18272804. METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES simplified abstract (SONY GROUP CORPORATION)

From WikiPatents
Jump to navigation Jump to search

METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES

Organization Name

SONY GROUP CORPORATION

Inventor(s)

Vivek Sharma of Basingstoke (GB)

Hideji Wakabayashi of Basingstoke (GB)

Yuxin Wei of Basingstoke (GB)

Yassin Aden Awad of Basingstoke (GB)

METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18272804 titled 'METHODS, INFRASTRUCTURE EQUIPMENT AND COMMUNICATIONS DEVICES

Simplified Explanation

The method described in the abstract involves ensuring service continuity during a handover of a communications device from an untrusted access point to a trusted access point in a wireless communications network. This is achieved by transmitting a request for a service from the core network via the untrusted access point, receiving the service through the current communications session, determining the need for a handover, providing information to the trusted access point in advance, and finally receiving the service from the core network via the trusted access point after the handover.

  • Request service from core network via untrusted access point
  • Receive service through current communications session
  • Determine need for handover to trusted access point
  • Provide information to trusted access point in advance
  • Receive service from core network via trusted access point after handover

Potential Applications

This technology could be applied in various industries such as telecommunications, mobile networks, and IoT devices where seamless handover between access points is crucial for uninterrupted service delivery.

Problems Solved

1. Ensures service continuity during handover between access points 2. Provides a secure and reliable method for transferring communication sessions from untrusted to trusted access points

Benefits

1. Improved user experience with uninterrupted services 2. Enhanced security by ensuring data integrity during handover processes

Potential Commercial Applications

Optimizing handover procedures in mobile networks Enhancing IoT device connectivity with seamless transitions between access points

Possible Prior Art

One possible prior art could be methods for handover procedures in wireless networks, but the specific approach described in this patent application may offer unique features or improvements over existing technologies.

Unanswered Questions

How does this method impact battery life of the communications device during handover processes?

The abstract does not provide information on the potential impact of this method on the battery life of the communications device. It would be important to understand if this method could potentially drain the battery faster due to increased communication activities during handover procedures.

What are the potential challenges in implementing this method across different types of wireless communications networks?

The abstract does not address the potential challenges that may arise when implementing this method in various wireless communications networks. It would be essential to consider factors such as network compatibility, standardization issues, and interoperability with different network technologies.


Original Abstract Submitted

A method for providing service continuity in a handover of a communications device from an untrusted access point to a trusted access point in a wireless communications network includes transmitting a request to receive a service from a core network of the wireless communications network via the untrusted access point, the communications device being in an inactive state; receiving from the untrusted access point the requested service using a current communications session; determining that a handover procedure should be performed from the untrusted access point to the trusted access point; arranging for the trusted access point to receive information regarding the current communications session in advance of the handover, the information including at least an indication that the communications device is currently receiving the requested service via the untrusted access point; receiving the requested service from the core network via the trusted access point after the handover.