Patent classifications
H04L65/1016
DEVICE LINKAGE METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM
Provided is a device linkage method, including that: a rule engine device receives a request message of adding a rule input resource instance from a client device; and the rule engine device establishes a connection relationship between the rule engine device and a rule input server device based on the request message of adding the rule input resource instance, the connection relationship being configured to implement device linkage.
First Node, Second Node and Methods Performed Thereby for Handling Identification of a Communications Network
A method performed by a first node (111) managing a P-CSCF in a first communications network (101). The method is for handling identification of a second communications network (201). One of the communications networks is a home network and the other is a visited network. The first node (111) obtains (701) a unique identifier uniquely identifying the second communications network (201) in a plurality of networks (200) sharing a Mobile Network identifier. The unique identifier is based on: a) an MCC and an MNC, corresponding to a shared PLMN identifier, and b) a subscriber identifier corresponding to the second network (201). The first node (111) also processes (702) provision of an IMS service across the communications networks, to a device (230) operating in the visited network, based on the identifier. The processing (702) comprises, in the home network, one of: i) application of a policy or rule, and ii) routing a communication to a S-CSCF.Publ.
SESSION RECOVERY FROM DEDICATED BEARER FAILURE
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.
SESSION RECOVERY FROM DEDICATED BEARER FAILURE
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.
Method for setting up a WebRTC session
Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is obtained at least from a subscriber device in the first terminal which comprises a subscriber identifier and an operator identifier. A session request and an identifier of the second terminal are sent to the server. At least one instruction is received from the server and a message comprising a first set, relative to the first terminal, of at least one characteristic parameter of the requested session is generated in accordance with at least one instruction received and sent to the server. A message is received from the server comprising a second set of at least one characteristic parameter of the requested session, the second set relating to the second terminal and having a non-zero overlap with the first set.
Method for setting up a WebRTC session
Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is obtained at least from a subscriber device in the first terminal which comprises a subscriber identifier and an operator identifier. A session request and an identifier of the second terminal are sent to the server. At least one instruction is received from the server and a message comprising a first set, relative to the first terminal, of at least one characteristic parameter of the requested session is generated in accordance with at least one instruction received and sent to the server. A message is received from the server comprising a second set of at least one characteristic parameter of the requested session, the second set relating to the second terminal and having a non-zero overlap with the first set.
Emergency services support for a device which does not have a valid subscription
This disclosure is related to a procedure to provide emergency services support for a UE which does not have a valid subscription for the serving PLMN. This disclosure more specifically provides procedure to support IMS emergency call or eCall support for a UE which is in limited state on a E-UTRA cell is connected to both EPC and 5GCN.
Emergency services support for a device which does not have a valid subscription
This disclosure is related to a procedure to provide emergency services support for a UE which does not have a valid subscription for the serving PLMN. This disclosure more specifically provides procedure to support IMS emergency call or eCall support for a UE which is in limited state on a E-UTRA cell is connected to both EPC and 5GCN.
Mitigating authentication-based hacking of access restricted telecommunication services
Systems and method are provided for mitigating hacking of restricted access telecommunication services. In response to an authentication response from a user device, an authentication failure type and authentication failure frequency may be determined. Based on the authentication failure type and authentication failure frequency, the user device is blocked from accessing the telecommunication service for a predetermined period of time, preventing the service from being congested by recurring unauthorized users.
Mitigating authentication-based hacking of access restricted telecommunication services
Systems and method are provided for mitigating hacking of restricted access telecommunication services. In response to an authentication response from a user device, an authentication failure type and authentication failure frequency may be determined. Based on the authentication failure type and authentication failure frequency, the user device is blocked from accessing the telecommunication service for a predetermined period of time, preventing the service from being congested by recurring unauthorized users.