H04W8/26

Method and apparatus for efficiently utilizing HARQ processes for semi-persistent and dynamic data transmissions

A method and apparatus are disclosed for efficient hybrid automatic repeat request (HARQ) process utilization for semi-persistent and dynamic data transmissions, wherein a reserved HARQ process identification (ID) can be reused. A subset of a plurality of HARQ process IDs is reserved to use for a semi-persistent allocation, and data is transmitted based on the semi-persistent allocation. A dynamic allocation is received via a physical downlink control channel (PDCCH). At least one of the reserved HARQ process IDs is selectively used for transmitting data based on the dynamic allocation.

Method and apparatus for efficiently utilizing HARQ processes for semi-persistent and dynamic data transmissions

A method and apparatus are disclosed for efficient hybrid automatic repeat request (HARQ) process utilization for semi-persistent and dynamic data transmissions, wherein a reserved HARQ process identification (ID) can be reused. A subset of a plurality of HARQ process IDs is reserved to use for a semi-persistent allocation, and data is transmitted based on the semi-persistent allocation. A dynamic allocation is received via a physical downlink control channel (PDCCH). At least one of the reserved HARQ process IDs is selectively used for transmitting data based on the dynamic allocation.

METHOD TO DYNAMICALLY SELECT A MOBILE OPERATOR SUBSCRIPTION BASED ON THE TERMINAL LOCATION, ON THE RECEIVED SIGNAL STRENGTHS AND ON BUSINESS AGREEMENTS, CORRESPONDING SECURE ELEMENT AND HOME SUBSCRIBER SERVER

Provided is a method for dynamically selecting a mobile subscription for a secure element cooperating with a terminal in a telecommunication system comprising a network visited by the terminal and a HSS of a server The method includes sending from the secure element a random e-IMSI ephemeral IMSI in a first attachment request message to the HSS through the visited network, the visited network having the best received signal and having a roaming agreement with an e-IMSI service provider; and transmitting 101 from the HSS to the secure element in a signaling message a PLMN list of all the local operators having a commercial agreement with the e-IMSI service provider.

METHOD TO DYNAMICALLY SELECT A MOBILE OPERATOR SUBSCRIPTION BASED ON THE TERMINAL LOCATION, ON THE RECEIVED SIGNAL STRENGTHS AND ON BUSINESS AGREEMENTS, CORRESPONDING SECURE ELEMENT AND HOME SUBSCRIBER SERVER

Provided is a method for dynamically selecting a mobile subscription for a secure element cooperating with a terminal in a telecommunication system comprising a network visited by the terminal and a HSS of a server The method includes sending from the secure element a random e-IMSI ephemeral IMSI in a first attachment request message to the HSS through the visited network, the visited network having the best received signal and having a roaming agreement with an e-IMSI service provider; and transmitting 101 from the HSS to the secure element in a signaling message a PLMN list of all the local operators having a commercial agreement with the e-IMSI service provider.

User equipment (UE) identification in a wireless communication network

In a wireless communication network, Unified Data Repositories (UDRs) determine initial User Equipment Identifiers (UE IDs). The UDRs successfully synchronize the initial UE IDs and serve the initial UE IDs to network elements that use the initial UE IDs to serve wireless data communications to UEs. The UDRs determine additional UE IDs. The UDRs unsuccessfully synchronize the additional UE IDs and serve the additional UE IDs to the network elements. In response to the unsuccessful synchronization of the additional UE IDs, a UDR recovery system reallocates the additional UE IDs. The UDR recovery system successfully synchronizes the reallocated-additional UE IDs. The network elements use the initial UE IDs and the reallocated-additional UE IDs to serve the wireless data communications.

User equipment (UE) identification in a wireless communication network

In a wireless communication network, Unified Data Repositories (UDRs) determine initial User Equipment Identifiers (UE IDs). The UDRs successfully synchronize the initial UE IDs and serve the initial UE IDs to network elements that use the initial UE IDs to serve wireless data communications to UEs. The UDRs determine additional UE IDs. The UDRs unsuccessfully synchronize the additional UE IDs and serve the additional UE IDs to the network elements. In response to the unsuccessful synchronization of the additional UE IDs, a UDR recovery system reallocates the additional UE IDs. The UDR recovery system successfully synchronizes the reallocated-additional UE IDs. The network elements use the initial UE IDs and the reallocated-additional UE IDs to serve the wireless data communications.

AUTO-UPDATE AND ACTIVATION OF LOCALE-SPECIFIC ESIM PROFILE FOR A GLOBAL ENTERPRISE USER

A method is performed at a server that manages embedded subscriber identity module (eSIM) profiles. The method includes, when a user equipment that belongs to a global enterprise network relocates from a first locale to a second locale in which a first private network and a second private network of the global enterprise network are located, wherein the user equipment includes a locale-specific first eSIM profile that includes a first non-public network identifier of the first private network, receiving, from the user equipment over a network in the second locale, information that indicates the user equipment is in the second locale. The method further includes identifying the second private network based on the information, and generating a locale-specific second eSIM profile that includes a second non-public network identifier for the second private network. The method includes configuring the user equipment with the locale-specific second eSIM profile.

Mitigating authentication-based hacking of access restricted telecommunication services

Systems and method are provided for mitigating hacking of restricted access telecommunication services. In response to an authentication response from a user device, an authentication failure type and authentication failure frequency may be determined. Based on the authentication failure type and authentication failure frequency, the user device is blocked from accessing the telecommunication service for a predetermined period of time, preventing the service from being congested by recurring unauthorized users.

Mitigating authentication-based hacking of access restricted telecommunication services

Systems and method are provided for mitigating hacking of restricted access telecommunication services. In response to an authentication response from a user device, an authentication failure type and authentication failure frequency may be determined. Based on the authentication failure type and authentication failure frequency, the user device is blocked from accessing the telecommunication service for a predetermined period of time, preventing the service from being congested by recurring unauthorized users.

Single Node Home Deployment with Local Breakout

In selected embodiments, on-premises equipment of a cellular network provides local breakout functionality so that user plane data packets (PDNs/PDUs) are routed between the home/enterprise network and the Internet directly, bypassing a cloud-based core of the cellular network. The UE's control traffic is still routed to/from the core. The core may be an Evolved Packet Core (EPC) in a 4G LTE network, or a 5G Core (5GC) in a 5G network. The UE's IP addresses may be assigned by the core, or locally, by the on-premises equipment. Providing the IP context from the on-premises network allows the UE to connect to local devices, e.g., printers, disc raids, gaming and streaming nodes, and other local devices. The local IP context also pushes the complexity of the EPC core deployment to the cloud while reducing the overhead of cloud processing that comes with user plane data processing.