Patent classifications
H04W48/04
SYSTEMS AND METHODS FOR SECURING WIRELESS COMMUNICATION WITH DEVICE PINNING
Systems and methods of the present disclosure are directed to a method performed by a Wireless Communication Device (WCD) for securing wireless communication. The method includes obtaining a configuration descriptive of network entity(s) comprising (a) Legitimate Network Entity (LNE(s)); (b) or Illegitimate Network Entity (INE(s)); or (c) both LNE(s) and INE(s). The method includes determining that a trigger condition for applying the configuration has occurred. The method includes, responsive to making the determination, applying the configuration to the WCD such that connection related procedure(s) of the WCD related to connection between the WCD and the network entity(s) are adjusted in such a manner that the WCD is permitted to connect to only the LNE(s), not permitted to connect to the INE(s), both permitted to connect to only the LNE(s) and not permitted to connect to the INE(s), or not permitted to connect to any network entity.
Method and Apparatus to Control Access Attempts Due to Positioning
A method and apparatus for providing access control for mobile originated location requests, particularly, but not limited to, in 5G networks. An access attempt message triggered by a mobile originated location request or other 5GMM procedure may be assigned an access category based on whether a mobile originated location request procedure is ongoing or not ongoing. The message assigned the access category may be an LTE positioning protocol message. Possible access categories may include, for example, an MT_acc category for non-ongoing procedures and an MO_sig category for ongoing procedures, An access control check may be performed unless the mobile device switches from an idle to a connected mode.
Method and Apparatus to Control Access Attempts Due to Positioning
A method and apparatus for providing access control for mobile originated location requests, particularly, but not limited to, in 5G networks. An access attempt message triggered by a mobile originated location request or other 5GMM procedure may be assigned an access category based on whether a mobile originated location request procedure is ongoing or not ongoing. The message assigned the access category may be an LTE positioning protocol message. Possible access categories may include, for example, an MT_acc category for non-ongoing procedures and an MO_sig category for ongoing procedures, An access control check may be performed unless the mobile device switches from an idle to a connected mode.
SYSTEM AND METHODS OF MOBILE AND PLUG-AND-PLAY CELL NETWORKS
A mobile cell (mCell) for use in a wireless communication system is disclosed. The mCell may include a wireless network cell node attached to a mobile carrier. The mCell may have one or more processors operable to: assign physical cell identity (PCI) and root sequence index (RSI) for allowing the mCell to join the network in a plug-and-play manner and to maintain connectivity with the system while moving; provide wireless application access for user equipment (UE) and wireless data relay and xHaul for neighboring cells nodes while the mCell is moving; and communicatively couple with other cells and network elements of the system, thereby forming a mesh network for extending and enhancing wireless communication within the system.
SYSTEM AND METHODS OF MOBILE AND PLUG-AND-PLAY CELL NETWORKS
A mobile cell (mCell) for use in a wireless communication system is disclosed. The mCell may include a wireless network cell node attached to a mobile carrier. The mCell may have one or more processors operable to: assign physical cell identity (PCI) and root sequence index (RSI) for allowing the mCell to join the network in a plug-and-play manner and to maintain connectivity with the system while moving; provide wireless application access for user equipment (UE) and wireless data relay and xHaul for neighboring cells nodes while the mCell is moving; and communicatively couple with other cells and network elements of the system, thereby forming a mesh network for extending and enhancing wireless communication within the system.
METHOD AND SYSTEM TO DETECT PREVIOUS DRIVER OF VEHICLE IN EMERGENCY SITUATION
A method to detect an operator of an automobile vehicle includes: identifying if an emergency situation is occurring in an automobile vehicle; determining if a communication device is currently connected or was previously connected in the automobile vehicle; identifying a most recently connected operator of the communication device; and sending a signal identifying the emergency situation is occurring to the most recently connected operator of the communication device.
METHOD AND SYSTEM TO DETECT PREVIOUS DRIVER OF VEHICLE IN EMERGENCY SITUATION
A method to detect an operator of an automobile vehicle includes: identifying if an emergency situation is occurring in an automobile vehicle; determining if a communication device is currently connected or was previously connected in the automobile vehicle; identifying a most recently connected operator of the communication device; and sending a signal identifying the emergency situation is occurring to the most recently connected operator of the communication device.
Network Selection in a Non-Terrestrial Network
A user equipment (UE) is configured to receive broadcast information from a public land mobile network (PLMN) including at least a PLMN identifier (ID), attempt a registration with the PLMN by sending a registration request to the PLMN, wherein the UE attempts the registration via a base station operated by the PLMN deployed in a non-terrestrial network (NTN) arrangement including a non-terrestrial component configured to provide services to the UE via a service link, receive a message including a cause code indicating the PLMN is not allowed to operate at a current UE location and further including a set of attributes indicating further conditions wherein the registration with the PLMN is not allowed and avoid further registration attempts with the PLMN when the further conditions are met.
Intelligent prioritized mobility of low-latency applications
A radio access network (RAN) node can receive, from a user equipment (UE), a request to establish a session associated with a low-latency service level agreement (SLA). The session can be mapped to a radio bearer associated with a network slice configured to support the low-latency SLA, wherein the network slice can include a RAN portion and a core network portion that are co-located at a RAN edge to support the low-latency SLA. The RAN node can provide information related to the radio bearer to a distributed unit (DU) associated with the RAN portion of the network slice and route traffic associated with the session through the network slice configured to support the low-latency SLA via the radio bearer mapped to the session. As such, the session can have a context maintained in the RAN portion and the core network portion of the network slice.
Intelligent prioritized mobility of low-latency applications
A radio access network (RAN) node can receive, from a user equipment (UE), a request to establish a session associated with a low-latency service level agreement (SLA). The session can be mapped to a radio bearer associated with a network slice configured to support the low-latency SLA, wherein the network slice can include a RAN portion and a core network portion that are co-located at a RAN edge to support the low-latency SLA. The RAN node can provide information related to the radio bearer to a distributed unit (DU) associated with the RAN portion of the network slice and route traffic associated with the session through the network slice configured to support the low-latency SLA via the radio bearer mapped to the session. As such, the session can have a context maintained in the RAN portion and the core network portion of the network slice.