Patent classifications
H04L61/4588
METHOD FOR TRANSFERRING SUBSCRIPTION AND ELECTRONIC DEVICE FOR SUPPORTING THE SAME
An electronic device according to an embodiment may include: a first wireless communication circuit configured to support a first communication protocol, a second wireless communication circuit configured to support a second communication protocol, at least one processor operatively coupled with the first wireless communication circuit and the second wireless communication circuit, and a memory operatively coupled with the at least one processor, wherein the memory stores instructions which, when executed, cause the at least one processor to control the electronic device to: establish a short-range communication connection between the electronic device and an external electronic device through the first wireless communication circuit, acquire subscription information of a first profile stored in a first Subscriber Identification Module (SIM) of the external electronic device from the external electronic device through the first wireless communication circuit, transmit at least part of the subscription. information to a first server through the second wireless communication circuit, acquire authentication information provided by the first server from the external electronic device through the first wireless communication circuit, transmit the authentication information to the first server through the second wireless communication circuit, acquire a second profile from a second server associated with the first server through the second wireless communication circuit based on transmitting the authentication information to the first server, and store the second profile to a second SIM of the electronic device.
Method and apparatus for accessing legacy networks through temporary ID of evolved network
In a method for accessing a legacy wireless network, a radio access network (RAN) node in the legacy wireless network receives an access message sent by a User Equipment (UE) attempting to access the legacy wireless network. The access message includes mobility management entity (MME) information identifying an MME accessed by the UE in an evolved network. The MME information is added by the UE from a temporary identity (ID) allocated by the MME to a first P-Temporary Mobile Station Identity (P-TMSI) in the access message. The RAN node selects a corresponding Serving GPRS Support Node (SGSN) in the legacy wireless network for the UE according to the first P-TMSI in the access message.
METHOD AND APPARATUS FOR ZERO-TOUCH BULK IDENTITY ASSIGNMENT, PROVISIONING AND NETWORK SLICE ORCHESTRATION FOR MASSIVE IOT (MIOT) DEPLOYMENTS
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
Method and communication system for storing address of network anchor point to network server
A method, apparatus and communication system for registering address information of a network anchor point to a network server are disclosed. A network apparatus, such as a mobility management entity, determines whether to register address information of a network anchor point to a network server, and registers the address information of the network anchor point to the network server when determining to do so.
Mobile electronic communications using internet protocol
A database stores unique associations between account identifiers and mobile-network telephone numbers assigned by a mobile network to mobile communications devices. The account identifiers are also associated with voice-over-IP (VoIP) telephone numbers. Voice calls between the mobile communications devices are made as voice-over-IP (VoIP) calls using respective VoIP telephone numbers. Tracking of the VoIP calls is performed through the mobile network using respective mobile-network telephone numbers, so that a prepaid balance can be enforced.
Message routing to devices with non-routable addresses
The disclosed system provides for machine-to-machine routing of messages (e.g., text messages, binary information, etc.) between devices (e.g., external applications, IoT devices, etc.) using non-routable identifiers. The systems and methods publish an application programming interface (API) configured to receive (non-routable) identification information of a target device from an external application (e.g., an IoT Service Provider) that calls the API, determines whether a target device associated with the identification information is a subscriber of a telecommunications service provider that provides telecommunications plans to subscribers of the telecommunications service provider, verifies that the external application is authorized to transmit messages to the target device, and translates the non-routable identification information to a mapped device address that can be used to determine a location of the target device so that the message can be delivered to the target device.
Systems and methods for registering, administering, and using non-locational identifiers as locational addresses through location name and identifier registries
Systems and methods are provided for registering, curating, enabling, and controlling the use of non-locational identifiers, such as phone numbers and domain names, as physical addresses and location identifiers (LIDs) for purposes of providing instant access to enhanced cross-platform location information and services imbedded in other devices and services through an LID registry. Users may then use the LIDs as physical addresses for purposes of navigation and obtaining information related to such physical locations only as authorized and controlled by the owners of such LIDs.
Handling unanswered calls for alternate phone number on mobile device
According to various embodiments, declined (or unanswered) calls to an alternate number on a mobile device can be handled differently than declined calls to the device's native phone number. For example, such declined (or unanswered) calls to an alternate number can be sent to a different voicemail system than the primary voicemail system associated with the device's native voice call functionality. The techniques described herein can be applied to any situation in which a call is declined or otherwise disposed of, including, for example: the recipient failing to answer the call; the device being in airplane mode; a do not disturb setting preventing acceptance of the call; or the like.
NETWORK BASED NON-IP DATA DELIVERY SERVICE AUTHORIZATION FOR WIRELESS NETWORKS
A method for authorizing a non-IP data delivery service may include receiving a request from a user equipment device (UE) to attach to an access network based on a generic non-internet protocol (IP) access point name (APN), and performing an initial service authorization of the UE for a non-IP data delivery (NIDD) service with the generic non-IP APN. The method may further include generating a specific non-IP APN by combining the generic non-IP APN with an APN originating identifying anchor (OIA), where the APN OIA identifies an organization associated with the NIDD service. The method may include performing a secondary service authorization of the UE within the access network using the APN OIA, and notifying an application server (AS) of the UE availability for the NIDD service using the generic non-IP APN.
Method and system for controlling processing time for data server response to information query
A method and system for controlling processing by a data server. An example method includes a computing system receiving from a client entity a request for information, and, responsive to receiving from the client entity the request, the computing system (i) determining, based on the client entity from which the computing system received the request, a processing time limit for the data server to apply in processing a query for the information and (ii) generating and sending to the data server the query, including in the query an indication of the determined processing time limit. The data server could thus receive and process the query and impose the specified processing time limit on the processing of the received query.