Notice of Pre-AIA or AIA Status
The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA .
DETAILED ACTION
a. Claims 1-20 in the present application, filed on or after March 16, 2013, are being examined under the first inventor to file provisions of the AIA .
b. This is a first action on the merits based on Applicant’s claims submitted on 02/01/2024.
Information Disclosure Statement
The information disclosure statement (IDS) submitted on 02/01/2024 is in compliance with the provisions of 37 CFR 1.97. Accordingly, the information disclosure statement is being considered by the examiner.
Claim Rejections - 35 USC § 103
The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action:
A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102 of this title, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made.
In the event the determination of the status of the application as subject to AIA 35 U.S.C. 102 and 103 (or as subject to pre-AIA 35 U.S.C. 102 and 103) is incorrect, any correction of the statutory basis for the rejection will not be considered a new ground of rejection if the prior art relied upon, and the rationale supporting the rejection, would be the same under either status.
Claims 1-2, 8-10, and 19-20 are rejected under 35 U.S.C. 103 as being unpatentable over Li et al. US Pub 2024/0224369, claiming foreign application priority 2021-09-18 (hereinafter “Li”), and in view of Ryu et al. US Pub 2018/0184246 (hereinafter “Ryu”).
Regarding claim 1
Li discloses a method for adjusting a network camping policy of a terminal (“the method further includes: the access network device may determine a target camping cell of the terminal device from first cells of the target camping area” [0026]), comprising:
adjusting, by the first terminal (i.e. “UE”, “terminal”), a network camping policy of the first terminal (“the access network device may alternatively determine the target camping cell of the UE”), according to the first network state information (e.g. “the information about the peer-to-peer network of the first network”) and cell measurement information of candidate cells (“based on cell measurement information reported by the UE”) of the first terminal (“the access network device may alternatively determine the target camping cell of the UE based on cell measurement information reported by the UE and the information about the peer-to-peer network of the first network. For example, a network side determines the target camping cell of the UE based on the following steps. B1: The access network device determines, based on the cell measurement information reported by the UE, a target camping cell that meets a level quality requirement. In this way, the access network device may ensure, with reference to the cell measurement information of the UE, that the determined target camping cell is a cell that meets the requirement.” [0168-0169]).
Li does not specifically teach receiving, by a first terminal, first network state information sent by at least one second terminal, the first network state information indicating whether a cell accessed by the at least one second terminal within a preset time period is a cell of network anomaly.
In an analogous art, Ryu discloses receiving, by a first terminal (i.e. “UE”), first network state information sent by at least one second terminal (i.e. “network”), the first network state information indicating whether a cell accessed by the at least one second terminal (“After the measurement of the neighbor cell, the UE ranks all cells and reads required system information of a cell having a highest priority. When the cell is suitable for camping and the following reselection condition is satisfied, the UE reselects the corresponding cell.” [0372]) within a preset time period is a cell of network anomaly (“Case where a new cell has a higher priority than the serving cell during a T_reselection time interval (during the interval, the UE needs to measure the serving cell and the neighbor cell.). Herein, the timer value may be broadcasted within the system information. Case where the UE currently camps on the serving cell during a defined period.” [0373-0374])
Before the effective filling date of the claimed invention, it would have been obvious to one of ordinary skill in the art to modify Li’s peer-to-peer network based network selection method to include Ryu’s method for cell reselection in order to determine optimal cell candidates for cell camping reselection (Ryu [0372]). Thus, a person of ordinary skill would have appreciated the ability to incorporate Ryu’s method for cell reselection into Li’s peer-to-peer network based network selection method since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable.
