Patent classifications
H04W8/02
Location registration for a device-to-device (D2D) user equipment
The invention relates to device-to-device (D2D) communications an in particular to location registration of a D2D User Equipment (UE) being in idle mode. A D2D capable UE (D2D cluster head) is [1] configured to communicate with a communication network, is [2] able to establish D2D communication with another D2D capable UE, receives [3] from the communication system a configuration so as to send location update related messaging on behalf of UEs with which D2D communications has been established, obtains [4] information of a change of status of a UE regarding a D2D communication or a change of cell of a UE and in response to the information, causes [5] the sending of a message to the communication network, the message comprising a location update request regarding the UE.
Location registration for a device-to-device (D2D) user equipment
The invention relates to device-to-device (D2D) communications an in particular to location registration of a D2D User Equipment (UE) being in idle mode. A D2D capable UE (D2D cluster head) is [1] configured to communicate with a communication network, is [2] able to establish D2D communication with another D2D capable UE, receives [3] from the communication system a configuration so as to send location update related messaging on behalf of UEs with which D2D communications has been established, obtains [4] information of a change of status of a UE regarding a D2D communication or a change of cell of a UE and in response to the information, causes [5] the sending of a message to the communication network, the message comprising a location update request regarding the UE.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MITIGATING LOCATION TRACKING AND DENIAL OF SERVICE (DoS) ATTACKS THAT UTILIZE ACCESS AND MOBILITY MANAGEMENT FUNCTION (AMF) LOCATION SERVICE
A method for mitigating location tracking and DoS attacks that utilize an AMF location service includes receiving, at an NF, an authentication response message from an HPLMN of a UE. The method further includes extracting, by the NF and from the authentication response message, a subscription identifier and an indicator of an authentication result for the UE. The method further includes storing, by the NF and in an AMF location service validation database, the subscription identifier and the indicator of the authentication result for the UE. The method further includes receiving, by the NF, an AMF location service message and using at least one of a subscription identifier extracted from the AMF location service message and contents of the AMF location service validation database, to classify the AMF location service message as a location tracking or DoS attack. The method further includes preventing the location tracking or DoS attack.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MITIGATING LOCATION TRACKING AND DENIAL OF SERVICE (DoS) ATTACKS THAT UTILIZE ACCESS AND MOBILITY MANAGEMENT FUNCTION (AMF) LOCATION SERVICE
A method for mitigating location tracking and DoS attacks that utilize an AMF location service includes receiving, at an NF, an authentication response message from an HPLMN of a UE. The method further includes extracting, by the NF and from the authentication response message, a subscription identifier and an indicator of an authentication result for the UE. The method further includes storing, by the NF and in an AMF location service validation database, the subscription identifier and the indicator of the authentication result for the UE. The method further includes receiving, by the NF, an AMF location service message and using at least one of a subscription identifier extracted from the AMF location service message and contents of the AMF location service validation database, to classify the AMF location service message as a location tracking or DoS attack. The method further includes preventing the location tracking or DoS attack.
Method and device for supporting MTC trigger of serving node in wireless communication system
One embodiment of the present invention discloses a method for allowing a serving node to support a trigger request of a machine type communication-interworking function (MTC-IWF) in a wireless communication system, and the method for supporting the trigger request comprises the steps of: receiving, from a terminal, capability information which contains information on trigger transmission; and determining whether to transmit the information on the trigger transmission to a home subscriber server (HSS)/home location register (HLR), based on the information related to the terminal, which contains the capability information, and information related to the serving node, wherein the information on the trigger transmission contains information indicating whether the terminal supports a trigger request through the MTC-IWF and the serving node.
Enhanced registration messages in internet protocol multimedia subsystems
An enhanced Session Initiation Protocol (“SIP”) registration message having extended header information that is used by an Internet Protocol Multimedia Subsystem (“IMS”) core to determine the registration status of a mobile device and the physical location of the mobile device. The extended header information includes hardware and subscriber identifiers, such as an International Mobile Equipment Identity (“IMEI”) and International Mobile Subscriber Identity (“IMSI”). The IMS core queries an equipment identity register to validate IMEI/IMSI identifiers in the header to determine whether to deny registration to a mobile device. The IMS core also queries a capability database using an IMEI to determine which location determination techniques are supported by or suitable for the associated mobile device.
Enhanced registration messages in internet protocol multimedia subsystems
An enhanced Session Initiation Protocol (“SIP”) registration message having extended header information that is used by an Internet Protocol Multimedia Subsystem (“IMS”) core to determine the registration status of a mobile device and the physical location of the mobile device. The extended header information includes hardware and subscriber identifiers, such as an International Mobile Equipment Identity (“IMEI”) and International Mobile Subscriber Identity (“IMSI”). The IMS core queries an equipment identity register to validate IMEI/IMSI identifiers in the header to determine whether to deny registration to a mobile device. The IMS core also queries a capability database using an IMEI to determine which location determination techniques are supported by or suitable for the associated mobile device.
Mobility management method, user equipment, and base station
A mobility management method, user equipment, and a network device are provided. The mobility management method includes: receiving, by user equipment UE in a connected state, a handover-free UE identifier from a network device, where the handover-free UE identifier is used to uniquely identify the UE in a handover-free state in a handover-free area, and the handover-free area includes at least two cells; entering, by the UE, the handover-free state after meeting an activation condition, where in the handover-free state, the UE stores the handover-free UE identifier and a connection context that is of the UE in the connected state, and the UE does not execute a handover procedure when the UE moves in the handover-free area; sending, by the UE, the handover-free UE identifier to the network device after the UE determines that a deactivation condition is met.
Secondary cell activation delay indication
Methods and apparatus, including computer program products, are provided for secondary cells configured for carrier aggregation. In one aspect there is provided a method. The method may include receiving, at a user equipment, an indication from a network to activate a secondary cell configured for carrier aggregation, the indication comprising at least one of a secondary cell activation command or a secondary cell configuration; and sending, by the user equipment, at least one of a secondary cell activation time or a secondary cell activation delay to the network. Related apparatus, systems, methods, and articles are also described.
Secondary cell activation delay indication
Methods and apparatus, including computer program products, are provided for secondary cells configured for carrier aggregation. In one aspect there is provided a method. The method may include receiving, at a user equipment, an indication from a network to activate a secondary cell configured for carrier aggregation, the indication comprising at least one of a secondary cell activation command or a secondary cell configuration; and sending, by the user equipment, at least one of a secondary cell activation time or a secondary cell activation delay to the network. Related apparatus, systems, methods, and articles are also described.