CPC Definition - Subclass H04W
This place covers:
- Communication networks deploying an infrastructure for mobility management of wireless users connected thereto, e.g. cellular networks, wireless LANs.
- Self organizing wireless communication networks, e.g. ad-hoc networks.
- Wireless access networks e.g. Wireless Local Loop.
- Said networks being used for selectively establishing one or a plurality of communication links between a desired number of users or between users and network equipments for the purpose of transferring information via these communication links.
- Arrangements or techniques for planning, deploying wireless networks.
- Arrangements or techniques specially adapted for wireless service provisioning.
- Arrangements or techniques specially adapted for wireless network operation.
This place does not cover:
Attention is drawn to the following places, which may be of interest for search:
Arrangements for programme control, e.g. control unit | |
Wireless sensing of record carriers | |
Signalling or calling systems | |
Traffic control systems | |
Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving | |
Spread spectrum techniques in general | |
Near-field transmission systems, e.g. inductive loop type | |
Control of transmission; Equalising | |
Diversity systems | |
Space-based or airborne stations | |
For communication between two or more posts at least one of which is mobile | |
Transmission systems employing electromagnetic waves other than radio waves | |
Transmission systems employing sonic, ultrasonic or infrasonic waves | |
Transmission systems characterised by the medium used for transmission | |
Multiplex communication | |
Arrangements for detection or preventing errors in the information received | |
Arrangements affording multiple use of the transmission path | |
Arrangements for synchronising receiver with transmitter | |
Cryptographic protocols | |
Data switching networks | |
Modulated-carrier systems | |
Network security protocols | |
Media handling, encoding, streaming or conversion | |
Network protocols for data switching network services | |
Telephonic communication | |
Telephonic substation equipment | |
Telephonic automatic or semi-automatic exchanges | |
Metering arrangements; Time controlling arrangements; Time- indicating arrangements | |
Prepayment telephone systems | |
Arrangements using wireless links for the sole purpose of telecontrol or telemetry systems |
In this place, the following terms or expressions are used with the meaning indicated:
Access point | means an equipment providing wireless user access to a backbone network by terminating a radio link. |
BSC | Base Station Controller |
BTS | Base Transceiver Station |
Backbone network | designates equipment(s) for connecting one or several wireless access points to a wired or wireless infrastructure in order to allow communication(s) between users' inside or outside the wireless network. |
Care-of-address | designates the termination point of a tunnel toward a mobile node, for datagrams forwarded to the mobile node while it is away from home. |
Cellular | an infrastructure deployment involving partitioning geographical areas in a plurality of sub-areas (cells) for the purpose of reusing wireless resources. |
Communication link | means a physical or logical connection selectively established for the purpose of conveying messages or information between users or networks. |
Connection | means network resource(s) allocated or reserved for an affiliated user. |
Connected state | designates the state of a user/terminal having active i.e. allocated logical traffic/control channel, dormant or suspended, i.e. without allocated logical channels but with maintained service instances. It also incorporates context (PDP context), User Plane, Control Plane operations. |
Control channel | transports control information used to control the function of the network element. ("signalling channel", e.g. paging channel, broadcast channel, pilot channel). |
Core network, CN | 3GPP standard terminology. PLMN architecture is divided into Core Network (CN) and Access Network (AN). Whereas Access Network comprises GERAN (BSS for GSM), UTRAN (RNS) and E-UTRAN, Core Network is logically subdivided into a Circuit Switched (CS) domain, a Packet Switched (PS) domain and an IP Multimedia (IM) subsystem. |
Correspondent node | a peer with which a mobile node is communicating. A correspondent node may be either mobile or stationary. |
Data network PoA [Point of Attachment] | entity within wireless network or mobility management infrastructure providing access to a data network for a wireless user. |
Direct mode | establishing a direct communication link between user/terminal; the link can be established using an intermediate node. |
Domain;CS domain, PS domain | 3GPP standard terminology. Circuit Switched domain (CS domain) refers to the set of all core network entities offering "circuit switched type of connection" for user traffic and for the related signalling. Dedicated network resources are allocated at connection establishment and released at connection release. Entities specific to the CS domain are: MSC, GMSC, VLR. The Packet Switched domain (PS domain, Packet domain) refers to the set of all core network entities offering "packet switched type of connection" for user traffic and for supporting the related signalling. Transports user information using autonomous concatenation of bits called packets: each packet can be routed independently from the previous one. PS domain includes General Packet Radio Service (GPRS) and Evolved Packet Core (EPC). Entities specific to the PS domain are: SGSN, GGSN, PDN GW, S-GW, MME, SGSN. CS and PS domains also have common network entities: e.g, HSS, HLR |
Downlink | means the wireless link from a wireless access point or network towards the user or terminal equipment (see also "uplink"). |
Fixed allocation (of a dedicated resource) | allocation of a resource that is not changed with each frame or time slot. It is also named "persistent or semi-persistent scheduling". |
Hand-off, handover | a change of radio link or data network point of attachment, while a connection is ongoing. |
Home network | designates the network performing functions at a permanent location regardless of the location of the user's access point. The home network is responsible for subscription information management and for specific services not provided by the serving network; dedicated equipment used therefore is designed by HLR (Home Location Register); also Home Agent, Home Subscriber Server. |
Idle state | designates the state of a user/terminal having no active traffic/control channel and no active service instances but being affiliated to the network. (See also "null state") |
Mobility binding | designates the association of a home address with a care-of address, along with the remaining lifetime of that association. |
Mobility data | information obtained by the network or exchanged by network components, in particular user affiliation or location data, to be used in providing a network service |
Mobility management | designates techniques or arrangements allowing operation of, or services to be provided to, a user capable of selecting or changing his point of attachment to the network. |
Mobility server | A network functional entity acting as an established reference point in location registration operations by (or on behalf of) a mobile user/terminal. |
Mobile node | designates a host or router that changes its point of attachment from one network or subnetwork to another, without changing its constant home IP address. |
Multi-call | means a plurality of communication links established over one or a plurality of networks for transferring information to one user/terminal. |
Multiplexing | sorting packets of flows onto one or several channels in time, frequency, code and space division. better or space division. |
Network | means the physical or logical entities involved in providing communication services to users. |
Network security | (see Tanenbaum) roughly means the four intertwined areas: secrecy, authentication, nonrepudiation and integrity control for a interconnected collection of autonomous nodes, e.g, computers |
Null state | designates the state of a user/terminal having no active traffic/control channel and no active service instances. |
Originating | means a user/terminal acting as a requester for communication towards a wireless access point. |
Packet domain PLMN backbone network | The 3GPP standard terminology defines two kinds of packet domain PLMN backbone networks: The intra-PLMN backbone network is the IP network comprising routers interconnecting ps domain(s) within the same PLMN. The inter-PLMN backbone network is the IP network comprising routers interconnecting ps domain(s) of different PLMNs. |
Paging | Notifying a terminating user of a communication event. |
Paging service | one-way selective calling service. |
Partitioning | means distributing/committing specific resources to a particular/specific network component. |
Polling | questioning for needed transmission resources and according instant allocation for immediate transmission. |
Private networks | designates networks owned and operated by non-public authorities. |
QoS | Quality of Service |
Resource allocation | means allocation of a resource to a communication. |
Resource distribution | means committing a resource to an entity for future allocation thereof for communication. |
RNC | Radio Network Controller |
Scheduling | means establishing an order of transmission of communication information based on precedence or priority policies. |
Scheduled access | access to a wireless resource follows a schedule or os performed in a defined order. |
Scheduled allocation | resource allocation is continuously changed or adapted during a connection according to a transmission schedule. This requires the usage of a shared channel. |
(semi-) persistent scheduling | allocation of resources that is persistent for a number of (consecutive) time slots or frames according to a transmission schedule. This requires the usage of a shared channel. |
Serving network | designate the part of the network to which the access point providing user's access is connected. The serving network is responsible for path finding and transport of users data; dedicated equipment used therefore is designed by VLR (Visitor Location Register; also Foreign Agent, Visiting Subscriber Server. |
SLA | Service Level Agreement |
Subscriber | means an entity recognized and authorized as user. |
Terminal | means the equipment acting as/or on behalf of a user. |
Terminating | means a user/terminal specified as a recipient for communication from within or via a wireless network. |
Tracking | monitoring a user or terminal activity in the network for purposes of gathering, e.g. location, activity or status information. |
Traffic channel | transports communication information (user data) to and from one or several users. |
Trigger, triggering | the act of initiating an action. This could be caused by certain criteria or events or involve the exchange of information. |
(transmission) scheduling | defines an order of transmission of one or several data flows in time, frequency, code and space dimension. |
Uplink | means the wireless link from the user or terminal equipment towards a wireless network or access point (see also "Downlink"). |
User | means an entity acting as an information source (sender, transmitter, server) or information sink (recipient, receiver, client). |
Wireless extension | means equipment using a pre-defined dedicated wireless link. |
Wireless link | means a communication link established via radio, infrared, inductive or other electromagnetic radiation. |
Wireless resource | means a communication link using a specific frequency, time, code or space (or combination thereof). |
Zoned | designates an infrastructure deployment involving partitioning geographical areas in a plurality of sub-areas (zones, cells) for the purpose of reusing wireless resources. |
This place covers:
Providing wireless communication services by or via one or a plurality of network equipment to one or a plurality of affiliated user or terminal equipment.
Attention is drawn to the following places, which may be of interest for search:
Wireless network security | |
Charging, metering arrangements | |
Broadcast or conference in data switching networks | |
Message switching systems | |
Network arrangements or protocols | |
Network architectures or network communications | |
Network arrangements or protocols in real time | |
Network arrangements or communication protocols for networked applications | |
Application independent communication protocol aspects | |
Telephonic communication, substation extension arrangements, cordless telephones, portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status | |
Telephonic communication systems providing special services or facilities to subscriber |
In this place, the following terms or expressions are used with the meaning indicated:
Affiliated | means a user or terminal being recognized by a network and/or authorized to use network resources |
Attention is drawn to the following places, which may be of interest for search:
Resource management for broadcast services | |
Connection management for selective distribution or broadcast |
Attention is drawn to the following places, which may be of interest for search:
Connection management for Push-to-Talk [PTT] or Push-to-Talk over cellular [PoC] services | |
Arrangements for real-time multimedia Push-to-X-Services |
This place covers:
Managing network data, e.g. storing, updating, transferring, obtaining or exchanging operation data, mobility data, user service data or terminal service data.
This place does not cover:
Connection management, e.g. connection set-up, manipulation or release. |
This place covers:
(RE-)scanning for and (re-)discovery of terminals or devices; inquiry methods
Attention is drawn to the following places, which may be of interest for search:
Connectivity information management, e.g. connectivity discovery or update | |
Discovering, processing access restriction or access information | |
Network service discovery by a Service Manager | |
Discovery or management thereof, e.g. service location protocol [SLP] or web services | |
Network services indicating network or usage conditions on the user display |
This place covers:
Processing, e.g. storing, updating of mobility data; Transfer of mobility data.
Attention is drawn to the following places, which may be of interest for search:
Network layer protocols, e.g. mobile IP [Internet Protocol] |
This place covers:
Registration of user or terminal affiliation or location information.
This place covers:
Temporary or semi-permanent registration of user or terminal mobility data at a user mobility server not being the permanent reference point for mobile data queries.
This place covers:
Selecting a user mobility server for registration.
This place covers:
Transfer of mobility data, e.g. to network components or external parties.
This place covers:
Transfer of mobility data to forward traffic data directly to the mobile node without having to detour traffic data through the home network e.g. route optimization, local breakout
This place covers:
Transfer of mobility data in a network, wherein mobility servers are hierarchical components of a mobility management scheme.
This place covers:
Transfer of mobility data on the basis of a localised network-based mobility management scheme, where the user terminal preserves its data network address, e.g. HAWAII and NETLMM.
Attention is drawn to the following places, which may be of interest for search:
Modification of an existing route due to handover |
This place covers:
Transfer of mobility data between external networks and a location register or mobility server, e.g. HSS.
Attention is drawn to the following places, which may be of interest for search:
Interfaces specially adapted for wireless communication networks, inter-networking arrangements |
This place covers:
Transfer of mobility data between location registers or mobility servers e.g. for the purpose of sharing the load between mobility servers, or for supporting roaming.
Attention is drawn to the following places, which may be of interest for search:
Interfaces specially adapted for wireless communication networks, interfaces between backbone network devices |
This place covers:
Transfer of mobility data between corresponding nodes,e.g. among communicating users or terminals.
Attention is drawn to the following places, which may be of interest for search:
Interfaces specially adapted for wireless communication networks, interfaces between hierarchical similar devices |
This place covers:
Selectively restricting the tracking of mobility data by the network or user, e.g. restricting the transmission of affiliation or location information,or restricting the transfer of tracking information.
This place covers:
Processing or transferring of user data, e.g. storing, updating, deleting, and transferring user profiles, service data, and preferences; Processing or transferring of subscriber data, e.g. data concerning subscribed services, subscriber profiles.
Storage arrangements therefore including dedicated record carriers.
This place does not cover:
Devices for signalling identity of wanted subscriber with provision for storing more than one subscriber number at a time using static electronic memories |
Attention is drawn to the following places, which may be of interest for search:
Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation | |
Profiles in network data switching protocols |
This place covers:
Processing, e.g. storing, updating, deleting, at user equipment or record carrier; logical bundling of record carrier and subscriber equipment, e.g. SIM-lock.
Attention is drawn to the following places, which may be of interest for search:
Fraud detection as security arrangement |
This place covers:
- Affiliation of subscribers to a group
- De-affiliation of subscribers from a group
- Creation and administration of subscriber groups
- Transfer, processing, and update of subscriber group information
This subgroup covers all kinds of subscriber groups.
Network addressing or numbering for mobility support | |
Self-organizing networks, e.g. ad-hoc networks or sensor networks |
This place covers:
Arrangements for transfer of user data or subscriber data, e.g. between network databases, subscriber equipment or between network databases and authorized 3d parties.
This place covers:
Transfer is performed to or from user equipment or between user equipment and user record carrier.
This place covers:
Processing terminal data, e.g. storing, updating, deleting.
Transferring terminal data, e.g. data related to condition, physical capabilities. Transferring terminal status, e.g. lost, stolen.
