Sign In to Follow Application
View All Documents & Correspondence

"Method And System For Provisioning Service Continuity In A Wireless Network".

Abstract: A method and system for transferring a user equipment (UE) (102) from a first wireless network (310) to a second wireless network (320) is provided. In one embodiment, the transfer comprises determining whether the second wireless network (320) is accessible based on one-to-one mappings between the network cells of the first wireless network and the second wireless network in a fingerprint-mapping database (206). If the second wireless network (320) is accessible, the UE (102) can connect to the second wireless network (320) but if the second wireless network (320) is inaccessible, the fingerprint-mapping database (206) is updated with a new mapping between a newly identified network cell of the second wireless network (320) and previously identified cell of the first wireless network (310).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 February 2014
Publication Number
44/2015
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2021-09-07
Renewal Date

Applicants

RELIANCE JIO INFOCOMM LIMITED
3RD FLOOR, MAKER CHAMBER-IV, 222, MARIMAN POINT, MUMBAI - 400021, MAHARASHTRA, INDIA.

Inventors

1. SATISH NANJUNDA SWAMY JAMADGNI
228, 5TH CROSS, 8TH MAIN, AREKERE MICO;AYOUT, BENGALURU - 560076, KARNATAKA, INDIA
2. SARVESHA ANEGUNDI GANAPATHI
FF-2, SAGAR ENCLAVE, C.K. ACHUKATTU, B.S.K. 3RD STAGE, BENGALURU,- 560085, KARNATAKA, INDIA.
3. PRADEEP KRISHNAMURTHY HIRISAVE
#47, 3RD CROSS, OLD POST OFFICE ROAD, CANARA BANK COLONY, CHIKKALASANDRA, BENGALURU- 560061, KARNATAKA, INDIA

Specification

FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
"METHOD AND SYSTEM FOR PROVISIONING SERVICE CONTINUITY IN
A WIRELESS NETWORK"
We, Reliance Jio Infocomm Limited, an Indian Citizen of, 3rd Floor, Maker Chamber-IV, 222, Nariman Point, Mumbai-400 021, Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR PROVISIONING SERVICE CONTINUITY IN A WIRELESS NETWORK
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the benefit of India Application No. 693/MUM/2014, filed February 27, 2014, the entire contents of which are hereby incorporated by reference as if fully set forth herein.
FIELD OF THE INVENTION
The present disclosure generally relates to provisioning service continuity in a wireless network and is more specifically directed to switching between different wireless networks based on a one-to-one mapping between network identification parameters of the different networks.
BACKGROUND
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes. Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication.
Wireless networks depend upon wide coverage area to provide the best possible service to subscribers. Since wireless networks rely on radio waves, which travel through the air and are easily attenuated (particularly at higher frequencies), wireless networks may be unreliable at times and have coverage gaps. Like other radio transmissions, wireless network signals can be interrupted by large buildings, terrain, trees, or other objects between the user equipment and the nearest base station.
In order to avoid dead zones or coverage gaps and ensure continuity of service, it is possible that one wireless network service provider (hereinafter "service provider") can pre-provision access to multiple wireless networks in case there is an outage or service gap in the

service provider's wireless network. For example, in telecommunication networks, a fourth generation (4G)-only service provider would preferably provide access to second/third generation (2G/3G) service by provisioning access to the network of a different service provider that provides 2G/3G service.
A primary or preferred service provider can provision access to the services offered by a secondary service provider by utilizing a dual Subscriber Identity Module (SIM) approach or a dual International Mobile Subscriber Identity (IMSI)/single SIM approach. In a dual SIM approach, the user equipment is configured to use at least two SIM cards, each of which allows a subscriber to access the wireless network of corresponding service providers, and a different service provider may support each wireless network that is accessible by the user equipment. In a dual IMSI/single SIM approach, one SIM card holds at least two IMSI tokens or numbers, each of which are registered with separate service providers. Another example is Long Term Evolution (LTE) wireless networks, which are capable of providing only data services. Since the LTE standard supports only packet switching with its all-IP network, the user equipment switches to other wireless networks to make voice calls or in case of loss of LTE coverage.
While switching from one wireless network to another is advantageous in providing continuity of service, the primary service provider would like the user to move back to the primary wireless network as soon as it is available, even if there is an overlap of service areas of both primary and secondary service provider. However, there may be regulatory restrictions which may not allow for inter-service provider roaming agreements. In such cases, there exists the problem of transferring the user to the primary service provider's network as soon as the primary service provider's network is available, without any inter-service provider signaling.
Even when inter service provider agreements are present, there can be a considerable delay in switching back to the preferred network or primary network based on its availability when the user is on the secondary wireless network. For example, in one existing solution, the user equipment may use the preferred network's IMSI to access the LTE network. In case of loss of coverage for the LTE network, the partner IMSI may be used to access 2G/3G services from another service provider. The user equipment may not return to the LTE network when it reenters the service area even if the signal quality in LTE network is above a pre-determined

threshold. The user equipment may return to the LTE network only when the signal condition of LTE is available and above a threshold. Thus, there may be a delay while processing the transferring from 2G/3G to LTE or vice versa. Apart from the delay, there may be other related issues to the above approach for example, huge battery impact due to all the Radio Access Technology (RAT) and frequency band scans, signal overload in the network due to an increased number of attach messages, and missed calls during background scans.
The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section.
SUMMARY
Embodiments of the present disclosure can solve the above-referenced problems recognized by the inventors, among other problems. In particular, certain embodiments may provide methods and systems for inter-service provider network switching without any formal agreements or signaling exchanges between the two or more wireless networks, and for reducing the delay in switching back to the preferred network.
For example, in one embodiment, a system for inter-service provider network switching is disclosed. The system may include a hardware processor; and a memory storing instructions executable by the hardware processor to perform an inter-service provider network switching method. The method may comprise transferring a user equipment from a first wireless network to a second wireless network. The second wireless network and the first wireless network may each comprise a 5G network, a MIMO network, a LTE network, a 4G network, a 3G network, a 2G network, a carrier Wi-Fi network, a WiMax network, a GPRS network, an EDGE network or a Wi-Fi network. The transferring step may comprise determining whether the second wireless network is accessible based, at least in part, on a fingerprint-mapping database. Based on the determining step, if the second wireless network is accessible, the method may include informing the user equipment that the second wireless network is available, and if the second wireless network is inaccessible, updating the fingerprint-mapping database. The user

equipment may be configured to transmit-receive a plurality of network signals from the first wireless network and the second wireless network. The user equipment may comprise at least two SIM modules, wherein each of the at least two SIM modules is configured to connect to at least one of the first wireless network and the second wireless network. The user equipment may comprise at least two IMS! modules, wherein each of the at least two IMSI modules is configured to connect to at least one of the first wireless network and the second wireless network. The fingerprint-mapping database may pre-loaded on the user equipment, a network equipment associated with the second wireless network, or stored in a cloud-based application where it is accessible by the user equipment whether the user equipment is connected to the second wireless network or the first wireless network.
The method may further comprise transferring the user equipment from the second wireless network back to the first wireless network. This transferring step may further comprise determining whether the second wireless network is accessible by the user equipment. This determining step may comprise at least one of: checking if a signal strength of the second wireless network as received by the user equipment is lower than a pre-programmed threshold signal strength value stored in the user equipment; and checking if a bit error rate for the second wireless network as determined by the user equipment is higher than a preprogrammed threshold bit error rate value stored in the user equipment. Transferring the user equipment from the second wireless network to the first wireless network may further comprise determining if the first wireless network is accessible. Based on this determination step, if the wireless network is inaccessible, the method may include sending an error message to the user equipment, wherein the error message indicates that the first wireless network is inaccessible. If the wireless network is accessible, the method may include informing the user equipment that the wireless network is accessible.
Determining whether the second wireless network is accessible based, at least in part, on the fingerprint-mapping database may further comprise determining a current location of the user equipment, wherein the current location is a set of spatio-temporal coordinates of the user equipment. Also, it may comprise identifying a cell belonging to the first wireless network based, at least in part, on the current location of the user equipment. It may further comprise

