Patent classifications
H04W60/04
METHOD AND SYSTEM FOR BINDING INFORMATION SERVICE
A method, a system, and a non-transitory storage medium are described in which an binding information service is provided. The binding information service may include applying one or multiple criteria to binding information stored by a binding service function. The binding information service may identify candidate binding information instances that may need deletion based on the one or multiple criteria. The binding information service may interrogate a policy control network device as to the current registrability of the binding information. The binding information service may delete or maintain the binding information based on a result of the interrogation. The binding information service may also include directing the binding service function to delete binding information based on one or multiple criteria. The one or multiple criteria may relate to the age of the binding information or a last time the registrability of the binding information was confirmed.
METHOD AND SYSTEM FOR BINDING INFORMATION SERVICE
A method, a system, and a non-transitory storage medium are described in which an binding information service is provided. The binding information service may include applying one or multiple criteria to binding information stored by a binding service function. The binding information service may identify candidate binding information instances that may need deletion based on the one or multiple criteria. The binding information service may interrogate a policy control network device as to the current registrability of the binding information. The binding information service may delete or maintain the binding information based on a result of the interrogation. The binding information service may also include directing the binding service function to delete binding information based on one or multiple criteria. The one or multiple criteria may relate to the age of the binding information or a last time the registrability of the binding information was confirmed.
Network repository function (NRF) discovery control
Controlling Network Repository Function (NRF) during discovery within a Fifth Generation (5G) network is described. In an example, the NRF can receive, from a Network Function (NF) consumer associated with the 5G network, a request for information associated with a NF producer type. The NRF can receive, from one or more NF producers associated with the NF producer type, indications of the NF producers and the NRF can generate a list of NF producers based at least in part on the indications. The NRF can select, based at least in part on a configurable parameter, a subset of the list of NF producers and send, responsive to receiving the request, the subset of the list of NF producers to the NF consumer.
Systems and methods for determining a user equipment battery level
An application function (AF) device may identify a user equipment (UE) and may send, to a network exposure function (NEF) device, a battery level request message concerning a battery of the UE. The AF device may obtain, from the NEF device, based on sending the battery level request message, a battery level report, and may cause, based on the battery level report, at least one action to be performed.
Techniques to facilitate fast roaming between a mobile network operator public wireless wide area access network and an enterprise private wireless wide area access network
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Techniques to facilitate fast roaming between a mobile network operator public wireless wide area access network and an enterprise private wireless wide area access network
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
TERMINAL DEVICE, MANAGEMENT DEVICE, AND COMMUNICATION METHOD
A terminal device (40) includes a control unit (45). The control unit (45) acquires service information about one or more services provided via a base station apparatus (20). The control unit (45) selects at least one service desired to be used, from among one or more services. The control unit (45) transmits a registration request message including the service selected, to a management device (10A) managing mobility of the terminal device (40) via the base station apparatus (20). The control unit (45) receives, for each service included in the registration request message, reference information about an operating environment of the terminal device (40) requested upon using the service.
ACCESS CONTROL METHOD AND COMMUNICATIONS DEVICE
An access control method and a communications device are provided. The method includes: sending first information and/or first indication information to a first target end, where the first information includes at least one of the following: index information of a second authentication server, vendor-related information of the first communications device, and address-related information of the second authentication server; and the first indication information is used for requesting to obtain a credential related to a first network, or used to indicate that an access type is a restricted service.
SYSTEM AND METHOD FOR OPTIMIZING PDN SYNCHRONIZATION BETWEEN USER EQUIPMENT AND NETWORK
The disclosure provides methods and system for optimizing PDN synchronization between a user equipment and a network. The method comprises processing, by a user equipment, a deactivate request based on a stored set of parameters. The method further encompasses transmitting, from the user equipment to the network entity, a deactivate accept based on said processing, wherein said transmission of deactivate accept enables said network entity to deactivate a connectivity between the user equipment and the network entity to synchronize the user equipment with said network entity.
COMMUNICATION SYSTEM, METHOD, AND APPARATUS
This application provides a communication system, method, and apparatus. The system is applied to implement AKMA service-based data transmission between a terminal device and an application function network element, and the system includes an AKMA anchor function network element and a network exposure function network element. The network exposure function network element obtains first identification information from a unified data management network element, where the first identification information is used to determine an authentication server function network element corresponding to the terminal device, and sends the first identification information to the AKMA anchor function network element. The AKMA anchor function network element obtains, from the unified data management network element based on the first identification information, identification information of the authentication server function network element corresponding to the terminal device.