Patent classifications
H04M15/57
DISTRIBUTED LEDGER CONTROL OVER WIRELESS NETWORK SLICES
In a wireless communication network, distributed ledger circuitry executes a contract from an origin block and transfers an instantiation request for a wireless network slice to network orchestration circuitry. The network orchestration circuitry instantiates the wireless network slice responsive to the instantiation request from the distributed ledger circuitry. The wireless network slice delivers a wireless network service to the UEs and transfers slice usage data to the distributed ledger circuitry. The distributed ledger circuitry executes the contract from middle blocks and a termination block to form a blockchain that stores the slice usage data for the wireless network slice. The distributed ledger circuitry transfers a termination request for the wireless network slice to the network orchestration circuitry responsive to the execution of the contract from the termination block. The network orchestration circuitry terminates the wireless network slice responsive to the termination request from the distributed ledger circuitry.
SYSTEM AND METHOD FOR EXECUTING ORIGINATING SERVICES IN A TERMINATING NETWORK FOR IMS AND NON-IMS APPLICATIONS
A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.
Network slicing awareness in IP multimedia subsystem
A method performed within a communication system comprising a 5G core network and an IP Multimedia Subsystem (IMS) network, where the 5G core network is configured to implement a plurality of virtual core network slices each having a slice identifier. The method comprises assigning one of said virtual core network slices to a User Equipment (UE) at or following registration of said UE with the IMS network, and sending from the UE or the 5G core network, to the IMS network, the slice identifier of the network slice assigned to the UE. The method further comprises receiving the slice identifier within the IMS network and storing in the IMS network a mapping between the UE and the received network slice identifier. The slice identifier is used within the IMS network to provision services to the UE.
System and method for executing originating services in a terminating network for IMS and non-IMS applications
A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.
ESTABLISHING A SESSION INITIATION PROTOCOL SESSION
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
Restricted Local Operator Services for a Wireless Network
A base station sends, to a wireless device, a system information block (SIB) indicating that restricted local operator services (RLOS) are supported by a public land mobile network, and receives, from the wireless device and based on the SIB indicating support for the RLOS, a preamble. The base station sends a random access response to the preamble and receives at least one first radio resource control (RRC) message comprising a first information element indicating that an RRC connection of the wireless device is for the RLOS and a second information element comprising an attach request message indicating, to a mobility management entity (MME) configured with an RLOS access point name, that an attach request of the wireless device is for the RLOS. The base station sends to the wireless device a second RRC message comprising an attach accept message indicating acceptance of the RLOS by the MME.
Mobile network user monitoring system
Apparatus comprising a plurality of servers and at least one router that are configured to receive from a communications network data records that the network generates, which are associated with IMSIs and comprise metadata characterizing communications that the network propagates, associate IMSIs with the data records, and store data records associated with a same IMSI in a memory correlated with their shared associated IMSI.
CHARGING AND COLLECTION FUNCTION IN MICROSERVICES
Various methods for a 3GPP defined Charging and Collection Function are employed that may use a microservices approach. The microservice approach may decompose the function of the network elements into component level functions that may be deployed as separate functional elements.
SYSTEMS AND METHODS FOR ENABLING EFFICIENT ESTABLISHMENT OF POLICY CONTROL ASSOCIATIONS
Methods, devices, and computer-readable mediums may provide receiving, at a request to establish an access and mobility (AM) policy control association in relation to an establishment of a data session requested by a user associated with a user equipment (UE) device; generating a query to a network device via a network interface, for AM policy control data and for at least one of UE policy control data or session management (SM) policy control data; receiving the AM policy control data and the at least one of the UE policy control data or the SM policy control data from the network device, creating the AM policy control association based on the received AM policy control data; and storing the at least one of the UE policy control data or the SM policy control data.
Call flow system and method for use in a legacy telecommunication system
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.