Patent classifications
H04L61/4588
Method and system for controlling processing time for data server response to information query
A method and system for controlling processing by a data server. An example method includes a computing system receiving from a client entity a request for information, and, responsive to receiving from the client entity the request, the computing system (i) determining, based on the client entity from which the computing system received the request, a processing time limit for the data server to apply in processing a query for the information and (ii) generating and sending to the data server the query, including in the query an indication of the determined processing time limit. The data server could thus receive and process the query and impose the specified processing time limit on the processing of the received query.
Methods, systems, and computer readable media for conducting a time distance security countermeasure for outbound roaming subscribers using diameter edge agent
A method includes receiving an ingress Diameter message related to a mobile subscriber from a MME located in a non-home network, sending a RIR message containing a mobile subscriber identifier to a HSS in a home network of the mobile subscriber, receiving identification information identifying a MME in the home network that conducted a most recent attachment of the mobile subscriber, utilizing the identification information to send an IDR message containing the mobile subscriber identifier to the identified MME, receiving an IDA message containing attachment timestamp data corresponding to the most recent attachment of the mobile subscriber in the home network, determining a transit time using the UE attachment timestamp data and timestamp information corresponding to the ingress Diameter message, and analyzing the transit time to determine if the ingress Diameter message is to be designated as a suspicious ingress message.
Communication apparatus and communication method
This invention describes a method to enable simultaneous connections to multiple cellular networks while utilising only a single subscriber identity by assigning a unique mobile equipment identity to each radio connection and an apparatus to enable simultaneous connections to multiple cellular networks while utilising only a single subscriber identity by assigning a unique mobile equipment identity to each radio connection where the user equipment is able to manage the multiple International Mobile Equipment Identifiers assigned by the manufacturer of the mobile device by correctly identifying the connected interface and reporting the correct accompanying mobile equipment identifier.
Receiver Directed Anonymization of Identifier Flows in Identity Enabled Networks
A method implemented by a receiving host entity comprises transmitting, by a transmitter of the receiving host entity, an anonymized identifier of the receiving host entity, wherein the anonymized identifier is a temporary and recyclable identifier identifying the receiving host entity, and receiving, by a receiver of the receiving host entity, a data packet from a sending host entity, wherein the data packet includes the anonymized identifier.
TERMINAL DEVICE, PGW, AND TWAG
Performed are communication control for establishing a multi-access PDN connection or rejecting the establishment, and communication control for configuring a routing rule for the multi-access PDN connection or rejecting the configuration, on the basis of an operator policy and a terminal policy. This provides a communication control method and the like for the multi-access PDN connection.
Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IOT (MIOT) deployments
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
Internet protocol (IP) multimedia subsystem (IMS) based session initiation protocol (SIP) call setup retry
Systems, methods, and devices of the various embodiments disclosed herein may enable automatic retry of Internet Protocol (IP) Multimedia Subsystem (IMS) Based Session Initiation Protocol (SIP) Call Setup. Various embodiments may enable a server in an IMS based telecommunication network, such as a proxy-call session control function (P-CSCF) server, interrogating/serving-call session control function (I/S-CSCF) server, telephony application server (TAS), etc., to reattempt SIP call setup. In various embodiments, in response to receiving a SIP error response including a retry-after header, the server may wait a period of time before sending a new SIP invite message.
IMS USER REGISTRATION METHOD AND DEVICE
Disclosed are an IMS user registration method and device. The method comprises: after an HSS receives a registration request of a user terminal having no authentication data, acquiring configuration information of the user terminal; obtaining an authentication verification code ResponseHSS by using a random number and an attribute identifier of the user terminal, wherein the attribute identifier comprises an IMSI, an IMEI and an IMS identifier; sending the random number to the user terminal, and receiving a response verification code Response fed back by the user terminal; and determining whether the Response is the same as the ResponseHSS, and if so, sending the registration request to an application server to carry out registration of the user terminal. The technical problem in the prior art of greatly affecting the security of an enterprise network due to the fact that a device used by an IMS user cannot be controlled is solved.
Restoration of serving call session control and application server function
A communication session for a UE can be restored in the event of serving call session control function (S-CSCF) node unavailability and/or application server (AS) unavailability by storing, prior to IMS unavailability, attribute-value pairs (AVPs) at a home subscriber server (HSS). These AVPs can be used independently by individual IMS nodes to restore a communication session for a UE due to an unavailable IMS node. When a first S-CSCF node becomes unavailable, a proxy CSCF (P-CSCF) node can send a SIP request originating from the UE to a second S-CSCF node. The second S-CSCF node can then send a request to the HSS for an identifier of an AS associated with the UE. Upon receipt of the AS identifier (e.g., an active AS name AVP) from the HSS, the second S-CSCF node can send the SIP request to the AS in order to restore the communication session for the UE.
System and method for enhanced messaging using external identifiers
A network device obtains an External Identifier for a user device. The External identifier includes a <Local Identifier>@<Domain Identifier> format. The network device generates a message, the message including a user identity field for the user device. The user identity field includes the External Identifier. The network device sends, to another network device, the message via an Sh interface.