Regarding claim 2
Li, as modified by Ryu, previously discloses the method of claim 1, wherein adjusting, by the first terminal, the network camping policy of the first terminal according to the first network state information and the cell measurement information of the candidate cells of the first terminal, comprises:
Li further discloses adjusting, by the first terminal, a priority order of the candidate cells of the first terminal (“For example, to improve efficiency and quality of determining, by the UE, the target camping cell, the UE may further determine the target camping cell based on priorities.” [0149]), according to a network connection state of the first terminal, the first network state information (e.g. “the information about the peer-to-peer network of the first network”) and the cell measurement information of the candidate cells of the first terminal (“based on cell measurement information reported by the UE”), the network connection state indicating whether the first terminal accesses a cell (“the access network device may alternatively determine the target camping cell of the UE based on cell measurement information reported by the UE and the information about the peer-to-peer network of the first network. For example, a network side determines the target camping cell of the UE based on the following steps. B1: The access network device determines, based on the cell measurement information reported by the UE, a target camping cell that meets a level quality requirement. In this way, the access network device may ensure, with reference to the cell measurement information of the UE, that the determined target camping cell is a cell that meets the requirement.” [0168-0169]); and
adjusting the network camping policy according to the adjusted priority order (see Table 2) of the candidate cells (“A1: If the UE determines that a coverage area of the first priority includes the target camping area, the UE determines the target camping cell from cells corresponding to the first priority. In this way, the UE can ensure a network connection through cell selection without network switching.” [0151]).
Regarding claim 8
Li, as modified by Ryu, previously discloses the method of claim 1,
Li further discloses wherein the first terminal and the second terminal are terminals located within a preset area and served by a same service provider; or the first terminal and the second terminal are terminals located within a preset area and utilizing a same type of network (“If the cell corresponding to the first network exists in the target camping area of the terminal device, the terminal device may determine the target camping cell without changing a network. If the cell corresponding to the first network does not exist in the target camping area of the terminal device, the terminal device may preferentially determine whether the cell corresponding to the peer-to-peer network exists in the target camping area. If the cell corresponding to the peer-to-peer network exists, the terminal device preferentially accesses the cell corresponding to the peer-to-peer network. In this way, network quality of the target access network determined by the terminal device can be ensured, reliability of network selection, reselection, and switching can be improved, and service processing continuity can be ensured.” [0014]).
Regarding claim 9
Li discloses a terminal (“The communication apparatus 1500 may be the UE” [0217]; Fig. 15), comprising a memory (“memory 1503” [0218]; Fig. 15) and a processor (“processor 1501” [0218]; Fig. 15), wherein the memory stores a computer program which, when being executed by the processor (“The memory 1503 is configured to store program instructions and/or data, and the processor 1501 is configured to execute the program instructions stored in the memory 1503” [0218]), causes the processor to:
receive first network state information sent by at least one further terminal located in a same preset area as the terminal, the first network state information indicating whether a cell accessed by the at least one further terminal within a preset time period is a cell of network anomaly; and
adjust a network camping policy of the terminal, according to the first network state information and cell measurement information of candidate cells of the terminal.
The scope and subject matter of apparatus claim 9 is drawn to the apparatus of using the corresponding method claimed in claim 1. Therefore apparatus claim 9 corresponds to method claim 1 and is rejected for the same reasons of obviousness as used in claim 1 rejection above.
Regarding claim 10
The terminal of claim 9, wherein the computer program, when being executed by the processor, causes the processor further to:
adjust a priority order of the candidate cells of the terminal, according to a network connection state of the terminal, the first network state information and the cell measurement information of the candidate cells of the terminal, the network connection state indicating whether the terminal accesses a cell; and
adjust the network camping policy according to the adjusted priority order of the candidate cells.
The scope and subject matter of apparatus claim 10 is drawn to the apparatus of using the corresponding method claimed in claim 2. Therefore apparatus claim 10 corresponds to method claim 2 and is rejected for the same reasons of obviousness as used in claim 2 rejection above.
Regarding claim 19
The terminal of claim 9, wherein the terminal and the at least one further terminal are served by a same service provider or utilize a same type of network.
