Method and apparatus for contextual network architecture and security
A context and network technology, applied in security devices, machine-to-machine/machine-type communication services, electrical components, etc., can solve problems such as inability to maintain all contexts of devices, inability to perform connectivity complex signaling, and limited resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] The detailed description set forth below in connection with the accompanying drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details to provide a thorough understanding of various concepts. It will be apparent, however, to one skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts.
[0054] As discussed above, in an IoT environment, a network (eg, an LTE network) may need to support a large number (eg, billions) of client devices (also referred to as Internet of Things (IoT) devices). The client device may be a cellular phone (e.g., a smartphone), a personal computer (e.g., a laptop), a gaming device, a user equipment (UE), or any other su...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


