scispace - formally typeset
Search or ask a question

Showing papers by "Motorola published in 2020"


Journal ArticleDOI
TL;DR: An intelligent reward-based data offloading in the next generation vehicular networks (IR-DON) architecture is proposed for dynamic optimization of data traffic and selection of intelligent RSU in the network selection process.
Abstract: A massive increase in the number of mobile devices and data-hungry vehicular network applications creates a great challenge for mobile network operators (MNOs) to handle huge data in cellular infrastructure. However, due to fluctuating wireless channels and high mobility of vehicular users, it is even more challenging for MNOs to deal with vehicular users within a licensed cellular spectrum. Data offloading in the vehicular environment plays a significant role in offloading the vehicle’s data traffic from congested cellular network’s licensed spectrum to the free unlicensed WiFi spectrum with the help of roadside units (RSUs). In this article, an intelligent reward-based data offloading in the next generation vehicular networks (IR-DON) architecture is proposed for dynamic optimization of data traffic and selection of intelligent RSU. Within the IR-DON architecture, an intelligent access network discovery and selection function (I-ANDSF) module with $Q$ -learning, a reinforcement learning algorithm is designed. The I-ANDSF is modeled under a software-defined network (SDN) controller to solve the dynamic optimization problem by performing an efficient offloading. This increases the overall system throughput by choosing an optimal and intelligent RSU in the network selection process. The simulation results have shown the accurate network traffic classification, optimal network selection, guaranteed quality of service, reduced delay, and higher throughput achieved by the I-ANDSF module.

54 citations


Journal ArticleDOI
13 Apr 2020
TL;DR: Insight is provided on the current 3GPP Release 16 NR SL design for NR V2X, the network architecture, security, and protocol enhancement, and the PC5-QoS model for NR SL, which includes the newly introduced range parameter and connection establishment for both groupcast and unicast V2x communication using NR-PC5 RRC.
Abstract: 3GPP standardization is currently studying the support of advanced vehicle-to-everything (V2X) services in Release 16. The NR sidelink (SL) being designed in 3GPP Release 16 to support advanced V2X services directly between vehicles and other road users is expected to finish early in 2020. Advanced V2X services primarily focus on platooning, cooperative driving, extended sensor, and remote driving use cases. A new QoS parameter of minimum communication range (MCR) introduced for 5G V2X means fulfillment of ultra-low latency and very high reliability requirements within a given MCR. Design for ultra-low latency and very high reliability enhancement is required to meet an end-to-end latency of 3 ms and high reliability up-to 99.999 percent. NR SL design studies V2X message delivery for periodic/aperiodic traffic type and different cast types such as unicast, groupcast, and broadcast traffic requiring substantial changes in network architecture, physical, and protocol layers. This article provides insights on the current 3GPP Release 16 NR SL design for NR V2X, the network architecture, security, and protocol enhancement. The PC5-QoS model for NR SL includes the newly introduced range parameter and connection establishment for both groupcast and unicast V2X communication using NR-PC5 RRC. In addition, the design of the NR SL physical layer addresses the necessary improvements needed in the SL physical layer structures, and procedures for reliable packet transmissions considering minimum communication range.

31 citations


Patent
27 Feb 2020
TL;DR: In this article, a processor determines whether PDCP packet duplication associated with the PDCP protocol entity is to be activated and, if so, communicates with a mobile communication network according to a packet duplication mode of operation.
Abstract: For switching between packet duplication operating modes, methods, apparatus, and systems are disclosed. One apparatus includes a processor and a transceiver that communicates with a mobile communication network via a radio bearer. The processor determines whether PDCP packet duplication associated with the PDCP protocol entity is to be activated and, if so, communicates with a mobile communication network according to a packet duplication mode of operation. Otherwise, the processor determines whether a split threshold value of the PDCP protocol entity is set to a predefined value, communicates with the mobile communication network according to a first split bearer mode of operation in response to determining that the split threshold value is set to the predefined value, and communicates with the mobile communication network according to a second split bearer mode of operation in response to determining that the split threshold value is not set to the predefined value.

