Patent classifications
H04W12/80
Service processing method and apparatus
The present invention discloses a service processing method and apparatus, and relates to the communications field. The method includes: receiving trigger information sent by an intermediary device; and assisting, based on the trigger information, the intermediary device in negotiating with UE and a network server, to enable the intermediary device to obtain a first key, where the first key is used by the intermediary device to decrypt ciphertexts sent by the UE and the network server, the ciphertext is obtained after the UE or the network server encrypts service information by using a second key, and the first key is corresponding to the second key. The present invention resolves a problem that an intermediary device cannot provide service optimization for user equipment and a network server because the intermediary device cannot decrypt ciphertext, and achieves an effect of expanding a usage scope of service optimization.
Method For Providing An Authenticated Digital Identity
A method for verifying and validating identifiable attributes of a user includes electronically receiving the attributes of a user and verifying their authenticity. The attributes are also validated by confirming each matches a corresponding evidenced based attribute. An internal identifier is assigned to each of the validated attributes and an external identifier is assigned to those attributes that were not validated. Access to the identifiable attributes having an internal identifier is only permitted by the user or a designee of the user. A level of confidence is established from a ranking of the attributes where the attributes having the internal identifiers provide a greater level of confidence than the attributes having the external identifiers. An authenticated digital identity is then formed from the identifiable attributes, and a level of confidence for the authenticated digital identity is established from the ranking.
STAND ALONE SOLUTION FOR LOCATION OF A CELLULAR PHONE
A method for locating of a wireless device, performed by a third party, comprising: communicating with the wireless device in a silent call, to compel the wireless device to continuously emit signals; activating a monitoring apparatus to monitor the signals emitted from the wireless device; resetting an idling timer means of the wireless device, such that the silent call is not ended by the wireless device; identifying a relative location from which the signals become stronger and locating the wireless device; and terminating the silent call.
STAND ALONE SOLUTION FOR LOCATION OF A CELLULAR PHONE
A method for locating of a wireless device, performed by a third party, comprising: communicating with the wireless device in a silent call, to compel the wireless device to continuously emit signals; activating a monitoring apparatus to monitor the signals emitted from the wireless device; resetting an idling timer means of the wireless device, such that the silent call is not ended by the wireless device; identifying a relative location from which the signals become stronger and locating the wireless device; and terminating the silent call.
METHOD FOR SUPPORTING LAWFUL INTERCEPTION OF REMOTE PROSE UE IN NETWORK
The disclosure relates to a communication technique for converging, with an IoT technology, a 5G communication system for supporting a higher data transmission rate than a 4G system, and a system therefor. The disclosure may be applied to intelligent services, such as smart homes, smart buildings, smart cities, smart cars or connected cars, health care, digital education, retail businesses, and security and safety related services, on the basis of 5G communications technologies and IoT-related technologies. A method for operating relay UE in a mobile communication system includes transmitting, to a network node connected to the relay UE, a remote UE report message including remote UE information about a remote UE accessing a network via the relay UE, wherein the remote UE information includes IP address information allocated to the remote UE; starting a timer upon transmitting the remote UE report message to the network node; receiving, from the network node, a response message in reply to the remote UE report message; and stopping the timer upon receipt of the response message from the network node. the IP address information includes an IP address and port information of the remote UE in case that IPv4 is used as an address type.
METHOD FOR SUPPORTING LAWFUL INTERCEPTION OF REMOTE PROSE UE IN NETWORK
The disclosure relates to a communication technique for converging, with an IoT technology, a 5G communication system for supporting a higher data transmission rate than a 4G system, and a system therefor. The disclosure may be applied to intelligent services, such as smart homes, smart buildings, smart cities, smart cars or connected cars, health care, digital education, retail businesses, and security and safety related services, on the basis of 5G communications technologies and IoT-related technologies. A method for operating relay UE in a mobile communication system includes transmitting, to a network node connected to the relay UE, a remote UE report message including remote UE information about a remote UE accessing a network via the relay UE, wherein the remote UE information includes IP address information allocated to the remote UE; starting a timer upon transmitting the remote UE report message to the network node; receiving, from the network node, a response message in reply to the remote UE report message; and stopping the timer upon receipt of the response message from the network node. the IP address information includes an IP address and port information of the remote UE in case that IPv4 is used as an address type.
SYSTEMS AND METHODS FOR MOBILE NETWORK INTERFERENCE ANALYSIS
Systems and methods for providing information describing mobile network interference experienced by a mobile network.
SYSTEMS AND METHODS FOR MOBILE NETWORK INTERFERENCE ANALYSIS
Systems and methods for providing information describing mobile network interference experienced by a mobile network.
Method and system for vehicle location tracking using V2X communication
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.
Method and system for vehicle location tracking using V2X communication
A method at a network element within a Vehicle to Everything (V2X) Communications Domain, the method including receiving a tracking request at the network element for a target vehicle, the tracking request including identifying information for the target vehicle; creating a target vehicle list based on the tracking request; distributing the target vehicle list to at least one V2X endpoint; receiving at least one sighting report from the at least one V2X endpoint; and forwarding the at least one sighting report to a second network element.