Method and system for low power internetwork communication with machine devices

ABSTRACT

A wireless mobile device in a public communication network receives network-initiated signaling or messaging, while operating in a battery-conserving mode, or modes that, keep(s) minimal baseband processing functions awake. The baseband processing functions process incoming signaling or data in a received message to determine whether to act further on information in the incoming message by enabling additional processing capability in the mobile device. The mobile device may have permanent template criteria values, either coded in firmware or implemented in hardware, or temporary template criteria values, stored in RAM or processor registers, that are compared to values of an incoming message or datagram from the mobile network to determine whether to perform additional actions, such as awakening an application processor. Multiple templates may co-exist to allow different incoming datagrams to cause the device to take some additional action, respond, or even ignore information in an incoming datagram or message.

CROSS REFERENCE TO RELATED APPLICATION

This application claims priority under 35 U.S.C. § 120 to, and is a continuation of, U.S. patent application Ser. No. 15/700,645 entitled “Method and system for low power internetwork communication with machine devices,” which was filed Sep. 11, 2017, and which claimed priority to 35 U.S.C. § 119(e) to U.S. provisional patent application No. 62/393,988 entitled “Method and system for low power internetwork communication with machine devices,” which was filed Sep. 13, 2016, both of which applications are incorporated herein by reference in their entireties.

FIELD

The field relates, generally, to Internet of Things systems and devices and, more particularly, to a system and method for delivering, and determining whether to act upon, messages, notifications, and inquiries to Wireless Wide Area Network (“WWAN”) connected devices.

BACKGROUND

The Internet of Things (“IOT”) is a recent development in which everyday objects have connectivity to data networks allowing them to send and receive data to other devices or systems. The connectivity enables the devices to achieve greater value and service by exchanging data with other systems, servers, and controllers. Sometimes this connectivity is used for remotely monitoring and controlling the connected device. IOT systems generally refer to the integrated use of telecommunications devices in embedded systems for transmitting, receiving, controlling, remotely storing and processing information. More generally, IOT may refer to smart devices sending, receiving, and storing information via telecommunication devices over a public communication network such as the World Wide Web (“WWW”).

Other than the convergence of telecommunications and information processing, the term IOT may also refer to automation of various processes relating to the controlling and managing remote devices and systems. For example, in a scenario where an IOT system includes multiple food or beverage vending machines, the IOT system can report the inventory status of remote vending machines, operate e-payment systems that facilitate purchase of items from the vending machine, update content to be displayed on the exterior of one of IOT vending machines, and report interior temperature of one or more of the vending machines to provide an enhanced experience for the customers. In another scenario, an IOT system can allow a homeowner to remotely monitor and control the heating and air conditioning systems utilizing a smart thermostat while communicating over a communication network with one or more centralized servers to intelligently manage energy efficiency and to process consolidated energy usage reports. This IOT system may also synchronize the energy usage with other nearby systems to smooth out localized energy usage peaks, thus lowering overall peak energy demand on public utilities such as electricity and natural gas. In other aspects, the homeowners IOT system may monitor weather conditions and synchronize water usage for non-essential activities such as pool water replenishment and landscape watering.

An IOT device may be connected to a larger network, for example the Internet, using an ever-expanding number of methods. Early connected devices were networked with each other using proprietary localized networks created using multi-drop serial networks or simple non-standardized wireless networks. Those devices generally communicated with local gateways or controllers and were rarely remotely operable. As wide area networks were established, creative ideas drove the concept of connecting and controlling devices beyond the reach of the local network. As new technologies drive down costs of embedded electronics, sensors, and network connectivity, interconnection of devices and systems becomes more common.

Another major development that has contributed to the expansion of the IOT is the widespread rollout of centralized “cloud computing” services. Cloud computing allows application software to be operated using centralized, sometimes virtualized, Internet connected services. The foundation of cloud computing is based on the broader concept of shared services and a converged infrastructure. Cloud computing, which some may generally refer to as the use of computer resources that are distributed in ‘the cloud,’ relies on the sharing of resources and the economies of scale to deliver computing services. Combining the capabilities of the low cost, emerging, and connected smart devices with the expanse of connected cloud computing environments has created a technological opportunity to develop innovative solutions that will enhance automation in nearly every aspect of life.

Early Internet connected devices required complicated and expensive gateways to establish the Internet Protocol (“IP”) connectivity. In the early days of the IOT, Ethernet, the primary physical connectivity medium, required expensive and power-hungry hardware. The software stacks to implement IP were large and complicated and not easily ported to hardware systems unless the hardware included significant processing power and memory. Many of those IP stacks required an advanced operating system that further drove the hardware complexity. Over the last few years, micro computing and memory technologies have advanced to the point where a full operating system can be ported to very small and cost-effective platforms. Some of the new single-chip micro computing platforms that have been introduced over the last five years are powerful enough to include an IP stack, real-time operating system, and sensor management to support an advanced smart device.

Advances in the various physical layer communication devices and technologies have also encouraged the deployment of connected devices. For example, Wi-Fi is a wireless local area network (“WLAN”) computer networking technology that allows electronic devices to connect directly to the Internet thru a Wi-Fi wireless access point (“WAP”). Wi-Fi networks typically operate using low power transmitters on unlicensed spectrum at either 2.4 GHz or 5 GHz. The specifications for Wi-Fi networks are based upon IEEE 802.11 standards. Although the name “IOT” infers a direct connection to the Internet, in many cases the direct connection is using a medium and technology that is not directly IP. The reasons for selecting a different connection type are many.

Other recently developed technologies that are driving the IOT include ZigBee, Z-wave and of course the various Wireless Wide Area Network (“WWAN”) technologies such as GSM, UMTS, and LTE. WWAN technologies differ from WLAN technologies by using different spectrum, protocols, security and authentication systems and the coverage area of a WWAN is typically much larger. WWAN wireless networks are usually operated by mobile telecommunications (or cellular) operators using licensed spectrum. The services may be offered regionally, nationally or globally.

The connecting of devices to the Internet using various WWAN technologies isolder than the term “Internet of Things.” Early non-cellular technologies included Mobitex, DataTAC, and ReFLEX. Each was a purpose-built data-network that supported narrow-band two-way data connectivity. Although the networks existed before the wide acceptance of what we now know of as the Internet, they operated on private wide area networks. As the wireless cellular networks became more refined, systems emerged to leverage the assets of cellular operators. In the United States, Cellular Digital Packet Data (“CDPD”) networks were developed and deployed using the unused bandwidth of the AMPS analog mobile networks. While CDPD supported speeds up to 19.2K bits per second, and was significantly faster than Mobitex, DataTAC, or ReFLEX, it could not compete against the slower, less expensive and more flexible Mobitex, DataTAC, and ReFLEX networks.

Outside the US, GSM networks, a second-generation (“2G”) technology, were being deployed using digital wireless technology as opposed to the analog networks of AMPS. Being digital, these 2G networks could inherently carry data communications but the connectivity was not usually to a wide area network like the Internet, but to local modem interworking-function platforms that placed an outgoing analog dial-up modem call over the fundamentally analog public switched telephone network (“PSTN”), bridging the digital GSM world with the analog PSTN world. This was called circuit-switched data (“CSD”). The over-arching premise of the CSD solutions depended upon on the wireless mobile communication device initiating the outgoing connection.

The wireless networks in the United States began to deploy digital wireless technology, principally for voice, in more than a few markets by the mid- to late-1990's. These systems also included a modem interworking-function or CSD that depended on the mobile device to initiate the outgoing interconnection to its destination. As the Internet became popular in the late 1990's, the modems were removed from interworking-function, allowing devices to connect to the Internet directly without going thru an analog modem to the PSTN to reach the Internet. Again, it should be noted that these CSD-connected devices, which could perhaps be considered as the first IOT devices, could initiate outgoing data connections, but could not easily receive incoming data connections from the Internet.

In the early 2000's, the GSM network operators began to deploy General Packet Radio Service (“GPRS”) technology in their wireless networks. GPRS is a packet oriented mobile data service for GSM 2G and third generation (“3G”) networks. Instead of “dialing” thru a CSD connection, GPRS devices access the terrestrial packet network using an access point name (“APN”), username and password. Although the APN may specify access to the public Internet, it may also specify access and connection to a defined endpoint, for example, to a private enterprise network. This was the first system to provide worldwide mobile access to the Internet. As above, it should be noted that these WWAN connected devices initiated the outgoing connection to the external packet networks.