23 citations


Patent
25 Feb 2020
TL;DR: In this paper, the authors proposed a method for duplicating PDCP PDUs for a radio bearer, methods, apparatus, and systems are disclosed for decoding PDCP data PDUs.
Abstract: For duplicating PDCP PDUs for a radio bearer, methods, apparatus, and systems are disclosed. One apparatus includes a processor and a transceiver for communicating with a mobile communication network. The processor establishes a radio bearer to communicate with the network, the radio bearer includes a PDCP entity, first and second RLC entities associated with said PDCP entity, first and second logical channels associated with said first and second RLC entities, respectively. The processor receives a control signal from the network, submits a PDCP data PDU in the PDCP entity to the first RLC entity for transmission. In response to the first control signal, the processor submits the PDCP data PDU to the second RLC entity for transmission. The processor indicates to one of the first and second RLC entities to discard a duplicate PDCP data PDU corresponding to a successfully delivered PDCP data PDU.

23 citations


Patent
29 Oct 2020
TL;DR: In this paper, the authors describe a processor that determines a first semi-persistent scheduling resource assignment indicating a first set of resources including a first multiple time domain resources, and the processor also determines a second semi-Persistent scheduling resources indicating a second set of resource including a second multiple time domains resources.
Abstract: Apparatuses, methods, and systems are disclosed for scheduling of transmission time intervals. One apparatus includes a processor that determines a first semi-persistent scheduling resource assignment indicating a first set of resources including a first multiple time domain resources. Each time domain resource of the first multiple time domain resources has a first transmission time interval length. The processor also determines a second semi-persistent scheduling resource assignment indicating a second set of resources including a second multiple time domain resources. Each time domain resource of the second multiple time domain resources has a second transmission time interval length, and the first transmission time interval length is different from the second transmission time interval length. The apparatus includes a transmitter that transmits the first semi-persistent scheduling resource assignment using a first semi-persistent scheduling radio network identifier, and transmits the second semi-persistent scheduling resource assignment using a second semi-persistent scheduling radio network identifier.

13 citations


Patent
14 Jan 2020
TL;DR: In this article, the authors disclosed the access protocols, methods, and systems for establishing data paths over multiple access networks for multi-access data connection in a mobile communication network, where both the first data path and the second data path are anchored at a common user plane network function in the mobile communication networks.
Abstract: Apparatuses, methods, and systems are disclosed for establishing data paths over multiple access network for a multi-access data connection One apparatus (400) includes a processor (405) and a transceiver (425) that communicates with one or more network functions in a mobile communication network The processor (405) receives a first session management request via an AMF Here, the first session management request contains a second session management request sent by a remote unit that communicates with the mobile communication network over a first access network and a second access network, the second session management request being sent over the second access network The processor (405) sends a first request to the access management function to establish a first data path for a multi-access data connection over the first access network and sends a second request to the access management function to establish a second data path for the multi-access data connection over the second access network Here, both the first data path and the second data path are anchored at a common user plane network function in the mobile communication network

12 citations


Patent
Wu Lianhai1, Chenxi Zhu1, Lei Haipeng1, Zhang Zhuoyun1, Li Hongchao1 
05 Mar 2020
TL;DR: In this article, a beam switch request, measurement results, or some combination thereof are disclosed for beam switching, where the information indicates a list of beams, and the information is based on a trigger event, the measurement result, or a combination thereof.
Abstract: Apparatuses, methods, and systems are disclosed for beam switching. One apparatus (200) includes a transmitter (210) that transmits (402) information indicating a beam switch request, measurement results, or some combination thereof, wherein the information indicates a list of beams, and the information is based on a trigger event, the measurement results, or some combination thereof.

11 citations


Patent
Wu Lianhai1, Zhu Chenxi, Sun Zhennian, Wang Haiming, Yu Xiaodong 
10 Jan 2020
TL;DR: In this article, the beam recovery request on a first trigger condition was considered and an array of methods and systems for transmitting beam recovery requests were described. But the beam-recovery request was not considered.
Abstract: Apparatuses, methods, and systems are disclosed for transmitting a beam recovery request. One apparatus (200) includes a receiver (212) that receives (402) information indicating a resource configured for a beam recovery request. The apparatus (200) includes a transmitter (210) that transmits (404) the beam recovery request on the resource in response to a first trigger condition.

