H04W80/04

Configuration of liveness check using internet key exchange messages

There is provided mechanisms for configuration of liveness check using Internet key exchange messages. A method is performed by a user equipment. The method comprises transmitting, to a core network node, a first Internet key exchange message comprising a configuration attribute indicating support of receiving a timeout period for liveness check. The method comprises receiving, from the core network node, a second Internet key exchange message comprising a configuration attribute indicating a timeout period for said liveness check.

NAICS signaling for advanced LTE features

A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a user equipment that receives interference cancellation information from a base station. Various aspects are described for employing interference cancellation information perform interference suppression in the presence of interference associated with different component carriers when employing carrier aggregation, small cell discovery signals, variations in data channel transmissions associated with certain transmission modes, and higher order QAM rates.

DEVICE MOBILITY WITH COAP
20170302745 · 2017-10-19 ·

A method performed in a network connected endpoint device having a first address as its current address. The method comprises receiving Constrained Application Protocol (CoAP) signalling from a network server. The received signalling comprises an Observe request for an information resource of the endpoint device. The resource comprises the current address of the endpoint device stored therein. The method also comprises, in accordance with the received signalling comprising the Observe request, sending CoAP signalling to the network server. The sent signalling comprises information about the current address of the endpoint device stored in the resource. The technique also relates to a method of the network server as well as to the endpoint device and the network server.

USER EQUIPMENT

Techniques are disclosed for avoiding reduction in throughput due to redundant transmission of downlink packets when a split bearer is deleted. A user equipment includes a transmission and reception unit to communicate with a master base station and a secondary base station simultaneously in dual connectivity; an RLC (Radio Link Control) layer processing unit configured to have an RLC layer for the master base station and an RLC layer for the secondary base station; and a PDCP (Packet Data Convergence Protocol) layer processing unit configured to have a PDCP layer transmitting and receiving data to/from the RLC layer for the master base station and the RLC layer for the secondary base station. When the split bearer configured for the secondary base station is deleted, the RLC layer processing unit performs re-establishment on the RLC layer for the secondary base station and releases the split bearer after execution of the re-establishment.

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11258595 · 2022-02-22 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11258595 · 2022-02-22 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

BLOCKING UNDESIRABLE COMMUNICATIONS IN VOICE OVER INTERNET PROTOCOL SYSTEMS
20170303126 · 2017-10-19 · ·

Blocking of undesirable voice over internet protocol (VOIP) communications is disclosed. A communication screening service initiates operations to block a threat posed by a VOIP communication upon receiving the communication from a gateway server. The communication may include an audio/video conversation and/or an audio/video conference. Next, metadata and content of the communication is analyzed to detect a threat, such as a scamming scheme and/or a phishing scheme, from a sender of the communication. A rejection of the communication is generated to disrupt the threat associated with the communication. The rejection is transmitted to the gateway server to prompt the gateway server to block the communication.

SYSTEMS AND METHODS FOR GEOFENCE SECURITY
20170303082 · 2017-10-19 · ·

Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.

Management of seamless handover between different communication systems in an IP dual-mode terminal

A dual-mode terminal designed to connect to an IP-based network via a first communication system and a second communication system, the dual-mode terminal including a first physical network interface module adapted to establish a packet-based communication with the IP-based network via the first communication system, the first physical network interface module being accessible via a first physical network interface having a first physical network address; a second physical network interface module adapted to establish a packet-based communication with the IP-based network via the second communication system, the second physical network interface module being accessible via a second physical network interface having a second physical network address; an IP-based protocol stack adapted to operate between a software application in the dual-mode terminal and the first and second physical network interface modules; and a system for performing a seamless handover between the first communication system and the second communication system during a connection to the IP-based network.

Communication method and communications apparatus

A communication method and a communications apparatus, where the method includes: assigning, by a control plane device, an Internet Protocol (IP) address to a user equipment; obtaining, by the control plane device using a routing policy network element, a routing rule corresponding to the IP address; and sending, by the control plane device, the routing rule and the IP address to the user equipment, where the routing rule is used by the user equipment to determine a source IP address when the user equipment initiates a service.