Patent classifications
H04M15/41
METHOD AND ENTITY IN A LI SYSTEM FOR POSITIONING OF A TARGET CONNECTED TO A WI-FI NETWORK
The present invention relates to a mediation function node in a Lawful Intercept system and a method (S100) in a Lawful Intercept system for enabling a Law Enforcement Agency, LEA, to determine targets' positions. Said targets are connected to a WiFi network via an Access Point. The method comprises steps of:—receiving (S110) a RADIUS account message for a subscriber having been accepted access to the WiFi network;—retrieving (S120) from the received RADIUS account message RADIUS parameters corresponding to an Access Point Identifier and a Service Set Identifier, SSID, if the subscriber is a target;—sending (S130) together with a target identification the RADIUS parameters corresponding to the Access Point Identifier and the SSID to the LEA.
Authorization token including fine grain entitlements
A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
Blockchain-Based Roaming Transaction Method and Apparatus
A blockchain-based roaming transaction method includes sending, by a first network device, a charging data record file to a second network device; publishing, by the first network device, a currency statement to a blockchain; and receiving, by the first network device feedback information of the charging data record file from the second network device.
Method and apparatus for managing a network
A method and an apparatus for managing a network are disclosed. For example, the method collects a plurality of call detail records (CDRs), and organizes one or more parameters of the CDRs in accordance with a plurality of cause codes. The method displays the one or more parameters of the CDRs in a hierarchical representation comprising a plurality of screen displays.
Hierarchical service policies for creating service usage data records for a wireless end-user device
A non-transitory computer-readable storage medium storing one or more machine-executable instructions that, when executed by one or more processors, cause the one or more processors to: determine whether a traffic flow of a wireless end-user device is associated with a first service activity, the traffic flow comprising one or more attempted or successful communications over a wireless access network; if it is determined that the traffic flow is associated with the first service activity, create a first data record, the first data record identifying the first service activity; if it is determined that the traffic flow is not associated with the first service activity, determine whether the traffic flow is associated with a second service activity; and if it is determined that the traffic flow is associated with the second service activity, create a second data record, the second data record identifying the second service activity.
Wireless network service interfaces
A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently.
System and method for common authentication across subscribed services
Aspects of the subject disclosure may include, for example, determining a credential of a first subscribed service, responsive to authentication of a user device within a first communication network. Authentication of the user with respect to the first service is facilitated and, in response, a second subscribed service is identified. A notification is provided to an access control function that the user device is granted access to the second subscribed service. The credential is stored in a common authentication repository accessible by the first and second subscribed services. An inquiry from a second communication network is determined in response to the user device requesting authentication there. A second notification is provided to the second communication network that the user device has already been authenticated, allowing the user device to access the services without further authentication. Other embodiments are disclosed.
Event management mechanism in 5G systems and methods
Systems and methods for dynamically collecting information regarding network events in a 5G network are disclosed. The method includes locally storing event data initially and implementing post-event collection of the locally stored data when one or more collecting nodes become available.
Method and apparatus for supporting proximity discovery procedures
A method and apparatus are described for supporting a two-stage device-to-device (D2D) discovery using a D2D interworking function (IWF). A D2D IWF component may be configured to perform mapping between an application running on an application server and a third generation partnership project (3GPP) network, and provide a set of application programming interfaces (APIs) to allow discovery to be provided as a service to D2D applications. An application identifier may be mapped to a 3GPP identifier. Further, a method and apparatus are described for performing client-server discovery. A first wireless transmit/receive unit (WTRU) may be configured for a listen-only operation, and a second WTRU may be configured to transmit beacons. The first and second WTRUs may perform a radio access network (RAN) discovery procedure at an access stratum (AS) layer. A method and apparatus for performing charging for D2D service using a D2D IWF are also described.
Correlating road network information and user mobility information for wireless communication network planning
Various embodiments monitor user mobility in a wireless communication network. In one embodiment, a set of temporally related call detail records associated with at least one user of a wireless communication network is analyzed. A set of base stations accessed during at least one call associated with the set of temporally related call detail records is identified based on the analysis of the records. At least one road segment of a road network within a threshold distance to each of the set of base stations is identified. A set of mobility information for the at least one user indicating that the at least one user traversed the at least one road segment is stored based on identifying the at least one road segment.