Long term evolution-primary WiFi (LTE-PW)

Information

  • Patent Grant
  • 11849356
  • Patent Number
    11,849,356
  • Date Filed
    Monday, July 4, 2022
    3 years ago
  • Date Issued
    Tuesday, December 19, 2023
    a year ago
Abstract
A system and method of communication, comprising establishing a first connection between the user equipment and a first non-public packet switched network which assigns a first non-public packet switched network address to user equipment; establishing an open signaling channel which communicates between the user equipment and a remote server through a cellular telephone network according to a public switched telephone network address associated with an International mobile subscriber identity; communicating an identification of the first non-public network and the first non-public packet switched network address over the open signaling channel to the remote server; and establishing a real time voice communication from the remote server to the user equipment through the first connection based on a call routed through the remote server to the public switched telephone network address.
Description
BACKGROUND OF THE INVENTION

Wi-Fi and other technologies that operate on unlicensed and/or lite-licensed spectrum such as Citizens Broadband Radio (3.5 GHz Band, see FCC Rulemaking 12-354) has advantages over legacy designed licensed cellular networks when operating a facilities based network including: cost and ability to utilize spectrum nationwide; reduced infrastructure costs (e.g. inexpensive and highly flexible access points vs. expensive stationary cellular towers and proprietary radio access network equipment); more flexible design criteria and superior data speed when in close range when compared to legacy cellular technology. Wi-Fi and other unlicensed or lite-licensed use in supporting what have been traditionally primary cellular devices, called mobile stations, is thus positioned to disrupt an industry that is ripe for change. As used herein, it is understood that unless particular features of the IEEE-802.11 family of standards are being exploited, that reference to WiFi also contemplates use of other wireless radio frequency, infrared, and optical digital communication technologies.


Wi-Fi is growing fast. U.S. consumers are near some type of Wi-Fi more than 80% of the time they connect to the Internet on a mobile device. Global hotspots have grown to over 7.1 million in 2015 from 4.2 million in 2013. Initiatives like CableWiFi and Hotspot 2.0 are making Wi-Fi more readily available and easier to connect to. Further, operating systems such as current Android, CyanogenMod and Apple IOS supporting smartphones are now designed to, with carrier permission settings on the device, use data connectivity for voice, SMS and MMS thus allowing Wi-Fi to replace the primary need for legacy licensed network infrastructure to be used to support mobile stations.


Wi-Fi First refers to the operation of a mobile network where mobile stations use a managed Wi-Fi network or other unlicensed or lite-licensed network protocol as the primary network for talk, text and data, and only use expensive cellular networks to fill the gaps. This type of service aligns much more closely to consumer behavior and enables disruptive business models which are poised to change the wireless industry forever. Wi-Fi First also positions the multi-service operators (MSOs) and existing campus and enterprise networks to play a significant role in the future design, sales, servicing and deployment of mobile stations, whereas today they are largely being pushed aside by the large Mobile Network Operators (“MNO”) via business practices designed to limit market entry and innovation when large MNOs utilize unlicensed and lite-licensed spectrum. The large MNO's support an alternative technology described as LTE-U which, as a prerequisite for deployment and use, requires the concurrent use of a licensed network along-side an unlicensed network, and also removes management and control of the unlicensed spectrum and its supported applications when using a mobile station from the MSO and/or campus/enterprise networks.


Unlike LTE-U, LTE-PW or WiFi First managed networks permissively share control of LTE capable mobile stations with the MSO and or campus enterprise network, thereby creating a more valuable service and network.


Two equations can be used to quantify in mathematical terms the total utility or societal value of interconnected networks based on a concept commonly described as “Network Effects.” The first is called “Metcalf's Law” and the second is “Reed's law.”


Robert Metcalf was the first to describe a “Network Effect.” He theorized that that each added Node (“n”) to a network becomes more valuable. Metcalfe's law states that the value of a network is proportional to the square of the number of connected users of the system, thus a network becomes far more valuable from a societal vantage point as it gets larger, approximating n2. Whether the exponent is two is not critical; it generally accepted that the value of communication node as a result of connection to a communications network does not decrease, and the value and functionality of the network increases at least as the reach of the network increases.


David Reed followed up by asserting that Metcalf's expression was correct in concept, but it undervalued the aggregate network by not capturing the value from what are known as Group Forming Networks. Reed theorized that each “n” is not just part of one network; it is in fact part of multiple different groups of subnetworks within the larger whole, and the value is represented by the sum value of all these subgroups within the whole. Therefore, the whole far exceeds the value calculated by Metcalf. One way to think about a Group Forming Network is having a node on the larger network “join” with other nodes on the network that have a common interest. The mathematical expression of Reed's Law is 2n.


The primary difference in the Network Effect is that Metcalf's law scales quadratically, but Reed's scales exponentially. The advent of Social Networks (Facebook) and Business Networks (LinkedIn) networks within the larger “Internet” (which has always been known as a “network of networks”) have basically proven Reed's extension. Reed's extension means that while D is functionally zero for two node-networks, D is on the order of 1030 for just 100 nodes. For a realistic N, the number is truly astronomical. That is why, despite the intuitive nature of the postulates behind Metcalf and Reed, some still dismiss the idea that simply adding a single N to an existing network can double (or increase the exponent of) the value of the “Network” as a whole.


The principal criticism is that they assume that each N leads to equal value and benefit when that is not true. The mathematical equations measure potential contact but the greatest social utility comes from actual contact rather than mere potential contact. Some users may not be present on the network or able to navigate the process when communication seeks them or they want to make contact. Some users may not have desired content. Some users' Nodes may not have adequate bandwidth to the network. Some networks may be cost prohibitive to the point that the cost of adding the node outweighs the value added by that node. In addition, a single added “node” may not have a one-to-one relationship with each user. For example, one FAX machine may serve 50 workers, while the second one serves 25 and the fourth one only 12, with the result that an additional FAX connection will correspond to a wide variety of user groups and thus contacts. Likewise, in social networks, if users that join later use the network less than early adopters, then the benefit of each additional user may lessen, making the overall network less efficient if costs per users are fixed. Finally, some argue that both Reed's Law and Metcalfe's Law overstate network value because they fail to account for the restrictive impact of human cognitive limits on network formation which implies a limit on the number of inbound and outbound connections a human in a group-forming network can manage, with the result that the actual maximum-value structure is much sparser than the set-of-subsets measured by Reed's law or the complete graph measured by Metcalfe's Law.


Most of these arguments reduce to a point regarding the relative inefficiency (e) of the “Node” or the network(s). Reduced to its mathematical properties by assuming inefficient users and networks are a combined “e”; a revised Metcalf's Law reads (N−e)×(N−e−1), and a revised Reed's Law 2n−e.


Over the last decade, many of these anecdotally described “nodal” inefficiencies of the “nodes” have been and are being overcome by technology advancements. For example, Google greatly assists the ability of any ordinary person to become a network whiz in locating other nodes. From a network perspective, Google, and many other user-friendly focused software and hardware companies are node amplifiers that elevate the ordinary person from only being able to receive and send email to a selected few to being able to surf (web-aided by Google), watch (Netflix), add content (YouTube), conduct commerce (E-Bay, Amazon, etc.), and communicate (Skype) as a fully functioning node. This clearly has the effect of reducing the “negative value” of “e” when applying to the Metcalf concept. More importantly, these advancements also move the value of the “Internet” to the Reed model, by enabling the edge to self-form and self-identify the sub-groups it wishes to join. The easier a user can join groups, form groups, and manage additions to its group, the more group forming a network becomes, and thus the more value it represents.


As these self-forming networks evolve and become more sophisticated, they begin to replace the original applications for which the original network was built and designed. For example, VoIP has replaced landline phone, video streaming has replaced network and cable TV. But they evolve as well. “Video” was originally one-to-many broadcast but is now increasingly many-to-many (e.g., YouTube). On the other hand, in order to be able to conduct voice conversations a user had to have a publicly-available telephone number within the global numbering system and as a consequence the user was able to reach and be reached by the entire universe of people on the world-wide public switched network that used the global numbering system. Many of the relatively recent “group” networks on the Internet, however, do not directly address using the global IP and domain name system. They employ higher-layer addresses (like a Skype ID or an internal LinkedIn ID or Facebook Username) to directly communicate—with the result that the group becomes more insular and resides within something akin to a walled garden. The latter outcomes attenuate the friction reduction to “e” and once again reduce the network effects.


A device or node must first connect to a host network before it can potentially access the full functionality of the Internet, or, more often, access to a sub-group network of the Internet. Since they functionally serve as a bottleneck, last mile access network providers can, and do, often try to exercise considerable control over what users can do.


Some network providers also impose restrictions and/or costs on the users of the network that also serve to limit total network utility and therefore value. In response, some national or multi-national regulators have responded to these efforts by the legacy network service providers efforts to shape the evolution through limits or rationing how Internet applications and devices can be used. For example, the FCC's Net Neutrality Rules implemented a policy that preserves users' and edge providers' ability to self-form and self-identify associational groups. In essence, the FCC recognized that an “Edge Controlled” network has a far greater public utility than a centrally controlled network of the resulting “virtuous cycle” of innovation and use and then value creation without needing to obtain permission from the entity providing last mile network access and who has the most incentive and ability to deny permission until the edge shares some of the resulting added value with the last mile provider. The FCC imposed rules mandating mostly “neutral” management of the Internet access portion, with the result that the access provider judge or prioritize individual specific uses of the network over others in order to capture pecuniary gains over and above the simple cost of providing network access and fulfilling basic network demand.


“Net neutrality” rules reduce the incentive for broadband networks to increase their intelligence in the core of the network and apply a type of created resistance to, or interference with, access to and through their network. In the network build-out model prior to FCC Net Neutrality, this purposeful injection of rules could be described as an internet “Ω”, leading to a network value of 2n−Ω according to the Metcalf analysis. In this model a large network provider would insert a measure of control and resistance technically outside of the Edge's control, reducing the value of the Internet to the Edge.


Prior to Net Neutrality, the business plan of many large network operators was to sell back the Ω to the certain applications, making those applications more valuable at the “Edge.” An Example would be in prioritizing the “Netflix” video stream over a “Hulu” video stream. In essence the network provider would create a type of scarcity and then charge to have the scarcity removed.


For the last several years technologies such as “deep packet inspection” (DPI)—when modified and used within the packet “core” of a network through what is known as “Policy and Charging Rules Function” (PCRF)—have been deployed in choke points in the various networks. This is particularly so with regard to Mobile Broadband Providers (MBPs), who have gone the farthest with implementing DPI-based control, and who also have relief or exemptions from many of the so called “Net Neutrality” rules imposed by the FCC. Data is collected by the MBP at these choke points and that then allow the MBP to become application and service aware in order for the MBP to be able to manage the delivery of some services through prioritization over other services and applications in return for payments.


The MBP's focus on control and management of the network coupled with the expectation of ration-based toll points at the location where resource demand is greater than supply reinforces the natural incentive a company with market power has to ration rather than increase available supply at the choke point because the net profit is higher than would be obtained if supply is increased but the price is allowed to go toward incremental cost.


While the FCC's net neutrality rules now make many business plans that rely on choke point rationing far more difficult, the MBPs' response, however, has not been quite what the FCC desired. Rather than move to open networks and price for only access and demand the major providers have begun to consolidate through mergers or teaming and through attempts to control what has been termed the “Eco-System” additional controls or types of the a From a technical perspective they have found ways to push “Ω” out from just the core more towards the edge while still finding new ways to implement rationing and differential charges based on application or service, or the group forming network that is being used. This is most obvious from the MBPs' industry-wide cooperative creation and implementation of what are known as “LTE-U” and LTE-LAA,” and the some specific network outcomes of the recently announced “5G” initiatives coupled with access and use limitations written into software that controls mobile stations' ability to freely switch from fully-licensed to quasi-licensed or unlicensed spectrum when using data-based services and applications, including voice and many of the freshly imagined M2M and IoT applications. The plain goal is the re-imposition of scarcity for network resources even though, in reality, abundant network resources exist. The scarcity is, however, artificial since there are alternative network resources available that could be easily accessed if the MBPs' cartel-like standards-based or software restrictions can be avoided or removed.


The new scarcity takes many forms. Some network access design requires software on the phone to favor using Cell Towers instead of smaller Nodes or non MBP operated distributed antenna systems of femtocells. So-called voluntary industry groups try to establish and enforce geographic licensing restrictions in order to use a technology (which is the case for LTE-U and LTE-LAA). The larger providers require device manufacturers through unique “certification” processes to limit the device's functions through customizations in the OS (even though the hardware and software often still technically resides in the device to enable unlicensed use). Devices are often tied to individual providers—each with their own self-imposed limits that in many instances survive unlocking and porting requirements that may have been imposed by regulators. The larger MNOs use similar scarcity-based pricing models for applications and bandwidth for both retail and wholesale relationships through adhesion-based business practices. Compatible use of unlicensed spectrum is not only tied to and only works with concurrent use of licensed spectrum under the current LTE-U and LTE-LAA designs, but also prohibits and/or interferes with the actual network management of the unlicensed spectrum by the MSO, campus or enterprise network when a competing small MNO uses the unlicensed network. So-called efforts attempting to impose “listen before talk” techniques do not actually address the fact that the network control of the unlicensed spectrum is being tied to the licensed network management, it only reduces the incidents of encroachment. All of these restrictions contribute to creating artificial restrictions on access between a mobile station and another edge point or node via control asserted by the access network host.


The FCC's net neutrality rules have led to additional unintended consequences. While they prohibit some DPI/PCRF network management for express gain, the FCC has unintentionally dampened investment in the ability for groups to “manage” their own network resources via coordinated access between the core, the network nodes and the mobile station. When artfully managed with DPI and PCRF type functions data, voice, video and texting can be fully enabled and allowed to become more flexible and more valuable through a direct and cooperative grant of delegation and control to the individual sub-groups who can then co-manage their own sub-networks and the devices attached to that sub-network.


LTE is powerful. When the 3GPP began to document its goals for LTE it stated:


“The following are the main objectives for LTE:

    • Increased downlink and uplink peak data rates.
    • Scalable bandwidth
    • Improved spectral efficiency
    • All IP network
    • A standard's-based interface that can support a multitude of user types.


LTE networks are intended to bridge the functional data exchange gap between very high data rate fixed wireless Local Area Networks (LAN) and very high mobility cellular networks.”


However, the current wielding of some LTE initiatives such as the LTE-U initiative appears to change the original purpose of LTE to instead design a use that allows imposition of scarcity. LTE can maintain spectrum dependence for some use cases, but it can also encourage and allow spectrum flexibility if the operator of the core chooses to fully adopt the open network principles and policies behind the FCC's net neutrality rules and again re-embraces the original intent of LTE, namely “to bridge the functional data exchange gap between very high data rate Local Area Networks (LAN) and very high mobility cellular networks.”



FIG. 6A shows a prior art Evolved Packet System LTE system diagram.


The Evolved Packet System (EPS) contains following network elements:

    • UE: The User Equipment.
    • Evolved UTRAN (eNodeB): The eNodeB supports the LTE air interface and includes following functions:
    • Functions for Radio Resource Management: Radio Bearer Control, Radio Admission Control, Connection Mobility Control, Dynamic allocation of resources to UEs in both uplink and downlink (scheduling);
    • Selection of a mobility management entity (MME) at UE attachment when no routing to an MME can be determined from the information provided by the UE;
    • Routing of User Plane data towards Serving Gateway;
    • Scheduling and transmission of paging messages (originated from the MME);
    • Scheduling and transmission of broadcast information (originated from the MME or O&M);
    • Measurement and measurement reporting configuration for mobility and scheduling.
    • Mobility Management Entity (MME): The MME manages mobility, UE identities and security parameters. It includes following functions:
    • Non-Access Stratum (NAS) signaling and security;
    • Idle mode UE reachability (including control and execution of paging retransmission);
    • Tracking Area list management (for UE in idle and active mode);
    • PDN GW and Serving GW selection;
    • MME selection for handovers with MME change;
    • Roaming; (terminating S6a towards home HSS)
    • Authentication;
    • Bearer management functions including dedicated bearer establishment.
    • Serving Gateway (SGW): The Serving Gateway is the node that terminates the interface towards EUTRAN. For each UE associated with the EPS, at a given point of time, there is one single Serving Gateway. Functions include:
    • Packet Routing and Forwarding
    • The local Mobility Anchor point for inter-eNB handover;
    • E-UTRAN idle mode downlink packet buffering and initiation of network triggered service request procedure;
    • E-UTRAN idle mode downlink packet buffering and initiation of network triggered service request procedure;
    • Accounting on user and QoS Class Identifier (QCI) granularity for inter-operator charging;
    • UL and DL charging per UE, PDN, and QCI.
    • End marker handling
    • Packet Filtering with TFT
    • PDN Gateway (PGW): The PGW is the node that terminates the SGi interface towards the PDN. If a UE is accessing multiple PDNs, there may be more than one PGW for that UE. The PGW provides connectivity to the UE to external packet data networks by being the point of exit and entry of traffic for the UE. The PGW performs policy enforcement, packet filtering for each user, charging support, lawful Interception and packet screening. PDN GW functions include:


Mobility anchor for mobility between 3GPP access systems and non-3GPP access systems. This is sometimes referred to as the SAE Anchor function.

    • Policy enforcement (gating and rate enforcement)
    • Per-user based packet filtering (by e.g. deep packet inspection) Charging support
    • Lawful Interception (out of scope for phase 4) UE IP address allocation
    • Packet screening
    • Transport level packet marking in the downlink;
    • DL rate enforcement based on APN Aggregate Maximum Bit Rate (APN-AMBR)
    • PCRF: PCRF is the policy and charging control element. PCRF functions include:
    • Policy (QoS and gating) control
    • Charging control


In non-roaming scenario, there is only a single PCRF in the HPLMN associated with one UE's IP-CAN session. The PCRF terminates the Gx, Gxc and Gxa interfaces.


Evolved Packet System (EPS) contains following network elements:

    • S1-C: Reference point for the control plane protocol between E-UTRAN and MME.
    • S1-U: Reference point between E-UTRAN and Serving GW for the per bearer user plane tunnelling and inter eNodeB path switching during handover.
    • S5: It provides user plane tunneling and tunnel management between Serving GW and PDN GW. It is used for Serving GW relocation due to UE mobility and if the Serving GW needs to connect to a non-collocated PDN GW for the required PDN connectivity.
    • S6a: It enables transfer of subscription and authentication data for authenticating/authorizing user access to the evolved system (AAA interface) between MME and HSS.
    • Gx: It provides transfer of (QoS) policy and charging rules from PCRF to Policy and Charging Enforcement Function (PCEF) in the PDN GW. The interface is based on the Gx interface.
    • Gxa It provides transfer of (QoS) policy information from PCRF to the Trusted Non-3GPP accesses.
    • Gxc It provides transfer of (QoS) policy information from PCRF to the Serving Gateway
    • S9: It provides transfer of (QoS) policy and charging control information between the Home PCRF and the Visited PCRF in order to support local breakout function.
    • S10: Reference point between MMEs for MME relocation and MME to MME information transfer.
    • S11: Reference point between MME and Serving GW
    • SGi: It is the reference point between the PDN GW and the packet data network.
    • Packet data network may be an operator external public or private packet data network or an intra operator packet data network, e.g. for provision of IP Multimedia subsystem (IMS) services. This reference point corresponds to Gi for 3GPP accesses.
    • X2 The X2 reference point resides between the source and target eNodeB.



FIG. 5 shows a prior art state transition diagram for user equipment. Upon power on, the enterprise mobility management (EMM) state is deregistered, the radio resource control (RCC) is in idle mode, the UE location is unknown, the mobility mode is based on the public land mobile network (PLMN) cell selection, and data communication is off. After registration and bearer setup, the EMM is registered, the RCC is connected, the UE location is E-Node B, the mobility mode is in a handover mode, and data communication is on. After data inactivity, the the mobile terminal remains registered, the RCC is in idle mode, the UE location is based on a TA list, the mobility mode is in cell reselection mode, and data communication is in standby. Data activity reverts the mobile communication device to Active UL/DL data mode.



FIG. 7 shows a prior art LTE initial call setup diagram.


System Acquisition: UE performs frequency synchronization and reads MIB/SIBs from PBCH to acquire system information. It then camps on the most suitable cell.


RRC Connection Setup: The UE and eNodeB exchange signaling to set up an RRC connection. The UE then sends RRC Connection Setup Complete message to the eNodeB.


Attach Request: The UE includes in the ATTACH REQUEST message a valid GUTI together with the last visited registered TAI, if available. If there is no valid GUTI available, the UE shall include the International Mobile Subscriber Identity (IMSI) in the ATTACH REQUEST message.


eNodeB forwards the Attach Request message (including: Message Type, eNB UE ID, TAI, CGI etc.) to the MME.


Identity Procedure: In the case of the first Attach, MME sends an Identity Request to the UE. Identity procedure is required only if attach request contains GUTI/last-TAI and the TAI is not local to MME


The UE responds with Identity Response including Mobile Identity that is set to IMSI.


Authentication/Security: In case of initial attach when there is no UE context on the network, authentication is performed. The MME sends an Authentication Information Request to the HSS and receives an Authentication Information Answer which is used to send Authentication Request to the UE. Authentication procedure is optional. UE then sends an Authentication Response to the MME


Update Location Request: The MME sends the Update Location Request including the IMSI. The HSS replies with Update Location Answer. Subscription Data shall be present when the Result is Success.


Create Session Request: The MME sends a Create Session Request to SGW which is followed by confirmation.


Initial Context Setup Request/Attach Accept: Attach Accept is sent as NAS PDU in the Initial Context Setup (Message Type, E-RAB ID, QoS parameters, Transport Layer Address, NAS-PDU, UE Security Capabilities, Security key) from MME to eNodeB.


Attach Accept message contains new GUTI if the attach request contained IMSI or foreign/non-local GUTI. This completes Attach Request.


Security procedure and UE Capability exchange is then performed.


RRC Connection Re-configuration: The eNodeB sends the RRC Connection Reconfiguration message including the EPS Radio Bearer Identity to the UE, and the Attach Accept message to the UE. The APN is provided to the UE for which the activated default bearer is associated.


Initial Context Setup Response: The eNodeB sends Initial Context Setup Response to the MME


Uplink Information Transfer: The UE sends an Uplink Information Transfer message. This message includes the Attach Complete message for MME


Attach Complete: eNodeB encapsulates the Attach Complete message and transfers it to MME.


Modify Bearer Message: One receiving both Context Setup Response and Attach Complete, the MME sends a Modify Bearer Request to SGW. SGW sends the response and starts sending the DL packets.



FIG. 8 shows a prior art LTE initiated UE detach diagram.


UE can be detached either from Idle or Connected mode. If it is Idle, RRC connection setup is completed before detach message.


UE sends Detach Request message to MME which responds with confirmation after exchanging Delete Session messages with SGW.



FIG. 9 shows a prior art LTE initial call MME initiated detach diagram.


Delete session request can be send when UE is in Idle or Connected mode. If a UE is in Idle mode, it may be paged. MME exchanges Delete Session messages with SGW. Detach request is conditional on successful page to the UE.



FIG. 10 shows a prior art LTE active to idle mode transition diagram.


User inactivity is detected based on parameter settings (Inactivity timer). eNB requests MME to release the UE Context. MME then informs SGW that UE is no longer available for DL traffic by sending Modify Bearer Request message. After getting the response from SGW, MME sends Context Release command to eNB. After responding to MME, eNB releases RRC Connection.



FIG. 11 shows a prior art LTE Network Initiated Idle to Active Transition diagram.


Incoming data from PGW is forwarded to SGW which notifies MME be sending Downlink data notification. After acknowledgement MME pages all eNBs in the TA by sending the Paging message to these eNBs. The eNBs pages the UE in all cells in the TA.


If the UE receives the page, it responds by initiating the UE Triggered Connection Re-activation.



FIG. 12 shows a prior art LTE UE Initiated Service Request diagram.


UE reads the system information broadcast in the cell and performs DL/UL synchronization.


UE then requests RRC Connection setup. Once completed, eNB then forwards NAS Service Request in Initial UE Message to MME. MME then carries out Authentication process (optional) and requests eNB to establish the S1 UE context. eNB then activates security functions.


Later Radio Bearers are setup to support EPS bearers in RRC Connection Reconfiguration messages.


