US20090318124A1 - Mobile device management through an offloading network - Google Patents

Mobile device management through an offloading network Download PDF

Info

Publication number
US20090318124A1
US20090318124A1 US12/143,959 US14395908A US2009318124A1 US 20090318124 A1 US20090318124 A1 US 20090318124A1 US 14395908 A US14395908 A US 14395908A US 2009318124 A1 US2009318124 A1 US 2009318124A1
Authority
US
United States
Prior art keywords
network
firmware
update
notification
subscriber
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/143,959
Inventor
Erick John Haughn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Mobility II LLC
Original Assignee
AT&T Mobility II LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Mobility II LLC filed Critical AT&T Mobility II LLC
Priority to US12/143,959 priority Critical patent/US20090318124A1/en
Assigned to AT&T MOBILITY II LLC reassignment AT&T MOBILITY II LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HAUGHN, ERICK JOHN
Publication of US20090318124A1 publication Critical patent/US20090318124A1/en
Priority to US13/364,257 priority patent/US8626143B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Definitions

  • the subject innovation relates to wireless communications and, more particularly, to utilization of an offloading network for management of a mobile device.
  • RF radiofrequency
  • a leading design principle is to improve traffic utilization to ensure capacity of a network, its wireless link in particular, by effectively multiplexing information while mitigating unwarranted signaling and overhead.
  • FOTA firmware over-the-air
  • the subject innovation provides system(s) and method(s) for management of content in a mobile device.
  • Content can be firmware associated with functionalities of the mobile device, or data the mobile device can consume such as multimedia (e.g., video and sound).
  • management of content can refer to implementation of necessary (e.g., security patches) or desired (e.g., add-on capabilities) content update(s).
  • a first network platform that serves a multimode mobile device through a first radio access network (RAN) can facilitate establishment of an end-to-end secure tunnel to the multimode mobile device through a second RAN associated with a second network platform; the first network platform can then push the content update to the multimode mobile through the second RAN.
  • the second RAN employs a distinct radiofrequency band than the first RAN; thus the content update is offloaded from traffic in the first wireless network.
  • content updates e.g., firmware updates
  • firmware updates can be signaled through the first RAN and implemented upon establishment of an end-to-end tunnel to the first network platform through the second RAN.
  • said updates can be scheduled according to a network-configured subscriber update profile.
  • FIG. 1 illustrates a schematic wireless environment in accordance with aspects described in the subject specification.
  • FIG. 2 is a high-level block diagram of an example system that facilitates mobile device management through an offloading network in accordance with aspects disclosed herein.
  • FIG. 3 is a block diagram of an example system that facilitates a firmware update in accordance with aspects disclosed in the subject identification.
  • FIG. 4 is a block diagram of an example system that facilitates mobile device management in accordance with aspects described herein.
  • FIG. 5 is a block diagram of an example multimode access terminal that operates in accordance with aspects disclosed in the subject specification.
  • FIG. 6 presents a flowchart of an example method for updating firmware in accordance with aspects of the subject innovation.
  • FIG. 7 presents a flowchart of an example method for updating firmware according to aspects of the subject innovation.
  • FIG. 8 presents a flowchart of an example method for delivering firmware content in accordance with aspects of the subject innovation.
  • FIG. 9 presents a flowchart of an example method for configuring a subscriber update profile according to aspect described herein.
  • ком ⁇ онент As used in this application, the terms “component,” “system,” “platform,” “service,” “framework,” “interface,” “node,” and the like are intended to refer to a computer-related entity or an entity related to an operational machine with one or more specific functionalities.
  • the entities disclosed herein can be either hardware, a combination of hardware and software, software, or software in execution.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a server and the server can be a component.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • terms like “user equipment,” “mobile station,” “mobile,” subscriber station,” “access terminal,” “terminal,” “handset,” and similar terminology refer to a wireless device utilized by a subscriber or user of a wireless communication service to receive or convey data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream.
  • the foregoing terms are utilized interchangeably in the subject specification and related drawings.
  • access point refers to a wireless network component or appliance that serves and receives data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream from a set of subscriber stations.
  • Data and signaling streams can be packetized or frame-based flows.
  • the terms “user,” “subscriber,” “customer,” “consumer,” “agent,” and the like are employed interchangeably throughout the subject specification, unless context warrants particular distinction(s) among the terms. It should be appreciated that such terms can refer to human entities or automated components supported through artificial intelligence (e.g., a capacity to make inferences based on complex mathematical formalisms) which can provide simulated vision, sound recognition, and so forth.
  • artificial intelligence e.g., a capacity to make inferences based on complex mathematical formalisms
  • FIG. 1 illustrates a schematic wireless environment (e.g., a network) 100 in accordance with aspects described in the subject specification.
  • area 105 represents a coverage cell served by a base station 110 over the air; e.g., wireless link 115 , which comprises a forward link (FL) and a reverse link (RL), illustrates communication among terminal 120 A and base station 110 .
  • mobile 120 A can be a 3GPP Universal Mobile Telecommunication System (UMTS) mobile phone.
  • UMTS Universal Mobile Telecommunication System
  • Area 105 is referred herein as a “macro” cell. Macro coverage is generally intended for outdoor locations.
  • a base station, its associated electronics, and a wireless link operated in accordance to the base station form a radio access network (RAN), or radio access.
  • Wireless link can utilize a licensed RF spectrum band.
  • base station 110 communicates via backhaul link(s) 150 A a network platform A 108 A , which in cellular wireless technologies (e.g., 3rd Generation Partnership Project (3GPP) Universal Mobile Telecommunication System (UMTS), Global System for Mobile Communication (GSM)) represents a core network.
  • 3GPP 3rd Generation Partnership Project
  • UMTS Universal Mobile Telecommunication System
  • GSM Global System for Mobile Communication
  • network platform A 108 A also communicates with other base stations (not shown) that serve other cells.
  • Backhaul link(s) 150 A can include a wired backbone link (e.g., optical fiber backbone, twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL) either synchronous or asynchronous, an asymmetric ADSL, or a coaxial cable . . . ).
  • a wired backbone link e.g., optical fiber backbone, twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL) either synchronous or asynchronous, an asymmetric ADSL, or a coaxial cable . . . ).
  • DSL digital subscriber line
  • network platforms 108 A - 108 C include components, e.g., nodes, gateways, and interfaces, that facilitate packet-switched (PS) (e.g., internet protocol (IP)) and circuit-switched (CS) traffic and control generation for network communication.
  • PS packet-switched
  • IP internet protocol
  • CS circuit-switched
  • Network platform C 108 C can be operated by a disparate entity from the one that operates network platforms A 108 A and B 108 B ; as illustrated in example environment 100 , a single service provider network 155 manages operation of both networks 108 A and 108 B .
  • wireless environment 100 a more localized area of coverage 122 is served by access point 110 B.
  • Area 122 and substantially any other confined area within macro cell 105 , is referred herein as a “micro” cell—depending on the wireless technology, a micro cell can be referred by a more specific term like “hot spot” in case of Wi-Fi.
  • AP 110 B can communicate with terminal 120 B via FL/RL 135 .
  • terminal 120 B can be a 3GPP UMTS device with a subscriber identity module (SIM) card.
  • SIM subscriber identity module
  • Such communication can be afforded at least in part by network platform B 108 B which is functionally coupled, or linked, to AP 110 C via backhaul link(s) 150 B .
  • micro cell 122 is intended for indoor service, even though AP 110 B can also service an confined outdoor area.
  • a set of confined areas 125 and 145 are served by access point 110 C , which can communicate with access terminal 120 C via FL/RL 135 .
  • Larger area 125 can include outdoor coverage (e.g., a parking lot) while smaller area 145 can be an indoor area such as a building, either residential or business-type (e.g., a library, a hospital, a retail store, a residence . . . ).
  • Network platform C 108 C can facilitate, at least in part, such communication.
  • coverage areas 122 , and 145 and 125 are determined at least in part by transmission power of APs 110 B and 110 C, respectively, as well as path loss, shadowing, and so forth.
  • Each of access point 110 B and 110 C generally serve a few (e.g., 1-5) wireless devices (e.g., subscriber station 120 B) within confined coverage areas 145 or 122 .
  • terminal 120 A can be a multimode user equipment in order to communicate with base station 110 A and access point 110 B when network platform A 108 A and network platform B 108 B operate in accordance with disparate wireless technology specification.
  • access terminal 120 C can also be a multimode user equipment.
  • a mono-mode terminal can be served within a macro cell 105 and a micro cell.
  • attachment signaling can include a Location Area Update (LAU) and/or Routing Area Update (RAU), or substantially any micro cell synchronization procedure compatible with the wireless technology (e.g., Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), Enhanced General Packet Radio Service (Enhanced GPRS), Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Zigbee) associated with the micro cell.
  • LAU Location Area Update
  • RAU Routing Area Update
  • substantially any micro cell synchronization procedure compatible with the wireless technology e.g., Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), Enhanced General Packet Radio Service (Enhanced GPRS), Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Zigbee
  • attachment procedures and signaling can include establishment of an end-to-end tunnel or substantially any interfaced access link among the mobile station and the core network that supports macro. Attachment attempts can be triggered by predetermined operation conditions of UE 120 A , such as when an firmware update is pending for the user equipment and micro-coverage signal, e.g., from AP 110 C , is detected.
  • incoming traffic e.g., voice and data
  • the radio access network associated with the micro cell e.g., AP 110 C and link 135 which can transmit in an unlicensed or licensed RF spectrum band that is distinct from the RF band employed by macro RAN associated with macro network platform A 108 A , and thus traffic can be offloaded from macro cell.
  • a multimode mobile station need not be handed over from macro to micro cell in order for at least a portion of traffic to be re-routed.
  • a service provider network e.g., service provider network 155
  • the first network platform is termed “serving” network platform and the second network platform is termed “offloading” network platform.
  • FIG. 2 is a high-level block diagram of an example system 200 that facilitates mobile device management through an offloading network.
  • a serving network platform 210 communicates with a multimode UE 250 via serving radio access 240 which comprises a base station (e.g., base station 110 ; not shown in FIG. 1 ) and a communication platform (e.g., antennas, transceivers and associated electronic circuitry, a processor, a memory . . . ) in addition to wireless links.
  • an offloading network platform 260 which includes offloading radio access 270 , can also telecommunicate with multimode UE 250 ; the radio access 270 includes access point(s) in addition to wireless links.
  • serving radio access 240 and offloading radio access 270 takes place over disparate radiofrequency (RF) resources, wherein radio access for serving network platform is effected through a licensed RF band (e.g., personal communication services (PCS), advanced wireless services (AWS), general wireless communications service (GWCS)) and offloading network platform 260 implemented through a non-licensed RF band such as the 2.4 GHz industrial, medical and scientific (IMS) band or one or more of the 5 GHz set of bands.
  • a licensed RF band e.g., personal communication services (PCS), advanced wireless services (AWS), general wireless communications service (GWCS)
  • GWCS general wireless communications service
  • serving network platform 210 includes a mobile device management (MDM) component 214 which provides data services (e.g., applications) that can be executed via a wireless application protocol (WAP), and facilitate administration of subscriber station(s); for instance, such administration includes open mobile alliance device management (OMA DA) commands (e.g., retrieve device model, manufacturer, type, original equipment manufacturer (OEM), firmware version, hardware version, or international mobile equipment identity (IMEI)), firmware updates in accordance to available update content (e.g., security patches; drivers for add-on or new mobile's functionalities; activation of services like internet protocol (IP) television, video- and sound-streaming; adjustment of user equipment operation such as an switch from utilization of static modulation and code rate to adaptive modulation and code rate) in update content store 230 .
  • OMA DA open mobile alliance device management
  • OEM original equipment manufacturer
  • IMEI international mobile equipment identity
  • serving network platform 210 includes gateway node(s) 218 which interface services such as those provided via mobile device management component 214 and service node(s) 222 which conveys packetized flows of information, or data streams.
  • gateway node(s) 218 can be embodied in gateway GPRS support node(s) (GGSN), while serving node(s) 222 can be embodied in serving GPRS support node(s) (SGSN).
  • serving network platform 210 can include a tunnel interface 226 (e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s)) which can facilitate packetized communication with disparate wireless network(s), such as offloading network platform 260 , through gateway node(s) 218 .
  • tunnel interface 226 e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s)
  • gateway node(s) e.g., GGSN
  • tunnel interface e.g., TTG
  • PDG packet date gateway
  • an update notification 235 is conveyed to multimode UE 250 ; typically, MDM component 214 can generate such notification.
  • Update notification 235 can be embodied in an email, an instant message (IM), a short message service (SMS Wakeup/WAP Push) communication, a ringtone or another predetermined sound, and the like.
  • IM instant message
  • SMS Wakeup/WAP Push short message service
  • ringtone or another predetermined sound, and the like.
  • an update notification 235 can be a low-level indication (e.g., an M-bit word, with M a positive integer) signaled in a control channel.
  • a low-level indication to update firmware can be employed to trigger an update when a set of one or more predetermined conditions (e.g., attachment to an offloading network platform 260 ) are satisfied.
  • multimode UE 250 in response to update notification 235 , can establish an end-to-end tunnel 275 to communicate with serving network platform 270 through offloading network platform 260 , and associated offloading radio access 270 , in order to receive a firmware over-the-air (FOTA) update in connection with update notification 235 .
  • FOTA firmware over-the-air
  • At least three advantages of utilization of offloading radio access 270 to receive a firmware update are to (i) relieve traffic over serving network platform 210 and thus make efficient use of radio resources, in particular when a substantive number (e.g., 10 5 -10 9 ) of subscriber stations are to be updated; (ii) improve end user experience or perceived quality of service due to coverage and capacity afforded by offloading network platform radio resources; and (iii) significant RAN build out cost savings.
  • a substantive number e.g. 10 5 -10 9
  • tunnel interface 226 in conjunction with gateway node(s) 218 can form a packet data gateway (PDG) that facilitates establishment of end-to-end tunnel 275 .
  • Communication associated with establishment of the end-to-end tunnel 275 occurs via offloading radio access 270 .
  • multimode UE 250 can resolve a wireless access point name (W-APN) through offloading network platform, which can include a domain name server (DNS) to at least that end; alternative, or in addition, offloading network platform can resolve W-APN via an internet service provider (ISP) functionally coupled to offloading network platform 260 .
  • W-APN wireless access point name
  • DNS domain name server
  • ISP internet service provider
  • multimode UE 250 can request serving network platform 210 a secure tunnel to tunnel interface, such request can be performed, for example, through Internet Key Exchange Protocol (IKE).
  • Tunnel interface 226 can grant access and establish the secure tunnel, e.g., an Internet Protocol (IP) security (IPsec) tunnel.
  • IP Internet Protocol
  • IPsec Internet Protocol security
  • multimode UE 250 can request the specific data service to tunnel interface 226 .
  • tunnel interface 226 can create a packet data protocol context (PDP) associated with multimode UE 250 , and conveys a PDP context request to gateway node(s) 218 to attach multimode UE 250 to serving network platform 210 .
  • PDP packet data protocol context
  • Gateway node(s) 218 requests authorization from serving network platform 210 , e.g., through an authentication component (not shown) which can implement remote authentication dial-in user service (RADIUS).
  • gateway node(s) 218 accepts PDP and assigns a private IP address and port for mobile UE 250 —e.g., PDP for mobile UE 250 is created. Creation of the subject PDP establishes, or creates, end-to-end tunnel 275 .
  • end-to-end tunnel 275 utilization of end-to-end tunnel 275 to received data through offloading network platform 260 is not limited to firmware updates, substantially any data service that conveys a substantive volume of data, or content, can be implemented in accordance with aspects described herein.
  • an end-to-end tunnel 275 can be established in order for an end user to receive data recovery services, in which backup data previously generated by a subscriber and stored by serving network platform 210 can be transmitted to one or more multimode subscriber stations (e.g., multimode UE 250 ).
  • serving network platform 210 can exploit a low-level update notification 235 in order to prompt multimode UE 250 to establish an end-to-end tunnel 275 upon attachment to offloading network platform 260 in order for a subscriber to receive advertisement, service coupons, promotional campaigns, and the like.
  • a processor (not shown), memory (not shown), and other electronic circuitry (not shown) can effect the functionality of substantially all components, nodes and interfaces in serving network platform 210 , offloading network platform 260 , and serving network access 240 and offloading network access 270 as well.
  • FIG. 3 is a block diagram of an example system that facilitates a firmware update in accordance with a subscriber update profile.
  • Components in illustrative system 300 with like numerals to those in example system 200 have like functionality.
  • a subscriber can update firmware in a plurality of (i) scenarios, (ii) modalities, and (iii) preferences.
  • updates can be notified by serving network platform 210 in an instance with poor channel conditions associated with offloading network platform, or excessive load in an area of coverage for offloading network platform; thus, a firmware update can be inefficient, in particular for substantive updates (e.g., O(1-10 MBs)).
  • firmware updates and add-ons can be implemented based on service standards such as agreed quality of service (QoS), mobile station features like antenna configuration and availability of multi-mode operation at a receiver.
  • QoS quality of service
  • a subscriber can respond interactively to a notification to update firmware, or the subscriber can tend to ignore such notifications, in which case a batch mode update can be substantially more efficient.
  • a subscriber can prioritize certain updates, such as for example security firmware patches can be given an elevated priority compared to updates related to other applications like gaming, planner and scheduling, and so forth.
  • subscriber can specify time intervals on which a firmware update is to be attempted.
  • a subscriber can generate an update profile 315 in accordance with aspects (i) through (iii) and store it in a subscriber database 310 which can be a part of serving network platform 210 .
  • a reward can include delivery of firmware for add-on features for a subscriber's mobile, differentiated rating for a predetermined time interval configured by the service provider, a credit of communication units such as voice minutes, a set of one or more coupons for ringtones, songs, video snippets, etc., storage space for subscriber's data like contact(s) list, emergency phone numbers, and so forth. It is to be noted that such reward scheme is neither provider-centric nor subscriber-centric since both parties benefit from utilization of subscriber update profile(s) 315 or substantially any other update planning instrument.
  • FIG. 4 is a block diagram of an example system 400 that facilitates mobile device management through an offloading network.
  • a service provider network 405 comprises serving network platform 210 and offloading network platform 260 .
  • a service provider can advantageously coordinate firmware updates of a multimode UE 250 via end-to-end tunnel 275 .