The wireless industry refers to incoming wireless device connections, as mobile terminated (“MT”) voice or data connections. MT wireless devices and connections are considered mobile, without regard to the movability of the device. The significant advantage of the early packet data networks such as Mobitex, DataTAC, and ReFLEX was their ability to accept MT data connections. Mobitex, DataTAC, and ReFLEX networks were principally designed to support two-way paging-like features, including portable wireless devices carried on one's person like a one-way pager and as such, these networks supported devices that firstly supported incoming MT data. For the cellular wireless and GPRS networks, including Universal Mobile Telephone Service (“UMTS”) networks, data transport was an afterthought (or late addition) and receiving incoming data connections was not generally supported by the networks for the vast number of devices that operated or will operate on the wireless networks. Short Message Service (“SMS”) connectivity was one of the first types of MT data supported by the vast majority of wireless mobile devices that were created first and foremost for voice services.

The methods of receiving, accepting. and acting upon incoming data connections are many. Almost all current methods are very slow or very expensive in terms of network resources. One method currently used almost exclusively for IOT devices involves sending an SMS message to the remote wireless device and once received, the remote wireless device initiates an outgoing connection to the requesting server. This method may be referred to as an ‘SMS Shoulder Tap.’ Another method supported by some IOT devices, but significantly less popular, is to place an MT voice call to the IOT device using its Mobile Station International Subscriber Directory Number (“MSISDN”). The data device does not accept the MT voice call, but instead uses this incoming call as a triggering event and subsequently initiates an outgoing IP connection to the requesting server. Both methods described are problematic and involve significant latency and require the initiating server to interface to disparate systems.

Modern WWAN IoT systems are deployed in many different locations. Many of those devices are deployed in locations where the device may be powered by standard commercial utility power sources. However, many IoT applications that do have access to commercial utility power also have access to either wired or WiFi wireless Internet connections, driving the significant percentage of WWAN IoT applications specifically to those requiring both mobility and non-utility power applications. Even heavy equipment and automotive telematics applications have power limitations; not necessarily while the engine is running, but more specifically while the equipment or vehicle is idle (i.e., the vehicle's engine is not spinning the alternator. Thus, any device receiving power from the vehicle is depleting charge from a battery of the vehicle). Remote control applications in telematics applications as well as solar or battery powered data acquisition equipment require very low standby operation power so that the device can receive remote commands for extended periods without overly large standby batteries.

U.S. patent application Ser. No. 15/093,560 (“'560”) filed Apr. 7, 2016, which is incorporated by reference herein, discloses methods to efficiently route traffic and signals to mobile devices using 3GPP standard methods coupled with the previously disclosed Internet gateway(s). Although '560 discusses solutions to certain network signaling and traffic routing problems and addresses external Internet security issues, '560 does not address device power management and security aspects as disclosed herein.

With the large number of IOT devices and with the user expectation of Internet-like responses from those devices, and the need for remotely controlling WWAN connected devices, it is desirable to have a reliable and high-speed method to re-establish a data session with a device that may have already ended a session, but that remains attached. It is desirable to minimize the power consumed by a device that remains in a standby state, while maintaining the device in a state where it can receive incoming data packets necessary to respond to remote control or remote data requests.

SUMMARY

In accordance with one or more of the embodiments, this disclosure presents a method for managing a wirelessly connected mobile device while remaining connected in an attached state in a 3G network, or while EMM-registered in a 4G LTE network. A method and system is disclosed herein for managing a remote connection reestablishment solution that minimizes total mobile device power consumption without unnecessarily delaying connection time. Further, a method and system is disclosed herein for securely managing the data session reestablishment process without unnecessary power draining events that could drain a battery in unsuccessful or fraudulent connection attempts.

WWAN devices have numerous attachment states, with some states permitting the device itself to communicate over an IP network to some predetermined IP endpoint in the wireless network using default or dedicated bearers. That endpoint is usually part of, or managed by, a sophisticated router, a GGSN in a GSM/UMTS network, or a Packet Gateway [PGW] in an LTE network. The GGSN/PGW acts as a firewall when the device connects to the Internet and it operates like a gateway when the device connects to a defined private network, for example, an enterprise network operated by a third party enterprise specifically for supporting the connectivity of the TOT device to the enterprise's own private servers. In the case of LTE devices, any time a WWAN device is attached to the network it has a default bearer established between the device and the network, and with the proper network implementation and configuration messages can be pushed to the WWAN device regardless of whether the device itself is prepared to receive the message.

WWAN mobile platforms for LTE or UMTS generally have a modular architecture for wireless communications and user applications. Usually the platform contains a modem subsystem comprising a hardware sub-system and a layered software sub-system. Additionally the mobile platform usually includes either a co-located third party application processor or preferably a multi-processor system-on-a-chip [MPSOC] where one of the processors is dedicated to the modem function and handles a reduced set of functionalities, such as providing access to a mobile communications network. A second, third, or subsequent processor core may be dedicated to provide higher layer or level communications functionality, for example the implementation of an IP protocol, and multimedia and user interface and application processing.

Those skilled in the art should quickly recognize that for a mobile communications handset or smartphone to function properly, the subsystem of the device serving as the interface to the mobile communication network (e.g., modem) must remain powered unless it is managed in conjunction with functionality in the mobile communications network itself. One example of this management is the Discontinuous Receive [DRX] function of LTE as described in 3GPP TS 36.304. In this mode, the baseband processing may be temporarily suspended for a period of time to allow the mobile device to save power. In order for the baseband processor to be active for reception of incoming signaling or messaging, the baseband processor and serving node of the network coordinate the periods of time when the baseband processor “sleeps,” such that signaling occurs during the periods of the baseband processor being active.

Although the above examples specifically are related to mobile communications devices implemented as smartphones where small batteries and long life are obviously critical, the above examples can equally apply to Internet of Things device connected to a mobile communications network. Early IoT devices used SOCs created specifically for handsets because the volume was not large enough to justify the development of custom SOCs for IoT. Leveraging the power management features of the handset SOCs for IoT devices is equally important in most cases. This disclosure teaches a method to minimize power consumption of the mobile communications device by leveraging the baseband processor, or baseband processing subsystem on a SOC, to assist in the power management of the entire mobile communications device by filtering incoming network messages and packets, and deciding whether to act upon the received incoming messages, in addition to its job of interfacing to the wireless communications network, while the power to applications processors are off and their clocks are stopped or the power is applied to the applications processor(s), but the clocks are operated at a very slow power saving rate.

Aspects include, a system, or a wireless communication device that includes one or more electronic systems, that includes a first processor portion. The first processor portion may be a microprocessor, a system on a chip, or other digital data processor circuitry. The first processor may be a baseband processor, a wireless communication modem processor, or a processor that may not have the capability to perform sophisticated application processing. The first processor may be configured to evaluate a received message to determine whether to provide an instruction to transition from a low power state. The message may be received from radio circuitry of a device that includes the first processor, is associated with the first processor, or that is coupled with the first processor. The instruction to transition from a low power state may be an instruction for a component that is part of the system, or wireless communication device that include the first processor, or for another portion a chip that includes the first processor portion, to transition from a low power state, which may be a ‘sleep’ state.

The first processor portion is further configured to evaluate by the first processor portion of the received message, which evaluation may include comparing at least a one aspect of the received message to at least one transition from low power state criterion. The at least one transition from low power state criterion may be one of a plurality of criteria, or may be a single criterion, the satisfying of any one of which may be used as a basis to generate a transition from low power state instruction.

The first processor may be further configured to generate a transition from low power state instruction if the at least one aspect of the received message satisfies the at least one transition from low power state criterion; and to provide the transition from low power state instruction, typically to a second processor portion, which may be part of a wireless communication device that includes the first processor, that is part of a system on a chip that includes the first processor, portion, or that is another component that is configured to cooperate with the first processor portion to operate certain aspects of a wireless communication device, such as running applications that typically process data that may be transmitted over a data connection when the wireless communication device is not in an ECM Idle state or in an RRC idle state.

In an aspect, the second processor portion may be configured to provide the at least one transition from low power state criterion. The second processor portion may be configured to provide the at least one transition from low power state criterion before transitioning to the low power state. The at least one transition from low power state criterion may be a template that includes criterion, or criteria, for determining whether to generate an instruction to cause the second processor portion to wake up. Satisfaction of the at least one transition from low power state criterion typically involves determining that the received message includes, or conveys, more information than the mere fact that an incoming message was received by the first processor portion. The template may include values, or one or more ranges of values, that information in the incoming message matches, or falls within (typically if the criteria is a range of value), for a determination of meeting, complying with, matching, or otherwise satisfying the at least one transition from low power state criterion.