After successfully establishing the bearers, eNB responds to the MME with Initial Context Setup Response MME then sends Modify Bearer Request to update SGW with IP address etc. for the DL of the user plane.



FIG. 13 shows a prior art LTE S1 Based Inter eNodeB Handover diagram.


Based on UE reports, source eNB decides to initiate S1-based handover to target eNB if there is no X2 connectivity to target eNB.


eNB sends Handover Required (handover type, target Id, cause etc.) message to MME.


MME verifies that source SGW can continue to serve UE and sends Handover Request message to target eNB.


Admission Control is performed by target eNB and target eNB configured the required resources according to the received E-RAB QoS information.


Target eNB sends Handover Request Acknowledge message to MME.


If indirect forwarding applies MME sets up Create Indirect Data Forwarding Tunnel Request to SGW. SGW responds with confirmation.


MME sends HO command (Handover Type, ERABs forwarding (optional) etc.) message to source eNB.


Source eNB sends RRC Connection Reconfiguration message to UE with necessary parameters (target eNB security algorithm, SIB s etc.).


Source eNB sends Status Transfer message via MME to target eNB regarding downlink and uplink transmitter status.


Once UE successfully synchronizes to the target cell, it sends an RRC Connection Reconfiguration Complete message to target eNB. DL packets forwarded from source eNB can be sent to the UE. Also, uplink packets can be sent from UE, which are forwarded to SGW.


Target eNB sends Handover Notify message to target MME. MME starts a timer to supervise when resources in Source eNB and data forwarding resources in SGW shall be released.


MME sends Modify Bearer Request (Bearers contexts to be removed, bearers need to be deactivated, etc.) message to SGW.


SGW sends “end marker” packet to source eNB and then releases resources towards it. Once “end marker” reaches target eNB, SGW can start sending DL payload data coming from PGW. It also sends Modify Bearer Response message to MME.



FIG. 14 shows a prior art LTE X2 Based Inter eNodeB Handover diagram.


Source eNB uses X2 interface to initiate handover with target eNB. Process is somewhat similar to S1 based handover with difference that Handover request, data forwarding, End marker messages etc. are exchanged over X2 interface directly between Source and Target eNBs.


The following references are expressly incorporated herein by reference in their entirety:


U.S. Pat. Nos. 7,440,472; 7,492,266; 7,738,488; 7,945,477; 7,995,728; 8,005,114; 8,019,289; 8,023,931; 8,027,335; 8,027,444; 8,027,456; 8,050,627; 8,073,400; 8,073,401; 8,078,119; 8,135,355; 8,140,025; 8,175,541; 8,265,567; 8,265,589; 8,295,851; 8,301,084; 8,325,632; 8,405,471; 8,417,286; 8,445,826; 8,467,738; 8,472,462; 8,503,340; 8,559,369; 8,565,793; 8,601,146; 8,611,893; 8,630,637; 8,649,739; 8,649,830; 8,669,903; 8,682,729; 8,744,537; 8,811,187; 8,819,219; 8,831,694; 8,880,047; 8,903,381; 8,904,017; 8,971,898; 8,983,497; 8,989,825; 9,042,306; 9,093,967; 9,100,384; 9,100,494; 9,125,065; 9,137,171; 9,143,184; 9,175,967; 9,178,991; 9,202,244; 9,210,728; 9,219,525; 9,231,680; 9,253,333; 9,280,978; 9,294,609; 9,307,449; 9,319,943; 9,326,208; 9,350,770; 9,351,255; 9,386,057; 9,386,615; 9,392,508; 9,408,067; 9,408,177; 9,420,089; 9,509,853; 9,516,688; 9,529,761; 9,553,913; 9,560,579; 9,628,521; 9,638,537; 20040068441; 20050030224; 20050080718; 20050249196; 20050286452; 20060019659; 20060111112; 20060294245; 20070032225; 20070198748; 20070252695; 20080096553; 20080146155; 20080146156; 20080146172; 20080205414; 20080207184; 20080214143; 20080254845; 20090286534; 20090296671; 20090296672; 20090296673; 20100067546; 20100251331; 20100296441; 20100296466; 20110106958; 20110131337; 20110153818; 20110173092; 20110202645; 20110221544; 20120040606; 20120112964; 20120278199; 20120302203; 20130044603; 20130079011; 20130115972; 20130155849; 20130155851; 20130155965; 20130198642; 20130210472; 20130238994; 20130262122; 20140086101; 20140113623; 20140136601; 20140185581; 20140247740; 20140286308; 20140324952; 20140362729; 20150024781; 20150026008; 20150065110; 20150071229; 20150079982; 20150141043; 20150146799; 20150155891; 20150163811; 20150168174; 20150168175; 20150172986; 20150177010; 20150201358; 20150241231; 20150242353; 20150249639; 20150271849; 20150281691; 20150282013; 20150288734; 20150293592; 20150304262; 20150350290; 20150350598; 20150365989; 20160021487; 20160044065; 20160080433; 20160088642; 20160095130; 20160103201; 20160112096; 20160127989; 20160142447; 20160156783; 20160157162; 20160157173; 20160183131; 20160183313; 20160216130; 20160226923; 20160255664; 20160261904; 20160269460; 20160291665; 20160309309; 20160334837; 20160337279; 20160345284; 20160358394; 20160360556; 20160366623; 20160373944; 20160381536; 20170004665; 20170019291; 20170019315; 20170041803; 20170069963; 20170094535; 20170094574; 20170099198; 20170099338; 20170105193; 20170139485; 20170141463; 20170149846; 20170164195; 20170169833; 20170171783; and 20170181213.


SUMMARY OF THE INVENTION

The present technology provides systems and methods for WiFi-First voice, SMS, MMS and data service on cellphones and other mobile stations, and more generally to systems and methods which provide wireless network voice, SMS, MMS and data communications using unlicensed and lite-licensed radios combined with Internet technologies that allow for network growth and design in cooperation with and co-managed with user groups who can add, with permission from the WiFi First MNO, campus or enterprise (herein called the “sub-group”) co-managed facilities based networks.


When a wireless device joins a local area network (LAN) established by a wireless access point, it is assigned an Internet Protocol (IP) address by which that device is identified within the local area network. Communications from the device pass through a network address translation (NAT) by which the address assigned or maintained by the LAN is translated into a public IP address which designates the LAN in general. Devices on LANs typically do not have public IP addresses, though in the case where this is supported, the system is preferably compatible with this option as well. The device, with the translated public IP address, communicates with the communication server to establish a voice call. A key distinction between a voice call and data communications is that in a voice call, latency must be tightly controlled to ensure quality. The device, in addition to the LAN IP address, which may change, for example when the device hands-off to another LAN, maintains a universal identifier, such as its telephone number, IMEI, or other unique information. The communications server therefore inspects packets not only for their IP address information, which is important for maintaining connections under conditions of low mobility, but also the identification code, in case the IP address for the device is changed during the communication session. If a device leaves one network and joins another, it sends a packet to the server identifying its new address information, to permit inbound calling.


As an option, when the device is not as member of a LAN, or where a user overrides the WiFi-First protocol, the device may connect to the communication server through a data connection or a regular cellular voice connection. Typically, for seamless transitions between WiFi and cellular networks, data connections are preferred; however, seamless handoff between cellular voice and WiFi-First modes is also possible.


It is noted that the system architecture also permits simultaneous voice and data connections, cellular and WiFi communications, and communications through competing cellular, WiFi, or other networks. The technology therefore has two distinct aspects: management of the communications so that rules, limitations, or preferences are respected; and maintained voice communications during various types of network transitions.


Instead of purposefully designing software and technology that limits and controls the edge, as is the case in current cellular carrier networks and current LTE-U initiative, the present technology explicitly allows and is designed to extend a type of joint control to the sub-group. The intended result is to turn what is designed by oligopoly carriers to create scarcity through a negative “Ω” into a positive “Ω” Thus when using the present technology and services, the intended network effect will go from 2n−Ω to 2n+Ω.


The present technology aims to eliminate the forced scarcity presently imposed on users and mobile stations by permitting all potential un-licensed and lite-licensed wireless networks and their mangers to fully access and control their nodes and the mobile stations are or connect to their nodes though a network according to the present technology. To understand how we do this, we must first understand the current cellular/LTE Network architecture.


The LTE Network architecture, as shown in FIG. 6A, has three main components:

    • The User Equipment (UE).
    • The Evolved UMTS Terrestrial Radio Access Network (E-UTRAN).
    • The Evolved Packet Core (EPC).


The essence of the invention is to create a parallel unlicensed LTE architecture to the licensed LTE network that is capable of both working (1) in a stand-alone mode; and (2) in a fully interconnected mode to the licensed LTE network. Each network element is designed to operate in parallel and symbiotically with the LTE network (or other future cellular networks), but in contrast to network operation used by the cellular network operator incumbents to create scarcity, the present technology allows parallel operation and control by the Sub-group to create extended control to the edge, removes scarcity and encourages far more unlicensed or lite-licensed network-based access through co-management of the entire network.


It is noted that unburdening the cellular networks is not strictly a cost or business issue. By unloading communications which do not require cellular service from these networks, the cellular networks and bands in which they operate become freed for other and potentially more valuable purposes. The strategically located Mobile Bonded Nodes (or MBNodes) may also be enabled with licensed, unlicensed WiFi or other unlicensed spectrum network access points. Thus the new capabilities, while potentially disruptive to a cellular carrier's cellular-only business plan, does not necessarily displace the carriers who evolve to meet consumer expectations and demands, remain competitive, and efficiently allocate their resources. Licensed cellular bands may thus be freed for new services, especially in high density enterprise urban environments and campus environments where WiFi access point density and coverage may be very high.


To achieve this parallel network, as shown in FIG. 6B, first each user equipment or “UE” must be capable to add required software called a Framework Sim. The Framework Sim contains a parallel to what is known as the Carrier Permissions in a licensed LTE network. Often, legacy carriers (also called large MNOs) today to enforce restrictions through a combination of customized OS software placed into what is known as the “Framework” of a UE with the Subscriber Identity Module or “SIM.” Typically, large MNOs refuse to extend or allow use of the capabilities inherent to functions related to the “Carrier Settings” thus creating the artificial scarcity. The Framework Sim, however, is designed so that user Sub-groups may obtain all of the permissions needed to allow integrated managed functionality within the UE to eliminate the artificial scarcity. To create interoperability with the Legacy LTE networks, a Framework Sim, which is entirely software based, also has a traditional twin “hard” SIM which, when sponsored by a MNO (small or large), creates all traditional identities, services and abilities (such as getting an MSISDN (phone number), enabling texting and MMS, and even allowing traditional Voice Over LTE or VoLTE to be enabled via the UE's Framework in a traditional manner). Once the full SIM identity and service is created, the present technology permissively allows duplication of the identities and abilities and shared control of the identities and abilities through the application of the Framework SIM on the UE. The application has a one to one relationship with a physical device and is the Framework SIM. The Framework SIM is then given master control and programmable functions through a secure API to the customer sub-group. The primary advantage is the immediate ability all UE's with Framework Sims have to immediately update its abilities to attach and use available unlicensed facilities-based networks such as WiFi hotspots. For example, a campus setting can enable each student phone with the ability to not just connect, but to connect specifically to one of many available hotspots and in particular ways. This dramatically enhances the function and reduces the interference in crowded environments such as a stadium environment by extending express control to the network administrator. The Sub-group can now work not only on the network broadcast side to select channels and power settings but also the UE side of the equation—dramatically improving in a dynamic way the ability for UE in a crowded environment to receive stable services. Importantly, the Framework SIM can also have devices pick between many different available technically supported connection methods of the UE (Bluetooth, NFP, WiFi, multiple carrier bands when working in conjunction with a traditional hard SIM, C-Band, and future unlicensed bands as well).


The Framework SIM also creates an always-open encrypted signaling channel labeled the Mobile Continuity Client (MCC) in FIG. 4 (using any available transmission, not just licensed spectrum) between the UE and the Framework SIM Scheduler's MCC Server, through installed custom libraries and user-granted permission to access the libraries and functions of the UE. As a result, a Framework SIM can work in conjunction with a traditional hard SIM or work completely independent from the traditional hard SIM. If in conjunction with the traditional hard SIM, the licensed carrier and through permissive extension, the Sub-group operating the hard SIM can permissively allow radio access network connections when and if the Framework SIM determines that is the best method of connection.


One intended result of using the present technology is the result is that the artificial scarcity of bandwidth will be avoided wherever a Framework SIM supported devices is enabled to attach and receive connectivity in its “WiFi First” mode. All groups who wish to provide networks can contribute available unlicensed bandwidth resources to the cellular Carrier Settings controlled alternative.


Similarly, another intended result of use of the technology is to employ the solution in a Framework Sim only state. Because the technology favors utilizing any existing built network that has more favorable economics of bandwidth usage the technology may be employed without a cellular overlay, in order to permit mobility of and use UE across multiple LANs. Such could be the case for supporting low income services which have been subsidized by the government. Full services, including necessary internet bandwidth, can be deployed without use of any cellular network.


In such cases, the present technology can service to replace the E-UTRAN of an LTE cellular network with a Mobile Bonded Node (MBNode). This allows non-LTE networks to supplement and/or replace completely the need for the E-UTRAN without the requirement that the MBNode adhere to LTE-U or LTE-LAA management practices. Management and signaling to the device continues to be via the Framework Sim and not via a required co-existing “licensed network connection” as is the case for LTE-U. The MBNode Sub-group network manager may continue to use its own allocation of IP Addresses, and may also install DPI and PCRF functions onto its user group which then become resident in the Framework SIM and Framework SIM Scheduler. The MBNode identifies each potential connection method and any for which authorization is possible are then “connected” through the back-end of the Framework SIM scheduler via Session Initiation Protocol (SIP), where both updated connectivity information, such as SSID—both advertised and/or hidden, and passwords, are placed with command function to the UE via the Framework SIM app, and for bearer traffic. When connected to the MBNode, the IMEI identity is given a connected state via the management of the MBNode by the self-provided network and reports the connected state through the Framework Sim Scheduler to the P-Gateway of the LTE-Core eliminating the need for a licensed LTE connection.


Yet another use case is to extend the so called “Facilities Based Coverage Area” of an existing MNO or cellular network provider. That is, where an existing MNO is unable to obtain licensed spectrum to expand its own network coverage, it can use LTE-PW method to extend services and still manage the network and customer via the technology. This is of particular importance to comply with regulatory imposed “Roaming Restrictions” whereby the regulator may allow dominant or large MNOs with nationwide networks to limit or restrict “Roaming” access by smaller MNOs. Often such restrictions may take the form of aggregate usage caps, individual service caps and/or service territory definitions. By having a LTE based technology that allows for seamless and managed handoff between unlicensed spectrum and licensed spectrum, smaller MNOs can use the present technology to stay in compliance with regulatory mandated rules.


The present technology supplements the traditional EPC with a Framework SIM Scheduler that again operates in parallel to what are known as the MME and home subscriber server (HSS) functions in an LTE network. The Framework SIM Scheduler is used to update and communicate between the MBNodes and the UE's Framework SIM; and when there is a Hard SIM—to provide over the air (OTA) functions and capacity related to accessing both LTE E-UTRAN networks to the traditional framework and SIM and the LTE—MBNode via the Framework SIM. Importantly, this Scheduler is controlled permissively by the Sub-group customer/network provider and it updates both the UE Framework SIM and MBNode so that the alternative network can be used and secured without access to the “Public Internet” or when accessed through the “Public Internet” can still provide connectivity to the user.


If operated in a standalone mode, full cell phone/M2M functionality is provided via unlicensed and lite licensed self-provided network to the IMEI with a reserved hard SIM. In a fully integrated mode, when and where unlicensed network or lite licensed network is unavailable, the LTE network fully-licensed “scarce resource” use can then supplement access through the Framework SIM scheduler. Importantly, the LTE fully-licensed network can also be utilized in a signal mode only and thereby be on “Standby” without consumption, or the fully licensed LTE network can be used to “update” the Framework SIM and MBNode so that direct Framework SIM and MBNode connection can be established. The fully intended operation and goal is to minimize use of licensed spectrum-based LTE access in favor of all other access.


One particular application of the WiFi first technology is security applications. In a typical security system, the alarm system maintains a telephone link to the alarm system service provider call-center. The primary communication is over a POTS line (plain old telephone system), with a cellular backup. However, modern telephony installations typically have accompanying data services, and the data is unmetered or inexpensive. The present technology permits the alarm or security system to communicate via WiFi or wired network as a primary link, and cellular backup as a secondary link. Further, according to the present invention, certain data may be passed over the LTE signaling channel, and as such in many cases would incur no communications charges or metering while passing small messages to the Scheduling Server, which could then be forwarded to the alarm or security service provider. Further, security services could be provided by or through the Scheduling Server.


Indeed, a series of WiFi First security nodes may be implemented which avoid use of any hub or premises control, and provide all monitoring, communications, and access controls through the WiFi First technology using wireless Internet access as a primary communications modality and LTE as a backup/secondary modality. Some or all of the security devices may act as local controllers. This, of course, requires that each node or element of the security system have a cellular phone with WiFi capability built in, but such capabilities are now ubiquitous and generally low in cost.



FIG. 3 shows a logical system-level block diagram according to the present technology. As shown, an Internet-based interface is provided for customer support, marketing, on-line ordering, customer account administration, etc. An enterprise management system is also provided, which supports subscriber management, systems management, revenue management, and reporting & analytics. Both consumer and management interfaces communicate with a mobile gateway, which has an authentication module, which, for example, may use username and password, PKI credentials, challenge-response, two- or three-factor authentication, biometrics, etc., which employs a Lightweight Directory Access Protocol (LDAP) authentication manager The main system interfaces through a REST application programming interface, which in turn, controls order management, product inventory management, phone number management, pass management, a data analytics engine, and a home location registry/home subscriber server (HSS) module. Each of these modules (except perhaps the data analytics engine) also interfaces with a service bus, which in turn communicates with a payment module (which in turn communicates with a billing processor), a member data record (MDR) processor, a charging data record (CDR) homologation engine, a connection manager, and an external fulfillment and logistics unit. The device configuration manger communicates with a configuration API Integration and radio network authorization unit of a Sub-group user, which in turn controls via permission of the mobile network operator (MNO) connection to a licensed network and in its own network unlicensed band radio access. This radio access module communicates with a radio access feed processor, also connected to the service bus.


The mobile gateway communicates, also described as the Mobile Bonded Node (MBNode) in FIG. 6B, with mobile devices through an LTE network and unlicensed, e.g., WiFi network. The connection manager communicates with an intelligent message router, and hence through an IC messaging bridge, to a short message service center (SMSC), and a multimedia messaging service (MMSC), which in turn communicate through an intercarrier text gateway and public switched telephone network (PSTN) and text gateway, respectively. The MMSC also communicates with a wireless application protocol (WAP) gateway. A session initiation protocol (SIP) router interfaces with an intelligent voice call router, which in turn communicates with a dynamic callflow engine, which further communicates with a media server, which interfaces with the service bus, a voicemail server, a PSTN gateway, and the PSTN and text gateway.


As shown in FIG. 4, an Android operating system implementation is provided, which includes operating system patches for radio management, call routing, network access control, OPUS codec, multi-number support, and call handoff. A software operating system “apk” provides device configuration and SMS/MMS support. A software account management user “apk” provides support for activation, data analytics, notification management, pass management, and preference management, and includes a mobile continuity client (MCC) which interfaces with a remote MCC server.


It is therefore an object to provide a method of communication as shown in FIG. 15, comprising: establishing a first connection between the user equipment and a first non-public packet switched network which assigns a first non-public packet switched network address to user equipment; establishing a connection to a remote server, comprising transmitted signaling information, identifying a public switched telephone network address of the user equipment and the first non-public packet switched network address of user equipment to the scheduling server; associating, by the remote server, the public switched telephone network address of the user equipment with the assigned first non-public packet switched network address of the user equipment; commencing a bidirectional real-time voice communication over the first connection using the public switched telephone network address of the user equipment; establishing a second connection between the user equipment and a second switched network; reassociating the public switched telephone network address of the user equipment with an assigned network address of the user equipment by the second switched network; and continuing the bidirectional real-time voice communication over the second connection after discontinuing the bidirectional real-time voice communication over the first connection.


It is therefore an object of the technology to provide a method of communication as shown in FIG. 16, comprising: establishing a first connection between the user equipment and a first non-public packet switched network which assigns a first non-public packet switched network address to user equipment; establishing a second connection between the user equipment and a second packet switched telephone network which communicates with the user equipment according to a public switched telephone network address and International mobile subscriber identity; establishing an open signaling channel between the user equipment and a remote server through the second packet switched telephone network; receiving a request to establish a bidirectional real time voice communication with the user equipment through the signaling channel; establishing the bidirectional real time voice communication with the user equipment over the first non-public packet switched network based on the public switched telephone network address; establishing a third connection between the user equipment and a third non-public packet switched network which assigns a third non-public packet switched network address to user equipment; and transitioning the bidirectional real time voice communication with the user equipment from the first non-public packet switched network to the third non-public packet switched network.


It is also an object to provide a method of communication as shown in FIG. 17, comprising: establishing a first connection between the user equipment and a first non-public packet switched network which assigns a first non-public packet switched network address to user equipment; establishing an open signaling channel which communicates between the user equipment and a remote server through a cellular telephone network according to a public switched telephone network address associated with an International mobile subscriber identity; communicating an identification of the first non-public network and the first non-public packet switched network address over the open signaling channel to the remote server; and establishing a real time voice communication from the remote server to the user equipment through the first connection based on a call routed through the remote server to the public switched telephone network address.


It is a further object to provide a method of communication as shown in FIG. 18, comprising: providing user equipment having an equipment identifier, and a secure execution module; verifying the secure execution module with a cellular network controller; establishing a connection to a scheduling server through a cellular network signaling channel, comprising at least periodically transmitted signaling information, identifying a public switched telephone network address, a non-public packet switched network address, and the equipment identifier of user equipment, to the scheduling server; verifying the secure execution module with the scheduling server; establishing a first connection between the user equipment and a first non-public packet switched network which assigns a first non-public packet switched network address to the user equipment, and from the first non-public packet switched network to the scheduling server; associating the public switched telephone network address of the user equipment with the assigned first non-public packet switched network address of the user equipment by the scheduling server; and initiating a bidirectional real-time voice communication over the first connection.


It is another object to provide corresponding systems and non-transitory computer readable media storing instructions for controlling automated processors to carry out aspects of the methods.


More generally, the present technology permits communications, by whatever means, with a scheduling server, that maintains knowledge of user equipment with respect to its logical addressing on an LTE network by communications over a signaling channel, without incurring data usage of the LTE network itself. Therefore, the user equipment can transition, or “roam”, between WiFi type networks (and more generally, non-LTE networks) and LTE networks (or more generally, restricted access telephone carrier networks), using a control system not managed by the telephone carrier. Therefore, to the user, the experience can be relatively seamless, and minimize usage of the carrier networks for voice or data communications, while ensuring that the presence of the user equipment is acknowledged by the LTE/carrier network. The signaling channel of the LTE/carrier network permits standard-compatible communication of various metadata from the user equipment to a Scheduling Server. This system therefore permits control over the user equipment to be delegated to an administrator outside of the telephone carrier, while still permitting carrier network usage when needed.


It is a further object to provide the method further comprising: establishing a second connection between the user equipment and a second switched network; re-associating the public switched telephone network address of the user equipment with the second switched network by the scheduling server; communicating between the scheduling server to the user equipment through the first non-public packet switched network and the second switched network; and continuing the bidirectional real-time voice communication over the second connection.


The identified public switched network address may be an E-164 address. The signaling information may comprise an IMEI. The signally information may be communicated over the first non-public packet switched network, or over the second switched network.


The first non-public packet switched network may communicate according to an IEEE-802.11 protocol, i.e., 802.11 a, b, g, n, ac, ad, s, etc. The second switched network may also communicate according to an IEEE-802.11 protocol, or according to an LTE protocol.


The re-associating may occur during a telephone conversation without interrupting the telephone conversation. The reassociation may be managed by the user equipment, or managed by the scheduling server. The user equipment may have an operating system which defines a plurality of privileged execution types, at least one type of privileged execution being inaccessible to a user, and wherein the reassociation function is executed in the at least one type of privileged execution inaccessible to the user.