This place does not cover:
Devices for signalling identity of wanted subscriber with provision for storing more than one subscriber number at a time using static electronic memories |
Attention is drawn to the following places, which may be of interest for search:
Allocation plan definition, set-up or creation based on terminal or device properties | |
Proprietary protocols involving control of end-device applications |
This place covers:
Transfer of terminal data, e.g. between network and terminal equipment.
Attention is drawn to the following places, which may be of interest for search:
Programme loading or initiating G06F 9/445; Power saving arrangements H04W 52/02; De-registration or Detaching | |
Portable communication terminals with means for supporting locally a plurality of applications to increase the functionality provided by software upgrading or downloading |
This place covers:
Transfer of terminal data from a network towards a terminal, e.g. downloading terminal equipment software, remotely activating or deactivating terminals.
Attention is drawn to the following places, which may be of interest for search:
Protocols for network applications involving the movement of software and/or configuration parameters | |
Cordless phones with means for supporting locally a plurality of applications to increase the functionality provided by software upgrading or downloading |
This place covers:
Allocating address(es) to network components, services or other logical entities,for the purpose of handling mobility or establishing communication(s) using said address(es);
De-allocating, reclaiming of address(es); Action(s) making use of addresses.
Attention is drawn to the following places, which may be of interest for search:
Assignment or use of connection identifiers when establishing a connection | |
Address allocation involving portability aspects in data networks | |
Additional connecting arrangements for providing access to frequently-wanted subscribers, e.g. abbreviated dialling |
This place covers:
Allocation of network address or number at initial activation of a user
Attention is drawn to the following places, which may be of interest for search:
Access control characterised by a protocol |
This place covers:
Network addressing is carried out independently of a user's subscription data.
Attention is drawn to the following places, which may be of interest for search:
Personal communications services for intelligent networking, e.g. provisions for portability of subscriber numbers |
This place covers:
Providing for reliability and fault tolerance of network data; Restoring network data after accidental loss or network malfunction.
Attention is drawn to the following places, which may be of interest for search:
Arrangements for maintaining operational condition | |
Error control | |
Recovering in data packet switching network from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection |
This place covers:
Security arrangements for wireless communications networks, e.g. wireless sensor networks, self-organizing wireless networks, wireless local loop, and for near field communication networks.
It covers:
- protecting privacy or anonymity
- protecting confidentiality
- key management
- authentication
- access security
- integrity
- fraud detection and prevention
- mobile application security
- using identity modules
- secure pairing of devices
- context-dependent security
- lawful interception
Attention is drawn to the following places, which may be of interest for search:
Security arrangements for protecting computers against unauthorised activity | |
Arrangements for secret or secure communication |
When allocating subgroups H04W 12/30 - H04W 12/80 to patent documents, attention should be made to check whether other subgroups from H04W 12/02 - H04W 12/12 need to be allocated too for a complete classification.
In patent documents, the following abbreviations are often used:
2G | Second Generation |
3G | Third Generation |
4G | Fourth Generation |
5G | Fifth Generation |
ACL | Access Control List |
AP | Access Point |
API | Application Programming Interface |
botnet | Robot Network |
Cell ID | Cell IDentity |
DoS | Denial of Service |
DDoS | Distributed Denial of Service |
EAP | Extensible Authentication Protocol |
EAP-AKA | Extensible Authentication Protocol-Authentication and Key Agreement |
EAP-SIM | Extensible Authentication Protocol-Subscriber Identity Module |
EAP-TLS | Extensible Authentication Protocol-Transport Layer Security |
eSIM | Embedded Subscriber Identity Module |
eSE | Embedded Secure Element |
eSSID | Extended Service Set IDentifier |
eUICC | Embedded Universal Integrated Circuit Card |
GBA | Generic Bootstrapping Architecture |
GSM-AKA | Global System for Mobile Communications-Authentication and Key Agreement |
ID | IDentity or IDentifier |
IEEE 802.1x | Institute of Electrical and Electronics Engineers standard 802.1x. |
ICC-ID | Integrated Circuit Card IDentifier |
IMEI | International Mobile Equipment Identifier |
IMSI | International Mobile Subscriber Identity |
ISIM | IMS (IP Multimedia Subsystem) Subscriber Identity Module |
LI | Lawful or Legal Interception |
M2M | Machine-to-Machine |
MCIM | Machine-to-machine Communication Identity Module |
MEID | Mobile Equipment IDentifier |
MITM | Man-In-The-Middle |
MSIN | Mobile Subscriber Identification Number |
MSISDN | Mobile Station International Subscriber Directory Number |
Multi-SIM | Multiple SIMs |
MTM | Mobile Trusted Module |
NAS | Non-Access Stratum |
NFC | Near Field Communication |
OAuth | Open Authorisation |
OpenID | Open IDentity |
OOB | out of band |
OTAR | Over-The-Air Rekeying |
P2P | peer-to-peer |
PCID | Provisional Connectivity IDentity |
PII | Personally Identifiable Information |
QR | Quick Response |
RBAC | Role Based Access Control |
RF | Radio Frequency |
RFID | Radio Frequency IDentifier |
RRC | Radio Resource Control |
RTT | Round Trip Time |
RUIM | Removable User Identity Module |
SE | Secure Element |
SIM | Subscriber Identity Module |
SMS | Short Message Service |
SSID | Service Set IDentifier |
TMSI | Temporary Mobile Station Identity |
UICC | Universal Integrated Circuit Card |
UMTS-AKA | Universal Mobile Telecommunications System-Authentication and Key Agreement |
USB | Universal Serial Bus |
USIM | Universal Subscriber Identity Module |
WEP | Wired Equivalent Privacy |
Wi-Fi® | Wireless Fidelity |
WLAN | Wireless Local Area Network |
WPA™ | Wi-Fi Protected Access® |
WPS | Wi-Fi Protected Setup™ |
This place covers:
Security arrangements specially adapted for wireless communications networks specially adapted for networks such as wireless sensor networks, ad-hoc networks, RFID networks or cloud networks.
Attention is drawn to the following places, which may be of interest for search:
Self-organising networks |
In patent documents, the following abbreviations are often used:
RFID | Radio Frequency IDentification |
This place covers:
Security arrangements specifically adapted for wireless communication networks for protecting privacy and anonymity comprising, for example:
- identity privacy, e.g. aliases, pseudonyms or temporary identities,
- data privacy, e.g. by defining which of the owner's data are visible to other parties, or
- protecting personally identifiable information [PII], e.g. by using privacy policies or levels, by anonymising or obfuscating or blurring user data like location, by hiding browsing or movement history.
Attention is drawn to the following places, which may be of interest for search:
Selectively restricting mobility data tracking | |
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting Data | |
Call monitoring; Call tracing; Detection or prevention of malicious calls |
In patent documents, the following abbreviations are often used:
PII | Personally Identifiable Information |
This place covers:
Security arrangements specifically adapted for wireless communication networks for protecting confidentiality of information, e.g. by encryption or ciphering.
Attention is drawn to the following places, which may be of interest for search:
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity; Protecting Data | |
Arrangements for secret or secure communication, the encryption apparatus using shift registers or memories for blockwise coding | |
Arrangements for secret or secure communication; Public key |
This place covers:
Security arrangements specifically adapted for wireless communication networks for protecting confidentiality of user plane, e.g. encrypting user traffic such as SMS, voice, web or application traffic.
In patent documents, the following abbreviations are often used:
SMS | Short Message Service |
This place covers:
Security arrangements specifically adapted for wireless communication networks for confidentiality of control plane, i.e. signalling traffic such as NAS, RRC, Over-The-Air Rekey [OTAR] traffic or M2M trigger traffic.
In patent documents, the following abbreviations are often used:
NAS | Non-Access Stratum |
RRC | Radio Resource Control |
OTAR | Over-The-Air Rekeying |
M2M | Machine to Machine |
This place covers:
Security arrangements specifically adapted for wireless communication networks for key management comprising negotiating, distributing, exchanging, transmitting and validating security keys or credentials.
Typical examples are:
- Key management by Generic Bootstrapping Architecture (GBA),
- EAP-AKA for cellular network,
- EAP-SIM or EAP-TLS for 3GPP-WLAN interworking,
- OpenID or Liberty Alliance and GBA interworking,
- Key agreement via IEEE 802.11x WEP or WPA or WPS push button, e.g. for secure pairing between wireless devices, or
- Key agreement using reduced power transmission like NFC, graphical codes, infrared or audio channels, e.g. for the secure pairing between wireless devices.
Attention is drawn to the following places, which may be of interest for search:
Secure pairing between wireless devices | |
Hand-off or reselection arrangements | |
Arrangements for secret or secure communication; Key distribution |
In patent documents, the following abbreviations are often used:
GBA | Generic Bootstrapping Architecture |
EAP | Extensible Authentication Protocol |
EAP-AKA | Extensible Authentication Protocol-Authentication and Key Agreement |
EAP-SIM | Extensible Authentication Protocol-Subscriber Identity Module |
EAP-TLS | Extensible Authentication Protocol-Transport Layer Security |
3GPP | Third Generation Partnership Project |
WEP | Wired Equivalent Privacy |
WPA | Wi-Fi Protected Access |
WPS | Wi-Fi Protected Setup |
NFC | Near Field Communication |
IEEE | Institute of Electrical and Electronics Engineers |
This place covers:
Security arrangements specially adapted for wireless communication networks for key generation or derivation, for example:
- Key derivation for forward and/or backward security for example for securing vertical or horizontal handovers,
- Horizontal key derivation, or
- Vertical key derivations.
Attention is drawn to the following places, which may be of interest for search:
Handoff or reselection arrangements |
This place covers:
Key management using a trusted network node as anchor, for example:
- Key agreement for handover via EAP-SIM or EAP-AKA or EAP-TLS for 3GPP-WLAN interworking,
- OpenID and generic bootstrapping architecture [GBA interworking],
- Liberty alliance and GBA interworking.
In patent documents, the following abbreviations are often used:
GBA | Generic Bootstrapping Architecture |
EAP | Extensible Authentication Protocol |
EAP-AKA | Extensible Authentication Protocol-Authentication and Key Agreement |
EAP-SIM | Extensible Authentication Protocol-Subscriber Identity Module |
EAP-TLS | Extended Authenticated Protocol-Transport Layer Security |
3GPP | Third Generation Partnership Project |
WLAN | Wireless Local Area Network |
OpenID | Open Identity |
This place covers:
Security arrangements specially adapted for wireless communication networks for key distribution using a trusted network node as anchor, e.g. key pre-distribution or key agreement.
Attention is drawn to the following places, which may be of interest for search:
Arrangements for secret or secure communication, Key distribution |
This place covers:
Security arrangements specially adapted for wireless communication networks for key management without using a trusted network node as anchor, for example:
- Key exchange or agreement via Wi-Fi protected setup [WPS],
- Key exchange using short range communication, e.g. near field communication [NFC],
- Key exchange out-of-band [OOB] methods such as graphical codes, barcodes or Quick Response [QR] codes, infrared, audio waves, light wave, USB dongle, etc. or
- Peer-to-peer [P2P] key exchange or agreement.
In patent documents, the following abbreviations are often used:
Wi-Fi | Wireless Fidelity |
WPS | Wi-Fi protected setup |
OOB | out of band |
QR | Quick Response |
NFC | near field communication |
USB | Universal Serial Bus |
P2P | peer-to-peer |
This place covers:
Security arrangements specially adapted for wireless communication networks for authentication, including authenticating entities such as, e.g. human user(s), device(s), service(s), after consulting network stored entity data or checking theirs credentials (e.g. GSM-AKA, UMTS-AKA, pre-authentication, continuous authentication, authentication using credential vaults or password managers).
Attention is drawn to the following places, which may be of interest for search:
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity, Authentication | |
Payment architectures, schemes or protocols, Authorisation | |
Arrangements for secret or secure communicationincluding means for verifying the identity or authority of a user of the system |
In patent documents, the following abbreviations are often used:
GSM-AKA | Global System for Mobile communications-Authentication and Key Agreement |
UMTS-AKA | Universal Mobile Telecommunications System-Authentication and Key Agreement |
This place covers:
Security arrangements specially adapted for wireless communication networks for performing pre-authentication, e.g. pre-caching and verification of credentials for faster login or IEEE 802.1x pre-authentication in advance to connection setup.
In patent documents, the following abbreviations are often used:
IEEE 802.1x | Institute of Electrical and Electronics Engineers standard 802.1x. |
This place covers:
Security arrangements specially adapted for wireless communication networks for performing continuous authentication or implicit authentication, i.e. continuous identity recognition and authentication using, e.g. behavioural biometrics and without explicitly asking the user to provide credentials.
Attention is drawn to the following places, which may be of interest for search:
Context-dependent security, gesture-dependent or behaviour-dependent |
This place covers:
Security arrangements specially adapted for wireless communication networks for performing authentication, using credential vaults, or password management applications or OTP applications.
Examples are: generating credentials via device movements or gestures, behaviormetrics for authentication using a learned user behaviour, such as typing or touching or gripping characteristics.
Attention is drawn to the following places, which may be of interest for search:
Network security architectures or protocols for supporting authentication in a packet data network |
In patent documents, the following abbreviations are often used:
OTP | One Time Password |
This place covers:
Security arrangements specifically adapted for wireless communications network for access security comprising access authorisation to wireless network resources for example using:
- Authorisation based on an entity's identity, e.g. Access Control Lists ACL, whitelists, blacklists,
- Authorisation based on profile or attributes assigned to an entity, e.g. verifying current profile against expected one, age attribute verification,
- Authorisation based on a group or role, e.g. Role Based Access Control [RBAC],
- Authorisation based security level,
- Authorisation based on the trust score or the reputation of an entity,
- Authorisation based on location, e.g. proximity to other entities, allowed locations,
- Authorisation based on time, e.g. limited time window, within a time range,
- Revocation of authorisation, e.g. secure disconnect, remote kill or suspend or lock or wipe command,
- Delegation of authorisation, e.g. OAuth, user centric management of access rights, user consent or approval,
- Authorisation based on security domains, e.g. controlling access to enterprise security domain or private data security domains, authorisation based on application security domains, e.g. Global Platform domains or authorisation using packet filters or packet firewalls, e.g. SMS Firewalls, NFC or SIM packet filtering.
In patent documents, the following abbreviations are often used:
ACL | Access Control List |
RBAC | Role Based Access Control |
SMS | Short Message Service |
NFC | Near Field Communication |
SIM | Subscriber Identity Module |
This place covers:
Security arrangements specially adapted for wireless communications network comprising access authorisation to wireless network resources using revocation of authorisation, for example:
- Secure disconnect,
- Remote kill command, or
- Remote lock or remote wipe command.