The at least one transition from low power state criterion may include a layer 2 physical address, a layer 3 logical address, one or more port identifiers (initiating or destination), cryptographic information, a time stamp, a time-based value. The time-based value may be a value derived from, or calculated based on, a time stamp such that when the information received in the incoming message, which may include the time stamp that was used to generate the time-based value at a device that generated the message, may be used to calculate a time based value at the first processor portion. The first processor portion can determine whether the calculated time based value that it calculates (typically using an algorithm that the sending device used to generated the time-based value) matches the time based value received in the message, and the first processor may also determine that the time-stamp that may be included in the received message falls within a predetermined range of the current time at the wireless device that includes the first processor portion. In such a scenario, the current time of the first processor portion, or a device in which it operates, may be considered an at least one transition from low power state criterion; the algorithm to calculate the time based value based on a time stamp received in the incoming message may be considered as an at least one transition from low power state criterion.

The at least one transition from low power state criterion includes a physical address.

The received message is received via a default bearer. When the second processor portion of a wireless communication is in a low power state the wireless communication device that includes the second and first processor portions would typically be in an ECM Idle and RCC idle mode, during which a dedicated bearer typically would not be established for the wireless communication device.

In an aspect, the received message may be acted on (i.e., the first processor portion determines that an at least one transition from low power state criterion has been satisfied) if it was transmitted during a DRX cycle that was initiated by an MME, SGW, or PGW. In another aspect, the first processor portion may not act on a received message if the message was initiated during a DRX cycle by an eNodeB. This aspect may provide the advantage that a second processor of a wireless machine device that does not need to respond to emergency messages, such as may be related to a storm, a missing child, etc., does not need to transition from a low power state unless a message is directed to it (i.e., door unlock message to a particular vehicle or message requesting sensor information from one or more sensors of a particular machine device), as compared to a second processor of a UE such as a smart phone that may need to perform application processing related to a missing child Amber Alert that may be broadcast from an eNodeB to all wireless devices that the eNodeB's signal can reach. Messages such as storm warnings or Amber Alerts that are broadcast from an eNodeB during a DRX paging cycle may be referred to having been broadcast during a broadcast DRX cycle. In an aspect, the first processor may determine that the at least one transition from low power state criterion is not met during a DRX cycle unless the first processor determines that the received message was generated using non access stratum signaling. Since non access stratum signaling typically is not used with, or typically does not operate with, a wireless communication device that is in a state of ECM Idle and RRC idle, a flag, or bit, may be set to a predetermined NAS signaling indication value to indicate to the receiving first processor, by comparing the NAS signaling indication value to a transition from low power state criterion, that the second processor should transition from a low power state and process data that may arrive, perhaps over a dedicated bearer, or perhaps over the existing best effort default bearer to the wireless communication device and the first processor portion.

In an aspect, the first processor portion and the second processor portion are a baseband processor portion and an application processor portion, respectively.

In an aspect, the first and second processor portions are parts of a single user device, such as a wireless communication device, that may be a smart phone, a tablet, a medical device in a hospital, a vehicle telematics device, a vending machine, and the like.

In an aspect, the first and second processor portions are parts of a single processor chip.

In an aspect, the first and second processor portions are separate processor chips coupled to shared circuitry.

In an aspect, the transition from low power state criterion is stored in a memory shared by, and accessible by, the first processor portion and the second processor portion.

In an aspect, the first processor further evaluates the received message to determine, based on the at least one transition from low power state criterion, whether the received message relates to performing a function that requires that the second processor portion transition from a low power state.

In another aspect, a first processor portion of a wireless communication device may perform a method, which may comprise determining whether to provide an instruction to perform a function that requires a transition from a low power state, wherein the determining includes comparing at least a one aspect of the received message to at least one transition from low power state criterion. The method may also comprise generating a transition from low power state instruction if the at least one aspect of the received message satisfies the at least one transition from low power state criterion and providing the transition from low power state instruction.

In an aspect, the steps of the method may be performed by a first processor portion, and the transition from low power state instruction may provide to a second processor portion.

In an aspect, the transition from low power state criterion may be stored in a shared data store that is accessible by the first processor portion and the second processor portion. In an aspect the transition from low power state criterion may a cryptographic key, a time-based value, or other information that may be unique to an instruction that would be received in a message from a device that is authorized to cause the first processor portion to awaken the second processor portion.

In an aspect, the transition from low power state criterion includes awaken information that the second processor portion generated before transitioning to a low power state. An example is that the second processor, or application processor, might generate a new wake-up template, for example a template that only allows the device to transition from low power state in the event of a message from a specific server based on an IP address or some other unique identifier. The first processor may have a wake-up reason mask that might include things like firmware update, location determination request, fuel level request, battery charge status request, pre-trip conditioning request, etc. The second processor might limit wake-up to a specific reason, for example, to location determination request by setting a wake-up mask to block other reasons and allowing a second processor wake-up based only on location determination. This mask may be loaded into the first processor prior to the second processor portion transitioning to a low power state.

In an aspect, the second processor portion may generate a transition from low power state criterion, or criteria, based on a shared value it receives in a message, such as from a computer server that is associated with a wireless mobile network or from a computer server that may be coupled to a packet core network and that may provide a platform for cooperating with a machine device having the first and second processor portions in performing machine device operations. For example, a server remote from a machine device, which machine device includes the first and second processor portions, may generate, or obtain, a value such as a date, a random number, or a other value, which value may be a one-time value, and provide the value/one-time value to an algorithm that also has as an input a stored secret value, such as a cryptographic key, and generate an output, which may be referred to as a derived key. The server may send, or share, the value/one-time value to the machine device, which may have the secret value, or a complement to the secret value, stored in a memory that the first or second processor portion can access. The machine device may store, or have stored, the secret value, secret key, or complement to the secret key/value in a SIM card, or SIM profile. The first or second processor portion may evaluate the received value/one-time value, which may be referred to as a shared value, using the same algorithm and secret value, or complement of the secret value, as used by the server to derive the derived key, or derived value. The first or second processor portion of the machine device may then provide the derived value, or derived key, as a transition from low power state criterion before going into a low power state. A derived key, or derived value, may have a predetermined life span (e.g., one day, one week, one year, etc.). Alternatively, a derived key/derived value may have a one-time-use life span. In the one-time-use lifespan scenario, the server may derive a new/different derived key/value and share with the machine device the value/one-time value used to generate/derive the derived key/value during each period that the second processor portion is not in a low power state, and either the first processor, the second processor, or SIM may generate and provide the transition from low power state criterion/criteria based on the received shared value. The first or second processor portion, or the SIM, may provide the generated derived value before the second processor portion enters a low power state based on the received shared value, or the entering of a low power state by the second processor portion may trigger the initiating of the process at the server to generate the shared value and generating of the derived key value, and the receiving of the shared value thereafter may trigger either the first or second processor, or the SIM, it generating/deriving the derived value/key and storing it to a memory to be used as a current transition from low power state criterion/criteria as opposed to a previous or already-used criterion/criteria.

In an aspect a computer device, such as a telematics server, a machine device services server, a component of a evolved packet core communication network, or the like, may perform a method that comprises receiving information that a second processor portion of a wireless machine device has transitioned to a low power state; transmitting a message to the wireless machine device that includes a first processor portion and the second processor portion; wherein the message includes awaken information for comparison to at least one transition from low power state criterion; wherein the at least one transition from low power state criterion is stored in a memory shared between the first processor portion and the second processor portion; wherein the message includes an instruction to perform a function by the second processor portion; and wherein the message is intended to cause the first processor portion to cause the second processor portion to transition from a low power state when the awaken information matches the transition from the at least one low power state criterion.

In an aspect, the computer device that receives the information that the second processor portion of a wireless machine device has transitioned to a low power state may be one of: an MME, an S-GW, a P-GW, an HSS, an AAA, an ePDG, an ANDSF, a PCRF, an e-SMLC, a GMLC.

In an aspect, the awaken information includes a PLMN list identifier. In an aspect, the PLMN list identifier may identify a preferred PLMN list, which may be stored in the wireless communication, that lists a preferred order of mobile network operators for the wireless communication device to use for high-volume, high-bandwidth services, such as consumer services like audio and video streaming, that are not necessarily associated with a wireless mobile network that the first processor portion has established a current default bearer with.

In an aspect, the awaken information includes an identifier of a SIM profile of the machine device that is associated with machine-centric services and that is not associated with consumer-centric services. Examples of machine-centric services include typically low-volume, low bandwidth services that may include over-the-air software updates for a machine that the wireless communication device is coupled with, such as a vehicle, a vending machine, or a medical device, or software updates for the wireless communication device itself.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a table that summarizes EMM, ECM and RRC states for an LTE wireless UE device.

FIG. 2 illustrates a state table of an LTE device showing various EMM, ECM and RRC states

FIG. 3 illustrates various states of an LTE device and the user experiences corresponding to each of those states.

