H04W4/24

Adapting network policies based on device service processor configuration

Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.

Virtual network function management
11582049 · 2023-02-14 · ·

Embodiments of the present disclosure relate to methods, apparatuses and computer readable mediums for Virtual Network Function (VNF) management. In example embodiments, there is provided a method of managing a VNF. The method includes sending, from a VNF manager to a charging component, at least one request for charging information associated with at least one VNF. The VNF manager manages the at least one VNF. The charging information indicates respective rates for charging the at least one VNF under different network conditions. The method further includes, in response to receiving the charging information, managing lifecycle of the at least one VNF at least in part based on the charging information.

Virtual network function management
11582049 · 2023-02-14 · ·

Embodiments of the present disclosure relate to methods, apparatuses and computer readable mediums for Virtual Network Function (VNF) management. In example embodiments, there is provided a method of managing a VNF. The method includes sending, from a VNF manager to a charging component, at least one request for charging information associated with at least one VNF. The VNF manager manages the at least one VNF. The charging information indicates respective rates for charging the at least one VNF under different network conditions. The method further includes, in response to receiving the charging information, managing lifecycle of the at least one VNF at least in part based on the charging information.

GATEWAY NODE, USER EQUIPMENT AND METHODS THEREIN FOR HANDLING RULES AND POLICIES IN A WIRELESS COMMUNICATIONS NETWORK
20230042754 · 2023-02-09 ·

A method performed by a gateway node for handling application data traffic of a session between a UE and an application server in a wireless communications network is provided. Upon establishing the session, the gateway node obtains from a policy node, an identity identifying one or more rules provisioned for the UE. The identity is associated with the session and with a UP based API to be used for the session. The gateway node receives through the UP based API, a message from the UE. The message comprises the identity and a flow identifier identifying the application data traffic related to the identity. The message requests the one or more rules to be enforced by the gateway node. Upon detecting application data traffic associated with the flow identifier, the gateway node enforces the one or more rules, according to the obtained identity, for the detected application data traffic between the UE and the application server.

NUISANCE CALL COUNTERMEASURE APPARATUS, METHOD AND PROGRAM
20230043391 · 2023-02-09 ·

A spam call prevention apparatus 11 includes: a response unit 111 configured to convey, to a phone terminal of a sender of a call, a response that, in a case where the call from the sender is evaluated as a spam or a fraud by a receiver of the call, the sender is billed a sum of money corresponding to a probability of being evaluated as the spam or the fraud; a notification unit 112 configured to notify, when the sender has requested, in responding to the response, the call to the receiver, a phone terminal of the receiver of a request for returning an evaluation result of evaluating the call from the sender after the call between the sender and the receiver has ended; and a determination unit 114 configured to determine, when the call from the sender has been evaluated as the spam or the fraud in the evaluation result, the sum of money corresponding to the probability of being evaluated as the spam or the fraud, as a sum of billing.

USER SERVICE PROCESSING METHOD, SYSTEM, AND RELATED DEVICE
20230045030 · 2023-02-09 ·

A user service processing method in a charging system is as follows: A charging trigger device provides initial quota application mode indication information for a charging processing device, so as to indicate an initial quota request mode previously applied by the charging trigger device for a user service. The charging processing device performs charging processing on the user service based on the indication information, and delivers a charging processing result to the charging trigger device, to enable the charging trigger device to change a charging operation on the user service. In this way, by changing a cooperation relationship between the charging processing device and the charging trigger device, a balance between performance of the charging system and a credit control risk, or between an access delay and a credit control risk is implemented.

USER SERVICE PROCESSING METHOD, SYSTEM, AND RELATED DEVICE
20230045030 · 2023-02-09 ·

A user service processing method in a charging system is as follows: A charging trigger device provides initial quota application mode indication information for a charging processing device, so as to indicate an initial quota request mode previously applied by the charging trigger device for a user service. The charging processing device performs charging processing on the user service based on the indication information, and delivers a charging processing result to the charging trigger device, to enable the charging trigger device to change a charging operation on the user service. In this way, by changing a cooperation relationship between the charging processing device and the charging trigger device, a balance between performance of the charging system and a credit control risk, or between an access delay and a credit control risk is implemented.

SESSION RECOVERY FROM DEDICATED BEARER FAILURE

Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.

SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED CONTROL OF FIXED WIRELESS SERVICES

A device may create a list of identifiers for base stations that support a fixed wireless service for a user device. The device may receive a first identifier of a first base station associated with a first attach request of the user device. The device may enable the fixed wireless service for the first base station for the user device when the first identifier is included in the list of identifiers. The device may disable the fixed wireless service for the first base station for the user device when the first identifier is not included in the list of identifiers.

SIGNALING FOR EPHEMERIS INFORMATION

The present application relates to devices and components including apparatus, systems, and methods for ephemeris signaling in wireless networks.