Patents by Inventor Vesa Virkki
Vesa Virkki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10708772Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used for encrypting data sent to the wireless terminal by the anchor base station.Type: GrantFiled: August 24, 2018Date of Patent: July 7, 2020Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Patent number: 10243706Abstract: The invention relates to a wireless device, network nodes and methods therein for handling interference. A method in a wireless device comprises receiving an Instant Uplink Access, IUA, grant from the first network node, which indicates at least a periodicity of a semi-persistent scheduling. The method further comprises, when having information to be transmitted in the UL to the first network node: determining whether being scheduled for UL transmission by the second network node in a resource associated with the IUA grant or not. The method further comprises: when not being scheduled: transmitting UL information to the first network node in the resource associated with IUA; and, when being scheduled: refraining from transmitting the UL information to the first network node in the resource associated with IUA.Type: GrantFiled: May 12, 2015Date of Patent: March 26, 2019Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Antti Ratilainen, Helka-Liina Määttanen, Vesa Virkki, Stefan Wager
-
Publication number: 20180367991Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used for encrypting data sent to the wireless terminal by the anchor base station.Type: ApplicationFiled: August 24, 2018Publication date: December 20, 2018Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Publication number: 20180091269Abstract: The invention relates to a wireless device, network nodes and methods therein for handling interference. A method in a wireless device comprises receiving an Instant Uplink Access, IUA, grant from the first network node, which indicates at least a periodicity of a semi-persistent scheduling. The method further comprises, when having information to be transmitted in the UL to the first network node: determining whether being scheduled for UL transmission by the second network node in a resource associated with the IUA grant or not. The method further comprises: when not being scheduled: transmitting UL information to the first network node in the resource associated with IUA; and, when being scheduled: refraining from transmitting the UL information to the first network node in the resource associated with IUA.Type: ApplicationFiled: May 12, 2015Publication date: March 29, 2018Inventors: Antti RATILAINEN, Helka-Liina MÄÄTTANEN, Vesa VIRKKI, Stefan WAGER
-
Patent number: 9641650Abstract: In methods and devices for controlling a TCP proxy server, the TCP-proxy initial window size is set based on TCP RTT measurements. This is possible because the TCP proxy has knowledge about both sides Round Trip Time RTT values just after opening the TCP connections. The proxy can set its initial window size higher in the download case if it notices that the RTT in the link between the proxy and internet is shorter than the RTT in the other link, typically a wireless link. In the opposite case, when the RTT in the link between the proxy and internet is longer than the RTT in the other link, typically a wireless link, the TCP proxy can be configured to send more Acknowledgements (ACKs) to increase the internet TCP server congestion window size faster.Type: GrantFiled: August 23, 2012Date of Patent: May 2, 2017Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Vesa Virkki, Anzil Abdul Rasheed
-
Patent number: 9614652Abstract: Embodiments herein relate to a system for enabling communication in the radio communications network (1). The system comprises the first radio base station (12), the second radio base station (13) and the wireless terminal (10). The first radio base station (12) and the second radio base station (13) are configured to serve the wireless terminal (10) simultaneously. The first radio base station (12) is configured to set up to the wireless terminal (10), a first channel for receiving data over from the wireless terminal (10), and a first assisting channel for transmitting feedback data regarding transmissions over the first channel. The second radio base station (13) is configured to set up to the wireless terminal (10), a second channel for transmitting data over to the wireless terminal (10), and a second assisting channel for receiving, from the wireless terminal (10), feedback data regarding transmissions over the second channel.Type: GrantFiled: April 4, 2014Date of Patent: April 4, 2017Assignee: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Stefan Wager, Fredrik Gunnarsson, Niklas Johansson, Magnus Stattin, Riikka Susitaival, Vesa Virkki
-
Publication number: 20160277445Abstract: Methods and apparatus for determining a security algorithm to be used for secured communications between a wireless terminal and a second node while the wireless terminal is dually connected to a first node and to the second node. An example method, implemented in the first node, includes determining (610) a first set of security algorithms, the first set including those algorithms supported by the wireless terminal. A second set of security algorithms is also determined (620), where the second set includes those security algorithms that are supported by the second node. In some embodiments, this determining (620) includes receiving information from the second node, the information identifying which security algorithms are supported by the second node. At least one security algorithm is then indicated (630) to the second node, wherein the indicated security algorithm is chosen from the intersection of the first and second sets.Type: ApplicationFiled: January 30, 2014Publication date: September 22, 2016Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Publication number: 20160174070Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used for encrypting data sent to the wireless terminal by the anchor base station.Type: ApplicationFiled: February 24, 2016Publication date: June 16, 2016Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Patent number: 9301134Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.Type: GrantFiled: January 30, 2014Date of Patent: March 29, 2016Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Publication number: 20160050054Abstract: Embodiments herein relate to a system for enabling communication in the radio communications network (1). The system comprises the first radio base station (12), the second radio base station (13) and the wireless terminal (10). The first radio base station (12) and the second radio base station (13) are configured to serve the wireless terminal (10) simultaneously. The first radio base station (12) is configured to set up to the wireless terminal (10), a first channel for receiving data over from the wireless terminal (10), and a first assisting channel for transmitting feedback data regarding transmissions over the first channel. The second radio base station (13) is configured to set up to the wireless terminal (10), a second channel for transmitting data over to the wireless terminal (10), and a second assisting channel for receiving, from the wireless terminal (10), feedback data regarding transmissions over the second channel.Type: ApplicationFiled: April 4, 2014Publication date: February 18, 2016Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Stefan WAGER, Fredrik GUNNARSSON, Niklas JOHANSSON, Magnus STATTIN, Riikka SUSITAIVAL, Vesa VIRKKI