FIG. 4 illustrates a network diagram for wireless communication with a UE device having first and second processor portions.

FIG. 5 illustrates a flow diagram of a method for a first processor causing a second processor to transition from a low power state during which the first processor can listen for, receive, and process messages.

FIG. 6 illustrates a block diagram of a wireless UE communication device, which may be smart phone or which may be a non-consumer machine device, having first and second processor portions.

FIG. 7 illustrates incoming message information that matches transition from low power criteria.

FIG. 8 illustrates incoming message information that does not match transition from low power criteria.

FIG. 9 illustrates comparing cryptographic information generated based on information in an incoming message to a transition from low power template.

FIG. 10 illustrates comparing information received in an incoming message to a transition from low power template mask that includes an ignore address range mask.

FIG. 11 illustrates an aspect where different information in different corresponding messages may satisfy transition from low power state criteria for different layers in a UE, or for more than one processor that may be in a low power state.

FIGS. 12A, 12B, and 12C illustrate smart phones having a baseband processor for managing network communications and a separate application processor for delivering the user experience and to manage alternative radio access technologies and GPS.

FIG. 13 illustrates a typical baseband processor for managing mobile network communications.

FIG. 14 illustrates a ‘system-on-a-chip’ solution for managing both the mobile network communications and the applications processing for delivering the user experience and to manage alternative radio access technologies and GPS.

FIGS. 15A and 15B illustrate modern smartphone architecture using a SOC shown in FIG. 14.

FIG. 16 illustrates a high-level block diagram for a SOC with a dual-core application processing subsystem as well as the baseband processor for managing mobile network communications.

FIG. 17 illustrates the typical external RF components required for either the complex SOC with baseband as well as applications processing or the simpler baseband processor.

FIG. 18 illustrates a modern, sophisticated Qualcomm Snapdragon multicore mobile handset processor utilizing a SOC that contains the baseband processing, multiple application core processors and graphical/user-interface processor.

FIG. 19 illustrates a modem similar to FIG. 18 but includes more application cores and more processing for the graphical/user-interface.

FIG. 20 illustrates the Snapdragon power and clock distribution on the left as compared to typical SOC mobile processors on the right.

FIG. 21 illustrates the Discontinuous Receive function as defined by 3GPP for LTE.

FIG. 22 illustrates the relative amount of power required for operating each core.

DETAILED DESCRIPTION

As a preliminary matter, it will be readily understood by those persons skilled in the art that the present invention is susceptible of broad utility and application. Many methods, embodiments, and adaptations of the present invention other than those herein described as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the substance or scope of the present invention.

Accordingly, while the present invention has been described herein in detail in relation to preferred embodiments, it is to be understood that this disclosure is only illustrative and exemplary of the present invention and is made merely for the purposes of providing a full and enabling disclosure of the invention. The following disclosure is not intended nor is to be construed to limit the present invention or otherwise exclude any such other embodiments, adaptations, variations, modifications and equivalent arrangements, the present invention being limited only by the claims appended hereto and the equivalents thereof.

In the GPRS and LTE data worlds, an active data session is known as a packet data protocol (“PDP”) context session or a Bearer Setup. As previously mentioned, a mobile device establishes a packet data session to a specific endpoint. The specific endpoint is a gateway/firewall to get to the broader public Internet or it may be to a gateway/firewall to an established enterprise IP connection. Generally speaking, a PDP context is established to a Gateway GPRS Support Node (“GGSN”) for GSM and UMTS networks or, in the 4G/LTE network, an Evolved Packet System (“EPS”) Bearer Setup is established to a Packet Data Network Gateway (“PGW”).

For a UMTS or GSM device, the network data session is established with the PDP Context Activation procedure. But, before the PDP context can be established, a User Equipment (“UE”) device must do an Attach procedure. The Attach procedure is used to alert the Serving GPRS Support Node (“SGSN”) and subsequently the HLR/HSS that the UE has powered up. There is not much the UE can do after an Attach without requesting a PDP context. But, the UE is available to receive an SMS or a Network Initiated PDP Context. Currently there are not many operators supporting SMS over the packet network and almost no operators support Network Initiated PDP Context because there are not established methods to request the Serving GPRS Support Node (“SGSN”) to generate a Network Initiated PDP Context without using a predefined public static IP address assigned to the given UE device.

Normally a UMTS or GSM device will complete the Attach procedure and immediately initiate a PDP Context Activation that will establish the data session and network tunnels and allocate an IP address to the UE. The UE will retain the IP address as long as the device continues to transmit or receive data from the GGSN, but as soon as the data stops flowing, after predetermined inactivity timeout period, typically about an hour, the SGSN or GGSN can terminate the PDP context. The UE can also send a Deactivate PDP context to the SGSN and terminate the session at any time. Once the PDP Context is deactivated, as is the normal operation currently, the UE must reinitiate the PDP Context activation procedure.

For a LTE based system, there are two types of data session setups. The first is called a Default EPS Bearer. The second is the Dedicated EPS Bearer. The Default EPS Bearer is established as part of the Attach procedure. When a UE application needs to establish an application data service, a Dedicated EPS Bearer will need to be established. The LTE Attach/Default EPS Bearer is the equivalent of the UMTS Attach. One major difference is that the default bearer in LTE comes with an IP address where a UMTS or GSM Attach does not assign an IP address. The LTE Dedicated EPS Bearer setup is similar to the PDP Context Activation.

For UMTS or GSM, the IP address is not assigned until the UE initiates a PDP Context Activation. In LTE, the default bearer, and hence the IP address of the UE on the default bearer, both remain as long as the UE is attached. For UMTS or GSM, the IP address disappears with the loss of the PDP Context, which happens due to inactivity, typically after about an hour of inactivity. For LTE, the IP address remains as long as the device does not specifically detach from the network for one of several of reasons. For GSM/UMTS and LTE devices, the only way to maintain a PDP Context or dedicated bearer for application data is to continue to pass data between the UE and the GGSN or PGW.

Although the above paragraphs provide a simplified description of LTE connection states, more details are discussed below. No attempt is made herein to teach the complete details of the aforementioned GSM/UMTS and LTE wireless network specifications, but enough details are discussed below to provide a framework for discussing aspects and embodiments disclosed herein.

LTE devices have numerous operating states and functions for describing the attachment of UE to the network. Some of those functions are part of the Evolved Packet System (“EPS”) Mobility Management (“EMM”) functions; some of those functions are part of the EPS Session Management (“ESM”) functions.

EMM connection management is performed through the EPS Connection Management (“ECM”) function, and an ECM connection consists of a Radio Resource Control (“RRC”) connection over a radio interface and signaling connections over network interfaces.

To better understand the operating states of a given UE operating in an LTE environment, each of the states is shown in the table of FIG. 1. At the simplest level, RRC has two states, RRC-IDLE and RRC-CONNECTED. Simply put, RRC-IDLE is the state when no radio interface connection is established yet and RRC-CONNECTED is when the radio has established signaling connections with the wireless network. At power-on, a UE moves from RRC-IDLE to RRC-CONNECTED. Radio resources facilitate communications between the UE and the network. Without radio signaling connections, the ECM connection cannot be established

Examining the table of FIG. 3, the network functionality and user experience at the UE is described at each state of operation. Case A is the condition immediately after the UE is powered-on after a long period of being powered-off. The radio interface connection in the UE is idle and no ECM connection can be established until the RRC-CONNECTED state is reached by the radio interface. In this initial state, the user cannot send or receive any data. Normally, if a radio network is available, the phone searches the airwaves and finds this radio network very quickly and moves to Case C.

Continuing on the table of FIG. 3, with Case C, the UE attaches to the network and establishes a default bearer and performs a tracking area update and establishes a dedicated bearer if a UE application requires the dedicated bearer to pass specific data. The device itself manages the mobility of the device. As long as the device remains within the defined tracking area, as currently established with the network, no specific network level communications are required. The tracking area can be as small as a cell or as large as a city, for example, depending on how the network operator defines it. User data can be passed between the network and the device. As noted in the table, this state is the EMM-REGISTERED state.

From the table of FIG. 3, Case D is the condition when the network, the UE, or the application, do not have any data to pass in either direction. After sitting idle for some period of time, usually on the order of an hour, the radio interface connection will drop to idle and without a communications path, the ECM moves to the idle state. As long as the device does not move beyond the tracking area as determined by the UE listening to the eNodeB data channel, the UE can remain in this state. While in this state, the UE remains attached but the application cannot pass data traffic in either direction.