The scheduling server may implement a Policy and Charging Rules Function.


The first non-public packet switched network may require login authentication information, and the login authentication information may be communicated under control of the at least one type of privileged execution inaccessible to the user.


The user equipment may be a smartphone. The user equipment and the scheduling server may communicate according to the Session Initiation Protocol.


Network access information for the second switched network may be stored in a hardware SIM and network access information for the first non-public packet switched network is stored in a rewritable memory location inaccessible to the user and accessible to the at least one type of privileged execution inaccessible to the user.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a prior art architecture of an Andoid telephone device;



FIG. 2 shows an architecture of an Andoid telephone device according to the present technology;



FIG. 3 shows a logical system architecture according to the present technology;



FIG. 4 shows a semichematic diagram of a smartphone according to the present technology;



FIG. 5 shows a shows a prior art state transition diagram for an EPS network;



FIG. 6A shows a prior art Evolved Packet System (EPS) network architecture;



FIG. 6B shows a network architecture according present invention;



FIG. 7 shows a prior art LTE initial call setup diagram;



FIG. 8 shows a prior art LTE initiated UE detach diagram;



FIG. 9 shows a prior art LTE initial call MME initiated detach diagram;



FIG. 10 shows a prior art LTE active to idle mode transition diagram;



FIG. 11 shows a prior art LTE Network Initiated Idle to Active Transition diagram;



FIG. 12 shows a prior art LTE UE Initiated Service Request diagram;



FIG. 13 shows a prior art LTE S1 Based Inter eNodeB Handover diagram;



FIG. 14 shows a prior art LTE X2 Based Inter eNodeB Handover diagram;



FIG. 15 shows a method according to a first embodiment of the invention;



FIG. 16 shows a method according to a second embodiment of the invention;



FIG. 17 shows a method according to a third embodiment of the invention; and



FIG. 18 shows a method according to a fourth embodiment of the invention.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The three major Operating Systems used for Mobile Stations (Android, iOS, Microsoft Phone) mimic each other regarding where and how permissions are allowed to access networks and run network-reliant applications or services on the device.



FIG. 1 shows a well-accepted base diagram of the operations of an Android Phone. A set of security enabled applications at an applications layer interface to an Android framework having a public interface. The Android framework provides a smartcard API, which provides various terminal services, such as MSC, UICC, and other. Beneath the public interface, the Android system provides a native secure interface, as well as a vendor-specific proprietary radio interface layer (RIL) daemon. In the kernel space, various device interfaces are provided, such as ASSD device, I2C device, and TTY serial console device, which in turn communicate with SD memory cards, I2C bus components, and SIM modules.


According to the present technology, the mobile station device will have to load and run additional software, as shown in FIG. 2. That is, a framework SIM (virtual) is provided outside of the typical implementation. This framework SIM communicates with its own phone interface manager module, telephony (telephony) framework, radio interface layer daemon, and may support an optional “hard” (real) SIM through a tty serial console interface in the kernel space.


Notice that the Framework SIM is a standalone application that creates a virtual cellular phone identity which “lives” in the Framework SIM Scheduler (FSS)/LTE/IMS Core according to the present technology, and is paired in a one to one relationship with the mobile station device just like a traditional Subscriber Identity Module (SIM) based device is controlled. The Operational Support System (OSS) verifies and pairs the device by its unique IMSI, and assigns a working E-164 address with all Carrier Permissions through the public interface to continue operations of SMS/MMS/Phone services when and if companion applications are loaded on the device. For example, the device is required to grant permissions to access the necessary items to operate services and an additional proprietary library created which will interoperate between the functions in the core and the capabilities on the phone. Through these permissions, information can be pulled from the phone and its radios and then the phone and its radios required to act in coordination with the Framework SIM, supplementing and/or replacing the instructions usually provided by the hard SIM.


The basic and first example is that of using the Wi-Fi radio present on most smartphones phone to connect the phone to one of two types of Wi-Fi access points. The first type of WiFi access point is one where the user enters a WiFi SSID and password. The second type is when the phone, though the commands pushed to the Framework SIM, connects to an MBNode which has shared its network information with the LTE/IMS Core via the Framework SIM Scheduler.


The Framework SIM also gains permissions to access the LTE radios, as well as the GPS radio and other radios to access other networks both current and future (such as Bluetooth and C-Band). And, when it is coordinated with the hard SIM, the Framework SIM can access the hard SIM and institute commands via OTA.


The result is a total capture of all phone functions necessary to provide legacy cellular services (including Phase II 911) in parallel with the presubscribed hard SIM. Importantly, because Carrier Permissions have been granted, accessing contacts for the dialer or history for the texting lives in parallel and shares storage libraries and functions.


If and when a Hard SIM is desired, that hard SIM and to the extent Carrier Permissions are customized in the Framework of UE, the Framework and hard SIM will then have OTA capability and will match the MSISDN identity in the Framework SIM already on the device. Importantly, the OTA and Framework SIM share responsibility and create flexibility for the sub-group customer through the Framework SIM Scheduler.


The most prevalent network constraints for CMRS currently exist not just in Mobile Broadband Data services, but in all supported services to mobile stations. The stated reason for the constraint is general demand outpacing the available licensed spectrum capacity for any given fully-licensed network access carrier.


Mobile Bonded Nodes (MBNodes) are network provided access points that, through connection and management to an interface on the Framework SIM Scheduler are automatically accessed by EUs which are given instruction regarding network access choices through the Framework SIM.


This method differs from both LTE-U and LTE-LAA schemes in that according to the present technology, the MBNode continues to be managed, not only by the carrier, but by all parties who assist to provide facilities-based networks known as sub-groups. This significant difference eliminates the major concerns expressed by those who have expressed reservations about LTE-U and LTE-LAA in various regulatory proceedings. These concerns are basically that large MNOs are attempting to steal unlicensed network and/or their use of unlicensed networks will interfere with existing management of use by sub-groups today. The present technology gives additional permissions, control and tools to the non-LTE Licensed network provider and these work in parallel to the current LTE network architecture. Basically, it is not assumed that the device access can only be controlled by a single network provider, but instead that device access can be “scheduled” in real time among and between multiple networks and network managers where needed without the need for services to be disrupted or limited out of fear that the licensed spectrum demand will outstrip available capacity.


The solution concept allows MBNodes and device software (Framework SIM) and the core “Scheduler” to be implemented by a permissive CMRS or MNO that—in contrast to the dominant large MNOs—wants to maximize and allow edge control by the sub-group rather than wrestle away network control. This provides, in essence, a Neutral Network, and offers through the network and software the value of DPI management of unlicensed spectrum in a permissive manner, where each edge device must opt in via the loading and use of an application that is designed to give network information to and from the MBNode which is in turn giving information to the Permissive MNO's Core.


The result is an edge device UE and MBNode defined network managed with the tools provided by the Scheduler and by the Framework SIM. An additional benefit is the ability for the edge defined network to inject additional “non-neutral” rules in the MBNodes that it deploys using unlicensed or lite licensed spectrum (such as Citizens' Band). While the FCC's Net Neutrality rules prohibit retail network access provider discrimination and preferences, they were not intended to also proscribe edge-imposed limits; indeed, the purpose of the Net Neutrality rules was to push control out to the edge, which is exactly what the present technologies are designed to do. For example, if deployed in an educational environment, there may be a desire (perhaps imposed through legislation or a condition of a grant or subsidy) for censoring of particular content. This can now be managed on the students' cell phones through a policy control in the MBNodes via the permissive Framework SIM Scheduler, which allows for more fine-grained and targeted discrimination that is presently possible at the edge using today's edge-based tools. However, these Deep Packet based functions will only be implemented by the “Edge” group who deploys and/or co-controls the MBNodes in conjunction with the Framework SIM Scheduler. Control and abilities are delegated permissively to the edge, except in instances where a Carrier function is mandatory (such as CALEA and Enhanced 911).


In order to maximize a cost-benefit of supported devices, the MBNode IP address allocation must also be tied on a one to one basis in a similar fashion as to how each Framework SIM gives a one to one identity between the IMEI and an MSISDN. A software database in the Framework SIM Scheduler holds this pairing. We describe this as a “Static NAT” or “Semi-Static NAT”—again allowing the sub-group network to control access and use.


Each MBNode within a particular group is then given a “sub group” identifier which corresponds to the libraries held under the Framework SIM UE. Thus, the unique group of UEs is tied via management to the group's own MBNodes. When updates are made through the Framework SIM Scheduler regarding available MBNodes, connectivity control is automatically extended to the corresponding Framework SIM on each UE.


The Framework SIM Scheduler physically resides within the Core and between the IMS and the P-Gateway and provides the parallel function of the Mobility Management Element or MME and HSS, in the LTE architecture. The Framework SIM Scheduler also has full LTE PCRF control into the P-Gateway when a UE is operated via licensed LTE, but also and simultaneously has full access to and control of the Framework SIMs and MBNodes when the UE is connected to the MBNode. As such, it can instruct the Session Border Controller (SBC) which can provide SIP trunks the MBNode “Sub-Group” to route voice, data, SMS and MMS traffic through its connection allows certain databases to be updated within each “Sub-Group.” The result is dynamic control of the Framework SIM by the sub-group when connected through the MBNode for voice, data, SMS and MMS. For example, again turning to a university setting, if a university has an IP-PBX capable of supporting UEs via SIP, then that university can use the present technology not only to provide data to each UE, but can also host directly the UEs with full cell phone functionality—either with or without a parallel hard SIM. Likewise, in an enterprise environment, new employees simply need to load the “Framework SIM” onto their existing cellphone to be added to the corporate IP-PBX.


A mirror connection based on the IMEI is created in an Idle state if a Hard SIM is also loaded into the UE. In this situation, the mirror or “LTE” connection can operate in a “fall back” state, and—depending on what services are provided by the MBNode Sub-group—similar mirror states can be enabled in the IMS core for voice and texting capabilities. Again, turning to the university setting, this means if the students take their phones home when they leave campus, the university can allow use in cell-phone/LTE mode if paired with a carrier's hard SIM. Alternatively, if no pairing exists, the cell phones will only work on campus when connected to an MBNode. All services in all instances can now be controlled by the University.


This is technically different from existing “Wi-Fi” offerings embedded in other operating systems. Those offerings are limited by Carrier Settings in the Framework or in the SIM with no ability for non-carrier sub-groups to manage the devices and network. In addition, physical device identifiers, not IP Addresses, are used to authenticate, and then ensure “Fall Back.” Finally, management, including DPI and PCRF functions, are never extended. The present technology is an improvement and extends by design to the MBNode Sub-Group and corollary software maximum control to the Sub-Group.


There are two essential components to any LTE-PW/Wi-Fi First solution. First, the device must be implemented in a way that supports LTE-PW/Wi-Fi First functionality. Second, LTE-PW/Wi-Fi First must be implemented on the key components of the telecommunications infrastructure in parallel to a Wi-Fi First solution so that via control of the Framework SIM a switch to operations as a hard SIM may be automatically enabled.


This differs from RFC 5944 and its predecessor RFC 3944, which require the following steps of its outline of operation of the Mobile IP protocol:


Mobility agents (i.e., foreign agents and home agents) advertise their presence via Agent Advertisement messages. A mobile node may optionally solicit an Agent Advertisement message from any locally attached mobility agents through an Agent Solicitation message.


A mobile node receives these Agent Advertisements and determines whether it is on its home network or a foreign network.


When the mobile node detects that it is located on its home network, it operates without mobility services. If returning to its home network from being registered elsewhere, the mobile node deregisters with its home agent, through exchange of a Registration Request and Registration Reply message with it.


When a mobile node detects that it has moved to a foreign network, it obtains a care-of address on the foreign network. The care-of address can either be determined from a foreign agent's advertisements (a foreign agent care-of address), or by some external assignment mechanism such as DHCP (a co-located care-of address).


The mobile node operating away from home then registers its new care-of address with its home agent through exchange of a Registration Request and Registration Reply message with the home agent, possibly via a foreign agent.


Datagrams sent to the mobile node's home address are intercepted by its home agent, tunneled by the home agent to the mobile node's care-of address, received at the tunnel endpoint (either at a foreign agent or at the mobile node itself), and finally delivered to the mobile node.


In the reverse direction, datagrams sent by the mobile node are generally delivered to their destination using standard IP routing mechanisms, not necessarily passing through the home agent.


When away from home, Mobile IP uses protocol tunneling to hide a mobile node's home address from intervening routers between its home network and its current location. The tunnel terminates at the mobile node's care-of address. The care-of address must be an address to which datagrams can be delivered via conventional IP routing. At the care-of address, the original datagram is removed from the tunnel and delivered to the mobile node.”


Unlike the RFC 5944, the IP Address in use to the “world” for all carrier enabled services such as voice, SMS and MMS is always the Carrier Enabled IP Address hosted in the Core of the Carrier's network. This is especially the case for “Roaming” on 3rd party cellular networks, where only a preset listing of IP Addresses is approved for Roaming use. As a result, there are multiple cases of operation that differ from that of the generic tunneling that is described among and between “mobile nodes” (the RFC 5944 term for the mobile stations) and their host routers. To accommodate these uses cases the Framework SIM and the Hard SIM create a stateful relationship we call the “Static NAT,” which basically pairs two IP addresses for both use and management. The Framework SIM Scheduler then allows for control of which IP address is used in which situation, and since the Scheduler is permissively available to the user group and the carrier—services can be enabled appropriately. The result is that for previous “cellular” services that are needed by a particular device that is in range of an unlicensed network controlled by Scheduler, the unlicensed network can be scheduled to provide AND the service can be monitored for connection to the cellular network as a fallback. As discussed later, various techniques can be used to enhance call quality. Alternatively, devices can be given dynamic permission via the Scheduler to disable cellular, or operate in cellular only those entities that also create a “Static NAT” relationship.


First are the instances where the “Home Network” or “Home Networks” which are also MBNode(s) are involved in supporting the mobile station being used. In this instance the IP Address assigned to Mobile Station exists in parallel to any IP Address assigned by any router over the WiFi radio channel. As such the Framework SIM Scheduler acts to control the device through “Home Network.” In this instance the Framework SIM Scheduler makes (1) the Home Network part of the Carrier Network including the programming and use of IP Addresses in a shared mode where the IP Addresses are coordinated for use via the Framework SIM Scheduler into and through all supported “Home Networks” or MBNodes. The specific IP address assigned to the Framework SIM is a “Carrier IP Address” and mirrors, for “Carrier” services, the use of IP Addresses as if the Carrier is operating the RAN. If operated in a WiFi only mode, it is necessary that Framework SIM Scheduler also control the MBNode for the communication to be distinguished from RFC 5944.


The second set of instanced is when there is a traditional SIM in addition to the Framework SIM and where there is not a MBNode in which to operate with. Here the traditional or Hard SIM allows for updating the Framework SIM via a Hard SIM data connection. Thus the “tunnel” set-up for communication including all encryption, port assignments, and dynamic NAT capabilities are created and managed “out of band” from the public Internet and the “Foreign Network” or “Foreign Agent.” As a result, the Framework SIM communications link to the Framework SIM Scheduler can dictate when and if conditions are appropriate to allow for a “Foreign Network” tunnel for communication, or to, in the alternative, Schedule the use of carrier network which is known as Roaming and which does not use and does not expose packets to the public Internet. For example, if the communication or communications group desires communication to be secure, it may enable the data channel to choose an available Licensed LTE network over a “Foreign Agent” WiFi network.


In an LTE-PW/WiFi-First device:

    • The device should use the MBNode WiFi network as its primary network for all of its operations.
    • The device should be able to fall back onto a cellular network when a MBNode WiFi network is not available.
    • The transition between the WiFi and the Cellular network should be a seamless event.
    • Voice, Messaging and Internet should all operate and function at a high level over MBNode WiFi when the MBNode WiFi network is activated as the primary network.
    • All messaging and voice applications should be able to operate as an “Managed” IP based solution, no longer dependent upon a cellular network as its underlying mode of operation.
    • When MBNode WiFi is the active network, calls should be placed over the managed network using the SIP protocol.
    • The codec on the device should be optimized to support variations in network latency and bandwidth.
    • The user experience should be the same as if it was a non WiFi-First device meaning that the native Android apps need to function normally under the WiFi-First approach.


A number of key changes are implemented on the device in order to provide a satisfactory WiFi-First user experience. The following list calls out the different areas of Android that we have improved to help support this new model:

    • Management of the Active Radio via the Framework SIM based upon WiFi being the primary network.
    • Voice/SMS/MMS support via IP with Carrier Permissions being activated via the Framework.
    • Supporting multiple phone numbers on the device if needed.
    • Call Routing through the IMS core for correct Caller ID.
    • Default creation of IMS account for access to servers for voice/SMS/MMS that are permissively controlled by the Sub-Group via a SIP Peer.
    • UI and API changes that hide the cellular phone number from the user.
    • Communications mechanism between the Framework SIM Scheduler and the device.
    • Account Management—Preference/Configuration settings that control communication and services on the device.
    • When using Android, Carrier Permissions Control of Android to support the access control of these services (Cell calling, SMS/MMS via the designed framework of Android enabling coexisting VoLTE/VoWiFi).
    • Some UI changes to help support the Wi-Fi-First experience. Dialer, Settings, etc.
    • Call handoff (Voice continuity) from MBNode Wi-Fi to cell, and when using similar technology from a “Foreign WiFi Network” to cell or MBNode.
    • Improved Voice technologies to improve call quality and network access.
    • Additional support for monitoring call and device QOS when on MBNode similar to standard PCRF functions in a Carrier Core.


It is noted that a hybrid schema may also be implemented, in cases where using cellular or another communication paradigm is preferred. For example, MBNode WiFi First or Foreign Network WiFi First may be implemented in preference to roaming on a 3rd party carrier's network. Likewise, in cases of high mobility, WiFi access point handoff may be inefficient, and therefore a preference for cellular or other technology imposed. Further, other technologies, such as LoFi (long range WiFi), LiFi (local area networks implemented through ambient lighting devices), ad hoc networks or mobile ad hoc networks may be implemented and controlled as an MBNode as use cases may warrant, this is especially the case for M2M and IoT use cases.


Further, in some cases, WiFi may be economically inefficient. For example, some WiFi access point may have a cellular data backhaul. In that case, the use of WiFi may incur higher cellular data rate charges, instead of lower cellular voice charges. Alternatively, if the retail cellular backhaul is less expensive than a mandated “Roaming” fee, it may be more cost effective. In general, the Framework SIM Scheduler may determine user preferences and/or system preferences, and implement those, rather than a static preference for WiFi in every case. The stated goal of using this technology is to minimize the effect of “created” network scarcity by existing mobile operators.


Further Description of Framework SIM and MBNode


All telecommunications providers operate a number of service delivery systems. Key pieces include the Business Support Systems and Operational Support Systems (BSS/OSS). These combinations of hardware and software enable the delivery of voice, Internet, media, or other services to customers. Typically, BSS and OSS include the following services:

    • Business Support Systems: Product Management; Customer Management; Revenue Management; and Order Management.
    • Operations Support Systems: Network Management; Service Delivery; Service Assurance; Customer Care
    • Rather than modifying or replacing typical service delivery systems, a preferred embodiment according to the present technology adds the essential ingredients of Wi-Fi First to existing service delivery assets.


The Mobile Bonded Node (MBNode) provides those services that are required to for enhancing a service delivery system into an LTE-PW/Wi-Fi First service delivery engine that can be driven both by the carrier and by a Sub-group. The service delivery systems can be changed, enhanced, or completely replaced without damaging service delivery. Furthermore, the MBNode can be interconnected to other service delivery systems or operated separately.


The MBNode is a combination of technologies necessary to enhance a service delivery system sufficient to provide LTE-PW/Wi-Fi First Mobile telephone service and or data connectivity to a Wi-Fi First mobile device.


The MBNode, controlled by the Framework SIM Scheduler may include the following components with a shared control based upon a user/system preference:

    • Connection Manager (to verify status—active, idle, disconnected)
    • Device Manager (to update software and permissions)
    • Intelligent Voice Routing (to allow origination and termination to be controlled by customer's “softswitch” also known as an IP PBX)
    • Voice Call Continuity (VCC—so calls are not dropped upon handoff between different RAN)
    • Intelligent Message Routing
    • Call Detail Record Homologation
    • Data Analytics
    • System Management and Reporting
    • Inventory Management and Logistics
    • Operator Integration


The Framework SIM is used to maintain a connection between the server infrastructure (Controlled by the Framework SIM Scheduler) and a mobile device regardless of network (WiFi, 3G, LTE, 5G). Its goal is to ensure the device is reachable at all times and provide presence information to the servers about which devices can be reached at any given time.


The Framework SIM may provide the ability to dynamically change the heartbeat interval to optimize for performance and battery life; the ability to create a SIP connection in real time to answer an incoming call without relying on a persistence SIP connection; and/or the ability to intelligently manage the Wi-Fi and cellular radios to optimize for performance and battery life.


Working with the Framework SIM Scheduler, the Framework SIM controls the permissions a device on the network via the Sub-Group manager and including activation, deactivation, calling, texting, WiFi, cellular and roaming privileges. The privileges are maintained over connection to the device and either the Hard SIM, the Framework SIM or both and can be dynamically updated based on the user's account from through the Scheduling Server by the Sub-Group at any time. All interactions are achieved using a REST API between the client and server including: Activation; Deactivation; Phone number updates; Parameter and configuration updates; and Privilege updates including cellular network usage and international calling and texting, and allowed data use.


Intelligent call routing is managed between the client device and the server to direct both inbound and outbound calls over the appropriate networks (Wi-Fi, 3G, 4G/LTE, 5G or any other data network) depending on the current status of the network and the user's account status and while displaying a single phone number for all inbound and outbound calls over Wi-Fi and cellular networks. Real-time decisions are made about how to route inbound calls over SIP on Wi-Fi, SIP on 4G/LTE or traditional cellular channels. Outbound calls can be placed by initiating a VOIP or VoLTE call but. If there is no data connection available, the call can be routed using roaming rights on 2G or 3G or other cellular networks.


The decision on which network to use for the call can be made in real time based on a score that includes information on latency, packet loss, jitter, network speed, signal strength, and desired user profiles relying on echo servers in the network to measure the current conditions. The SIP connection can be tested in real time before connecting an inbound call.


Voice Call Continuity includes the seamless handoff of a call from Wi-Fi to a cellular connection using an attended transfer from the server which is seamless to the user. VCC may include “silent answer” so the user doesn't know a handoff has been made. It may also provide the ability for a user to manually hand off the call to a different type of network if the call quality isn't sufficient. It may further include the ability to automatically hand off a call if the call quality or network conditions deteriorate during the call or are predicted to deteriorate. A manual handoff mechanism may be provided such that a user can force a handoff to cellular assuming they have those privileges.


All SMS and MMS messages are delivered over IP using SMSC and MMSC with an interconnect for interoperation with other mobile operators. The MSG routing engine works by intercepting inbound and outbound SMS and MMS messages from the operating system queue to route the messages over IP connections rather than using SS7.


CDR Homologation describes the process to unify and clean up all device and server call logs to show a consistent call log to the user or sub-group and to report to the network on all call activity. A call that is handed off between Wi-Fi and cellular connections actually includes multiple phone calls being bridged, transferred and disconnected at the appropriate times but to the user it is a single phone call.


Operator/Customer integration is provided by activating and de-activating a device on the carrier network and/or by assigning additional phone number(s). Data feeds on cellular usage (minutes and MBs). Access may be enabled and disabled. IP addresses may be white listed to keep certain services lit up even when cellular service has not been purchased.


Call and network data may be obtained to accomplish a variety of tasks. The types of data collected may include: Voice Network Quality; Data usage; Location based activity; Device Statistics; Network Statistics; Call Quality Survey.


