18546904. METHOD AND SYSTEM IN 3GPP NETWORKS FOR REPORTING OF VOWIFI CALLS OVER UNTRUSTED NON-3GPP ACCESS simplified abstract (Telefonaktiebolaget LM Ericsson (publ))

From WikiPatents
Revision as of 11:27, 19 September 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND SYSTEM IN 3GPP NETWORKS FOR REPORTING OF VOWIFI CALLS OVER UNTRUSTED NON-3GPP ACCESS

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Yatin Rajwadha of Noida (IN)

Ankit Kulshrestha of Jaipur Rajasthan (IN)

METHOD AND SYSTEM IN 3GPP NETWORKS FOR REPORTING OF VOWIFI CALLS OVER UNTRUSTED NON-3GPP ACCESS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18546904 titled 'METHOD AND SYSTEM IN 3GPP NETWORKS FOR REPORTING OF VOWIFI CALLS OVER UNTRUSTED NON-3GPP ACCESS

Simplified Explanation

The patent application describes a method for a wireless communication system where a user establishes a Quality of Service flow for an incoming IMS session over a cellular network. The user then triggers another IMS registration request over an untrusted non-3GPP network, transferring the session to the established flow. Details of calls made through the untrusted network are reported to a remote server.

  • Establishing Quality of Service flow for incoming IMS session
  • Triggering IMS registration request over untrusted network
  • Transferring session to established flow
  • Reporting call details to remote server
  • Utilizing untrusted access network for calls

Key Features and Innovation

  • Seamless transfer of IMS session between networks
  • Efficient utilization of untrusted access networks
  • Enhanced Quality of Service for IMS sessions
  • Reporting of call details for monitoring and analysis
  • Integration of multiple network types for communication

Potential Applications

  • Mobile network operators
  • Internet service providers
  • Communication service providers
  • Network equipment manufacturers
  • Telecommunication regulatory authorities

Problems Solved

  • Seamless handover between trusted and untrusted networks
  • Efficient utilization of network resources
  • Monitoring and reporting of call details
  • Enhanced Quality of Service for users
  • Integration of diverse network technologies

Benefits

  • Improved user experience
  • Enhanced network efficiency
  • Better monitoring and analysis capabilities
  • Seamless communication across different networks
  • Optimal resource utilization

Commercial Applications

The technology can be applied in various commercial sectors such as mobile network operators, internet service providers, and communication service providers. It can improve network efficiency, enhance user experience, and enable seamless communication across different network types.

Questions about the Technology

How does the technology ensure seamless transfer of IMS sessions between networks?

The technology establishes a Quality of Service flow for incoming IMS sessions, allowing for efficient transfer between trusted and untrusted networks.

What are the potential benefits of utilizing untrusted access networks for calls?

Utilizing untrusted access networks can enhance network efficiency, improve user experience, and enable seamless communication across different network types.


Original Abstract Submitted

A method of operation in a wireless communication system comprises establishing by a UE over a cellular communications access network, a Quality of Service QoS flow, for an incoming Internet Protocol Multimedia Subsystem (IMS) session. The UE triggers over an untrusted non-3GPP access network, another IMS registration request along with requesting an IP address of the UE. The request includes an internet service provider (ISP) identifier of the untrusted access network. A network node transfers the incoming IMS session to the QoS flow established for the incoming IMS session to the untrusted access network being accessed by the UE. Thereafter, the IMS reports details of calls availed by the UE through the untrusted access network to a remote server.