  • an intelligent component 410 within MDM component 214 can generate a usage pattern (not shown) of serving radio access 240 and offloading radio access 270 for a multimode 250 in order to create subscriber update profile(s) 415 .
  • Such profile can exploit geographic deployment information of access points included in offloading radio access 270 , and location information of multimode UE 250 gleaned through serving network platform 210 in order to infer instance(s) in which multimode UE 250 is within a coverage area of offloading network platform 260 .
  • an update notification 235 can be conveyed to multimode UE 250 , which can employ the notification to trigger attachment to offloading network platform 260 and establish an end-to-end tunnel 275 to receive a firmware update.
  • a generated usage pattern can include an inferred time interval ⁇ t that multimode UE 250 lingers within coverage area of offloading radio access 270 .
  • Knowledge of ⁇ t can facilitate MDM component 214 to select firmware update content that can likely be pushed successfully to multimode UE 250 .
  • MDM component 214 can refine a selection of firmware update content through utilization of quality of radio link for multimode UE 250 in offloading radio access 270 in combination with inferred ⁇ t. For example, if radio link or channel conditions in offloading radio access are deemed to be good, aggressive packet segmentation, and modulation and code rate can be employed to push a firmware update. However, if channel conditions are fair or poor a more conservative packet fragmentation, and modulation and code rate can be appropriate; thus, upload of a smaller firmware update can be possible within ⁇ t.
  • intelligent component 410 can collect information on attachment to offloading network 260 , and location of access points and time span of an attachment thereto, by multimode UE 250 over a predetermined period of time (e.g., a week, a month, a quarter). Location of access points can be extracted from AP location area code/routing are code (LAC/RAC) in combination with offloading network platform 260 deployment available to service provider. It is to be noted that intelligent component 214 can also utilize substantially any information stored in subscriber database 310 .
  • Collected attachment and time span information can be employed by intelligent component 410 to reason or draw conclusions about, e.g., infer, a usage pattern of offloading radio access 270 and associated linger times.
  • intelligent component 410 an set a threshold below which time spans are removed from usage patter analysis, since short time spans can reflect attachment to offloading radio access 270 due to excessive AP signaling.
  • analyzer 225 can rely on artificial intelligence techniques, which apply advanced mathematical algorithms—e.g., decision trees, neural networks, regression analysis, principal component analysis (PCA) for feature and pattern extraction, cluster analysis, genetic algorithm, and reinforced learning—to collected attachment information.
  • advanced mathematical algorithms e.g., decision trees, neural networks, regression analysis, principal component analysis (PCA) for feature and pattern extraction, cluster analysis, genetic algorithm, and reinforced learning—to collected attachment information.
  • PCA principal component analysis
  • intelligent component 410 can employ at least one of numerous methodologies for learning from data and then drawing inferences from the models so constructed, e.g., Hidden Markov Models (HMMs) and related prototypical dependency models, more general probabilistic graphical models, such as Dempster-Shafer networks and Bayesian networks, e.g., created by structure search using a Bayesian model score or approximation, linear classifiers, such as support vector machines (SVMs), non-linear classifiers, such as methods referred to as “neural network” methodologies, fuzzy logic methodologies, and other approaches that perform data fusion, etc.) in accordance with implementing various automated aspects described herein.
  • HMMs Hidden Markov Models
  • Bayesian networks e.g., created by structure search using a Bayesian model score or approximation
  • linear classifiers such as support vector machines (SVMs)
  • SVMs support vector machines
  • non-linear classifiers such as methods referred to as “neural network” methodologies, fuzzy
  • firmware update over-the-air through an offloading network platform 260 that is operated by a same service provider that operates service network platform 210 further improves end user experience with respect to firmware update through an offloading network operated by a disparate provider: Generation of usage pattern affords a more effective utilization of radio resources, which typically results in improved radio capacity, and mitigates possible service disruption associated with interactive update notification(s).
  • FIG. 5 illustrates a block diagram of an example embodiment 500 of a multimode user equipment 510 that can exploit firmware update, and substantially any other content management, via an offloading network (e.g., offloading network platform 260 and offloading radio access 270 ) in accordance with aspects described herein.
  • an offloading network e.g., offloading network platform 260 and offloading radio access 270
  • Multimode UE 510 through a set of antennas 569 1 - 569 N , can receive and transmit signal(s) from and to wireless devices like access points, access terminals, wireless ports and routers, and so forth, that operate in a radio access network, e.g., serving radio access 240 or offloading radio access 270 .
  • antennas 569 1 - 569 N are a part of communication platform 525 , which comprises electronic components and associated circuitry that provides for processing and manipulation of received signal(s) and signal(s) to be transmitted.
  • communication platform 525 includes a receiver/transmitter 566 that can convert signal from analog to digital upon reception, and from digital to analog upon transmission.
  • receiver/transmitter 566 can divide a single data stream into multiple, parallel data streams, or perform the reciprocal operation.
  • a multiplexer/demultiplexer component (mux/demux) 567 that facilitates manipulation of signal in time and frequency space.
  • Electronic component 567 can multiplex information (data/traffic and control/signaling) according to various multiplexing schemes such as time division multiplexing (TDM), frequency division multiplexing (FDM), orthogonal frequency division multiplexing (OFDM), code division multiplexing (CDM), space division multiplexing (SDM).
  • TDM time division multiplexing
  • FDM frequency division multiplexing
  • OFDM orthogonal frequency division multiplexing
  • CDM code division multiplexing
  • SDM space division multiplexing
  • mux/demux component 567 can scramble and spread information (e.g., codes) according to substantially any code known in the art; e.g., Hadamard-Walsh codes, Baker codes, Kasami codes, polyphase codes, and so on.
  • a modulator/demodulator component (mod/demod) 568 is also a part of communication platform 525 , and can modulate information according to multiple modulation techniques, such as frequency modulation, amplitude modulation (e.g., M-ary quadrature amplitude modulation (QAM), with M a positive integer), phase-shift keying (PSK), and the like.
  • mod/demod 568 is functionally coupled to multiplexer/demultiplexer 567 .
  • multimode operation chipset(s) 515 allows multimode UE 510 to operate in multiple communication modes in accordance with disparate technical specification for wireless technologies.
  • multimode operation chipset(s) 515 utilizes communication platform 525 in accordance with a specific mode of operation.
  • multimode operation chipset(s) 515 can be scheduled to operate concurrently (e.g., when N>1) in various modes or within a multitask paradigm.
  • multimode UE 510 includes a processor 535 configured to confer functionality, at least in part, to substantially any electronic component within the multimode UE 510 , in accordance with aspects of the subject innovation.
  • processor 535 can be configured to execute, at least in part, instructions in multimode operation chipset(s) that afford multimode communication through user equipment 510 like concurrent or multitask operation of two or more chipset(s).
  • processor 535 can facilitate UE 510 to receive instruction code, e.g., firmware, through communication platform 525 , and manipulate and execute such instruction code, in addition to store the instruction code and results execution thereof in memory 555 .
  • instruction code e.g., firmware
  • processor 535 facilitates multimode UE 510 to process data (e.g., symbols, bits, or chips) for multiplexing/demultiplexing, modulation/demodulation, such as implementing direct and inverse fast Fourier transforms, selection of modulation rates, selection of data packet formats, inter-packet times, etc.
  • Memory 555 can store data structures, code instructions, system or device information like policies and specifications, code sequences for scrambling, spreading and pilot (e.g., reference signal) transmission, frequency offsets, LACs or substantially any other cell IDs, and so on.
  • processor 534 is functionally coupled to memory 555 in order to store and retrieve information necessary to operate and/or confer functionality at least in part to communication platform 525 , multimode operation chipset(s) 515 , and other operational aspects of multimode user equipment 510 .
  • example methodologies that can be implemented in accordance with the disclosed subject matter can be better appreciated with reference to flowcharts in FIGS. 6-9 .
  • example method 200 is presented and described as a series of acts; however, it is to be understood and appreciated that the claimed subject matter is not limited by the order of acts, as some acts may occur in different orders and/or concurrently with other acts from that shown and described herein.
  • a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram, or interaction diagram.
  • not all illustrated acts may be required to implement a methodology in accordance with the subject specification.
  • the methodologies disclosed hereinafter and throughout this specification are capable of being stored on an article of manufacture to facilitate transporting and transferring such methodologies to computers for execution by a processor or for storage in a memory.
  • FIG. 6 presents a flowchart of an example method 600 for updating firmware in accordance with aspects of the subject innovation.
  • Example methodology is typically carried out by a subscriber station.
  • a notification to conduct a firmware update is received through a first wireless network.
  • Such notification can be substantially any message supported by the first network; for instance, the notification can be a short message service (SMS Wakeup/WAP Push) message, a multimedia message service (MMS) message, an email message, an instant message, a predetermined ringtone or sound, and the like.
  • SMS short message service
  • MMS multimedia message service
  • the specific format for the notification can be based on available audiovisual resources (e.g., display size) of a device (e.g., multimode access terminal 250 ) or a predetermined subscriber update profile.
  • the first wireless network typically operates within a first portion, or band, of a RF spectrum, with a first bandwidth.
  • the first network can be a 3GPP UMTS network.
  • the entity that is to be attached to the second network can scan radio channels known to be utilized for telecommunication in the second network (e.g., one or more of the 14 channels utilized for communication in the 2.4 GHz unlicensed band of IEEE 802.11x network).
  • radio channels known to be utilized for telecommunication in the second network e.g., one or more of the 14 channels utilized for communication in the 2.4 GHz unlicensed band of IEEE 802.11x network.
  • the second wireless network utilizes a second band of the RF spectrum that is different from the first band utilized for communication in the first wireless network.
  • a telecommunication session is established with the first wireless network through the second wireless network in response to the notification.
  • a session is established through a tunnel component interface in the first network platform, the tunnel interface (e.g., TTG in 3GPP UMTS network) grants an end-to-end tunnel among the entity that initiates the session and a data-packet gateway (e.g., GGSN in the 3GPP UMTS network) in the first wireless network.
  • Session is authenticated within the first wireless network, and a unique context is generated for the session.
  • firmware is updated through the second wireless network. It is to be noted that at least one advantage of the effecting an update through the second network is that radio resources of the first network are offloaded by reducing traffic in the first RF band utilized by the first network. An additional advantage is that the second RF band utilized by the second network need not be licensed, in which case operational costs associated with performing an update are reduced.
  • FIG. 7 is an example method 700 for updating firmware according to aspects of the subject innovation.
  • an indication to update firmware in batch mode is received through a first network.
  • Such an indication can be an L-bit word which can be conveyed in various manners depending on the communication technology utilized by the first network; for instance, the indication can be conveyed in a control channel (for an LTE network, or UMB network), or in a data-packet header field (e.g., in a high-speed downlink packet access (HSDPA) network).
  • the batch mode aspect of the indication has at least the advantage of not implementing an upgrade upon receiving the indication to upgrade.
  • a batch mode upgrade can facilitate a more efficient utilization of radio resources.
  • the entity e.g., a multimode mobile
  • the entity e.g., a multimode mobile
  • the entity e.g., a multimode mobile
  • signal is detected from a second network. Detection of such a signal can be performed through a scanner that probes channel signal strength in the RF band (e.g., 2.4 GHz IMS band) in which the second network operates.
  • the entity attaches to the second network.
  • Such attachment typically includes a LAU/RAU procedure as well as fine synchronization with a serving access point that belong to the second network radio access environment.
  • the check at act 720 is reenacted.
  • a communication session with the first network through the second network is triggered in response to the batch indication to update firmware.
  • Act 750 is a validation check that probes whether the triggered session was established, e.g., data services are granted by establishing an end-to-end tunnel among the entity that triggered the session and the grantor of the data services. In case session is not successfully established, a new session is retried when a “retry” check in act 760 warrants it, otherwise methodology flow is terminated.
  • firmware is update is updated through the second network, which provides at least the benefit of offloading the first network, and thus improving better service to subscribers.
  • FIG. 8 presents a flowchart of an example method 800 for delivering firmware content, or substantially any other content, from a serving first network through an offloading second network in accordance with aspects described herein.
  • a notification to perform a firmware update is conveyed through a first network.
  • the notification can be substantially any message type supported by the first network.
  • the notification can be a SMS communication, a MMS message, an email message, an instant message, a predetermined ringtone or sound, and the like.
  • the notification can be a low-level type of indication like a P-bit word (P is a positive integer) conveyed in control channel or a packet header field.
  • P is a positive integer
  • the specific format utilized can be based on available audiovisual resources (e.g., display size) of a device (e.g., multimode access terminal 250 ), or applications in the device.
  • the format can be determined through a network-configured default format which can be established through firmware at the time the device is assembled or when a subscriber account is setup for the device.
  • the notification format can be configured through a subscriber update profile, which can be a part of a general operation profile setup by a subscriber. Such an update profile can determine time intervals during which notification are allowed.
  • the profile can also configure priorities for notifications and formats thereof, e.g., firmware updates can be allowed at any time through a MMS message, whereas assistant-type applications (e.g., calendar, scheduler, touch-pad application(s)) can be permitted within specific hours like during weekends via a ringtone or a low-level batch mode notification as described hereinbefore.
  • priorities for notifications and formats thereof e.g., firmware updates can be allowed at any time through a MMS message
  • assistant-type applications e.g., calendar, scheduler, touch-pad application(s)
  • a request is received to establish a telecommunication session through a second network in response to the notification.
  • such request is received via a tunnel interface in the first network (e.g., tunnel interface 226 , which can be TTG in a 3GPP UMTS network).
  • the request to establish a communication session through the second network is authorized and authenticated via, for example, the tunnel interface in combination with a gateway component (e.g., gateway node(s) 218 , which can be a GGSN in a 3GPP UMTS network) in the first network.
  • a gateway component e.g., gateway node(s) 218 , which can be a GGSN in a 3GPP UMTS network
  • firmware content is uploaded through the end-to-end communication tunnel.
  • Utilization of the end-to-end tunnel has at least the advantage to offload traffic, e.g., firmware content which can be in excess of a MB, from the first network.
  • firmware content can be uploaded according to a network-configured default scheme, or to a subscriber profile.
  • a default scheme can provide a subscriber station with firmware updates consistent with application(s) extant in the mobile or to ensure specific functionality agree at the time of subscription to a service.
  • uploads through a subscriber profile can deliver a subscriber with add-on updates that enhance the functionality of the subscriber station when in the profile the subscriber indicated that firmware upgrades and add-ons are to be prompted for download.
  • FIG. 9 presents a flowchart of an example method 900 for configuring a subscriber update profile according to aspect described herein.
  • a subscriber update profile is received.
  • a subscriber update profile can establish various preferences regarding notification to conduct (e.g., download and install) a firmware update.
  • the subscriber update profile can be generated as a default profile when a subscriber's account is opened.
  • a default subscriber update profile can indicate that security and operational firmware updates are to be notified when available for download and installation, while updates for non-critical applications such as video- and music-streaming, gaming, scheduling and calendar, etc. are to be notified periodically rather than upon immediate availability.
  • a subscriber generated update profile can be substantially richer, with specific priorities for various applications and security features, in addition to allowing offerings for add-on features, e.g., notification to download firmware that expands the capability of the subscriber station such as drivers to render a mobile display into a television tuner or into a touch-pad display.
  • a subscriber update profile is generated.
  • a network operator can generate a profile according to various aspects like agreed quality of service (e.g., guaranteed bitrate, minimum bitrate, minimum tolerable latency, maximum bit error or packet loss rate, and so forth), user equipment capabilities like antenna configuration, multimode chipset(s) features, multi-processor processing unit(s), and so on.
  • an update profile can be generated autonomously by the a network component (MDM component 214 ) based at least in part on a subscriber pattern of usage of a second network utilized for uploading firmware content into a mobile station. Accordingly, notification(s) to update firmware can be conveyed when the first network has a substantive confidence a subscriber station can be in a coverage area of the second network.
  • update profile inference can be implemented when the first network and second network are operated by a same service provider, since the service provides can collect subscriber's location information and correlate such information with access points that provide coverage through the second network. Moreover, when service provider operates the second network, it can ensure free-of-charge updates for a subscriber since access to the second network need not be rated.
  • a subscriber update profiled is retained for at least mobile device management.
  • processor can refer to substantially any computing processing unit or device comprising, but not limited to comprising, single-core processors; single-processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory.
  • a processor can refer to an integrated circuit, an application specific integrated circuit (ASIC), a digital signal processor (DSP), a field programmable gate array (FPGA), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • FPGA field programmable gate array
  • PLC programmable logic controller
  • CPLD complex programmable logic device
  • processors can exploit nano-scale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance performance of user equipment.
  • a processor may also be implemented as a combination of computing processing units.
  • information relevant to operation of various components described in the disclosed subject matter, and that can be stored in a memory can comprise, but is not limited to comprising, subscriber information; femto cell configuration (e.g., devices served by a femto AP; access control lists, or white lists) or service policies and specifications; privacy policies; add-on features, geographical location tolerances, and so forth.
  • the memory components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
  • nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as external cache memory.
  • RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • SRAM synchronous RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Synchlink DRAM
  • DRRAM direct Rambus RAM
  • Computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick, key drive . . . ).
  • magnetic storage devices e.g., hard disk, floppy disk, magnetic strips . . .
  • optical disks e.g., compact disk (CD), digital versatile disk (DVD) . . .
  • smart cards e.g., card, stick, key drive . . .