This place covers:
Security arrangements specially adapted for wireless communications network for access authorisation delegation comprising giving authorisation to wireless network resources without sharing credentials, for example:
- Delegating access or authorisation token, e.g. using OAuth protocol, or
- Distributing authorisation tokens after user's consent or approval.
In patent documents, the following abbreviations are often used:
OAuth | Open Authorisation |
This place covers:
Security arrangements specially adapted for wireless communications network comprising access authorisation to wireless network resources based on security domains, for example:
- Controlling access to enterprise security domain or private security domain,
- Access control based on machine to machine [M2M] security domains, or
- Authorisation based on application security domains (e.g. Global Platform domains).
In patent documents, the following abbreviations are often used:
M2M | Machine-to-Machine |
This place covers:
Security arrangements specially adapted for wireless communications network comprising access authorisation to wireless network resources using filters or firewalls, for example:
- Wireless packet firewalls,
- SMS firewall,
- NFC packets filters, or
- SIM packets filters.
Attention is drawn to the following places, which may be of interest for search:
Arrangements for monitoring and testing packet switching networks | |
Network architectures or network communication protocols for separating internal from external traffic, e.g. firewalls |
In patent documents, the following abbreviations are often used:
SMS | Short Message Service |
NFC | Near Field Communications |
SIM | Subscriber Identity Module |
This place covers:
Verifying information received.
Attention is drawn to the following places, which may be of interest for search:
Protecting data integrity, e.g. using checksums, certificates or signatures | |
Network security architectures or protocols for verifying the received information |
This place covers:
Security arrangements specially adapted for wireless communication networks for verifying or ensuring wireless paths or wireless routes' integrity, e.g. using signatures such as Message Authentication Codes or hash chains.
This place covers:
Security arrangements specially adapted for wireless communication networks for verifying or ensuring location integrity, e.g. using secure geotagging, trusted wireless cell tagging, or wireless location signatures.
This place covers:
Security arrangements specially adapted for wireless communication networks for verifying or ensuring packet integrity, e.g. using packet signatures such as Message Authentication Codes.
Attention is drawn to the following places, which may be of interest for search:
Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes |
This place covers:
Security arrangements specially adapted for wireless communication networks for verifying or ensuring source (i.e. sender) integrity, e.g. using signatures such as Message Authentication Codes to verify the source (i.e. sender).
This place covers:
Security arrangements specifically adapted for wireless communication networks for fraud detection or prevention, comprising
- protecting against rogue devices, e.g. bidding down or downgrading attacks, rogue device or rogue AP or NFC device, selfish nodes,
- wireless intrusion detection and prevention,
- protecting against power exhaustion attacks, e.g. power depletion, starvation attack or sleep deprivation attack,
- anti-theft arrangements, e.g. protection against identity or service or device theft like SIM cloning or machine to machine M2M displacement,
- anti-malware arrangements, e.g. protection against SMS fraud or mobile malware,
- detecting or preventing attacks on wireless networks or entities (e.g. Denial of Service DoS, DDoS, botnet) or
- vulnerability assessment of wireless networks or entities.
Attention is drawn to the following places, which may be of interest for search:
Detecting local intrusion or implementing counter-measures | |
Monitoring arrangements; testing arrangements |
In patent documents, the following abbreviations are often used:
AP | Access Point |
NFC | Near Field Communications |
DoS | Denial of Service |
DDoS | Distributed Denial of Service |
SMS | Short Message Service |
botnet | Robot Network |
This place covers:
Security arrangements specially adapted for wireless communication networks for wireless intrusion detection and protection, comprising:
- Detecting or preventing intrusions using identifiers in general for example a MAC address, or a Bluetooth® address, or
- Detecting or preventing intrusions using radio fingerprints identifiers.
Attention is drawn to the following places, which may be of interest for search:
Context-dependent security, identity-dependent | |
Context-dependent security, radio fingerprint |
This place covers:
Security arrangements specially adapted for wireless communication networks for countermeasures against attacks, e.g. to protect against rogue devices, comprising:
- Protecting against bidding down or downgrading attacks,
- Protecting against rogue WLAN AP or cellular Base Station spoofing legitimate APs or base stations,
- Protecting against wireless short range (e.g. RFID, NFC, Bluetooth®) man-in-the-middle [MITM] or wireless relay attacks,
- Protecting against selfish nodes dropping legitimate packets or impersonating other nodes,
- Isolating malicious wireless devices or malicious wireless traffic, or
- Quarantining malicious wireless devices or dropping malicious wireless traffic.
In patent documents, the following abbreviations are often used:
WLAN | Wireless Local Area Network |
AP | Access Point |
NFC | Near Field Communications |
RFID | Radio Frequency IDentifier |
MITM | Man-in-the-Middle |
This place covers:
Security arrangements specially adapted for wireless communication networks comprising:
- Anti-theft arrangements, e.g. protection against identity or service or device theft like SIM cloning or machine to machine [M2M] displacement,
- Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware,
- Detecting or preventing of attacks on wireless networks or entities, e.g. denial of service [DoS], distributed denial of service [DDoS] or botnet, or
- Vulnerability assessment of wireless networks or entities.
In patent documents, the following abbreviations are often used:
M2M | Machine-to-Machine |
SIM | Subscriber Identity Module |
This place covers:
Security arrangements specially adapted for wireless communication networks comprising anti-malware arrangements, for example:
- Protection against SMS fraud, such as premium SMS malware or
- Protection against mobile malware, e.g. viruses or worms propagating via wireless networks or attacking wireless networks or wireless services.
Attention is drawn to the following places, which may be of interest for search:
Computer malware detection or handling, e.g. Anti-Virus arrangements |
In patent documents, the following abbreviations are often used:
SMS | Short Message Service |
This place covers:
Security arrangements specifically adapted for wireless communications networks for mobile device security or mobile application security, for example:
- Securing mobile application or mobile service provisioning, securing SIM application provisioning,
- Securing mobile application download, protecting update thereof, or
- Managing security policies for mobile applications or mobile devices.
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
This place covers:
Security arrangements specially adapted for wireless communications networks for protecting application or service provisioning using wearables, for example:
- Automatic access to entities such as mobile devices, e.g. unlocking mobile devices using wirelessly enabled wearable devices or
- Securing mobile applications or services executable or connectable to using wirelessly enabled wearable devices, such as wireless smartwatches, headphones, bracelets, rings, necklaces, smart-glasses, wristbands.
Attention is drawn to the following places, which may be of interest for search:
Identity modules using near field communication | |
Wireless network protocols or protocol adaptations to wireless operations |
This place covers:
Security arrangements specially adapted for wireless communications networks for protecting application or service provisioning, for example:
- Securing SIM application provisioning.
- Securing mobile application download, protecting update thereof.
Attention is drawn to the following places, which may be of interest for search:
Power saving arrangements | |
Network security architectures or protocols for detecting or protecting against malicious traffic |
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
This place covers:
Security arrangements specially adapted for wireless communications networks for managing security policies for mobile applications or mobile devices, for example:
- Managing security policies for mobile applications or devices, using remote mobile device management tools,
- Parents managing child security policies for wireless devices or mobile applications, or
- Employers managing employees' security policies for wireless devices or for mobile applications.
This place covers:
Security arrangements specifically adapted for wireless communication networks using identity modules for protecting wireless traffic, comprising
- Using subscriber identity modules SIM, USIM, RUIM, MCIM, ISIM, Secure Element [SE], NFC module, Mobile Trusted Module [MTM],
- Virtual identity modules, e.g. virtual SIMs or downloadable SIMs for running on an embedded Secure Element [eSE] or embedded Universal Integrated Circuit [eUICC] or embedded SIM [eSIM],
- Shared identity modules, e.g. shared SIMs,
- Multiple identity modules, e.g. multi-sim, dual-sim,
- Near field communication [NFC] enabled identity modules for protecting wireless traffic, e.g. NFC tags, smart tag or radio frequency identification [RFID] module, or
- Secure binding of identity modules, e.g. securely binding identity modules to a device or a service or an application like Simlock or subsidy lock, binding an SIM to a Relay Node, binding an App to UICC.
Attention is drawn to the following places, which may be of interest for search:
Network data management, processing of user or subscriber data | |
Context-dependent security, identity-dependent | |
Payment schemes or models using cards |
When allocating subgroup H04W 12/40, attention should be made to check whether other subgroups, e.g. H04W 12/06 (using SIM for authentication) or H04W 12/08 (using SIM for access security) need to be allocated too for a complete classification.
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
USIM | Universal Subscriber Identity Module |
RUIM | Removable User Identity Module |
MCIM | Machine-to-machine Communication Identity Module |
ISIM | IMS (IP Multimedia Subsystem) Subscriber Identity Module |
UICC | Universal Integrated Circuit Card |
SE | Secure Element |
eSIM | Embedded Subscriber Identity Module |
eUICC | Embedded Universal Integrated Circuit Card |
eSE | Embedded Secure Element |
MTM | Mobile Trusted Module |
NFC | Near Field Communication |
RFID | Radio Frequency IDentification |
This place covers:
Security arrangements specially adapted for wireless communication networks using virtual identity modules for protecting wireless traffic, comprising
- Vrtual SIMs or downloadable SIMs for running on an embedded Secure Element [eSE] or embedded Universal Integrated Circuit [eUICC] or embedded SIM [eSIM].
Attention is drawn to the following places, which may be of interest for search:
Network data management, processing of user or subscriber data | |
Payment schemes or models using cards |
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
eSIM | Embedded Subscriber Identity Module |
eUICC | Embedded Universal Integrated Circuit Card |
eSE | Embedded Secure Element |
This place covers:
Security arrangements specially adapted for wireless communication networks using shared identity modules, e.g. SIM sharing between tethered devices and between a SIMless devices and device equipment with a SIM or UICC.
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
UICC | Universal Integrated Circuit Card |
This place covers:
Security arrangements specially adapted for wireless communication networks using multiple identity modules for protecting wireless traffic, e.g. multi-sim, dual-sim.
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
Multi-SIM | Multiple SIMs |
This place covers:
Security arrangements specially adapted for wireless communication networks using near field communication [NFC] enabled identity modules for protecting wireless traffic, e.g. NFC tags, smart tag or radio frequency identification [RFID] module, or NFC enabled SIM or UICC cards.
In patent documents, the following abbreviations are often used:
NFC | Near Field Communication |
RFID | Radio Frequency IDentification |
SIM | Subscriber Identity Module |
This place covers:
Security arrangements specially adapted for wireless communication networks for the secure binding of identity modules, e.g. securely binding identity modules to a device or a service or an application like Simlock or subsidy lock, binding an SIM to a Relay Node, and binding an App to UICC.
Attention is drawn to the following places, which may be of interest for search:
Network data management for processing of user or subscriber data |
In patent documents, the following abbreviations are often used:
SIM | Subscriber Identity Module |
UICC | Universal Integrated Circuit Card |
This place covers:
Security arrangements specifically adapted for wireless communication networks for securing pairing of wireless devices, for example:
- Bootstrapping a secure communication link between pairing terminals or
- Secure socializing by establishing a secure wireless link between terminals and their respective mobile social network applications, for examples between mobile terminals of friends, family members, guests.
Attention is drawn to the following places, which may be of interest for search:
Affiliation to network using triggered events |
This place covers:
Security arrangements specially adapted for wireless communications networks for securing pairing of wireless devices involving three or more devices, e.g. group pairing, securely joining wireless ad-hoc networks.
This place covers:
Time-dependent security arrangements specially adapted for wireless communication networks, e.g. using timestamps, time delays like Round Trip Time RTT or time windows.
In patent documents, the following abbreviations are often used:
RTT | Round Trip Time |
This place covers:
Location-dependent or proximity-dependent security arrangements specially adapted for wireless communication networks, e.g. using absolute location or proximity to other devices measured using received signal strength RSS.
Attention is drawn to the following places, which may be of interest for search:
Services making use of location information |
This place covers:
Geofenced location aware security arrangements specially adapted for wireless communication networks, e.g. using fenced areas.
Attention is drawn to the following places, which may be of interest for search:
Services making use of location information, services related to particular areas |
This place covers:
Environment-dependent security arrangements specially adapted for wireless communication networks, e.g. using captured environmental data like audio, image, media or temperature.
This place covers:
Risk-dependent security arrangements specially adapted for wireless communication networks, e.g. arrangements based on risk profiles, risk scores or trust scores derived from social networks (e.g. from mobile friends or buddy lists), or arrangements based on trust scores determined by trusted third party servers.
This place covers:
Gesture-dependent or behaviour-dependent security arrangements specially adapted for wireless communication networks, e.g. using gestures or device movement.
Examples are: generating credentials via device movements or gestures, behaviormetrics for authentication using a learned user behaviour, such as typing or touching or gripping characteristics.
This place covers:
Security arrangements specially adapted for wireless communication networks using wireless hardware identities, e.g. IMEI, MEID, ICC-ID.
In patent documents, the following abbreviations are often used:
IMEI | International Mobile Equipment Identifier |
MEID | Mobile Equipment IDentifier |
ICC-ID | Integrated Circuit Card IDentifier |
This place covers:
Security arrangements specifically adapted for wireless communication networks using wireless subscriber identities, e.g. MSISDN, IMSI or MSIN.
In patent documents, the following abbreviations are often used:
MSISDN | Mobile Station International Subscriber Directory Number |
IMSI | International Mobile Subscriber IDentity |
MSIN | Mobile Subscriber Identification Number |
This place covers:
Security arrangements specially adapted for wireless communication networks using wireless access point logical identities, e.g. AP SSID, ESSID or Base station Cell ID.
In patent documents, the following abbreviations are often used:
AP | Access Point |
SSID | Service Set IDentifier |
eSSID | Extended Service Set IDentifier |
Cell ID | Cell IDentity |
This place covers:
Security arrangements specially adapted for wireless communication networks using temporary identities, e.g. TMSI, PCID, pseudonym or alias, random or one-time ID, rolling ID, session ID or anonymous ID.
In patent documents, the following abbreviations are often used:
TMSI | Temporary Mobile Station Identity |
PCID | Provisional Connectivity IDdentity |
ID | IDentity or IDentifier |
This place covers:
Security arrangements specifically adapted for wireless communication networks using group identities, e.g. group ID, group IMSI, shared identity, pool of identities.