10 citations


Proceedings ArticleDOI
01 Jan 2020
TL;DR: A practical approach is proposed that uses multi-stage quantization of codebook parameters with variable quantization resolution, where the resolution is proportional to the coefficients' amplitude values, which helps provide better utilization of the CSI feedback.
Abstract: Enhancing the throughput of multi-user (MU) massive multiple-input multiple-output (MIMO) networks is one of the biggest promises that the fifth generation (5G) networks are expected to deliver. In the Third Generation Partnership Project (3GPP) New Radio (NR) standardization efforts, downlink precoding designs that balance performance and uplink feedback overhead are being investigated. Most recently, a high-resolution precoder (Type-II codebook) was specified for downlink NR Release (Rel.) 15 wherein the channel state information (CSI) feedback is compressed in the spatial domain via exploiting a Discrete Fourier Transform (DFT)-based codebook structure. An extension of the Type-II codebook for NR Rel. 16 which also exploits frequency correlation to reduce CSI feedback overhead is currently under study. In this paper, an overview of some of the recent developments for Rel. 16 Type-II codebook is provided. In addition, a practical approach is proposed that uses multi-stage quantization of codebook parameters with variable quantization resolution, where the resolution is proportional to the coefficients' amplitude values. This approach helps provide better utilization of the CSI feedback, compared with the case with the same quantization resolution for all coefficients. System-level simulation results are provided which show that the proposed approach significantly reduces the CSI feedback overhead without notable impact on performance.

8 citations


Journal ArticleDOI
TL;DR: A new incremental aggregation algorithm for multi-image deblurring with automatic image selection that outperforming other methods described in the literature in previously described situations and validated on several synthetic and real datasets.
Abstract: We propose a new incremental aggregation algorithm for multi-image deblurring with automatic image selection. The primary motivation is that current burst deblurring methods do not handle well situations in which misalignment or out-of-context frames are present in the burst. These real-life situations result in poor reconstructions or manual selection of the images that are used to deblur. Automatically selecting the best frames within the burst to improve the base reconstruction is challenging because the number of possible images fusions is equal to the power set cardinal. Here, we approach the multi-image deblurring problem as a two steps process. First, we successfully learn a comparison function to rank a burst of images using a deep convolutional neural network. Then, an incremental Fourier burst accumulation with a reconstruction degradation mechanism is applied fusing only less blurred images that are sufficient to maximize the reconstruction quality. Experiments with the proposed algorithm have shown superior results when compared to other similar approaches, outperforming other methods described in the literature in previously described situations. We validate our findings on several synthetic and real datasets.

8 citations


Patent
31 Mar 2020
TL;DR: In this paper, the authors present a method for determining an amount of data available for transmission, including packet data convergence protocol data and radio link control data pending for initial transmission in the first RCE and the second RCE.
Abstract: Apparatuses, methods, and systems are disclosed for determining data available for transmission. One method includes associating a packet data convergence protocol entity with a first radio link control entity and a second radio link control entity belonging to two different cell groups. The method includes determining an amount of data available for transmission, the amount of data available for transmission including packet data convergence protocol data and radio link control data pending for initial transmission in the first radio link control entity and the second radio link control entity. The method includes comparing the amount of data available for transmission with a threshold. The method includes submitting the packet data convergence protocol data to a first radio link control entity in response to the amount of data available for transmission being below the threshold.

Patent
16 Jan 2020
TL;DR: In this article, the first data connection (303) providing access to the local data network (135), the processor (505) accesses (615) one or more services via the local Data Network (135).
Abstract: Apparatuses, methods, and systems are disclosed for accessing a local data network via a mobile data connection. One apparatus (500) includes a processor (505) and a transceiver (525) that communicates with a mobile communication network. The processor (505) receives (605) a downlink data packet from a first data connection (303) over the mobile communication network, the first data connection (303) providing the apparatus (500) with access to a remote data network (125). The processor (505) determines (610), from the downlink data packet, whether the first data connection (303) provides access to a local data network (135) in addition to the remote data network (125). In response to the first data connection (303) providing access to the local data network (135), the processor (505) accesses (615) one or more services via the local data network (135).

Patent
22 Oct 2020
TL;DR: In this paper, the authors describe a handover scheme for conditional handovers involving multiple candidate cells, including a receiver (212) and a processor (202) that selects (604) a target cell of the candidate cells in response to the target cell meeting a predetermined condition.
Abstract: Apparatuses, methods, and systems are disclosed for conditional handovers involving multiple candidate cells. One apparatus (102) includes a receiver (212) that receives (602) a handover command involving multiple candidate cells. The apparatus (102) includes a processor (202) that selects (604) a target cell of the multiple candidate cells in response to the target cell meeting a predetermined condition.