Abstract

System(s) and method(s) are provided for management of content in a mobile device. Content can be firmware associated with mobile functionalities, or data a mobile can process. To effect a content update, a first network platform that serves a multimode mobile device through a first radio access network (RAN) can facilitate establishment of an end-to-end tunnel to the multimode through a second RAN associated with a second network platform; the first network platform can then push the content update to the multimode mobile through the second RAN. Typically the second RAN employs a distinct radiofrequency band than the first RAN; thus the content update is offloaded from traffic in the first wireless network. Content updates can be signaled through the first RAN and implemented upon end-to-end tunnel establishment to the first network platform through the second RAN. Moreover, said updates can be scheduled according to a network-configured subscriber update profile.

Description

    TECHNICAL FIELD
  • The subject innovation relates to wireless communications and, more particularly, to utilization of an offloading network for management of a mobile device.
  • BACKGROUND
  • In wireless telecommunication, access to radiofrequency (RF) spectrum is regulated. Even in instances in which a RF band can be utilized for wireless operation without a license, like the 2.4 GHz Industrial, Scientific and Medical band, frequency resources remain limited. In addition, transmission power for a network transmitter is regulated. Accordingly, wireless telecommunication development focuses on efficient approaches to maximize utility, e.g., maximize a number of served subscribers within finite resources, without deteriorating subscriber perceived quality of service. Regardless peculiarities of pursued approaches, a leading design principle is to improve traffic utilization to ensure capacity of a network, its wireless link in particular, by effectively multiplexing information while mitigating unwarranted signaling and overhead.
  • Among overhead incurred by a service provider is transmission of firmware over-the-air (FOTA) updates typically necessary for maintenance and improvement of wireless device performance, a mobile device manufacturers steadily update device portfolio with novel devices an associated novel device code or firmware. Large service providers or network operators can manage FOTA updates for a substantive number (e.g., 105-109) of devices, thus incurring significant undesired overhead on the provider's wireless link when updates are effected. Therefore, efficient, efficient approaches to mobile device management can improve traffic conditions in a wireless link and further service provider or network operator utility.
  • SUMMARY
  • The following presents a simplified summary of the innovation in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
  • The subject innovation provides system(s) and method(s) for management of content in a mobile device. Content can be firmware associated with functionalities of the mobile device, or data the mobile device can consume such as multimedia (e.g., video and sound). In an aspect of the subject innovation management of content can refer to implementation of necessary (e.g., security patches) or desired (e.g., add-on capabilities) content update(s). To implement a content update, a first network platform that serves a multimode mobile device through a first radio access network (RAN) can facilitate establishment of an end-to-end secure tunnel to the multimode mobile device through a second RAN associated with a second network platform; the first network platform can then push the content update to the multimode mobile through the second RAN. Typically the second RAN employs a distinct radiofrequency band than the first RAN; thus the content update is offloaded from traffic in the first wireless network.
  • In another aspect of the subject innovation, content updates (e.g., firmware updates) can be signaled through the first RAN and implemented upon establishment of an end-to-end tunnel to the first network platform through the second RAN. Moreover, said updates can be scheduled according to a network-configured subscriber update profile.
  • To the accomplishment of the foregoing and related ends, the invention, then, comprises the features hereinafter fully described. The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. However, these aspects are indicative of but a few of the various ways in which the principles of the invention may be employed. Other aspects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 illustrates a schematic wireless environment in accordance with aspects described in the subject specification.
  • FIG. 2 is a high-level block diagram of an example system that facilitates mobile device management through an offloading network in accordance with aspects disclosed herein.
  • FIG. 3 is a block diagram of an example system that facilitates a firmware update in accordance with aspects disclosed in the subject identification.
  • FIG. 4 is a block diagram of an example system that facilitates mobile device management in accordance with aspects described herein.
  • FIG. 5 is a block diagram of an example multimode access terminal that operates in accordance with aspects disclosed in the subject specification.
  • FIG. 6 presents a flowchart of an example method for updating firmware in accordance with aspects of the subject innovation.
  • FIG. 7 presents a flowchart of an example method for updating firmware according to aspects of the subject innovation.
  • FIG. 8 presents a flowchart of an example method for delivering firmware content in accordance with aspects of the subject innovation.
  • FIG. 9 presents a flowchart of an example method for configuring a subscriber update profile according to aspect described herein.
  • DETAILED DESCRIPTION
  • The subject innovation is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.
  • As used in this application, the terms “component,” “system,” “platform,” “service,” “framework,” “interface,” “node,” and the like are intended to refer to a computer-related entity or an entity related to an operational machine with one or more specific functionalities. The entities disclosed herein can be either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. Also, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
  • In addition, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. Moreover, articles “a” and “an” as used in the subject specification and annexed drawings should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
  • Moreover, terms like “user equipment,” “mobile station,” “mobile,” subscriber station,” “access terminal,” “terminal,” “handset,” and similar terminology, refer to a wireless device utilized by a subscriber or user of a wireless communication service to receive or convey data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream. The foregoing terms are utilized interchangeably in the subject specification and related drawings. Likewise, the terms “access point,” “base station,” “Node B,” “evolved Node B,” “home Node B (HNB),” and the like, are utilized interchangeably in the subject application, and refer to a wireless network component or appliance that serves and receives data, control, voice, video, sound, gaming, or substantially any data-stream or signaling-stream from a set of subscriber stations. Data and signaling streams can be packetized or frame-based flows.
  • Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” “agent,” and the like are employed interchangeably throughout the subject specification, unless context warrants particular distinction(s) among the terms. It should be appreciated that such terms can refer to human entities or automated components supported through artificial intelligence (e.g., a capacity to make inferences based on complex mathematical formalisms) which can provide simulated vision, sound recognition, and so forth.
  • Referring to the drawings, FIG. 1 illustrates a schematic wireless environment (e.g., a network) 100 in accordance with aspects described in the subject specification. In wireless environment 100, area 105 represents a coverage cell served by a base station 110 over the air; e.g., wireless link 115, which comprises a forward link (FL) and a reverse link (RL), illustrates communication among terminal 120 A and base station 110. As an example, mobile 120 A can be a 3GPP Universal Mobile Telecommunication System (UMTS) mobile phone. Area 105 is referred herein as a “macro” cell. Macro coverage is generally intended for outdoor locations. It is noted that a base station, its associated electronics, and a wireless link operated in accordance to the base station form a radio access network (RAN), or radio access. Wireless link can utilize a licensed RF spectrum band. In addition, base station 110 communicates via backhaul link(s) 150 A a network platform A 108 A, which in cellular wireless technologies (e.g., 3rd Generation Partnership Project (3GPP) Universal Mobile Telecommunication System (UMTS), Global System for Mobile Communication (GSM)) represents a core network. It should be appreciated network platform A 108 A also communicates with other base stations (not shown) that serve other cells. Backhaul link(s) 150 A, and links 150 B and 150 C as well, can include a wired backbone link (e.g., optical fiber backbone, twisted-pair line, T1/E1 phone line, a digital subscriber line (DSL) either synchronous or asynchronous, an asymmetric ADSL, or a coaxial cable . . . ).
  • Generally, network platforms 108 A-108 C include components, e.g., nodes, gateways, and interfaces, that facilitate packet-switched (PS) (e.g., internet protocol (IP)) and circuit-switched (CS) traffic and control generation for network communication. Network platform C 108 C can be operated by a disparate entity from the one that operates network platforms A 108 A and B 108 B; as illustrated in example environment 100, a single service provider network 155 manages operation of both networks 108 A and 108 B. In wireless environment 100, a more localized area of coverage 122 is served by access point 110B. Area 122, and substantially any other confined area within macro cell 105, is referred herein as a “micro” cell—depending on the wireless technology, a micro cell can be referred by a more specific term like “hot spot” in case of Wi-Fi. In an aspect, AP 110 B can communicate with terminal 120B via FL/RL 135. As an example, terminal 120 B can be a 3GPP UMTS device with a subscriber identity module (SIM) card. Such communication can be afforded at least in part by network platform B 108 B which is functionally coupled, or linked, to AP 110C via backhaul link(s) 150 B. Typically, micro cell 122 is intended for indoor service, even though AP 110 B can also service an confined outdoor area. A set of confined areas 125 and 145 are served by access point 110 C, which can communicate with access terminal 120C via FL/RL 135. Larger area 125 can include outdoor coverage (e.g., a parking lot) while smaller area 145 can be an indoor area such as a building, either residential or business-type (e.g., a library, a hospital, a retail store, a residence . . . ). Network platform C 108 C can facilitate, at least in part, such communication. Typically, coverage areas 122, and 145 and 125 are determined at least in part by transmission power of APs 110B and 110C, respectively, as well as path loss, shadowing, and so forth. Each of access point 110 B and 110 C generally serve a few (e.g., 1-5) wireless devices (e.g., subscriber station 120B) within confined coverage areas 145 or 122.
  • It is to be noted that terminal 120 A can be a multimode user equipment in order to communicate with base station 110 A and access point 110 B when network platform A 108 A and network platform B 108 B operate in accordance with disparate wireless technology specification. Likewise, access terminal 120 C can also be a multimode user equipment. Alternatively, depending on device capability and wireless technology of a first base station (e.g., AP 110 B) and a second base station (e.g., Node B 110 A), a mono-mode terminal can be served within a macro cell 105 and a micro cell. As a subscriber station, e.g., UE 120 A, enters micro coverage (e.g., area 125), UE 120 A can attempt to attach to AP 110C through transmission and reception of attachment signaling, effected via a FL/RL 135. In an aspect, attachment signaling can include a Location Area Update (LAU) and/or Routing Area Update (RAU), or substantially any micro cell synchronization procedure compatible with the wireless technology (e.g., Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), Enhanced General Packet Radio Service (Enhanced GPRS), Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Zigbee) associated with the micro cell. Moreover, as operation of access point (e.g., AP 110 C) that serves micro cell can be facilitated by a core network (e.g., network platform C 108 C) that is distinct from a core network (e.g., network A 108 A) that operates, at least in part, base station (e.g., Node B 110 A) that serves macro cell, attachment procedures and signaling can include establishment of an end-to-end tunnel or substantially any interfaced access link among the mobile station and the core network that supports macro. Attachment attempts can be triggered by predetermined operation conditions of UE 120 A, such as when an firmware update is pending for the user equipment and micro-coverage signal, e.g., from AP 110 C, is detected. When an attachment attempt is successful, incoming traffic (e.g., voice and data) for mobile station can be routed to the subscriber through the radio access network associated with the micro cell, e.g., AP 110 C and link 135 which can transmit in an unlicensed or licensed RF spectrum band that is distinct from the RF band employed by macro RAN associated with macro network platform A 108 A, and thus traffic can be offloaded from macro cell. It is to be noted that, in an aspect of the subject innovation, a multimode mobile station need not be handed over from macro to micro cell in order for at least a portion of traffic to be re-routed.
  • It should be appreciated that a service provider network, e.g., service provider network 155, can include a first network platform (e.g., network platform A 108 A) that operates, at least in part, a first RAN, and a second network platform (e.g., network platform A 108 A) that operates at least in part a second RAN; thus, traffic offload from the first network to the second network, via attachment from the first RAN to the second RAN, can be refined through exchange of operational information among the network platforms, such as location services, subscriber(s) information, radio access network conditions, and so forth. In an aspect of the subject innovation, the first network platform is termed “serving” network platform and the second network platform is termed “offloading” network platform.
  • FIG. 2 is a high-level block diagram of an example system 200 that facilitates mobile device management through an offloading network. In system 200, a serving network platform 210 communicates with a multimode UE 250 via serving radio access 240 which comprises a base station (e.g., base station 110; not shown in FIG. 1) and a communication platform (e.g., antennas, transceivers and associated electronic circuitry, a processor, a memory . . . ) in addition to wireless links. In addition, an offloading network platform 260, which includes offloading radio access 270, can also telecommunicate with multimode UE 250; the radio access 270 includes access point(s) in addition to wireless links. It is to be noted that serving radio access 240 and offloading radio access 270 takes place over disparate radiofrequency (RF) resources, wherein radio access for serving network platform is effected through a licensed RF band (e.g., personal communication services (PCS), advanced wireless services (AWS), general wireless communications service (GWCS)) and offloading network platform 260 implemented through a non-licensed RF band such as the 2.4 GHz industrial, medical and scientific (IMS) band or one or more of the 5 GHz set of bands.