To move from Case D back to Case C, one of three events must happen. As mentioned previously, the device can travel out of the tracking area. The device itself recognizes the change in the tracking area and moves the UE to Case C to begin a Tracking Area Update (“TAU”) procedure. The TAU procedure updates the Mobility Management Entity (“MME”), which is responsible for managing the network side of the device mobility. Also, as previously mentioned, an application on the UE may ask for a data connection and once this application initiates the data request, the UE will transition to Case C. The third event that can force the device back to Case C from Case D occurs when the MME generates network signaling to the UE. The network signaling could be because of an incoming voice call, an incoming SMS, or an incoming data packet.

Although transitioning between Case C and Case D is important in the management of the device mobility, transitioning back to Case A or Case B is generally less relevant to aspects disclosed herein.

Turning to FIG. 2, once the power-on condition initiates UE processes, the UE “ATTACHES” to the network. The radio signaling connections are established and ECM connections are established. The ECM-CONNECTED state is when Non-Access Stratum (“NAS”) signaling connections are established on the radio communications link. The UE has been assigned physical resources, radio resources and network resources. Upon transitioning to the RRC-CONNECTED/ECM-CONNECTED state, the UE will be considered EMM-REGISTERED when the default bearer is established, an IP address is assigned to the UE, and the network knows the current location (as defined by the tracking area) of the UE.

As long as the UE continues to transmit or receive data messages, then the device will remain in the ECM-CONNECTED/RRC-CONNECTED state. After some period of UE inactivity, the UE moves to an ECM-IDLE/RRC-IDLE state. This state, although seemingly similar to the state prior to power-on at Case A or Case B, is different in that the device actively monitors the network and reselects new cells as required to maintain reception of a cell data channel. Basically, the UE is “ATTACHED” (or EMM-REGISTERED) and waiting for either new data traffic, whether it is mobile originated (“MO”) or MT data traffic. The UE is also monitoring the tracking area, which is a cell or group of cells, as assigned and defined by the network during the ECM-CONNECTED/RRC-CONNECTED state, for a change to another cell outside the tracking area. It is important that the UE detect the change and notify the network of its new location so that the device might be “signaled” for an incoming call, incoming SMS or network originated data session. If the UE detects new on-board application data traffic or it changes itself to a cell outside of the network defined tracking area, the UE will move to the ECM-CONNECTED/RRC-CONNECTED state (Case C). Once in the ECM-CONNECTED/RRC-CONNECTED state, the UE will update the network with its new location and the UE will synchronize with the network on a new tracking area. A UE device in a static location could potentially remain in the ECM-IDLE/RRC-IDLE state and EMM-REGISTERED for an indefinite period of time.

Any time a UE, in the aforementioned EMM-REGISTERED mode, begins a power-off procedure or it encounters a radio link failure, the UE returns to the EMM-DEREGISTERED (or UNATTACHED) mode.

The most important part of the description above relates to the EMM-REGISTERED mode and the transition from ECM-CONNECTED to ECM-IDLE states. Repeating the description above, the UE moves from ECM-CONNECTED state to ECM-IDLE state based on UE data inactivity. The UE moves from the ECM-IDLE state to the ECM-CONNECTED state based on new data activity.

Similar to the UMTS/GPRS Network Initiated PDP context, LTE supports a network initiated “connection” transitioning UE from the ECM-IDLE/RRC-IDLE state to the ECM-CONNECTED/RRC-CONNECTED state. This transition can only occur if the UE is already EMM-REGISTERED. In order to initiate the transition of states in the UE, the PGW initiates network traffic to the UE, via another node, the Serving Gateway (“SGW”), which is a data node similar in function to a SGSN in a GSM network, where the SGW node kicks off the connection process if the UE is not already in the ECM-CONNECTED/RRC-CONNECTED state. Once the SGW receives the specific data packet destined to the UE, if a link is not established to the UE via the Evolved NODE B (“eNodeB”) (this is the LTE cell site radio equipment), the SGW communicates with the Mobility Management Entity (“MME”) to generate the appropriate Downlink Data Notification message to the eNodeB to establish the RRC connection with the UE. Once in the RRC-CONNECTED state, the UE can transition from the ECM-IDLE state to the ECM-CONNECTED state (i.e., the UE has established a connected state for purposes of communicating data), the data packet can be delivered to the UE.

The LTE UE normally establishes the RRC connection when the end-user starts an application to browse the Internet or sends an email. Similarly, the LTE UE establishes an RRC connection if the UE moves into a new Tracking Area and has to complete the Tracking Area Update. The network triggers an RRC connection by sending a paging message. This is typically used to allow the delivery of an incoming data, SMS or notification of an incoming voice call. The paging message is transferred on a Common Control Channel (“CCCH”), which is broadcast over all eNodeB sites within the Tracking Area if the RRC connection is not established.

In the LTE environment, a dedicated bearer is requested (and assigned) to a UE whenever the UE needs a dedicated tunnel for one or more specific traffic types or applications. For example, VoIP, or video services which need a guaranteed bit rate and quality of service to provide a better user experience than the default bearer can support, will be assigned a dedicated bearer. Dedicated bearers can provide special treatment for specific services by providing a guaranteed bit rate where the default bearer cannot provide that dedicated bit rate. Dedicated bearers can provide separation between IP Multimedia Subsystem (“IMS”) network traffic, the wireless network function that provides voice and SMS services, and routine Internet traffic. The dedicated bearer is normally linked to a default bearer and can have the same IP address as the linked default bearer.

Based on previous details of the existing GSM/UMTS or LTE systems, one skilled in the art can clearly understand that devices are currently designed to operate, in a general sense, in a DATA-CONNECTED and a DATA-DISCONNECTED state. Without data traversal between the UE and the network during a predetermined period, the UE moves to a DATA-DISCONNECTED state after the period elapses. While operating in the DATA-DISCONNECTED state, the UE device consumes significantly lower power, advantageously uses less network resources, and consumes less data than when it is operating in the DATA-CONNECTED state. Having the network force the UE into a DATA-DISCONNECTED state immediately after communications are completed, or having the UE move itself to the DATA-DISCONNECTED state after communications are completed, aspects disclosed herein of initiating a DATA-CONNECTED state from the network side (i.e., from a public communications network that is coupled to a private network operated by a IOT operator, provides a significant advantage to IOT operators. With lower power consumption that aspects disclosed herein can provide, new battery powered devices and applications can emerge. Additionally, extending and coordinating Discontinuous Receive (“DRX”) parameter values between the UE and the device can extend standby time of low power battery devices. Further, the details show that methods currently exist for the network to initiate a connection to transfer the UE to the DATA-CONNECTED state. U.S. patent application Ser. No. 15/093,560 demonstrates practical methods to induce the wireless network to initiate a connection to the UE to allow downlink data to be initially passes and subsequently allow bi-directional data transfers between a server and a wireless communications device.

Power management in wireless communications devices has been one of the most studied sciences among the development aspects of wireless chipsets and handset design. Not only is the chipset design critical, application of that chipset, and software controlling that chipset is critical. Even user interfaces preferences have a major effect on handset battery life. Something as simple as screen brightness or backlight timing can have significant effects on the power required to operate handsets and smartphones. Many different system architectures have been created to maximize the capabilities of the battery powered communications device while extending the battery life to an acceptable length of time for typical users. Over time, system level enhancements have enabled the small smartphone to increase both computing capability and graphical user experience all the while increasing the battery life.

FIGS. 12A, 12B, and 12C is show block diagrams of examples of WWAN communications devices (cell phone) that have a dedicated baseband processor as well as a secondary applications processor managing the user interface, graphical display, touch input, camera and secondary radios like WiFi and Bluetooth. The baseband processor manages all RF control functions, analog to digital conversion, and network access services. The baseband processor manages OSI model Layer 1, Layer 2 and Layer 3, which comprises the Physical Layer, Data Link Layer and Network Layer. The Network Layer provides variable length byte sequences called datagrams to Layer 4 in the Applications Processor. These example block diagrams use two physically different integrated circuit processors.

FIG. 13 is a block diagram of an example baseband processor that might be used in a design as shown in FIG. 15B.

FIG. 14 is a block diagram of an example WWAN system-on-chip [SOC] design that combines the dedicated baseband processor of FIG. 13 with the application processor into a single system-on-chip. The functions show on this diagram show a discrete Layer 1, Layer 2 and Layer 3 controllers, each interconnected to provide baseband network functions. The I/O for the baseband functions are interconnected to a co-located Cortex A processor to provide support multimedia and applications processing as well as the management of secondary Bluetooth, Wi-Fi, GPS, NFC and FM radios. Such a design allows the baseband processor to manage the processing intensive interface to the mobile communications network while leaving nearly all the bandwidth of applications processor for delivering user functionality, services and computationally intensive applications.

FIG. 15A is a block diagram for an example modern smart phone showing the previously mentioned (or similar) SOC processor. To be noted is that the baseband processing is separated from the applications and user interface processing.

