832 patents
Page 5 of 42
Utility
User Charging Over an Exposure Function In a Wireless Communication Network
23 Nov 23
A Network Exposure Function (NEF) charges a user for a wireless data service.
Lyle Walter Paczkowski
Filed: 2 Aug 23
Utility
Network Service Continuity In Ip Multimedia Subsystem Layer
23 Nov 23
Methods, media, and systems are provided for continuity of a telecommunications network service in an IP Multimedia Subsystem (IMS) layer providing telecommunications network services to devices located on an island.
Harikishore Allu Balan, Saqib Badar, Shujaur Rehman Mufti
Filed: 20 May 22
Utility
Automated Discovery Schedules for Telecommunication Service Networks
23 Nov 23
Methods, media, and systems are provided for automated discovery schedules for telecommunication networks associated with a particular provider.
Marcus David Fly
Filed: 23 May 22
Utility
Handover based on wireless user equipment (UE) capabilities
21 Nov 23
A source wireless access node handsover a wireless User Equipment (UE) to a target wireless access node based on UE capability.
Sreekar Marupaduga
Filed: 13 Oct 22
Utility
Variable downlink configurations for co-located and non-co-located base stations
21 Nov 23
Methods and systems are provided for modifying a downlink configuration of a user device in a cell to mitigate interference.
William M. Shvodian
Filed: 10 May 21
Utility
Electronic subscriber identity module (eSIM) profile provisioning
21 Nov 23
A method of provisioning a mobile communication device with an eSIM profile.
Dhananjay Indurkar
Filed: 30 Aug 22
Utility
Methods and Systems for Efficient Data Importation for Data Visualization
16 Nov 23
A method comprises storing, at a storage bucket of the communication system, an import file received from a client application at a workstation, wherein a user defined function of the communication system is triggered to execute when the import file is received from the workstation, retrieving, by the user defined function, the import file from the storage bucket, processing, by the user defined function, the import file to obtain a geospatial file, storing the geospatial file in a cloud database of the communication system, fetching, by an application of the communication system, the geospatial file from the cloud database, and generating, by a visualization application of the communication system, the multilayer geographical virtualization based on the geospatial file fetched from the cloud database.
Jeny Bhimani, Taha Lahrichi, Farrah Young Lee, James Byung Ha No
Filed: 10 May 22
Utility
Automated Management of Uplink Technologies for Optimal Experience
16 Nov 23
Systems and methods are provided for centralized uplink technology control.
Ming Shan KWOK, Wafik ABDEL SHAHID, Mehmet HINC
Filed: 10 May 22
Utility
Enhanced Selective Attestation of Wireless Communications
16 Nov 23
Methods, media, and systems are provided for enhanced selective attestation of wireless communications.
Homer Nicolas B Filart
Filed: 13 May 22
Utility
Optimization Of Device Configuration Relating To Wireless Access Technologies
16 Nov 23
The technology described herein improves management of the optimization of a device configuration associated with one or more wireless communication technologies.
Raymond Emilio Reeves
Filed: 10 May 22
Utility
5G New Radio (NR) Time Division Duplexing Frame Structure Management for Heavy Uplink Traffic Site
16 Nov 23
According to aspects herein, methods and systems for time division duplexing (TDD) management in New Radio (NR) are provided.
Mochamad Mirza
Filed: 10 May 22
Utility
Uplink Power Management for Extended Range Communication
16 Nov 23
Systems and methods are provided for managing maximum uplink transmission power of a UE.
Shahzad Bashir
Filed: 11 May 22
Utility
Methods and systems for ledger based content delivery using a mobile edge computing (MEC) server
14 Nov 23
A method comprises receiving a blockchain comprising instructions for decompressing and reassembling media content stored at a storage system in the system, wherein a first block of the blockchain comprises data describing a compression scheme performed on a plurality of media packages associated with the media content, and wherein a second block of the blockchain comprises data regarding reassembly and rendering of the media packages to generate a render of the media content, decompressing media packages associated with the media content based on the data describing the compression scheme carried in the first block of the blockchain, reassembling the media packages to generate the render of the media content based on the data regarding reassembly and rendering of the media packages carried in the second block of the blockchain.
Lyle W. Paczkowski, George Jason Schnellbacher
Filed: 8 Jul 22
Utility
Multi-level access distributed ledger system
14 Nov 23
A method of providing read access to information stored in a distributed ledger.
Mark R. Bales, Lyle W. Paczkowski
Filed: 25 Jun 21
Utility
Distributed computing across a wireless communications network
14 Nov 23
A method for distributing computations across a network is described.
Zheng Cai
Filed: 22 Jul 21
Utility
Variable Port Mapping Configurations for Beamforming In Antenna Arrays
9 Nov 23
Systems, methods, and computer-readable media herein modify the configuration of one or more antenna elements of an antenna array based on signal quality information associated with one or more UE devices.
Sanghoon SUNG, Udit Anilbhai Thakore
Filed: 17 Jul 23
Utility
Precise Location-Based Routing of Calls
9 Nov 23
Systems and methods are provided for precise location-based routing of calls.
Patrick James O'Gallagher, Dennis Romero, Adriano Santos
Filed: 3 May 23
Utility
Quantum Authentication In Wireless Communication Networks
9 Nov 23
A wireless communication network generates and transfers qubits to a wireless user device.
Marouane Balmakhtar, Lyle Walter Paczkowski
Filed: 28 Jun 23
Utility
Silent Voice Over Ip Denial of Service - Repetitive Call Setup and Hang Up from an Attacker
9 Nov 23
Systems and methods for preventing a denial-of-service attack at a victim agent of a telecommunication network include a victim agent and a session management system communicatively coupled to the victim agent and an attacker agent.
Jean-Luc Rene BOUTHEMY
Filed: 4 May 22
Utility
Ghost Call Vulnerability During Call Setup Silent Voice Over Ip Denal-of-service
9 Nov 23
Systems and methods for detecting and preventing a denial-of-service attack at one or more victim agents of a telecommunication network include one or more session management systems communicatively coupled to one or more attacker agents.
Jean-Luc Rene BOUTHEMY, Khurram Ahmad MIRZA
Filed: 4 May 22