Abstract:
Methods, systems, and devices are described for wireless communication. A wireless device such as an in-vehicle system (IVS) may transmit an emergency call (eCall) message to a third party eCall server using a communication session which may be packet based or circuit based. The eCall message may include session information and telematics data. The third party eCall server may relay the session information and telematics data to a public safety answering point (PSAP). For example, the third party eCall server may generate an automatic text-to-speech message that is transmitted to the PSAP over a public communications network. In some cases, the third party eCall server may transmit a response to the wireless device including metadata based on the telematics data transmitted in the eCall message. The eCall message may also include a call-back number, and the PSAP may contact the wireless device directly using the call-back number.
Abstract:
Methods, systems, and devices are described for wireless communication. A wireless device such as an in-vehicle system (IVS) may transmit an emergency call (eCall) message to a third party eCall server using a communication session which may be packet based or circuit based. The eCall message may include session information and telematics data. The third party eCall server may relay the session information and telematics data to a public safety answering point (PSAP). For example, the third party eCall server may generate an automatic text-to-speech message that is transmitted to the PSAP over a public communications network. In some cases, the third party eCall server may transmit a response to the wireless device including metadata based on the telematics data transmitted in the eCall message. The eCall message may also include a call-back number, and the PSAP may contact the wireless device directly using the call-back number.
Abstract:
A reference signal periodically transmitted by a base station in a wireless network can have certain proprietary properties to help prevent detection and utilization of the signal for unauthorized positioning of mobile devices. More specifically, a network node can obscure and introduce time-variation in mapping between positioning signals and a corresponding physical base stations. The network node may also introduce time variations in fields of a base station almanac (BSA) provided to subscribing user equipments (UEs). The information transmitted to the subscribing UEs may be encrypted.
Abstract:
This disclosure provides systems, methods, and devices for wireless communication that support configuring associations between system information of at least one downlink (DL) anchor carrier and at least one random access channel (RACH) occasion (RO) of an uplink (UL) anchor carrier for initial access in flexible multicarrier operations. System information may be transmitted by a base station to a UE over the DL anchor carrier. In aspects, the at least one DL anchor carrier may be mapped to an UL anchor carrier, or to one or more candidate UL anchor carriers from which the UE may configurably select the UL anchor carrier, for initial access operations. In aspects, the UL anchor carrier and/or the one or more candidate UL anchor carriers may be respectively associated with one or more ROs. The UE may perform initial access operations over the UL anchor carrier using the associated one or more ROs.
Abstract:
Methods and devices for dynamic VSIM provisioning on a multi-SIM wireless device having a first SIM as a Universal Integrated Circuit Card (UICC) and a virtual SIM (VSIM). A provisioning server may receive updated information from the wireless device, and based at least partially on the received information, determine whether the SIM profile on the VSIM of the wireless device should be changed. To change the SIM profile, the provisioning server may determine whether remote credential management procedures are enabled. If so, the provisioning server may select a new SIM profile from a plurality of SIM profiles, and provision the new SIM profile in the VSIM using remote credential management procedures. If remote credential management procedures are unavailable, the provisioning server may select a remote SIM from a plurality of remote SIMs associated with the provisioning server, and run the remote SIM to execute authentication processes for the wireless device.