Patent
18 Mar 2020
TL;DR: In this paper, a data connection with the mobile communication network using a first set of parameters was established and a second set of parameter parameters were received from the mobile communications network with an indication of how at least one parameter in the first set corresponds to at least another parameter in a new parameter set in the second set.
Abstract: Apparatuses and methods are disclosed for reconfiguring a data connection using new parameters. One apparatus (300) includes a processor (305) and transceiver (325) that communicates with a mobile communication network. The processor (305) establishes (605) a data connection with the mobile communication network using a first set of parameters and receives (610) a second set of parameters from the mobile communication network with an indication of how at least one parameter in the first set corresponds to at least one new parameter in the second set. The processor (305) further determines (615) a third set of parameters from the first set of parameters and the second set of parameters and reconfigures (620) the data connection using the third set of parameters.

Journal ArticleDOI
TL;DR: A novel strategy for selection and prioritisation of Test Cases (TC) for Regression testing based on Information Retrieval techniques combined with indirect code coverage measures to select and prioritise TCs to maximise the number of bugs found.

Patent
Yu Xiaodong1, Lei Haipeng, Chenxi Zhu, Yan Zhi, Li Hongchao 
07 Feb 2020
TL;DR: In this article, the authors present a system for sidelink control information indication with a receiver (730) that receives a second control information message from a remote unit (105) over sidelink communication, and a transmitter (725) that transmits the indicator of the determined transmission-reception pattern to the remote unit.
Abstract: Apparatuses, methods, and systems are disclosed for sidelink control information indication. One apparatus (700) includes a receiver (730) that receives (805) a second control information message from a remote unit (105) over sidelink communication. Here, the second control information message is in response to the remote unit (105) receiving one or more data processes scheduled by a first control information message from a relay unit (120). The apparatus (700) also includes a processor (705) that determines (810) a transmission-reception pattern for the sidelink communication and generates (815) an indicator of the determined transmission-reception pattern. The apparatus (700) further includes a transmitter (725) that transmits (820) the indicator of the determined transmission-reception pattern to the remote unit in a third control information message.

Patent
11 Mar 2020
TL;DR: In this paper, a system information request message requesting transmission of non-minimum system information if the at least one indication indicates the non-Minimum System Information is not being broadcasted can be received, where the nonminimum System Information may not be included in the minimum system information.
Abstract: Minimum system information including at least cell access information to establish access with a cell can be transmitted, the minimum system information also including at least one indication indicating whether particular system information listed in scheduling information in the minimum system information is being broadcasted or not being broadcasted. A system information request message requesting transmission of non-minimum system information if the at least one indication indicates the non-minimum system information is not being broadcasted can be received, where the non-minimum system information may not be included in the minimum system information. The non-minimum system information can be transmitted either in response to the receiving of the system information request message or in response to the at least one indication indicating whether particular system information is being broadcasted.

Patent
Merrell Thomas Yates1
01 Dec 2020
TL;DR: Temporary biometric templates for maintaining a user authenticated state are described in this paper, where the user's authenticated state is maintained based on a comparison of the tracked biometric feature of the user with the biometric features of the temporary biometric template.
Abstract: Temporary biometric templates for maintaining a user authenticated state are described herein. In some implementation, an electronic device receives an input to unlock using a first secure authentication technique to initiate a current unlock session. A temporary biometric template of a biometric feature of a user unlocking the electronic device is created effective to initiate a user authenticated state. The biometric feature of the user associated with the temporary biometric template is tracked during the current unlock session. The user authenticated state is maintained based on a comparison of the tracked biometric feature of the user with the biometric feature of the temporary biometric template. When the biometric feature of the user can no longer be tracked, the user authenticated state is terminated and the temporary biometric template is invalidated.

Journal ArticleDOI
TL;DR: In this article, the impact of phase and magnitude errors between radio frequency (RF) chains in FD-MIMO systems is investigated and a coherent LO distribution architecture and array calibration mechanism is proposed.
Abstract: Full-dimension MIMO (FD-MIMO) using planar active antenna systems (AAS) is considered a critical technology for fifth-generation (5G) cellular systems to improve network capacity. An AAS is typically subject to hardware impairments that negatively impact network capacity. Hence, this article focuses on impairments that cause phase and magnitude errors between radio frequency (RF) chains and shows why they are particularly difficult to avoid in practical AAS. Although previous investigations show these impairments to degrade performance, they are not useful in deriving measurable impairment margins for practical FD-MIMO deployments. Knowing impairment limits are critical for system designers to make hardware design tradeoffs such as AAS configuration, component selection, implementation complexity, and cost. Moreover, it also helps set conformance limits for critical lab verification. Therefore, the paper first investigates the impact of the impairments and derives their practical limits for FD-MIMO by explicitly considering the cumulative effects of the channel model, inter-cell interference, link adaptation, and channel aging due to feedback delays. It is shown that a lower number of digitized RF chains can be a better choice under lower impairments. Next, the sources of impairments are investigated by using measurements carried out in the lab and the field during live operation in a commercial LTE network. Phase drift from local oscillators (LO) and internal temperature variations are identified as two significant sources. The tradeoffs and shortcomings of some of the existing solutions in massive MIMO literature are discussed. Finally, in order to address the shortcomings, a novel and practical coherent LO distribution architecture and array calibration mechanism are proposed. This solution is shown to be applicable to both TDD and FDD FD-MIMO. Measurement results are provided to prove the high degree of coherency and stability achieved on a unique array architecture called high definition active antenna system (HDAAS).

