H04L61/4588

IMEI RETRIEVAL AND IMEI CHANGE NOTIFICATION IN 5GC-EPC INTERWORKING SCENARIOS

According to an aspect, there is provided a method of operating a first network node (420; 430; 520; 530; 620; 630; 730; 740) in a first core network of a telecommunication network. The first network node (420; 430; 520; 530; 620; 630; 730; 740) is for managing data relating to subscribers of the first core network, and the telecommunication network further comprises a second core network having a second network node (420; 430; 520; 530; 620; 630; 730; 740) that is for managing data relating to subscribers of the second core network. The method comprises, after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier, sending (1101) a first message to the second the second wireless device identifier for the first subscriber.

METHOD AND SYSTEM FOR PROVIDING LOW BANDWIDTH AND HIGH BANDWIDTH COMMUNICATIONS SERVICES USING DIFFERENT USER EQUIPMENT PROFILES
20170332274 · 2017-11-16 ·

A network platform manages the provisioning of a UE with a dominant identity profile and a recessive identity profile. The dominant profile is associated with a user's existing wireless data plan and the recessive profile corresponds to a data plan of a provider of device, or machine-to-machine, services to the UE. The UE uses the two profiles to transmit separate data contexts on separate respective bearers. When managing two separate bearers, the UE always uses the dominant profile first for managing a handoff to a stronger cell. The UE reports that the new cell that now serves the dominant context is the only cell that has enough strength to support the recessive context, even if other cells near the UE have signals strong enough. This necessarily causes the recessive context to always be handed off to the same cell to which the dominant context has already been handed off.

Methods and systems for selecting a user plane function in a wireless communication network

A method for selecting a user plane function when a user equipment (UE) attaches to a wireless communication network may include determining a data throughput limit associated with the UE, identifying a first user plane function having a first data throughput capacity, and identifying a second user plane function having a second data throughput capacity, wherein the first throughput capacity is higher than the second throughput capacity. The method may further include selecting the first user plane function if the data throughput limit of the UE is above a predetermined threshold, selecting the second user plane function if the data throughput limit of the UE is below the predetermined threshold, and sending a session request to the selected first or second user plane function.

Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests

Aspects of the subject disclosure may include, for example, a system that manages utilization of mobile subscriber identity information including enabling use of such information by different communication devices. The use of the same mobile subscriber identity information by multiple devices can be based on locations and other mobile subscriber identity information can be assigned to devices based on the locations. Other embodiments are disclosed.

CLIENT DEVICE BASED SOLUTION FOR HANDLING MAC RANDOMIZATION

A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized.

CLIENT DEVICE BASED SOLUTION FOR HANDLING MAC RANDOMIZATION

A system and method are provided for a network device for use with a client device having a hostname and a MAC address. The network device contains a memory that has a second hostname and a second MAC address stored within the memory. The second MAC address corresponds to the second hostname. The memory also contains a processor configured to execute instructions stored on the memory to cause the network device to: receive, from the client device, the hostname and the MAC address; determine whether the MAC address is randomized; provide an instruction to the client device to inform a user of the client device that the client device hostname is registered when the hostname matches the second hostname and the MAC address is randomized.

BASE STATION DEVICE, POSITION MANAGEMENT DEVICE, TERMINAL DEVICE, AND CONTROL METHOD
20170318613 · 2017-11-02 · ·

An access network has a position management device function, the loss of connectivity to a core network by a base station is detected, and a state transition process, led by the base station, for transitioning to an Isolated E-UTRAN state is initiated on the basis of the detection. In the state transition process, by performing a reattach procedure from a terminal device, a switch to base station loop-back communication can be made. It is possible thereby to provide a communication control method by which communication between terminals present within the communication coverage of a base station which has lost connectivity to a core network is switched to base station loop-back communication.

5G-4G Authentication Data Coexistence

Exemplary embodiments include a method for managing user authentication credentials in relation to different types of core networks, CNs. The exemplary methods can include receiving (1010) a request to authenticate a user for access via a first CN, and determining (1020) that user authentication credentials are unavailable in relation to the first CN. The exemplary methods can also include sending (1030), to a translator function associated with a second CN that is different than the first CN, a request to provide user authentication credentials associated with the first CN. The exemplary methods can also include receiving (1040) user authentication credentials associated with the first CN and, based on the received user authentication credentials, authenticating (1050) the user for access via the first CN. Embodiments also include data management nodes configured to perform the exemplary methods, as well as complementary methods and nodes configured to perform such methods.

Adaptable network service access through dynamic request routing
09801043 · 2017-10-24 · ·

In an Internet Protocol Multimedia Subsystem (IMS) network in which multiple subscriber data servers are deployed with partitioned subscription data for users, a subscriber location function (SLF) is used to proxy queries to a subscriber data server (such as an HSS) in which subscription data for a user can be found. The SLF receives a query for the subscriber data server, looks up the address of appropriate subscriber data server and proxies the query to the appropriate subscriber data server. Preferably, the SLF is co-located with a subscriber data server.

Method and network entity for S-CSCF server allocation in an IMS based multimedia over IP network

Method and network entities for enabling server allocation in an IMS-based Multimedia over IP network. The method includes receiving by a S-CSCF server of the network subscriber registration data, transmitting, by the S-CSCF server, information representative of subscriber data to a P-CSCF server and/or to an HSS for storing the information representative of the subscriber data in a memory by the P-CSCF server and/or by the HSS, and transmitting, by the S-CSCF server, a S-CSCF group address to the P-CSCF server and/or to the HSS, respectively, said S-CSCF group address being representative of a group of S-CSCF servers, the S-CSCF server being included in said group of S-CSCF servers.