-
Patent number: 9215057Abstract: A radio base station, a relay node and a respective method therein are provided for communicating data to a user equipment, the relay node being associated with the base station, wherein a downlink transmission to the user equipment is scheduled on subframe(s) available for the base station. The method in the radio base station comprises detecting that at least a part of the available subframes are not needed for downlink transmission to the relay node; and un-reserving at least one of the not needed subframes. The method further comprises transmitting, to the relay node, a release notification message notifying the relay node of the unreserved subframes for enabling the relay node to use the unreserved subframes for downlink transmission.Type: GrantFiled: June 29, 2011Date of Patent: December 15, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Stefan Wager, Christian Hoymann, Riikka Susitaival, Vesa Virkki
-
Publication number: 20150245289Abstract: A TCP Proxy node (110) for use in a communications network (100), the TCP Proxy node (110) being arranged to receive TCP Packets originating from a first node (105) in a core network in the communications network and to transmit said TCP Packets for reception by an end user (120,121, 122) in a radio access network in the communications network (100). The TCP proxy node (110) is arranged to be informed about an inactivity period during which the end user (120,121, 122) is unable to receive TCP Packets, and to schedule said transmissions of TCP Packets so that they are received by the end user (120,121, 122) outside of said inactivity period.Type: ApplicationFiled: September 26, 2012Publication date: August 27, 2015Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Anzil Abdul Rasheed, Francesco Militano, Swaminathan Vasanth Rajaraman, Vesa Virkki
-
Publication number: 20150237173Abstract: In methods and devices for controlling a TCP proxy server, the TCP-proxy initial window size is set based on TCP RTT measurements. This is possible because the TCP proxy has knowledge about both sides Round Trip Time RTT values just after opening the TCP connections. The proxy can set its initial window size higher in the download case if it notices that the RTT in the link between the proxy and internet is shorter than the RTT in the other link, typically a wireless link In the opposite case, when the RTT in the link between the proxy and internet is longer than the RTT in the other link, typically a wireless link, the TCP proxy can be configured to send more Acknowledgements (ACKs) to increase the internet TCP server congestion window size faster.Type: ApplicationFiled: August 23, 2012Publication date: August 20, 2015Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Vesa Virkki, Anzil Abdul Rasheed
-
Publication number: 20150092942Abstract: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station key. The generated assisting security key is sent (820) to the assisting base station, for use by the assisting base station in encrypting data traffic sent to the wireless terminal or in generating one or more additional assisting security keys for encrypting data traffic sent to the wireless terminal while the wireless terminal is dually connected to the anchor base station and the assisting base station. The anchor base station key, or a key derived from the anchor base station key, is used (830) for encrypting data sent to the wireless terminal by the anchor base station.Type: ApplicationFiled: January 30, 2014Publication date: April 2, 2015Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Stefan Wager, Niklas Johansson, Karl Norrman, Oumer Teyeb, Vesa Virkki
-
Publication number: 20140229570Abstract: A radio layer apparatus for transmitting a given block of data to a wireless device over a radio interface controlled by the radio layer apparatus. The apparatus comprises a data manager for defining download locations for data chunks making up said data block, and a relay for relaying download requests received over said radio interface from said wireless device towards said download locations and for relaying received requested data chunks to the wireless device over said radio interface. There is further provided an Internet Protocol, IP, session manager for establishing an IP connection with the wireless device, and a controller for monitoring capacity on said radio interface and, if sufficient capacity is available, for sending further data chunks that have not as yet been requested by the wireless device, to the wireless device over said IP connection.Type: ApplicationFiled: March 30, 2011Publication date: August 14, 2014Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Lars Westberg, Mats Folke, Vesa Virkki
-
Publication number: 20140133388Abstract: A radio base station, a relay node and a respective method therein are provided for communicating data to a user equipment, the relay node being associated with the base station, wherein a downlink transmission to the user equipment is scheduled on subframe(s) available for the base station. The method in the radio base station comprises detecting that at least a part of the available subframes are not needed for downlink transmission to the relay node; and un-reserving at least one of the not needed subframes. The method further comprises transmitting, to the relay node, a release notification message notifying the relay node of the unreserved subframes for enabling the relay node to use the unreserved subframes for downlink transmission.Type: ApplicationFiled: June 29, 2011Publication date: May 15, 2014Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Stefan Wager, Christian Hoymann, Riikka Susitaival, Vesa Virkki
-
Patent number: 8305997Abstract: A method, apparatus, and system are described relating to at time when a wireless terminal reports an event to a network. An event to be reported to the network is detected by the wireless terminal. A communications condition affecting a communication between the wireless terminal and the network is determined, and based on the detected communications condition, a dynamic time-to-trigger period is adjusted so that the event is reported by the wireless terminal to the network before the time-to-trigger period expires.Type: GrantFiled: March 10, 2009Date of Patent: November 6, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Vesa Virkki, Jose Luis Pradas
-
Publication number: 20100234014Abstract: A method, apparatus, and system are described relating to at time when a wireless terminal reports an event to a network. An event to be reported to the network is detected by the wireless terminal. A communications condition affecting a communication between the wireless terminal and the network is determined, and based on the detected communications condition, a dynamic time-to-trigger period is adjusted so that the event is reported by the wireless terminal to the network before the time-to-trigger period expires.Type: ApplicationFiled: March 10, 2009Publication date: September 16, 2010Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Vesa VIRKKI, Jose Luis Pradas