H04W12/37

Method for providing assistance for pairing a Wi-Fi type terminal with a Wi-Fi type access point

Method for pairing a Wi-Fi type terminal with a Wi-Fi type access point connected to a display unit, the pairing method comprising the steps, implemented by the access point, of: detecting the presence of a terminal; detecting whether the terminal is located near the access point; if the presence of the terminal near the access point is detected, displaying a message proposing to pair the terminal to the access point on the display unit; when a pairing acceptance signal is received, displaying a pairing information message on the display unit providing assistance for pairing the terminal with the access point.

Method for providing assistance for pairing a Wi-Fi type terminal with a Wi-Fi type access point

Method for pairing a Wi-Fi type terminal with a Wi-Fi type access point connected to a display unit, the pairing method comprising the steps, implemented by the access point, of: detecting the presence of a terminal; detecting whether the terminal is located near the access point; if the presence of the terminal near the access point is detected, displaying a message proposing to pair the terminal to the access point on the display unit; when a pairing acceptance signal is received, displaying a pairing information message on the display unit providing assistance for pairing the terminal with the access point.

Communication method, communications apparatus, and system
11546771 · 2023-01-03 · ·

A communication method includes receiving, by an access network (AN) node, indication information from a mobility management device. The indication information is indicative of a security policy of a quality of service (QoS) flow. The method also includes obtaining, by the access network node based on the indication information, security information of a radio bearer corresponding to the QoS flow. The security information is indicative of a security policy of the radio bearer. The method further includes sending, by the access network node, an identifier of the radio bearer and the security information of the radio bearer to a terminal.

Communication method, communications apparatus, and system
11546771 · 2023-01-03 · ·

A communication method includes receiving, by an access network (AN) node, indication information from a mobility management device. The indication information is indicative of a security policy of a quality of service (QoS) flow. The method also includes obtaining, by the access network node based on the indication information, security information of a radio bearer corresponding to the QoS flow. The security information is indicative of a security policy of the radio bearer. The method further includes sending, by the access network node, an identifier of the radio bearer and the security information of the radio bearer to a terminal.

System and method for an extender device

Many customers have difficulty setting up a new extender device in the customer premises environment to improve their multimedia service. Some embodiments include configuring an extender device based on existing WiFi network credentials to minimize errors. Some embodiments include an application for mobile devices that may enable the transfer of network credentials from existing multimedia devices on the WiFi network to configure a new extender device in real time. For example, the configuration may be based on a customer account, a corresponding environment, and corresponding multimedia devices associated with the customer account. The extender device may be configured with the network credentials (e.g., a WiFi service set identifier (SSID) and password) that is common to the corresponding multimedia devices associated with the customer account.

PLATFORM SYSTEM FOR CONTROLLING VERTICAL SERVICE OF MOBILE COMMUNICATION NETWORK, AND METHOD FOR CONTROLLING SAME
20220417754 · 2022-12-29 ·

A vertical control platform system according to the present invention comprises: a vertical welcome unit which, in response to a vertical service registration request made through a vertical app of a user terminal, authenticates a user's right to use each of a vertical server and a mobile communication operator network, generates a vertical credential, and provides the vertical credential to the user terminal; a vertical AAA unit which uses the vertical credential to perform user authentication when the vertical app is executed, and controls the connection between the user terminal and the vertical server through a network slice according to the result of the user authentication; and a vertical AF unit which performs an interface function for user authentication for a mobile communication operator.

PLATFORM SYSTEM FOR CONTROLLING VERTICAL SERVICE OF MOBILE COMMUNICATION NETWORK, AND METHOD FOR CONTROLLING SAME
20220417754 · 2022-12-29 ·

A vertical control platform system according to the present invention comprises: a vertical welcome unit which, in response to a vertical service registration request made through a vertical app of a user terminal, authenticates a user's right to use each of a vertical server and a mobile communication operator network, generates a vertical credential, and provides the vertical credential to the user terminal; a vertical AAA unit which uses the vertical credential to perform user authentication when the vertical app is executed, and controls the connection between the user terminal and the vertical server through a network slice according to the result of the user authentication; and a vertical AF unit which performs an interface function for user authentication for a mobile communication operator.

Data system on a module (DSoM) for connecting computing devices and cloud-based services
11537631 · 2022-12-27 · ·

A communication device (e.g., a data system on a module (DSoM)/a Data System in a Package (DSiP)) for communicatively coupling a computing device with a cloud-based service to synchronize one or more data modifications, on an asynchronous basis with respect to one another is provided. The communication device may be configured to be communicatively coupled to the computing device and may include a wireless cellular transceiver. The communication device may be configured to one or more of transmit at least one data object from the computing device to the cloud-based service and receive at least one data object from the cloud-based service. Embodiments of the present disclosure may provide a distributed replicated spatiotemporal database packaged on a communication device and integrated with an internet-based secure communication hub.

Method of managing a tamper-proof device comprising a plurality of software containers

The invention is a method for managing a tamper-proof device comprising first and second software containers, said tamper-proof device being included in a host device comprising a baseband unit. Said first software container is designed to emulate an eUICC and is in a deactivated state. The second software container comprises a set of rules. The baseband unit comprises an activator agent which retrieves both location data broadcasted by a telecom network and the set of rules from the second software container. The activator agent checks if activation of the first software container is authorized by one of said rules for the location data and requests activation of the first software container only in case of successful checking.

Method of managing a tamper-proof device comprising a plurality of software containers

The invention is a method for managing a tamper-proof device comprising first and second software containers, said tamper-proof device being included in a host device comprising a baseband unit. Said first software container is designed to emulate an eUICC and is in a deactivated state. The second software container comprises a set of rules. The baseband unit comprises an activator agent which retrieves both location data broadcasted by a telecom network and the set of rules from the second software container. The activator agent checks if activation of the first software container is authorized by one of said rules for the location data and requests activation of the first software container only in case of successful checking.