FIG. 16 shows a block diagram of an example SOC design that has two Cortex A-9 application processors in addition to the baseband processor.

FIG. 17 shows a block diagram of the external functions and components that are combined with a single chip SOC for realization of a communications device.

FIG. 18 and FIG. 19 show block diagrams of modern SOC designs supporting baseband processing, multiple core application processing and additionally a core supporting graphics processing.

In the cases above, most significantly to be noted is that a separate dedicated modem-processing core exists to handle the baseband processing of the mobile communications device. In almost every case, the baseband processing is handled thru Layer 2 or Layer 3 of the OSI model. As the sophistication of the mobile applications increases, modern SOC designs have added processing cores to facilitate the management and delivery of those applications. During time of peak usage, when higher processing requirements demand more computing power, more cores are enabled to deliver that computing power. Managing the power supply current becomes a major factor for multicore processors. As such, newer SOCs have been designed to support power management of the cores, stopping the clocks and removing the power from the unused cores.

FIG. 20 shows a block diagram of a modern Qualcomm Snapdragon mobile processor power and clock distribution subsystem where power and the clock for each application-processing core can be independently controlled based upon the need in the application processing subsystem.

In an effort to achieve maximum battery life while maintaining a reasonable customer experience, the aforementioned Discontinuous Receive Function (“DRX”) was specified in the 3GPP specification. The DRX function allows the baseband processor to suspend processing for short periods of time by coordinating the signaling messages from the network with the sleep period of the baseband processor. This power savings is done at the expense of the device response time; specifically the device response time for incoming calls, or SMS messages. FIG. 21 shows a ladder diagram of the DRX feature in a typical UE-network implementation. Since user data sessions are typically UE-initiated and controlled by the applications processor, most applications, email, and application notifications will occur in real time or near real time.

Each of the above diagrams highlight the discrete baseband processing subsystem and application processing subsystem used in modern SOCs for mobile communication devices. Since many of these devices are sophisticated processing devices with complex operating systems, almost all communications between the network and the mobile devices are based on Internet Protocol [IP]. Typically, the IP stack above layer 3 is implemented in at least one of the application processors. To facilitate IP communications, at least one of the application processing cores must be powered and clocked to process the incoming datagrams from layer 3 in the baseband processor subsystem. Operating the application-processing core will require power.

Turning to FIG. 22 one can see that each uses at least 300 mW of power at the peak operating frequency. Operating at a slower operating frequency, each core requires at least 100 mW of power. If it is possible to suspend the single application-processing core handling the communications above layer 3 of the OSI model, then some power can be saved in application where lower power usage is critical to the application.

For IoT applications that require an on-demand connection to a wireless device, reducing the power requirements of the device could be critical, especially if the device is truly a mobile device and powered by batteries for a significant part of its life.

LTE devices establish and maintain a dedicated bearer-IP connection between the PGW and mobile device. Since part of that mobile device requires an application processor to manage and route the IP messages within the device itself the application processor is powered and clocked. In many modern SOCs, the baseband processor has excess processing capability but not enough excess processing capability to manage the entire IP stack. When a device is powered on and the device is EMM-REGISTERED with an Attach procedure, the MME has knowledge of the UE location, to at least the accuracy of the tracking area list allocated to that UE. Further, the UE will have at least one active PDN connection, as well as an EPS security context.

When GSM/UMTS devices attach to the network, the HLR has knowledge of the UE location, but unless specifically requested, no PDP context, and hence IP address exist, unless a permanent IP address is assigned to the device.

Since the methods of operating a wireless device using network-initiated signaling are understood and previously disclosed, this disclosure highlights ways minimize power consumption of LTE and GSM/UMTS devices. Internal to the chip and the mobile device, the best way to minimize power consumption is to minimize clock speed of active subsystems and power off other subsystems. Maintaining an active applications processor demands unnecessary power. Shifting certain functions to the baseband processor could eliminate the need to power an applications processor, but the IP functionality might be lacking.

Shutting down the applications processor until any incoming datagram is received and presented from the baseband processor to the applications processor may have merits, but a disadvantage is that incoming data is not screened before shifting the application processor of the mobile device to a high power mode to fully receive and analyze the incoming data as well as potentially respond to the incoming message.

A better solution, as disclosed herein, is to enable the baseband processor to analyze the incoming datagram before performing anything that increases the power beyond the minimal required for baseband processing. The solution could include conditions established prior to the application processor entering the low power mode. The solution could include permanent conditions or temporarily established conditions to screen incoming datagrams before the baseband processor wakes the application processor.

The Open Systems Interconnection model (OSI model) is a model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to the underlying internal structure and technology. A layer serves the layer above it and is served by the layer below it. Although wireless devices may not always be implemented by the strictest definition of the OSI model, most are close. As most follow this model, the baseband processor almost always provides the Layer 1, Physical Layer and Layer 2, the Data Link Layer. Layer 3, the Network Layer may or may not be implemented in the baseband processor. In either case, a baseband processor can be operated in such a way that a template comparing the received datagram to an actionable datagram is possible. If implemented at Layer 2, the addressing may be using physical addresses, for example, and large messages may be segmented, but incoming messages can be evaluated and compared to a template message or messages. If Layer 3 is implemented in the baseband processor, then the messages may be mapped to logical addresses and the messages fragments may be assembled properly.

Although functionally possible and open for consideration, high layers could be implemented in the baseband processor and messages from those layers could also be compared to the template or templates for use as a trigger to wake up various additional power consuming subsystems within the mobile device.

An ideal minimalist solution would be to examine the incoming Layer 3 messages to see if the messages originated from an authorized and defined server and were from a specific pre-defined power and were destined to a specific pre-defined port. Upon receipt of the message from the proper address and port, to a specific predefined port, with anything else within the message ignored, the baseband processor could forward some notification or activate some hardware control signal to enable the clocks and power for the applications processor on the mobile device, whether the device was a SOC or the device was one of several physical discrete processors implemented on the mobile device.

Turning now to FIG. 4, the figure illustrates a communications network environment 2. Evolved Packet Core network 4 (“EPC”) connects a wireless communication device 6 with Internet 8 via Access Point Name defined endpoint 10. Access Point Name 10 typically has a unique identifier, which may include a unique friendly name that corresponds to a unique machine-understandable identifier (i.e., a name that is meaningful to humans and that uniquely corresponds to a unique identifier, such as a MAC address or internet protocol (“IP”) address), and which may be referred to as Access Point Name (“APN”) herein. Wireless device 6 may be one of a plurality of types of devices, including a consumer user equipment device (e.g., smart phone, tablet, PC, and the like), a machine device such as a vending machine, a refrigerator, a gate, a door, a camera, and the like. Another example of a machine device is a vehicle telematics device that may be coupled to a communication bus of a vehicle for providing connectivity of a vehicle, and computer modules thereof (as well as user equipment devices). Reference herein to a user equipment device (“UE”) may be, or may be understood to be, a reference to wireless device 6.

UE 6 typically communicates (i.e., receives messages from and transmits messages to) with EPC network 4 via wireless link 12 via eNodeB 14, which represents a radio access network part of a Long Term Evolution network (“LTE”). ENodeB 14 communicates with Mobility Management Entity (“MME”) 16 and Serving Gateway (“SGW”) 18. Generally, MME 16 manages signaling between UE 6 and other components of network 4, including SGW 18. SGW generally serves as a mobility anchor for data bearers for device 6 as the wireless device moves being connected to one eNodeB 14 to being connected to a different eNodeB, among other functions. Packet Data Network Gateway, or Packet Gateway (“PGW”) 20, generally manages IP addresses for wireless device 6, among other functions. E-SMLC 22 communicates with, and cooperates with MME 16, as do GMLC 24 and HSS 26. Policy Control Rules Function (“PCRF”) module 28 cooperates with PGW 20 is determining and regulating packet flows through APN 10.

