WO/2015/076710 PROFILE CHANGE MANAGEMENT||WO||28.05.2015|
||PCT/SE2013/051360||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||SELANDER, Göran|
It is disclosed methods and trusted execution environments (TEE) of enabling one of at least two profile domains. An authorisation token for authorising a TEE application to request one of the at least two profile domains to be enabled, is received (816, 1102). The validity of the authorization token is checked (818, 1104). If the authorization token is valid, information about the TEE application being authorised to request one of the at least two profile domains to be enabled, is stored (820, 1106). If receiving (822) a command requesting the authorised TEE application to request (824, 1108) one of the at least two profile domains to be enabled, said one of the at least two profile domains is enabled (826, 1110). A TEE comprises a processor and a memory storing a computer program comprising computer program code for executing the method when the code is run in the processor.
WO/2015/076711 METHOD AND BASE STATION FOR SUPPORTING D2D COMMUNICATION||WO||28.05.2015|
||PCT/SE2013/051362||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||GATTAMI, Ather|
A method and base station (800) for supporting Device-to-Device, D2D, communication over a D2D radio link between a first wireless device (D1) and a second wireless device (D2). The base station (800) obtains a first path gain (G12) of the D2D radio link, a second path gain (G1) of a cellular radio link between the base station(800) and the first wireless device (D1), and a third path gain (G2) of a cellular radio link between the base station (800) and the second wireless device (D2).The base station (800) then applies a D2D communication mode with network coding for the D2D communication when the first, second and third path gains (G12,G1,G2) satisfy a threshold condition.
WO/2015/076714 CENTRALISED CAPABILITY DISCOVERY||WO||28.05.2015|
||PCT/SE2013/051377||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||GONZALEZ DE LANGARICA, Ester|
According to aspects of the invention there are provided methods and apparatus for use in a communication network (301) to enable a user to determine the applications that are used by other users in said user's address book contact information. The application(s) are installed on the user equipment (304) of the other users. The network (301) includes a contact information server(302) and a plurality of user equipment (303, 304) associated with the user and the other users. The contact information server (302) receives, from a user equipment (303) of a first user or a network entity on behalf of the first user, a capabilities request message for an indication of applications used by one or more other users in the address book contact information of the first user. The contact information server (302) queries a contact information database (305) and determines the application(s) used or installed by the one or more other users in the address book contact information of the first user. The contact information server (302) transmits a capabilities response message comprising capability information representative of the determined application(s)to said user equipment (303) of the first user or said network entity for display of the capabilities information to the first user.
WO/2015/076709 PROFILE INTEGRATION MANAGEMENT||WO||28.05.2015|
||PCT/SE2013/051358||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||SELANDER, Göran|
It is disclosed a method and trusted execution environments (TEE) of assigning a selected identifier to an application. A request is received to load or install, within or outside a profile domain, of an application with a selected identifier. It is checked that the selected identifier is not already stored in an application registry entry outside the profile registry 230, 302. If it is requested to load or install the application in the selected profile domain, the selected identifier is assigned to said application if the selected identifier is not already stored in an application entry of a profile domain registry associated with the selected profile domain. If it is requested to load or install the application outside any profile domain, the selected identifier is assigned to said application if the selected identifier is not already stored in an application entry of any of at least two profile domain registries.
WO/2015/076707 METHODS AND MEANS FOR RADIO BEARER RELEASE||WO||28.05.2015|
||PCT/SE2013/051353||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||VOIGT, Lotta|
The present disclosure concerns radio communication. More particularly, the present disclosure inter alia introduces methods and means for improved radio access bearer (RAB) release, particularly in situations when there is a RAB limitation requirement. According to one embodiment, a method is performed by a radio network node. The radio network node is handling a set of RABs. This set of RABs consists of one or more RABs. Information related to each RAB of the set of RABs is obtained (130). The obtained information is processed (140) to generate a predicted timing of a next data transmission for each RAB. Also, a ranking is determined (150) for each RAB. This ranking is determined based on the predicted timing. Furthermore, a subset of the set of RABs is selected (160) based on the determined ranking. The subset of the set of RABs is selected (160) in such way that a cardinality of the selected subset complies with a RAB limitation requirement. Finally, any RAB of the set of RABs which is not in the selected subset is released (170), whereas any RAB of the set of RABs which is in the selected subset is kept (180).
