H04W80/04

Use Of Ip Networks For Routing Of Cellular Data Packets
20220345984 · 2022-10-27 ·

A cellular data communication network includes a gNodeB connected to a UPF by an IP network. A first translation module translates GFP packets into IP packets transmitted over the IP network. A second translation module translates the IP packets back into IP packets and forwards the IP packets to the UPF. A PFCP proxy snoops information and provides it to a BGP module that programs the translation modules and a routing module to perform routing of packets in bypass of the UPF. The BGP module may program the first translation module with an SR policy associated with a binding SID that is bound to an interface to the gNodeB. The SR policy may invoke translation according to a function. The routing module may be programmed to embed GTP information in an SRH header that is used by the first translation module. BGP module may also distribute routing and VPN updates.

Systems and methods for defining and implementing rules for three dimensional geofences
11483671 · 2022-10-25 · ·

The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an unmanned aerial vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.

Method of executing a service for a service consumer, as well as a corresponding network node and a computer program product

A method of executing a service for a service consumer, said service consumer being registered in a home telecommunication network and currently residing in a visited telecommunication network, said method comprising the steps of retrieving a list of available services within the home telecommunication network that said service consumer is allowed to access, wherein said SDVN function and said home NRF both reside in said home telecommunication network, receiving a service operation message requesting an operation execution within a particular service for said service consumer in said visited telecommunication network, determining that said home network is able to provide for said requested particular service based on said retrieved list of available service, and selecting one or more service instances for executing said operation within said particular service for said service consumer.

Method of executing a service for a service consumer, as well as a corresponding network node and a computer program product

A method of executing a service for a service consumer, said service consumer being registered in a home telecommunication network and currently residing in a visited telecommunication network, said method comprising the steps of retrieving a list of available services within the home telecommunication network that said service consumer is allowed to access, wherein said SDVN function and said home NRF both reside in said home telecommunication network, receiving a service operation message requesting an operation execution within a particular service for said service consumer in said visited telecommunication network, determining that said home network is able to provide for said requested particular service based on said retrieved list of available service, and selecting one or more service instances for executing said operation within said particular service for said service consumer.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11606204 · 2023-03-14 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11606204 · 2023-03-14 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

Home agent discovery upon changing the mobility management scheme

The invention relates to a method for discovering a home agent serving a mobile node upon the mobile node changing its mobility management scheme in a packet-switched network and the implementation of such method in a mobile node or home agent. In order to propose a home agent discover scheme that maintains session continuity in a seamless manner upon a mobile node changing its mobility management scheme, a mobile node comprises information on its location prior to changing the mobility management scheme to one of the first signaling messages transmitted upon changing the mobility management scheme (home agent discovery message). The receiving node uses this information to identify the home agent serving the mobile node or to provide a hint to the home agent where the mobile node is registered in a response message to the mobile node.

Home agent discovery upon changing the mobility management scheme

The invention relates to a method for discovering a home agent serving a mobile node upon the mobile node changing its mobility management scheme in a packet-switched network and the implementation of such method in a mobile node or home agent. In order to propose a home agent discover scheme that maintains session continuity in a seamless manner upon a mobile node changing its mobility management scheme, a mobile node comprises information on its location prior to changing the mobility management scheme to one of the first signaling messages transmitted upon changing the mobility management scheme (home agent discovery message). The receiving node uses this information to identify the home agent serving the mobile node or to provide a hint to the home agent where the mobile node is registered in a response message to the mobile node.

Vehicle-to-X communication in the USA and Europe using a standard transmitter

A method for supplying data which can be received by a vehicle in a vehicular ad-hoc network, in which the data is transmitted between subscribers to the vehicular ad-hoc network using a location-based communications protocol, involves: identifying a geographical location area of the vehicle; selecting a suitable communications protocol (for the identified location area; and receiving the data using the selected communications protocol in such a way that the received data is available to at least one network layer of the communications protocol.

Vehicle-to-X communication in the USA and Europe using a standard transmitter

A method for supplying data which can be received by a vehicle in a vehicular ad-hoc network, in which the data is transmitted between subscribers to the vehicular ad-hoc network using a location-based communications protocol, involves: identifying a geographical location area of the vehicle; selecting a suitable communications protocol (for the identified location area; and receiving the data using the selected communications protocol in such a way that the received data is available to at least one network layer of the communications protocol.