As discussed above, it may be desirable for device 6 to consume very small amounts of power when it is powered by a battery and is not actively processing packets and data in performing a function for a user. Thus, a first processor portion 30 may stay ‘awake’ so that device 6 stays registered with network 4 but may be idle with respect to its connection via link 12 to the EPC. First processor portion 30 may consume enough power to ‘listen’ for an incoming message over link 12, and upon receiving a message via the wireless link, the first processor portion may determine that second processor portion 32 may need to transition from a low power state so that it can perform functionality that first processor portion 30 may not be configured to perform. First processor portion 30 and second processor portion may connect to, be coupled with, or may otherwise have the ability to access a shared memory 34. Memory 34 may contain a template, or criteria, that first processor portion 30 may compare with information, or data, received in a message via link 12 to determine whether second processor portion 32 should exit a low power state, or transition from a low power state. Information contained in the template, or contained in the criteria, that is used for the comparison may be referred to as ‘transition from low power state criterion’. If information contained in a message received by first processor portion 30 matches, or satisfies, information in the transition from low power state criterion, or template, the first processor portion 30 may generate an instruction to transition from low power state, and provide the instruction to second processor portion 32. Upon receiving the transition from low power state instruction, second processor ‘awakens’, or exits, a low power state it may have entered to conserve power and begins processing data it may receive from first processor portion 30. First processor portion 30 may be a baseband processor, or modem processor, and second processor portion 32 may be an application processor with greater processing capability than the first processor portion. But, the modem processor 30 may be able to operate with very low power consumption while ‘listening’ for an incoming message via link 12. Application processor 32 typically has greater processing capabilities than the baseband processor 30, with correspondingly greater power consumption than the baseband/modem processor. Both processors 30 and 32 may share memory 34. In an aspect, memory 34 may only accessible by modem processor 30. And, it will be appreciated that even if processors 30 and 32 share access to memory 34, application processor 32 typically would be unable to access memory 34 while in a low power state. Furthermore, it will be appreciated that wireless device 6 typically includes features not shown for purposes of clarity, including a display, control buttons or pads, antennas, a GPS receiver, various sensors that may be device-use-specific, such as temperature sensors, accelerometers, gyroscopes, barometers, moisture sensors, and the like. Any of the sensors could be used to generate a signal that either awakens second processor 32 directly, or that provides a trigger signal to first processor 30 that triggers the generating and providing of a transition from low power state instruction to cause the second processor 32 to exit a low power state.

Turning now to FIG. 5, the figure illustrates a flow diagram of a method 500 for a modem processor of a wireless communication device to awaken a more sophisticated application processor of the wireless communication device from a low power state. Method 500 starts at step 505. At step 510, a transition from low power state template is stored to a memory that the modem processor, which may be referred to as a baseband processor or as a first processor (or first processor portion) can access. The application processor, which may be referred to as an application processor or as a second processor (or second processor portion), may also have the ability to access the memory that the template is stored in. The template may include data or information that may be used to test whether message data contained in the message received by the wireless communication device's front end radio circuitry and processed by the first processor portion is intended by a sender, or sending device, of the received message to cause the more sophisticated, and typically higher-power-using second processor, to transition from a low power state so that the second processor portions higher sophistication can process data and information, which may be received from the first processor portion, which may be an application that is stored locally on the wireless communication, or which may be generated by sensors that are part of, or are coupled to, the wireless communication device.

The transition from low power state template may be referred to as a mask, such as may be used to filter a block of IP addresses. Such a mask may be used to indicate that a received message was received from an approved, or authorized, sender, or sending device, having an IP address that is within a range defined by the mask template. An authorized sender or sending device may be a telematics services server, a driverless vehicle operator's server, a vending machine owner/operator server, or any other computer device than manages one or more remote wireless machine devices via a wireless network that can maintain a registration to a device (i.e., maintain a default bearer between a wireless device and an APN of the network) while radio resources and data bearers (i.e., dedicated bearers) are idle.

The transition from low power state template may be a criterion, or criteria, that data or information in a received message must meet, match, or satisfy, before a determination can be made that the sender of the message is a legitimate sender that has authorization to awaken, or cause the second processor portion to transition from a low power state to a higher power state such that it can process application instructions and data. An example of a transition from low power state criteria may include a time stamp (if the time stamp in a message is not within a predetermined range of a current time of the wireless communication device, or within a current time accessible by the first processor portion (i.e., from a GPS receiver, from an external clock, or from the wireless network to which it is registered), the first processor portion may determine that the received message is not valid and is not to be used as an impetus, or inducement, for causing the second processor portion to transition from low power state. An example of a transition from low power state criteria may include a cryptographic value, or a cryptographic key, such as a key value that matches, or that complements, a value stored in the memory, which may be a standalone memory such as a memory chip, or which memory may be a memory of a subscriber identity module (“SIM”), or SIM profile of the wireless communication device. Or, the cryptographic value may be based on a time value/time stamp, location coordinates, APN of the wireless communication network (such as APN 10 of network 4 shown in FIG. 4), or other value that an entity outside of the wireless communication network, or other than an entity authorized to interact with the wireless communication device, could not associate with the wireless communication device unless by chance or brute force. Alternatively, the criterion contained in the template could be the mere receipt of bits in a data field/section of a message, such as a TCP, UDP, or ICMP message, regardless of what information, if anything at all, that the bits in the data field of the message convey.

Continuing with discussion of FIG. 5, at step 515 the first processor enters a ‘listening’ mode. The first processor typically enters a listening mode when the second processor has ‘gone to sleep’, or entered a low power state, or entered a no power state.

The listening mode may correspond to a status between the wireless communication network and the wireless communication device as EMM registered, but RCC Idle and ECM Idle, which status would correspond to no data packets flowing from or to the wireless communication device that require processing by the second processor portion.

At step 520, while in listening mode, the first processor receives a message from the wireless communication network. The received message may be a message from the wireless network that relates to maintaining tracking of the wireless communication device, which typically would not be a cause to awaken the second processor portion because the first processor portion (i.e., baseband or modem processor), typically can handle providing information to an MME, or similar, of the wireless communication network via non-access stratum messaging protocols.

At step 525, the first processor portion analyzes the message received at step 520. Such analysis may include determining whether the message is a message related to, for example, bearer management or tracking area update procedures. If the message received at step 520 is related to routine EMM registered procedures, for example, the first processor may determine at step 530 that the received message, or bits thereof, do not meet a transition from low power state criterion and return to listen mode at step 515 after performing whatever routine procedures may have been requested in the message received at step 520.

However, if the message at step 520 does not relate to routine procedures that the first processor typically is configured to handle by itself, the first processor may compare the message information evaluated at step 525 to a transition from low power state criterion, or template, at step 530. It will be appreciated that the first processor, or the transition from low power state template, may be configured to determine at step 520 that any message received and processed by the first processor, regardless of the information or data contents of the message, satisfy a transition from low power state criterion at step 530.

As discussed above, if information or date contained in the message received at step 520 meet, match, satisfy, pass through a mask, or otherwise pass a test corresponding to the criterion, or criteria, of the transition from low power state template, the first processor follows the ‘Y’ path from block 53 as shown in the figure. Examples of satisfaction of the test at step 530 are illustrated in FIGS. 7-11 and are described below in reference to the corresponding figures. For example, FIG. 7 illustrates information contained in an incoming message as matching transition from low power state template criteria because the addresses and ports identified in the message match the addresses and ports in the template. If the first processor evaluates at step 520 the incoming message shown in FIG. 7, the first processor would follow the ‘Y’ path from block 530. However, if the first processor evaluated at step 530 the incoming message shown in FIG. 8, which has a non-matching originating port value, the first processor would follow the ‘N’ path from block 530 and return to listen mode (after performing any messaging with the communications network in response to the received message, such as error reporting) without attempting to cause the second processor to transition from a low power state. Further discussion of the evaluation at step 530 in connection with FIGS. 7-11 is given elsewhere herein.

Upon a determination at step 530 that an incoming message received at step 520 satisfies a transition from low power state template, criterion, or criteria, method 500 advances to step 535 and the first processor portion generates a transition from low power state instruction and provides the transition from low power state instruction to the second processor portion at step 540. The transition from low power state may be as simple as a change in voltage level on a trigger/idle/wake pin, or lead, of the second processor portion, or the transition from low power state instruction may include a command for the second processor to perform an operation on information contained in the message received at step 520, on data or executable commands stored in the memory shared between the first and second processors, or on information or executable commands stored in another memory of the wireless communication device, such as a memory chip of such as a SIM or SIM profile. A step 545, the second processor transitions from a low power state in response to the awaken message, or signal, provided by the first processor, and begins processing information or data. Method 500 ends at step 550.

