Patent classifications
H04M15/00
SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.
System and Method for a Customized Fifth Generation (5G) Network
An embodiment logical function architecture for next-generation 5G wireless networks may include a control plane comprising a software defined topology (SDT) logical entity configured to establish a virtual data-plane logical topology for a service, a software defined resource allocation (SDRA) logical entity configured to map the virtual data-plane topology to a physical data-plane for transporting service-related traffic over the wireless network, and a software defined per-service customized data plane process (SDP) logical entity configured to select transport protocol(s) for transporting the service-related traffic over a physical data-plane of the wireless network. An embodiment virtual service specific serving gateway (v-s-SGW) for next-generation 5G networks may be assigned specifically to a service being provided by a group of wirelessly enabled devices, and may be responsible for aggregating service-related traffic communicated by the group of wirelessly enabled devices.
System and Method for a Customized Fifth Generation (5G) Network
An embodiment logical function architecture for next-generation 5G wireless networks may include a control plane comprising a software defined topology (SDT) logical entity configured to establish a virtual data-plane logical topology for a service, a software defined resource allocation (SDRA) logical entity configured to map the virtual data-plane topology to a physical data-plane for transporting service-related traffic over the wireless network, and a software defined per-service customized data plane process (SDP) logical entity configured to select transport protocol(s) for transporting the service-related traffic over a physical data-plane of the wireless network. An embodiment virtual service specific serving gateway (v-s-SGW) for next-generation 5G networks may be assigned specifically to a service being provided by a group of wirelessly enabled devices, and may be responsible for aggregating service-related traffic communicated by the group of wirelessly enabled devices.
SELECTION OF A SUBSCRIPTION AT A DEVICE
A communication device may be configured to access a plurality of subscriptions for a plurality of providers. For example, a communication device may be configured with at least one subscriber identity module (SIM). For a communication device having a plurality of subscriptions accessible thereto, the selection of a subscription to connect to a destination network may be configurable. The selection of a subscription from a plurality of available subscriptions may be based on a cost (e.g., financial cost, data cost, or another resource) associated with connecting to a destination network using different subscriptions. For example, a first subscription may be selected if connection to the destination network is more expensive using a second subscription and/or if the balance on the second subscription is too low.
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
Message and system for application function influence on traffic routing
An aspect of the disclosure provides for a method for user equipment (UE) internet protocol (IP) address management. The method includes sending by an application function (AF), a request to a policy control function (PCF), the request including information identifying traffic and an indication that a UE IP address associated with the traffic should be preserved. The method further includes sending by the PCF, to a session management function (SMF) being responsible for managing a Protocol Data Unit (PDU) session associated with the traffic, a policy and charging control (PCC) rule including the indication. In some embodiments, the request is sent by the AF to the PCF via a network exposure function (NEF). In some embodiments, the method further includes managing, by the SMF, the UE IP address according to the PCC rule. In some embodiments, the managing includes preserving the UE IP address for a PDU session associated with the traffic. In some embodiments, the preserving includes preventing reselection of a protocol data unit (PDU) session anchor (PSA) to which the UE IP address is associated.
Message and system for application function influence on traffic routing
An aspect of the disclosure provides for a method for user equipment (UE) internet protocol (IP) address management. The method includes sending by an application function (AF), a request to a policy control function (PCF), the request including information identifying traffic and an indication that a UE IP address associated with the traffic should be preserved. The method further includes sending by the PCF, to a session management function (SMF) being responsible for managing a Protocol Data Unit (PDU) session associated with the traffic, a policy and charging control (PCC) rule including the indication. In some embodiments, the request is sent by the AF to the PCF via a network exposure function (NEF). In some embodiments, the method further includes managing, by the SMF, the UE IP address according to the PCC rule. In some embodiments, the managing includes preserving the UE IP address for a PDU session associated with the traffic. In some embodiments, the preserving includes preventing reselection of a protocol data unit (PDU) session anchor (PSA) to which the UE IP address is associated.
Methods of and devices for implementing and executing policy rules on a per application basis in a telecommunications system
Implementation of an application rule for an application to be accessed by a User Equipment, UE, in a user session in a Service Based Architecture, SBA, domain in a core network of a telecommunications system is disclosed. The SBA, among others, comprises a Policy Control Function, PCF (6), an Application Function, AF (5), and a Session Management Function, SMF (9). The method comprising the steps of receiving, by the PCF (6), an application rule comprising an AF Identifier, AF-ID, identifying the application rule, an Application Identifier, App-ID, identifying the application, and at least one service requirement for processing the application in the SBA domain. The PCF (6) instructing the SMF (9) to execute the at least one service requirement to all present and future user sessions pertaining to the respective application. Complementary methods of supporting the execution of the application rule and devices are also presented.
Sensory Allegiance
Personalized sensory services are provided to mobile devices. As a sensor monitors an area of surveillance, the sensor may detect a passing mobile device. The sensor may thus ally itself to the passing mobile device and provide personalized sensory operations.