  • In an aspect of the subject innovation, serving network platform 210 includes a mobile device management (MDM) component 214 which provides data services (e.g., applications) that can be executed via a wireless application protocol (WAP), and facilitate administration of subscriber station(s); for instance, such administration includes open mobile alliance device management (OMA DA) commands (e.g., retrieve device model, manufacturer, type, original equipment manufacturer (OEM), firmware version, hardware version, or international mobile equipment identity (IMEI)), firmware updates in accordance to available update content (e.g., security patches; drivers for add-on or new mobile's functionalities; activation of services like internet protocol (IP) television, video- and sound-streaming; adjustment of user equipment operation such as an switch from utilization of static modulation and code rate to adaptive modulation and code rate) in update content store 230. In another aspect, serving network platform 210 includes gateway node(s) 218 which interface services such as those provided via mobile device management component 214 and service node(s) 222 which conveys packetized flows of information, or data streams. As an example, in a 3GPP UMTS network, gateway node(s) 218 can be embodied in gateway GPRS support node(s) (GGSN), while serving node(s) 222 can be embodied in serving GPRS support node(s) (SGSN). In addition, serving network platform 210 can include a tunnel interface 226 (e.g., tunnel termination gateway (TTG) in 3GPP UMTS network(s)) which can facilitate packetized communication with disparate wireless network(s), such as offloading network platform 260, through gateway node(s) 218. In a 3GPP UMTS network(s), gateway node(s) (e.g., GGSN) and tunnel interface (e.g., TTG) comprise a packet date gateway (PDG).
  • When a firmware update becomes available within serving network platform 210, an update notification 235 is conveyed to multimode UE 250; typically, MDM component 214 can generate such notification. Update notification 235 can be embodied in an email, an instant message (IM), a short message service (SMS Wakeup/WAP Push) communication, a ringtone or another predetermined sound, and the like. In addition, to the latter high-level formats, an update notification 235 can be a low-level indication (e.g., an M-bit word, with M a positive integer) signaled in a control channel. It should be appreciated that a low-level indication to update firmware can be employed to trigger an update when a set of one or more predetermined conditions (e.g., attachment to an offloading network platform 260) are satisfied. In an aspect of the subject innovation, in response to update notification 235, multimode UE 250 can establish an end-to-end tunnel 275 to communicate with serving network platform 270 through offloading network platform 260, and associated offloading radio access 270, in order to receive a firmware over-the-air (FOTA) update in connection with update notification 235. At least three advantages of utilization of offloading radio access 270 to receive a firmware update are to (i) relieve traffic over serving network platform 210 and thus make efficient use of radio resources, in particular when a substantive number (e.g., 105-109) of subscriber stations are to be updated; (ii) improve end user experience or perceived quality of service due to coverage and capacity afforded by offloading network platform radio resources; and (iii) significant RAN build out cost savings.
  • In an aspect of the subject innovation, tunnel interface 226 in conjunction with gateway node(s) 218 can form a packet data gateway (PDG) that facilitates establishment of end-to-end tunnel 275. Communication associated with establishment of the end-to-end tunnel 275 occurs via offloading radio access 270. For instance, multimode UE 250 can resolve a wireless access point name (W-APN) through offloading network platform, which can include a domain name server (DNS) to at least that end; alternative, or in addition, offloading network platform can resolve W-APN via an internet service provider (ISP) functionally coupled to offloading network platform 260. Once W-APN has been resolved, multimode UE 250 can request serving network platform 210 a secure tunnel to tunnel interface, such request can be performed, for example, through Internet Key Exchange Protocol (IKE). Tunnel interface 226 can grant access and establish the secure tunnel, e.g., an Internet Protocol (IP) security (IPsec) tunnel. It should be appreciated that the granted tunnel offers a secure conduit for traffic communication among the tunnel interface 226 and multimode UE 250; however, traffic is not associated with a specific data service.
  • To exploit a granted secure tunnel for dedicated traffic associated with a specific data service (e.g., firmware update(s), data upload for on-the-cloud storage or web hosting) at serving network platform 210, multimode UE 250 can request the specific data service to tunnel interface 226. In response to this request, tunnel interface 226 can create a packet data protocol context (PDP) associated with multimode UE 250, and conveys a PDP context request to gateway node(s) 218 to attach multimode UE 250 to serving network platform 210. Gateway node(s) 218 (e.g., GGSN in a 3GPP Core Network) requests authorization from serving network platform 210, e.g., through an authentication component (not shown) which can implement remote authentication dial-in user service (RADIUS). Upon authentication is effected, gateway node(s) 218 accepts PDP and assigns a private IP address and port for mobile UE 250—e.g., PDP for mobile UE 250 is created. Creation of the subject PDP establishes, or creates, end-to-end tunnel 275.
  • It is to be noted that utilization of end-to-end tunnel 275 to received data through offloading network platform 260 is not limited to firmware updates, substantially any data service that conveys a substantive volume of data, or content, can be implemented in accordance with aspects described herein. As an example, an end-to-end tunnel 275 can be established in order for an end user to receive data recovery services, in which backup data previously generated by a subscriber and stored by serving network platform 210 can be transmitted to one or more multimode subscriber stations (e.g., multimode UE 250). As another example, serving network platform 210 can exploit a low-level update notification 235 in order to prompt multimode UE 250 to establish an end-to-end tunnel 275 upon attachment to offloading network platform 260 in order for a subscriber to receive advertisement, service coupons, promotional campaigns, and the like.
  • It should be appreciated that a processor (not shown), memory (not shown), and other electronic circuitry (not shown) can effect the functionality of substantially all components, nodes and interfaces in serving network platform 210, offloading network platform 260, and serving network access 240 and offloading network access 270 as well.
  • FIG. 3 is a block diagram of an example system that facilitates a firmware update in accordance with a subscriber update profile. Components in illustrative system 300 with like numerals to those in example system 200 have like functionality. Generally, a subscriber can update firmware in a plurality of (i) scenarios, (ii) modalities, and (iii) preferences. With respect to (i), updates can be notified by serving network platform 210 in an instance with poor channel conditions associated with offloading network platform, or excessive load in an area of coverage for offloading network platform; thus, a firmware update can be inefficient, in particular for substantive updates (e.g., O(1-10 MBs)). In addition, multiple firmware updates and add-ons can be implemented based on service standards such as agreed quality of service (QoS), mobile station features like antenna configuration and availability of multi-mode operation at a receiver. In connection with (ii), a subscriber can respond interactively to a notification to update firmware, or the subscriber can tend to ignore such notifications, in which case a batch mode update can be substantially more efficient. For (iii), a subscriber can prioritize certain updates, such as for example security firmware patches can be given an elevated priority compared to updates related to other applications like gaming, planner and scheduling, and so forth. In addition, subscriber can specify time intervals on which a firmware update is to be attempted. To manage or plan updates, a subscriber can generate an update profile 315 in accordance with aspects (i) through (iii) and store it in a subscriber database 310 which can be a part of serving network platform 210.
  • It should be appreciated, as discussed above, utilization of offloading network platform and offloading radio access is advantageous for serving network platform 210 since traffic is offload from radio resources that can be devoted to traffic; therefore, operator of serving network platform 210 can reward subscriber(s) to configure subscriber update profile(s) 315. In aspect of the subject innovation, a reward can include delivery of firmware for add-on features for a subscriber's mobile, differentiated rating for a predetermined time interval configured by the service provider, a credit of communication units such as voice minutes, a set of one or more coupons for ringtones, songs, video snippets, etc., storage space for subscriber's data like contact(s) list, emergency phone numbers, and so forth. It is to be noted that such reward scheme is neither provider-centric nor subscriber-centric since both parties benefit from utilization of subscriber update profile(s) 315 or substantially any other update planning instrument.
  • FIG. 4 is a block diagram of an example system 400 that facilitates mobile device management through an offloading network. Components in illustrative system 400 with like numerals to those in example system 300 have like functionality. In an aspect of example system 400, a service provider network 405 comprises serving network platform 210 and offloading network platform 260. Through operation of both network platforms, a service provider can advantageously coordinate firmware updates of a multimode UE 250 via end-to-end tunnel 275. In an aspect of the subject innovation, an intelligent component 410 within MDM component 214, can generate a usage pattern (not shown) of serving radio access 240 and offloading radio access 270 for a multimode 250 in order to create subscriber update profile(s) 415. Such profile can exploit geographic deployment information of access points included in offloading radio access 270, and location information of multimode UE 250 gleaned through serving network platform 210 in order to infer instance(s) in which multimode UE 250 is within a coverage area of offloading network platform 260. Once multimode UE 250 is inferred to be able to retain a telecommunication through offloading radio access 270, an update notification 235 can be conveyed to multimode UE 250, which can employ the notification to trigger attachment to offloading network platform 260 and establish an end-to-end tunnel 275 to receive a firmware update.
  • Additionally, a generated usage pattern (not shown) can include an inferred time interval Δt that multimode UE 250 lingers within coverage area of offloading radio access 270. Knowledge of Δt can facilitate MDM component 214 to select firmware update content that can likely be pushed successfully to multimode UE 250. It is to be noted that MDM component 214 can refine a selection of firmware update content through utilization of quality of radio link for multimode UE 250 in offloading radio access 270 in combination with inferred Δt. For example, if radio link or channel conditions in offloading radio access are deemed to be good, aggressive packet segmentation, and modulation and code rate can be employed to push a firmware update. However, if channel conditions are fair or poor a more conservative packet fragmentation, and modulation and code rate can be appropriate; thus, upload of a smaller firmware update can be possible within Δt.
  • To generate a usage pattern of offloading radio access 270, or offloading network platform 260, intelligent component 410 can collect information on attachment to offloading network 260, and location of access points and time span of an attachment thereto, by multimode UE 250 over a predetermined period of time (e.g., a week, a month, a quarter). Location of access points can be extracted from AP location area code/routing are code (LAC/RAC) in combination with offloading network platform 260 deployment available to service provider. It is to be noted that intelligent component 214 can also utilize substantially any information stored in subscriber database 310. Collected attachment and time span information can be employed by intelligent component 410 to reason or draw conclusions about, e.g., infer, a usage pattern of offloading radio access 270 and associated linger times. With respect to linger times Δt, intelligent component 410 an set a threshold below which time spans are removed from usage patter analysis, since short time spans can reflect attachment to offloading radio access 270 due to excessive AP signaling. To infer such usage pattern, analyzer 225 can rely on artificial intelligence techniques, which apply advanced mathematical algorithms—e.g., decision trees, neural networks, regression analysis, principal component analysis (PCA) for feature and pattern extraction, cluster analysis, genetic algorithm, and reinforced learning—to collected attachment information.
  • In particular, intelligent component 410 can employ at least one of numerous methodologies for learning from data and then drawing inferences from the models so constructed, e.g., Hidden Markov Models (HMMs) and related prototypical dependency models, more general probabilistic graphical models, such as Dempster-Shafer networks and Bayesian networks, e.g., created by structure search using a Bayesian model score or approximation, linear classifiers, such as support vector machines (SVMs), non-linear classifiers, such as methods referred to as “neural network” methodologies, fuzzy logic methodologies, and other approaches that perform data fusion, etc.) in accordance with implementing various automated aspects described herein. The foregoing methods can be applied to, to generate usage pattern(s), which includes linger time intervals.
  • It is to be appreciated that firmware update over-the-air through an offloading network platform 260 that is operated by a same service provider that operates service network platform 210 further improves end user experience with respect to firmware update through an offloading network operated by a disparate provider: Generation of usage pattern affords a more effective utilization of radio resources, which typically results in improved radio capacity, and mitigates possible service disruption associated with interactive update notification(s).
  • To provide further context for various aspects of the subject specification, FIG. 5 illustrates a block diagram of an example embodiment 500 of a multimode user equipment 510 that can exploit firmware update, and substantially any other content management, via an offloading network (e.g., offloading network platform 260 and offloading radio access 270) in accordance with aspects described herein.
  • Multimode UE 510, through a set of antennas 569 1-569 N, can receive and transmit signal(s) from and to wireless devices like access points, access terminals, wireless ports and routers, and so forth, that operate in a radio access network, e.g., serving radio access 240 or offloading radio access 270. It should be appreciated that while antennas 569 1-569 N are a part of communication platform 525, which comprises electronic components and associated circuitry that provides for processing and manipulation of received signal(s) and signal(s) to be transmitted. In an aspect, communication platform 525 includes a receiver/transmitter 566 that can convert signal from analog to digital upon reception, and from digital to analog upon transmission. In addition, receiver/transmitter 566 can divide a single data stream into multiple, parallel data streams, or perform the reciprocal operation. Functionally coupled to receiver/transmitter 566 is a multiplexer/demultiplexer component (mux/demux) 567 that facilitates manipulation of signal in time and frequency space. Electronic component 567 can multiplex information (data/traffic and control/signaling) according to various multiplexing schemes such as time division multiplexing (TDM), frequency division multiplexing (FDM), orthogonal frequency division multiplexing (OFDM), code division multiplexing (CDM), space division multiplexing (SDM). In addition, mux/demux component 567 can scramble and spread information (e.g., codes) according to substantially any code known in the art; e.g., Hadamard-Walsh codes, Baker codes, Kasami codes, polyphase codes, and so on. A modulator/demodulator component (mod/demod) 568 is also a part of communication platform 525, and can modulate information according to multiple modulation techniques, such as frequency modulation, amplitude modulation (e.g., M-ary quadrature amplitude modulation (QAM), with M a positive integer), phase-shift keying (PSK), and the like. In an aspect of embodiment 500, mod/demod 568 is functionally coupled to multiplexer/demultiplexer 567.
  • In addition, in embodiment 500, multimode operation chipset(s) 515 allows multimode UE 510 to operate in multiple communication modes in accordance with disparate technical specification for wireless technologies. In an aspect, multimode operation chipset(s) 515 utilizes communication platform 525 in accordance with a specific mode of operation. In another aspect, multimode operation chipset(s) 515 can be scheduled to operate concurrently (e.g., when N>1) in various modes or within a multitask paradigm.
