Patent classifications
H04W92/045
Core Network Awareness of User Equipment, UE, State
According to some embodiments, a method for use in a network node of providing a radio resource control (RRC) state of a user equipment (UE) to a core network node comprises: receiving, from the core network node, a request to receive a notification of a transition of the UE between a first and second RRC state; determining the UE transitioned between the first and second RRC state; and sending the notification of the transition to the core network node. A method for use in a core network node of receiving RRC state information of a UE comprises: sending, to the network node, a subscription request to receive a notification of a transition of the UE between a first and second RRC state; and upon the network node determining the UE transitioned between the first and second RRC state, receiving the notification from the network node.
Xx/Xn protocol programmability
A method for Xx/Xn interface communication is disclosed, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN; maintaining state of one of the first RAN or the second RAN at the Xx/Xn gateway; executing executable code received at an interpreter at the Xx/Xn gateway as part of the received messages; altering the maintained state based on the executed executable code; and receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.
METHOD AND APPARATUS FOR PROVIDING UPLINK SIGNAL-BASED LOCATION SERVICE
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). A wireless communication system is provided. The wireless communication system includes a location management function (LMF) that may efficiently determine and provide information necessary for a base station to configure a sounding reference signal (SRS) transmission resource required for a terminal.
Smart cascading security functions for 6G or other next generation network
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
LOCAL BREAKOUT OF USER PLAN FUNCTION AT ENTERPRISE 5G RADIO ACCESS NETWORK
The disclosure provides a method for providing an enterprise gNB for connection to a 5G packet core network. The method includes provisioning the enterprise gNB. The enterprise gNB hosts a local user plane function (L-UPF). The method also includes configuring the 5G packet core network comprising a session management function (SMF) to select the local user plane function to service user equipment (UE) connected to the enterprise gNB.
X2 Brokering Between Inter-3GPP Release eNodeB's
An interworking gateway for X2 interface communication is disclosed, comprising: an X2 internal interface for communicating with, and coupled to, a plurality of radio access networks (RANs) using a X2AP protocol; a database for associating each of the plurality of RANs with support status for an X2AP protocol version; an X2AP interworking broker for determining, based on communications with each of the plurality of RANs via the X2 internal interface, the support status for an X2AP protocol version for each of the plurality of RANs, the communications further comprising an observed response to a X2AP message of a first X2AP protocol version; and an X2 external interface for communicating with, and coupled to, a destination outside of the plurality of RANs.
Reliable data delivery over non-access stratum
The present disclosure is directed to method in a mobility management node and such a node for delivering data to a wireless communication device (WCD) served by the mobility management node, operating in a communication network comprising a network entity (NE) and a radio access network (RAN) node serving the WCD, the method comprises: obtaining capability information indicating whether the RAN node supports acknowledgement of a successful delivery of data to the WCD; receiving a data message sent by the NE comprising user data intended for the WCD; sending a control plane message comprising the user data to the RAN node for further delivery to the WCD; sending a response to the NE indicating the outcome of the data delivery.
USER EQUIPMENT (UE) ASSISTED TERMINATION SELECTION FOR NON-STANDALONE OR DUAL CONNECTIVITY
Methods, systems, and devices for wireless communications are described. In a wireless communications system, a user equipment (UE) may determine a preference of the UE for a termination point between a core network and a radio access network (RAN), the core network and the RAN supporting communications for the UE via at least one or a first cell and a second cell each associated with a multi-connectivity mode of the UE. The UE may transmit, to a base station, an indication of the preference of the UE for the termination point. In some cases, the base station may determine the termination point based on receiving the indication of the preference of the UE, and the base station may transmit a message indicating a configuration for the multi-connectivity mode to the UE, the configuration indicating the determined termination point.
Xx/Xn Protocol Programmability
A method for Xx/Xn interface communication is disclosed, comprising: at an Xx/Xn gateway for communicating with, and coupled to, a first and a second radio access network (RAN), receiving messages from the first RAN according to a first Xx/Xn protocol and mapping the received messages to a second Xx/Xn protocol for transmission to the second RAN; maintaining state of one of the first RAN or the second RAN at the Xx/Xn gateway; executing executable code received at an interpreter at the Xx/Xn gateway as part of the received messages; altering the maintained state based on the executed executable code; and receiving and decoding an initial Xx/Xn message from the first RAN; identifying specific strings in the initial Xx/Xn message; matching the identified specific strings in a database of stored scripts; and performing a transformation on the initial Xx/Xn message, the transformation being retrieved from the database for stored scripts, the stored scripts being transformations.
INTELLIGENT CYBERSECURITY PROTECTION SYSTEM, SUCH AS FOR USE IN 5G NETWORKS
The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.