The WiFi-First architecture can be broken down into the following three sections:


Framework SIM—Also Known as a “Virtual IMSI”


The Framework SIM is a user identity which, when on an Android Phone is an application that runs, according to one embodiment, as a user level Android operating system “apk” with maximum device permissions and serves the following functions:

    • Responsible for device activation and provisioning on the various supported—networks including a “Hard SIM” if available.
    • Manages the main connection point between the device and the network. This provides support for all SMS/MMS messaging, device notifications, etc.
    • Account status with up to date usage metrics.
    • Real time cellular connectivity management (both as Roaming and/or in use of resold services).
    • Data Analytics, customer experience surveys and access to online customer service help system.
    • Manages access to voice and data services based upon a user's current account standing and or Sub-group management practices.
    • Network Status Indication


In a preferred implementation, the Framework SIM is added to the Android build image and requires system level permissions, but it may be downloaded in Lollypop (Android version 5) or more recent and be given “Permissions” upon download. It functions as the gateway between the Android framework level WiFi-First functionality. This Framework SIM serves two main functions. In order to control certain aspects of the Android framework, the controlling module needs to obtain system level permissions. This allows updating of the majority of the functionality which lives in the user level Account Management APK without having to provide a complete OTA system update. Since the platform works with multiple devices, any specific device management requirements in this module may be abstracted while maintaining one version of the Account Management APK. This also provides flexibility with how the solution is derived and delivered for each Sub-group customer or network.


At the core of the Wi-Fi first experience is the selection of the primary radio for data communications and management by the Sub-group. Normal devices today generally default to using the cellular radio and only fall back to the Wi-Fi when instructed by the user. In the Wi-Fi First approach, the device defaults to using the Wi-Fi radio as its primary source, is co-managed by the sub-group and falls back to the cellular radio when a sufficient Wi-Fi network is not available. However, the device also exists as a full cellular device via the Framework SIM Scheduler provisioning a full CMRS/GSM identity for each installed Framework SIM.


Each device is assigned a unique telephone numbers (TNs) and a unique IMSI. The IMSI is assigned by the Mobile Network Operator. The TN is assigned by the WiFi-First proprietor and can be an MNO TN or may also be a self-provided TN by the Sub-group. The Framework SIM Scheduler will disassociate upon request the TN from the Device allowing it to live as a full application in the cloud so that the voice/SMS and MMS capabilities can be directly controlled by the sub-group. For example, the Framework SIM can be reallocated by the MBNode or any other permissive Application Server controlled by the Sub-Group.


A normal telephone number is also assigned to the device as a WiFi-First telephone number is routed abstractly from the device. Settings include dual ring, silent ring and forward and are controlled via an API by the user over the Framework SIM Scheduler. The WiFi-First telephone number is generally used for all SMS, MMS and SIP communications. The underlying carriers route all data associated with the WiFi-First telephone numbers to the appropriate WiFi-First server which is then controlled by the sub-group and may be forwarded to the device.


Access to device resources such as voice, data, SMS, MMS, etc. are controlled via the designated WiFi-First defined preference settings. These settings are managed via the Framework SIM Scheduler and are set in the defined preference settings location on the device via the Framework SIM. Mobile originating SMS are allowed/disallowed based on the current data network type and the associated preference setting. Mobile originating SIP calls are allowed/disallowed based on the current data network type and the associated preference setting. Mobile originating cell calls are allowed/disallowed based on the associated preference setting. Internet access is allowed/disallowed based on the current data network type and the associated preference setting. Scripts that configure the device IP tables are used to filter Internet access. MMS features are enabled/disabled based on the associated preference setting.


When calls are received via the device, they arrive with an appended IP address in the caller ID. All incoming calls from the WiFi-First telephone servers appear in the caller ID as standard E.164 formatted numbers. To do this, all of the active IP addresses of the media servers are set in a device preference titled, e.g., “Call Log Filtering”. If any call has one of the WiFi-First telephone server IP addresses in the caller ID, the IP address is stripped off for proper display on the device and in the call log.


On standard Android devices, the cell radio is always used to transmit/receive SMS over the cell radio. If operated with a corresponding Hard SIM, the carrier preferences are changed to prefer VoLTE and VoWiFi. If operating without a Hard Sim, before a WiFi-First device has been activated, the normal Android SMS processing path is changed to prefer going through the Framework SIM. Once the phone has been activated, the SMS is then transmitted/received as IP data.


MMS is managed in a similar process as SMS messaging. MMS messages are delivered to the device via the Framework SIM application and passed down to the framework so that it can be injected into the main Android messaging flow with in the Android framework. This allows any messaging app that the user chooses as their primary app to continue to work as desired.


MMS messages are directed to the WiFi-First MMSC by updating the appropriate Access Point on the device.


Cell calls are enabled only either by integrating a self-purchased access to a cellular network or by acquiring and using a “Hard SIM” and having the appropriate carrier preference set by the “Hard SIM.” Carrier Permission unique to SIM are then loaded into the Framework SIM Scheduler so that the Cell calls are routed as desired by the sub-group.


SIP calls over a WIFI network do not require a cellular network. The Framework SIM always enables the appropriate preference for this feature. SIP calls over a Cellular data network are only allowed when a Hard SIM pass has been purchased and the appropriate preference has been set by the WiFi-First telephone server. This is known as VoLTE.


A WiFi-First SIP profile is automatically generated and maintained on the device. This profile is also locked down so that the user cannot access its contents and deem the phone unusable on the network.


One of the important elements to a fully functional WiFi first device is the ability keep a call connected if a user transitions from a WiFi network to a cellular network, or between WiFi access points. This can occur for a couple of different reasons, e.g.: The User initiates a call from a WiFi location and relocates to a location in which the original WiFi signal is no longer present; or the User initiates a call in a WiFi hotspot in which its signal degrades over time to a level that is determined insufficient to continue the call.


In order to provide this level of functionality, a number of things should to occur: The device monitors the current network status in real time to determine whether or not it should request that a call hand occur. A request is issued from the device to the WiFi-First telephone Gateway which is part of the IMS behind the Framework SIM Scheduler that will initiate and manage the entire hand off process. The Android SIP stack is modified to provide the ability to deliver this request. Functional changes are implemented within Android in order to manage the transition between multiple call lines in a way that is seamless and non-detectable to the user.


It is noted that the rules may be modified to meet different paradigms. For example, in a “locked down” facility, the WiFi-First device may be used to control and/or monitor all external communications within the facility, but permit use of the same device external to the facility. By providing a mandated use of WiFi where available, and ensuring that within the facility that WiFi is available, the rules are self-enforcing. Thus, within the facility, the WiFi usage may be authenticated, monitored, filtered, logged, and secured, all without intentional user involvement.


One of the interesting challenges that occur with any device that relies on network access via WiFi hotspots is the ability to maintain constant communication between that device and the home network. This is often complicated when dealing with different WiFi network environments, security policies, etc. In order to accomplish this, a mechanism is created between the device and the mobile gateway that is responsible for learning the characteristics of a WiFi network as well as provide an efficient means for delivering continuous device reachability independent of the different network conditions and without placing a heavy burden on the device resources. One example is to define a method that will discover a network access points ARP (Address Resolution Protocol) timeout value thus allowing for a networked mobile device to most efficiently maintain an open connection with the mobile gateway.


The Framework SIM typically needs to efficiently maintain a connection with the Framework SIM Scheduler. The real time nature of mobile communication requires that a request can be delivered to a mobile device at the time the request is issued. Since a mobile device does not contain a static IP address, it is the responsibility of the mobile device to notify the data center each time it's registered IP address changes. Due to constraints imposed by network design for security reasons, a networked client is responsible for establishing the initial networked connection. Once the initial connection has been established, both parties will be able to communicate for an indeterminate amount of time. The amount of time varies based upon network activity, the transmission protocol used and the ARP timeout rules imposed by various network devices found in the path. If the path is closed by the network, it is the responsibility of the client to re-open the connection.


Since the mobile device is ultimately responsible for maintaining an open network connection, there has to be a balance between the frequency of generated network activity used to keep the network connection open and the amount of battery consumption that can occur on the mobile device. The mobile device needs to determine what the maximum amount time an inactive network connection will stay open for. Doing so will instruct the mobile device on how frequently it will need to issue a heartbeat in order to maintain an open network connection. The device typically supports the “Connection Manager” component of the Framework SIM to manage optimal device reachability.


Environment of Operation


Aspects of the present technology other than the smartphone can be executed in an arbitrary program execution environment, or on customized processors or integrated circuits. The data processing may be local to the camera, in a remote appliance, or in the “cloud”.


While only a few embodiments of the present invention have been shown and described, it will be obvious to those skilled in the art that many changes and modifications may be made thereunto without departing from the spirit and scope of the present invention as described in the following claims. All patent applications and patents, both foreign and domestic, and all other publications referenced herein are incorporated herein in their entireties to the full extent permitted by law.


The methods and systems described herein may be deployed in part or in whole through a machine that executes computer software, program codes, and/or instructions on a processor. The present invention may be implemented as a method on the machine, as a system or apparatus as part of or in relation to the machine, or as a computer program product embodied in a computer readable medium executing on one or more of the machines. The processor may be part of a server, client, network infrastructure, mobile computing platform, stationary computing platform, or other computing platform. A processor may be any kind of computational or processing device capable of executing program instructions, codes, binary instructions and the like. The processor may be or include a signal processor, digital processor, embedded processor, microprocessor or any variant such as a co-processor (math co-processor, graphic co-processor, communication co-processor and the like) and the like that may directly or indirectly facilitate execution of program code or program instructions stored thereon. In addition, the processor may enable execution of multiple programs, threads, and codes. The threads may be executed simultaneously to enhance the performance of the processor and to facilitate simultaneous operations of the application. By way of implementation, methods, program codes, program instructions and the like described herein may be implemented in one or more thread. The thread may spawn other threads that may have assigned priorities associated with them; the processor may execute these threads based on priority or any other order based on instructions provided in the program code. The processor may include memory that stores methods, codes, instructions and programs as described herein and elsewhere. The processor may access a storage medium through an interface that may store methods, codes, and instructions as described herein and elsewhere. The storage medium associated with the processor for storing methods, programs, codes, program instructions or other type of instructions capable of being executed by the computing or processing device may include but may not be limited to one or more of a CD-ROM, DVD, memory, hard disk, flash drive, RAM, ROM, cache and the like.


A processor may include one or more cores that may enhance speed and performance of a multiprocessor. In embodiments, the process may be a dual core processor, quad core processors, other chip-level multiprocessor and the like that combine two or more independent cores (called a die).


The methods and systems described herein may be deployed in part or in whole through a machine that executes computer software on a server, client, firewall, gateway, hub, router, or other such computer and/or networking hardware. The software program may be associated with a server that may include a file server, print server, domain server, internet server, intranet server and other variants such as secondary server, host server, distributed server and the like. The server may include one or more of memories, processors, computer readable media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other servers, clients, machines, and devices through a wired or a wireless medium, and the like. The methods, programs, or codes as described herein and elsewhere may be executed by the server. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the server.


The server may provide an interface to other devices including, without limitation, clients, other servers, printers, database servers, print servers, file servers, communication servers, distributed servers and the like. Additionally, this coupling and/or connection may facilitate remote execution of program across the network. The networking of some or all of these devices may facilitate parallel processing of a program or method at one or more location without deviating from the scope of the invention. In addition, any of the devices attached to the server through an interface may include at least one storage medium capable of storing methods, programs, code and/or instructions. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for program code, instructions, and programs.


The software program may be associated with a client that may include a file client, print client, domain client, internet client, intranet client and other variants such as secondary client, host client, distributed client and the like. The client may include one or more of memories, processors, computer readable media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other clients, servers, machines, and devices through a wired or a wireless medium, and the like. The methods, programs, or codes as described herein and elsewhere may be executed by the client. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the client.


The client may provide an interface to other devices including, without limitation, servers, other clients, printers, database servers, print servers, file servers, communication servers, distributed servers and the like. Additionally, this coupling and/or connection may facilitate remote execution of program across the network. The networking of some or all of these devices may facilitate parallel processing of a program or method at one or more location without deviating from the scope of the invention. In addition, any of the devices attached to the client through an interface may include at least one storage medium capable of storing methods, programs, applications, code and/or instructions. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for program code, instructions, and programs.


The methods and systems described herein may be deployed in part or in whole through network infrastructures. The network infrastructure may include elements such as computing devices, servers, routers, hubs, firewalls, clients, personal computers, communication devices, routing devices and other active and passive devices, modules and/or components as known in the art. The computing and/or non-computing device(s) associated with the network infrastructure may include, apart from other components, a storage medium such as flash memory, buffer, stack, RAM, ROM and the like. The processes, methods, program codes, instructions described herein and elsewhere may be executed by one or more of the network infrastructural elements.


The methods, program codes, and instructions described herein and elsewhere may be implemented within a wireless network, which may include cellular networks (e.g., CDMA, FDMA, TDMA, OFDM, LTE, 3GPP, 3G, 4G, 5G), local area networks (e.g., WiFi IEEE-802.11 family of protocols, Zigbee, ZWave, Bluetooth, 802.15 family of protocols, LiFi, etc.), mesh, or other networks types.


The methods, programs codes, and instructions described herein and elsewhere may be implemented on or through mobile devices. The mobile devices may include navigation devices, cell phones, smart phones, mobile personal digital assistants, laptops, palmtops, netbooks, pagers, electronic books readers, music players and the like. These devices may include, apart from other components, a storage medium such as a flash memory, buffer, RAM, ROM and one or more computing devices. The computing devices associated with mobile devices may be enabled to execute program codes, methods, and instructions stored thereon. Alternatively, the mobile devices may be configured to execute instructions in collaboration with other devices. The mobile devices may communicate with base stations interfaced with servers and configured to execute program codes. The mobile devices may communicate on a peer-to-peer network, mesh network, or other communications network. The program code may be stored on the storage medium associated with the server and executed by a computing device embedded within the server. The base station may include a computing device and a storage medium. The storage device may store program codes and instructions executed by the computing devices associated with the base station.


The technology may also be implemented using security cameras, and as such may provide premises security and/or homeland security, and may further be implemented as part of a stress analyzer or “lie detector”. The technology may be implemented as part of a videophone or personal feedback, or athletic training device. The technology may be employed within an interview context to determine interviewee heart rate. The technology may further be used in medical facilities to monitor patients' heart rates. Likewise, the technology may be used in retail and media environments to assess customer excitement.


The computer software, program codes, and/or instructions may be stored and/or accessed on machine readable media that may include: computer components, devices, and recording media that retain digital data used for computing for some interval of time; semiconductor storage known as random access memory (RAM); mass storage typically for more permanent storage, such as optical discs, forms of magnetic storage like hard disks, tapes, drums, cards and other types; processor registers, cache memory, volatile memory, non-volatile memory; optical storage such as CD, DVD; removable media such as flash memory (e.g. USB sticks or keys), floppy disks, magnetic tape, paper tape, punch cards, standalone RAM disks, Zip drives, removable mass storage, off-line, and the like; other computer memory such as dynamic memory, static memory, read/write storage, mutable storage, read only, random access, sequential access, location addressable, file addressable, content addressable, network attached storage, storage area network, bar codes, magnetic ink, and the like.


According to software or hardware engineering practices, the functions may be implemented on machines through computer executable media having a processor capable of executing program instructions stored thereon as a monolithic software structure, as standalone software modules, or as modules that employ external routines, code, services, and so forth, or any combination of these, and all such implementations may be within the scope of the present disclosure. Examples of such machines may include, but may not be limited to, personal digital assistants, laptops, personal computers, mobile phones, other handheld computing devices, medical equipment, wired or wireless communication devices, transducers, chips, calculators, satellites, tablet PCs, electronic books, gadgets, electronic devices, devices having artificial intelligence, computing devices, networking equipment, servers, routers and the like. Furthermore, the elements depicted in the flow chart and block diagrams or any other logical component may be implemented on a machine capable of executing program instructions. Thus, while the foregoing descriptions set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context. Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.


The methods and/or processes described above, and steps thereof, may be realized in hardware, software or any combination of hardware and software suitable for a particular application. The hardware may include a general-purpose computer and/or dedicated computing device or specific computing device or particular aspect or component of a specific computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as a computer executable code capable of being executed on a machine-readable medium.


The computer executable code may be created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software, or any other machine capable of executing program instructions. The technology may be implemented on single core, multiple core, RISC, CISC, SIMD, SISD, DSP, GPGPU, ASIC, CPLD, or other computational environments.


Thus, in one aspect, each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, the means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.


While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is not to be limited by the foregoing examples, but is to be understood in the broadest sense allowable by law.


All documents referenced herein are hereby expressly incorporated by reference in their entirety.

Claims
  • 1. A primary WiFi communication method, comprising: registering a device on a cellular network having a signaling channel using a cellular radio;connecting the device to a WiFi network subject to network address translation using a WiFi radio;determining a local Internet Protocol (IP) network address of the WiFi radio on the WiFi network;determining a public IP network address of the WiFi network;communicating the local IP network address of the WiFi radio to an operator over the signaling channel while the device is connected to the WiFi network;initiating a voice call to the device though the WiFi radio-using the communicated local IP network address of the WiFi radio and the public IP network address of the WiFi network, while the device is registered on the cellular network; andcommunicating the voice call over the WiFi network.
  • 2. The primary WiFi communication method according to claim 1, further comprising: connecting the device to a second WiFi network using a WiFi radio;determining a second local Internet Protocol (IP) network address of the WiFi radio-on the second WiFi network;communicating the second local IP network address of the WiFi radio-to the operator over the signaling channel;maintaining the voice call to the device though the WiFi radio using the second IP network address of the WiFi radio-communicated to the operator over the signaling channel.
  • 3. The primary WiFi communication method according to claim 1, wherein the cellular network operates according to a Long Term Evolution (LTE) protocol.
  • 4. The primary WiFi communication method according to claim 1, wherein cellular network assigns an E-164 address to the cellular radio.
  • 5. The primary WiFi communication method according to claim 1, further comprising: downloading an executable application; andexecuting code in the downloaded executable application.
  • 6. The primary WiFi communication method according to claim 1, wherein the voice call over the WiFi network is communicated using the Session Initiation Protocol.
  • 7. The primary WiFi communication method according to claim 1, wherein the device comprises a hardware subscriber identity module, adapted to authenticate the device to the cellular network.
  • 8. The primary WiFi communication method according to claim 7, wherein the device comprises a software subscriber identity module, adapted to authenticate the device to the operator.
  • 9. The primary WiFi communication method according to claim 1, further comprising: initiating a voice call from the device through the WiFi network; androuting the voice call through the operator.
  • 10. A communication method, comprising: registering a device on a Long Term Evolution (LTE) cellular network having an LTE signaling channel using a cellular radio;connecting the device to a packet switched network subject to network address translation using a packet switched network radio;determining a local network address of the packet switched network radio on the packet switched network;determining a public network address of the packet switched network;communicating the local network address of the packet switched network radio-to an operator over the LTE signaling channel while the device is connected to the packet switched network;initiating a voice call to the device though the packet switched network radio using the communicated local network address of the packet switched network radio communicated to the operator over the LTE signaling channel while the device is registered on the LTE cellular network and the public network address of the packet switched network; andcommunicating the voice call over the packet switched network.
  • 11. The communication method according to claim 10, wherein the packet switched network is an IEEE-802.11 network.
  • 12. The communication method according to claim 10, further comprising: connecting the device to a second packet switched network using the packet switched network radio;determining a local second network address of the packet switched network radio-on the second packet switched network;communicating the second local packet switched network address of the packet switched network radio to the operator over the LTE signaling channel;maintaining the voice call to the device though the packet switched network radio-using the second packet switched network address of the packet switched network radio-communicated to the operator over the signaling channel.
  • 13. The communication method according to claim 10, wherein LTE cellular network assigns an E-164 address to the cellular radio.
  • 14. The communication method according to claim 10, wherein the voice call over the packet switched network is communicated using the Session Initiation Protocol.
  • 15. The communication method according to claim 10, wherein the device comprises a first subscriber identity module, further comprising authenticating the device to the LTE cellular network using the first subscriber identity module.
  • 16. The communication method according to claim 15, wherein the device comprises a second subscriber identity module, further comprising authenticating the device to the operator using the second subscriber identity module.
  • 17. The communication method according to claim 10, further comprising: initiating a voice call from the device through the packet switched network; androuting the voice call through the operator.
  • 18. A primary WiFi communication device, comprising: a cellular radio-configured to register the device on a cellular network having a signaling channel;a WiFi radio, having an assigned local Internet Protocol address configured to connecting the device to a WiFi network, the WiFi network having a public Internet Protocol address;at least one automated processor, configured to: communicate the assigned local Internet Protocol address of the WiFi radio-to an operator over the signaling channel while the device is connected to the WiFi network;receive a voice call though the WiFi radio-using the assigned local Internet Protocol address of the WiFi radio-communicated to the operator over the signaling channel and the public Internet Protocol address, while the device is registered on the cellular network; andconduct the voice call over the WiFi network.
  • 19. The primary WiFi communication device according to claim 18, wherein: the cellular network operates according to a Long Term Evolution (LTE) protocol;the voice call over the WiFi network is communicated using the Session Initiation Protocol;the device comprises a first subscriber identity module adapted to authenticate the device to the cellular network; andthe device comprises a second subscriber identity module adapted to authenticate the device to the operator.
  • 20. The primary WiFi communication device according to claim 18, wherein the at least one automated processor is further configured to: initiate a voice call from the device through the WiFi network; androute the voice call through the operator.
CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a Continuation of U.S. patent application Ser. No. 16/725,808, filed Dec. 23, 2019, now U.S. Pat. No. 11,382,008, issued Jul. 5, 2022, which is a Continuation of U.S. patent application Ser. No. 15/636,274, filed Jun. 28, 2017, now U.S. Pat. No. 10,517,021, issued Dec. 24, 2019, which is a non-provisional of, and claims benefit of priority under 35 U.S.C. § 119(e) from U.S. Provisional Patent Application No. 62/385,647, filed Sep. 9, 2016, and U.S. Provisional Patent Application No. 62/356,951, filed Jun. 30, 2016, each of which is expressly incorporated herein by reference in its entirety. This application is related to PCT/US17/39877, filed Jun. 29, 2018, which claims benefit of priority from U.S. Provisional Patent Application Nos. 62/385,647 and 62/356,951.