The scope and subject matter of apparatus claim 19 is drawn to the apparatus of using the corresponding method claimed in claim 8. Therefore apparatus claim 19 corresponds to method claim 8 and is rejected for the same reasons of obviousness as used in claim 8 rejection above.
Regarding claim 20
A non-transitory computer-readable storage medium storing a computer program thereon, wherein the computer program, when being executed by a terminal, cause the terminal to:
receive first network state information sent by at least one further terminal located in a same preset area as the terminal, the first network state information indicating whether a cell accessed by the at least one further terminal within a preset time period is a cell of network anomaly; and
adjust a network camping policy of the terminal, according to the first network state information and cell measurement information of candidate cells of the terminal.
The scope and subject matter of non-transitory computer readable medium claim 20 is drawn to the computer program product of using the corresponding method claimed in claim 1. Therefore computer program product claim 20 corresponds to method claim 1 and is rejected for the same reasons of obviousness as used in claim 1 rejection above.
Claims 3 and 11 are rejected under 35 U.S.C. 103 as being unpatentable over Li, in view of Ryu, and further in view of Yang et al. US Pub 2023/0370922, claiming domestic priority 2021-04-16 (hereinafter “Yang”).
Regarding claim 3
Li, as modified by Ryu, previously discloses the method of claim 2,
Li further discloses wherein the network connection state of the first terminal comprises an idle state (“the terminal device is in an idle state” [0009]) and a connected state (“the terminal device is in a connected state” [0017]), adjusting the priority order of the candidate cells of the first terminal, according to the network connection state of the first terminal, the first network state information and the cell measurement information of the candidate cells of the first terminal, comprises:
while the first terminal is in the idle state, in response to the first network state information indicating that the cell accessed by the at least one second terminal within the preset time period is a cell of network anomaly (“In a possible design, the terminal device is in an idle state, and that the terminal device determines a second network based on information about a peer-to-peer network of a first network includes: If a coverage area of the first network does not include a target camping area of the terminal device, and a coverage area of at least one of the peer-to-peer network includes the target camping area, the terminal device may determine the second network from the at least one peer-to-peer network.” [0009]),
lowering a priority of the cell of network anomaly in a priority list of the candidate cells, wherein the idle state indicates that the first terminal accesses no cell, and the priority list of the candidate cells is generated by prioritizing the candidate cells according to the cell measurement information of the candidate cells.
In an analogous art, Yang discloses lowering a priority of the cell of network anomaly in a priority list of the candidate cells, wherein the idle state indicates that the first terminal accesses no cell (“In this case, optionally, the case where the priority of the frequency corresponding to the first network slice of the camping cell is lower may be any one of the following two cases. The camping cell supports the first network slice, and the camping cell is the cell with the lowest priority of the frequency corresponding to the first network slice. The camping cell supports the first network slice, and the camping cell is not the cell with the highest priority of the frequency corresponding to the first network slice.” [0064-0066]), and the priority list of the candidate cells is generated by prioritizing the candidate cells (“If the camping cell does not support the second network slice, or when the camping cell supports the second network slice but the frequency corresponding to the second network slice of the camping cell does not have the highest priority, the NAS layer determines that the cell reselection needs to be performed before entering the connected mode, and the NAS layer notifies the access layer to perform the cell reselection. [0075] (2) If the camping cell supports the second network slice and the frequency corresponding to the second network slice of the camping cell has the highest priority, the NAS layer determines that no cell reselection needs to be performed before entering the connected mode, and the NAS layer notifies the access layer to enter the connected mode directly.” [0073-0075]) according to the cell measurement information of the candidate cells (“For UE in the idle mode or in the inactive mode, cell information, information of the slices supported by cell, the priority of the respective frequency corresponding to each slice and other information can be obtained through system broadcast information. If the UE in the idle mode or in the inactive mode moves (the cell handover needs to be performed), the access layer of the UE will select the cell with the highest priority of the frequency corresponding to a received slice to reside.” [0079]).
