Patent classifications
H04L61/4588
METHODS AND SYSTEMS FOR SELECTING A USER PLANE FUNCTION IN A WIRELESS COMMUNICATION NETWORK
A method for selecting a user plane function when a user equipment (UE) attaches to a wireless communication network may include determining a data throughput limit associated with the UE, identifying a first user plane function having a first data throughput capacity, and identifying a second user plane function having a second data throughput capacity, wherein the first throughput capacity is higher than the second throughput capacity. The method may further include selecting the first user plane function if the data throughput limit of the UE is above a predetermined threshold, selecting the second user plane function if the data throughput limit of the UE is below the predetermined threshold, and sending a session request to the selected first or second user plane function.
Caller identifier
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server, a request to initiate a telephone call between a calling phone and a callee phone, wherein the request includes a telephone number of the calling phone. The actions further include determining, by the server, a name that corresponds to the telephone number. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include, based on the calling history that indicates previous telephone calls of the phone number, determining, by the server, whether to generate a notification that includes the name that corresponds to the telephone number.
METHOD AND SYSTEM FOR PROVIDING LOW BANDWIDTH AND HIGH BANDWIDTH COMMUNICATIONS SERVICES USING DIFFERENT USER EQUIPMENT PROFILES
A network platform manages the provisioning of a UE with a dominant identity profile and a recessive identity profile. The dominant profile is associated with a user's existing wireless data plan and the recessive profile corresponds to a data plan of a provider of device, or machine-to-machine, services to the UE. The UE uses the two profiles to transmit separate data contexts on separate respective bearers. When managing two separate bearers, the UE always uses the dominant profile first for managing a handoff to a stronger cell. The UE reports that the new cell that now serves the dominant context is the only cell that has enough strength to support the recessive context, even if other cells near the UE have signals strong enough. This necessarily causes the recessive context to always be handed off to the same cell to which the dominant context has already been handed off.
INFORMATION PROCESSING METHOD AND APPARATUS AND DEVICE
An information processing method, an apparatus, and a device, are provided. The method is executed by a first communication device, and includes: sending address information of an edge configuration server. The first communication device is an Application Function (AF) or a Network Exposure Function (NEF). Sending the address information of the edge configuration server includes: sending the address information of the edge configuration server through service information of the NEF when the first communication device is the AF, or sending the address information of the edge configuration server through service information of Unified Data Management (UDM) when the first communication device is the NEF.
INFORMATION PROCESSING METHOD AND APPARATUS AND DEVICE
An information processing method, an apparatus, and a device, are provided. The method is executed by a first communication device, and includes: sending address information of an edge configuration server. The first communication device is an Application Function (AF) or a Network Exposure Function (NEF). Sending the address information of the edge configuration server includes: sending the address information of the edge configuration server through service information of the NEF when the first communication device is the AF, or sending the address information of the edge configuration server through service information of Unified Data Management (UDM) when the first communication device is the NEF.
Message routing to devices with non-routable addresses
The disclosed system provides for machine-to-machine routing of messages (e.g., text messages, binary information, etc.) between devices (e.g., external applications, IoT devices, etc.) using non-routable identifiers. The systems and methods publish an application programming interface (API) configured to receive (non-routable) identification information of a target device from an external application (e.g., an IoT Service Provider) that calls the API, determines whether a target device associated with the identification information is a subscriber of a telecommunications service provider that provides telecommunications plans to subscribers of the telecommunications service provider, verifies that the external application is authorized to transmit messages to the target device, and translates the non-routable identification information to a mapped device address that can be used to determine a location of the target device so that the message can be delivered to the target device.
Message routing to devices with non-routable addresses
The disclosed system provides for machine-to-machine routing of messages (e.g., text messages, binary information, etc.) between devices (e.g., external applications, IoT devices, etc.) using non-routable identifiers. The systems and methods publish an application programming interface (API) configured to receive (non-routable) identification information of a target device from an external application (e.g., an IoT Service Provider) that calls the API, determines whether a target device associated with the identification information is a subscriber of a telecommunications service provider that provides telecommunications plans to subscribers of the telecommunications service provider, verifies that the external application is authorized to transmit messages to the target device, and translates the non-routable identification information to a mapped device address that can be used to determine a location of the target device so that the message can be delivered to the target device.
Multiple parallel WebRTC accesses to IMS
It is provided a method, comprising monitoring, for each of plural attempts of a web identity to register for an internet protocol multimedia service, if the respective attempt is received; generating, for each of the plural attempts if the respective attempt is received, a respective private user identification based on the web identity and a respective distinguishing identifier, wherein probability that two of the private user identifications have a same value is less than a predefined limit; providing the respective private user identification in response to the respective attempt.
ESTABLISHING A SESSION INITIATION PROTOCOL SESSION
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
SERVICE BASED INTERFACE ENABLED HOME SUBSCRIBER SERVICE SELECTION
Embodiments described herein relate to methods and apparatus for obtaining and/or providing Home Subscriber Service, HSS, information. A method in a first service based architecture, SBI, capable Internet Protocol Multimedia Subsystem, IMS, entity includes: transmitting a discovery request to a network repository function, NRF; receiving a response comprising HSS information from the NRF; and transmitting at least a portion of the HSS information to a second SBI capable IMS entity.