  • In addition, multimode UE 510 includes a processor 535 configured to confer functionality, at least in part, to substantially any electronic component within the multimode UE 510, in accordance with aspects of the subject innovation. As an example, processor 535 can be configured to execute, at least in part, instructions in multimode operation chipset(s) that afford multimode communication through user equipment 510 like concurrent or multitask operation of two or more chipset(s). As another example, processor 535 can facilitate UE 510 to receive instruction code, e.g., firmware, through communication platform 525, and manipulate and execute such instruction code, in addition to store the instruction code and results execution thereof in memory 555. In addition, processor 535 facilitates multimode UE 510 to process data (e.g., symbols, bits, or chips) for multiplexing/demultiplexing, modulation/demodulation, such as implementing direct and inverse fast Fourier transforms, selection of modulation rates, selection of data packet formats, inter-packet times, etc. Memory 555 can store data structures, code instructions, system or device information like policies and specifications, code sequences for scrambling, spreading and pilot (e.g., reference signal) transmission, frequency offsets, LACs or substantially any other cell IDs, and so on.
  • In embodiment 500, processor 534 is functionally coupled to memory 555 in order to store and retrieve information necessary to operate and/or confer functionality at least in part to communication platform 525, multimode operation chipset(s) 515, and other operational aspects of multimode user equipment 510.
  • In view of the example systems described above, example methodologies that can be implemented in accordance with the disclosed subject matter can be better appreciated with reference to flowcharts in FIGS. 6-9. For purposes of simplicity of explanation example method 200 is presented and described as a series of acts; however, it is to be understood and appreciated that the claimed subject matter is not limited by the order of acts, as some acts may occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram, or interaction diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the subject specification. Additionally, it should be further appreciated that the methodologies disclosed hereinafter and throughout this specification are capable of being stored on an article of manufacture to facilitate transporting and transferring such methodologies to computers for execution by a processor or for storage in a memory.
  • FIG. 6 presents a flowchart of an example method 600 for updating firmware in accordance with aspects of the subject innovation. Example methodology is typically carried out by a subscriber station. At act 610, a notification to conduct a firmware update is received through a first wireless network. Such notification can be substantially any message supported by the first network; for instance, the notification can be a short message service (SMS Wakeup/WAP Push) message, a multimedia message service (MMS) message, an email message, an instant message, a predetermined ringtone or sound, and the like. The specific format for the notification can be based on available audiovisual resources (e.g., display size) of a device (e.g., multimode access terminal 250) or a predetermined subscriber update profile. In an aspect, the first wireless network typically operates within a first portion, or band, of a RF spectrum, with a first bandwidth. For example, the first network can be a 3GPP UMTS network. At act 620 it is checked whether the entity that receives a notification to update firmware is attached to a second wireless network. In the affirmative case, flow is directed to act 640, which is discussed below. Conversely, the entity attaches to the second network when signal from the second network is available prior to act 640. To determine whether signal is available, the entity that is to be attached to the second network can scan radio channels known to be utilized for telecommunication in the second network (e.g., one or more of the 14 channels utilized for communication in the 2.4 GHz unlicensed band of IEEE 802.11x network). It should be appreciated that, in an aspect of the subject innovation, the second wireless network utilizes a second band of the RF spectrum that is different from the first band utilized for communication in the first wireless network.
  • At act 640, a telecommunication session is established with the first wireless network through the second wireless network in response to the notification. In an aspect, such a session is established through a tunnel component interface in the first network platform, the tunnel interface (e.g., TTG in 3GPP UMTS network) grants an end-to-end tunnel among the entity that initiates the session and a data-packet gateway (e.g., GGSN in the 3GPP UMTS network) in the first wireless network. Session is authenticated within the first wireless network, and a unique context is generated for the session.
  • At act 650, firmware is updated through the second wireless network. It is to be noted that at least one advantage of the effecting an update through the second network is that radio resources of the first network are offloaded by reducing traffic in the first RF band utilized by the first network. An additional advantage is that the second RF band utilized by the second network need not be licensed, in which case operational costs associated with performing an update are reduced.
  • FIG. 7 is an example method 700 for updating firmware according to aspects of the subject innovation. At act 710 an indication to update firmware in batch mode is received through a first network. Such an indication can be an L-bit word which can be conveyed in various manners depending on the communication technology utilized by the first network; for instance, the indication can be conveyed in a control channel (for an LTE network, or UMB network), or in a data-packet header field (e.g., in a high-speed downlink packet access (HSDPA) network). The batch mode aspect of the indication has at least the advantage of not implementing an upgrade upon receiving the indication to upgrade. A batch mode upgrade can facilitate a more efficient utilization of radio resources. At act 720, it is checked whether the entity (e.g., a multimode mobile) that receives the indication to update firmware is idle on the first network, e.g., no traffic is communicated, and signal is detected from a second network. Detection of such a signal can be performed through a scanner that probes channel signal strength in the RF band (e.g., 2.4 GHz IMS band) in which the second network operates. In the affirmative case, the entity attaches to the second network. Such attachment typically includes a LAU/RAU procedure as well as fine synchronization with a serving access point that belong to the second network radio access environment. Conversely, the check at act 720 is reenacted.
  • At act 740, a communication session with the first network through the second network is triggered in response to the batch indication to update firmware. Act 750 is a validation check that probes whether the triggered session was established, e.g., data services are granted by establishing an end-to-end tunnel among the entity that triggered the session and the grantor of the data services. In case session is not successfully established, a new session is retried when a “retry” check in act 760 warrants it, otherwise methodology flow is terminated. When a session is established, firmware is update is updated through the second network, which provides at least the benefit of offloading the first network, and thus improving better service to subscribers.
  • FIG. 8 presents a flowchart of an example method 800 for delivering firmware content, or substantially any other content, from a serving first network through an offloading second network in accordance with aspects described herein. At act 810, a notification to perform a firmware update is conveyed through a first network. The notification can be substantially any message type supported by the first network. For example, the notification can be a SMS communication, a MMS message, an email message, an instant message, a predetermined ringtone or sound, and the like. In addition, the notification can be a low-level type of indication like a P-bit word (P is a positive integer) conveyed in control channel or a packet header field. For high-level notification(s), the specific format utilized can be based on available audiovisual resources (e.g., display size) of a device (e.g., multimode access terminal 250), or applications in the device. In addition, the format can be determined through a network-configured default format which can be established through firmware at the time the device is assembled or when a subscriber account is setup for the device. Moreover, the notification format can be configured through a subscriber update profile, which can be a part of a general operation profile setup by a subscriber. Such an update profile can determine time intervals during which notification are allowed. The profile can also configure priorities for notifications and formats thereof, e.g., firmware updates can be allowed at any time through a MMS message, whereas assistant-type applications (e.g., calendar, scheduler, touch-pad application(s)) can be permitted within specific hours like during weekends via a ringtone or a low-level batch mode notification as described hereinbefore.
  • At act 820, a request is received to establish a telecommunication session through a second network in response to the notification. In an aspect, such request is received via a tunnel interface in the first network (e.g., tunnel interface 226, which can be TTG in a 3GPP UMTS network). At act 830, the request to establish a communication session through the second network is authorized and authenticated via, for example, the tunnel interface in combination with a gateway component (e.g., gateway node(s) 218, which can be a GGSN in a 3GPP UMTS network) in the first network. At act 840, an end-to-end communication tunnel is created to effect telecommunication session through the second network.
  • At act 850, updated firmware content is uploaded through the end-to-end communication tunnel. Utilization of the end-to-end tunnel has at least the advantage to offload traffic, e.g., firmware content which can be in excess of a MB, from the first network. In an aspect, firmware content can be uploaded according to a network-configured default scheme, or to a subscriber profile. For example, a default scheme can provide a subscriber station with firmware updates consistent with application(s) extant in the mobile or to ensure specific functionality agree at the time of subscription to a service. Alternatively, or in addition, uploads through a subscriber profile can deliver a subscriber with add-on updates that enhance the functionality of the subscriber station when in the profile the subscriber indicated that firmware upgrades and add-ons are to be prompted for download.
  • FIG. 9 presents a flowchart of an example method 900 for configuring a subscriber update profile according to aspect described herein. At act 910 a subscriber update profile is received. A subscriber update profile can establish various preferences regarding notification to conduct (e.g., download and install) a firmware update. In an aspect, the subscriber update profile can be generated as a default profile when a subscriber's account is opened. For example, a default subscriber update profile can indicate that security and operational firmware updates are to be notified when available for download and installation, while updates for non-critical applications such as video- and music-streaming, gaming, scheduling and calendar, etc. are to be notified periodically rather than upon immediate availability. A subscriber generated update profile can be substantially richer, with specific priorities for various applications and security features, in addition to allowing offerings for add-on features, e.g., notification to download firmware that expands the capability of the subscriber station such as drivers to render a mobile display into a television tuner or into a touch-pad display.
  • At act 920 a subscriber update profile is generated. A network operator can generate a profile according to various aspects like agreed quality of service (e.g., guaranteed bitrate, minimum bitrate, minimum tolerable latency, maximum bit error or packet loss rate, and so forth), user equipment capabilities like antenna configuration, multimode chipset(s) features, multi-processor processing unit(s), and so on. In addition, an update profile can be generated autonomously by the a network component (MDM component 214) based at least in part on a subscriber pattern of usage of a second network utilized for uploading firmware content into a mobile station. Accordingly, notification(s) to update firmware can be conveyed when the first network has a substantive confidence a subscriber station can be in a coverage area of the second network. It should be appreciated that such update profile inference can be implemented when the first network and second network are operated by a same service provider, since the service provides can collect subscriber's location information and correlate such information with access points that provide coverage through the second network. Moreover, when service provider operates the second network, it can ensure free-of-charge updates for a subscriber since access to the second network need not be rated. At act 930, a subscriber update profiled is retained for at least mobile device management.
  • It should be appreciated that the specification described herein can be implemented through program modules stored in a memory and executed by a processor, and/or other combination of hardware and software, e.g., firmware.
  • As it employed in the subject specification, the term “processor” can refer to substantially any computing processing unit or device comprising, but not limited to comprising, single-core processors; single-processors with software multithread execution capability; multi-core processors; multi-core processors with software multithread execution capability; multi-core processors with hardware multithread technology; parallel platforms; and parallel platforms with distributed shared memory. Additionally, a processor can refer to an integrated circuit, an application specific integrated circuit (ASIC), a digital signal processor (DSP), a field programmable gate array (FPGA), a programmable logic controller (PLC), a complex programmable logic device (CPLD), a discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. Processors can exploit nano-scale architectures such as, but not limited to, molecular and quantum-dot based transistors, switches and gates, in order to optimize space usage or enhance performance of user equipment. A processor may also be implemented as a combination of computing processing units.
  • In the subject specification, terms such as “data store,” data storage,” “database,” and substantially any other information storage component relevant to operation and functionality of a component, refer to “memory components,” or entities embodied in a “memory” or components comprising the memory. For example, information relevant to operation of various components described in the disclosed subject matter, and that can be stored in a memory, can comprise, but is not limited to comprising, subscriber information; femto cell configuration (e.g., devices served by a femto AP; access control lists, or white lists) or service policies and specifications; privacy policies; add-on features, geographical location tolerances, and so forth. It will be appreciated that the memory components described herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
  • By way of illustration, and not limitation, nonvolatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM). Additionally, the disclosed memory components of systems or methods herein are intended to comprise, without being limited to comprising, these and any other suitable types of memory.
  • Various aspects or features described herein may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. For example, computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips . . . ), optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ), smart cards, and flash memory devices (e.g., card, stick, key drive . . . ).
  • What has been described above includes examples of systems and methods that provide advantages of the subject innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject innovation, but one of ordinary skill in the art may recognize that many further combinations and permutations of the claimed subject matter are possible. Furthermore, to the extent that the terms “includes,” “has,” “possesses,” and the like are used in the detailed description, claims, appendices and drawings such terms are intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.

