Patent classifications
H04W12/80
COMPLIANCE WITH LAWFUL INTERCEPT REGULATIONS FOR ROAMING MOBILE DEVICES
The disclosed technology is directed towards a mobile device/user equipment taking action to comply with the lawful intercept regulations of a different country when roaming in that country. The mobile device maintains a lawful intercept dataset, e.g., in its universal integrated circuit card (UICC), in which the dataset contains mobile country codes (MCCs) of countries that have data communications encryption regulations. When a roaming mobile country code observed by the user equipment matches a roaming mobile country code in the lawful intercept dataset, the mobile device signals its home network with a message indicating that the user equipment is connected to a roaming network in a country that has a data communications encryption regulation. Full or partial encryption regulations can be signaled from the mobile device.
COMPLIANCE WITH LAWFUL INTERCEPT REGULATIONS FOR ROAMING MOBILE DEVICES
The disclosed technology is directed towards a mobile device/user equipment taking action to comply with the lawful intercept regulations of a different country when roaming in that country. The mobile device maintains a lawful intercept dataset, e.g., in its universal integrated circuit card (UICC), in which the dataset contains mobile country codes (MCCs) of countries that have data communications encryption regulations. When a roaming mobile country code observed by the user equipment matches a roaming mobile country code in the lawful intercept dataset, the mobile device signals its home network with a message indicating that the user equipment is connected to a roaming network in a country that has a data communications encryption regulation. Full or partial encryption regulations can be signaled from the mobile device.
Managing An Unmanned Aerial Vehicle Identity
In embodiments of systems and methods for managing an unmanned aerial vehicle (UAV) identity, a processor of a network computing device may generate an anonymity token that is associated with a digital certificate of a UAV, provide the anonymity token to the UAV for use in operations, receive a request to authenticate the UAV, wherein the request includes the anonymity token, determine whether the anonymity token included in the request is associated with the digital certificate, and send an indication that the UAV is authenticated responsive to the request in response to determining that the anonymity token included in the request is associated with the digital certificate.
Wireless event correlation using anonymous data
In one embodiment, a method includes: transmitting a message to a first end point that includes an instruction to initiate a communication type, wherein the communication type includes sharing a randomization token between the first and second end points; obtaining a first communication report from the first end point and a second communication report from the second end point in response to initialization of a communication based on the communication type between the first end point and the second end point across the network, wherein the first and second communication reports respectively include a first and second hash that corresponds to a function of the randomization token and identity information; determining whether the first hash matches the second hash; generating a value that correlates the first and second end points with the communication across the network in response to determining that the first hash matches the second hash.
GATEWAY SELECTION FOR PRIVATE WIRELESS NETWORKS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may determine whether a geographic location code associated with a geographic location of the UE matches a geographic location code in a received message. Based on the determination, the UE may select a non-public network (NPN) function. Additionally or alternatively, a UE may discover or select an NPN function based on determining that legal requirements, such as one or more interception conditions, are independent of the geographic location of the UE. For example, the UE may discover and one or more NPN functions according to a query performed using an NPN function identifier or an NPN identifier. The UE may determine that the NPN function selection (e.g., for a geographic location of the UE) is independent of an interception condition (e.g., associated with the geographic location of the UE).
GATEWAY SELECTION FOR PRIVATE WIRELESS NETWORKS
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may determine whether a geographic location code associated with a geographic location of the UE matches a geographic location code in a received message. Based on the determination, the UE may select a non-public network (NPN) function. Additionally or alternatively, a UE may discover or select an NPN function based on determining that legal requirements, such as one or more interception conditions, are independent of the geographic location of the UE. For example, the UE may discover and one or more NPN functions according to a query performed using an NPN function identifier or an NPN identifier. The UE may determine that the NPN function selection (e.g., for a geographic location of the UE) is independent of an interception condition (e.g., associated with the geographic location of the UE).
Cleaning up hanging lawful interception resources from a triggered point of interception when a triggering function fails
A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
Cleaning up hanging lawful interception resources from a triggered point of interception when a triggering function fails
A system that enables hanging lawful interception (LI) resources to be cleaned up includes a triggering function set comprising a plurality of triggering functions. The system also includes a data store comprising a plurality of auditing records corresponding to the plurality of triggering functions in the triggering function set. Each auditing record comprises a claimant attribute. Each triggering function sends an update request to the data store in response to being notified about a failed triggering function within the triggering function set. Each update request comprises a request to change ownership of the auditing record corresponding to the failed triggering function. A triggering function is selected as a new owner of the auditing record corresponding to the failed triggering function based at least in part on a match between the claimant attribute in the auditing record and a claimant field in the update request sent by the triggering function.
Enrichment of monitoring user plane data using PFCP monitoring
An illustrative embodiment disclosed herein is a non-transitory computer readable medium. In some embodiments, the medium includes instructions for providing a mobile user monitoring solution that, when executed by a processor, cause the processor to capture a first message transmitted over a packet forwarding control protocol (PFCP) interface, extract a permanent ID and a first user plane tunnel endpoint identifier (TEID) from the first message, store the permanent ID and the first user plane TEID in a PFCP protocol data unit (PDU) session record, store the permanent ID in a session details record, capture a second message transmitted over a user plane interface after the first message is transmitted, extract a second user plane TEID from the second message, wherein the second user plane TEID matches the first user plane TEID, and retrieve the session details record using the second user plane TEID.
Wireless communication network to serve a user equipment (UE) over a user plane function group (UPFG)
A wireless communication network serves a User Equipment (UE) over multiple User Plane Function Groups (UPFGs). In the wireless communication network, a Session Management Function (SMF) receives UPFG performance metrics from the wireless communication network. The SMF identifies a Packet Data Flow Group (PDFG) for the UE. The SMF responsively selects one of the UPFGs for the PDFG based on the UPFG performance metrics. The selected UPFG comprises at least three User Plane Functions (UPFs) and the PDFG comprises at least two Packet Data Flows (PDFs). The SMF transfers network signaling to the selected UPFG to deliver the PDFG to the UE. The selected UPFG receives the network signaling and responsively exchanges user data for the UE to deliver the PDFG.