Turning now to FIG. 6, the figure illustrates a block diagram of a UE device 60, or a machine device, that includes a first processor 30, a second processor 32, and a shared memory 34. UE 60 includes radio front end circuitry 62, which may be referred to herein as a transceiver, but is understood to typically include transceiver circuitry, separate filters, and separate antennas for facilitating transmission and receiving of signals over a wireless link 12 as shown in FIG. 4. UE 60 of FIG. 6 may also include a SIM 64, or a SIM profile, which may comprise information stored in a memory (memory 34 or a separate memory portion), for facilitating wireless communication with network 4 shown in FIG. 4. SIM 64 is shown coupled to both the first processor portion 30 and second processor portion 32. Such an implementation provides an advantage that first processor portion 30 does not need to request and receive information or data from SIM 64 that second processor 32 may request, thus eliminating the use of the first processor acting as a ‘go-between’ when the second processor uses information from the SIM in performing its functions and in executing applications. First processor 30, which may be a modem processor or baseband processor, is shown smaller than processor 32, which may be a more sophisticated application processor, to visually indicate the relative levels of sophistication (i.e., processing capability and performance) and corresponding relative levels of operating power consumption levels between the two processor portions. Keeping the second processor portion asleep/inactive/in a low power state when UE 60 does not need it for executing applications and processing data related to an application provides an advantage of reducing power consumption when the UE only needs to use the first processor portion while in listening mode for routine bearer management and mobility management/maintenance procedures. UE 60 may also include sensors 66, as discussed elsewhere herein, that may provide signals to the first processor 30 or second processor 32. In an aspect, a signal from a sensor 66 may provide the message received by first processor 30 at step 520 of FIG. 5, while second processor 32 is in a low power state.

FIG. 7 shows a simple Layer 3 example where a “Valid Template” is compared to an incoming message. In this example, baseband processor determines that the “Incoming Message” matches the valid template and the baseband processor initiates an action to alert the application processor. FIG. 8 shows a simple Layer 3 example where the “Valid Template” is compared to an incoming message. In this example, the “Valid Template” does not match the incoming message since the Originating Port on the incoming message is Port 227 while the baseband processor is expecting Port 18331. Since the “Valid Template” does not match the “Incoming Message”, the baseband processor ignores the message and takes no action to alert the application processor.

FIG. 9 shows two example expansions on the original concept to further eliminate false alerts. In the first example, a cryptographic key, generated by some mechanism, whether completely random and agreed upon between the network-based alerting server and the mobile device, or using a cryptographic algorithm, where the key is cryptographically generated with a receiving UE using mechanisms where the key is not transmitted over the air, a match is required for the baseband processor to take any action and alert the application processor.

FIG. 10 illustrates an aspect where certain parts of the received message template can be masked, or ignored, to allow, for example, a range of Originating Addresses from 10.10.25.0 to 10.10.25.255 to be considered valid using the Ignore Field flag as shown. If the first processor portion performs an AND operation, for example, with the valid template criteria and the ignore mask, thus creating new template/criteria information, and then compares the incoming message to the new criteria, any Originating IP address that matches the first three octets of the new criteria would satisfy the transition from low power state criteria (i.e., the new criteria). In such a scenario, the new criteria may be referred to as transition from low power state criterion/criteria, or the combination of the Valid Template and the Ignore Mask may be referred to as the transition from low power state criteria. In another aspect, since the Template and the Mask can be “bit mapped”, the address range may be narrowed to fewer than those within a range where a given octet is ‘masked’, for example just two different IP addresses could be a transition from low power state criteria.

FIG. 11 illustrates an implementation where multiple messages can be considered valid messages triggering the baseband processor to initiate a request to the second processor. An aspect may utilize one, or multiple, OSI level/layer of message tests before the first processor portion provides a transition from low power state instruction to activate an application processor. Typically, a first processor portion/baseband processor receives and processes Layers 2 and/or 3 information, followed by an application processor processing Layers 4 information/datagrams. Thus, transition from low power state criteria may include a MAC address of a device sending a message received by a wireless UE/machine device as OSI layer/level 2, or the transition from low power state criteria may include a logical address of a device sending the message received by the wireless UE/machine device.

Although the messages are broken down into nice blocks of Originating IP Address, Originating Port, Destination Port and Match Message, at Layer 3, this may be nothing more than a datagram containing data that has not been completely identified other than as bytes.

Ideally, the baseband processor and the application processor operate in tandem and are part of a single SOC, but alternatively, this architecture can be applied to any physical and electrical implementation. The baseband processing can be any number of processing elements and the application processing can use as many processing elements as are required. Preferably, the application processor can call an API that is part of the interface between the baseband processor and the application processor. The application processor can define the expected Incoming Messages and the Masks for each of the possible triggering events.

A triggering event can be one that enables additional functionality, or it can be one that causes the Applications Processor to initiate an outgoing “secure” session as a client to a host server in the network. In the simplest of operations, the triggering event can be the incoming message itself or it can match any incoming message datagram, regardless of content and activate the Applications Processor. The message match functionality may use fixed and permanent templates or it may use temporary templates and masks or it may use variable templates that are based on conditions, either external as in GPS time or internal as in a cryptographic function generated by on-board algorithms or algorithms implemented in security devices such as SIM cards. Examples of match templates include hard wired templates, hard coded templates, templates loaded into registers or RAM and compared in the input datagrams. Templates could be variable and soft loaded by the application processor or fixed at the time of manufacture.

Upon receipt of the relevant triggering action, the Applications Processor can begin a “secure” session as a client to a host. The Applications Processor could also operate as a server, receiving the triggering event datagram as the first step or login into the wireless mobile device-based server that begins communications. The server could be a secure server and the initial datagram is the first message (also called Client Hello) of a TLS Handshake stream. Since any random data input could trigger this event, a more complex match message is desirable to eliminate Denial-of-Service attacks where unknown attackers continuously flood the device with random data and messages, causing a battery-powered IoT device to use valuable power to respond or initiate a power-consuming data session only to discover that there is no legitimate external request for a data connection with the device. 

What is claimed is:
 1. A system, comprising: a first processor portion of a wireless user equipment device, wherein the first processor portion: evaluates a received message to determine whether to provide an instruction to transition from a low power state by comparing at least one aspect of the received message to at least one transition from low power state criterion; generates a transition from low power state instruction if the at least one aspect of the received message satisfies the at least one transition from low power state criterion; and provides the transition from low power state instruction; and wherein the wireless user equipment device uses a shared value as an input to an algorithm to derive the at least on transition from low power state criterion.
 2. The system of claim 1 further comprising a second processor portion wherein the instruction to transition from a low power state is provided to the second processor portion to cause the second processor portion to transition from a low power state, wherein the second processor portion generated the at least one transition from low power state criterion before the second processor entered the low power state.
 3. The system of claim 1 further comprising a SIM profile, wherein the algorithm is a cryptographic algorithm stored in the SIM profile.
 4. The system of claim 1 further comprising a SIM card, wherein the algorithm is a cryptographic algorithm stored in the SIM card.
 5. The system of claim 1 further comprising a memory that is accessible by the first processor portion, wherein the wireless user equipment device uses as an input to the algorithm a secret value stored in the memory to derive the at least one transition from low power state criterion, wherein the secret value is not included in the received message.
 6. A method, comprising: with a first processor portion of a wireless user equipment device: evaluating a received message to determine whether to provide an instruction to transition from a low power state by comparing at least one aspect of the received message to at least one transition from low power state criterion; generating a transition from low power state instruction if the at least one aspect of the received message satisfies the at least one transition from low power state criterion; and providing the transition from low power state instruction; and wherein the wireless user equipment device uses a shared value as an input to an algorithm to derive the at least on transition from low power state criterion.
 7. The method of claim 6 further comprising, with a second processor portion of the wireless user equipment device, generating the at least one transition from low power state criterion before the second processor enters the low power state.
 8. The method of claim 6 further comprising, with the first processor portion, using as an input to a cryptographic algorithm a secret value stored in a memory of the wireless user equipment device to derive the at least one transition from low power state criterion, wherein the secret value is not included in the received message.
 9. A method, comprising: with a network computer device, transmitting a shared value to a wireless user equipment device for use by the wireless user equipment device to generate a transition from low power state criterion; receiving a message from the wireless user equipment device that includes information that indicates that the wireless user equipment device has entered a low power state; with the network computer device, determining that the wireless user equipment device should transition from the low power state; with the network computer device, deriving a value based on the transmitted shared value and a secret value using an algorithm; transmitting the derived value to the wireless user equipment device to cause the wireless user equipment device to transition from the low power state; and wherein the network computer device and the wireless user equipment device both have stored thereon the secret value and the algorithm, and wherein no other device has stored thereon the secret value.
 10. The method of claim 9 wherein the algorithm is a cryptographic algorithm stored in a SIM profile on the wireless user equipment device.
 11. The method of claim 9 wherein the algorithm is a cryptographic algorithm stored in a SIM card on the wireless user equipment device.
 12. The method of claim 10 wherein the cryptographic algorithm is used by a server remote from the wireless user equipment device and is used by the wireless user equipment device for encryption and decryption of secure communication between the server and the wireless user equipment device.
 13. The method of claim 11 wherein the cryptographic algorithm is used by a server remote from the wireless user equipment device and is used by the wireless user equipment device for encryption and decryption of secure communication between the server and the wireless user equipment device. 