Claims (35)

1. A method for managing firmware in a mobile device, the method comprising:
conveying through a first network a notification to perform a firmware update;
receiving a request to establish a telecommunication session through a second network in response to the notification;
creating an end-to-end communication tunnel to effect the telecommunication through the second network; and
uploading updated firmware content through the end-to-end communication tunnel.
2. The method of claim 1, further comprising authorizing and authenticating the request to establish a telecommunication session through the second network.
3. The method of claim 2, wherein uploading updated firmware content proceeds according to at least one of a network-configured default upload profile, or a subscriber-configured upload profile.
4. The method of claim 3, wherein the first network utilizes a first radio frequency (RF) band and the second network utilizes a second RF band.
5. The method of claim 4, wherein the first network utilizes a first wireless technology and the second network utilizes a second wireless technology.
6. The method of claim 5, wherein the first wireless technology is one of a third generation universal mobile telecommunication service or a global system for mobile communication, and the second wireless technology is a Wi-Fi.
7. The method of claim 6, wherein the notification is one of a short message service (SMS) message, a multimedia message service (MMS) message, an email message, an instant message, or a ringtone.
8. The method of claim 6, wherein the notification is one of a P-bit word (P is a positive integer) or a packet header field with a predefined value.
9. The method of claim 2, wherein the subscriber-configured upload profile is created by at least one of receiving a subscriber update profile or generating a subscriber update profile.
10. The method of claim 9, generating a subscriber update profile is based on at least one of a subscriber usage pattern or a quality of service.
11. A system that facilitates an update of a mobile device firmware, the system comprising:
a component that conveys a notification to update the mobile device firmware through a first radio access network (RAN);
a component that receives a request to establish a telecommunication session through a second (RAN) in response to the notification;
a component that generates an end-to-end communication tunnel to implement the telecommunication through the second RAN; and
a component that conveys updated mobile device firmware through the end-to-end communication tunnel.
12. The system of claim 11, wherein updated mobile device firmware is conveyed in accordance to at least one of a network-configured default upload profile, or a subscriber-configured upload profile.
13. The system of claim 11, wherein the first RAN utilizes a first radio frequency (RF) band and the second RAN utilizes a second RF band.
14. The system of claim 13, wherein the first RAN utilizes a first wireless technology and the second RAN utilizes a second wireless technology.
15. The system of claim 14, wherein the notification is one of a short message service (SMS) message, a multimedia message service (MMS) message, an email message, an instant message, or a ringtone.
16. The system of claim 14, wherein the notification is one of a Q-bit word (Q is a positive integer) or a packet header field with a predefined value.
17. The system of claim 11, wherein a component receives the subscriber update profile.
18. The system of claim 11, wherein a component generates the subscriber update profile based at least in part on at least one of a subscriber usage pattern, a quality of service, or mobile device capabilities.
19. The system of claim 18, wherein the quality of service is at least one of a guaranteed bitrate, a minimum bitrate, a minimum tolerable latency, a maximum bit error, or a maximum packet loss rate.
20. The method of claim 19, wherein mobile device capabilities include at least one of an antenna configuration, a set of multimode chipset(s) features, or a set of multi-processor processing unit(s),
21. A computer-readable medium having instructions stored thereon that, when executed by a computer, cause the computer to carry out the following acts:
conveying through a first network a notification to perform a firmware update;
receiving a request to establish a telecommunication session through a second network in response to the notification;
authorizing and authenticating the request to establish a telecommunication session through the second network;
creating an end-to-end communication tunnel to effect the telecommunication through the second network; and
uploading updated firmware content through the end-to-end communication tunnel.
22. A method for updating firmware in a subscriber station, the method comprising:
receiving through a first wireless network a notification to conduct a firmware update;
establishing a telecommunication session with the first wireless network through a second wireless network in response to the notification; and
updating the firmware through the second wireless network.
23. The method of claim 22, wherein a notification includes an indication to update firmware in batch mode.
24. The method of claim 23, wherein establishing a telecommunication session with the first wireless network through a second wireless network in response to the notification further comprises:
when an indication to update firmware in batch mode is received, attaching to the second wireless network when the subscriber station is idle in the first wireless network and channel signal is detected from the second wireless network; and
triggering a communication session with the first network through the second network in response to the indication to update firmware in batch mode.
25. The method of claim 24, wherein updating the firmware further comprises receiving firmware content according at least in part to a subscriber update profile.
26. The method of claim 25, wherein the first network utilizes a first radio frequency (RF) band and the second network utilizes a second RF band.
27. The method of claim 26, wherein the first network utilizes a first wireless technology and the second network utilizes a second wireless technology.
28. The method of claim 27, wherein the first wireless technology is one of a third generation universal mobile telecommunication service or a global system for mobile communication, and the second wireless technology is a Wi-Fi.
29. The method of claim 28, wherein the notification is one of a short message service (SMS) message, a multimedia message service (MMS) message, an email message, an instant message, or a ringtone.
30. The method of claim 28, wherein the indication to update firmware in batch mode is one of a T-bit word (T is a positive integer) or a packet header field with a predefined value.
31. The method of claim 25, wherein the subscriber update profile is based on at least one of a subscriber usage pattern or a quality of service.
32. The method of claim 31, a subscriber update profile can include at least one of a specific update priority for an application, a specific update priority for a security feature, or an indication to allow offerings for add-on features.
33. A computer-readable medium having instructions stored thereon that, when executed by a computer, cause the computer to carry out the following acts:
receiving through a first wireless network a notification to conduct a firmware update, wherein a notification includes an indication to update firmware in batch mode;
establishing a telecommunication session with the first wireless network through a second wireless network in response to the notification; and
updating the firmware through the second wireless network.
34. The computer-readable medium of claim 33, further comprising instructions that, when executed by a computer, cause the computer to perform the following acts:
when an indication to update firmware in batch mode is received, attaching to the second wireless network when the subscriber station is idle in the first wireless network and channel signal is detected from the second wireless network; and
triggering a communication session with the first network through the second network in response to the indication to update firmware in batch mode.
35. A wireless device comprising:
means for receiving through a first wireless network a notification to conduct a firmware update;
means for receiving an indication to conduct a firmware update in batch mode;
means for establishing a telecommunication session with the first wireless network through a second wireless network in response to the notification; and
means for conducting the firmware update through the second wireless network in response to the notification
means for performing a firmware update in batch mode.
US12/143,959 2008-06-23 2008-06-23 Mobile device management through an offloading network Abandoned US20090318124A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/143,959 US20090318124A1 (en) 2008-06-23 2008-06-23 Mobile device management through an offloading network
US13/364,257 US8626143B2 (en) 2008-06-23 2012-02-01 Mobile device management through an offloading network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/143,959 US20090318124A1 (en) 2008-06-23 2008-06-23 Mobile device management through an offloading network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/364,257 Continuation US8626143B2 (en) 2008-06-23 2012-02-01 Mobile device management through an offloading network

Publications (1)

Publication Number Publication Date
US20090318124A1 true US20090318124A1 (en) 2009-12-24

Family

ID=41431760

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/143,959 Abandoned US20090318124A1 (en) 2008-06-23 2008-06-23 Mobile device management through an offloading network
US13/364,257 Active 2028-07-17 US8626143B2 (en) 2008-06-23 2012-02-01 Mobile device management through an offloading network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/364,257 Active 2028-07-17 US8626143B2 (en) 2008-06-23 2012-02-01 Mobile device management through an offloading network

Country Status (1)