Patent
27 Oct 2020
TL;DR: In this paper, a computing device is configured to receive touch input corresponding to a user gripping the device on at least one edge, and a grip profile is identified and corresponds to placement of a user's digits on the at least 1 edge.
Abstract: Various embodiments provide virtual control buttons on a computing device, such as a mobile device, e.g. a smart phone, to produce a computing. The computing device includes a housing component defined by a top edge, a bottom edge, a left edge and a right edge. A touchscreen display defines at least a front surface of the housing component and wraps around at least one edge of the housing component to define at least portions of the one edge. The computing device is configured to receive touch input corresponding to a user gripping the device on the at least one edge. A grip profile is identified and corresponds to placement of a user's digits on the at least one edge. Responsive to identifying the grip profile, at least one virtual control button is visually placed on the touchscreen display based, at least in part, on the grip profile.

Journal ArticleDOI
TL;DR: The proposed solution is a two-tiered procedure that combines hand-crafted features and a convolutional neural network to verify if the person depicted in a photograph corresponds to the device owner, providing a 4× speedup when processing an image in recent smartphone models.
Abstract: Mobile devices have their popularity and affordability greatly increased in recent years. As a consequence of their ubiquity, these devices now carry all sorts of personal data that should be accessed only by their owner. Even though knowledge-based procedures are still the main methods to secure the owner's identity, recently biometric traits have been employed for more secure and effortless authentication. In this work, the authors propose a facial verification method optimised to the mobile environment. It consists of a two-tiered procedure that combines hand-crafted features and a convolutional neural network (CNN) to verify if the person depicted in a photograph corresponds to the device owner. To train a CNN for the verification task, the authors propose a hybrid-image input, which allows the network to process encoded information of a pair of face images. The proposed experiments show that the solution outperforms state of the art face verification methods, providing a 4× speedup when processing an image in recent smartphone models. Additionally, the authors show that the two-tiered procedure can be coupled with existing face verification CNNs improving their accuracy and efficiency. They also present a new data set of selfie pictures – RECOD Selfie data set – that hopefully will support future research in this scenario.

Journal ArticleDOI
01 Jan 2020
TL;DR: The paper provides an outlook of the new Release 16 feature for trusted non-3GPP access, i.e. the mobile operator trusts the access point, as well as the feature for 5G core network access from WLAN devices with 3GPP credentials that do not support the Non Access Stratum protocol.
Abstract: Non-3GPP Access technologies such as WLAN technologies can be connected to the 3GPP core network like EPC (Evolved Packet Core) in various ways based on the operator’s business models and architectural preferences. The desire to provide this access to the 5G core network, currently defined in 3GPP, requires the design of new protocols and procedures in order to fulfill all requirements. This paper describes the current status of the specification in Release 15 of the untrusted non-3GPP access where the mobile operator does not trust the access point and tunnels all traffic to a trusted gateway in the mobile network. Further, the paper provides an outlook of the new Release 16 feature for trusted non-3GPP access, i.e. the mobile operator trusts the access point, as well as the feature for 5G core network access from WLAN devices with 3GPP credentials that do not support the Non Access Stratum protocol.

Patent
17 Jan 2020
TL;DR: In this paper, a lack of a valid dedicated uplink control channel resource configuration can be ascertained by a device by determining a number of symbols for an uplink channel in response to a downlink message.
Abstract: A lack of a valid dedicated uplink control channel resource configuration can be ascertained by a device. A number of symbols for an uplink control channel can be determined in response to ascertaining a lack of a valid dedicated uplink control channel resource configuration. A downlink message can be received. The downlink message can be based on a device identity of the device. A HARQ-ACK feedback can be transmitted on the uplink control channel using the determined number of symbols in response to receiving the downlink message.

