会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Apparatus and Method for Handover in a Communication System
    • 在通信系统中切换的装置和方法
    • US20100304748A1
    • 2010-12-02
    • US12767140
    • 2010-04-26
    • Tero HenttonenLars DalsgaardJarkko T. Koskela
    • Tero HenttonenLars DalsgaardJarkko T. Koskela
    • H04W36/00
    • H04W36/0077
    • An apparatus, method and system for providing management and execution of handover or redirection of user equipment in a communication system. In one embodiment, the apparatus includes a processor and memory including computer program code. The memory and the computer program code are configured to, with the processor, cause the apparatus to receive a command from a source base instructing the apparatus to decode a physical downlink control channel associated with a target base station, and determine if a cell radio network temporary identifier from the source base station matches an assigned cell radio network temporary identifier on the physical downlink control channel from the target base station.
    • 一种用于在通信系统中提供用户设备的切换或重定向的管理和执行的装置,方法和系统。 在一个实施例中,该装置包括包括计算机程序代码的处理器和存储器。 存储器和计算机程序代码被配置为与处理器一起使设备从源基站接收命令,指示设备解码与目标基站相关联的物理下行链路控制信道,并且确定小区无线电网络 来自源基站的临时标识符与来自目标基站的物理下行链路控制信道上的分配的小区无线电网络临时标识符相匹配。
    • 5. 发明申请
    • Forbidden Tracking Area Optimization For Private/Home Networks
    • 私人/家庭网络的禁止跟踪区域优化
    • US20120190335A1
    • 2012-07-26
    • US13330787
    • 2011-12-20
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • H04W12/06
    • H04W48/04H04J11/0086H04W8/26H04W48/12H04W84/045
    • Access verification is adaptively done using an identifier of a first or a second length, by comparing a field of a node address that has the determined first or second length against a locally stored access list. At least the compared field of the node address is either added to a locally stored list of cell selection candidate nodes where the access list is allowed identifiers, or excluded from it where the access list is restricted identifiers. The node identifier is in three sections. The first section is service type, which the UE can use to determine whether or not it is restricted/allowed. The first length is the length of the second section, which is a service area ID of a group of network nodes. The second length is the length of the second section plus the third section, which identifies one node of the group of network nodes.
    • 通过将具有确定的第一或第二长度的节点地址的字段与本地存储的访问列表进行比较,使用第一或第二长度的标识符自适应地进行访问验证。 至少将节点地址的比较字段添加到本地存储的小区选择候选节点的列表中,其中访问列表被允许标识符,或从其中被排除在访问列表是受限标识符的情况下。 节点标识符分为三个部分。 第一部分是服务类型,UE可以使用它来确定它是否被限制/允许。 第一个长度是第二个部分的长度,它是一组网络节点的服务区域ID。 第二长度是第二部分的长度加上第三部分,其标识该组网络节点的一个节点。