Before the effective filling date of the claimed invention, it would have been obvious to one of ordinary skill in the art to modify Li’s peer-to-peer network based network selection method, as modified by Ryu, to include Yang’s method for performing cell reselection before entering the connected mode, in order to determine whether to perform a cell reselection before entering the connected mode (Yang [0006]). Thus, a person of ordinary skill would have appreciated the ability to incorporate Yang’s method for performing cell reselection before entering the connected mode into Li’s peer-to-peer network based network selection method since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable.
Regarding claim 11
The terminal of claim 10, wherein the network connection state of the terminal comprises an idle state, the idle state indicates that the terminal access no cell, and the computer program, when being executed by the processor, causes the processor further to: when the terminal is in the idle state, in response to the first network state information indicating that the cell accessed by the at least one further terminal within the preset time period is a cell of network anomaly, lower a priority of the cell of network anomaly in a priority list of the candidate cells; wherein the priority list of the candidate cells is generated by prioritizing the candidate cells according to the cell measurement information of the candidate cells.
The scope and subject matter of apparatus claim 11 is drawn to the apparatus of using the corresponding method claimed in claim 3. Therefore apparatus claim 11 corresponds to method claim 3 and is rejected for the same reasons of obviousness as used in claim 3 rejection above.
Claims 4, 12, and 13 are rejected under 35 U.S.C. 103 as being unpatentable over Li, in view of Ryu and Yang, and further in view of Sun et al. US Pub 2022/0240133, claiming foreign application priority 2019-10-11 (hereinafter “Sun”).
Regarding claim 4
Li, as modified by Ryu and Yang, previously discloses the method of claim 3, wherein the method further comprises:
Yang further discloses while the first terminal is switched to the connected state from the idle state, in response to the first network state information indicating that the cell accessed by the at least one second terminal within the preset time period is a cell of network anomaly, modifying the cell measurement information of the cell of network anomaly (“In this example, the access layer of the terminal device determines whether to perform a cell reselection before entering the connected mode. FIG. 4 schematically shows a process of a terminal device entering a connected mode according to an embodiment of the present disclosure. The processing procedure disclosed in this example is described below according to FIG. 4. [0080] 1. The UE registers with the network, obtains the allowed NSSAI from the AMF, and establishes the PDU session corresponding to the service. For example, allowed NSSAI includes slice 1 and slice 2. [0081] 2. The NAS layer of the UE provides slice information to the access layer (e.g., the Radio Resource Control (RRC) layer). The slice information can be allowed NSSAI (e.g., slice 1 and slice 2 used in the idle mode) or slice information corresponding to PDU session (e.g., slice 1 and slice 2 used in the inactive mode). The NAS layer of the UE can send the allowed NSSAI to the RRC layer immediately after receiving the allowed NSSAI, or the NAS layer of the UE can send the allowed NSSAI to the RRC layer after the UE enters the idle mode or the inactive mode. For UE in the idle mode or in the inactive mode, cell information, information of the slices supported by cell, the priority of the respective frequency corresponding to each slice and other information can be obtained through system broadcast information. If the UE in the idle mode or in the inactive mode moves (the cell handover needs to be performed), the access layer of the UE will select the cell with the highest priority of the frequency corresponding to a received slice to reside.” [0079]), and adjusting the priority order of the candidate cells of the first terminal according to the modified cell measurement information, wherein the connected state indicates that the first terminal accesses a cell (“After receiving the slice information sent by the NAS layer, the access layer determines whether the slice information is in the allowed NSSAI, and whether there is a cell with higher priority of the frequency corresponding to the slice information around. If the slice information is in the allowed NSSAI and the priority of the frequency of the camping cell is already the highest priority, the camping cell is taken as the final selected cell to establish connection and enter the connected mode. If the slice information is not in the allowed NSSAI, or the slice information is in the allowed NSSAI but the cell with the highest priority of the frequency corresponding to the slice information is not the camping cell (for example, being a neighbour cell), the access layer needs to perform cell reselection again before establishing the connection. During performing the cell reselection, a new slice (if any) should be taken into account, and the cell supporting the new slice and corresponding to the frequency with the highest priority in the slice should be selected.” [0079]); and
Li, Ryu, and Yang do not specifically teach wherein the cell measurement information comprises a signal strength measurement value, and modifying the cell measurement information of the cell of network anomaly, comprises: reducing the signal strength measurement value of the cell of network anomaly.