Country Link
US (2) US20090318124A1 (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080194276A1 (en) * 2007-02-12 2008-08-14 Lin Daniel J Method and System for a Hosted Mobile Management Service Architecture
US20090249321A1 (en) * 2008-03-25 2009-10-01 Mandyam Giridhar D Apparatus and methods for widget update scheduling
US20100027431A1 (en) * 2008-08-01 2010-02-04 At&T Mobility Ii Llc Alarming in a femto cell network
US20100039987A1 (en) * 2008-08-14 2010-02-18 Motorola, Inc. Method and apparatus for routing a bearer path in an internet protocol multimedia subsystem based communication system
US20110103303A1 (en) * 2009-11-02 2011-05-05 Industrial Technology Research Institute Wireless communication system and routing method for packet switching service, femto ap using the routing method
US20110222515A1 (en) * 2010-03-12 2011-09-15 Qualcomm Incorporated Methods and apparatus for supporting synchronization between groups of devices
US20120135711A1 (en) * 2009-03-03 2012-05-31 E3 Llc System and method for device authentication in a dynamic network using wireless communication devices
WO2012099541A1 (en) * 2011-01-17 2012-07-26 Agency For Science, Technology And Research Method and device for mobile data offload
US20120230191A1 (en) * 2011-03-08 2012-09-13 Yang Lit Fang Method and system for data offloading in mobile communications
US20120270538A1 (en) * 2011-04-22 2012-10-25 Qualcomm Incorporated Offloading of data to wireless local area network
WO2012148482A1 (en) * 2011-04-29 2012-11-01 Nageen Himayat Control and data plane solutions for carrier- aggregation based wlan offload
US8307095B2 (en) 2010-06-21 2012-11-06 Research In Motion Limited Firmware upgrade system and method in a device management architecture
US20120331156A1 (en) * 2011-06-21 2012-12-27 Colpitts Cameron Wireless control system, methods and apparatus
US8417772B2 (en) 2007-02-12 2013-04-09 Amazon Technologies, Inc. Method and system for transferring content from the web to mobile devices
US20130109323A1 (en) * 2011-10-31 2013-05-02 Nokia Corporation Wirelessly Transferring Data To A Packaged Electronic Device
WO2013100629A1 (en) * 2011-12-27 2013-07-04 엘지전자 주식회사 Method for offloading data in wireless communication system and apparatus for same
US20130279376A1 (en) * 2012-04-24 2013-10-24 Apple Inc. Methods and apparatus for opportunistic radio resource allocation in multi-carrier communication systems
US8589910B2 (en) * 2011-11-01 2013-11-19 At&T Intellectual Property I, L.P. Coordinating firmware over-the-air updates for mobile devices utilizing presence information
US20140012970A1 (en) * 2012-07-03 2014-01-09 Research In Motion Limited Methods and devices for facilitating a download session
EP2688363A2 (en) * 2011-05-31 2014-01-22 Huawei Technologies Co., Ltd. System, device for convergence transmission and method for data distribution convergence
WO2014018256A1 (en) * 2012-07-26 2014-01-30 Utc Fire And Security Americas Corporation, Inc. Wireless firmware upgrades to an alarm security panel
US20140068342A1 (en) * 2012-09-03 2014-03-06 Chia Chien Chuang Wireless Debugging and Updating of Firmware
EP2744260A1 (en) * 2011-09-06 2014-06-18 Huawei Technologies Co., Ltd Data transmission method and device
US20140177840A1 (en) * 2012-12-20 2014-06-26 T-Mobile Usa, Inc. Cellular Backhaul Load Distribution
CN103945406A (en) * 2013-01-17 2014-07-23 美国博通公司 Wireless communication system utilizing enhanced air-interface
US8831658B2 (en) 2010-11-05 2014-09-09 Qualcomm Incorporated Controlling application access to a network
US8838086B2 (en) 2011-08-29 2014-09-16 Qualcomm Incorporated Systems and methods for management of background application events
WO2014175672A1 (en) * 2013-04-25 2014-10-30 Lg Electronics Inc. Method and apparatus for transmitting traffic indication in wireless communication system
US8897782B2 (en) 2012-01-16 2014-11-25 Microsoft Corporation System and method for offloading traffic from cellular networks using plugins
US20140372622A1 (en) * 2013-05-23 2014-12-18 Vonage Network Llc Method and apparatus for minimizing application delay by pushing application notifications
US8934904B2 (en) * 2012-11-30 2015-01-13 Motorola Solutions, Inc. Method and apparatus for data communication
US8937903B2 (en) 2011-06-14 2015-01-20 At&T Intellectual Property I, L.P. System and method for providing a content delivery network via a motor vehicle
US20150067669A1 (en) * 2013-09-03 2015-03-05 Samsung Electronics Co., Ltd. Method for managing application and electronic device thereof
US9038915B2 (en) 2011-01-31 2015-05-26 Metrologic Instruments, Inc. Pre-paid usage system for encoded information reading terminals
US20150223135A1 (en) * 2012-08-08 2015-08-06 Nokia Solutions And Networks Oy Interference Reduction Through Cell Activation Methods in Heterogeneous Networks
US20150281976A1 (en) * 2014-04-01 2015-10-01 Teoco Corporation System, Method, and Computer Program Product for Determining Placement of a Small Cell in a Location Within a Cellular Network
US9178965B2 (en) 2011-03-18 2015-11-03 Qualcomm Incorporated Systems and methods for synchronization of application communications
CN105075285A (en) * 2013-04-01 2015-11-18 诺基亚技术有限公司 A method and apparatus for diverse security handling in an enhanced local area network
US20150339117A1 (en) * 2012-05-31 2015-11-26 Microsoft Technology Licensing, Llc Computing Device Update Control
US9264868B2 (en) 2011-01-19 2016-02-16 Qualcomm Incorporated Management of network access requests
US20160062760A1 (en) * 2014-08-27 2016-03-03 Xiaomi Inc. Method and terminal device for complying router management application with router firmware
US9307347B2 (en) 2012-06-01 2016-04-05 Nokia Technologies Oy Wireless programming
US9338726B2 (en) 2012-10-15 2016-05-10 Qualcomm Incorporated Cooperative data mules
US9389878B1 (en) 2011-06-03 2016-07-12 Phoenix Technologies Ltd. Pre-boot management of drivers and programs
US20160295460A1 (en) * 2011-07-12 2016-10-06 Lg Electronics Inc. Method for performing a cooperative operation between heterogeneous networks and device for same
US9480086B2 (en) 2012-06-26 2016-10-25 International Business Machines Corporation Management of mobile devices leveraging location based cooperation
US9559864B1 (en) * 2009-11-16 2017-01-31 Sprint Spectrum L.P. Method and system for managing wireless devices using short-range wireless communication
US9603085B2 (en) 2010-02-16 2017-03-21 Qualcomm Incorporated Methods and apparatus providing intelligent radio selection for legacy and non-legacy applications
US9609513B2 (en) 2009-03-03 2017-03-28 Mobilitie, Llc System and method for device authentication in a dynamic network using wireless communication devices
US20170223578A1 (en) * 2014-09-18 2017-08-03 Kt Corporation Method and apparatus for processing user plane data
US10061500B2 (en) 2008-03-25 2018-08-28 Qualcomm Incorporated Apparatus and methods for widget-related memory management
US10262309B1 (en) 2011-05-26 2019-04-16 Phoenix Technologies Ltd. Augmenting a BIOS with new programs
US10481927B2 (en) 2008-03-25 2019-11-19 Qualcomm Incorporated Apparatus and methods for managing widgets in a wireless communication environment
US10736175B2 (en) * 2014-10-02 2020-08-04 Kt Corporation Method for processing data using WLAN carrier and apparatus therefor
US10735967B2 (en) 2014-09-05 2020-08-04 Kt Corporation Method and apparatus for carrier aggregation using aggregation entity
US11711862B1 (en) 2021-07-15 2023-07-25 T-Mobile Usa, Inc. Dual connectivity and carrier aggregation band selection

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8743696B2 (en) * 2009-08-07 2014-06-03 Cisco Technology, Inc. Mobile transport solution for offloading to an alternate network
US9158526B1 (en) * 2010-11-10 2015-10-13 Open Invention Network, Llc Application update using multiple network connections
US8477730B2 (en) 2011-01-04 2013-07-02 Cisco Technology, Inc. Distributed load management on network devices
US8797875B2 (en) * 2011-09-16 2014-08-05 Telefonaktiebolaget Lm Ericsson (Publ) Policy controlled offloading among neighboring networks
US9166732B2 (en) * 2012-04-19 2015-10-20 At&T Mobility Ii Llc Facilitation of security employing a femto cell access point
WO2014000808A1 (en) * 2012-06-29 2014-01-03 Nokia Siemens Networks Oy Offloading of user plane packets from a macro base station to an access point
US8918091B1 (en) * 2012-08-15 2014-12-23 Sprint Communications Company L.P. Wireless communication service using shared service credentials
US9094801B2 (en) * 2013-01-15 2015-07-28 Verizon Patent And Licensing Inc. Method and system for enabling multicast distribution of mobile device update data
US9001769B1 (en) 2013-03-14 2015-04-07 Sprint Spectrum L.P. Managing access node channel loading
US9844080B2 (en) * 2014-06-13 2017-12-12 Verizon Patent And Licensing Inc. Notification triggered device management session
US9900756B2 (en) * 2015-04-24 2018-02-20 Kony, Inc. Dynamically updating policy controls for mobile devices and applications via policy notifications
US10419214B2 (en) * 2015-12-28 2019-09-17 Dell Products L.P. Mobile device management delegate for managing isolated devices
US10462663B2 (en) 2016-06-27 2019-10-29 Corning Optical Communications LLC System and method for service provider specific remote access via neutral host networks
US10172027B2 (en) * 2016-07-19 2019-01-01 Htc Corporation Device and method of reporting a WLAN connection status
US10332006B2 (en) 2016-12-15 2019-06-25 At&T Intellectual Property I, L.P. Optimization of over-the-air file distribution for connected cars based upon a heuristic scheduling algorithm
US10051462B2 (en) * 2016-12-16 2018-08-14 T-Mobile Usa, Inc. Hybrid transport for installed service updates
US10853472B2 (en) * 2018-06-28 2020-12-01 Intel Corporation System, apparatus and method for independently recovering a credential

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132115A1 (en) * 1999-06-10 2005-06-16 Leach Mark A. Host-client utility meter systems and methods for communicating with the same
US20050181776A1 (en) * 2002-06-21 2005-08-18 Shaily Verma Multimedia content delivery through wlan coverage area
US20080040713A1 (en) * 2004-05-31 2008-02-14 Stmicroelectronics Pvt. Ltd Method for remotely upgrading the firmware of a target device using wireless technology
US20080153422A1 (en) * 2005-02-07 2008-06-26 Claire Gilbertas Method and System For Locally Controlling the Distribution of an Application on a Shared Wireless Network
US20080310324A1 (en) * 2007-06-15 2008-12-18 Qualcomm Incorporated Aborting a packetized wireless communication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3669619B2 (en) * 1999-09-06 2005-07-13 富士通株式会社 Software updating method and apparatus for wireless terminal device
US20030022661A1 (en) * 2001-07-05 2003-01-30 Jose Guterman Downloading software over the air for implementation of air interface protocols
GB2427326A (en) * 2005-06-15 2006-12-20 Toshiba Res Europ Ltd Method and Apparatus for Wireless Communication.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132115A1 (en) * 1999-06-10 2005-06-16 Leach Mark A. Host-client utility meter systems and methods for communicating with the same
US20050181776A1 (en) * 2002-06-21 2005-08-18 Shaily Verma Multimedia content delivery through wlan coverage area
US20080040713A1 (en) * 2004-05-31 2008-02-14 Stmicroelectronics Pvt. Ltd Method for remotely upgrading the firmware of a target device using wireless technology
US20080153422A1 (en) * 2005-02-07 2008-06-26 Claire Gilbertas Method and System For Locally Controlling the Distribution of an Application on a Shared Wireless Network
US20080310324A1 (en) * 2007-06-15 2008-12-18 Qualcomm Incorporated Aborting a packetized wireless communication

