TVWS resources. The BCN authorizes the UE to access TVWS resources by conveying a...
System and method for detecting anomaly in a handheld device
The inventive subject matter of the present disclosure provides a system and method for detecting anomalies in a handheld device based on a plurality of...
Mobile end-user device with agent limiting wireless data communication for
specified background applications...
Mobile end-user devices are disclosed having a stored network access policy, applicable to specific applications stored on and executable by the device. The...
Access control lists and profiles to manage femto cell coverage
Access to femto cell service can be managed through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber...
Continuous user authentication tool for mobile device communications
A user authentication tool continuously authenticates the user of a mobile device during an electronic communication session. A trusted user profile includes...
Access network assisted bootstrapping
The Generic Bootstrapping Architecture is used in a method for assigning the bootstrapping transaction ID so that a machine-to-machine server or other device...
Authentication for relay deployment
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or...
Method and apparatus for self-activating a mobile device
To activate a pre-provisioned mobile device on a network, an initial data communication for device activation is allowed between the device and an ...
Call center SMS verification system and method
A service call between a service user and a call center for a service provider is established when the service user is contacted or calls into the call center...
Method and apparatus for handling closed subscriber groups in
A method and an apparatus for handling closed subscriber groups in a relay-enhanced system are provided in the invention. The method includes: retrieving...
System and method for computer authentication using image analysis of a
Client and server computers on a network can be authenticated using a shared secret. During a log-on and authentication process, the server transmits an image...
The present invention relates to at least a method of authenticating a user in a communication network including contacting an authentication entity in a first...
Processing electronic messages wirelessly sent to a vehicle
A processing system and method for controlling the distribution of certain types of electronic messages, such as SMS messages, instant messages, emails, etc.,...
Systems/methods of conducting a financial transaction using a smartphone
Embodiments of inventive concepts are provided wherein a mobile device, such as a smartphone, may be configured to communicate with a base station, using a...
Securely joining a secure wireless communications network
Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless...
Communication system, communication unit, and communication method
This communication system ensures the security of a communication message with a low computational load. Communication units are capable of exchanging a...
Wireless communications system
A wireless communications system that regularly executes verification between an electronic key and an immobilizer ECU, and sends and receives deletion request...
Security handling for multi frequency band
Systems, methods, apparatuses, and computer program products for security handling in, for example, cells that support multiple frequency band indication are...
Authenticating environmental sensor systems based on security keys in
Systems, methods, and software for operating environmental sensor systems are provided herein. In one example, a method is provided that includes monitoring...
Handoff at an ad-hoc mobile service provider
An ad-hoc service provider is configured to support pre-authentication with a server for the purpose of receiving a handoff of a mobile client from another...
System and method for privacy-enabled mobile locator services with dynamic
A method and system for managing awareness information relating to a mobile device's visibility with respect to other buddy devices, the system comprising; the...
Shared secret for wireless devices
In some examples, a device may include a communication interface configured to exchange signals with another device, and a computing component configured to...
Secured application communications
Examples disclosed herein provide systems, methods, and software for initiating communication for a secured application. In one example, a method for initiating...
Method and apparatus for controlling updates to a mobile device
The present invention discloses a method and apparatus for controlling updates to a mobile device consisting of checking a ROM installation package and storing...
Base station, user equipment and methods therein
Embodiments herein relate to a method in a base station (12) for providing feedback to a user equipment (14) for transmissions of a secondary stream out of a...
Methods for providing serving network information and communications
apparatuses utilizing the same
A communications apparatus is provided. A processor is coupled to a subscriber identity card and a radio transceiver module. The subscriber identity card camps...
Method and apparatus to manage user/device profiles for public safety
A method and a profile manager for managing user and device profiles for response to one or more incidents include monitoring inputs related to one or more...
Method and system for IP multimedia bearer path optimization through a
succession of border gateways
A method for identifying alternative end-to-end media paths through Internet protocol realms using substitute session description protocol parameters is...
Method and apparatus for voice over LTE
According to at least one example embodiment, a transit network is configured to handle signaling messages between service provider networks. Upon receiving, at...
Method, system and apparatus for accessing a visited network
The present application relates to a user accessing to a visited network in a wireless telecommunication network. After receiving an access request from the...