In an analogous art, Sun discloses wherein the cell measurement information comprises a signal strength measurement value, and modifying the cell measurement information of the cell of network anomaly, comprises: reducing the signal strength measurement value of the cell of network anomaly (“the UE may collect statistics of measured values of inter-frequency cells in a plurality of most recent times, calculate an adjustment value according to these measured values, and determine a specific offset value (including at least one of a cell-specific offset and a frequency-specific offset) based on the adjustment value, that is, determine the foregoing first information.” [0087]).
Before the effective filling date of the claimed invention, it would have been obvious to one of ordinary skill in the art to modify Li’s peer-to-peer network based network selection method, as modified by Ryu and Yang, to include Sun’s cell camping method, in order to avoid a ping-pong handover deadlock between a first cell and a second cell (Sun [Abstract]). Thus, a person of ordinary skill would have appreciated the ability to incorporate Sun’s cell camping method into Li’s peer-to-peer network based network selection method since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable.
Regarding claim 12
The terminal of claim 11, wherein the network connection state of the terminal further comprises a connected state, the connected state indicates that the terminal accesses a cell, and the computer program, when being executed by the processor, causes the processor further to:
when the terminal is switched from the idle state to the connected state, in response to the first network state information indicating that the accessed cell accessed by the at least one further terminal within the preset time period is a cell of network anomaly, modify the cell measurement information of the cell of network anomaly, and adjust, according to modified cell measurement information, the priority order of the candidate cells of the terminal.
The scope and subject matter of apparatus claim 12 is drawn to the apparatus of using the corresponding method claimed in claim 4. Therefore apparatus claim 12 corresponds to method claim 4 and is rejected for the same reasons of obviousness as used in claim 4 rejection above.
Regarding claim 13
The terminal of claim 12, wherein the cell measurement information comprises a signal strength measurement value, and the computer program, when being executed by the processor, causes the processor further to:
in response to the first network state information indicating that the accessed cell accessed by the at least one further terminal within the preset time period is a cell of network anomaly, reduce the signal strength measurement value of the cell of network anomaly.
The scope and subject matter of apparatus claim 13 is drawn to the apparatus of using the corresponding method claimed in claim 4. Therefore apparatus claim 13 corresponds to method claim 4 and is rejected for the same reasons of obviousness as used in claim 4 rejection above.
Claims 5-7 and 14-18 are rejected under 35 U.S.C. 103 as being unpatentable over Li, in view of Ryu, and further in view of Hooli et al. US Pub 2022/0029892 (hereinafter “Hooli”).
