Patent classifications
H04L61/4588
Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IoT (MIoT) deployments
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IoT (MIoT) deployments
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
SYSTEMS AND METHODS FOR EXPOSING USER EQUIPMENT IDENTITY
A device, located in a core network associated with a radio access network (RAN), may include a processor configured to expose services or capabilities to application servers outside the core network, wherein the device is located in a core network associated with a radio access network (RAN). The processor may be further configured to receive a subscriber identifier message from a gateway device that established a connection to a user equipment (UE) device via the RAN, wherein the subscriber identifier message includes information identifying the UE device; receive a request from an application server associated with the connection for the information identifying the UE device; and provide the requested information identifying the UE device to the application server, in response to receiving the request from the application server.
Call screening service for detecting fraudulent inbound/outbound communications with subscriber devices
An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.
SYSTEMS AND METHODS ENABLING REAL-TIME PERMISSION BASED PRIVACY PROTECTION OF REAL-TIME LOCATION AND RELATED LOCATION INFORMATION
Systems and methods are provided for enabling uses to instantly access real-time digital content, information, and services related to specific broadcast content or communications based on the specific broadcast area of the communication or the location of the users. Identifiers, communications, and broadcast channels are maintained and dynamically tracked based on geographic location, broadcast areas, date, and time, thereby enabling end users to access such real-time content based on such information, including using broadcast specific identifiers to identify specific communications and obtain additional information over voice and other services based on each specific communication. The system tracks and uses such identifiers, communications, and channels, separately or together with other information known or ascertainable by the systems, to provide users instant access to personalized, location, context, and communications specific, content, information, and services.
METHOD FOR QUERYING AND FOR SUBSCRIBING PCF BINDING EVENTS FOR AN ADDRESS RANGE IN A 5G SYSTEM
A 5G system (5GS) includes a Network Function (NF) Service Consumer and a functional entity, wherein the functional entity includes binding information stored therein and the binding information includes: Protocol Data Unit (PDU) sessions information and a list comprising one or more subscribers identities (IDs) and/or Policy Control Function (PCF) instance IDs. A method for querying PCF binding information for an address range in the 5GS includes: querying, from the NF Service Consumer to the functional entity, based on one or a combination of query parameters, for all binding information matching the query parameters; and notifying, from the functional entity to the NF Service Consumer, any binding information that matches the query parameters.
METHOD FOR TRANSMITTING AN EXISTING SUBSCRIPTION PROFILE FROM A MOBILE NETWORK OPERATOR TO A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT
A method for transmitting a subscription profile from an MNO to a secure element pre-provisioned with a temporary profile comprising a unique identifier, MCC and MNC, includes: —Transmitting from the MNO the unique identifier to a SM-DP; —Creating the subscription profile at the SM-DP; —Provisioning in a D-HSS server having the first MCC/MNC the unique identifier and a temporary IMSI comprising a second MCC, a second MNC; —Provisioning in the MNO the temporary IMSI and an ephemeral key; —At the first attempt of the secure element to connect to the D-HSS server, exchanging data in signaling messages for provisioning the secure element with the temporary IMSI; —At the next attempt of the secure element to connect to the MNO network with the temporary IMSI, open an APN and send from the SM-DP to the secure element the subscription profile.
Methods, systems, and computer readable media for non-internet protocol (non-IP) data delivery between user equipment (UEs) and multiple application servers (ASs)
A method for mobile originated (MO) non-Internet protocol data delivery (NIDD) to plural application servers (ASs) includes creating an AS group NIDD context record at an exposure function node for an AS group including a plurality of ASs to receive MO NIDD communications from a same UE. The method further includes receiving, at the exposure function node, a request for creating a single packet data network (PDN) connection with the exposure function node on behalf of the UE. The method further includes updating the AS group NIDD context record to include PDN connection information for the single PDN connection. The method further includes receiving, at the exposure function node and over the single PDN connection, MO NIDD data from the UE. The method further includes distributing, from the exposure function node and using the AS group NIDD context record, the MO NIDD data to each of the plural ASs identified as members of the group in the AS group NIDD context record.
Cross-provisioning of mobile device capabilities in wireless communication networks and an OTA SIM update
Systems and methods discussed herein are directed to enabling users to remain in a first network billing system but access a second network for wireless communication network services. This occurs via an OTA update of a user's UE SIM, where the update changes the primary public land mobile network (PLMN) from the first network to the second network. Additionally, the network capabilities for the UE are cross-provisioned from the first network to the second network, where the first network provides a service or rate plan to the second network.
Method for establishing a bidirectional communication channel between a server and a secure element, corresponding servers and secure element
The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a—Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b—Sending from the server to the secure element, in at least a first signaling message: At least a command; A correlation identifier if further messages have to be sent from the secure element to the server; A first payload comprising data; c—Executing at the secure element the command.