Patent
18 Feb 2020
TL;DR: In this paper, a directional animation that includes moving images is displayed, where the moving images are based on a location associated with a camera being used to capture the image, and a termination event and termination display of the directional animation are detected.
Abstract: Techniques described herein display a directional animation during image capture. At least some implementations detect an image capture event associated with capturing an image. In response to detecting the image capture event, a directional animation that includes moving images is displayed, where the moving images are based on a location associated with a camera being used to capture the image. Various implementations detect a termination event and terminate display of the directional animation.

Patent
Salkintzis Apostolis1
14 Aug 2020
TL;DR: In this paper, the first function is associated with one of the plurality of connection information packages provided by a blockchain network, and the transceiver accepts the request to authenticate a user.
Abstract: Apparatuses, methods, and systems are disclosed for user authentication using a connection information package provided by a blockchain network. One apparatus includes a processor and a transceiver that receives, from a first address on a blockchain network, a plurality of connection information packages and also receives, from a first function, a request to authenticate a user. The processor determines whether the first function is associated with one of the plurality of connection information packages. In response to the first function being associated with a valid one of the plurality of connection information package, the processor accepts the request to authenticate a user.

Patent
23 Jan 2020
TL;DR: In this paper, an electronic device and corresponding method includes capturing, with one or more sensors, at least one authentication input from a person in the environment of the electronic device, which can then compare the captured authentication input with authentication references to determine whether the person is an authorized user of the device.
Abstract: An electronic device and corresponding method includes capturing, with one or more sensors, at least one authentication input from a person in the environment of the electronic device. One or more processors of the electronic device can then compare the captured authentication input with one or more authentication references to determine whether the person is an authorized user of the electronic device. Where the person is, the one or more processors can grant limited operational access to the electronic device. Thereafter, when additional authentication inputs are captured and sufficiently match additional authentication references, additional operation access can be granted.

Patent
23 Jan 2020
TL;DR: In this article, the authors present a method for discarding data corresponding to a conditional handover. But the method is limited to a set of candidate cells of the multiple candidate cells.
Abstract: Apparatuses, methods, and systems are disclosed for discarding data corresponding to a conditional handover. One apparatus (300) includes a transmitter (310) that transmits (602) information corresponding to a conditional handover to multiple candidate cells. The information indicates to one or more candidate cells of the multiple candidate cells a time to discard data or to discard the data.

Patent
23 Jan 2020
TL;DR: In this article, the authors propose an authentication system that uses a motion detector to detect an at least partially periodic motion of an electronic device, such that a user can authenticate a user as an authorized user when the electronic device is most stationary along the motion.
Abstract: An electronic device includes a motion detector operable to detect an at least partially periodic motion of the electronic device. An authentication system operable with the motion detector initiates an authentication process, such as by capturing one or more images or depth scans, to attempt to authenticate a user as an authorized user of the electronic device when the electronic device is most stationary along the at least partially periodic motion.

Patent
31 Jul 2020
TL;DR: In this paper, a hinge couples the first device housing to the second device housing and a flexible substrate passes through the first chamber and the second chamber by passing through or around a hinge housing.
Abstract: An electronic device includes a first device housing and a second device housing. A hinge couples the first device housing to the second device housing. The first device housing is pivotable about the hinge relative to the second device housing. The hinge separates a first chamber defined by the first device housing and a second chamber defined by the second device housing. A flexible substrate passes through the first chamber and the second chamber. The flexible substrate spans the hinge, either by passing through or around a hinge housing. The flexible substrate deforms to a curvilinear deformed state within one or both of the first chamber or the second chamber when the first device housing and the second device housing pivot about the hinge from a closed position to an axially displaced open position.

Patent
Salkintzis Apostolis1
03 Sep 2020
TL;DR: In this paper, a transceiver receives a request to provide service rules for a user in response to a request received by the mobile communication network from the user to establish a data connection.
Abstract: Apparatuses, methods, and systems are disclosed for creating service rules based on user information retrieved from an application server. One apparatus includes a processor and a transceiver that communicates with one or more network functions in a mobile communication network. The transceiver receives a request to provide service rules for a user in response to a request received by the mobile communication network from the user to establish a data connection. The processor identifies one or more service contexts associated with the user and retrieves user information by using each of the identified one or more service contexts. A service context holds information for accessing user information in an application server. The processor creates one or more service rules by using the user information, wherein the mobile communication network applies the one or more service rules to configure the data connection.