checking the fingerprint-mapping database to determine if there is a mapping between a eel! belonging to the second wireless network and the cell belonging to the first wireless network. The mapping may comprise a one-on-one mapping between at least one of a cell identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SS1D and a time identifier of the cell belonging to the first wireless network and at least one of a cell identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SSID and a time identifier of the cell belongingto the second wireless network. Based on the checking, if the mapping exists, the method may include informing the user equipment that the cell belonging to the second wireless network is accessible, and if the mapping does not exist, updating the fingerprint-mapping database. The fingerprint-mapping database may be updated periodically by the second wireless network. Updating the fingerprint-mapping database may comprise initiating a frequency band scan for the second wireless network at the current location. Based on the frequency band scan, a new cell of the second wireless network at the current location may be identified, and a new mapping between the new cell and the cell of the first wireless network may be added.
In another embodiment, a system for network switching is disclosed. The system may include a hardware processor; and a memory storing instructions executable by the hardware processor to perform a inter-service provider network switching method. The method may comprise transferring a user equipment from a first wireless network to a second wireless network. The transferring step may comprise initiating a rescan timer on the user equipment if the user equipment is connected to the first wireless network. Upon expiration of the rescan timer, the method may include determining whether the second wireless network is accessible based, at least in part, on a fingerprint-mapping database. Based on the determining, if the second wireless network is accessible, the method may include informing the user equipment that the second wireless network is available, and if the second wireless network is inaccessible, updating the fingerprint-mapping database and resetting the rescan timer.
In yet another embodiment, a system for forced network switching is disclosed. The system may include a hardware processor; and a memory storing instructions executable by the hardware processor to perform a forced network switching method. The method may comprise

transferring a user equipment from a first wireless network to a second wireless network. The transferring may comprise determining whether the second wireless network is accessible based, at least in part, on a fingerprint-mapping database. Based on the determining step, if the second wireless network is accessible, the method may include initiating a forced transfer of the user equipment from the first wireless network to the second wireless network, and if the second wireless network is inaccessible, updating the fingerprint-mapping database.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles.
FIG. 1A illustrates an example wireless network based communications system in which one or more disclosed embodiments may be implemented.
FIG. IB illustrates an example user equipment that may be used within the communications system illustrated in FIG. 1A.
FIG. 1C illustrates an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1A.
FIG. 2 illustrates a block diagram for an example transfer manager upon which one or more of the disclosed embodiments may be implemented.
FIG. 3 illustrates exemplary gaps and overlaps in wireless network coverage of different wireless networks.
FIG. 4 illustrates an example process for transferring a user equipment from a second wireless network to a first wireless network.
FIG. 5 illustrates an example process for transferring the user equipment from a first wireless network to a second wireless network.

FIG. 6 illustrates an example process for transferring the user equipment from a first wireless network to a second wireless network.
FIG. 7 illustrates an example process for determining whether the second wireless network is available.
FIG. 8 illustrates an example process for updating the fingerprint-mapping database.
DETAILED DESCRIPTION
In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
Several features are described hereafter that can each be used independently of one another or with any combination of other features. However, any individual feature may not address any of the problems discussed above or might only address one of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein. Although headings are provided, information related to a particular heading, but not found in the section having that heading, may also be found elsewhere in the specification.
GENERAL OVERVIEW
Techniques for switching between different wireless networks are described. The following steps are implemented according to one embodiment. A user equipment is transferred from a first wireless network to a primary or preferred wireless network by a transfer manager in the user equipment. The transfer manager determines whether the second wireless network is available based on a fingerprint-mapping database. Based on the determination, if the transfer manger determines that the second wireless network is available, it informs the user equipment and the user equipment can then connect to the second wireless

network. If the second wireless network is unavailable, the transfer manager updates the fingerprint-mapping database.
For convenience references will be made to various communication elements such as "messages," "packets/' and "bits" etc. belonging to different layers of the Open System Interconnection (OS!) networking model for example, "application layer" and "network layer." However, mention of a particular type of communication element in conjunction with a feature is not intended to limit the feature to only one layer of the OSI model. Thus, a feature discussed as applicable to one layer of the OSI model may also be applicable to other layers of the OSI model as well.
As used herein, user equipment refers to any device configured to connect to a wireless network. For example user equipment may be a cell phone, smartphone, PC, laptop, desktop, tablet, server, portal, or Wi-Fi connected wearable device. In an embodiment, the user equipment may be configured according to "User Equipment Overview" section below.
As used herein, "second wireless network" refers to any wireless network that may be presently implemented or deployed, and any wireless network that may be deployed in the future. The second wireless network may also be the wireless network of the preferred service provider. The second wireless network may also be a later or newer technology network for example LTE, LTE-A, LTE-B, LTE-C , voice over LTE, WiMax, Carrier WiFi and WiFi. The preferred or primary service provider typically prefers that a second wireless network subscriber spend as much time as possible with its user equipment connected to the second wireless network. In the description below, the terms second, preferred or primary may be used interchangeably.
As used herein, "first wireless network" refers to any wireless network that may be presently implemented or deployed, and any wireless network that may be deployed in the future. The second wireless network may also be any wireless network that the user equipment can connect with apart from the second wireless network. The first wireless network may be an older technology network, which is more matured and widely deployed as compared to the second wireless network. For example, if the second wireless network is LTE, then the first wireless network may be 2G or 3G network. The first wireless network typically exists to provide coverage support to the second wireless network through a network sharing

arrangement. For example, voice calling for a LTE-only network. In the description below, the terms first, support, or secondary may be used interchangeably.
As used herein, the term "fingerprint-mapping database" refers to a database stored on the user equipment or at the cloud/network that maintains entries signifying one-to-one mapping between the network identifiers for cells associated with the second wireless network and network identifiers for cells associated with the first wireless network. The database is dynamic because it may be updated in real time based on data collected by the user equipment. The one-to-one mapping corresponds to an overlap between the coverage area of the second wireless network and the coverage area of the first wireless network. The fingerprint-mapping database may reside on the Network Layer, the Application Layer or some other layer of the OSI model.
SYSTEM OVERVIEW
FIG. 1A illustrates an example wireless network based communications system in which one or more disclosed embodiments may be implemented. The communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users. The communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth. For example, the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SCFDMA), and the like.
As shown in FIG. 1A, the communications system 100 may include wireless communication devices or user equipment (UE) 102 (exemplary UEs 102a, 102b, 102c, 102d), a radio access network (RAN) 104, a core network 106, a public switched telephone network (PSTN) 108, the Internet 110, and other networks 112, though it will be appreciated that the disclosed embodiments contemplate any number of UEs, base stations, networks, and/or network elements. Each of the UEs 102a, 102b, 102c, 102d may be any type of device configured to operate and/or communicate in a wireless environment. By way of example, the

UEs 102a, 102b, 102c; 102d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, tablets, phablets, a wireless sensor, consumer electronics, and the like.
The communications system 100 may also include a base station 114a and a base station 114b. Each of the base stations 114a, 114b may be any type of device configured to wirelessly interface with at least one of the UEs 102a, 102b, 102c, 102d to facilitate access to one or more communication networks, such as the core network 106, the Internet 110, and/or the other networks 112. By way of example, the base stations 114a, 114b may be a base transceiver station (BTS), a Node-B, an Evolved Node B (eNode B), a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 114a, 114b are each depicted as a single element, it will be appreciated that the base stations 114a, 114b may include any number of interconnected base stations and/or network elements.
The base station 114a may be part of the RAN 104, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. The base station 114a and/or the base station 114b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown).The cell may further be divided into cell sectors. For example, the cell associated with the base station 114a may be divided into three sectors. Thus, in one embodiment, the base station 114a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, the base station 114a may employ multiple-input multiple-output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
The base stations 114a, 114b may communicate with one or more of the UEs 102a, 102b, 102c, 102d over an air interface 116, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). The air interface 116 may be established using any suitable radio access technology (RAT).