US Referenced Citations (1807)
Number Name Date Kind
5608786 Gordon Mar 1997 A
6574216 Farris et al. Jun 2003 B1
7187923 Mousseau et al. Mar 2007 B2
7356001 Jones et al. Apr 2008 B1
7440472 Delaney et al. Oct 2008 B2
7471655 Gallagher et al. Dec 2008 B2
7492266 Bhavani Feb 2009 B2
7738488 Marsico et al. Jun 2010 B2
7945477 Werbitt May 2011 B2
7995728 Martin et al. Aug 2011 B1
8005114 Mishra et al. Aug 2011 B2
8019289 Gorbachov Sep 2011 B2
8023931 Katz et al. Sep 2011 B2
8027335 Ansari et al. Sep 2011 B2
8027444 Martin et al. Sep 2011 B1
8027456 Zhang et al. Sep 2011 B1
8050627 Makhlouf et al. Nov 2011 B2
8073400 Gorbachov Dec 2011 B2
8073401 Gorbachov Dec 2011 B2
8078119 Gorbachov Dec 2011 B2
8126461 Sengupta et al. Feb 2012 B2
8135355 Gorbachov Mar 2012 B2
8140025 Gorbachov Mar 2012 B2
8175541 Gorbachov May 2012 B2
8265567 Gorbachov Sep 2012 B2
8265589 Heit et al. Sep 2012 B2
8295851 Finnegan et al. Oct 2012 B2
8301084 Gorbachov Oct 2012 B2
8325632 Gorbachov Dec 2012 B2
8396489 Platt et al. Mar 2013 B2
8405471 Chang et al. Mar 2013 B2
8417286 Gorbachov et al. Apr 2013 B2
8445826 Verfuerth May 2013 B2
8467738 Gorbachov Jun 2013 B2
8472462 Mignot et al. Jun 2013 B2
8503340 Xu Aug 2013 B1
8559369 Barkan Oct 2013 B2
8565793 Koodli Oct 2013 B1
8601146 Pascual Avila et al. Dec 2013 B2
8611893 Rosenberg et al. Dec 2013 B2
8630637 Garg et al. Jan 2014 B2
8649739 Gorbachov Feb 2014 B2
8649830 Rao et al. Feb 2014 B1
8669903 Thill et al. Mar 2014 B2
8682729 Werbitt Mar 2014 B2
8737318 Fan et al. May 2014 B2
8744537 Rao et al. Jun 2014 B1
8811187 Macias et al. Aug 2014 B2
8819219 Vandwalle et al. Aug 2014 B2
8831694 Rao et al. Sep 2014 B1
8880047 Konicek et al. Nov 2014 B2
8886209 Shaw et al. Nov 2014 B2
8903381 Garg et al. Dec 2014 B2
8904017 Yoon et al. Dec 2014 B2
8971898 Maveddat Mar 2015 B2
8983497 Ziskind et al. Mar 2015 B2
8989825 Rao et al. Mar 2015 B1
9042306 Barkan May 2015 B2
9093967 Gorbachov Jul 2015 B2
9100384 Li Aug 2015 B2
9100494 Rao et al. Aug 2015 B1
9125065 Koo Sep 2015 B2
9137171 Koodli et al. Sep 2015 B2
9143184 Gorbachov et al. Sep 2015 B2
9175967 Abramson et al. Nov 2015 B2
9178991 Finnegan et al. Nov 2015 B2
9202244 Werbitt Dec 2015 B2
9204269 Cham et al. Dec 2015 B1
9210728 Koodli et al. Dec 2015 B2
9219525 Liu et al. Dec 2015 B2
9231680 Gorbachov Jan 2016 B2
9253333 Cowick Feb 2016 B1
9264898 Schroeder et al. Feb 2016 B2
9280978 Kim et al. Mar 2016 B2
9294609 Wassingbo et al. Mar 2016 B2
9307449 Duda Apr 2016 B2
9319943 Lee et al. Apr 2016 B2
9326208 Salkintzis Apr 2016 B2
9332465 Valliappan et al. May 2016 B2
9332480 Griot et al. May 2016 B2
9350770 Yang et al. May 2016 B2
9351193 Raleigh et al. May 2016 B2
9351255 Nakao May 2016 B2
9377522 Edge et al. Jun 2016 B2
9386057 Kent et al. Jul 2016 B2
9386505 Park et al. Jul 2016 B2
9386615 Huang Jul 2016 B2
9392508 Senarath et al. Jul 2016 B2
9398563 Zhang et al. Jul 2016 B2
9402258 Hunukumbure et al. Jul 2016 B2
9408067 Hoadley et al. Aug 2016 B1
9408177 Koodli Aug 2016 B2
9414386 Khawer et al. Aug 2016 B2
9420089 Rao et al. Aug 2016 B1
9439197 Ngo et al. Sep 2016 B1
9462117 Liang et al. Oct 2016 B2
9462448 Edge Oct 2016 B2
9467835 Hiben Oct 2016 B2
9473981 Bhushan et al. Oct 2016 B2
9479915 Gupta Oct 2016 B2
9485109 Bao et al. Nov 2016 B2
9485753 Agardh et al. Nov 2016 B2
9490891 Frerking et al. Nov 2016 B2
9491575 Edge et al. Nov 2016 B2
9491610 Zehavi et al. Nov 2016 B2
9500738 Edge et al. Nov 2016 B2
9503918 Han et al. Nov 2016 B2
9509853 Mufti et al. Nov 2016 B2
9510208 Wei et al. Nov 2016 B2
9510222 Yerramalli et al. Nov 2016 B2
9516549 Aksu Dec 2016 B1
9516640 Pazhyannur et al. Dec 2016 B2
9516688 Konstantinou et al. Dec 2016 B2
9520906 Butterfield et al. Dec 2016 B2
9529761 Kawai Dec 2016 B2
9531409 Butterfield et al. Dec 2016 B2
9537642 Belghoul et al. Jan 2017 B2
9538441 Meredith et al. Jan 2017 B2
9549080 Tabet et al. Jan 2017 B2
9549360 Khawer et al. Jan 2017 B2
9553913 Yang et al. Jan 2017 B2
9560579 Batta et al. Jan 2017 B2
9565593 Bhushan et al. Feb 2017 B2
9584351 Fechtel Feb 2017 B2
9585118 Garg Feb 2017 B2
9590764 Ben Ami et al. Mar 2017 B2
9591596 Seo Mar 2017 B2
9591644 Chen et al. Mar 2017 B2
9603164 Davydov et al. Mar 2017 B2
9608678 Sun et al. Mar 2017 B1
9609568 Karimli et al. Mar 2017 B1
9609666 Sun et al. Mar 2017 B2
9615279 Davydov Apr 2017 B2
9622089 Ngo et al. Apr 2017 B1
9622133 Guvenc Apr 2017 B1
9622237 Noh et al. Apr 2017 B2
9628521 Zhu et al. Apr 2017 B2
9635636 Cai et al. Apr 2017 B1
9638537 Abramson et al. May 2017 B2
9642186 Dureja May 2017 B1
9655005 Ahmavaara May 2017 B2
9655048 Liu et al. May 2017 B2
9655064 Ahn et al. May 2017 B2
9667459 Naim et al. May 2017 B1
9668285 Zhang et al. May 2017 B2
9674704 Narasimha et al. Jun 2017 B1
9674733 Faccin et al. Jun 2017 B2
9680617 Wei Jun 2017 B2
9680678 Bashar et al. Jun 2017 B2
9686064 He et al. Jun 2017 B2
9686688 Hedayat et al. Jun 2017 B2
9693235 Agardh et al. Jun 2017 B2
9698945 Erceg et al. Jul 2017 B2
9699324 Rashid et al. Jul 2017 B1
9699786 Ngo et al. Jul 2017 B2
9705774 Yi et al. Jul 2017 B2
9706571 Gao Jul 2017 B2
9706591 Panteleev et al. Jul 2017 B2
9712195 Wang et al. Jul 2017 B2
9713035 Bhushan et al. Jul 2017 B2
9713154 Tabet et al. Jul 2017 B2
9713170 Abraham et al. Jul 2017 B2
9716531 Zhao et al. Jul 2017 B2
9716686 Erickson et al. Jul 2017 B2
9716788 Bendi et al. Jul 2017 B2
9717071 Chen et al. Jul 2017 B2
9717098 Bhushan et al. Jul 2017 B2
9722803 Ellingson et al. Aug 2017 B1
9723516 Bhushan et al. Aug 2017 B2
9729283 Kwon et al. Aug 2017 B2
9730006 Krishnamoorthy et al. Aug 2017 B1
9730105 Bhushan et al. Aug 2017 B2
9730157 Puranik et al. Aug 2017 B2
9736617 Wu et al. Aug 2017 B2
9736829 Chen et al. Aug 2017 B2
9736845 Yi et al. Aug 2017 B1
9743323 Lee et al. Aug 2017 B2
9743333 Wang et al. Aug 2017 B1
9743392 Nimbalker et al. Aug 2017 B2
9743432 Ji et al. Aug 2017 B2
9749884 Cummings Aug 2017 B1
9749925 Chrisikos et al. Aug 2017 B2
9756611 Yavuz et al. Sep 2017 B2
9763150 Lee et al. Sep 2017 B2
9763225 Ji et al. Sep 2017 B2
9763267 Abraham et al. Sep 2017 B2
9768936 Levy Sep 2017 B2
9769836 Khawer et al. Sep 2017 B2
9772196 Abramson et al. Sep 2017 B2
9774436 Jeon et al. Sep 2017 B2
9774476 Nammi et al. Sep 2017 B2
9775048 Reddy et al. Sep 2017 B2
9775087 Chou et al. Sep 2017 B2
9775089 Payyappilly et al. Sep 2017 B2
9775153 Khawer et al. Sep 2017 B2
9775165 Ben Ami et al. Sep 2017 B2
9781233 Wattwood et al. Oct 2017 B2
9781742 Gu et al. Oct 2017 B2
9781771 Shitara Oct 2017 B2
9785157 Wang et al. Oct 2017 B2
9787569 Somasundaram et al. Oct 2017 B2
9788217 Andreoli-Fang et al. Oct 2017 B2
9794015 Tabet et al. Oct 2017 B2
9794033 Fwu et al. Oct 2017 B2
9794821 Jeon et al. Oct 2017 B2
9794899 Moon et al. Oct 2017 B2
9794935 Khawer Oct 2017 B2
9794960 Ng Oct 2017 B2
9801187 Zhou et al. Oct 2017 B1
9807618 Liu et al. Oct 2017 B2
9807619 Tsai et al. Oct 2017 B2
9807625 Ngo et al. Oct 2017 B2
9807767 Chen et al. Oct 2017 B2
9807821 Jha et al. Oct 2017 B2
9813944 Arslan et al. Nov 2017 B2
9819467 Damnjanovic et al. Nov 2017 B2
9825748 Liang et al. Nov 2017 B2
9825752 Jindal et al. Nov 2017 B2
9826014 Kent et al. Nov 2017 B2
9826460 Patil et al. Nov 2017 B2
9826480 Damnjanovic et al. Nov 2017 B2
9832650 Kwok et al. Nov 2017 B2
9832654 Koskinen et al. Nov 2017 B2
9832659 Yi et al. Nov 2017 B2
9832791 Ngo et al. Nov 2017 B2
9832808 Pazhyannur et al. Nov 2017 B2
9838191 Chandwani et al. Dec 2017 B2
9838865 Park et al. Dec 2017 B2
9838983 Ahn et al. Dec 2017 B2
9839038 Lin et al. Dec 2017 B2
9839049 Bashar et al. Dec 2017 B2
9841802 Emami et al. Dec 2017 B2
9842442 Konicek et al. Dec 2017 B2
9848424 Wang et al. Dec 2017 B2
9848433 Frerking et al. Dec 2017 B2
9848440 Li et al. Dec 2017 B2
9853682 Jung et al. Dec 2017 B2
9853797 Tabet et al. Dec 2017 B2
9854569 Yang et al. Dec 2017 B2
9860776 Yerramalli et al. Jan 2018 B2
9865107 Chang et al. Jan 2018 B2
9867053 Prasad et al. Jan 2018 B2
9867056 Han et al. Jan 2018 B2
9867154 Levy et al. Jan 2018 B2
9869750 Cheng et al. Jan 2018 B2
9871287 Achour Jan 2018 B2
9872181 Hwang et al. Jan 2018 B2
9872233 Jeon et al. Jan 2018 B2
9876613 Venkatsuresh et al. Jan 2018 B2
9877174 Li et al. Jan 2018 B2
9877177 Lesage et al. Jan 2018 B2
9877203 Yoo et al. Jan 2018 B2
9882287 Talty et al. Jan 2018 B2
9888054 Yang et al. Feb 2018 B2
9888388 Wei Feb 2018 B2
9888501 Borges et al. Feb 2018 B2
9893758 Homchaudhuri et al. Feb 2018 B2
9893852 Yerramalli et al. Feb 2018 B2
9893854 Luo et al. Feb 2018 B2
9893865 Hsieh Feb 2018 B2
9893941 Balasubramanian et al. Feb 2018 B1
9894190 Panchal et al. Feb 2018 B2
9894500 Dong et al. Feb 2018 B2
9894534 Boudreau et al. Feb 2018 B2
9898550 Ho Feb 2018 B2
9900134 Kwon et al. Feb 2018 B2
9900757 Li et al. Feb 2018 B2
9900801 Papa et al. Feb 2018 B2
9900881 Han et al. Feb 2018 B2
9900908 Noh et al. Feb 2018 B2
9906992 Youtz et al. Feb 2018 B1
9906997 Lee et al. Feb 2018 B2
9907085 Li et al. Feb 2018 B2
9912804 Lee et al. Mar 2018 B2
9913095 Talluri et al. Mar 2018 B2
9913282 Aksu Mar 2018 B2
9913297 Ahn et al. Mar 2018 B2
9913311 Amerga et al. Mar 2018 B1
9917676 Ng et al. Mar 2018 B2
9918227 Narasimha et al. Mar 2018 B2
9918232 Khawer et al. Mar 2018 B2
9918336 Verma et al. Mar 2018 B2
9918341 Papaleo et al. Mar 2018 B2
9923610 Sandhu et al. Mar 2018 B2
9923764 Garg et al. Mar 2018 B2
9924370 Cai et al. Mar 2018 B2
9924386 Jain et al. Mar 2018 B2
9924489 Garg Mar 2018 B2
9924518 Yi et al. Mar 2018 B2
9924519 Green et al. Mar 2018 B2
9930535 Hedayat et al. Mar 2018 B2
9930652 Rashid et al. Mar 2018 B2
9930670 Yi et al. Mar 2018 B2
9935743 Khawer et al. Apr 2018 B2
9936393 Pao et al. Apr 2018 B2
9936414 Chai et al. Apr 2018 B2
9936453 Iyer et al. Apr 2018 B1
9942762 Griot et al. Apr 2018 B2
9942772 Singh et al. Apr 2018 B2
9942848 Gokingco et al. Apr 2018 B2
9942896 Chandwani et al. Apr 2018 B2
9942901 Chandrasekhar et al. Apr 2018 B2
9942919 Mukherjee et al. Apr 2018 B2
9948481 Rico Alvarino et al. Apr 2018 B1
9948486 Wang et al. Apr 2018 B2
9949167 You et al. Apr 2018 B2
9949169 Yerramalli et al. Apr 2018 B2
9949220 Abedini et al. Apr 2018 B2
9949275 Chen et al. Apr 2018 B2
9949292 Bhushan et al. Apr 2018 B2
9949295 You et al. Apr 2018 B2
9955357 Moon et al. Apr 2018 B2
9955460 Tavildar et al. Apr 2018 B2
9955482 Valliappan et al. Apr 2018 B2
9959888 Gummadi et al. May 2018 B2
9960890 Lei et al. May 2018 B2
9961598 Hoidis et al. May 2018 B2
9961646 Jeon et al. May 2018 B2
9967293 Li et al. May 2018 B2
9967752 Luo et al. May 2018 B2
9967771 Pazhyannur et al. May 2018 B2
9967910 Maaref May 2018 B2
9973244 Chen et al. May 2018 B2
9973907 Cham et al. May 2018 B1
9973935 Garg et al. May 2018 B2
9973937 Morioka May 2018 B2
9973963 Mishra et al. May 2018 B2
9974099 Sivanesan et al. May 2018 B2
9979577 Naim et al. May 2018 B2
9980130 Rayment et al. May 2018 B2
9980222 De Jager et al. May 2018 B2
9980226 Zisimopoulos et al. May 2018 B2
9980274 Harada et al. May 2018 B2
9985909 Shihab et al. May 2018 B2
9986303 Takehara et al. May 2018 B2
9986402 Noor May 2018 B2
9986440 Guvenc May 2018 B2
9986586 Lee et al. May 2018 B2
9991875 Gathman et al. Jun 2018 B2
9992610 Michaud et al. Jun 2018 B2
9992690 Butchko et al. Jun 2018 B2
9992785 Fischer et al. Jun 2018 B2
9998856 Edge Jun 2018 B2
9999055 Ngo et al. Jun 2018 B2
20040068441 Werbitt Apr 2004 A1
20050030224 Koch Feb 2005 A1
20050080718 Desai Apr 2005 A1
20050249196 Ansari et al. Nov 2005 A1
20050286452 Hardgrave et al. Dec 2005 A1
20060019659 Rosenberg et al. Jan 2006 A1
20060111112 Maveddat May 2006 A1
20060294245 Raguparan et al. Dec 2006 A1
20070032225 Konicek et al. Feb 2007 A1
20070198748 Ametsitsi et al. Aug 2007 A1
20070252695 Bhavani Nov 2007 A1
20070297373 Saifullah et al. Dec 2007 A1
20080096553 Saksena et al. Apr 2008 A1
20080102832 Sengupta et al. May 2008 A1
20080146155 Makhlouf et al. Jun 2008 A1
20080146156 Makhlouf et al. Jun 2008 A1
20080146172 Makhlouf et al. Jun 2008 A1
20080182565 Lazaridis Jul 2008 A1
20080205414 Katz et al. Aug 2008 A1
20080207184 Wassingbo et al. Aug 2008 A1
20080214143 Heit et al. Sep 2008 A1
20080254845 Chang et al. Oct 2008 A1
20090109959 Elliott et al. Apr 2009 A1
20090286534 Garg et al. Nov 2009 A1
20090296671 Beach Dec 2009 A1
20090296672 Beach Dec 2009 A1
20090296673 Beach Dec 2009 A1
20100067546 Mishra et al. Mar 2010 A1
20100128565 Golparian May 2010 A1
20100251331 Li Sep 2010 A1
20100296441 Barkan Nov 2010 A1
20100296466 Mignot et al. Nov 2010 A1
20100316033 Atwal Dec 2010 A1
20110019652 Atwal Jan 2011 A1
20110106958 Thompson et al. May 2011 A1
20110131337 Yoon et al. Jun 2011 A1
20110153818 Vandwalle et al. Jun 2011 A1
20110165896 Stromberg et al. Jul 2011 A1
20110173092 Werbitt Jul 2011 A1
20110202645 Abdelal et al. Aug 2011 A1
20110221544 Chang et al. Sep 2011 A1
20120040606 Verfuerth Feb 2012 A1
20120044836 Sivavakeesar et al. Feb 2012 A1
20120112964 Thill et al. May 2012 A1
20120215911 Raleigh Aug 2012 A1
20120278199 Werbitt Nov 2012 A1
20120302203 Heit et al. Nov 2012 A1
20130034709 Takahashi et al. Feb 2013 A1
20130044603 Macias et al. Feb 2013 A1
20130079011 Duda Mar 2013 A1
20130089055 Keevill et al. Apr 2013 A1
20130115972 Ziskind et al. May 2013 A1
20130132854 Raleigh May 2013 A1
20130155849 Koodli et al. Jun 2013 A1
20130155851 Koodli et al. Jun 2013 A1
20130155965 Koodli Jun 2013 A1
20130198642 Carney et al. Aug 2013 A1
20130210472 Yan et al. Aug 2013 A1
20130225759 Takahashi et al. Aug 2013 A1
20130238994 Yurasits Sep 2013 A1
20130262122 Kim et al. Oct 2013 A1
20130310000 Prasad et al. Nov 2013 A1
20140086101 Barkan Mar 2014 A1
20140113623 Garg et al. Apr 2014 A1
20140136601 Kent et al. May 2014 A1
20140150031 Kumar May 2014 A1
20140185581 Senarath et al. Jul 2014 A1
20140247740 Koo Sep 2014 A1
20140286308 Lee et al. Sep 2014 A1
20140324952 Irwin et al. Oct 2014 A1
20140341018 Bhushan et al. Nov 2014 A1
20140341024 Bhushan et al. Nov 2014 A1
20140341035 Bhushan et al. Nov 2014 A1
20140341053 Bhushan et al. Nov 2014 A1
20140341135 Bhushan et al. Nov 2014 A1
20140341207 Bhushan et al. Nov 2014 A1
20140342745 Bhushan et al. Nov 2014 A1
20140362729 Michaud et al. Dec 2014 A1
20150024781 Konicek et al. Jan 2015 A1
20150026008 Werbitt Jan 2015 A1
20150031382 Damnjanovic et al. Jan 2015 A1
20150043523 Luo et al. Feb 2015 A1
20150049712 Chen et al. Feb 2015 A1
20150049715 Yerramalli et al. Feb 2015 A1
20150049741 Chen et al. Feb 2015 A1
20150055541 Zhang et al. Feb 2015 A1
20150055588 Yerramalli et al. Feb 2015 A1
20150056931 Yerramalli et al. Feb 2015 A1
20150065110 Nakao Mar 2015 A1
20150071060 Bhushan et al. Mar 2015 A1
20150071229 Yoon et al. Mar 2015 A1
20150078300 Xu et al. Mar 2015 A1
20150079982 Wu et al. Mar 2015 A1
20150085792 Reddy et al. Mar 2015 A1
20150085793 Luo et al. Mar 2015 A1
20150085794 Chen et al. Mar 2015 A1
20150085797 Ji et al. Mar 2015 A1
20150092702 Chen et al. Apr 2015 A1
20150098349 Wei et al. Apr 2015 A1
20150098412 Yerramalli et al. Apr 2015 A1
20150099525 Ji et al. Apr 2015 A1
20150103685 Butchko et al. Apr 2015 A1
20150103715 Chen et al. Apr 2015 A1
20150103777 Chen et al. Apr 2015 A1
20150105067 Valliappan et al. Apr 2015 A1
20150110065 Gaal et al. Apr 2015 A1
20150111569 Gupta Apr 2015 A1
20150131462 Puranik et al. May 2015 A1
20150131493 Navalekar et al. May 2015 A1
20150133057 Yavuz et al. May 2015 A1
20150133173 Edge et al. May 2015 A1
20150133184 Sadek et al. May 2015 A1
20150141043 Abramson et al. May 2015 A1
20150146562 Sivanesan et al. May 2015 A1
20150146799 Llu et al. May 2015 A1
20150155891 Soliman Jun 2015 A1
20150163811 Konstantinou et al. Jun 2015 A1
20150168174 Abramson et al. Jun 2015 A1
20150168175 Abramson et al. Jun 2015 A1
20150172986 Salkintzis Jun 2015 A1
20150177010 Abramson et al. Jun 2015 A1
20150180114 Achour Jun 2015 A1
20150195849 Bashar et al. Jul 2015 A1
20150201358 Barkan Jul 2015 A1
20150215100 Jeon et al. Jul 2015 A1
20150215827 Zhang et al. Jul 2015 A1
20150215840 Yiu et al. Jul 2015 A1
20150222410 Belghoul et al. Aug 2015 A1
20150222414 Tabet et al. Aug 2015 A1
20150223075 Bashar et al. Aug 2015 A1
20150223115 Liang et al. Aug 2015 A1
20150223243 Tabet et al. Aug 2015 A1
20150223244 Tabet et al. Aug 2015 A1
20150234442 Emami et al. Aug 2015 A1
20150241231 Abramson et al. Aug 2015 A1
20150242353 Kawai Aug 2015 A1
20150245250 Bhattacharjee et al. Aug 2015 A1
20150245376 Bashar et al. Aug 2015 A1
20150249639 Onno et al. Sep 2015 A1
20150250002 Sun et al. Sep 2015 A1
20150256303 Belghoul et al. Sep 2015 A1
20150264699 Fwu et al. Sep 2015 A1
20150270925 Lin et al. Sep 2015 A1
20150270936 Han et al. Sep 2015 A1
20150271226 Luby et al. Sep 2015 A1
20150271692 Han et al. Sep 2015 A1
20150271849 Gao Sep 2015 A1
20150280871 Xu et al. Oct 2015 A1
20150281691 Takehara et al. Oct 2015 A1
20150281966 Griot et al. Oct 2015 A1
20150281981 Msallem et al. Oct 2015 A1
20150282013 Kim et al. Oct 2015 A1
20150282042 Griot et al. Oct 2015 A1
20150288475 Tabet et al. Oct 2015 A1
20150288734 Harris et al. Oct 2015 A1
20150288809 Liang et al. Oct 2015 A1
20150288828 Lim et al. Oct 2015 A1
20150289121 Lesage et al. Oct 2015 A1
20150289208 Liu et al. Oct 2015 A1
20150293592 Cheong et al. Oct 2015 A1
20150296359 Edge Oct 2015 A1
20150296486 Park et al. Oct 2015 A1
20150296516 Jung Oct 2015 A1
20150304262 Guan et al. Oct 2015 A1
20150312623 Li et al. Oct 2015 A1
20150312775 Yi et al. Oct 2015 A1
20150312793 Jeon et al. Oct 2015 A1
20150312888 Li et al. Oct 2015 A1
20150318605 Talty et al. Nov 2015 A1