Attention is drawn to the following places, which may be of interest for search:
Network data management, mobility data transfer |
In patent documents, the following abbreviations are often used:
IMSI | International Mobile Station Identity |
ID | IDentity or IDentifier |
This place covers:
Security arrangements specially adapted for wireless communication networks using graphical identities, e.g. graphical codes, barcodes or QR codes.
In patent documents, the following abbreviations are often used:
QR | Quick Response |
This place covers:
Security arrangements specially adapted for wireless communication networks using radio fingerprints, e.g. electromagnetic signature or RF fingerprint.
In patent documents, the following abbreviations are often used:
RF | Radio Frequency |
This place covers:
Security arrangements specially adapted for wireless communications networks for lawful or legal interception.
Note: This group should only be allocated when the technical aspects relate to security arrangements for wireless networks for managing "lawful interception"
When allocating subgroup H04W 12/80 to documents, attention should be made to check whether other subgroups from H04W 12/02 - H04W 12/128 need to be allocated too for a complete classification.
This place covers:
- Arrangements and techniques for determining traffic capacity for network equipments and/or linking infrastructure.
- Distribution of spectral resources at deployment stage, i.e. distributing wireless channels to access points; Re-distribution of said resources during operation on basis of predicted or predefined traffic patterns.
- Providing wireless coverage by special arrangements of service areas or shape, e.g. cell structures.
Attention is drawn to the following places, which may be of interest for search:
Network traffic or resource management | |
Local resource management |
This place covers:
- Distribution, at initial stage of deployment, of spectral resources, e.g. channels among access points in a network.
- Defining spectral resources to be re-distributed.
- Sizing network equipments or network equipment links for the purpose of handling expected traffic.
- Distribution of pilot channels
This place covers:
Part of the spectral resources can be re-distributed to the access points in order to autonomously optimize performance using long or short term variations in traffic, i.e. the network does not revert to the original distribution.
This place covers:
Part of the spectral resources distributed to an access point can be relinquished to adjacent access points to avoid communication drops or regulate traffic load. When not longer needed, the relinquished resources are returned to the original access point.
This place covers:
The expected traffic load is regulated by controlling the size of a service area by controlling the transmission power of an access point.
Attention is drawn to the following places, which may be of interest for search:
Hand-off or reselecting arrangements for handling the traffic | |
Transmission power control management, i.e. sharing limited amount of power among users or channels or data types, taking into account loading or congestion level |
This place covers:
- Partitioning of all spectral resources is performed autonomously among the access points normally on a interference limiting criteria.
- Dynamic channel partitioning as such.
Attention is drawn to the following places, which may be of interest for search:
Wireless resource selection or allocation |
This place covers:
All of the available spectral resources are assigned in a fixed manner among the network's access points.
Cluster reuse wherein one or more reuse patterns are assigned to at least one access point.
This place covers:
Service area(s) belonging to different wireless networks have at least one of their allocated or cooperatively used spectral resources in common.
Techniques and arrangements for avoiding simultaneous use of the resource, e.g. for detecting interference-free channels in overlap areas.
Covers overlap sharing, i.e. filling voids or gaps in used or allocated resources. Covers also underlay sharing, i.e. using the resources of an overlayed system in an underlaying system while staying within an agreed noise floor. Covers the detection and cooperative use of licensed spectrum resources or their detection for interference free operation of unlicensed networks.
Covers also spectrum sharing aspects of cognitive radio systems.
Interference avoidance for communication to/from terminal.
Attention is drawn to the following places, which may be of interest for search:
Wireless resource selection or allocation | |
Dynamic wireless traffic scheduling; Dynamically scheduled allocation on shared channel | |
Allocation of wireless resources based on quality criteria | |
Auxiliary means for detecting or identifying radar signals or the like | |
Assessment of spectral gaps suitable for allocating digitally modulated signals in multi-carrier systems, e.g. for carrier allocation in cognitive radio |
This place covers:
One of the networks being of small scale for non-public usage.
Attention is drawn to the following places, which may be of interest for search:
Public Land Mobile Systems, e.g. cellular systems, using private Base Stations, e.g. femto Base Stations, home Node B | |
Small scale networks, flat hierarchical networks, PBS [Private Base Station] network |
This place covers:
- Coverage prediction tools or models.
- Use of field measurements for network deployment, use of test access points for determining optimal or optimized locations for network deployment.
- Arrangements and techniques for providing initial network coverage at network deployment or additional coverage at subsequent re-deployment stage. This additional coverage at subsequent re-deployment stage refers to a planned system upgrade, i.e. is not an adaptation of a running system.
Attention is drawn to the following places, which may be of interest for search:
Measuring electromagnetic field characteristics | |
Arrangements for maintenance or administration of data switching networks, hardware and software tools for network design, e.g. with integrated simulation and design testing |
This place covers:
Arrangements and techniques for predicting equipment or system link capacity or system performance
Attention is drawn to the following places, which may be of interest for search:
Arrangements for maintenance or administration of data switching networks, hardware and software tools for network design, e.g. with integrated simulation and design testing |
This place covers:
Arrangements where wireless coverage is provided by special arrangements of
service areas (cells) or shape thereof.
This place covers:
Techniques and arrangements where the service area is extended by dedicated repeating equipment, Network coordinated processing for cell enhancements. This subgroup contains the use of repeaters to extend the coverage, i.e. the repeater is essentially at fixed position and under direct control of the wireless network.
Attention is drawn to the following places, which may be of interest for search:
Public Land Mobile Systems using dedicated repeater stations | |
Terminal device adapted for relaying to or from another terminal or user | |
Active relay systems | |
Radio transmission arrangements for base station coverage control, e.g. by using relays in tunnels |
This place covers:
The service area is defined by a focused beam in a desired generally variable direction of transmission or reception, e.g. electric antenna tilting or beam forming.
This place does not cover:
Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an aerial or aerial system |
Attention is drawn to the following places, which may be of interest for search:
Control of transmission |
This place covers:
The service area differs substantially from a normally polygonal or sectorized shape, e.g. the outer borders of the ring are defined by preset values of an access point's transmission power.
Attention is drawn to the following places, which may be of interest for search:
Load shedding arrangements | |
Transmission power control management, i.e. sharing limited amount of power among users or channels or data types, taking into account loading or congestion level |
This place covers:
Partitioning spectral resources among access areas organized into ranks, each subordinate to the one above it. Macro cell, microcell overlays.
This place covers:
- Arrangements for supervising performance of a deployed network.
- Testing or monitoring arrangements specially adapted for wireless networks.
- Arrangements for evaluating network performance under real or simulated traffic conditions.
- System equipment reconfiguration or upgrades in order to improve overall network performance.
This group relates also to testing of network components and the monitoring of connections for performance assessment.
Attention is drawn to the following places, which may be of interest for search:
Monitoring; testing | |
Arrangements for maintenance or administration of data switching networks | |
Details of data switching networks, monitoring arrangements, testing arrangement | |
Network Service management | |
Supervisory, monitoring or testing arrangements for automatic or semiautomatic exchanges |
This place covers:
Automatic configuration of system equipment, reconfiguration or upgrades in order to improve overall network performance. The permanent deployment of additional, i.e. not initially planned, equipment or resources for performance improvement.
Generation, update or management of Neighbour Cell Lists for network management
Attention is drawn to the following places, which may be of interest for search:
Network planning tools | |
Determination of parameters used for hand-off e.g. generation or modification of neighbour cell lists | |
Service support, Network management device | |
Configuration optimization of network or network elements in data switching networks |
This place covers:
Reliability aspects, stand-by arrangements, back-up or redundant systems or system components in a network.
This place does not cover:
Details of transmission systems for increasing reliability, e.g. using redundant or spare channels or apparatus |
Attention is drawn to the following places, which may be of interest for search:
Network data restoration | |
Details of data switching networks, arrangements for maintenance or administration involving automatic restoration of network faults |
This place covers:
The operational condition of the network or network nodes is assessed using data generated outside normal operation or by self-testing operation, e.g. loop-back operation.
Attention is drawn to the following places, which may be of interest for search:
Hardware and software tools for network design, e.g. with integrated simulation and design testing in data switching networks | |
Monitoring arrangements for data switching networks |
This place covers:
The operational condition of the network or network nodes is assessed with data collected during normal operation.
Attention is drawn to the following places, which may be of interest for search:
Network Planning tools | |
Hardware and software tools for network design, e.g. with integrated simulation and design testing in data switching networks | |
Monitoring arrangements for data switching networks |
This place covers:
Generating measurement requests to monitoring equipment; measuring/collecting/receiving data at/from reporting equipment.
Attention is drawn to the following places, which may be of interest for search:
Discovery of network devices, e.g. terminals | |
Generation, update or management of Neighbour Cell Lists for network management | |
Hand-off or reselecting arrangements | |
Generation, update or management of Neighbour Cell Lists for the purpose of hand-off | |
Determination of parameters used for hand-off, scheduling hand-off measurements | |
Connectivity information management, e.g. connectivity discovery or update | |
Power headroom reporting | |
Wireless resource selection or allocation based on quality criteria | |
Processing of captured monitoring data, report generation in data switching networks |
This place covers:
Arrangements or techniques for central control, by a network component, of traffic or admission policies for the purpose of, e.g. ensuring fair use of network resources among users or terminals or guarantying implicit or negotiated service level or quality agreements. Management of negotiated local resources for further allocation.
This group together with its subgroups cover all reservation and resource negotiation activities (both central and local).
Attention is drawn to the following places, which may be of interest for search:
Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources |
This place covers:
Avoiding or regulating an actual or potential traffic overload condition
Attention is drawn to the following places, which may be of interest for search:
Flow control in the network |
This place covers:
Arrangements for preventing, detecting, or correcting errors in the information received in wireless networks.
Arrangements for detecting or preventing errors in the information received in general, i.e. including in wireless networks, is classified in H04L 1/00.
This place covers:
Techniques or arrangements whereby the amount of information transmitted over a wireless link is optimized by:
- Reducing the amount of associated control information.
- Performing information sizing across a wireless interface, e.g. adapting the length of a packet to carry one or more information blocks without bit stuffing.
- Discarding information.
This place does not cover:
Systems modifying transmission characteristic according to link quality by modifying the frame length | |
Dynamic adaptation of the packet size for flow control or congestion control |
Attention is drawn to the following places, which may be of interest for search:
Customizing content of application services or information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals | |
Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction | |
Systems modifying transmission characteristics according to link quality by adapting the source coding | |
Protocols for data compression not specifically aiming the wireless interface | |
High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks |
This place covers:
Adaptation of traffic data packets received from higher layers onto packet transmission requirements of lower layer, e.g. SDU onto PDU, by fragmentation or aggregation.
Attention is drawn to the following places, which may be of interest for search:
Queuing arrangements for supporting packet reassembly or resequencing | |
High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stack |
In patent documents, the following words/expressions are often used as synonyms:
- "fragmentation", and "segmentation"
- "aggregation", and "concatenation"
This place covers:
Techniques and arrangements where communication information is transmitted over alternate transmission paths for balancing the load in the system or when a preferred or desired path is unavailable due to excessive traffic carried over said path, e.g. load shedding/sharing involving alternative entities.
Emphasis is put on "alternate" here to distinguish from flow control; e.g. load shedding/sharing involving alternative entities will be covered here.
Typical example: different paths in the backbone network.
This place does not cover:
Transferring a connection for handling the traffic | |
Wireless traffic scheduling |
Attention is drawn to the following places, which may be of interest for search:
Hand off or reselecting arrangements for handling the traffic | |
Communication route or path selection based on wireless node resources | |
Access restriction based on traffic conditions | |
Load balancing in packet switching networks |
This place covers:
Load balancing or load distribution among channels or bearers, such as based on channel or bearer status.
Attention is drawn to the following places, which may be of interest for search:
Reselecting a communication resource in the serving access point |
This place covers:
Load balancing or load distribution among network function virtualisation [NFV] or edge computing entities, such as based on status of network function virtualization [NFV] or edge computing entities, such as multi-access edge computing, etc.
This place covers:
Load balancing or load distribution among access entities, such as based on access entities status.
Attention is drawn to the following places, which may be of interest for search:
Reselecting an access point |
This place covers:
Load balancing or load distribution among core entities, such as based on core entities status.
Attention is drawn to the following places, which may be of interest for search:
Reselecting a serving backbone network switching or routing node |
This place covers:
Techniques and arrangements to regulate the amount of communication information in the network.
In this subgroup flow control is seen from a network point of view, i.e. involving backbone network entities which can communicate to perform flow control. This covers up and downlink.
Attention is drawn to the following places, which may be of interest for search:
Local resource management with wireless traffic scheduling | |
Flow control in packet switching networks |
This place covers:
Supervisory or control information is exchanged between equipments involved
in information transmission.
Attention is drawn to the following places, which may be of interest for search:
Flow Control and congestion control in packet switching networks using signalling |
This place covers:
The information is temporarily stored, buffered, queued for transmission.
Attention is drawn to the following places, which may be of interest for search:
Buffering or recovering information during reselection | |
Schedule definition, set-up, creation based on age of data to be sent | |
Flow Control and congestion control in packet switching networks using information about buffer occupancy at either end or transit nodes |
This place covers:
- Central management of wireless communication resources, i.e. management of wireless communication resources in the access network, e.g. between a central communication resource manager and an access point
- (Re)Negotiating communication parameters of connections involving at least one wireless communication link over which information is to be delivered with a requesting user/terminal from within or outside the system.
- Grant or denial of requests from new users/terminals via access points and conditions under which such requests are granted in view of keeping respectively meeting negotiated or implicit requirements for serviced users or terminals. Establishment of communication parameters through actions other than negotiation (e.g. delegating or commanding the use of pre-established parameters; determining by a device itself the set of parameters to use).
Attention is drawn to the following places, which may be of interest for search:
Services or facilities specially adapted for wireless communication networks | |
Security arrangements, e.g. access security or fraud detection, Authentication, e.g. verifying user identity or authorisation, Protecting privacy or anonymity | |
Local resource management | |
Admission Control and Resource allocation in packet switching networks |
This place covers:
Determining the wireless resources or parameters to be used to achieve an agreed SLA, QoS, etc.
The resources can be provided by/in different networks.
Attention is drawn to the following places, which may be of interest for search:
Arrangements for detecting or preventing errors in the information received, modifying transmission characteristics according to link quality |
This place covers:
(Re)negotiating bandwidth of connection(s) via one or more communication links.
The negotiated bandwidth may be provided via one or more communication links.