More specifically, as noted above, the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, the base station 114a in the RAN 104 and the UEs 102a, 102b, 102c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 116 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
In another embodiment, the base station 114a and the UEs 102a, 102b, 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 116 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A)and/or LTE-B and/or LTE-C.
In other embodiments, the base station 114a and the UEs 102a, 102b, 102c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 IX, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), voice-over-LTE and the like.
The base station 114b in FIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like. In one embodiment, the base station 114b and the UEs 102c, 102d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN). In another embodiment, the base station 114b and the UEs 102c, 102d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN). In yet another embodiment, the base station 114b and the UEs 102c, 102d may utilize a cellular based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, LTE-B, LTE-C etc.) to establish a Pico cell or Femto cell. As shown in FIG. 1A, the base station 114b may have a direct connection to the

Internet 110. Thus, the base station 114b may not be required to access the Internet 110 via the core network 106.
The RAN 104 may be in communication with the core network 106, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the UEs 102a, 102b, 102c, 102d. For example, the core network 106 may provide call control, billing services, mobile location-based services, prepaid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown in FIG. 1A, it will be appreciated that the RAN 104 and/or the core network 106 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 104 or a different RAT. For example, in addition to being connected to the RAN 104, which may be utilizing an E-UTRA radio technology, the core network 106 may also be in communication with another RAN (not shown) employing a GSM radio technology.
The core network 106 may also serve as a gateway for the UEs 102a, 102b, 102c, 102d to access the PSTN 108, the Internet 110, and/or other networks 112. The PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). The Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite. The other networks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, the other networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 104 or a different RAT.
Some or all of the UEs 102a, 102b, 102c, 102d in the communications system 100 may include multi-mode capabilities, i.e., the UEs 102a, 102b, 102c, 102d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the UE 102c shown in FIG. 1A may be configured to communicate with the base station 114a, which may employ a cellular-based radio technology, and with the base station 114b, which may employ an IEEE 802 radio technology.

USER EQUIPMENT OVERVIEW
FIG. IB illustrates an example user equipment that may be used within the communications system illustrated in FIG. 1A. For purposes of illustrating clear examples, the example user equipment depicted in FIG. IB will be discussed in connection with the communication system 100 of FIG. 1A. In another embodiment, the UE 102 may be a specialized computing device. For example, the UE may be video infrastructure or audio infrastructure device that is optimized for services such as video conferencing, digital telephony, and/or telepresence. In still other embodiments, the UE 102 represents network end stations such as laptop computers, server computers, mobile computers, tablet computers, or cell phone, smartphones, smartwatch, watch phone, Google Glass, or UE 102 may represent software components executing on one or more computing systems.
In an embodiment, the UE 102 may include a processor 118, a transceiver 120, a transmit-receive element 122, a speaker/microphone coupling 124, a keypad 126, a display/touchpad 128, non-removable memory 130, removable memory 132, a power source 134, and other peripherals 138. It will be appreciated that the UE 102 may include any subcombination of the foregoing elements while remaining consistent with an embodiment.
The processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. The processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the UE 102 to operate in a wireless environment. The processor 118 may be coupled to the transceiver 120, which may be coupled to the transmit-receive element 122. While FIG. IB depicts the processor 118 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.

The transmit-receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114a) over the air interface 116. For example, in one embodiment, the transmit-receive element 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit-receive element 122 may be an emitter-detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit-receive element 122 may be configured to transmit and receive both RF and light signals, it will be appreciated that the transmit-receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
In addition, although the transmit-receive element 122 is depicted in FIG.IB as a single element, the UE 102 may include any number of transmit-receive elements 122. More specifically, the UE 102 may employ MIMO technology. Thus, in one embodiment, the UE 102 may include two or more transmit-receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 116.
The transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit-receive element 122 and to demodulate the signals that are received by the transmit-receive element 122. As noted above, the UE 102 may have multi-mode capabilities. Thus, the transceiver 120 may include multiple transceivers for enabling the UE 102 to communicate via multiple RATS, such as UTRA and IEEE 802.11, for example.
The processor 118 of the UE 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or light emitting diode (LED), plasma, or organic LED display unit). The processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128. In addition, the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132. The non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 132 may include at least one subscriber identity module (SIM) card, dual IMSI SIM card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, the processor 118 may access information from, and

store data in, memory that is not physically located on the UE 102, such as on a server or a home computer (not shown).
The processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in the UE 102. The power source 134 may be any suitable device for powering the UE 102. For example, the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium ion (Li-ion), etc.), solar cells, fuel cells, and the like.
The processor 118 may also be coupled to the GPS chipset 138, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the UE 102. In addition to, or in lieu of, the information from the GPS chipset 138, the UE 102 may receive location information over the air interface 116 from a base station (e.g., base stations 114a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the UE 102 may acquire location information by way of any suitable location-determination method compatible with the disclosed embodiments.
A person skilled in the art would appreciate that the user equipment 102 may include several other components that have not been depicted, for example, motion sensors, accelerometers, barometers and thermometers, as well as updated versions of depicted components for example, non-removable memory 130, removable memory 132, and GPS chipset 138.
RADIO ACCESS NETWORK OVERVIEW
FIG. 1C illustrates an example radio access network (RAN) and an example core network that may be used within the communications system illustrated in FIG. 1A. For purposes of illustrating clear examples, the example radio access network and example core network in FIG. 1C will be discussed in connection with the communication system 100 of FIG. 1A and user equipment 102 of FIG. IB. FIG. 1C is a system diagram of the RAN 104 and the core network 106 according to an embodiment. As noted above, the RAN 104 may employ an E-UTRA radio

technology to communicate with the UEs 102a, 102b, and 102c over the air interface 116. The RAN 104 may also be in communication with the core network 106.
The RAN 104 may include eNode Bs 140a; 140b, 140c, though it will be appreciated that the RAN 104 may include any number of eNode Bs while remaining consistent with an embodiment. The eNode Bs 140a, 140b, 140c may each include one or more transceivers for communicating with the UEs 102a, 102b, 102c over the air interface 116. In one embodiment, the eNode Bs 140a, 140b, 140c may implement MIMO technology. Thus, the eNode B 140a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the UE 102a.
Each of the eNode Bs 140a, 140b, and 140c may be associated with a particular ceil (not shown) and may be configured to handle radio resource management decisions, handover decisions, transfer decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. IC, the eNode Bs 140a, 140b, 140c may communicate with one another over an X2 interface.
The core network 106 shown in FIG. IC may include a mobility management gateway (MME) 142, a serving gateway 144, and a packet data network (PDIM) gateway 146. While each of the foregoing elements are depicted as part of the core network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
The MME 142 may be connected to each of the eNode Bs 140a, 140b, and 140c in the RAN 104 via an SI interface and may serve as a control node. For example, the MME 142 may be responsible for authenticating users of the UEs 102a, 102b, 102c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the UEs 102a, 102b, 102c, and the like. The MME 142 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
The serving gateway 144 may be connected to each of the eNodeBs 140a, 140b, and 140c in the RAN 104 via the SI interface. The serving gateway 144 may generally route and forward user data packets to/from the UEs 102a, 102b, 102c.