20150319701 Ng et al. Nov 2015 A1
20150319753 Chen et al. Nov 2015 A1
20150326612 Faccin et al. Nov 2015 A1
20150327275 Kwon et al. Nov 2015 A1
20150350290 Yang et al. Dec 2015 A1
20150350598 Yang et al. Dec 2015 A1
20150350859 Hiben Dec 2015 A1
20150350954 Faccin et al. Dec 2015 A1
20150350955 Somasundaram et al. Dec 2015 A1
20150351105 Lee et al. Dec 2015 A1
20150351115 Jeon et al. Dec 2015 A1
20150365790 Edge et al. Dec 2015 A1
20150365931 Ng et al. Dec 2015 A1
20150365989 Huang Dec 2015 A1
20150373674 Han et al. Dec 2015 A1
20150373682 Bashar et al. Dec 2015 A1
20150373726 Zhao et al. Dec 2015 A1
20150373741 Yerramalli et al. Dec 2015 A1
20150381215 Butterfield et al. Dec 2015 A1
20150381401 Butterfield et al. Dec 2015 A1
20150382398 Guo Dec 2015 A1
20160007207 Agardh et al. Jan 2016 A1
20160007322 Agardh et al. Jan 2016 A1
20160007350 Xiong et al. Jan 2016 A1
20160007368 Moon et al. Jan 2016 A1
20160007373 Davydov et al. Jan 2016 A1
20160007378 Bertorelle et al. Jan 2016 A1
20160014586 Stupar et al. Jan 2016 A1
20160014664 Singh et al. Jan 2016 A1
20160021487 Chen et al. Jan 2016 A1
20160021661 Yerramalli et al. Jan 2016 A1
20160029229 Malik et al. Jan 2016 A1
20160029246 Mishra et al. Jan 2016 A1
20160037340 Rayment et al. Feb 2016 A1
20160037401 Lee et al. Feb 2016 A1
20160037490 Pazhyannur et al. Feb 2016 A1
20160037550 Barabell et al. Feb 2016 A1
20160037557 Gu et al. Feb 2016 A1
20160043841 Lunttila et al. Feb 2016 A1
20160043854 Damnjanovic et al. Feb 2016 A1
20160044065 Zhu et al. Feb 2016 A1
20160044516 Hedayat et al. Feb 2016 A1
20160044531 Papa et al. Feb 2016 A1
20160044565 Lee et al. Feb 2016 A1
20160044667 Chen et al. Feb 2016 A1
20160057668 Lee et al. Feb 2016 A1
20160066195 Moon et al. Mar 2016 A1
20160066204 Khawer et al. Mar 2016 A1
20160066306 Khawer et al. Mar 2016 A1
20160066325 Kim et al. Mar 2016 A1
20160073265 Vutukuri et al. Mar 2016 A1
20160073283 Grayson et al. Mar 2016 A1
20160073299 Liang et al. Mar 2016 A1
20160073344 Vutukuri et al. Mar 2016 A1
20160073366 Ng et al. Mar 2016 A1
20160073404 Vutukuri et al. Mar 2016 A1
20160073405 Khawer et al. Mar 2016 A1
20160073409 Chen et al. Mar 2016 A1
20160073428 Vutukuri et al. Mar 2016 A1
20160080108 Ben Ami et al. Mar 2016 A1
20160080433 Liu et al. Mar 2016 A1
20160081064 Kwak et al. Mar 2016 A1
20160081082 Cao et al. Mar 2016 A1
20160088585 Garg Mar 2016 A1
20160088625 Kadous et al. Mar 2016 A1
20160088631 Hedayat et al. Mar 2016 A1
20160088642 Yang et al. Mar 2016 A1
20160094317 Erceg et al. Mar 2016 A1
20160095048 Nory et al. Mar 2016 A1
20160095110 Li et al. Mar 2016 A1
20160095130 Ho Mar 2016 A1
20160099794 Chendamarai Kannan et al. Apr 2016 A1
20160099799 Bashar et al. Apr 2016 A1
20160100318 Wei Apr 2016 A1
20160100331 Ahmavaara Apr 2016 A1
20160100400 Lu et al. Apr 2016 A1
20160100404 Han et al. Apr 2016 A1
20160100405 Hunukumbure et al. Apr 2016 A1
20160103201 Lee Apr 2016 A1
20160105360 Erickson et al. Apr 2016 A1
20160105880 Bao et al. Apr 2016 A1
20160105897 Liu et al. Apr 2016 A1
20160105915 Zhang et al. Apr 2016 A1
20160112096 Zhao et al. Apr 2016 A1
20160112851 Li et al. Apr 2016 A1
20160112992 Bhushan et al. Apr 2016 A1
20160113018 Li Apr 2016 A1
20160119052 Frerking et al. Apr 2016 A1
20160119791 Koskinen et al. Apr 2016 A1
20160119846 Chou et al. Apr 2016 A1
20160119867 Garg Apr 2016 A1
20160119938 Frerking et al. Apr 2016 A1
20160127057 Yang May 2016 A1
20160127097 Chen et al. May 2016 A1
20160127098 Ng et al. May 2016 A1
20160127104 Levy May 2016 A1
20160127108 Jindal et al. May 2016 A1
20160127989 Zhang et al. May 2016 A1
20160128008 Levy et al. May 2016 A1
20160128020 Agarwal et al. May 2016 A1
20160128080 Verma et al. May 2016 A1
20160128084 Novlan et al. May 2016 A1
20160128115 Panteleev et al. May 2016 A1
20160135080 Pazhyannur et al. May 2016 A1
20160135132 Donepudi et al. May 2016 A1
20160135143 Won et al. May 2016 A1
20160135148 Novlan et al. May 2016 A1
20160135185 Chandrasekhar et al. May 2016 A1
20160135189 Chandrasekhar et al. May 2016 A1
20160142252 Garg et al. May 2016 A1
20160142447 Mufti et al. May 2016 A1
20160142880 Talluri et al. May 2016 A1
20160142944 Cao May 2016 A1
20160143014 Mukherjee et al. May 2016 A1
20160156393 Chen et al. Jun 2016 A1
20160156548 Pazhyannur et al. Jun 2016 A1
20160156783 Mufti et al. Jun 2016 A1
20160157162 Batta et al. Jun 2016 A1
20160157173 Shen Jun 2016 A1
20160157230 Nord et al. Jun 2016 A1
20160157293 Pazhyannur et al. Jun 2016 A1
20160165333 Gokingco et al. Jun 2016 A1
20160165604 Khawer et al. Jun 2016 A1
20160173249 Kwon et al. Jun 2016 A1
20160173361 Somasundaram et al. Jun 2016 A1
20160182204 Hsieh Jun 2016 A1
20160182267 Fechtel Jun 2016 A1
20160183097 Richards et al. Jun 2016 A1
20160183131 Khawer et al. Jun 2016 A1
20160183139 Meredith et al. Jun 2016 A1
20160183204 Seo Jun 2016 A1
20160183220 Rashid et al. Jun 2016 A1
20160183263 Liu et al. Jun 2016 A1
20160183313 Vallabhu et al. Jun 2016 A1
20160192396 Ng Jun 2016 A1
20160205562 Wei Jul 2016 A1
20160205679 Yoo et al. Jul 2016 A1
20160212629 Wei et al. Jul 2016 A1
20160212649 Chen et al. Jul 2016 A1
20160212734 He et al. Jul 2016 A1
20160212755 Cao et al. Jul 2016 A1
20160212798 Jha et al. Jul 2016 A1
20160216130 Abramson et al. Jul 2016 A1
20160218832 Dabeer et al. Jul 2016 A1
20160218891 Nammi et al. Jul 2016 A1
20160219448 Davydov Jul 2016 A1
20160219487 Khawer et al. Jul 2016 A1
20160219557 He et al. Jul 2016 A1
20160219589 Khawer et al. Jul 2016 A1
20160219590 Khawer et al. Jul 2016 A1
20160219597 Valliappan et al. Jul 2016 A1
20160219618 Rico Alvarino et al. Jul 2016 A1
20160223641 Cheng et al. Aug 2016 A1
20160226632 Zhang et al. Aug 2016 A1
20160226923 Purkop et al. Aug 2016 A1
20160227416 Suzuki et al. Aug 2016 A1
20160227427 Vajapeyam et al. Aug 2016 A1
20160227428 Novlan et al. Aug 2016 A1
20160227519 Nimbalker et al. Aug 2016 A1
20160227536 Khawer et al. Aug 2016 A1
20160227548 Nimbalker et al. Aug 2016 A1
20160227571 Baek et al. Aug 2016 A1
20160227578 Lee et al. Aug 2016 A1
20160233989 Belghoul et al. Aug 2016 A1
20160234706 Liu et al. Aug 2016 A1
20160234748 Chrisikos et al. Aug 2016 A1
20160234763 Um et al. Aug 2016 A1
20160234841 Pao et al. Aug 2016 A1
20160234870 Borges et al. Aug 2016 A1
20160240923 Oh et al. Aug 2016 A1
20160242153 Chen et al. Aug 2016 A1
20160242183 Kang et al. Aug 2016 A1
20160242186 Nissila Aug 2016 A1
20160248555 Lei et al. Aug 2016 A1
20160249224 Prasad et al. Aug 2016 A1
20160249255 Khawer et al. Aug 2016 A1
20160249350 Koutsimanis et al. Aug 2016 A1
20160255627 Malik et al. Sep 2016 A1
20160255642 Malik et al. Sep 2016 A1
20160255643 Malik et al. Sep 2016 A1
20160255644 Malik et al. Sep 2016 A1
20160255653 Malik et al. Sep 2016 A1
20160255664 Li Sep 2016 A1
20160259923 Papa et al. Sep 2016 A1
20160261904 Qian et al. Sep 2016 A1
20160262038 Dunn et al. Sep 2016 A1
20160262184 Wentink Sep 2016 A1
20160269460 Kent et al. Sep 2016 A1
20160269941 Chai et al. Sep 2016 A1
20160269943 Ji et al. Sep 2016 A1
20160269978 Bashar et al. Sep 2016 A1
20160270063 Chen et al. Sep 2016 A1
20160270100 Ng et al. Sep 2016 A1
20160270141 Sharma et al. Sep 2016 A1
20160274215 Edge et al. Sep 2016 A1
20160277165 Wei Sep 2016 A1
20160277935 Singh et al. Sep 2016 A1
20160277992 Cao Sep 2016 A1
20160278074 Yang et al. Sep 2016 A1
20160278118 Yerramalli et al. Sep 2016 A1
20160285539 Sadiq et al. Sep 2016 A1
20160285727 Yi et al. Sep 2016 A1
20160285935 Wu et al. Sep 2016 A1
20160286374 Baghel et al. Sep 2016 A1
20160286438 Weingertner Sep 2016 A1
20160286545 Luo et al. Sep 2016 A1
20160286559 Abedini et al. Sep 2016 A1
20160291665 Wang et al. Oct 2016 A1
20160295420 Luo et al. Oct 2016 A1
20160295494 Gulati et al. Oct 2016 A1
20160295496 Atarius et al. Oct 2016 A1
20160295499 Tavildar et al. Oct 2016 A1
20160295510 Zisimopoulos et al. Oct 2016 A1
20160295515 Cai et al. Oct 2016 A1
20160295614 Lee et al. Oct 2016 A1
20160295624 Novlan et al. Oct 2016 A1
20160301504 Toskala et al. Oct 2016 A1
20160302076 Chou et al. Oct 2016 A1
20160302137 Escott et al. Oct 2016 A1
20160302176 Ahn et al. Oct 2016 A1
20160302183 Yang et al. Oct 2016 A1
20160302184 Belleschi et al. Oct 2016 A1
20160302230 Novlan et al. Oct 2016 A1
20160308658 Zhang et al. Oct 2016 A1
20160309309 Dong et al. Oct 2016 A1
20160309354 Yerramalli et al. Oct 2016 A1
20160309373 Khawer et al. Oct 2016 A1
20160309463 Khawer Oct 2016 A1
20160315751 Chandwani et al. Oct 2016 A1
20160316426 Kumar Oct 2016 A1
20160323720 Patel et al. Nov 2016 A1
20160330630 Yoo et al. Nov 2016 A1
20160330645 Mishra et al. Nov 2016 A1
20160330678 Yoon et al. Nov 2016 A1
20160330703 Shim et al. Nov 2016 A1
20160330739 Webb et al. Nov 2016 A1
20160330771 Tan Nov 2016 A1
20160334837 Dees et al. Nov 2016 A1
20160336983 Wang et al. Nov 2016 A1
20160337007 Seyedmehdi et al. Nov 2016 A1
20160337094 Andreoli-Fang et al. Nov 2016 A1
20160337101 Gao et al. Nov 2016 A1
20160337109 Yasukawa et al. Nov 2016 A1
20160337279 Lu et al. Nov 2016 A1
20160337817 Malladi et al. Nov 2016 A1
20160337865 Morioka Nov 2016 A1
20160337935 Patil et al. Nov 2016 A1
20160337954 Gulati et al. Nov 2016 A1
20160338019 Ratasuk et al. Nov 2016 A1
20160338054 Oh et al. Nov 2016 A1
20160338071 Khosla et al. Nov 2016 A1
20160338096 Vajapeyam et al. Nov 2016 A1
20160338097 Andreoli-Fang et al. Nov 2016 A1
20160338118 Vajapeyam et al. Nov 2016 A1
20160344782 Cheng et al. Nov 2016 A1
20160345192 Garg et al. Nov 2016 A1
20160345206 Yerramalli et al. Nov 2016 A1
20160345265 Lee et al. Nov 2016 A1
20160345284 Yared Nov 2016 A1
20160345332 Cheng et al. Nov 2016 A1
20160345345 Malik et al. Nov 2016 A1
20160345360 Papaleo et al. Nov 2016 A1
20160353437 Sun et al. Dec 2016 A1
20160353452 Chen et al. Dec 2016 A1
20160353467 Nekovee Dec 2016 A1
20160353494 Yang et al. Dec 2016 A1
20160358394 Konicek et al. Dec 2016 A1
20160360420 Liu et al. Dec 2016 A1
20160360458 Lubenski Dec 2016 A1
20160360556 Jeong et al. Dec 2016 A1
20160365879 Soliman et al. Dec 2016 A1
20160366623 Senarath et al. Dec 2016 A1
20160366638 Kumar Dec 2016 A1
20160373235 Oh et al. Dec 2016 A1
20160373935 Smith et al. Dec 2016 A1
20160373944 Jain et al. Dec 2016 A1
20160373958 Cao et al. Dec 2016 A1
20160374079 Yasukawa et al. Dec 2016 A1
20160380665 Lee et al. Dec 2016 A1
20160381536 Li et al. Dec 2016 A1
20160381567 Bhushan et al. Dec 2016 A1
20160381600 Aksu Dec 2016 A1
20160381618 Sayem et al. Dec 2016 A1
20160381680 Yasukawa et al. Dec 2016 A1
20170004665 Chang et al. Jan 2017 A1
20170006535 Verma et al. Jan 2017 A1
20170006583 Tavildar et al. Jan 2017 A1
20170006626 Lin et al. Jan 2017 A1
20170006632 Elliott et al. Jan 2017 A1
20170012754 Sun et al. Jan 2017 A1
20170013496 Gupta Jan 2017 A1
20170013513 Agarwal et al. Jan 2017 A1
20170013622 Taylor Jan 2017 A1
20170019291 Tapia et al. Jan 2017 A1
20170019315 Tapia et al. Jan 2017 A1
20170019838 Harada et al. Jan 2017 A1
20170019887 Jiang et al. Jan 2017 A1
20170019909 Si et al. Jan 2017 A1
20170026845 Garg et al. Jan 2017 A1
20170026945 Han et al. Jan 2017 A1
20170027002 Yerramalli et al. Jan 2017 A1
20170033829 Homchaudhuri et al. Feb 2017 A1
20170034745 Dhanapal et al. Feb 2017 A1
20170034756 Faccin et al. Feb 2017 A1
20170034767 Griot et al. Feb 2017 A1
20170034831 Yerramalli et al. Feb 2017 A1
20170034832 Karimli et al. Feb 2017 A1
20170034851 Kwon et al. Feb 2017 A1
20170034871 Shitara Feb 2017 A1
20170041042 Wei Feb 2017 A1
20170041158 Morioka Feb 2017 A1
20170041803 Shi et al. Feb 2017 A1
20170041805 Chandrasekhar et al. Feb 2017 A1
20170041820 Wei et al. Feb 2017 A1
20170041844 Richards et al. Feb 2017 A1
20170041922 Chen et al. Feb 2017 A1
20170041947 Kim et al. Feb 2017 A1
20170041949 Ngo et al. Feb 2017 A1
20170041954 Tsai et al. Feb 2017 A1
20170041955 Abraham et al. Feb 2017 A1
20170041956 Abraham et al. Feb 2017 A1
20170041957 Pazhyannur et al. Feb 2017 A1
20170048041 Yi et al. Feb 2017 A1
20170048728 Ngo et al. Feb 2017 A1
20170048748 Susitaival et al. Feb 2017 A1
20170048855 Garg et al. Feb 2017 A1
20170048858 Ngo et al. Feb 2017 A1
20170048861 Choi et al. Feb 2017 A1
20170048864 Ngo et al. Feb 2017 A1
20170048875 Martin et al. Feb 2017 A1
20170048919 Gaal et al. Feb 2017 A1
20170055181 Tiirola et al. Feb 2017 A1
20170055193 Mueck et al. Feb 2017 A1
20170055268 Aksu Feb 2017 A1
20170055282 Sadiq et al. Feb 2017 A1
20170063479 Kim et al. Mar 2017 A1
20170063498 Venkatsuresh et al. Mar 2017 A1
20170064558 Li Mar 2017 A1
20170064559 Li Mar 2017 A1
20170064712 Huang et al. Mar 2017 A1
20170064727 Chrisikos Mar 2017 A1
20170064770 Patwardhan et al. Mar 2017 A1
20170069963 Wattwood et al. Mar 2017 A1
20170070436 Lubenski et al. Mar 2017 A1
20170070617 Vasudevan et al. Mar 2017 A1
20170070906 Luo et al. Mar 2017 A1
20170070935 Karimli et al. Mar 2017 A1
20170070993 Ngo et al. Mar 2017 A1
20170078865 Santhanam et al. Mar 2017 A1
20170078983 Ahn et al. Mar 2017 A1
20170079013 Noh et al. Mar 2017 A1
20170079060 Keating et al. Mar 2017 A1
20170085292 Jung et al. Mar 2017 A1
20170085326 Li et al. Mar 2017 A1
20170085346 Tiirola et al. Mar 2017 A1
20170086209 Panchal et al. Mar 2017 A1
20170086216 Patil et al. Mar 2017 A1
20170086225 Ljung Mar 2017 A1
20170086226 Wang Mar 2017 A1
20170090484 Obaidi Mar 2017 A1
20170092996 Rodriguez et al. Mar 2017 A1
20170093508 Martin Mar 2017 A1
20170093620 Um et al. Mar 2017 A1
20170094528 Takeda et al. Mar 2017 A1
20170094535 Nuss et al. Mar 2017 A1
20170094546 Chai et al. Mar 2017 A1
20170094574 Singh et al. Mar 2017 A1
20170094651 Green et al. Mar 2017 A1
20170094681 Takeda et al. Mar 2017 A1
20170099198 Bhimavarapu et al. Apr 2017 A1
20170099204 Park et al. Apr 2017 A1
20170099338 Yang et al. Apr 2017 A1
20170099624 Baghel et al. Apr 2017 A1
20170099625 Li et al. Apr 2017 A1
20170099664 Lunttila et al. Apr 2017 A1
20170099666 Nama Apr 2017 A1
20170105193 Liu et al. Apr 2017 A1
20170105218 Tabet et al. Apr 2017 A1
20170111150 Han et al. Apr 2017 A1
20170111217 Kim et al. Apr 2017 A1
20170111754 Baghel et al. Apr 2017 A1
20170111802 Bhushan et al. Apr 2017 A1
20170111874 Harada et al. Apr 2017 A1
20170111889 Li et al. Apr 2017 A1
20170111931 Damnjanovic et al. Apr 2017 A1
20170117997 Park et al. Apr 2017 A1
20170118001 Yi et al. Apr 2017 A1
20170118688 Guvenc Apr 2017 A1
20170118708 Alon et al. Apr 2017 A1
20170118728 Harada et al. Apr 2017 A1
20170118763 Zhao et al. Apr 2017 A1
20170118776 Yasukawa et al. Apr 2017 A1
20170118792 Rico Alvarino et al. Apr 2017 A1
20170123049 Tsai et al. May 2017 A1
20170124008 Chen et al. May 2017 A1
20170124013 Vaillancourt et al. May 2017 A1
20170126288 Sandhu et al. May 2017 A1
20170126300 Park et al. May 2017 A1
20170126306 Kim et al. May 2017 A1
20170126365 Peng et al. May 2017 A1
20170127256 Hua et al. May 2017 A1
20170127325 Vikberg et al. May 2017 A1
20170127330 Payyappilly et al. May 2017 A1
20170127362 Tavildar et al. May 2017 A1
20170127409 Mishra et al. May 2017 A1
20170127413 Guan et al. May 2017 A1
20170127414 Yi et al. May 2017 A1
20170127417 Andreoli-Fang et al. May 2017 A1
20170127442 Sun et al. May 2017 A1
20170127444 Goto et al. May 2017 A1
20170127470 Vajapeyam et al. May 2017 A1
20170134080 Rahman et al. May 2017 A1
20170134199 Wang et al. May 2017 A1
20170134241 Jang et al. May 2017 A1
20170134294 Li et al. May 2017 A1
20170135095 Chandwani et al. May 2017 A1
20170139485 Fogelmark et al. May 2017 A1
20170141463 Wattwood et al. May 2017 A1
20170142592 Fischer et al. May 2017 A1
20170142599 Babaei et al. May 2017 A1
20170142653 Qi et al. May 2017 A1
20170142711 Yi et al. May 2017 A1
20170142720 Andreoli-Fang et al. May 2017 A1
20170142728 Tsai et al. May 2017 A1
20170142735 Ben Ami et al. May 2017 A1
20170142740 Gou et al. May 2017 A1
20170142742 Fischer et al. May 2017 A1
20170142743 Yoon et al. May 2017 A1
20170142751 Liu et al. May 2017 A1
20170142752 Schmidt May 2017 A1
20170149444 Lin et al. May 2017 A1
20170149484 Nimbalker et al. May 2017 A1
20170149543 Ang et al. May 2017 A1
20170149833 Ngo et al. May 2017 A1
20170149846 Mufti et al. May 2017 A1
20170150351 Narasimha et al. May 2017 A1
20170150352 Narasimha et al. May 2017 A1
20170150368 Ngo et al. May 2017 A1
20170150382 Martin et al. May 2017 A1
20170150500 Ahn et al. May 2017 A1
20170150509 Halabian et al. May 2017 A1
20170150514 Li May 2017 A1
20170150524 Oh et al. May 2017 A1
20170150548 Shah et al. May 2017 A1
20170156075 Harada et al. Jun 2017 A1
20170156149 Lin et al. Jun 2017 A1
20170163297 Hou et al. Jun 2017 A1
20170163298 Hou et al. Jun 2017 A1
20170163388 Wiemann et al. Jun 2017 A1
20170163484 Hou et al. Jun 2017 A1
20170164177 Wang et al. Jun 2017 A1
20170164195 Stammers et al. Jun 2017 A1
20170164208 Nielsen et al. Jun 2017 A1
20170164230 You et al. Jun 2017 A1
20170164247 Wiemann et al. Jun 2017 A1
20170164301 Jeon et al. Jun 2017 A1
20170164345 Goto et al. Jun 2017 A1
20170164352 Yang et al. Jun 2017 A1
20170164384 Wang et al. Jun 2017 A1
20170164402 Zhang et al. Jun 2017 A1
20170164403 Lindheimer et al. Jun 2017 A1
20170169458 Singh Jun 2017 A1
20170169833 Lecomte et al. Jun 2017 A1
20170170943 Zeng et al. Jun 2017 A1
20170171761 Guvenc Jun 2017 A1
20170171783 Reddy et al. Jun 2017 A1
20170171815 De Jager et al. Jun 2017 A1
20170171820 Kronestedt et al. Jun 2017 A1
20170171840 Mukherjee et al. Jun 2017 A1
20170171856 Zeng et al. Jun 2017 A1
20170171883 Noh et al. Jun 2017 A1
20170176539 Younger Jun 2017 A1
20170180001 Wang et al. Jun 2017 A1