Regarding claim 5
Li, as modified by Ryu, previously discloses the method of claim 1, wherein the method further comprises:
Ryu further discloses in response to the state parameters meeting a preset abnormal cell determination condition, determining the target cell as a cell of network anomaly, and adding a cell identifier of the target cell to an abnormal cell list (“In the case of performing the cell based location area update, the UE may directly indicate a cell identifier (ID) or the eNB may make the cell ID and an eNB identifier (ID) be included in the RRC message in which the NAS message is encapsulated together and report the identifiers to the CN.” [0422]);
generating, according to the abnormal cell list, second network state information (“a method for performing, by a terminal, location area update in a wireless communication system may include: transmitting, to a network node, a first request message including an additional cell list comprising one or more neighboring cells of a serving cell of the terminal; receiving, from the network node, a first accept message including information indicating acceptance of the use of the additional cell list; and when a changed serving cell of the terminal belongs to a tracking area configured to the terminal and does not belong to the additional cell list, performing a cell based area update procedure.” [0008]); and
broadcasting, by the first terminal, the second network state information to the at least one second terminal (“Case where a new cell has a higher priority than the serving cell during a T_reselection time interval (during the interval, the UE needs to measure the serving cell and the neighbor cell.). Herein, the timer value may be broadcasted within the system information” [0372]);
Li and Ryu do not specifically teach after the first terminal accesses a target cell according to the adjusted network camping policy, acquiring state parameters of the target cell; wherein the state parameters comprise at least an uplink rate, a downlink rate, a network delay, a bit error rate, and times of resource release occurring in an application.
In an analogous art, Hooli discloses after the first terminal accesses a target cell according to the adjusted network camping policy, acquiring state parameters of the target cell (“various types of data may be collected, wherein some of the data may be reported by the UEs while the other data may be measured or monitored by the network elements.” [0032]); wherein the state parameters comprise at least an uplink rate, a downlink rate, a network delay, a bit error rate, and times of resource release occurring in an application (“example variables that may be measured for an LTE implementation may include, without limitation, one or more of the following: session setup success rate, Radio Resource Control (RRC) connection setup success rate, initial E-UTRAN Radio Access Bearer (ERAB) establishment success rate, added ERAB establishment success rate, signaling setup success rate, contention based random access success rate, session abnormal release rate, ERAB abnormal release date, ERAB retainability, UE context abnormal release rate, intra frequency handover success rate, inter frequency handover success rate, Call Setup Fall-Back (CSFB) success rate, Single Radio Voice Call Continuity (SRVCC) success rate, downlink (DL) user throughput, uplink (UL) user throughput, DL cell throughput, UL cell throughput, DL latency, DL packet loss rate, UL packet loss rate, Media Access Control (MAC) DL block rate error (BLER) percentage, MAC UL BLER percentage, Packet Data Convergence Protocol (PDCP) DL data volume, PDCP UL data volume, DL radio utilization, UL radio utilization, DL Physical Resource Block (PRB) utilization, UL PRB utilization, Control Channel Element (CCE) utilization on Physical Downlink Control Channel (PDCCH), average number of RRC connected users, average number of DL active users, number of RRC connection attempts, Signal-to-Interference plus Noise (SINR) of Physical Uplink Shared Channel (PUSCH), SINR of Physical Uplink Control Channel (PUCCH), Channel Quality Indicator (CQI) metrics, average RRSI, number of ERAB attempts, number of ERAB failures, number of establishment attempts, number of establishment successes, number of connection drops, Quality of Service (QoS) Class Identifier (QCI) accessibility percentages, QCI retainability percentages, Voice over Long Term Evolution (VoLTE) call attempts, global positioning data, number of critical alarm counts, number of major alarm counts, number of minor alarm counts, Inter Radio Access Technology (IRAT) handover rate, DL spectral efficiency rate, (bps/Hz/cell), and UL spectral efficiency rate (bps/Hz/cell), etc.” [0032]).
Before the effective filling date of the claimed invention, it would have been obvious to one of ordinary skill in the art to modify Li’s peer-to-peer network based network selection method, as modified by Ryu, to include Hooli’s method for optimizing input data for an ML model associated with a communications network, in order to achieve KPIs based on measured test data (Hooli [Abstract]). Thus, a person of ordinary skill would have appreciated the ability to incorporate Hooli’s method for optimizing input data for an ML model associated with a communications network into Li’s peer-to-peer network based network selection method since the claimed invention is merely a combination of old elements, and in the combination each element merely would have performed the same function as it did separately, and one of ordinary skill in the art would have recognized that the results of the combination were predictable.