Attention is drawn to the following places, which may be of interest for search:
Details of data switching networks, arrangements for maintenance or administration, involving configuration of the network and network elements, bandwidth and capacity management, i.e. automatically increasing or decreasing capacities, e.g. bandwidth on demand |
In this place, the following terms or expressions are used with the meaning indicated:
Bandwidth | transmission capacity available for communication as provided by a suitable combination of communication links of predefined capacity |
This place covers:
(Re)negotiating transmission rate of connection.
In this place, the following terms or expressions are used with the meaning indicated:
Communication rate | information rate available for communication provided by a suitable combination of information coding and/or modulation techniques |
This place covers:
Determining or negotiating the SLA or QoS. Allowing temporary "graceful degradation" in order to maximize general network capacity.
Attention is drawn to the following places, which may be of interest for search:
Data switching networks, stored and forward switching systems, packet switching systems, flow control, access or admission control, e.g. network resource reservation | |
Selecting arrangements, arrangements providing connection between exchanges, provisions for network management, bandwidth allocation or management |
This place covers:
- Reservation of resources in backbone network; reservation of wireless resources to be allocated by local controller.
- Reservation based on predicted user or terminal behaviour, e.g. moving direction or speed.
Resources are reserved not for immediate but for future use.
Attention is drawn to the following places, which may be of interest for search:
Wireless resource selection or allocation |
This place covers:
Transferring ongoing connection(s) of a user or terminal in connected state to different network resource(s) or administrative domains with the purpose of avoiding or limiting loss or degradation of said connection(s) due to user mobility, wireless link conditions or system loading.
The reselection can take place at the user and/or system initiative based on fixed or agreed criteria and can be performed for all or part of the assigned resources.
Generation, update or management of Neighbour Cell Lists; temporary storage, buffering of connection data during reselection, performing registration, binding or location updates at reselection of network equipment or administrative domains.
Attention is drawn to the following places, which may be of interest for search:
Supervisory, monitoring or testing arrangements | |
"Idle hand-off", i.e. reselection while user terminal is in an idle, non-connected state | |
Transmission Power Control during macro-diversity or soft handoff | |
Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation | |
Resource management for broadcast services | |
Connection management | |
Arrangements for detecting or preventing errors in the information received |
In this place, the following terms or expressions are used with the meaning indicated:
hand-off | means a change of a radio link while a connection is ongoing (active state) or readily set up although no data are currently transmitted (dormant state) |
user mobility | means the user changing his point(s) of attachment in the network(s), e.g. access point due to movement in service areas |
registration | means using system, user or terminal tracking information to detect user mobility |
seamless | means a reselection whereby wireless links are temporarily added or deleted in such a manner that the terminal keeps at least one link connected |
lossless reselection | means a reselection whereby information loss during reselection is prevented or avoided |
In patent documents, the following words/expressions are often used as synonyms:
- handover and hand-off
This place covers:
Exchange of information for controlling the realisation of the hand-off
This place covers:
Transmission and use of control information, e.g. hand-off signalling messages, including trigger messages which initiates connection(s) hand-off of MBMS services provided in the cell.
This place does not cover:
Selective distribution or broadcast services to user groups | |
Resource management for broadcast services | |
Connection management for selective distribution or broadcast |
This place covers:
Transmission and use of control information, e.g. hand-off signalling messages, including trigger messages which initiates connection(s) hand-off of group communication(s), e.g. for moving wireless networks or hand-off of a group of terminals.
This place does not cover:
User group management | |
Processing of subscriber group data |
Attention is drawn to the following places, which may be of interest for search:
Hand-off for a plurality of connections of one user | |
Network topology specific to moving wireless networks |
This place covers:
Transmission and use of control information, e.g. hand-off signalling messages, including trigger messages which initiate data session or connection hand-off.
Attention is drawn to the following places, which may be of interest for search:
Connection manipulation of transport tunnels | |
Real-time multimedia communications; Session management |
This place covers:
Preparing data session for end-to-end connection hand-off (e.g. by using binding update messages) carried out during or prior to lower layer hand-off events (e.g. radio link hand-off), e.g. for mobile IP, GPRS tunnelling protocol [GTP].
Attention is drawn to the following places, which may be of interest for search:
Resource reservation |
This place covers:
Handover signalling adapted for mobile IP.
This place covers:
Facilitating access network mobility of data sessions through handovers between at least two core network domains, either in one or in both directions. Involves change from one core network technology, e.g. from packet switched [PS], to a different core network technology, to e.g. circuit switched [CS] domain or to CS fall-back in evolved packet system [EPS].
Used, e.g. in voice call continuity [VCC], single radio VCC [SRVCC] or voice over LTE generic access [VoLGA].
This place covers:
Facilitating access network mobility of data sessions through handovers between at least two adjacent core network domains belonging to different packet switched network technologies, e.g. between LTE and WLAN or LTE and 5G.
This place covers:
Facilitating access network mobility of data sessions through handovers between at least two adjacent core network domains belonging to one packet switched network technology and one circuit switched network technology, e.g. CSFB.
This place covers:
Facilitating access network mobility of data sessions through handovers between at least two adjacent core network domains belonging to one packet switched network technology and one circuit switched network technology, wherein at least one core network domain comprises IP multimedia core network subsystem [IMS], e.g. SRVCC.
This place covers:
Exchange of information for selecting a particular data session to be handed off.
This place covers:
Existing context information e.g. PDP context is provided to the hand-off target, e.g., using hand-off signalling between source and target node
This place covers:
Transparent transfer of whole security contexts or parts of a security context, e.g., using hand-off signalling between source and destination node. Solely the transport but not the particular content of the context information is essential. For earlier or in-time availability of established security contexts in connection with hand-offs.
Attention is drawn to the following places, which may be of interest for search:
Security arrangements; authentication; protecting privacy or anonymity | |
Arrangements for Network Security characterised by a protocol |
The use of H04W 12/04 code for additional information is mandatory.
This place covers:
Transparent transfer of data session or connection quality contexts or parameters, e.g. using hand-off signalling between source and target node. Solely the transport but not the particular content of the context information is essential. For earlier or in-time availability of established quality contexts in connection with hand-offs.
Attention is drawn to the following places, which may be of interest for search:
Central resource management; Negotiation of resources, e.g. negotiating bandwidth or QoS [Quality of Service] | |
Flow control in packet switching systems |
This place covers:
Radio network independent, universal signalling methods are used to control hand-off in different radio networks, e.g., IEEE 802.21 Media Independent Handoff
This place covers:
Transmission and use of capacity information of neighbouring cells; Transmission and use of configuration information to be applied in the target cell; Transmission and use of information to assist the MT to retrieve neighbour cell information;
Transmission and use of the configuration information of the links associated with the terminal realising the hand-off; Transmission and use of specific resource information which are used to transmit a handover message.
Attention is drawn to the following places, which may be of interest for search:
Load balancing or load distribution | |
Central resource management, Negotiation of resources, e.g. negotiating bandwidth or QoS [Quality of Service] | |
Access restriction or access information delivery, e.g. discovery data delivery | |
Control information exchange between nodes |
This place covers:
Transmission of measurement information and their usage for re-establishing the radio link, e.g. handoff signalling messages.
Attention is drawn to the following places, which may be of interest for search:
Hand-off measurements |
This place covers:
Transmission and use of cell information, e.g. cell ID, neighbour cell lists or service capabilities.
Attention is drawn to the following places, which may be of interest for search:
Determination, generation or modification of neighbour cell list(s) |
This place covers:
Direct transfer of handover control information between different access points, e.g. between source and target access point.
This place covers:
Transmission of information between different types of networks in order to establish a new radio link.
This place covers:
Transmission and use of information for hand-off of radio link(s) in case of RRC diversity, decoupled uplink/downlink, aggregation of macro anchor carrier and low power node data booster, CoMP, carrier aggregation, unbalanced uplink/downlink.
Attention is drawn to the following places, which may be of interest for search:
Allocation of physical resources in a cooperative multipoint environment |
This place covers:
Handover involving connections transmitting multiple data streams in parallel, e.g. using cooperative multipoint environment [CoMP], carrier aggregation [CA] or using multiple transmitting/receiving antennas [MIMO].
This place covers:
Handover of only one of the control plane or user plane connections in environments using multiple user plane connections.
This place covers:
Handover in case of dual connection using different radio access technologies, e.g. licensed/unlicensed or LTE/5G.
This place covers:
Notifying the terminal about resources assigned to the target access point or to be used by the terminal; Notification of timing information of a target cell.
Attention is drawn to the following places, which may be of interest for search:
Compensating for timing error of reception due to propagation delay by altering transmission time |
This place covers:
Execution of handoff without execution of a RACH procedure when accessing the target cell.
This place covers:
Transmission of random access codes to be used for accessing the destination cell; Transmission of ranging codes.
This place covers:
Transmission and use of information for retry strategies in case of hand-off failure or rejection.
Attention is drawn to the following places, which may be of interest for search:
Management of connection set-up rejection and failure |
This place covers:
Scanning for hand-off; generation of neighbour cell lists; determination of threshold for signal level reception upon which reporting should be done or upon which hand-off is triggered; update of neighbouring cell list; Determination of the resource that shall be used in the neighbouring cell; Provision of measurements reports in connection with hand-off.
Attention is drawn to the following places, which may be of interest for search:
Discovering; Processing access restriction or access information |
This place covers:
Determination of handover statistics used for improving network performance, e.g. HO failure rate or HO counts.
This place covers:
Generation or update of neighbour cell lists; determination of target cell priorities in the neighbour cell lists; determination of a target neighbour cell.
This place covers:
Determination of thresholds values or any other type of values for which hand-off is triggered.
Determination of time when hand-off is triggered.
Attention is drawn to the following places, which may be of interest for search:
Reselection being triggered by specific parameters |
This place covers:
The hand-off criteria are derived/calculated from recorded network data. Preventing hand-off to target cells for which a short dwell time is expected.
This place covers:
Handover resource prioritization, handover pre-emption or disabling handover.
This place covers:
Scanning for hand-off.
Determination of the time at which measurement shall be performed.
Arrangements and techniques for defining and determining parameters required for hand-off measurements, e.g. determination of thresholds for triggering hand-off measurements.
Attention is drawn to the following places, which may be of interest for search:
Measurements for self-organising networks (SON) | |
Minimisation of drive tests (MDT) |
This place covers:
Determination of the time at which measures shall be performed.
Attention is drawn to the following places, which may be of interest for search:
Scheduling measurement reports; Arrangements for measurements reports |
This place covers:
Arrangements and techniques for defining parameters required for neighbour cell measurements.
This place covers:
Arrangements for avoiding loss of information transiting in the network during reselection of a, generally, new access point by temporary storage and subsequent delivery to the, generally, new selected access point. Resending or duplicating of data; temporary suspension of information flow. Sending the same data to several access points during handoff.
Attention is drawn to the following places, which may be of interest for search:
Flow control in the network |
This place covers:
Sending data to a buffer during hand-off; reading data from a buffer during hand-off and sending the data to one or more access points
Attention is drawn to the following places, which may be of interest for search:
Modification of an existing route due to handover | |
Sequence integrity |
This place covers:
Sending the same data to several access points during handoff.
Attention is drawn to the following places, which may be of interest for search:
Site diversity, e.g. macro-diversity for radio transmission systems |
This place covers:
Hand-off of a pre-established connection through an access point to a direct mode connection; Hand-off of a direct mode connection; wherein the direct mode connection is established in a pre-organized network or is established independently, e.g. ad hoc.
This place covers:
Handover of a pre-established connection through an access point to a direct mode connection or handover of direct mode connection from one cell to another.
This place covers:
Handover of connection involving link(s) of self-organizing networks, e.g. for ad-hoc networks, Bluetooth or sensor networks.
This place covers:
Handover latency improvement for direct mode connections, e.g. for vehicle communication, vehicle-to-vehicle [V2V], vehicle-to-everything [V2X], vehicle-to-pedestrian [V2P] or vehicle-to-home [V2H].
Attention is drawn to the following places, which may be of interest for search:
Services adapted for vehicle communication |
This place covers:
The connection is transferred between access points providing communication in areas of significantly different coverage. Macrocell/microcell hand-off, with the following features: hand-off within the same network authority and using the same air interface.
Attention is drawn to the following places, which may be of interest for search:
Reselecting a different type of service backbone for heterogeneous networks |
This place covers:
Arrangements where wireless communication(s) channel(s) are locally re-arranged without altering the fixed network connection(s); e.g. intra-cell hand-off, hand-off between sectors of one access point.
Attention is drawn to the following places, which may be of interest for search:
Wireless resource selection or (re-)allocation within a cell without exchange of handoff signalling messages |
This place covers:
Arrangements where a different access point is selected, e.g. Intra BSC/RNC hand-off. In case of failure the previous access point can be reselected.
This place covers:
Arrangements where at least one of the access points involved in handoff/handover is a moving node, e.g. moving repeater(s), drone(s), unmanned aerial vehicle(s) [UAV], satellite(s) or airplane(s).
Attention is drawn to the following places, which may be of interest for search:
Space based or airborne stations |
This place covers:
Arrangements where during the handover a different beam of a different access point is selected.
Attention is drawn to the following places, which may be of interest for search:
Cell structures using beam steering | |
Diversity systems |
This place covers:
Specific units of the access point(s) are involved in the handover, e.g. distribution unit(s) (inter-gNB-DU handover) or remote components (e.g. remote radio heads/units or RRH/RRU).
Attention is drawn to the following places, which may be of interest for search:
Access points with remote components connected to the main body by cable, e.g. through CPRI interface |
This place covers:
Arrangements where the reselected access point(s) belongs to a different
access controller, e.g. inter BSC/RNC hand-off.
This place covers:
The connection is transferred between serving nodes in the backbone network e.g. inter-MSC, inter-SGSN.
This place covers:
Reselecting a different type of service backbone for heterogeneous networks, e.g. between macro and femto cells; Reselecting a service backbone involving a service backbone bypassing mobility servers e.g. for local breakout in LIPA or for selected IP traffic offload SIPTO.
Attention is drawn to the following places, which may be of interest for search:
Management of mobility data for LIPA | |
Reselecting a cell layer in multi-layer cells providing the same type of service backbone |
This place covers:
Arrangements where at least one of the cells involved in handover are without a predetermined boundary, e.g. for virtual cells, cloud base station(s), network slice(s) or interzone handover (between group of cells).
This place covers:
The connection is transferred to a different network or authority, e.g. inter-operator or inter-system hand-off.
Attention is drawn to the following places, which may be of interest for search:
Control or signalling for completing the hand-off | |
Transfer of connections of terminals with multi-SIM |
This place covers:
The connection is transferred to a different network or authority using the same radio air interface technology, e.g. inter-operator.
This place covers:
The connection is transferred between different radio air interface technologies.
This place covers:
The connection is transferred between licensed networks, e.g. UMTS-LTE or LTE-5G.
This place covers:
The connection is transferred between networks comprising at least one unlicensed network, e.g. LTE-WLAN.
This place covers:
Handing over connections in order to improve the overall network performance, not the performance of the connection itself.
This place covers:
Hand-off of terminals for reducing overall network power consumption.
This place does not cover:
Performing selection for specific purposes |
This place covers:
Wireless links or data associations are temporarily added or deleted in such a manner that the terminal has at least one wireless link connected or one data association. The primary and the temporarily added wireless link carry the same content. This group covers temporarily established parallel radio links or data associations for the purpose of maintaining a connection during a hand-off.
Data associations cover mobility data e.g. IP addresses.
Attention is drawn to the following places, which may be of interest for search:
Diversity systems, i.e. using permanently existing parallel connections for improving the robustness of the wireless connection | |
Diversity systems; Cooperative use of antennas of several nodes, e.g. in coordinated multipoint or cooperative MIMO |
This place covers:
Maintaining the link with the source node until the connection with the target cell is established, e.g. make before break.
This place covers:
Transferring connections in order to avoid interference to/from neighbouring cells, e.g. confinement hand-off.
Attention is drawn to the following places, which may be of interest for search:
Allocation of wireless resources based on quality criteria |
This place covers:
Transferring connections in order to distribute the traffic to neighbouring cells, e.g. load shedding hand-off.
Attention is drawn to the following places, which may be of interest for search:
Load shedding arrangements | |
Load balancing or load distribution, transfer of traffic between already established connection | |
Handing over a connection due to low quality due to congestion |
This place covers:
Handover being triggered by using cell range extension.
This place covers:
Handover being triggered based on timing information, e.g. at a specific time or after a specific time period.
This place covers:
The reselection is performed in order to meet service level agreements.
Attention is drawn to the following places, which may be of interest for search:
Negotiating wireless communication parameters |
This place covers:
The reselection may be performed for selected parts of a plurality of connections of an user or terminal.
This place covers:
Handoff/handover being triggered by perceived low signal strength.
This place covers:
Handoff/handover being triggered based on perceiving resources with higher communication quality, e.g. higher data rate or higher throughput.
This place covers:
Triggering the handover due to failure of the current radio link.
This place does not cover:
Control signalling for hand-off failure or rejection |
This place covers:
Comprises UE-centric handover.
This place covers:
Handover performed by the terminal when triggering condition sent by the network is fulfilled, e.g. based on stored configurations.
This place covers:
The user's opinion on whether the hand-off should be carried out is requested or the user pre-configures under which conditions a hand-off is to be carried out.
This place covers:
E.g. under control of PCRF, MSC, HSS, HLR
This place covers:
Techniques and arrangements for selectively establishing one or a plurality of communication paths involving at least one wireless path, from information sources to information sinks, over which information is communicated.
Techniques and arrangements for discovering, establishing, maintaining connectivity information among affiliated wireless equipment, e.g. routing lists.
Techniques and arrangements for path selection, path optimisation in network.
Attention is drawn to the following places, which may be of interest for search:
Packet switching systems |
This place covers:
Techniques or arrangements for preventing user or terminal affiliation or for preventing use of network or access point resources or services.
Techniques or arrangements for selecting one or a plurality of networks, access points, or PoAs.
Techniques or arrangements for network or access point information delivery, e.g. discovery information delivery.
Access restriction is considered as restricting network access for any reason except security, performed without affiliation of a terminal. It can be implemented because of contract between user and provider, for the purpose of avoiding congestion, etc.
This place does not cover:
Access security to prevent unauthorised access |
Attention is drawn to the following places, which may be of interest for search:
Security arrangements | |
Hand-off or reselecting arrangements | |
Registration, e.g. affiliation to network, De-registration, e.g. terminating affiliation | |
Local resource management | |
Wireless channel access |
This place covers:
Techniques or arrangements for preventing one or a plurality of users or terminals to affiliate to a selected network or access point, or to use network or access point resources or services, e.g. by jamming broadcast, using barring information.
Preventing or restricting access to service.
This group also covers terminal data consulting, e.g. IMEI data consulting.
Attention is drawn to the following places, which may be of interest for search:
Access security | |
Fraud detection | |
Central resource management | |
Local resource management | |
Jamming of communication, Counter-measures |
This place covers:
Affiliation, access or use is prevented or restricted in specific areas e.g. hospitals, or makes use of user or terminal behaviour information.
Access restriction to avoid influencing systems outside the network.
This place covers:
Affiliation, access or use is prevented or restricted in response to or to avoid a congestion situation, e.g. cell barring.
This place covers:
Distribution, by network equipment to a user or terminal, of information e.g. for the purpose of selecting a network, a network service, a data network PoA or an access point. This group contains downlink delivery of discovery data.
This place does not cover:
Signalling during connection |
Attention is drawn to the following places, which may be of interest for search:
Connectivity information management, e.g. connectivity discovery or update |
This place covers:
The information is distributed by network equipment or by separate equipment on a channel which is distinct from a network communication or control channel e.g. bulletin board. This group contains broadcasting of network (discovery, access...) data for other networks.
This place covers:
Using part of/or a network control channel, e.g. beacon channel. This group contains broadcasting of network (discovery, access...) data by the network on a downlink control channel.
Attention is drawn to the following places, which may be of interest for search:
Dynamic Wireless traffic scheduling; Dynamically scheduled allocation on shared channel using a grant channel | |
Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a dedicated channel for access | |
Pilot transmitters or receivers for control of transmission or for equalising |
This place covers:
The information is sent by the network or access point in response to a user query or user presence detection.
Attention is drawn to the following places, which may be of interest for search:
Discovery of network devices, e.g. terminals |
This place covers:
Searching for available networks, access points and/or communication services they provide; receiving provided discovery information.
Storage, updating, processing discovery information, generally at terminal or user equipment.
Covers also the discovery of the data network PoA
Attention is drawn to the following places, which may be of interest for search:
Spread spectrum techniques in general for transmission systems using direct sequence modulation with code acquisition |
This place covers:
Selecting, based on processed network information, communication service information, or user defined criteria, one or a plurality of data network PoA device(s) within wireless network infrastructure (e.g. PDSN [Packet Date Switching Node] device for immediate or deferred access or affiliation request.
Attention is drawn to the following places, which may be of interest for search:
Reselecting a Data Network Point of Attachment | |
Network selection for access arrangements in wide area data switching networks characterised by path configuration |
This place covers:
Based on processed network information, communication service information, or user defined criteria, one or a plurality of networks is (are) (re-)selected for immediate or deferred access or affiliation request. Selection of an air interface within a network, or selection of a service, or selection of a network domain in the core network. This group also covers selection between CS and PS domain, preferred PLMN, Home area, Localized Service Area selection.
Attention is drawn to the following places, which may be of interest for search:
Selecting a backbone service provider; Access to open networks |
This place covers:
Based on processed access point information, or user defined criteria, one or a plurality of access points is (are) (re-)selected for immediate or deferred access or affiliation request. Selection of a cell served by an access point.
This place covers:
Techniques and arrangements for optimizing network or terminal performance by regulating the amount of power used by a wireless terminal or network equipment.
This place covers:
Techniques and arrangements for establishing or maintaining a predetermined synchronisation relationship between wireless terminal and network equipment or among wireless network equipment, e.g. time synchronisation or frequency synchronisation.
This place covers:
- Registering, affiliating of an authorized user or terminal to a network
- Re-registration of subscribers or terminals in the network
- De-registration of subscribers or terminals from the network
- Tracking a subscriber or terminal by monitoring transmitted information e.g. location updates, communication information from the user or terminal either in response of a network's query, trigger event, periodical request or of his own volition, e.g. periodic registration
- Structure of location areas
- Mobility database structures therefor"
This group covers all registration procedures caused by the mobility of a terminal which are not induced by a hand-off.
Attention is drawn to the following places, which may be of interest for search:
Network data management | |
Network addressing or numbering for mobility support for initial activation of new users | |
Tracking of users for legal interception | |
"Idle hand-off", i.e. reselection while user terminal is in an idle, non-connected state |
This place covers:
Multiple affiliations to one or multiple networks or network domains e.g. Multiple WLAN affiliations, parallel affiliations to GSM and UMTS networks, simultaneous registration of more than one binding in one or several location register.
This place covers:
The user or terminal is requested to transmit registration information at scheduled intervals.
This place covers:
The registration information is transmitted upon occurrence of specific events, e.g. change of location or routing area, network query. Also changing from idle to active mode at terminal in response to such queries.
This place covers:
Indication to the network, access point, user or terminal that affiliation will
cease immediately or in a deferred manner; the indication may include
information for maintaining or resuming affiliation.
Attention is drawn to the following places, which may be of interest for search:
Transfer of terminal data from a network towards a terminal |
This place covers:
Locating user or terminal or network equipment for the purpose of network management or for providing network services to the user or terminal.
This place does not cover:
Radio direction finding, determining distance or velocity by use of radio waves | |
Beacon or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters or receivers co-operating therewith | |
Direction-finders for determining the direction from which electromagnetic waves, not having a directional significance, are being received | |
Position-fixing by co-ordinating in general |
This place covers:
Locating network equipment for the purpose of network management or for providing network services to the user or terminal.
This place covers:
The measurements on the wireless network links are used to derive additional information, e.g. mobility data.
This place does not cover:
Systems for determining distance or velocity using radio waves |
This place covers:
Notifying one or a plurality of users specified as recipients of an incoming communication or changes in provided services. Selectively performing notifying in parts of the network, e.g. paging strategies. Techniques to increase efficiency of the notification channel. The notification uses specific wireless channel(s) reserved/allocated for this purpose; Arrangements and techniques for defining/optimizing paging areas.
Notification, paging strategies based on established location update areas.
Attention is drawn to the following places, which may be of interest for search:
Messaging; Mailboxes; Announcements |
This place covers:
Dedicated structure of paging channels (uplink, downlink, or both). This group covers paging channel structures and paging signalling
This place covers:
Techniques for enhancing notification attempts, e.g. changing the characteristics of the transmitted notification signal or notification channel(s) between unsuccessful attempts.
Attention is drawn to the following places, which may be of interest for search:
Transmission Power Control during retransmission after error or non-acknowledgment |
This place covers:
Indirect paging, whereby a first paging message containing references to the actual paging information is transmitted, e.g. quick paging.
This place covers:
The notification is performed using several attempts in an order based on user's habits or recent network interaction data. Notification based on mobility data, e.g. direction of move, speed.
This place covers:
The notification is performed using several attempts involving different network areas between unsuccessful attempts.
This place covers:
The notification is performed using several attempts and increasing the
initial area by including surrounding network areas between unsuccessful
attempts.
Attention is drawn to the following places, which may be of interest for search:
Arrangements for increasing efficiency of notification or paging channel |
This place covers:
The incoming communication is notified over the whole network.
This place covers:
The notification is conducted simultaneously or sequentially in a plurality of networks. Notification over other subscribed networks when user is unreachable/idle; Using notification associated with different services provided by one (the same) network.
This place covers:
Processing originating user or terminal resource requests for the purpose of allocating one or a plurality of local wireless resources to the user or terminal.
Allocating one or a plurality of local wireless resources in response to a terminating user or terminal communication request.
Controlling wireless resource requests and wireless resource allocation among contending users or terminals.
Selection of wireless resources by user or terminal.
Attention is drawn to the following places, which may be of interest for search:
Network traffic or resource management | |
Central resource management | |
Negotiating wireless communication parameters | |
Resource reservation | |
Arrangements affording multiple use of the transmission path |
In this place, the following terms or expressions are used with the meaning indicated:
Relaying terminal | means terminal equipment (as such covered by H04W 88/02) considered as local access point for the requester. |
RRC | Radio resource control |
MAC-CE | MAC control element |
D2D | Device to device |
URLLC | "Ultra-Reliable Low-Latency Communication [URLLC]" means a set of features that provide low latency and ultra-high reliability for mission critical applications such as industrial internet, smart grids, remote surgery and intelligent transportation systems. |
This place covers:
The user or terminal decides on the resources to be choose
This place covers:
Allocation of wireless resources or adaptation of assigned wireless resources of an access point or of a regulating authority of a self-organizing network for the purpose of communication with user or terminal; (Semi-) persistent scheduling; Allocation of channels to users.
Semi-persistent scheduling is understood as resource allocation, because the allocation of resources is not changed every transmission frame or slot. Re-allocation, i.e. a modification of an existing allocation plan is included, in case it does not involve handover signalling procedures.
Attention is drawn to the following places, which may be of interest for search:
Network deployment, e.g. resource partitioning or cells structures | |
Reselecting a communication resource in the serving access point | |
Scheduling is applied when selected data flows are multiplexed onto a wireless resource, the necessary allocation is implicitly executed | |
Cooperative use of antennas of several nodes, e.g. in coordinated multipoint or cooperative MIMO [Multiple Input Multiple Output] | |
Arrangements for detecting or preventing errors in the information received, modifying transmission characteristics according to link quality | |
Arrangements affording multiple use of the transmission path |
This place covers:
Allocation plan is based on a particular type of wireless resources to a user or terminal. Allocating complex or combinational resources, e.g. resource blocks in time-frequency domain.
This place covers:
Allocation of wireless resources to a user or terminal, where the resource allocated is a specified section of a time-based resource. The allocated resource can be specified indicating the start and stop times, or by indicating the identity of a known time-specified resource unit (e.g. slot)
This place covers:
The resource allocated is a specified portion of a frequency-based resource. The resource can be specified e.g. by indicating the top/bottom frequencies, or by indicating the identity of a known frequency-specified resource unit (e.g. carrier)].
This place covers:
The resource allocated is a specified portion of a space-based resource. The resource can be specified by indicating the sector or area where an operation may take place, or by indicating the identity of a known spatially-specified resource unit, e.g. sector, area.
Attention is drawn to the following places, which may be of interest for search:
Cell structures using beam steering | |
Multi-antenna systems using beam selection at the transmitting station | |
Multi-antenna systems using beam selection at the receiving station |
This place covers:
The resource allocated is a code.
Attention is drawn to the following places, which may be of interest for search:
Orthogonal multiplex systems | |
Code multiplex systems |
This place covers:
The resource allocated is defined in terms of transmission power.
Attention is drawn to the following places, which may be of interest for search:
Transmission power control management, i.e. sharing limited amount of power among users or channels or data types, e.g. cell loading |
This place covers:
Techniques and arrangements for:
- establishing the order of transmission of pending traffic information over one or a plurality of the access point's wireless resources. The order of transmission is based on precedence/priority of the information, priority of the information source or recipient or defined resource usage policy.
- notifying user(s) of granted transmission request(s).
- assigning traffic (of one of more users) to existing channels.
- wireless multiplexing of several flows into one single stream on the wireless interface. It applies to up- and downlink.
- scheduled allocation of resources, allocation change can be signalled and changed every transmission frame or slot, i.e. scheduling is applied when selected data flows are multiplexed onto a wireless resource; the necessary allocation is implicitly executed.
Attention is drawn to the following places, which may be of interest for search:
Adaptation of traffic data packets received from higher layers onto packet transmission requirements of lower layer, e.g. SDU onto PDU" | |
Flow control in the network | |
Power saving arrangements using pre-established activity schedule | |
Semi-persistent scheduling is understood as resource allocation, because the allocation of resources is not changed every transmission frame, slot | |
Discontinuous transmission or reception | |
Arrangements for detecting or preventing errors in the information received, modifying transmission characteristics according to link quality | |
Flow control in packet switching networks |
This place covers:
Schedule is established jointly for a group of users; Definition of scheduling group; Assigning group identifier
Attention is drawn to the following places, which may be of interest for search:
User group management |
This place covers:
Schedule is defined to provide for a disturbance free usage of different radio technologies by one network element
Attention is drawn to the following places, which may be of interest for search:
Spectrum sharing arrangements [between different networks | |
Terminal device adapted for operation in multiple networks, e.g. multi-mode terminals | |
Access point device adapted for operation in multiple networks, e.g. multi-mode access points | |
Programme switching, task transfer initiation or dispatching by program, scheduling strategies for dispatcher | |
Allocation of resources to service a request, the resources being hardware resources other than CPUs, Servers and Terminals |
Collaborative techniques,
- in terminals should receive the H04W 88/06 code as additional information
- in base stations should receive the H04W 88/10 code as additional information.
This place covers:
Schedule definition is based on the time traffic data has been already waiting for transport e.g. in a terminal or base station buffer
Attention is drawn to the following places, which may be of interest for search:
Flow control in the network using intermediate storage | |
Schedule definition, set-up or creation based on load |
This place covers:
Application of a (pre-defined) schedule to accomplish the transport of traffic data over a wireless link. Mapping of traffic data onto a schedule pattern which is defined by the physical parameters used for quantising the wireless medium, e.g. a combination of a frequency and time slots in OFDMA. Also covers cases where scheduling effectively leads to a (temporary) allocation of resources.
This place covers:
Schedule usage for uplink data flows.
This place covers:
Schedule usage for downlink data flows
This place covers:
Allocation-related communication among nodes, e.g. mobile stations, access points, leading to a transfer of control information, e.g. a request for or an assignment of resources as well as descriptive information needed therefore. Control information exchanged via multiple interfaces or directions of similar importance. Resource allocation for control channels.
Attention is drawn to the following places, which may be of interest for search:
Transfer of user or subscriber data | |
Transmission and use of information for re-establishing the radio link of resource information of target access point |
Resource allocation for control channels should be classified in H04W 72/20 and with an additional symbol for the specific resource allocation aspect.
This place covers:
Allocation-related communication from a mobile station to an access point, from a mobile station to a relay node, or from a relay node to an access point. The allocation-related communication comprises e.g. requesting an allocation, or other allocation related issues.
This place covers:
Allocation-related communication from an access point to a mobile station, from an access point to a relay node, or from a relay node to a mobile station. The allocation-related communication comprises e.g. transmission of the allocation plan, or other allocation related issues.
This place covers:
Allocation-related communication between access points, e.g. notifying the next access point about the resources allocated at the present access point.
This place covers:
Allocation related communication between an access point and a device controlling the access point, e.g. parameter settings to be applied by the access point. The access point can be a distributed unit and the access point controlling device can be a central unit in a distributed base station or cloud RAN.
Attention is drawn to the following places, which may be of interest for search:
Central resource management; Negotiating of resources |
This place covers:
Allocation of specific resources for broadcast/multicast purposes; reselection of preferred frequency layers (reselecting a different broadcast carrier when service is interrupted on the one in use).
Attention is drawn to the following places, which may be of interest for search:
Central resource management |
This place covers:
Allocation of resources on the basis of properties related to the terminal/device to which resources are to be allocated, e.g. location, mobility status, operating applications.
Properties either are known by or reported to the instance making the allocation decision.
Attention is drawn to the following places, which may be of interest for search:
Processing or transfer of terminal data, e.g. status or physical capabilities |
This place covers:
Allocation of resources based on the load of the stations involved or level of usage of resources.
This place covers:
Allocation of resources making use of explicit instructions/regulations, whose application directly leads to a specified and well-defined allocation plan.
This place covers:
Schedule definition based on a usage policy related to a resource or entity involved in transmission of the traffic data, e.g. fairness of transmission opportunity, opportunistic scheduling, synchronised switch between uplink and downlink transmission.
This place covers:
Allocation of resources on the basis of quality of communication provided by the links or stations involved.
Attention is drawn to the following places, which may be of interest for search:
Definition of hand-off measurement parameters; Arrangements and techniques for reducing the perturbation due to measuring activities performed for neighbour cell list measurements, e.g. compressed mode |
This place covers:
Allocation of resources on the basis of interference on the air interface or faced by the stations involved, e.g. co-channel interference; Arrangements and techniques for measuring or sensing the primary network in a cognitive radio, e.g. "quiet period".
Attention is drawn to the following places, which may be of interest for search:
Spectrum sharing arrangements between different networks |
Defining or using a "quiet period" for sensing for the primary network in cognitive radio should be classified in H04W 72/54 with an additional symbol in H04W 16/14.
This place covers:
Allocation of resources on the basis of the measured quality of communication provided by the air interface or stations involved, e.g. C/I or BER.
This place covers:
Allocation of resources on the basis of the requested quality of communication provided by the air interface or stations involved.
This place covers:
Allocation of resources on the basis of priority of the traffic communicated, or the priority of the stations involved.
This place covers:
Allocation of resources on the basis of ranking criteria of the wireless resources, e.g. preferred channel list. Usually, a ranking criterion exists before a decision on allocation is made.
This place covers:
Schedule definition is based on the precedence or priority of the information to be transmitted or the precedence or priority of the information source or recipient.
This place covers:
Schedule definition is based on a precedence or priority of the traffic information to be transmitted.
This place covers:
Techniques or arrangements for managing user or terminal access requests.
Techniques or arrangements for arbitration of access between contending users.
In this place, the following terms or expressions are used with the meaning indicated:
random access procedure | procedure where a terminal performs access to a 3GPP-standard based network on a random access channel |
This place covers:
Channel access related information is transmitted between access point and user or terminal. Exchange of information relevant for a random access procedure between nodes. Covers structures of control channels for access; transmission of access information to be used for access channels; access information format.
Attention is drawn to the following places, which may be of interest for search:
Transmission and use of information for re-establishing the radio link of access information of target access points | |
Access restriction or access information delivery, e.g. discovery data delivery | |
Random access procedures, e.g. with 4-step access | |
Random access procedures, e.g. with 2-step access | |
Random access procedures using contention-free random access [CFRA] |
This place covers:
Channel access related information is sent by a user or terminal towards an access point. A user equipment signals random access information to a radio base station, e.g. RA [Random Access] request, M1 message in LTE [Long Term Evolution].
This place covers:
Channel access related information is send from access point to user or terminal. A radio base station signals random access information to a user equipment, e.g. RA [Random Access] request response, M2 message in LTE [Long Term Evolution], parameter provisioning)
This place covers:
Automatic selection of an access technique, e.g. scheduled or non-scheduled with respect to network, user(s) requirements or channel conditions
This place covers:
Users are scheduled for transmission in an orderly fashion generally by a controller or are aware of their scheduled transmission rights.
Covers also Slotted access.
This place does not cover:
Hybrid access |
This place covers:
- Users or terminals are polled for their immediate transmission requirements and channel access is granted accordingly.
- Invitation for transmission and trigger frames (IEEE 802.11ax).
- Slotted polling.
This place covers:
Access to the shared wireless channel is performed without full awareness of other users' or channel state.
This group covers the random access as such.
Covers also Slotted ALOHA.
This place does not cover:
Hybrid access |
This place covers:
Before transmission, the sender listens to the shared medium to detect transmissions by others. Typical examples are clear channel assessment [CCA] and listen-before-talk [LBT]. It also covers slotted carrier sense multiple access [CSMA].
This place covers:
Besides listening to the shared medium additional measures are taken in order to avoid collisions, e.g. notifying other senders of an intended transmission, RTS / CTS. Covers also Slotted CSMA
This place covers:
If, despite performing carrier sensing, collisions can not be completely avoided, their occurrence is at least detected. Covers also Slotted CSMA
This place covers:
In the framework of a given (multiple) access scheme the actual access to the shared medium takes place at a random instance without prior carrier sensing.
This place covers:
Taking additional measures to mitigate collisions that occur during random access procedures, e.g. allocating higher priority random access preambles to high-priority users or terminals to reduce collision occurrences involving those users or terminals.
This place covers:
Measures are taken in order to avoid further collisions, e.g. applying a time back-off for retransmissions.
This place covers:
In cases where collisions can not be avoided, their occurrence is at least detected.]
This place covers:
Access requests are transmitted on a distinct channel, normally allocated or defined by a controlling entity, e.g. an access point. This group covers the usage of an uplink control channel, i.e. a frequency, a code, a time slot, a frame section.
This place covers:
Users access the dedicated channel in an order established by a controlling entity, e.g. an access point
This place covers:
Access to the dedicated channel is performed at random time, e.g. no frame structure exist or is respected.
This place covers:
Access to the dedicated channel is performed respecting a time structure on the channel, e.g. a frame or slot structure.
This place covers:
Techniques and arrangements for selecting and establishing one or a plurality of connections (e.g. tunnels), recovering or reconnecting accidentally lost connections.
Switching or re-directing connection or control function.
De-allocating, re-claiming one or a plurality of established communication resources no longer in use.
Signalling arrangements therefore.
Connection state management, e.g. idle mode; allocation of reserved affiliation/binding connection identifiers associated with one or a plurality of the managed connections.
Attention is drawn to the following places, which may be of interest for search:
Communication routing or communication path finding | |
Session management in data packet switching networks |
This place covers:
Assignment or use of one or a plurality of connection identifiers when establishing a connection.
Note:
A connection identifier is specific to a connection itself, e.g. flow identifier or link identifier (not calling/called party identifier, network identifier such as SSID).
Attention is drawn to the following places, which may be of interest for search:
Network addressing or numbering for mobility support | |
Network arrangements or network protocols for addressing or naming |
This place covers:
Techniques and arrangements for establishing a tunnel/bearer connection for transport in the network, e.g. PDP Context establishment.
Attention is drawn to the following places, which may be of interest for search:
Protecting privacy or anonymity | |
Arrangements for network security |
This place covers:
Setup of a direct mode connection in a hierarchical pre-organized network whereby the establishment is done either directly between users/terminals or via relaying equipment, e.g. establishment of a wireless connection between two peers.
The user/terminal equipment establishes a direct communication with another user/terminal equipment on a communication channel defined or negotiated via the network. The direct connection between regular members of a network must be a special mode of operation.
Attention is drawn to the following places, which may be of interest for search:
Discovery of network devices, e.g. terminals | |
Set up of a connection, e.g. between Bluetooth terminals or between terminals belonging to self-organizing networks, e.g. ad-hoc networks or sensor, mesh networks | |
Terminal devices adapted for relaying to or from another terminal or user |
This place covers:
Techniques and arrangements for establishing a plurality of wireless communication links for transferring information to one user/terminal, i.e. multi-call, multi-bearer connection.
Attention is drawn to the following places, which may be of interest for search:
Multichannel or multilink protocols |
This place covers:
The mobile network correlates establishment of multiple bearers across at least two different radio access technologies or core network domain technologies in parallel for one and the same end user session. The mobile network introduces a certain level of cooperation between, e.g. a 5G bearer and an LTE bearer.
Attention is drawn to the following places, which may be of interest for search:
Control or signalling for completing the hand-off for transferring sessions between adjacent core network technologies | |
Reselecting a network or an air interface |
This place covers:
Techniques and arrangements for the purpose of establishing an alternate connection after the initial connection request being unsuccessful, e.g. retry strategies after rejection or after no response. Rejection of a request for establishing a connection.
Attention is drawn to the following places, which may be of interest for search:
Network traffic or resource management, Error control | |
Access restriction performed under specific conditions | |
Reactions to resource unavailability in packet switching systems |
This place covers:
Recovering or reconnecting an accidentally lost connection.
Attention is drawn to the following places, which may be of interest for search:
Control or signalling for completing the hand-off for data session or connection with transfer of context information |
This place covers:
- Switching, re-routing connection or control function in addition to those necessary to establish or maintain connection between users or terminals.
- In-connection signalling, notification, connection state transition to and from e.g. hibernation or dormant mode.
- Connection manipulation aspects of DTX or DRX not related to power saving arrangements.
Attention is drawn to the following places, which may be of interest for search:
Hand-off or reselecting arrangements | |
Modification of an existing route due to handover | |
Power saving arrangements |
This place covers:
Techniques and arrangements for redefining a transport tunnel connection in the network, e.g. PDP context modification.
Attention is drawn to the following places, which may be of interest for search:
Control or signalling for completing the hand-off for data session or connection for hand-off preparation |
This place covers:
Transition in a hierarchical pre-organized network between direct mode and via third parties mode. Release of non-active connection legs after the transition.
This place covers:
Techniques and arrangements for maintaining an already established connection and avoiding the release of the resources, e.g. transmitting a "keep-alive" packet over the packet protocol context so as to maintain the packet protocol context.
Attention is drawn to the following places, which may be of interest for search:
Session management in data packet switching networks |
This place covers:
Transitions between RRC states which reflect the level of user equipment connection and which transport channels can be used by the user equipment, e.g. transition between IDLE, CELL_FACH, CELL_DCH, CELL_PCH and URA_PCH states.
Attention is drawn to the following places, which may be of interest for search:
Power saving arrangements | |
Connection setup |
This place covers:
Connection management aspects of DTX or DRX, e.g. timing or tuneaway.
Attention is drawn to the following places, which may be of interest for search:
Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists | |
Use of DTX/DRX for mainly power saving arrangements |
This place covers:
- De-allocating one or a plurality of established connections.
- Signalling therefor.
This place covers:
Techniques and arrangements for releasing a transport tunnel connection in the network, e.g. PDP Context deactivation.
This place covers:
Techniques and arrangements for partially releasing connections of one or a plurality of users. Also release of one or a plurality of connections involved in a multi-call.
This place covers:
Techniques and arrangements for forcibly releasing one or a plurality of the ongoing connections according to criteria like the priority of the users, priority of the information to be transmitted or activity related factors for the purpose of re-assigning the released resources. e.g. call pre-emption.
This place covers:
Techniques and arrangements for releasing connections according to inactivity timers.
This place covers:
Connection set up for allowing a plurality of users or terminals to be included in a singlecommunication. Connection set up for special broadcast or group call services, e.g. emergency broadcast, CUG, VPN, PTT, PoC (PTT on Cellular), P2C (Press to Connect).
Attention is drawn to the following places, which may be of interest for search:
Broadcast or conference, e.g. multicast | |
Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities |
This place covers:
Communication is established among members of a predefined group by an active user with a talk request over usually a half-duplex channel.
Attention is drawn to the following places, which may be of interest for search:
Trunked mobile radio systems | |
Arrangements for real-time multimedia communications - Push-to-X services |
This place covers:
- Connection set up requiring an urgent or hazardous situation; emergency connection set up techniques wherein an originating terminal creates an emergency communication to a central;
- Connection set up in disastrous scenarios wherein a central creates an emergency communication to a terminating terminal or a group of terminals.
Attention is drawn to the following places, which may be of interest for search:
Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems, characterised by the transmission medium, using wireless transmission systems | |
Cordless telephones for supporting an emergency service | |
Centralised call answering arrangements requiring operator intervention for emergency applications |
This place covers:
Generic data protocols for operation of wireless media and implemented at particular network layers.
Attention is drawn to the following places, which may be of interest for search:
Network security protocols | |
Media handling, encoding, streaming or conversion | |
Network protocols for data switching network services |
Classification symbols of this group should preferably only be allocated as "additional information".
This place covers:
Networks characterized by a specific organisation of network equipments, e.g. wireless access points, or linking infrastructure thereof.
Attention is drawn to the following places, which may be of interest for search:
Active relay systems |
Classification symbols of this group should preferably only be allocated as "additional information" in combination with at least one symbol of the functional groups H04W 4/00 - H04W 76/00.
This place covers:
The wireless network(s) with their affiliated terminals or users are moving with respect to a linked overlaying wireless network(s).
Attention is drawn to the following places, which may be of interest for search:
Services for mass transport vehicles, e.g. buses, trains, or aircraft |
This place covers:
Networks with a pre-established organization i.e. users are normally not responsible for or network configuration or management.
This place covers:
Providing paging services to users
This place covers:
Networks of large scale, e.g. nationwide, using a plurality of hierarchically
interconnected selecting equipments for path finding or routing communication(s) within the network from/to a wireless user. The communication(s) can originate or terminate from/in an external network e.g. cellular systems.
This place covers:
A PLMN typically consists of several cellular technologies like GSM/2G, UMTS/3G, LTE/4G, 5G offered by a single operator within a given country, often referred to as a cellular network. A PLMN comprises a Radio Access Network, RAN, a Core Network, CN, as well as an Operation and Management Subsystem, OMS.
This place covers:
PLMS [Public Land Mobile systems] where additional access points are deployed by a private entity and operated under the control of the public network operator/administrator for providing exclusive private services and/or additional coverage or enhanced communication services to affiliated PLMS network users.
This place covers:
PLMN using dedicated relay/repeater stations (not relaying terminals)
Attention is drawn to the following places, which may be of interest for search:
Cell enhancers or enhancement, e.g. for tunnels, building shadow | |
Self organising networks with access to wired networks | |
Terminal devices adapted for relaying to or from another terminal or user |
This place does not cover:
Space-based or airborne stations |
This place covers:
Dedicated systems in which, generally a half duplex communication channel is shared among a predefined group of users.
Attention is drawn to the following places, which may be of interest for search:
Push-to-Talk or Push-on-Call services |
This place covers:
Networks of small, local or limited size with a wired or wireless backbone connected to access points, e.g. private, corporate networks.
This place covers:
Access point owned and operated by a private entity, i.e. non-public operator for its own exclusive use. The PBS remains in, or forms on its own, a separate network or is connected to a PBX
Attention is drawn to the following places, which may be of interest for search:
Small scale networks; Flat hierarchical network | |
Access point device |
In practice, all documents falling under coverage of H04W 84/105 are all classified in H04W 84/105 unless they fit at least into one of the groups H04W 84/12 - H04W 84/16.
This place covers:
Local area networks providing wireless access to stations connecting to one or more access points within a limited area. May operate as an isolated network or may connect to an external (public) network. WLANs operating according to IEEE 802.11 specifications are called Wi-Fi networks.
This place covers:
Networks in which subscribers with zero or limited mobility have wireless access to a public network.
Networks in which fixed subscribers have wireless access to a public network.
Radio concentration equipment for subscriber premises.
Attention is drawn to the following places, which may be of interest for search:
Terminal device adapted for Wireless Local Loop operation |
This place covers:
Networks in which wireless subscribers are connected by a Private Branch Exchange (PBX).
This place covers:
- User-based networks without hierarchical organisation.
- Users define network(s), affiliation(s), can elect a regulating authority (master), can act as relaying device on behalf of other users.
- Affiliation of users to network(s) and user's roles in the network(s) can be dynamically changed.
- Creation and termination of user-defined networks.
- Single-hop or multi-hop networks for communication between network nodes having no predetermined connectivity and no pre-defined central control.
- Responsibilities for establishing, maintaining and controlling the network's organisation are distributed among the nodes dynamically.
- The nodes are either capable of relaying messages between pairs of nodes not having a direct communication link (multi-hop networks) or they communicate directly without having a specific pre-defined association (single hop).
- Membership in the ad-hoc network may be dynamic.
- Interrogation networks are considered self-organizing networks.
- Master-slave aspects as part of the ad-hoc network.
Attention is drawn to the following places, which may be of interest for search:
Distributed application using peer-to-peer [P2P] networks | |
Arrangements for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car involving the management of devices over a network |
This place covers:
Techniques and arrangements to (re-)elect a user as regulating authority.
This group covers only the (re-)election of a master (also "transfer" of master role).
This place covers:
Techniques and arrangements for connection of a self-organizing network to a wired network through an access point.
This place covers:
Devices specially adapted for wireless communication networks, e.g. terminal equipment;
Wireless access network equipment e.g. access point, access point controllers;
Switching or routing equipment in wireless backbone networks,
gateways, service support - and network management equipment.
Attention is drawn to the following places, which may be of interest for search:
Transceivers | |
Data switching networks | |
Substation equipment for telephonic communication | |
Selecting | |
Casings, cabinets or drawers for electric apparatus |
Classification symbols of this group should preferably only be allocated as "additional information" in combination with at least one symbol of the functional groups H04W 4/00 - H04W 76/00.
This place covers:
Logical entity within wireless network or mobility management infrastructure providing access to a data network for a wireless user.
This place covers:
Physical equipment acting with network as/on behalf of a user, thereby behaving as an endpoint of a network functionality. This group contains more than just details of terminal construction. Instead, the emphasis is on "acting with network", i.e. a terminal having network functionality.
Attention is drawn to the following places, which may be of interest for search:
Portable computers with a single-body enclosure integrating a flat display, e.g. personal digital assistants | |
Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving | |
Substation equipment for telephonic communication |
Attention is drawn to the following places, which may be of interest for search:
Network addressing or numbering for mobility support |
This place covers:
Terminal device providing the additional functionality of acting as a relay e.g. on behalf of a different terminal, forwarding information to/from said terminal.
Attention is drawn to the following places, which may be of interest for search:
Cell enhancers or enhancement, e.g. for tunnels, building shadow | |
Public land mobile networks using dedicated repeater stations | |
Active relay systems |
This place covers:
Terminal equipment able to operate using at least two different communication technologies or standards, or different versions of a standard in a single network or multiple networks, e.g. packet-switched and circuit-switched operation, analog-digital, WLAN-cellular, GSM900-GSM1800.
Terminal equipment with at least two operational modes; multiple operational modes are understood to mean significantly different operations, which would be equivalent to deeming the operations to take place in two different networks.
Attention is drawn to the following places, which may be of interest for search:
Power saving arrangements | |
Hybrid wireless channel access techniques | |
Connection manipulation, discontinuous transmission or reception | |
Transceivers with more than one transmission mode |
This place covers:
Access points. Equipment providing wireless coverage and selective access to/from wireless access network.
This place does not cover:
Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving | |
Active relay systems | |
Cordless telephones | |
Casings, cabinets or drawers for electric apparatus | |
Constructional details common to different types of electric apparatus |
This place covers:
Access point devices, where components of the access point device (e.g. transceiver and antenna) are located remote from the main body of the access point device, and the remote components are connected to the main body by cable, e.g. CATV or optical fibre.
Attention is drawn to the following places, which may be of interest for search:
Radio through fibre |
This place covers:
Access points able to operate using at least two networks, communication technologies or standards, or different versions of a standard, e.g. packet-switched and circuit-switched operation, analog-digital, WLAN-cellular, GSM900-GSM1800.
Access points with at least two operational modes.
This place covers:
Equipments for controlling access points, e.g. Base Station Controller (BSC), Radio Network Controller (RNC), Femto base station controller (Home nodeB gateway).
This place covers:
Backbone or core network devices. Switching or routing equipment for establishing a connection between a wireless user and a communication network, e.g. MSC/SGSN.
Attention is drawn to the following places, which may be of interest for search:
Data switching networks | |
Selecting |
In this place, the following terms or expressions are used with the meaning indicated:
MSC | Mobile Switching Centre |
SGSN | Serving General Packet Radio Service Support Node |
This place covers:
Devices operating between different networks; Devices at the edge of one network interfacing to another network, e.g. between a wireless access network and a data network, or between a wireless access network and a wired network.
Attention is drawn to the following places, which may be of interest for search:
Inter-networking arrangements | |
Arrangements for connecting between networks having differing types of switching systems, e.g. gateways |
This place covers:
- Wireless network equipments for providing services to users.
- Wireless network equipments for supporting the provision of services.
- Wireless network equipments for managing said networks.
Attention is drawn to the following places, which may be of interest for search:
Supervisory, monitoring or testing arrangements |
This place covers:
- Network equipment for providing direct digital-to-digital data conversion from one encoding to another.
- Network equipment for adapting the rate of a communication.
- Arrangements for avoiding multiple transcoding, e.g. for tandem free operation.
This place does not cover:
Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, e.g. for compression or expansion, source-filter models or psychoacoustic analysis |
Attention is drawn to the following places, which may be of interest for search:
Network addressing or numbering for mobility support |
This place covers:
- Arrangements for interconnecting network components or networks.
- Special equipment or adaptations therefor.
- Control and signalling arrangements at an interface.
The following is a list of specific interfaces between entities defined by specific standards.
System/standard: entities/ Interface | Subgroups |
GSM: BS-BSC/A-bis | |
GSM: BSC-MSC/A | |
UMTS: Node B- RNC/IuB | |
UMTS: RNC-MGW/IuCS | |
UMTS: RNC-SGSN/IuPS | |
UMTS: USIM-ME/ Cu | |
UMTS: RNC-RNC/ IuR | |
GSM: HLR-MSC/ B | |
GSM: MSC/VLR-HLR/ D | |
GSM: MSC-EIR/ F | |
GPRS: EIR-SGSN/ Gf | |
GPRS: EIR-SGSN/ Gr | |
GPRS: EIR-SGSN/ Gc |
Classification symbols of this group should preferably only be allocated as "additional information" in combination with at least one symbol of the functional groups H04W 4/00 - H04W 76/00.
In this place, the following terms or expressions are used with the meaning indicated:
GSM | Global System for Mobile communications |
UMTS | Universal Mobile Telecommunications Systems |
MSC | Mobile Switching Center |
MGW | Media Gateway |
SGSN | Serving GPRS Support Node |
GPRS | General Packet Radio Service |
ME | Mobile Equipment |
EIR | Equipment Identity Register |
USIM | Universal Subscriber Identity Module |
This place covers:
Arrangements for interconnecting a plurality of networks. The networks may be either physically or logically separated.
Attention is drawn to the following places, which may be of interest for search:
Gateway arrangements |
This place covers:
E.g. A-bis, IuB, A, IuCS, IuPS.
Attention is drawn to the following places, which may be of interest for search:
Master-slave arrangements in self-organizing networks |
This place covers:
Interface between access point and switching/routing equipment of the network e.g. S1, S1U
This place covers:
Interface between the wireless network and edge equipment of a public fixed telephone or data network.
This place covers:
E.g. Cu. (the Cu-interface is the interface between the "SIM card" and the terminal; the Cu-interface may be wireless).
Attention is drawn to the following places, which may be of interest for search:
Mechanical arrangements for accommodating identification devices |
This place does not cover:
Radio transmission systems for communication between two or more posts, at least one of which is mobile |
This place covers:
Interface between controlled access points and wireless access controlling equipment, e.g. A-bis, IuB, IuR, S1MME.
This place covers:
Interface between BSC/RNC and switching/routing equipment of the network e.g. A, IuCS, IuPS, Gb, IuH, S1MME.
This place covers:
E.g. among access points, between switching/routing equipments, between support/management equipments.
This place covers:
Interface between terminals/UEs of the network e.g. Device to Device (D2D), sidelink, PC5.
Attention is drawn to the following places, which may be of interest for search:
Direct-mode setup | |
Manipulation of direct-mode connections |
This place covers:
Interface between access points of the network e.g. X2
This place covers:
Interface between switching/routing equipments and support/management equipment e.g. HLR, VLR, AuC, SMS-C; B, D, F, Gf, Gr, Gc].