20170180085 Balasubramanian Jun 2017 A1
20170180938 Smith Jun 2017 A1
20170180999 Alderfer et al. Jun 2017 A1
20170181002 Ngo et al. Jun 2017 A1
20170181003 Chen et al. Jun 2017 A1
20170181015 Ngo et al. Jun 2017 A1
20170181022 Yang et al. Jun 2017 A1
20170181040 Chandwani et al. Jun 2017 A1
20170181057 Kishiyama et al. Jun 2017 A1
20170181119 Garg Jun 2017 A1
20170181197 Aguirre et al. Jun 2017 A1
20170181213 Barkan Jun 2017 A1
20170187886 Rashid et al. Jun 2017 A1
20170188183 Lihosit et al. Jun 2017 A1
20170188284 Karimli et al. Jun 2017 A1
20170188323 Bhushan et al. Jun 2017 A1
20170188353 Islam et al. Jun 2017 A1
20170188364 Li et al. Jun 2017 A1
20170188391 Rajagopal et al. Jun 2017 A1
20170195099 Kahtava et al. Jul 2017 A1
20170195883 Kwok et al. Jul 2017 A1
20170195888 Gou et al. Jul 2017 A1
20170195889 Takeda et al. Jul 2017 A1
20170196009 Martin et al. Jul 2017 A1
20170196020 Mukherjee et al. Jul 2017 A1
20170201218 Wang et al. Jul 2017 A1
20170201308 Park et al. Jul 2017 A1
20170201461 Cheng et al. Jul 2017 A1
20170201895 Hassan et al. Jul 2017 A1
20170201935 Um et al. Jul 2017 A1
20170201964 Gupta et al. Jul 2017 A1
20170201997 Cheng et al. Jul 2017 A1
20170202006 Rao et al. Jul 2017 A1
20170202019 You et al. Jul 2017 A1
20170202043 Seo Jul 2017 A1
20170202052 Xu et al. Jul 2017 A1
20170207880 Sun et al. Jul 2017 A1
20170207894 Wang et al. Jul 2017 A1
20170207895 Yang et al. Jul 2017 A1
20170208462 Zaifuddin et al. Jul 2017 A1
20170208475 Yi et al. Jul 2017 A1
20170208560 Papa et al. Jul 2017 A1
20170208588 Park et al. Jul 2017 A1
20170208627 You et al. Jul 2017 A1
20170208638 Baghel et al. Jul 2017 A1
20170214655 Bhushan et al. Jul 2017 A1
20170215081 Yi et al. Jul 2017 A1
20170215082 Hwang et al. Jul 2017 A1
20170215096 Moon et al. Jul 2017 A1
20170215102 Hassan et al. Jul 2017 A1
20170215157 Yang et al. Jul 2017 A1
20170215171 Sun et al. Jul 2017 A1
20170215172 Yang et al. Jul 2017 A1
20170215179 Choi et al. Jul 2017 A1
20170215183 Gulati et al. Jul 2017 A1
20170215191 Martin Jul 2017 A1
20170215202 Yang et al. Jul 2017 A1
20170215205 Takeda et al. Jul 2017 A1
20170215206 Cheng et al. Jul 2017 A1
20170222661 Sun et al. Aug 2017 A1
20170222746 Kang et al. Aug 2017 A1
20170222763 Lee et al. Aug 2017 A1
20170222951 Shihab et al. Aug 2017 A1
20170223550 Takeda et al. Aug 2017 A1
20170223561 Radulescu et al. Aug 2017 A1
20170223597 Telang et al. Aug 2017 A1
20170223643 Ahn et al. Aug 2017 A1
20170223716 Li et al. Aug 2017 A1
20170223723 Das et al. Aug 2017 A1
20170223727 Davydov et al. Aug 2017 A1
20170223738 Seo et al. Aug 2017 A1
20170223742 Shimomura et al. Aug 2017 A1
20170230213 Wang et al. Aug 2017 A1
20170230818 Park et al. Aug 2017 A1
20170230838 Yerramalli et al. Aug 2017 A1
20170230844 Li et al. Aug 2017 A1
20170230933 Radulescu et al. Aug 2017 A1
20170230970 Kim et al. Aug 2017 A1
20170230972 Wang et al. Aug 2017 A1
20170231001 Yang et al. Aug 2017 A1
20170231003 Godana et al. Aug 2017 A1
20170231013 Ahn et al. Aug 2017 A1
20170234691 Abramson et al. Aug 2017 A1
20170237146 Dureja Aug 2017 A1
20170238136 Smith Aug 2017 A1
20170238188 Youtz et al. Aug 2017 A1
20170238190 Yang et al. Aug 2017 A1
20170238233 Oh et al. Aug 2017 A1
20170238252 Dalsgaard et al. Aug 2017 A1
20170238272 You et al. Aug 2017 A1
20170238278 Yadav Aug 2017 A1
20170238312 Chen et al. Aug 2017 A1
20170238319 Luft et al. Aug 2017 A1
20170238325 Singh et al. Aug 2017 A1
20170238326 Ahn et al. Aug 2017 A1
20170238330 Jiang et al. Aug 2017 A1
20170244166 Dong et al. Aug 2017 A1
20170245153 Singh et al. Aug 2017 A1
20170245155 Wang Aug 2017 A1
20170245156 Gou et al. Aug 2017 A1
20170245168 Yi et al. Aug 2017 A1
20170245280 Yi et al. Aug 2017 A1
20170245302 Mukherjee et al. Aug 2017 A1
20170245303 Falconetti et al. Aug 2017 A1
20170245304 Andreoli-Fang et al. Aug 2017 A1
20170250781 Golitschek Edler Von Elbwart et al. Aug 2017 A1
20170251372 Belghoul et al. Aug 2017 A1
20170251373 Ding et al. Aug 2017 A1
20170251374 Leinonen et al. Aug 2017 A1
20170251375 Yang et al. Aug 2017 A1
20170251380 Schabel et al. Aug 2017 A1
20170251454 Yang et al. Aug 2017 A1
20170257773 Boudreau et al. Sep 2017 A1
20170257776 Agardh et al. Sep 2017 A1
20170257808 Li Sep 2017 A1
20170257847 Aguirre et al. Sep 2017 A1
20170257850 Oh et al. Sep 2017 A1
20170257852 Wu Sep 2017 A1
20170257865 Halabian et al. Sep 2017 A1
20170257879 Kang et al. Sep 2017 A1
20170257898 Maaref Sep 2017 A1
20170264408 Patel et al. Sep 2017 A1
20170264419 Fakoorian et al. Sep 2017 A1
20170264466 Hosseini et al. Sep 2017 A1
20170264488 Ben Ami et al. Sep 2017 A1
20170264613 Phillips et al. Sep 2017 A1
20170265083 Khojastepour et al. Sep 2017 A1
20170265095 Harada et al. Sep 2017 A1
20170265096 Goto et al. Sep 2017 A1
20170265104 Arslan et al. Sep 2017 A1
20170265106 Andreoli-Fang et al. Sep 2017 A1
20170265168 Wang et al. Sep 2017 A1
20170265172 Futaki Sep 2017 A1
20170265187 Chen et al. Sep 2017 A1
20170265193 Wang et al. Sep 2017 A1
20170265205 Homchaudhuri et al. Sep 2017 A1
20170265206 Andreoli-Fang et al. Sep 2017 A1
20170265220 Andreoli-Fang et al. Sep 2017 A1
20170265225 Takeda et al. Sep 2017 A1
20170272291 Naim et al. Sep 2017 A1
20170272345 Viorel et al. Sep 2017 A1
20170272931 Bottari et al. Sep 2017 A1
20170272957 Xu et al. Sep 2017 A1
20170272988 Hoidis et al. Sep 2017 A1
20170273055 Xu et al. Sep 2017 A1
20170273084 Yi et al. Sep 2017 A1
20170273086 Ngo et al. Sep 2017 A1
20170273108 Damnjanovic et al. Sep 2017 A1
20170273110 Chen Sep 2017 A1
20170273111 Wong et al. Sep 2017 A1
20170273128 Abedini et al. Sep 2017 A1
20170273130 Panteleev et al. Sep 2017 A1
20170279512 Wang Sep 2017 A1
20170279564 Nord et al. Sep 2017 A1
20170279565 Han et al. Sep 2017 A1
20170279957 Abramson et al. Sep 2017 A1
20170280330 Martin Sep 2017 A1
20170280336 Sun et al. Sep 2017 A1
20170280341 Nigam et al. Sep 2017 A1
20170280399 Chrisikos et al. Sep 2017 A1
20170280425 Yang et al. Sep 2017 A1
20170280440 Oh et al. Sep 2017 A1
20170280445 Jiang et al. Sep 2017 A1
20170280448 Takeda et al. Sep 2017 A1
20170280468 Harada et al. Sep 2017 A1
20170280480 Wong et al. Sep 2017 A1
20170280506 Kim Sep 2017 A1
20170288794 Yerramalli et al. Oct 2017 A1
20170288813 Khan et al. Oct 2017 A1
20170288823 Bhushan et al. Oct 2017 A1
20170288848 Lei et al. Oct 2017 A1
20170288888 Rico Alvarino et al. Oct 2017 A1
20170288962 Yi et al. Oct 2017 A1
20170289167 Kasilya Sudarsan et al. Oct 2017 A1
20170289818 Ng et al. Oct 2017 A1
20170289829 Rico Alvarino et al. Oct 2017 A1
20170289833 Heinikoski et al. Oct 2017 A1
20170289853 Ahn et al. Oct 2017 A1
20170289936 Chae et al. Oct 2017 A1
20170289937 Urabayashi et al. Oct 2017 A1
20170289938 Yoo et al. Oct 2017 A1
20170289957 Zhang et al. Oct 2017 A1
20170289966 Islam et al. Oct 2017 A1
20170289993 Yerramalli et al. Oct 2017 A1
20170290002 Subramanian et al. Oct 2017 A1
20170290037 Goel et al. Oct 2017 A1
20170290047 Islam et al. Oct 2017 A1
20170290048 Amuru et al. Oct 2017 A1
20170290059 Karaki et al. Oct 2017 A1
20170294958 Ahn et al. Oct 2017 A1
20170294997 Lee et al. Oct 2017 A1
20170295000 Yoo et al. Oct 2017 A1
20170295046 Ahn et al. Oct 2017 A1
20170295069 Sweet et al. Oct 2017 A1
20170295178 Cheng et al. Oct 2017 A1
20170295498 Han et al. Oct 2017 A1
20170295500 Sun et al. Oct 2017 A1
20170295510 Sharma et al. Oct 2017 A1
20170295576 Fukuta et al. Oct 2017 A1
20170296436 Ziv et al. Oct 2017 A1
20170300659 Ziv et al. Oct 2017 A1
20170300660 Ziv et al. Oct 2017 A1
20170302354 Islam et al. Oct 2017 A1
20170302414 Islam et al. Oct 2017 A1
20170302495 Islam et al. Oct 2017 A1
20170302496 Xu et al. Oct 2017 A1
20170303136 Park et al. Oct 2017 A1
20170303141 Islam et al. Oct 2017 A1
20170303158 Yang et al. Oct 2017 A1
20170303163 Sharma et al. Oct 2017 A1
20170303220 Sadeghi et al. Oct 2017 A1
20170303236 Sun et al. Oct 2017 A1
20170303246 Wang et al. Oct 2017 A1
20170303263 Islam et al. Oct 2017 A1
20170303304 Lee et al. Oct 2017 A1
20170303306 Lee et al. Oct 2017 A1
20170303312 Agiwal et al. Oct 2017 A1
20170310385 Hwang et al. Oct 2017 A1
20170310422 Baker et al. Oct 2017 A1
20170310434 Harada et al. Oct 2017 A1
20170310439 Yang et al. Oct 2017 A1
20170310452 Lee et al. Oct 2017 A1
20170311024 Zhou et al. Oct 2017 A1
20170311168 Khawer et al. Oct 2017 A1
20170311169 Cai et al. Oct 2017 A1
20170311191 Khawer et al. Oct 2017 A1
20170311194 Martin Oct 2017 A1
20170311195 Martin et al. Oct 2017 A1
20170311206 Ryoo et al. Oct 2017 A1
20170311320 Lunttila et al. Oct 2017 A1
20170311322 Kim et al. Oct 2017 A1
20170311339 Xu et al. Oct 2017 A1
20170316233 Kherani et al. Nov 2017 A1
20170317798 Kim et al. Nov 2017 A1
20170317816 Lei et al. Nov 2017 A1
20170317863 Agiwal et al. Nov 2017 A1
20170317938 Abraham et al. Nov 2017 A1
20170317939 Karlsson Nov 2017 A1
20170318471 Wang Nov 2017 A1
20170318473 Futaki Nov 2017 A1
20170318550 Wang Nov 2017 A1
20170318568 Nimbalker et al. Nov 2017 A1
20170318585 Wang Nov 2017 A1
20170323116 Mumford et al. Nov 2017 A1
20170324528 Rico Alvarino et al. Nov 2017 A1
20170325109 Cummings Nov 2017 A1
20170325184 Kwan et al. Nov 2017 A1
20170325201 Chen et al. Nov 2017 A1
20170325215 Takeda et al. Nov 2017 A1
20170325241 Toskala et al. Nov 2017 A1
20170325253 Wang et al. Nov 2017 A1
20170331758 Trichias et al. Nov 2017 A1
20170332192 Edge Nov 2017 A1
20170332246 Zhang et al. Nov 2017 A1
20170332255 Gupta et al. Nov 2017 A1
20170332256 Gupta et al. Nov 2017 A1
20170332267 Kim et al. Nov 2017 A1
20170332316 Itatsu Nov 2017 A1
20170332353 Viorel et al. Nov 2017 A1
20170332358 Park et al. Nov 2017 A1
20170332374 Koorapaty et al. Nov 2017 A1
20170332379 Wang et al. Nov 2017 A1
20170332388 Xu et al. Nov 2017 A1
20170338912 Nigam et al. Nov 2017 A1
20170339568 Wang et al. Nov 2017 A1
20170339580 Martin et al. Nov 2017 A1
20170339592 Yi et al. Nov 2017 A1
20170339626 Mustajarvi et al. Nov 2017 A1
20170339641 Nigam et al. Nov 2017 A1
20170339648 Wang et al. Nov 2017 A1
20170339683 Chen et al. Nov 2017 A1
20170339693 Cierny et al. Nov 2017 A1
20170339696 Xu et al. Nov 2017 A1
20170339706 Andreoli-Fang et al. Nov 2017 A1
20170339717 Futaki Nov 2017 A1
20170339719 Xu et al. Nov 2017 A1
20170339720 Kim et al. Nov 2017 A1
20170344224 Kay et al. Nov 2017 A1
20170346534 Islam et al. Nov 2017 A1
20170346535 Islam et al. Nov 2017 A1
20170346539 Islam et al. Nov 2017 A1
20170346543 Islam et al. Nov 2017 A1
20170346544 Islam et al. Nov 2017 A1
20170346545 Islam et al. Nov 2017 A1
20170346609 Li et al. Nov 2017 A1
20170346769 Mccray et al. Nov 2017 A1
20170347258 Carbone et al. Nov 2017 A1
20170347270 Iouchi et al. Nov 2017 A1
20170347272 Ahmavaara et al. Nov 2017 A1
20170347297 Li et al. Nov 2017 A1
20170347307 Mehta et al. Nov 2017 A1
20170347311 Iyer et al. Nov 2017 A1
20170347341 Zhang et al. Nov 2017 A1
20170347347 Yang Nov 2017 A1
20170347359 Yang et al. Nov 2017 A1
20170347365 Xu et al. Nov 2017 A1
20170347366 Ling et al. Nov 2017 A1
20170347378 Le-Ngoc et al. Nov 2017 A1
20170347379 Islam et al. Nov 2017 A1
20170347380 Islam et al. Nov 2017 A1
20170347382 Ji et al. Nov 2017 A1
20170353234 Islam et al. Dec 2017 A1
20170353842 Waddell Dec 2017 A1
20170353865 Li et al. Dec 2017 A1
20170353867 Baboescu et al. Dec 2017 A1
20170353874 Harrang et al. Dec 2017 A1
20170353975 Khawer et al. Dec 2017 A1
20170359114 Akkarakaran et al. Dec 2017 A1
20170359155 Harada et al. Dec 2017 A1
20170359728 Jiang et al. Dec 2017 A1
20170359737 Singh et al. Dec 2017 A1
20170359745 Lee et al. Dec 2017 A1
20170359746 Lee et al. Dec 2017 A1
20170359747 Lunden et al. Dec 2017 A1
20170359764 Yamamoto Dec 2017 A1
20170359806 Takeda et al. Dec 2017 A1
20170359817 Wittenmark et al. Dec 2017 A1
20170359826 Islam et al. Dec 2017 A1
20170359828 Ben Ami et al. Dec 2017 A1
20170366943 Yoon et al. Dec 2017 A1
20170366961 Sabeur Dec 2017 A1
20170366997 Kim et al. Dec 2017 A1
20170366998 Lee et al. Dec 2017 A1
20170367025 Ahn et al. Dec 2017 A1
20170367056 Wei Dec 2017 A1
20170367073 Murugan et al. Dec 2017 A1
20170367092 Kim et al. Dec 2017 A1
20170367106 Kim et al. Dec 2017 A1
20170373741 Yang et al. Dec 2017 A1
20170373780 Ahn et al. Dec 2017 A1
20170373792 Lunttila et al. Dec 2017 A1
20170373914 Harada et al. Dec 2017 A1
20170374569 Lee et al. Dec 2017 A1
20170374597 Ray et al. Dec 2017 A1
20170374623 Dhar et al. Dec 2017 A1
20170374653 Lee et al. Dec 2017 A1
20170374704 Sharma et al. Dec 2017 A1
20170374706 Sharma et al. Dec 2017 A1
20180006670 Liu et al. Jan 2018 A1
20180006776 Fwu et al. Jan 2018 A1
20180006788 Lee et al. Jan 2018 A1
20180006867 Yi et al. Jan 2018 A1
20180006954 Arora et al. Jan 2018 A1
20180007212 Sirotkin et al. Jan 2018 A1
20180007551 Wang et al. Jan 2018 A1
20180007576 Lee et al. Jan 2018 A1
20180007587 Feldman et al. Jan 2018 A1
20180007634 Pereira Jan 2018 A1
20180007643 Tiirola et al. Jan 2018 A1
20180007681 Yang et al. Jan 2018 A1
20180007708 Ke et al. Jan 2018 A1
20180007731 Park et al. Jan 2018 A1
20180013533 Yang et al. Jan 2018 A1
20180013897 Kumar et al. Jan 2018 A1
20180014146 Gulati et al. Jan 2018 A1
20180014205 Tsai et al. Jan 2018 A1
20180014211 Ngo et al. Jan 2018 A1
20180014304 Khoshnevisan et al. Jan 2018 A1
20180014317 Gulati et al. Jan 2018 A1
20180014324 Gu et al. Jan 2018 A1
20180014326 Wang et al. Jan 2018 A1
20180014341 Jung Jan 2018 A1
20180019802 Teague Jan 2018 A1
20180019836 Kim et al. Jan 2018 A1
20180019900 Sun et al. Jan 2018 A1
20180019970 Wu Jan 2018 A1
20180020081 Teague Jan 2018 A1
20180020091 Self et al. Jan 2018 A1
20180020355 Targali et al. Jan 2018 A1
20180020359 Belghoul et al. Jan 2018 A1
20180020360 Yerramalli et al. Jan 2018 A1
20180020371 Prasad et al. Jan 2018 A1
20180020376 Belghoul et al. Jan 2018 A1
20180020396 Yoshimura et al. Jan 2018 A1
20180020443 Lee et al. Jan 2018 A1
20180020445 Harada et al. Jan 2018 A1
20180020452 Yerramalli et al. Jan 2018 A1
20180020453 Lin et al. Jan 2018 A1
20180020479 Harada et al. Jan 2018 A1
20180026670 Homchaudhuri et al. Jan 2018 A1
20180027121 Liao Jan 2018 A1
20180027481 Xu et al. Jan 2018 A1
20180027549 Wang et al. Jan 2018 A1
20180027559 Iyer et al. Jan 2018 A1
20180027568 Harada et al. Jan 2018 A1
20180027574 Lee et al. Jan 2018 A1
20180027590 Yerramalli et al. Jan 2018 A1
20180027597 Ahn et al. Jan 2018 A1
20180034526 Lee et al. Feb 2018 A1
20180034610 He et al. Feb 2018 A1
20180034695 Balasubramanian et al. Feb 2018 A1
20180035300 Noellert et al. Feb 2018 A1
20180035393 Kazmi et al. Feb 2018 A1
20180035429 Jiaqing et al. Feb 2018 A1
20180035436 Sharma et al. Feb 2018 A1
20180035444 Wu et al. Feb 2018 A1
20180035457 Ngo et al. Feb 2018 A1
20180035463 Mallik et al. Feb 2018 A1
20180035465 Ahn et al. Feb 2018 A1
20180041190 Yoshimura et al. Feb 2018 A1
20180041314 Lin et al. Feb 2018 A1
20180041415 Nitinawarat et al. Feb 2018 A1
20180041981 Wu Feb 2018 A1
20180041999 Jackson et al. Feb 2018 A1
20180042012 Yerramalli et al. Feb 2018 A1
20180042018 Bhushan et al. Feb 2018 A1
20180042065 Jackson et al. Feb 2018 A1
20180047414 Kasilya Sudarsan et al. Feb 2018 A1
20180047417 Gummadi et al. Feb 2018 A1
20180048271 Patel et al. Feb 2018 A1
20180048293 Gathman et al. Feb 2018 A1
20180048366 Sundararajan et al. Feb 2018 A1
20180048403 Kim et al. Feb 2018 A1
20180048433 Martin et al. Feb 2018 A1
20180048498 Stern-Berkowitz et al. Feb 2018 A1
20180048512 Zeng et al. Feb 2018 A1
20180048572 Gulati et al. Feb 2018 A1
20180048577 Gulati et al. Feb 2018 A1
20180048700 Gummadi et al. Feb 2018 A1
20180049037 Lopez-Perez et al. Feb 2018 A1
20180049045 Wang et al. Feb 2018 A1
20180049079 Ozturk et al. Feb 2018 A1
20180049086 Bouvet et al. Feb 2018 A1
20180049143 Gupta et al. Feb 2018 A1
20180049162 Patil et al. Feb 2018 A1
20180049175 Bagheri et al. Feb 2018 A1
20180049190 Abedini et al. Feb 2018 A1
20180049206 Yerramalli et al. Feb 2018 A1
20180049209 Hu et al. Feb 2018 A1
20180049220 Patil et al. Feb 2018 A1
20180049241 Heo et al. Feb 2018 A1
20180053392 White et al. Feb 2018 A1
20180053393 White et al. Feb 2018 A1
20180054276 Islam et al. Feb 2018 A1
20180054340 Rico Alvarino et al. Feb 2018 A1
20180054740 Furuichi Feb 2018 A1
20180054750 Lee et al. Feb 2018 A1
20180054765 Kim et al. Feb 2018 A1
20180054767 Gholmieh et al. Feb 2018 A1
20180054780 Radulescu et al. Feb 2018 A1
20180054790 Islam et al. Feb 2018 A1
20180054792 Lee et al. Feb 2018 A1
20180054797 Islam et al. Feb 2018 A1
20180054822 Kim et al. Feb 2018 A1
20180054835 Fodor et al. Feb 2018 A1
20180054837 Islam et al. Feb 2018 A1
20180062709 Vaze et al. Mar 2018 A1
20180062720 Islam et al. Mar 2018 A1
20180062807 Seo et al. Mar 2018 A1
20180063031 Wloczysiak et al. Mar 2018 A1
20180063693 Chakraborty et al. Mar 2018 A1
20180063728 Andreoli-Fang et al. Mar 2018 A1
20180063736 Sadeghi et al. Mar 2018 A1
20180063753 Cao et al. Mar 2018 A1
20180063754 Wang et al. Mar 2018 A1
20180063788 Yang et al. Mar 2018 A1
20180063799 Sadek et al. Mar 2018 A1
20180063824 Kim et al. Mar 2018 A1
20180063834 Abedini et al. Mar 2018 A1
20180063835 Abedini et al. Mar 2018 A1
20180063868 Abedini et al. Mar 2018 A1
20180063878 Amerga et al. Mar 2018 A1
20180069589 Liu et al. Mar 2018 A1
20180069639 Chakraborty et al. Mar 2018 A1
20180069653 Fujishiro et al. Mar 2018 A1
20180069660 Yi et al. Mar 2018 A1
20180069681 Chakraborty et al. Mar 2018 A1
20180070243 Liu et al. Mar 2018 A1
20180070252 Gupta et al. Mar 2018 A1
20180070280 Nittala et al. Mar 2018 A1
20180070322 Ahn et al. Mar 2018 A1
