H04W12/02

Method and device for authenticating UE

The present invention provides a method of how the serving base station notifies UE of the encryption information used in the re-establishment process, how the serving base station finds the UE context information and authenticates the UE, in the 5G architecture. By means of the method of the present invention, the message between the RRC message and the base station can be optimized, the UE is correctly authenticated, and the re-establishment failure is avoided.

Method and system for providing communication analysis of user equipment based on network data analysis

A method and system for providing communication analysis of the user equipment (UE) based on network analysis is disclosed. The method provides communication analysis of the UE in a form as UE communication statistics or UE communication prediction by analyzing network data collected from the network function (NF) device.

Method and system for providing communication analysis of user equipment based on network data analysis

A method and system for providing communication analysis of the user equipment (UE) based on network analysis is disclosed. The method provides communication analysis of the UE in a form as UE communication statistics or UE communication prediction by analyzing network data collected from the network function (NF) device.

Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.

Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks

Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.

Method and apparatus for transmitting a signal in a wireless communication system
11696285 · 2023-07-04 · ·

The present disclosure may provide a for receiving, by a terminal, a signal in a wireless communication system. Herein, the method for receiving, by the terminal, the signal may include: receiving common message configuration information and private message configuration information from a base station; receiving a signal including a common message and a private message from the base station; decoding the common message based on the common message configuration information; restoring a frequency signal by using the decoded common message; subtracting the restored frequency signal of the common message from the received signal; and decoding the private message.

Message processing for subscriber sessions which stretch over different network domains

A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.

Message processing for subscriber sessions which stretch over different network domains

A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.

TRACKING DEVICE LOCATION AND COORDINATION

Communication between an owner of a lost tracking device and a finder of a lost tracking device is established. A tracking system receives an identifier of a tracking device and a request for a web page from a mobile device that has captured an image of a smart code on the tracking device. The smart code is embedded with a URL to the web page. The system displays the web page on the mobile device and prompts the user to provide a location of the mobile device. The location is associated with the identifier of the tracking device. A notification indicating the location of the tracking device is generated for the owner. The owner is prompted to provide information to establish contact with the finder of the device, and the web page is populated with the owner's provided information for display on the finder's mobile device.

TRACKING DEVICE LOCATION AND COORDINATION

Communication between an owner of a lost tracking device and a finder of a lost tracking device is established. A tracking system receives an identifier of a tracking device and a request for a web page from a mobile device that has captured an image of a smart code on the tracking device. The smart code is embedded with a URL to the web page. The system displays the web page on the mobile device and prompts the user to provide a location of the mobile device. The location is associated with the identifier of the tracking device. A notification indicating the location of the tracking device is generated for the owner. The owner is prompted to provide information to establish contact with the finder of the device, and the web page is populated with the owner's provided information for display on the finder's mobile device.