Patent classifications
H04L61/4588
eSIM-based card pool system and control method thereof
An eSIM-based card pool system is disclosed, the system comprising: a card pool unit comprising a plurality of eSIMs; an eSIM manager, comprising a database that stores corresponding relationships between a plurality of eSIM identifications and a plurality of eSIM addresses; and a connection manager, configured to request a first eSIM address from the eSIM manager based on a received download instruction, and write a specified eSIM profile into a first eSIM having the first eSIM address.
eSIM-based card pool system and control method thereof
An eSIM-based card pool system is disclosed, the system comprising: a card pool unit comprising a plurality of eSIMs; an eSIM manager, comprising a database that stores corresponding relationships between a plurality of eSIM identifications and a plurality of eSIM addresses; and a connection manager, configured to request a first eSIM address from the eSIM manager based on a received download instruction, and write a specified eSIM profile into a first eSIM having the first eSIM address.
IMS user registration method and device
Disclosed are an IMS user registration method and device. The method comprises: after an HSS receives a registration request of a user terminal having no authentication data, acquiring configuration information of the user terminal; obtaining an authentication verification code ResponseHSS by using a random number and an attribute identifier of the user terminal, wherein the attribute identifier comprises an IMSI, an IMEI and an IMS identifier; sending the random number to the user terminal, and receiving a response verification code Response fed back by the user terminal; and determining whether the Response is the same as the ResponseHSS, and if so, sending the registration request to an application server to carry out registration of the user terminal. The technical problem in the prior art of greatly affecting the security of an enterprise network due to the fact that a device used by an IMS user cannot be controlled is solved.
IMS user registration method and device
Disclosed are an IMS user registration method and device. The method comprises: after an HSS receives a registration request of a user terminal having no authentication data, acquiring configuration information of the user terminal; obtaining an authentication verification code ResponseHSS by using a random number and an attribute identifier of the user terminal, wherein the attribute identifier comprises an IMSI, an IMEI and an IMS identifier; sending the random number to the user terminal, and receiving a response verification code Response fed back by the user terminal; and determining whether the Response is the same as the ResponseHSS, and if so, sending the registration request to an application server to carry out registration of the user terminal. The technical problem in the prior art of greatly affecting the security of an enterprise network due to the fact that a device used by an IMS user cannot be controlled is solved.
Method for transferring subscription and electronic device for supporting the same
An electronic device according to an embodiment may include: a first wireless communication circuit configured to support a first communication protocol, a second wireless communication circuit configured to support a second communication protocol, at least one processor operatively coupled with the first wireless communication circuit and the second wireless communication circuit, and a memory operatively coupled with the at least one processor, wherein the memory stores instructions which, when executed, cause the at least one processor to control the electronic device to: establish a short-range communication connection between the electronic device and an external electronic device through the first wireless communication circuit, acquire subscription information of a first profile stored in a first Subscriber Identification Module (SIM) of the external electronic device from the external electronic device through the first wireless communication circuit, transmit at least part of the subscription. information to a first server through the second wireless communication circuit, acquire authentication information provided by the first server from the external electronic device through the first wireless communication circuit, transmit the authentication information to the first server through the second wireless communication circuit, acquire a second profile from a second server associated with the first server through the second wireless communication circuit based on transmitting the authentication information to the first server, and store the second profile to a second SIM of the electronic device.
COMMUNICATION SYSTEM AND METHOD FOR PERFORMING THIRD-PARTY AUTHENTICATION BETWEEN HOME SERVICE END AND FOREIGN SERVICE END
A communication system performs a third-party authentication between a home service end and a foreign service end, wherein the home service end and the foreign service end each have a type of a cloud, an edge or a fog. The communication system includes a control module and a plurality of operation modules that are configured in a universal proxy, wherein the universal proxy performs communication with a cloud through a cloud relay, performs communication with an edge through an edge relay, and performs communication with a fog through a fog relay. The control module selects two of the operation modules to perform the third-party authentication according to the types of the home service end and the foreign service end.
METHODS AND SYSTEMS FOR SELECTING A USER PLANE FUNCTION IN A WIRELESS COMMUNICATION NETWORK
A method for selecting a user plane function when a user equipment (UE) attaches to a wireless communication network may include determining a data throughput limit associated with the UE, identifying a first user plane function having a first data throughput capacity, and identifying a second user plane function having a second data throughput capacity, wherein the first throughput capacity is higher than the second throughput capacity. The method may further include selecting the first user plane function if the data throughput limit of the UE is above a predetermined threshold, selecting the second user plane function if the data throughput limit of the UE is below the predetermined threshold, and sending a session request to the selected first or second user plane function.
CALLER IDENTIFIER
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server, a request to initiate a telephone call between a calling phone and a callee phone, wherein the request includes a telephone number of the calling phone. The actions further include determining, by the server, a name that corresponds to the telephone number. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include, based on the calling history that indicates previous telephone calls of the phone number, determining, by the server, whether to generate a notification that includes the name that corresponds to the telephone number.
Method for managing communication between a server and a user equipment
The invention is a method for communication between a server and a user equipment through a set of command/response pairs. The user equipment uses an IMSI field of an Attach Request frame as defined by ETSI TS 124.008 to convey a command to the server. The server uses an Authentication parameter RAND field or an Authentication parameter AUTN field of an Authentication Request frame as defined by ETSI TS 124.008 to convey a response corresponding to the received command. The server sends the Authentication Request frame in response to the Attach Request frame.
Establishing a session initiation protocol session
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.