20180070355 Wang et al. Mar 2018 A1
20180070363 Chakraborty et al. Mar 2018 A1
20180076662 Maheshwari et al. Mar 2018 A1
20180077156 Ellingson et al. Mar 2018 A1
20180077518 Nguyen et al. Mar 2018 A1
20180077581 Ahn et al. Mar 2018 A1
20180077724 Kim et al. Mar 2018 A1
20180077725 Sun et al. Mar 2018 A1
20180080762 Dubost et al. Mar 2018 A1
20180082634 Wang et al. Mar 2018 A1
20180082638 Shaeffer et al. Mar 2018 A1
20180083684 He et al. Mar 2018 A1
20180083812 Williams Mar 2018 A1
20180084395 Noor Mar 2018 A1
20180084419 Sun et al. Mar 2018 A1
20180084429 Guo et al. Mar 2018 A1
20180084432 Kwak et al. Mar 2018 A1
20180084447 Seo et al. Mar 2018 A1
20180084487 Arumugam et al. Mar 2018 A1
20180084518 Cattoni et al. Mar 2018 A1
20180084540 Takeda et al. Mar 2018 A1
20180084547 Gupta et al. Mar 2018 A1
20180084577 Li et al. Mar 2018 A1
20180084587 Noor Mar 2018 A1
20180090825 Jiang et al. Mar 2018 A1
20180090970 Radchenko et al. Mar 2018 A1
20180091108 Zhao et al. Mar 2018 A1
20180091264 Laselva et al. Mar 2018 A1
20180091285 Hosseini et al. Mar 2018 A1
20180091341 Sadiq et al. Mar 2018 A1
20180091350 Akkarakaran et al. Mar 2018 A1
20180091526 Cammarota et al. Mar 2018 A1
20180091952 Sant et al. Mar 2018 A1
20180091967 Gupta Mar 2018 A1
20180091979 Yang et al. Mar 2018 A1
20180091994 Ozturk et al. Mar 2018 A1
20180092109 Belghoul et al. Mar 2018 A1
20180092128 Um et al. Mar 2018 A1
20180096174 Finger et al. Apr 2018 A1
20180097603 Lee et al. Apr 2018 A1
20180097934 Yalamanchili Apr 2018 A1
20180097935 Yalamanchili Apr 2018 A1
20180098223 Hugl et al. Apr 2018 A1
20180098237 Kim et al. Apr 2018 A1
20180098317 Akkarakaran et al. Apr 2018 A1
20180098335 Sun et al. Apr 2018 A1
20180098336 Alpert Apr 2018 A1
20180102860 Emmanuel et al. Apr 2018 A1
20180102887 Chen et al. Apr 2018 A1
20180102915 Rico Alvarino et al. Apr 2018 A1
20180102930 Wang et al. Apr 2018 A1
20180103128 Muscariello et al. Apr 2018 A1
20180103364 Gholmieh et al. Apr 2018 A1
20180103458 Tooher et al. Apr 2018 A1
20180109987 Xu et al. Apr 2018 A1
20180110032 Viorel et al. Apr 2018 A1
20180110057 Park et al. Apr 2018 A1
20180110071 Mukherjee et al. Apr 2018 A1
20180110072 Sabapathi et al. Apr 2018 A1
20180110088 Zhu et al. Apr 2018 A1
20180115305 Islam et al. Apr 2018 A1
20180115394 Harada et al. Apr 2018 A1
20180115438 Park et al. Apr 2018 A1
20180115549 Chen et al. Apr 2018 A1
20180115929 Wu Apr 2018 A1
20180115933 Radulescu et al. Apr 2018 A1
20180115964 Lin et al. Apr 2018 A1
20180115967 Ahn et al. Apr 2018 A1
20180115975 Takeda et al. Apr 2018 A1
20180115978 Shi et al. Apr 2018 A1
20180115981 Kim et al. Apr 2018 A1
20180115991 Yang et al. Apr 2018 A1
20180115996 Si et al. Apr 2018 A1
20180123517 Kim May 2018 A1
20180123751 Narasimha et al. May 2018 A1
20180124124 Corona et al. May 2018 A1
20180124613 Kang et al. May 2018 A1
20180124622 Van Der Velde et al. May 2018 A1
20180124643 Gupta et al. May 2018 A1
20180124680 Dhanda et al. May 2018 A1
20180124695 Gupta et al. May 2018 A1
20180124711 Hosseini et al. May 2018 A1
20180124749 Park et al. May 2018 A1
20180124790 Yerramalli May 2018 A1
20180124807 Smith et al. May 2018 A1
20180124820 Sun et al. May 2018 A1
20180124828 Kim et al. May 2018 A1
20180124865 Lee et al. May 2018 A1
20180130057 Fisher May 2018 A1
20180131427 Nimbalker et al. May 2018 A9
20180131467 Sankar et al. May 2018 A1
20180131490 Patel et al. May 2018 A1
20180131498 Chen et al. May 2018 A1
20180131526 Ellingson et al. May 2018 A1
20180132114 Sun et al. May 2018 A1
20180132137 Dai et al. May 2018 A1
20180132145 Cao et al. May 2018 A1
20180132193 Misener et al. May 2018 A1
20180132228 Lan et al. May 2018 A1
20180132235 Hosseini et al. May 2018 A1
20180132243 Yang et al. May 2018 A1
20180132245 Yerramalli et al. May 2018 A1
20180132259 Yi et al. May 2018 A1
20180132260 Harada et al. May 2018 A1
20180132272 Sun et al. May 2018 A1
20180132288 Aguirre et al. May 2018 A1
20180132292 Yang et al. May 2018 A1
20180136669 Turpin et al. May 2018 A1
20180139020 Takeda et al. May 2018 A1
20180139083 Hosseini et al. May 2018 A1
20180139617 Belghoul et al. May 2018 A1
20180139621 Boudreau et al. May 2018 A1
20180139692 Liu et al. May 2018 A1
20180139695 Gupta et al. May 2018 A1
20180139742 Sun et al. May 2018 A1
20180139747 Hosseini et al. May 2018 A1
20180139767 Lee et al. May 2018 A1
20180139770 Ozturk et al. May 2018 A1
20180139772 Ozturk et al. May 2018 A1
20180139775 Ahn et al. May 2018 A1
20180139779 Kim et al. May 2018 A1
20180139780 Kang et al. May 2018 A1
20180145741 Zhao et al. May 2018 A1
20180145805 Maaref May 2018 A1
20180146359 Pawar et al. May 2018 A1
20180146381 Yoo et al. May 2018 A1
20180146487 Zhu May 2018 A1
20180146488 Li et al. May 2018 A1
20180146498 Sahlin et al. May 2018 A1
20180152267 Andreoli-Fang et al. May 2018 A1
20180152275 Cho et al. May 2018 A1
20180152847 Yang et al. May 2018 A1
20180152848 Egner et al. May 2018 A1
20180152865 Atri et al. May 2018 A1
20180152919 Viorel et al. May 2018 A9
20180152955 Park et al. May 2018 A1
20180152962 Lee et al. May 2018 A1
20180159649 Sun et al. Jun 2018 A1
20180159915 Westphal et al. Jun 2018 A1
20180159926 Sun et al. Jun 2018 A1
20180160293 Ni et al. Jun 2018 A1
20180160348 Wu Jun 2018 A1
20180160389 Yerramalli et al. Jun 2018 A1
20180160440 Hosseini et al. Jun 2018 A1
20180160441 Egner et al. Jun 2018 A1
20180160447 Noh et al. Jun 2018 A1
20180160450 Sivanesan et al. Jun 2018 A1
20180160452 Patil et al. Jun 2018 A1
20180160458 Wu Jun 2018 A1
20180161530 Ganton et al. Jun 2018 A1
20180167040 Sayilir et al. Jun 2018 A1
20180167155 Sun et al. Jun 2018 A1
20180167172 Hosseini et al. Jun 2018 A1
20180167825 Egner et al. Jun 2018 A1
20180167901 Wang et al. Jun 2018 A1
20180167911 Kota et al. Jun 2018 A1
20180167948 Egner et al. Jun 2018 A1
20180167957 Noh et al. Jun 2018 A1
20180167968 Liu et al. Jun 2018 A1
20180167972 Egner et al. Jun 2018 A1
20180167993 Thakkar et al. Jun 2018 A1
20180175805 Sayilir et al. Jun 2018 A1
20180175806 Mehrjoo et al. Jun 2018 A1
20180176747 Li et al. Jun 2018 A1
20180176775 Obaidi Jun 2018 A1
20180176785 Chuang Jun 2018 A1
20180176791 Hedayat et al. Jun 2018 A1
20180176792 Egner et al. Jun 2018 A1
20180176799 Lange et al. Jun 2018 A1
20180176819 Papa et al. Jun 2018 A1
20180176876 Alam Jun 2018 A1
20180176890 Moon et al. Jun 2018 A1
20180176922 Li et al. Jun 2018 A1
20180176932 Karimli et al. Jun 2018 A1
20180176948 Islam et al. Jun 2018 A1
20180176949 Islam et al. Jun 2018 A1
20180176956 Koutsimanis et al. Jun 2018 A1
20180183552 Hosseini et al. Jun 2018 A1
20180183770 Wu Jun 2018 A1
20180183936 Gao et al. Jun 2018 A1
20180184231 Egner et al. Jun 2018 A1
20180184303 Egner et al. Jun 2018 A1
20180184330 Egner et al. Jun 2018 A1
20180184383 Reddy et al. Jun 2018 A1
20180184406 Yang Jun 2018 A1
20180184410 John Wilson et al. Jun 2018 A1
20180184443 Li et al. Jun 2018 A1
20180184444 Li et al. Jun 2018 A1
20180184457 Islam et al. Jun 2018 A1
20180184459 Kim et al. Jun 2018 A1
20180189971 Hildreth Jul 2018 A1
20180191547 Mukherjee et al. Jul 2018 A1
20180192264 Kwok et al. Jul 2018 A1
20180192295 Mueck et al. Jul 2018 A1
20180192340 Karimli et al. Jul 2018 A1
20180192355 Kim et al. Jul 2018 A1
20180192370 Nam et al. Jul 2018 A1
20180192409 Yang et al. Jul 2018 A1
20180192422 Yi et al. Jul 2018 A1
20180192437 Verma et al. Jul 2018 A1
20180192449 Mueck et al. Jul 2018 A1
20180192921 Ganton et al. Jul 2018 A1
20180196715 Balasubramanian et al. Jul 2018 A1
20180197177 Lee et al. Jul 2018 A1
20180198469 Sarkis et al. Jul 2018 A1
20180198648 Sun et al. Jul 2018 A1
20180198660 Huang et al. Jul 2018 A1
20180198763 Bryson et al. Jul 2018 A1
20180199157 Talluri et al. Jul 2018 A1
20180199158 Talluri et al. Jul 2018 A1
20180199309 Islam et al. Jul 2018 A1
20180199310 Islam et al. Jul 2018 A1
20180199353 Ahn et al. Jul 2018 A1
20180199374 Ahn Jul 2018 A1
20180199376 Kim et al. Jul 2018 A1
20180199380 Itagaki et al. Jul 2018 A1
20180205507 John Wilson et al. Jul 2018 A1
20180205526 Kim et al. Jul 2018 A1
20180205585 Sadiq et al. Jul 2018 A1
20180205763 Seetharaman et al. Jul 2018 A1
20180205764 Jeon et al. Jul 2018 A1
20180206097 Michaud et al. Jul 2018 A1
20180206129 Choi et al. Jul 2018 A1
20180206229 Zeng et al. Jul 2018 A1
20180211897 Yang et al. Jul 2018 A1
20180212728 Wang et al. Jul 2018 A1
20180213386 Kim et al. Jul 2018 A1
20180213407 Miao et al. Jul 2018 A1
20180213421 Horvitz et al. Jul 2018 A1
20180213454 Santhanam et al. Jul 2018 A1
20180213477 John Wilson et al. Jul 2018 A1
20180213503 Garg Jul 2018 A1
20180213512 Ryu et al. Jul 2018 A1
20180213532 Hosseini et al. Jul 2018 A1
20180213560 Naghshvar et al. Jul 2018 A1
20180213562 Cierny et al. Jul 2018 A1
20180213564 Xu et al. Jul 2018 A1
20180213571 Wang et al. Jul 2018 A1
20180213594 You et al. Jul 2018 A1
20180219599 Lee et al. Aug 2018 A1
20180219667 Zhao et al. Aug 2018 A1
20180219711 Laporte et al. Aug 2018 A1
20180219729 Garg et al. Aug 2018 A1
20180220257 Bhattad et al. Aug 2018 A1
20180220269 Katakam et al. Aug 2018 A1
20180220280 Baghel Aug 2018 A1
20180220303 Futaki Aug 2018 A1
20180220323 Chen et al. Aug 2018 A1
20180220410 Baghel et al. Aug 2018 A1
20180220420 Harada et al. Aug 2018 A1
20180220428 Sun et al. Aug 2018 A1
20180220431 Nagaraja et al. Aug 2018 A1
20180220434 Takeda et al. Aug 2018 A1
20180220441 Akula et al. Aug 2018 A1
20180220447 Kim et al. Aug 2018 A1
20180220451 Bhushan et al. Aug 2018 A1
20180220457 Koorapaty et al. Aug 2018 A1
20180220464 Wang et al. Aug 2018 A1
20180227011 Yerramalli et al. Aug 2018 A1
20180227074 Sun et al. Aug 2018 A1
20180227082 Harada et al. Aug 2018 A1
20180227102 John Wilson et al. Aug 2018 A1
20180227106 Kim et al. Aug 2018 A1
20180227302 Lee et al. Aug 2018 A1
20180227383 Vasanthasenan et al. Aug 2018 A1
20180227723 Takahashi et al. Aug 2018 A1
20180227760 Foti et al. Aug 2018 A1
20180227767 Yamazaki et al. Aug 2018 A1
20180227802 Lehmann et al. Aug 2018 A1
20180227848 Lee et al. Aug 2018 A1
20180227878 Lashkarian et al. Aug 2018 A1
20180227908 Wang et al. Aug 2018 A1
20180227912 Chen et al. Aug 2018 A1
20180227936 Yerramalli et al. Aug 2018 A1
20180227944 Yerramalli et al. Aug 2018 A1
20180234140 Chen et al. Aug 2018 A1
20180234524 Cheng et al. Aug 2018 A1
20180234857 Morioka Aug 2018 A1
20180234863 Li et al. Aug 2018 A1
20180234870 Lee et al. Aug 2018 A1
20180234871 Ahn et al. Aug 2018 A1
20180234886 Bhorkar et al. Aug 2018 A1
20180234960 Nagaraja et al. Aug 2018 A1
20180234965 Ahn et al. Aug 2018 A1
20180234974 Ngo et al. Aug 2018 A1
20180235005 Ansari et al. Aug 2018 A1
20180235008 Park et al. Aug 2018 A1
20180235010 Harada et al. Aug 2018 A1
20180235020 Maaref Aug 2018 A1
20180239425 Jang Aug 2018 A1
20180239754 Chung et al. Aug 2018 A1
20180241453 Lee et al. Aug 2018 A1
20180241486 Heo et al. Aug 2018 A1
20180241494 Chendamarai Kannan et al. Aug 2018 A1
20180241511 Harada et al. Aug 2018 A1
20180241526 Chendamarai Kannan et al. Aug 2018 A1
20180241588 Harada et al. Aug 2018 A1
20180241602 Bhorkar et al. Aug 2018 A1
20180241626 Kumar et al. Aug 2018 A1
20180241669 Muscariello et al. Aug 2018 A1
20180241679 Muscariello et al. Aug 2018 A1
20180242159 Lundborg Aug 2018 A1
20180242182 Rashid et al. Aug 2018 A1
20180242186 Muscariello et al. Aug 2018 A1
20180242218 Muscariello et al. Aug 2018 A1
20180242232 Chendamarai Kannan et al. Aug 2018 A1
20180242276 Patel et al. Aug 2018 A1
20180242319 Akkarakaran et al. Aug 2018 A1
20180242328 Chen et al. Aug 2018 A1
20180242340 Pu et al. Aug 2018 A1
20180242360 Noh et al. Aug 2018 A1
20180242364 Park et al. Aug 2018 A1
20180242374 Harada et al. Aug 2018 A1
20180246508 Choi et al. Aug 2018 A1
20180248983 Mohebbi et al. Aug 2018 A1
20180249303 Li et al. Aug 2018 A1
20180249339 Noh et al. Aug 2018 A1
20180249469 Park et al. Aug 2018 A1
20180249484 Kim et al. Aug 2018 A1
20180249496 Radulescu et al. Aug 2018 A1
20180249497 Noh et al. Aug 2018 A1
20180249499 Kim et al. Aug 2018 A1
20180249526 Nagaraja et al. Aug 2018 A1
20180279128 Zaifuddin et al. Sep 2018 A1
20180288105 Iyer et al. Oct 2018 A1
20180288223 Collinson et al. Oct 2018 A1
20180288582 Buckley et al. Oct 2018 A1
20180295528 Anantha et al. Oct 2018 A1
20180317086 Ben Henda et al. Nov 2018 A1
20180338334 Jin et al. Nov 2018 A1
20180352081 Self et al. Dec 2018 A1
20180359663 Kim et al. Dec 2018 A1
20180375903 Mufti et al. Dec 2018 A1
20190044980 Russell et al. Feb 2019 A1
20190069162 Lindheimer et al. Feb 2019 A1
20190075139 Bouvet et al. Mar 2019 A1
20190082287 Froehlich et al. Mar 2019 A1
20190110236 Huang et al. Apr 2019 A1
20190116540 Faus Gregori Apr 2019 A1
20190132903 Suxena May 2019 A1
20190141510 Buckley et al. May 2019 A1
20190174451 Bouvet et al. Jun 2019 A1
20190182719 Reddy et al. Jun 2019 A1
20190230510 Ben Henda et al. Jul 2019 A1
20190260874 Collinson et al. Aug 2019 A1
20190274082 Vemuri et al. Sep 2019 A1
20190281506 Chiang et al. Sep 2019 A1
20190281647 Chiang et al. Sep 2019 A1
20190373422 Li et al. Dec 2019 A1
20190373515 Balasubramanian et al. Dec 2019 A1
Non-Patent Literature Citations (67)
Entry
U.S. Appl. No. 10/009,462, filed Jun. 26, 2018, Collinson et al..
U.S. Appl. No. 10/012,015, filed Jul. 3, 2018, Rejo.
U.S. Appl. No. 10/015,671, filed Jul. 3, 2018, Zaifuddin et al..
U.S. Appl. No. 10/021,665, filed Jul. 10, 2018, Alam.
U.S. Appl. No. 10/032,013, filed Jul. 24, 2018, Osuki.
U.S. Appl. No. 10/032,017, filed Jul. 24, 2018, Ravi et al..
U.S. Appl. No. 10/038,791, filed Jul. 31, 2018, Liao.
U.S. Appl. No. 10/042,016, filed Aug. 7, 2018, Hanada et al..
U.S. Appl. No. 10/044,769, filed Aug. 7, 2018, Mufti et al..
U.S. Appl. No. 10/051,119, filed Aug. 14, 2018, Self et al..
U.S. Appl. No. 10/051,523, filed Aug. 14, 2018, Kim et al..
U.S. Appl. No. 10/052,017, filed Aug. 14, 2018, Unknown.
U.S. Appl. No. 10/062,016, filed Aug. 28, 2018, Shirai.
U.S. Appl. No. 10/064,058, filed Aug. 28, 2018, Stammers et al..
U.S. Appl. No. 10/082,015, filed Sep. 25, 2018, Williams et al..
U.S. Appl. No. 10/085,274, filed Sep. 25, 2018, Shi et al..
U.S. Appl. No. 10/091,114, filed Oct. 2, 2018, Chai et al..
U.S. Appl. No. 10/102,017, filed Oct. 16, 2018, Ganguly et al..
U.S. Appl. No. 10/112,016, filed Oct. 30, 2018, Draper et al..
U.S. Appl. No. 10/122,017, filed Nov. 6, 2018, Iwasaki.
U.S. Appl. No. 10/132,016, filed Nov. 20, 2018, Wright.
U.S. Appl. No. 10/136,342, filed Nov. 20, 2018, Anantha et al..
U.S. Appl. No. 10/152,013, filed Dec. 11, 2018, Kusano et al..
U.S. Appl. No. 10/152,015, filed Dec. 11, 2018, Suzuki.
U.S. Appl. No. 10/154,371, filed Dec. 11, 2018, Rahat et al..
U.S. Appl. No. 10/159,029, filed Dec. 18, 2018, Ray et al..
U.S. Appl. No. 10/162,008, filed Dec. 25, 2018, Kinsella.
U.S. Appl. No. 10/165,432, filed Dec. 25, 2018, Buckley et al..
U.S. Appl. No. 10/172,017, filed Jan. 1, 2019, Zadeh et al..
U.S. Appl. No. 10/178,541, filed Jan. 8, 2019, Carbone et al..
U.S. Appl. No. 10/182,016, filed Jan. 15, 2019, Birke et al..
U.S. Appl. No. 10/182,053, filed Jan. 15, 2019, Chen et al..
U.S. Appl. No. 10/192,017, filed Jan. 29, 2019, Bref et al..
U.S. Appl. No. 10/194,383, filed Jan. 29, 2019, Cili et al..
U.S. Appl. No. 10/202,016, filed Feb. 12, 2019, Stork et al..
U.S. Appl. No. 10/212,008, filed Feb. 19, 2019, Palmer.
U.S. Appl. No. 10/212,627, filed Feb. 19, 2019, Reddy et al..
U.S. Appl. No. 10/222,013, filed Mar. 5, 2019, Hierzer.
U.S. Appl. No. 10/222,015, filed Mar. 5, 2019, Chien.
U.S. Appl. No. 10/225,777, filed Mar. 5, 2019, Singh et al..
U.S. Appl. No. 10/231,140, filed Mar. 12, 2019, Nuss et al..
U.S. Appl. No. 10/232,012, filed Mar. 19, 2019, Lim et al..
U.S. Appl. No. 10/242,017, filed Mar. 26, 2019, Berthiaume et al..
U.S. Appl. No. 10/252,016, filed Apr. 9, 2019, Pedro et al..
U.S. Appl. No. 10/262,017, filed Apr. 16, 2019, Wolge.
U.S. Appl. No. 10/272,016, filed Apr. 30, 2019, Allyn et al..
U.S. Appl. No. 10/292,015, filed May 14, 2019, Thiagarajan et al..
U.S. Appl. No. 10/302,012, filed May 28, 2019, Yoshizaki et al..
U.S. Appl. No. 10/302,014, filed May 28, 2019, Suciu et al..
U.S. Appl. No. 10/305,808, filed May 28, 2019, Karlsson.
U.S. Appl. No. 10/312,017, filed Jun. 4, 2019, Huang et al..
U.S. Appl. No. 10/320,978, filed Jun. 11, 2019, Collinson et al..
U.S. Appl. No. 10/334,440, filed Jun. 25, 2019, Zaifuddin et al..
U.S. Appl. No. 10/356,240, filed Jul. 16, 2019, Self et al..
U.S. Appl. No. 10/362,473, filed Jul. 23, 2019, Gupta.
U.S. Appl. No. 10/362,482, filed Jul. 23, 2019, Obaidi.
U.S. Appl. No. 10/362,585, filed Jul. 23, 2019, Yang et al..
U.S. Appl. No. 10/382,883, filed Aug. 13, 2019, Froehlich et al..
U.S. Appl. No. 10/382,933, filed Aug. 13, 2019, Pawar et al..
U.S. Appl. No. 10/419,899, filed Sep. 17, 2019, Cham et al..
U.S. Appl. No. 10/425,800, filed Sep. 24, 2019, Panchal et al..
U.S. Appl. No. 10/430,607, filed Oct. 1, 2019, Mumford et al..
U.S. Appl. No. 10/439,989, filed Oct. 8, 2019, Wu.
U.S. Appl. No. 10/448,288, filed Oct. 15, 2019, Kim et al..
U.S. Appl. No. 10/492,243, filed Nov. 26, 2019, Chiang et al..
U.S. Appl. No. 10/499,234, filed Dec. 3, 2019, Buckley et al..
U.S. Appl. No. 10/499,454, filed Dec. 3, 2019, Suxena.
Related Publications (1)
Number Date Country
20220338068 A1 Oct 2022 US
Provisional Applications (2)
Number Date Country
62356951 Jun 2016 US
62385647 Sep 2016 US
Continuations (2)
Number Date Country
Parent 16725808 Dec 2019 US
Child 17857159 US
Parent 15636274 Jun 2017 US
Child 16725808 US