Patent classifications
H04W12/80
INTERCEPTION OF HIGH-THROUGHPUT DATA TRAFFIC
Systems, devices, and techniques described herein relate to interception of data traffic that is traversing a network at a relatively high throughput rate. In some examples, a request to initiate interception is received from a server. In response to receiving the request to initiate interception, an instruction to forward user plane data to the server can be transmitted to a User Plane Function (UPF). The UPF may be transferring the user plane data in a data flow. The instruction may cause the UPF to forward the user plane data to the server in multiple streams. In addition, control plane data associated with the data flow can be transmitted to the server.
INTERCEPTION OF HIGH-THROUGHPUT DATA TRAFFIC
Systems, devices, and techniques described herein relate to interception of data traffic that is traversing a network at a relatively high throughput rate. In some examples, a request to initiate interception is received from a server. In response to receiving the request to initiate interception, an instruction to forward user plane data to the server can be transmitted to a User Plane Function (UPF). The UPF may be transferring the user plane data in a data flow. The instruction may cause the UPF to forward the user plane data to the server in multiple streams. In addition, control plane data associated with the data flow can be transmitted to the server.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR 5G USER EQUIPMENT (UE) HISTORICAL MOBILITY TRACKING AND SECURITY SCREENING USING MOBILITY PATTERNS
A method for historical 5G user equipment (UE) mobility tracking and security screening includes receiving, at a network data aggregation node including at least one processor, UE registration data from 5G network functions (NFs) as UEs connect to different network locations. The method further includes aggregating, at the network node, registration data for individual UEs from the 5G NFs to produce mobility patterns for the UEs. The method further includes receiving, at the network node and from a 5G NF located in a home network of a UE, a request for a mobility pattern of the UE in response to receiving a message for effecting a new registration for the UE. The method further includes responding to the request by transmitting the mobility pattern to the 5G NF located in the home network of the UE.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
METHOD AND SYSTEM FOR VEHICLE LOCATION TRACKING USING V2X COMMUNICATION
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
SYSTEMS AND METHODS FOR ASSOCIATING SUPI AND SUCI IN 5G NETWORKS
Systems and methods for detecting a subscriber permanent identifier (SUPI) from a subscriber concealed identifier (SUCI) include steps of receiving the SUCI that is a representative of user equipment (UE) of interest and that is encrypted; checking association data with the received SUCI to determine a corresponding SUPI, wherein the association data includes a mapping of a plurality of SUCIs to a plurality of SUPIs and is maintained over time based on monitoring messages in a 5G core network; and providing the corresponding SUPI. The steps can further include updating the association data based on monitoring exchanges on both sides of an access and mobility management function (AMF) associated with the 5G core network.
SYSTEMS AND METHODS FOR ASSOCIATING SUPI AND SUCI IN 5G NETWORKS
Systems and methods for detecting a subscriber permanent identifier (SUPI) from a subscriber concealed identifier (SUCI) include steps of receiving the SUCI that is a representative of user equipment (UE) of interest and that is encrypted; checking association data with the received SUCI to determine a corresponding SUPI, wherein the association data includes a mapping of a plurality of SUCIs to a plurality of SUPIs and is maintained over time based on monitoring messages in a 5G core network; and providing the corresponding SUPI. The steps can further include updating the association data based on monitoring exchanges on both sides of an access and mobility management function (AMF) associated with the 5G core network.
FACILITATION OF SMART COMMUNICATIONS HUB TO SUPPORT UNMANNED AIRCRAFT FOR 5G OR OTHER NEXT GENERATION NETWORK
Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.
FACILITATION OF SMART COMMUNICATIONS HUB TO SUPPORT UNMANNED AIRCRAFT FOR 5G OR OTHER NEXT GENERATION NETWORK
Unmanned aircraft systems (UASs) can be supported by a smart communications hub. Network slices can be utilized to provide services to a UAS that has provided its remote identification number to a network node. After the UAS has been authenticated, by an authentication network slice, based on policies hosted at a service capabilities exposure function (SCEF), the UAS can utilize services provided by other network slices. Additionally, or alternatively, a user equipment associated with the UAS can be provided with suggested services hosted on other slices to which the UAS has not been previously subscribed.
Control mechanism for supporting services in mobile edge computing environment
An apparatus for use by a mobile edge control element or function, the apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to participate in a mobile edge computing based communication of at least one communication element in a communication network, to prepare and send a special data packet to a core network control element or function, wherein the special data packet includes, as a packet source indication, an address information of the at least one communication element and, as a packet destination indication, an address information of the mobile edge control element or function, to receive and process an enriched data packet being based on the special data packet, the enriched data packet including subscriber related identification data for the at least one communication element, to collect the subscriber related identification data from the enriched data packet, and to conduct a communication related processing related to the at least one communication element using the collected subscriber related identification data.