The serving gateway 144 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the UEs 102a, 102b, 102c, managing and storing contexts of the UEs 102a, 102b, 102c, and the like.
The serving gateway 144 may also be connected to the PDN gateway 146, which may provide the UEs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the UEs 102a, 102b, 102c and IP-enabled devices.
The core network 106 may facilitate communications with other networks. For example, the core network 106 may provide the UEs 102a, 102b, 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the UEs 102a, 102b, 102c and traditional Sandline communications devices. For example, the core network 106 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 106 and the PSTN 108. In addition, the core network 106 may provide the UEs 102a, 102b, 102c with access to the other networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
TRANSFER MANAGER OVERVIEW
FIG. 2 illustrates a block diagram for a transfer manager 200 upon which an embodiment may be implemented. For purposes of illustrating clear examples, the example transfer manager 200 in FIG. 2 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, and an example RAN of FIG. 1C.
In an embodiment, the transfer manager 200 comprises the transfer trigger module 202, the timer module 204, and the fingerprint-mapping database 206. In another embodiment, the transfer manger module 200 comprises hardware and software components that enable the transfer manager to transfer the user equipment 102 from one wireless network to another in the communication system 100.

In an embodiment, the transfer trigger module 202 comprises hardware and software components that initiate the transfer of the user equipment 102 from one wireless network to another wireless network. In an embodiment, the transfer trigger module 202 comprises hardware and software to detect the signal strength of various wireless network systems. In an embodiment the transfer trigger module 202 is configured to detect the user equipment 102 utilizing different access technologies. In another embodiment, the transfer trigger module 202 comprises hardware and software to detect the bit error rate/frame error rate associated with transmission and reception of bits or data over various wireless networks. In still another embodiment, the transfer trigger module 202 comprises hardware and software components in compliance with various 3GPP standards like 36.xxx. For example, these components may comprise the Radio protocol stack procedures, Discrete Signal Processor (DSP) mechanism specifications, RF filters and associated values.
In an embodiment, the timer module 204 comprises hardware and software to maintain a preset timer. In another embodiment, the timer module 204 relies on the internal clock of the processor 118 of the UE 102 to maintain the timer. In an embodiment, the timer module 204 has a signaling mechanism to indicate to the UE 102 that the preset timer has expired. For example the timer module 204 may send a message internally to the processor 118 that the preset timer has expired.
In an embodiment, the fingerprint-mapping database 206 comprises hardware and software components that store the one-to-one mapping between the network cell identifiers of different wireless networks. The network cell identifiers may include, for example, Cell Numbers, Public Land Mobile Network (PLMN) identifier, Location Area Code (LAC) identifier, Tracking Area Code (TAC) identifier, a Radio Frequency (RF) identifier, Cell Identifier, Physical Cell Identifier (PCI), Service Set Identifier (SSID), and a time-stamp identifier or time identifier. The time identifier or time-stamp identifier may represent the time-stamp of the last received signal. A practitioner skilled in the art would appreciate that several other identification parameters may be used to identify cells belonging to different wireless networks.
In an embodiment, service provider for the second wireless network may develop an initial fingerprint-mapping database by conducting drive-by tests. In an embodiment, the

fingerprint-mapping database 206 is stored on one or more SIM cards belonging to the removable memory 130 of the UE 102. In another embodiment, the fingerprint-mapping database 206 is pre-loaded on the SIM cards or on the non-removable memory 132 by the service provider for the second wireless network. In yet another embodiment, the fingerprint-mapping database 206 is pre-loaded on the non-removable memory 132 of the UE 102 by the manufacturer of the UE 102. In still another embodiment, the fingerprint-mapping database 206 is stored on one or more network components as specified in the "SYSTEM OVERVIEW" section and the "RADIO ACCESS NETWORK OVERVIEW" section above. In an embodiment, the fingerprint-mapping database 206 is stored externally as an application by the service provider for the second wireless network, for example using a cloud service, and is accessible regardless of the current wireless network that the UE 102 is connected with. In still another embodiment, the fingerprint-mapping database 206 is stored at the Application Layer. In yet another embodiment, the fingerprint-mapping database 206 is stored at the Network Layer.
PROCESS FOR TRANSFERRING USER EQUIPMENT FROM SECOND WIRELESS NETWORK TO FIRST WIRELESS NETWORK
FIG. 3 illustrates an exemplary gaps and overlaps in wireless network coverage of different wireless networks. For purposes of illustrating clear examples, the example gap in wireless network coverage in FIG. 3 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example RAN of FIG. 1C, and the transfer manager 200 of FIG. 2. In an embodiment, the communication system 100 may include a first or secondary or support wireless network 310 and a second or primary or preferred wireless network 320 having overlapping coverage areas with the first wireless network 310, as shown at 332, 334. No second wireless network 320 coverage is available in the area depicted by 336, forming a second wireless network coverage hole. First wireless network 310 may include any communication technology or communication technology version other than second wireless network 320. For example, first wireless network 310 may be a 3G or 2G network, while second wireless network 320 may be a 4G network or LTE network. In an embodiment, both the second

wireless network and the first wireless network are the same kind of wireless networks. For example, both the second wireless network and the first wireless network are LTE networks.
A UE 102 may be configured to communicate via both first wireless network 310 and second wireless network 320. For example, the UE 102 may be configured to connect to the second wireless network 320 when the second wireless network signal strength is above a defined threshold. As UE 102 moves through communication system 100, UE 102 may encounter a second wireless network 320 coverage hole 336. Thus, the UE will be transferred to the first wireless network 310. In an embodiment, second wireless network 320 may have priority over first wireless network 310. That is, UE 102 may be configured to connect to second wireless network 320 whenever second wireless network coverage is available regardless of the availability of the first wireless network 310.
FIG. 4 illustrates an example process for transferring the user equipment from a second wireless network to a first wireless network. For purposes of illustrating clear examples, the process flow depicted in FIG. 4 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example RAN of FIG. 1C, the transfer manager 200 of FIG. 2, and the wireless network coverage gap of FIG. 3. However, a same or substantially similar process can be used for other implementations.
At step 402, the transfer manager trigger 202 of the transfer manager 200 initiates a transfer of the UE 102 from the second wireless network 320 to the first wireless network 310. In an embodiment, the transfer from the second wireless network 320 to the first wireless network 310 is triggered when second wireless network 320 signal strength drops lower than a pre-determined threshold as determined by the transfer trigger module 202 of the transfer manger 200. In an embodiment, a network administrator of the second wireless network may modify the pre-determined threshold. In another embodiment, the transfer between the networks is triggered when the bit error rate or frame error rate as determined by loss of packets sent between the UE 102 and the second wireless network 320 is higher than a predetermined threshold. In still another embodiment, the transfer between the networks is triggered when the bit error rate or frame error rate for the second wireless network 320 is