Cited By (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9313296B1 (en) 2007-02-12 2016-04-12 Amazon Technologies, Inc. Method and system for a hosted mobile management service architecture
US20080194276A1 (en) * 2007-02-12 2008-08-14 Lin Daniel J Method and System for a Hosted Mobile Management Service Architecture
US8571535B1 (en) 2007-02-12 2013-10-29 Amazon Technologies, Inc. Method and system for a hosted mobile management service architecture
US9219797B2 (en) 2007-02-12 2015-12-22 Amazon Technologies, Inc. Method and system for a hosted mobile management service architecture
US7751807B2 (en) * 2007-02-12 2010-07-06 Oomble, Inc. Method and system for a hosted mobile management service architecture
US8417772B2 (en) 2007-02-12 2013-04-09 Amazon Technologies, Inc. Method and system for transferring content from the web to mobile devices
US10481927B2 (en) 2008-03-25 2019-11-19 Qualcomm Incorporated Apparatus and methods for managing widgets in a wireless communication environment
US9600261B2 (en) * 2008-03-25 2017-03-21 Qualcomm Incorporated Apparatus and methods for widget update scheduling
US10061500B2 (en) 2008-03-25 2018-08-28 Qualcomm Incorporated Apparatus and methods for widget-related memory management
US20090249321A1 (en) * 2008-03-25 2009-10-01 Mandyam Giridhar D Apparatus and methods for widget update scheduling
US7855977B2 (en) * 2008-08-01 2010-12-21 At&T Mobility Ii Llc Alarming in a femto cell network
US20100027431A1 (en) * 2008-08-01 2010-02-04 At&T Mobility Ii Llc Alarming in a femto cell network
US20100039987A1 (en) * 2008-08-14 2010-02-18 Motorola, Inc. Method and apparatus for routing a bearer path in an internet protocol multimedia subsystem based communication system
US8625582B2 (en) * 2008-08-14 2014-01-07 Motorola Solutions, Inc. Method and apparatus for routing a bearer path in an internet protocol multimedia subsystem based communication system
US20120135711A1 (en) * 2009-03-03 2012-05-31 E3 Llc System and method for device authentication in a dynamic network using wireless communication devices
US9179296B2 (en) * 2009-03-03 2015-11-03 Mobilitie, Llc System and method for device authentication in a dynamic network using wireless communication devices
US9609513B2 (en) 2009-03-03 2017-03-28 Mobilitie, Llc System and method for device authentication in a dynamic network using wireless communication devices
US8265010B2 (en) * 2009-11-02 2012-09-11 Industrial Technology Research Institute Wireless communication system and routing method for packet switching service, femto AP using the routing method
US20110103303A1 (en) * 2009-11-02 2011-05-05 Industrial Technology Research Institute Wireless communication system and routing method for packet switching service, femto ap using the routing method
US9559864B1 (en) * 2009-11-16 2017-01-31 Sprint Spectrum L.P. Method and system for managing wireless devices using short-range wireless communication
US9603085B2 (en) 2010-02-16 2017-03-21 Qualcomm Incorporated Methods and apparatus providing intelligent radio selection for legacy and non-legacy applications
US20110222515A1 (en) * 2010-03-12 2011-09-15 Qualcomm Incorporated Methods and apparatus for supporting synchronization between groups of devices
US8483196B2 (en) * 2010-03-12 2013-07-09 Qualcomm Incorporated Methods and apparatus for supporting synchronization between groups of devices
US8914473B2 (en) 2010-06-21 2014-12-16 Blackberry Limited Firmware upgrade system and method in a device management architecture
US8307095B2 (en) 2010-06-21 2012-11-06 Research In Motion Limited Firmware upgrade system and method in a device management architecture
US8831658B2 (en) 2010-11-05 2014-09-09 Qualcomm Incorporated Controlling application access to a network
WO2012099541A1 (en) * 2011-01-17 2012-07-26 Agency For Science, Technology And Research Method and device for mobile data offload
US9668168B2 (en) 2011-01-17 2017-05-30 Agency For Science, Technology And Research Method and device for mobile data offload
US9264868B2 (en) 2011-01-19 2016-02-16 Qualcomm Incorporated Management of network access requests
US9342827B2 (en) 2011-01-31 2016-05-17 Metrologic Instruments, Inc. Pre-paid usage system for encoded information reading terminals
US9038915B2 (en) 2011-01-31 2015-05-26 Metrologic Instruments, Inc. Pre-paid usage system for encoded information reading terminals
US20120230191A1 (en) * 2011-03-08 2012-09-13 Yang Lit Fang Method and system for data offloading in mobile communications
US8976657B2 (en) * 2011-03-08 2015-03-10 Medium Access Systems Private Ltd. Method and system for data offloading in mobile communications
US9178965B2 (en) 2011-03-18 2015-11-03 Qualcomm Incorporated Systems and methods for synchronization of application communications
WO2012145720A1 (en) * 2011-04-22 2012-10-26 Qualcomm Incorporated Offloading of data to wireless local area network
US9571952B2 (en) * 2011-04-22 2017-02-14 Qualcomm Incorporatd Offloading of data to wireless local area network
US20120270538A1 (en) * 2011-04-22 2012-10-25 Qualcomm Incorporated Offloading of data to wireless local area network
US9036473B2 (en) 2011-04-29 2015-05-19 Intel Corporation Control and data plane solutions for carrier-aggregation based WLAN offload
US9426689B2 (en) 2011-04-29 2016-08-23 Intel Corporation Control and data plane solutions for carrier-aggregation based WLAN offload
CN103782622A (en) * 2011-04-29 2014-05-07 英特尔公司 Control and data plane solutions for carrier aggregation based WLAN offload
WO2012148482A1 (en) * 2011-04-29 2012-11-01 Nageen Himayat Control and data plane solutions for carrier- aggregation based wlan offload
US10262309B1 (en) 2011-05-26 2019-04-16 Phoenix Technologies Ltd. Augmenting a BIOS with new programs
EP2688363A2 (en) * 2011-05-31 2014-01-22 Huawei Technologies Co., Ltd. System, device for convergence transmission and method for data distribution convergence
US9161264B2 (en) 2011-05-31 2015-10-13 Huawei Technologies Co., Ltd. Convergent transmission system and apparatus, data offloading and converging method
EP2688363A4 (en) * 2011-05-31 2014-07-09 Huawei Tech Co Ltd System, device for convergence transmission and method for data distribution convergence
US9389878B1 (en) 2011-06-03 2016-07-12 Phoenix Technologies Ltd. Pre-boot management of drivers and programs
US8937903B2 (en) 2011-06-14 2015-01-20 At&T Intellectual Property I, L.P. System and method for providing a content delivery network via a motor vehicle
US10958634B2 (en) 2011-06-14 2021-03-23 At&T Intellectual Property I, L.P. System and method for providing a content delivery network via a motor vehicle
US10104054B2 (en) 2011-06-14 2018-10-16 At&T Intellectual Property I, L.P. System and method for providing a content delivery network via a motor vehicle
US9264904B2 (en) 2011-06-14 2016-02-16 At&T Intellectual Property I, L.P. System and method for providing a content delivery network via a motor vehicle
US20120331156A1 (en) * 2011-06-21 2012-12-27 Colpitts Cameron Wireless control system, methods and apparatus
US10015698B2 (en) * 2011-07-12 2018-07-03 Lg Electronics Inc. Method for performing a cooperative operation between heterogeneous networks and device for same
US20160295460A1 (en) * 2011-07-12 2016-10-06 Lg Electronics Inc. Method for performing a cooperative operation between heterogeneous networks and device for same
US8838086B2 (en) 2011-08-29 2014-09-16 Qualcomm Incorporated Systems and methods for management of background application events
US9137737B2 (en) 2011-08-29 2015-09-15 Qualcomm Incorporated Systems and methods for monitoring of background application events
EP2744260A4 (en) * 2011-09-06 2015-02-25 Huawei Tech Co Ltd Data transmission method and device
EP2744260A1 (en) * 2011-09-06 2014-06-18 Huawei Technologies Co., Ltd Data transmission method and device
US20130109323A1 (en) * 2011-10-31 2013-05-02 Nokia Corporation Wirelessly Transferring Data To A Packaged Electronic Device
US9369959B2 (en) * 2011-10-31 2016-06-14 Nokia Technologies Oy Wirelessly transferring data to a packaged electronic device
USRE47394E1 (en) * 2011-10-31 2019-05-14 Wsou Investments, Llc Wirelessly transferring data to a packaged electronic device
US8589910B2 (en) * 2011-11-01 2013-11-19 At&T Intellectual Property I, L.P. Coordinating firmware over-the-air updates for mobile devices utilizing presence information
US20140341038A1 (en) * 2011-12-27 2014-11-20 Lg Electronics Inc. Method for offloading data in wireless communication system and apparatus for same
WO2013100629A1 (en) * 2011-12-27 2013-07-04 엘지전자 주식회사 Method for offloading data in wireless communication system and apparatus for same
US9473997B2 (en) * 2011-12-27 2016-10-18 Lg Electronics Inc. Method for offloading data in wireless communication system and apparatus for same
US8897782B2 (en) 2012-01-16 2014-11-25 Microsoft Corporation System and method for offloading traffic from cellular networks using plugins
US20150016406A1 (en) * 2012-01-16 2015-01-15 Microsoft Corporation System and method for offloading traffic from cellular networks
US9756540B2 (en) * 2012-01-16 2017-09-05 Microsoft Technology Licensing, Llc System and method for offloading traffic from cellular networks
US9603124B2 (en) * 2012-04-24 2017-03-21 Apple Inc. Methods and apparatus for opportunistic radio resource allocation in multi-carrier communication systems
US10477517B2 (en) * 2012-04-24 2019-11-12 Apple Inc. Methods and apparatus for opportunistic radio resource allocation in multi-carrier communication systems
US20130279376A1 (en) * 2012-04-24 2013-10-24 Apple Inc. Methods and apparatus for opportunistic radio resource allocation in multi-carrier communication systems
US20170181131A1 (en) * 2012-04-24 2017-06-22 Apple Inc. Methods And Apparatus For Opportunistic Radio Resource Allocation In Multi-Carrier Communication Systems
US20150339117A1 (en) * 2012-05-31 2015-11-26 Microsoft Technology Licensing, Llc Computing Device Update Control
US9307347B2 (en) 2012-06-01 2016-04-05 Nokia Technologies Oy Wireless programming
US9485786B2 (en) 2012-06-26 2016-11-01 International Business Machines Corporation Management of mobile devices leveraging location based cooperation
US9480086B2 (en) 2012-06-26 2016-10-25 International Business Machines Corporation Management of mobile devices leveraging location based cooperation
US20140012970A1 (en) * 2012-07-03 2014-01-09 Research In Motion Limited Methods and devices for facilitating a download session
WO2014018256A1 (en) * 2012-07-26 2014-01-30 Utc Fire And Security Americas Corporation, Inc. Wireless firmware upgrades to an alarm security panel
US9471300B2 (en) 2012-07-26 2016-10-18 Utc Fire And Security America Corporation, Inc. Wireless firmware upgrades to an alarm security panel
US20150223135A1 (en) * 2012-08-08 2015-08-06 Nokia Solutions And Networks Oy Interference Reduction Through Cell Activation Methods in Heterogeneous Networks
US9693280B2 (en) * 2012-08-08 2017-06-27 Nokia Solutions And Networks Oy Interference reduction through cell activation methods in heterogeneous networks
US20140068342A1 (en) * 2012-09-03 2014-03-06 Chia Chien Chuang Wireless Debugging and Updating of Firmware
US9292411B2 (en) * 2012-09-03 2016-03-22 Phoenix Technologies Ltd. Wireless debugging and updating of firmware
US9338726B2 (en) 2012-10-15 2016-05-10 Qualcomm Incorporated Cooperative data mules
US8934904B2 (en) * 2012-11-30 2015-01-13 Motorola Solutions, Inc. Method and apparatus for data communication
US20140177840A1 (en) * 2012-12-20 2014-06-26 T-Mobile Usa, Inc. Cellular Backhaul Load Distribution
US9100863B2 (en) * 2012-12-20 2015-08-04 T-Mobile Usa, Inc. Cellular backhaul load distribution
CN103945406A (en) * 2013-01-17 2014-07-23 美国博通公司 Wireless communication system utilizing enhanced air-interface
CN105075285A (en) * 2013-04-01 2015-11-18 诺基亚技术有限公司 A method and apparatus for diverse security handling in an enhanced local area network
US20160050186A1 (en) * 2013-04-01 2016-02-18 Nokia Technologies Oy Method and Apparatus for Diverse Security Handling in an Enhanced Local Area Network
EP2982103A4 (en) * 2013-04-01 2016-12-21 Nokia Technologies Oy A method and apparatus for diverse security handling in an enhanced local area network
US9781080B2 (en) * 2013-04-01 2017-10-03 Nokia Technologies Oy Method and apparatus for diverse security handling in an enhanced local area network
WO2014175672A1 (en) * 2013-04-25 2014-10-30 Lg Electronics Inc. Method and apparatus for transmitting traffic indication in wireless communication system
US9438640B2 (en) * 2013-05-23 2016-09-06 Vonage America Inc. Method and apparatus for minimizing application delay by pushing application notifications
US20140372622A1 (en) * 2013-05-23 2014-12-18 Vonage Network Llc Method and apparatus for minimizing application delay by pushing application notifications
US20150067669A1 (en) * 2013-09-03 2015-03-05 Samsung Electronics Co., Ltd. Method for managing application and electronic device thereof
US20150281976A1 (en) * 2014-04-01 2015-10-01 Teoco Corporation System, Method, and Computer Program Product for Determining Placement of a Small Cell in a Location Within a Cellular Network
US9408083B2 (en) * 2014-04-01 2016-08-02 Teoco Corporation System, method, and computer program product for determining placement of a small cell in a location within a cellular network
US20160062760A1 (en) * 2014-08-27 2016-03-03 Xiaomi Inc. Method and terminal device for complying router management application with router firmware
US9886259B2 (en) * 2014-08-27 2018-02-06 Xiaomi Inc. Method and terminal device for complying router management application with router firmware
US10735967B2 (en) 2014-09-05 2020-08-04 Kt Corporation Method and apparatus for carrier aggregation using aggregation entity
US10334481B2 (en) 2014-09-18 2019-06-25 Kt Corporation Method and apparatus for processing user plane data
US10064103B2 (en) * 2014-09-18 2018-08-28 Kt Corporation Method and apparatus for processing user plane data
US20170223578A1 (en) * 2014-09-18 2017-08-03 Kt Corporation Method and apparatus for processing user plane data
US10736175B2 (en) * 2014-10-02 2020-08-04 Kt Corporation Method for processing data using WLAN carrier and apparatus therefor
US11711862B1 (en) 2021-07-15 2023-07-25 T-Mobile Usa, Inc. Dual connectivity and carrier aggregation band selection

Also Published As

Publication number Publication date
US8626143B2 (en) 2014-01-07
US20120135719A1 (en) 2012-05-31

Similar Documents

Publication Publication Date Title
US8626143B2 (en) Mobile device management through an offloading network
US9716963B2 (en) Management of network technology selection and display in multi-technology wireless environments
US10334510B2 (en) Device network technology selection and display in multi-technology wireless environments
US10372439B2 (en) Registration notification for mobile device management
US10117126B2 (en) Femto cell access point passthrough model
US9980211B2 (en) Scanning of wireless environment in a femto-based home macro sector
US10225733B2 (en) Exchange of access control lists to manage femto cell coverage
US8626223B2 (en) Femto cell signaling gating
US9596226B2 (en) Carrier network security interface for fielded devices
WO2010047989A1 (en) Device network technology selection and display in multi-technology wireless environments

Legal Events

Date Code Title Description
AS Assignment

Owner name: AT&T MOBILITY II LLC, GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HAUGHN, ERICK JOHN;REEL/FRAME:021135/0944

Effective date: 20080623

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION