18272804. METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES simplified abstract (SONY GROUP CORPORATION)
Contents
- 1 METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES
Organization Name
Inventor(s)
Vivek Sharma of Basingstoke (GB)
Hideji Wakabayashi of Basingstoke (GB)
Yassin Aden Awad of Basingstoke (GB)
METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18272804 titled 'METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES
Simplified Explanation
The method described in the abstract involves ensuring service continuity during a handover of a communications device from an untrusted access point to a trusted access point in a wireless communications network. This is achieved by transmitting a request for a service from the core network via the untrusted access point, receiving the service through the current communications session, determining the need for a handover, providing information to the trusted access point in advance, and finally receiving the service from the core network via the trusted access point after the handover.
- Request service from core network via untrusted access point
- Receive service through current communications session
- Determine need for handover to trusted access point
- Provide information to trusted access point in advance
- Receive service from core network via trusted access point after handover
Potential Applications
This technology could be applied in various industries such as telecommunications, mobile networks, and IoT devices where seamless handover between access points is crucial for uninterrupted service delivery.
Problems Solved
1. Ensures service continuity during handover between access points 2. Provides a secure and reliable method for transferring communication sessions from untrusted to trusted access points
Benefits
1. Improved user experience with uninterrupted services 2. Enhanced security by ensuring data integrity during handover processes
Potential Commercial Applications
Optimizing handover procedures in mobile networks Enhancing IoT device connectivity with seamless transitions between access points
Possible Prior Art
One possible prior art could be methods for handover procedures in wireless networks, but the specific approach described in this patent application may offer unique features or improvements over existing technologies.
Unanswered Questions
How does this method impact battery life of the communications device during handover processes?
The abstract does not provide information on the potential impact of this method on the battery life of the communications device. It would be important to understand if this method could potentially drain the battery faster due to increased communication activities during handover procedures.
What are the potential challenges in implementing this method across different types of wireless communications networks?
The abstract does not address the potential challenges that may arise when implementing this method in various wireless communications networks. It would be essential to consider factors such as network compatibility, standardization issues, and interoperability with different network technologies.
Original Abstract Submitted
A method for providing service continuity in a handover of a communications device from an untrusted access point to a trusted access point in a wireless communications network includes transmitting a request to receive a service from a core network of the wireless communications network via the untrusted access point, the communications device being in an inactive state; receiving from the untrusted access point the requested service using a current communications session; determining that a handover procedure should be performed from the untrusted access point to the trusted access point; arranging for the trusted access point to receive information regarding the current communications session in advance of the handover, the information including at least an indication that the communications device is currently receiving the requested service via the untrusted access point; receiving the requested service from the core network via the trusted access point after the handover.