higher than the bit error rate or frame error rate promised to a subscriber of the second wireless network 320.
In another embodiment, the transfer manager 200 automatically switches the UE 102 from the second wireless network 320 to the first wireless network 310 based on the data obtained from previous scans in similar spatial locations. For example, if the UE 102 loses connection to the second wireless network 320 in a particular geographic location the transfer manager 200 stores that information and automatically switches the UE 102 from the second wireless network 320 to the first wireless network 310. Similarly, the UE 102 loses connection to the second wireless network 310 at certain times, for example from 6:00 PM to 7:00 PM, during the day based on usage and movement of the subscriber to the second wireless network 310. The transfer manager 200 stores that information and automatically switches the UE 102 from the second wireless network 320 to the first wireless network 310 during those certain times. In still another embodiment, the transfer manager 200 may transfer the UE 102 from the second wireless network 320 to the first wireless network 310 based on historical network congestion data stored by the transfer manager 200. For example, based on historical data the transfer manager 200 recognizes that the primary network 320 is congested due to heavy traffic every day from 4:00 PM to 5:00 PM. Therefore, the transfer manager 200 automatically transfers the UE 102 from the second wireless network 320 to the first wireless network 310 every day at 4:00 PM. In an embodiment, the criteria for transferring from the second wireless network 320 to the first wireless network 310 are in accordance with 3GPP specification 36.300, etc., available at the 3GPP website.
At block 404, the process determines if a first wireless network 310 is available for transfer. In an embodiment, the transfer trigger module 202 initiates a RAT scan or frequency band scan to determine if the UE 102 is receiving signals from first wireless network 310. In an embodiment, the UE 102 may be capable of connecting to various support networks apart from first wireless network 310. In an embodiment, the transfer manager 200 checks the historical spatio-temporal location coordinate data associated with the UE 102 to determine if a first wireless network 310 is available for transfer.

If the transfer manager 200 determines that, the first wireless network 310 is available or no support networks are available then the process moves to block 406. At block 406, the process generates an error message and displays it on the display/touchpad 128 of UE 102. In an embodiment, the error message indicates that the first wireless network 320 is available for connection at this point.
If the transfer manager 200 determines that the first wireless network 310 is available, then the process moves to block 408. At block 408, the UE 102 is transferred from the second wireless network to the first wireless network. In an embodiment, the transfer involves switching between different SIM cards or modules in the removable memory 132 of the UE 102 wherein one SIM card is configured to allow the UE 102 to access the second wireless network 320 and the other SIM card is configured to allow the UE 102 to access the first wireless network 310. In another embodiment, the transfer involves activating an IMSI number or token out of the different IMSI numbers or tokens stored on the SIM card in the removable memory 132 of the UE 102, wherein one IMSI number or token allows the UE 102 to access the second wireless network 320 and the other IMSI number or token allows the UE 102 to access the first wireless network 310.
PROCESS OF TRANSFERRING USER EQUIPMENT FROM FIRST WIRELESS NETWORK TO SECOND WIRELESS NETWORK
FIG. 5 illustrates an example process for transferring the user equipment from a first wireless network to a second wireless network. For purposes of illustrating clear examples, the process flow depicted in FIG. 5 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example RAN of FIG. 1C, the transfer manager 200 of FIG. 2, and the wireless network coverage gap of FIG. 3. However, a same or substantially similar process can be used for other implementations.
At step 500, the process receives a UE 102 that is connected to the first wireless network 310 and the transfer manager 200 initiates transfer of UE 102 from the first wireless network 310 to the second wireless network 320. In an embodiment, the transfer manager 200 initiates a transfer from the first wireless network 310 to the second wireless network 320 as

soon as the transfer manager 200 detects that the UE 102 is connected to the first wireless network 310. For example, the transfer manager 200 detects a change in the access technology being used by the UE 102 and initiates a transfer back to the second wireless network 320. The process then moves to block 502. For example, the UE 102 is a cell phone connected to a 2G/3G first wireless network 310 called Network B and the second wireless network 320 for the UE 102 is a LTE network called Network A. Then as soon as transfer manager 200 detects that UE 102 is disconnected from Network A and connected to Network B, it initiates a transfer of the UE 102 back to Network A.
At block 502, the transfer manager 200 determines whether the second wireless network 320 is available for the UE 102 based on the fingerprint-mapping database 206. In the example, above the transfer manager 200 checks whether Network A is available or accessible based on the fingerprint-mapping database stored on the cell phone.
If the transfer manager 200 determines that the second wireless network 320 is available, the process moves to block 504 and the transfer manager informs the UE 102 that the second wireless network 320 is available. In an embodiment, the UE 102 may then connect to the second wireless network 320 in accordance with 3GPP specification 36.300 available at www.3gpp.com and complete the transfer. Thus, based on the fingerprint database if Network A is available the transfer manager 200 informs the cell phone that Network A is available and the cell phone may then re-connect with Network A. In an embodiment, a forced transfer of the UE 102 to the second wireless network 320 is initiated regardless of whether the first wireless network 310 is accessible. For example, Network A may be the preferred network and the service provider for Network A may want to force transfer the subscriber's cell phone back to Network A regardless of whether Network B is accessible.
If the transfer manager 200 determines that the second wireless network 320 is unavailable then the process moves to block 506 and the transfer manager updates the fingerprint-mapping database 206. In an embodiment, the fingerprint-mapping database stored on all UE 102 connected to the second wireless network 320 can be updated automatically by the primary service provider. In another embodiment, the fingerprint-mapping database is updated based on the process described in the "PROCESS FOR UPDATING FINGERPRINT-

MAPPING DATABASE" section below. In another embodiment, the fingerprint-mapping database is populated and updated based on usage of subscribers of the second wireless network 320. In another embodiment, the transfer manager 200 may initiate another transfer from the first wireless network 310 to the second wireless network 320 based on the results of updating the fingerprint-mapping database 206 at block 506. For example, if the Network A is unavailable, the cell phone remains connected to Network B and the transfer manager 200 updates the fingerprint-mapping database for the cell phone.
FIG. 6 illustrates an example process for transferring the user equipment from a first wireless network to a second wireless network. For purposes of illustrating clear examples, the process flow depicted in FIG. 6 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example RAN of FIG. 1C, the transfer manager 200 of FIG. 2, and the wireless network coverage gap of FIG. 3. However, a same or substantially similar process can be used for other implementations.
At step 600, the process receives a UE 102 that is connected to the first wireless network 310 and the transfer manager 200 initiates transfer of UE 102 from the first wireless network 310 to the second wireless network 320. For example, the transfer manager 200 detects a change in the access technology being used by the UE 102 and initiates a transfer back to the second wireless network 320. The process then moves to block 502. For example, the UE 102 is a cell phone connected to a first wireless network 310, which is a WiFi network called Network B and the second wireless network 320 for the UE 102 is a LTE network called Network A. Then, as soon as transfer manager 200 detects that UE 102 is disconnected from Network A and connected to Network B, it initiates a transfer of the UE 102 back to Network A.
At block 602, the transfer manager 200 starts an internal rescan timer using the timer module 204. In an embodiment, the internal rescan timer has a pre-set timer value that counts down to zero. For example, the internal rescan timer might be set to thirty seconds (30s). Persons of ordinary skill in the art will appreciate that other time periods may be used. In an embodiment, the pre-set timer value can be modified by a network administrator or engineer of the second wireless network 320. For example, the network administrator or engineers may set the pre-set timer value based on network congestion, available bandwidth, and spatio-