Regarding claim 6
Li, as modified by Ryu and Hooli, previously discloses the method of claim 5, wherein the method further comprises:
Ryu further discloses acquiring a time duration during which each cell of network anomaly is listed on the abnormal cell list (“the cell based area update may be permitted during the Attach/TAU procedure and the additional cell(s) in which the UE is movable during the interval of the idle mode may be provided to the MME together. That is, when the cell based area update is configured for the UE, the UE may additionally perform the TAU when the serving cell is changed. In order to prevent the TAU from being frequently performed, the MME may provide a list of cell(s) that are not required to trigger the TAU to the UE even though the cell is changed.” [0511]); and
in response to the time duration exceeding a preset time period, removing the cell identifier of a corresponding cell of network anomaly from the abnormal cell list (“In this case, the MME may derive the list of cell(s) based on a TAU result of the UE and provide the cell list to the UE in the Attach/TAU procedure.” [0511]).
Regarding claim 7
Li, as modified by Ryu and Hooli, previously discloses the method of claim 5,
Hooli further discloses wherein the preset abnormal cell determination condition comprises at least one of (“various types of data may be collected, wherein some of the data may be reported by the UEs while the other data may be measured or monitored by the network elements. Example measurements may comprise intra-frequency measurements, inter-frequency measurements, inter-RAT measurements, traffic volume measurements, quality measurements, UE internal measurements, positioning/geolocation measurements, and the like. By way of illustration, example variables that may be measured for an LTE implementation may include, without limitation, one or more of the following: session setup success rate, Radio Resource Control (RRC) connection setup success rate, initial E-UTRAN Radio Access Bearer (ERAB) establishment success rate, added ERAB establishment success rate, signaling setup success rate, contention based random access success rate, session abnormal release rate, ERAB abnormal release date, ERAB retainability, UE context abnormal release rate, intra frequency handover success rate, inter frequency handover success rate, Call Setup Fall-Back (CSFB) success rate, Single Radio Voice Call Continuity (SRVCC) success rate, downlink (DL) user throughput, uplink (UL) user throughput, DL cell throughput, UL cell throughput, DL latency, DL packet loss rate, UL packet loss rate, Media Access Control (MAC) DL block rate error (BLER) percentage, MAC UL BLER percentage, Packet Data Convergence Protocol (PDCP) DL data volume, PDCP UL data volume, DL radio utilization, UL radio utilization, DL Physical Resource Block (PRB) utilization, UL PRB utilization, Control Channel Element (CCE) utilization on Physical Downlink Control Channel (PDCCH), average number of RRC connected users, average number of DL active users, number of RRC connection attempts, Signal-to-Interference plus Noise (SINR) of Physical Uplink Shared Channel (PUSCH), SINR of Physical Uplink Control Channel (PUCCH), Channel Quality Indicator (CQI) metrics, average RRSI, number of ERAB attempts, number of ERAB failures, number of establishment attempts, number of establishment successes, number of connection drops, Quality of Service (QoS) Class Identifier (QCI) accessibility percentages, QCI retainability percentages, Voice over Long Term Evolution (VoLTE) call attempts, global positioning data, number of critical alarm counts, number of major alarm counts, number of minor alarm counts, Inter Radio Access Technology (IRAT) handover rate, DL spectral efficiency rate, (bps/Hz/cell), and UL spectral efficiency rate (bps/Hz/cell), etc. Example KPIs corresponding to one or more of the foregoing variables at an aggregate level may therefore comprise the average number of active users, average cell throughput download, average cell throughput upload, cell availability, maximum cell throughput download, maximum cell throughput upload, and upload traffic volume (e.g., in GB), and the like.” [0032]):
the uplink rate of the target cell being always less than a first threshold within a first preset time;
the downlink rate of the target cell being always less than a second threshold within a second preset time;
the number of times of releasing a configured time-frequency resource being greater than a third threshold, while there is service in the target cell;
the number of times, that the target cell refuses a data connection of the terminal, being greater than a fourth threshold;
the number of times, that a call is abnormally hung up in the target cell, being greater than a fifth threshold; and
a signal quality of the target cell being lower than a signal quality of a neighbor cell, and the number of times that the terminal accesses the target cell being greater than the number of times that the terminal accesses the neighbor cell.