WO/2015/076708 METHOD AND FIRST NETWORK NODE FOR MANAGING A FIRST IP PATH USED BY A CONNECTION||WO||28.05.2015|
||PCT/SE2013/051355||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||PORFIRI, Claudio|
A first network node (110) and a method therein for managing a first Internet Protocol, "IP", path (P1) used by a connection between the first network node (110) and a second network node (120) are disclosed. The connection is established in a transport layer of the first and second network nodes (110, 120). The transport layer is supported by an IP layer of the first and second network nodes (110, 120). The first network node (110) manages a second IP path (P2) for use by the connection. The first network node (110) determines (201) an indication of delay for a packet travelling in the first IP path. The indication relates to time for the packet to travel between the first network node (110) and the second network node(120). The first network node (110) estimates (204) a second derivative of the indication of delay. The second derivative of the indication of delay indicates a rate of change of the indication of delay. The first network node (110) sets (205), based on the second derivative of the indication of delay, a counter for tracking the rate of change of the indication of delay. The first network node (110) modifies (210) the connection (C1) to use the second IP path for transmission of packets between the first network node (110) and the second network node (120), when the counter exceeds a threshold value. Furthermore, a computer program and a computer program product are disclosed.
WO/2015/076712 DYNAMIC DM-RS SEQUENCE SELECTION BY PQL INDICATOR||WO||28.05.2015|
||PCT/SE2013/051368||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||WERNER, Karl|
Methods and apparatus are disclosed for dynamical DM-RS sequence generation in a wireless communications system. The present application discloses that a Physical Downlink Shared Channel (PDSCH) Resource Element (RE) Mapping and Quasi-Co-Location (PQL) indicator can be used to dynamically modify or update the DM-RS sequence generation parameters at a UE. Both the eNB and the UE generate DM-RS reference signals based on the reconfigured parameters. The eNB transmits the generated DM-RS reference signals to the UE to assist the UE in channel estimation.
WO/2015/076715 METHOD AND SYSTEM FOR SYNCHRONIZATION OF TWO DATABASES IN A LAWFUL INTERCEPTION NETWORK BY COMPARING CHECKSUM VALUES||WO||28.05.2015|
||PCT/SE2013/051378||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||IMBIMBO, Amedeo|
The present invention relates to methods and Validity securing arrangement and embodiments thereof for effectively securing validity of a target database in a node in a Lawful Interception Network. Said target database is intended to be identical to a source target database. The arrangement comprises a processing means being adapted to send a request for a target database checksum to the node comprising the target database, to receive a response comprising the target database checksum from the requested node, to compare the received target database checksum to a source target database checksum determined for the corresponding source target database, and to send an order to start an audit and synchronisation process if the two compared checksums differ.
WO/2015/076713 A METHOD, NODE AND COMPUTER PROGRAME FOR PROVIDING LIVE CONTENT STREAMING.||WO||28.05.2015|
||PCT/SE2013/051370||TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)||SLSSINGAR, Michael John|
It is presented a method for providing live content comprising a plurality of sequential segment files to at least one client device. The method is performed in a multimedia streaming service node and comprising the steps of: receiving metadata for the live content, the metadata comprising references to at least one representation of the live content, wherein each representation corresponds to a bitrate and defines timing of at least one of the segment files; creating a schedule defining when to obtain at least one of the segment files; pulling segment files from a content source in accordance with the schedule; and gradually pushing the pulled segment files over a bearer to the at least one client device, as the segment files are pulled to the multimedia streaming service node.A corresponding multimedia streaming service node, computer program and computer program product are also presented.
WO/2015/076727 LINEAR ELECTRO-MECHANICAL ACTUATOR||WO||28.05.2015|
||PCT/SE2014/051353||AKTIEBOLAGET SKF||HÖGBERG, Pär|
The present invention relates to a linear electro-mechanical actuator for transferring a rotational motion to a linear motion. The actuator comprises a piston having an outer surface and being at least partly arranged inside a housing. The housing comprises an inner load-carrying surface. The actuator further comprises a transmission module adapted to transfer a rotational motion generated by a motor to a linear motion of the piston. The actuator further comprises a load-carrying member and a lubricating member comprising a porous polymeric matrix and a lubricating material, the load- carrying member and the lubricating member being arranged adjacent to each other. Thereby, the actuator allows for lubrication of at least a portion of the inner load-carrying surface of the housing by the lubricating material upon movement of the piston. For instance, the linear electro-mechanical actuator may not require, or may at least minimize, the need of relubrication.