temporal location of coverage gaps for second wireless network 320. In the example above, as soon as the cell phone disconnects from Network A, the transfer manager starts a rescan timer that is preset to 30 seconds.
At block 604, the transfer manager 200 checks if the internal rescan timer has expired using the timer module 204. In an embodiment, the internal rescan timer expires when the preset timer value counts down to zero. If the pre-set timer value has not expired, the process remains at block 604 and the timer module 204 keeps checking the pre-set timer value until it counts down to zero. Once the internal rescan timer expires, the process then moves to block 606. In the example above, the transfer manager 200 checks whether 30 seconds have elapsed.
At block 606, the transfer manager 200 determines whether the second wireless network 320 is available based on the fingerprint-mapping database 206. Continuing the example above, the transfer manager 200 checks whether Network A is available or accessible based on the fingerprint-mapping database stored on the cell phone.
If the transfer manager 200 determines that the second wireless network 320 is available, the process moves to block 608 and the transfer manager informs the UE 102 that the second wireless network 320 is available. In an embodiment, the UE 102 may then connect to the second wireless network 320 in accordance with the 3GPP specifications and complete the transfer. Thus, if Network A is available the transfer manager 200 informs the cell phone that Network A is available and the cell phone may then re-connect with Network A.
If the transfer manager 200 determines that the second wireless network 320 is unavailable then the process moves to block 610 and block 612 and the transfer manager updates the fingerprint-mapping database 206 and resets the rescan timer of the rescan timer module 204. In an embodiment, the UE 102 remains connected to first wireless network 310 until the UE 102 informs the transfer manager 200 about a change in the spatio-temporal location of the UE 102. For example, if the Network A is unavailable, the cell phone remains connected to Network B and the transfer manager 200 updates the fingerprint-mapping database for the cell phone and resets the timer to 30 seconds.
PROCESS FOR DETERMINING AVAILABILITY OF SECOND WIRELESS NETWORK

FIG. 7 illustrates an example process for determining whether the second wireless network is available. For purposes of illustrating clear examples, the process flow depicted in FIG. 7 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example radio access network, an example core network of FIG. 1C, the transfer manager 200 of FIG. 2, and example the wireless network coverage gaps and overlaps of FIG. 3. However, a same or substantially similar process can be used for other implementations.
At step 700, the process receives a query from the transfer manager 200 regarding the availability of the second wireless network 320 while the UE 102 is connected to the secondary network 310. The process then moves to block 702. In the example used for FIG. 5, the cell phone is connected to Network B a 2G/3G network. *
At block 702, the current location of the UE 102 is determined by the GPS chipset 138 of the UE 102. The current location is the latitude and longitude coordinates of the UE 102 at the time of inquiry by the transfer manager 200. In another embodiment, the current location is determined by the UE 102 communicating with a base station (for example base station 114a, 114b) of the first wireless network 310. Once the current location of the UE 102 is determined the process moves to block 704. For example, the current location of the cell phone may be determined as:
Latitude: 28.60669 Longitude: 77.19557
At block 704, a network cell belonging to the secondary network 310 is identified based on the current location of UE 102. In an embodiment, the network cell identified is the network cell corresponding to the current location of the UE 102. In an embodiment, UE 102 receives the network cell information directly from communicating with the first wireless network 310. In another embodiment, the network cell information for the first wireless network 310 may be stored on the removable memory 130 or non-removable memory 132 of the UE. In an embodiment, the network cell information may include network cell identifiers, for example, Cell Numbers, PLMN identifier, LAC identifier, TAC identifier, a RF identifier, PCI, SSID, and a time-stamp identifier or time identifier. Once the network cell information for a network cell of

the first wireless network 310 at the current location is identified, it is communicated to the transfer manager 200 and the process moves to block 706. For example, the following network cell information for a network cell of Network B is obtained based on the latitude (28.60669) and longitude (77.19557) of the cell phone as identified above:

2G/3G (NETWORK B)
PLMN ID LAC/RACID Cell ID
34B6 11109 6838593
At block 706, the transfer manager 200 searches the fingerprint-mapping database 206 for the received network cell information. The fingerprint-mapping database can be implemented using technologies including, but not limited to, Oracle®, IBM DB2®, Microsoft SQL Server®, Microsoft Access®, PostgreSQL®, MySQL® and SQLite®, and the like. The fingerprint-mapping database has a specific schema or architecture depending upon implementation. The transfer manager 200 then checks the fingerprint-mapping database 206 to determine if there is a one-to mapping between the network cell of the secondary network 310 and an associated network cell belonging to the second wireless network 320.
An exemplary entry in a fingerprint-mapping database is provided below:

LTE (NETWORK A) 2G/3G (NETWORK B)
PLMN ID TACID PCI PLMN ID LAC/RAC ID Cell ID
02F82 5822 22849 34B6 11109 6838593
In the example above, LTE network (Network A) is a newer-technology network and may be the second wireless network 320 in an embodiment, its network identifier is the PLMN ID 02F82. Network B may be a 2G/3G network. Hence, Network B may be a relatively primitive-technology wireless network and in an embodiment, it may be the first wireless network 310.

PLMN ID 34B6 identifies Network B. Based on the network cell information (LAC/TAC ID and Cell ID) obtained above, the transfer manager 200 searches the fingerprint-mapping database 206 stored on the cell phone and finds the exemplary entry above. Therefore the transfer manager 200 determines that there is a specific network cell for Network A, identified by its TAC ID (5822) and PCI (22849,) mapped to a network cell of Network B identified by LAC/RAC ID (11109) and Cell ID (6838593.)
Using the same example as in FIG. 6, another example of an entry in the fingerprint-mapping database 206 is given below:

LTE (NETWORK A) WIFI (NETWORK B)
PLMN ID TACID PCI SSID
02F82 5822 22849 OFFICE 2
In the example above, a Wi-Fi network has replaced Network B and the SSID of Network B (Office 2) is used to map Network B to a particular network cell of Network A. The transfer manager 200 searches the fingerprint-mapping database 206 stored on the cell phone and finds the exemplary entry above based on the network cell information for Network B. Therefore, the transfer manager 200 determines that there is a specific network cell for Network A, identified by its TAC ID (5822) and PCI (22849,) mapped to Network B identified by SSID (Office 2).
A person skilled in the art would appreciate that even though the above entries only show one to one mappings between a second wireless network 320 (which may be the preferred wireless network) and first wireless network 310 (which may be the support wireless network), they could include one-to-one mappings between one preferred wireless network and multiple support wireless networks. For example, Cell 1 of Network A is mapped to Cell 2 of Network B and Cell 2 of Network A is mapped to Cell 5 of Network C.
If the transfer manager 200 finds no one-to-one mapping, the process moves to block 708. At block 708, the transfer manager 200 updates the fingerprint-mapping database 206. For

example, if the information received for the network cell of first wireless network 310 is Office 2 (SSID) for Network B (Wi-Fi network) or LAC/RAC ID (11109) and Cell ID (6838593) for Network B (2G/3G network) does not match an entry in the fingerprint-mapping database 206, then there is no one-to-one mapping between the identified ceil for Network B and a cell of Network A and the transfer manager 200 initiates an update of the fingerprint-mapping database stored on the cellphone.
If the transfer manager finds a one-to mapping, the process moves to block 710 and the transfer manager informs the UE 102 that the second wireless network 320 is available.
PROCESS FOR UPDATING THE FINGERPRINT-MAPPING DATABASE
FIG. 8 illustrates an example process for updating the fingerprint-mapping database. For purposes of illustrating clear examples, the process flow depicted in FIG. 8 will be discussed in connection with the communication system 100 of FIG. 1A, user equipment 102 of FIG. IB, example RAN, and example core network of FIG. 1C, the transfer manager 200 of FIG. 2, and example the wireless network coverage gaps and overlaps of FIG. 3. However, a same or substantially similar process can be used for other implementations.
At step 800, the transfer manager 200 receives an instruction to update the fingerprint-mapping database 206 and the process moves to block 802. Using the examples above, if after initiating a transfer from Network B to Network A, the transfer manager 200 determines that there is no entry mapping the current cell of Network B to a cell of Network A then the transfer manager 200 initiates updating of the fingerprint-mapping database 206.
At block 802, the transfer manger module initiates one or more frequency band scan for the wireless network frequencies of the second wireless network 320. In an embodiment, the frequency band scan is initiated using the transceiver 120 and RF Baseband 138 of the UE 120. The process then moves to block 804. Thus, in the example above the cell phone scans for frequencies of Network A.
At block 804 based on the results of the frequency band scan, the UE 102 identifies a network cell belonging to the second wireless network 320. In an embodiment, the UE 102 conveys the network cell information associated with the newly identified cell to the transfer

manager 200. In an embodiment; if no network cells belonging to the second wireless network 320 are identified then the process quits. For example, the cell phone identifies a network cell of Network A with the network cell information as detailed below:

LTE (NETWORK A)
PLMN ID TACID PCI
02F82 6799 33560
At block 806, the transfer manager 200 creates a new mapping between the newly identified network cell of the second wireless network 320 and the network cell of the first wireless network 310. The network cell of first wireless network 310 was previously identified based on the current location of the UE 102 and was not found by the transfer manager 200 during the search of fingerprint-mapping database 206. In the example above, a new mapping detailed below would be created between the cell of Network A as identified above and the cell of Network B (LAC/RAC ID (22209) and Ceil ID (7949604)) in the example used for FIG. 7.

LTE (NETWORK A) 2G/3G (NETWORK B)
PLMN ID TACID PCI PLMN ID LAC/RAC ID Cell ID
02F82 6799 33560 34B6 11109 6838593
Similarly, if Network B is a Wi-Fi network with SSID (Office 2), then the new entry, detailing the one-to-one mapping between network cell of Network A and Network B, is created as detailed below:

LTE (NETWORK A) WIFI (NETWORK B)
PLMN ID TACID PCI SSID
02F82 6799 33560 OFFICE 2

In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope of the disclosed embodiments. Also, the words "comprising," "having," "containing," and "including," and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. The sole and exclusive indicator of the scope of the invention, and what is intended by the applicants to be the scope of the invention, is the literal and equivalent scope of the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction.

We claim:
1. A processor-implemented method for inter-service provider network switching,
comprising:
transferring, via one or more hardware processors, a user equipment from a first wireless network to a second wireless network, wherein the transferring comprises: determining, via the one or more hardware processors, whether the second wireless network is accessible based, at least in part, on a fingerprint-mapping database; based on the determining:
if the second wireless network is accessible, informing, via the one or more hardware processors, the user equipment that the second wireless network is available; and if the second wireless network is inaccessible, updating, via the one or more hardware processors, the fingerprint-mapping database.
2. The method of claim 1, wherein the user equipment is configured to transmit-receive a plurality of network signals from the first wireless network and the second wireless network.
3. The method of claim 1, wherein the user equipment comprises at least two SIM modules, wherein each of the at least two SIM modules is configured to connect to at least one of the first wireless network and the second wireless network.
4. The method of claim 1, wherein the user equipment comprises at least two IMSl modules, wherein each of the at least two IMSl modules is configured to connect to at least one of the first wireless network and the second wireless network.
5. The method of claim 1, further comprising:

transferring, via the one or more hardware processors, the user equipment from the
second wireless network to the first wireless network, wherein the
transferring further comprises: determining, via the one or more hardware processors, whether the second wireless
network is inaccessible by the user equipment, wherein the determining
comprises at least one of:
checking, via the one or more hardware processors, if a signal strength of the second wireless network as received by the user equipment is lower than a pre-programmed threshold signal strength value stored in the user equipment; and
checking, via the one or more hardware processors, if a bit error rate for the second wireless network as determined by the user equipment is higher than a pre-programmed threshold bit error rate value stored in the user equipment.
6. The method of claim 5, wherein transferring the user equipment from the second
wireless network to the first wireless network further comprises:
determining, via the one or more hardware processors, if the first wireless network is accessible, wherein based on the determination: if the wireless network is inaccessible, sending, via the one or more hardware
processors, an error message to the user equipment, wherein the
error message indicates that the first wireless network is inaccessible;
and if the wireless network is accessible, informing, via the one or more hardware
processors, the user equipment that the wireless network is
accessible.
7. The method of claim 1, wherein determining whether the second wireless network is
accessible based, at least in part, on the fingerprint-mapping database further
comprises:

determining, via the one or more hardware processors, a current location of the user
equipment, wherein the current location is a set of spatio-temporal
coordinates of the user equipment; identifying, via the one or more hardware processors, a cell belonging to the first
wireless network based, at least in part, on the current location of the user
equipment; checking, via the one or more hardware processors, the fingerprint-mapping
database to determine if there is a mapping between a cell belonging to the
second wireless network and the cell belonging to the first wireless network; based on the checking:
if the mapping exists, informing, via the one or more hardware processors, the user equipment that the cell belonging to the second wireless network is accessible; and
if the mapping does not exist, updating, via the one or more hardware processors, the fingerprint-mapping database.
8. The method of claim 7, wherein the updating of the fingerprint-mapping database
further comprises:
initiating, via the one or more hardware processors, a frequency band scan for the
second wireless network at the current location; based on the frequency band scan, identifying, via the one or more hardware
processors, a new cell of the second wireless network at the current location;
and adding, via the one or more hardware processors, a new mapping between the new
cell and the cell of the first wireless network.
9. The method of claim 1, wherein the fingerprint-mapping database is pre-loaded on the user equipment.
10. The method of claim 1, wherein the fingerprint-mapping database is pre-loaded on at least one network equipment associated with the second wireless network.

11. The method of claim 1, wherein the fingerprint-mapping database is stored in a cloud-based application and is accessible by the user equipment whether the user equipment is connected to the second wireless network or the first wireless network.
12. The method of claim 7, wherein the mapping comprises a one-on-one mapping between at least one of a cell identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SS1D and a time identifier of the cell belonging to the first wireless network and at least one of a cell identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SSID and a time identifier of the ceil belonging to the second wireless network.
13. The method of claim 1, wherein the fingerprint-mapping database is updated periodically by the second wireless network.
14. The method of claim 1, wherein the second wireless network and the first wireless network each comprise a 5G network, a MiMO network, a LTE network, a 4G network, a 3G network, a 2G network, a carrier Wi-Fi network, a WiMax network, a GPRS network, an EDGE network or a Wi-Fi network.
15. The method of claim 1, wherein the transferring further comprises:
initiating, via the one or more hardware processors, a rescan timer on the user
equipment if the user equipment is connected to the first wireless network; upon expiration of the rescan timer, performing, via the one or more hardware
processors, the step of determining whether the second wireless network is
accessible; and based on the determining:
if the second wireless network is inaccessible, resetting, via the one or more hardware processors, the rescan timer.
16. The method of claim 1, wherein the transferring further comprises:
based on the determining:

if the second wireless network is accessible, initiating, via the one or more hardware processors, a forced transfer of the user equipment from the first wireless network to the second wireless network.
17. A system comprising:
a hardware processor; and
a memory storing instructions executable by the hardware processor for:
transferring a user equipment from a first wireless network to a second wireless
network, wherein the transferring comprises: determining whether the second wireless network is accessible based, at least in
part, on a fingerprint-mapping database; based on the determining:
if the second wireless network is accessible, informing the user equipment that the second wireless network is available; and
if the second wireless network is inaccessible, updating the fingerprint-mapping database.
18. The system of claim 17, the memory further storing instructions for:
communicating to transmit-receive information from the second wireless networks
and the first wireless network.
19. The system of claim 17, wherein the user equipment comprises at least two SIM modules, wherein each of the at least two SIM modules is configured to connect to at least one of the first wireless network and the second wireless network.
20. The system of claim 17, wherein the user equipment comprises at least two IMSI modules, wherein each of the at least two IMSI modules is configured to connect to at least one of the first wireless network and the second wireless network.
21. The system of claim 17, the memory further storing instructions for: transferring the user equipment from the second wireless network to the first
wireless network, wherein the transferring further comprises:

determining whether the second wireless network is inaccessible by the user equipment, wherein the determining comprises at least one of: checking if a signal strength of the second wireless network as received by
the user equipment is lower than a pre-programmed threshold signal
strength value stored in the user equipment; and checking if a bit error rate for the second wireless network as determined by
the user equipment is higher than a pre-programmed threshold bit
error rate value stored in the user equipment.
22. The system of claim 21, wherein transferring the user equipment from the second
wireless network to the first wireless network further comprises:
determining if the first wireless network is accessible, wherein based on the determination: if the wireless network is inaccessible, sending an error message to the user
equipment, wherein the error message indicates that the first
wireless network is inaccessible; and if the wireless network is accessible, informing the user equipment that the
wireless network is accessible.
23. The system of claim 17, wherein determining whether the second wireless network
is accessible based, at least in part, on the fingerprint-mapping database further
comprises:
determining a current location of the user equipment, wherein the current location
is a set of spatio-temporal coordinates of the user equipment; identifying a cell belonging to the first wireless network based, at least in part, on
the current location of the user equipment; checking the fingerprint-mapping database to determine if there is a mapping
between a cell belonging to the second wireless network and the cell
belonging to the first wireless network; based on the checking:
if the mapping exists, informing the user equipment that the cell belonging to the second wireless network is accessible; and

if the mapping does not exist, updating the fingerprint-mapping database.
24. The system of claim 23, wherein the updating of the fingerprint-mapping database
further comprises:
initiating a frequency band scan for the second wireless network at the current
location; based on the frequency band scan, identifying a new ceii of the second wireless
network at the current location; and adding a new mapping between the new cell and the cell of the first wireless
network.
25. The system of claim 17, wherein the fingerprint-mapping database is pre-loaded on
the user equipment.
26. The system of claim 17, wherein the fingerprint-mapping database is pre-loaded on at least one network equipment associated with the second wireless network.
27. The system of ciaim 17, wherein the fingerprint-mapping database is stored in a cloud-based application and is accessible by the user equipment whether the user equipment is connected to the second wireless network or the first wireless network.
28. The system of claim 23, wherein the mapping comprises a one-on-one mapping between at least one of a ceil identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SSiD and a time identifier of the cell belonging to the wireless network and at least one of a cell identifier, a PLMN identifier, a LAC identifier, a TAC identifier, a RF identifier, PCI, SSID and a time identifier of the cell belonging to the second wireless network.
29. The system of claim 17, wherein the fingerprint-mapping database is updated periodically by the second wireless network.

30. The system of claim 17, wherein the second wireless network and the first wireless network each comprise a 5G network, a MIMO network, a LTE network, a 4G network, a 3G network, a 2G network, a carrier Wi-Fi network, a WiMax network, a GPRS network, an EDGE network or a Wi-Fi network.
31. The system of claim 17, wherein the transferring further comprises:
initiating a rescan timer on the user equipment if the user equipment is connected
to the first wireless network; upon expiration of the rescan timer, performing the step of determining whether the
second wireless network is accessible; and based on the determining:
if the second wireless network is inaccessible, resetting the rescan timer.
32. The system of claim 17, wherein the transferring further comprises:
based on the determining:
if the second wireless network is accessible, initiating a forced transfer of the user equipment from the first wireless network to the second wireless network.

Documents

Application Documents

# Name Date
1 Other Patent Document [02-08-2016(online)].pdf 2016-08-02
2 REQUEST FOR CERTIFIED COPY [29-08-2016(online)].pdf 2016-08-29
3 Form 3 [02-02-2017(online)].pdf 2017-02-02
4 693-MUM-2014-FORM 3 [17-01-2018(online)].pdf 2018-01-17
5 Form-2(Online).pdf 2018-08-11
6 FORM- 5.pdf ONLINE 2018-08-11
7 FORM- 5.pdf 2018-08-11
8 FORM- 2.pdf ONLINE 2018-08-11
9 FORM- 2.pdf 2018-08-11
10 Drawings.pdf ONLINE 2018-08-11
11 Drawings.pdf 2018-08-11
12 ABSTRACT1.jpg 2018-08-11
13 693-MUM-2014-FORM 3.pdf 2018-08-11
14 693-MUM-2014-Form 3-280915.pdf 2018-08-11
15 693-MUM-2014-FORM 3(1-7-2015).pdf 2018-08-11
16 693-MUM-2014-FORM 26.pdf 2018-08-11
17 693-MUM-2014-FORM 2.pdf 2018-08-11
18 693-MUM-2014-FORM 2(TITLE PAGE).pdf 2018-08-11
19 693-MUM-2014-FORM 1.pdf 2018-08-11
20 693-MUM-2014-DRAWING.pdf 2018-08-11
21 693-MUM-2014-DESCRIPTION(PROVISIONAL).pdf 2018-08-11
22 693-MUM-2014-CORRESPONDENCE.pdf 2018-08-11
23 693-MUM-2014-Correspondence-280915.pdf 2018-08-11
24 693-MUM-2014-CORRESPONDENCE(1-7-2015).pdf 2018-08-11
25 693-MUM-2014-ABSTRACT.pdf 2018-08-11
26 693-MUM-2014-FER.pdf 2019-05-27
27 693-MUM-2014-FORM 3 [23-09-2019(online)].pdf 2019-09-23
28 693-MUM-2014-FER_SER_REPLY [11-10-2019(online)].pdf 2019-10-11
29 693-MUM-2014-Information under section 8(2) (MANDATORY) [15-10-2019(online)].pdf 2019-10-15
30 693-MUM-2014-PatentCertificate07-09-2021.pdf 2021-09-07
31 693-MUM-2014-IntimationOfGrant07-09-2021.pdf 2021-09-07
32 693-MUM-2014-POWER OF AUTHORITY [26-02-2022(online)].pdf 2022-02-26
33 693-MUM-2014-FORM-16 [26-02-2022(online)].pdf 2022-02-26
34 693-MUM-2014-ASSIGNMENT WITH VERIFIED COPY [26-02-2022(online)].pdf 2022-02-26
35 693-MUM-2014-RELEVANT DOCUMENTS [22-09-2023(online)].pdf 2023-09-22

Search Strategy

1 2019-05-2416-07-50_24-05-2019.pdf
2 1111111_28-03-2018.pdf

ERegister / Renewals

3rd: 18 Nov 2021

From 27/02/2016 - To 27/02/2017

4th: 18 Nov 2021

From 27/02/2017 - To 27/02/2018

5th: 18 Nov 2021

From 27/02/2018 - To 27/02/2019

6th: 18 Nov 2021

From 27/02/2019 - To 27/02/2020

7th: 18 Nov 2021

From 27/02/2020 - To 27/02/2021

8th: 18 Nov 2021

From 27/02/2021 - To 27/02/2022

9th: 26 Feb 2022

From 27/02/2022 - To 27/02/2023

10th: 27 Jan 2023

From 27/02/2023 - To 27/02/2024

11th: 01 Dec 2023

From 27/02/2024 - To 27/02/2025

12th: 19 Feb 2025

From 27/02/2025 - To 27/02/2026