Regarding claim 14
The terminal of claim 9, wherein the computer program, when being executed by the processor, causes the processor further to:
acquire state parameters of a target cell, after the target cell is accessed by the terminal according to the adjusted network camping policy;
determine, according to the state parameters, whether the target cell is a cell of network anomaly, and generate second network state information according to a determination result; and
broadcast the second network state information to the at least one further terminal.
The scope and subject matter of apparatus claim 14 is drawn to the apparatus of using the corresponding method claimed in claim 5. Therefore apparatus claim 14 corresponds to method claim 5 and is rejected for the same reasons of obviousness as used in claim 5 rejection above.
Regarding claim 15
The terminal of claim 14, wherein the computer program, when being executed by the processor, causes the processor further to:
determine the target cell as a cell of network anomaly and add a cell identifier of the target cell to an abnormal cell list, in response to the state parameters meeting a preset abnormal cell determination condition; and
generate, according to the abnormal cell list, the second network state information.
The scope and subject matter of apparatus claim 15 is drawn to the apparatus of using the corresponding method claimed in claim 5. Therefore apparatus claim 15 corresponds to method claim 5 and is rejected for the same reasons of obviousness as used in claim 5 rejection above.
Regarding claim 16
The terminal of claim 14, wherein the state parameters comprise an uplink rate, a downlink rate, a network delay, a bit error rate, and times of resource release occurring in an application.
The scope and subject matter of apparatus claim 16 is drawn to the apparatus of using the corresponding method claimed in claim 7. Therefore apparatus claim 16 corresponds to method claim 7 and is rejected for the same reasons of obviousness as used in claim 7 rejection above.
Regarding claim 17
The terminal of claim 15, wherein the computer program, when being executed by the processor, causes the processor further to:
acquire a time duration during which each cell of network anomaly is listed on an abnormal cell list; and
in response to the time duration exceeding a preset time period, remove a cell identifier of a corresponding cell of network anomaly from the abnormal cell list.
The scope and subject matter of apparatus claim 17 is drawn to the apparatus of using the corresponding method claimed in claim 6. Therefore apparatus claim 17 corresponds to method claim 6 and is rejected for the same reasons of obviousness as used in claim 6 rejection above.
Regarding claim 18
The terminal of claim 15, wherein the preset abnormal cell determination condition comprises at least one of:
an uplink rate of the target cell being always less than a first threshold within a first preset time;
a downlink rate of the target cell being always less than a second threshold within a second preset time;
the number of times of releasing a configured time-frequency resource being greater than a third threshold, while there is service in the target cell;
the number of times, that the target cell refuses a data connection of the terminal, being greater than a fourth threshold;
the number of times, that a call is abnormally hung up in the target cell, being greater than a fifth threshold; and
a signal quality of the target cell being lower than a signal quality of a neighbor cell, and the number of times that the terminal accesses the target cell being greater than the number of times that the terminal accesses the neighbor cell.
The scope and subject matter of apparatus claim 18 is drawn to the apparatus of using the corresponding method claimed in claim 7. Therefore apparatus claim 18 corresponds to method claim 7 and is rejected for the same reasons of obviousness as used in claim 7 rejection above.
Conclusion
Any inquiry concerning this communication or earlier communications from the examiner should be directed to CHUONG M NGUYEN whose telephone number is (571)272-8184. The examiner can normally be reached M-F 10:00am - 6:30pm.
Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice.
If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Derrick Ferris can be reached at 571-272-3123. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300.
Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
/CHUONG M NGUYEN/Primary Examiner, Art Unit 2411