Patent classifications
H04L2101/654
CELLULAR NETWORK TEST ENVIRONMENTS FOR EXTERNAL NETWORKS
Various arrangements for testing a network external to a cellular network are presented. An external local network can be accessed by a cellular network test system integrated as part of the cellular network. The cellular network test system can configured user equipment (UE) to perform a test of a service on the external local network. The test can then be performed of the service on the external local network using the UE.
INTEGRATION OF PHYSICAL TEST ENVIRONMENTS WITH A CLOUD-NATIVE CELLULAR CORE
Various arrangements for performing testing using a cellular network are presented. A distributed unit (DU) can be activated to be used exclusively for an isolated test environment. A communication path can be established between the DU and a radio unit (RU) located at a location to where the isolated test environment is located. Communication between the DU and a centralized unit (CU) can be established such that the CU is used as part of the isolated test environment. A test slice can be defined on the cellular network that isolates all traffic on the DU and RU from a production slice. The CU can service both the test slice and the production slice.
PDU type setting method, UE policy setting method, and related entity
A protocol data unit (PDU) type setting method, a user equipment (UE) policy setting method, and a related entity, where the PDU type setting method includes: setting, by UE, a requested PDU type of a PDU session in a process of establishing the PDU session, where the requested PDU type of the PDU session is set by the UE based on a first condition, the first condition includes an Internet Protocol (IP) version corresponding to an application, and the application is associated with the PDU session. In the embodiments of the present disclosure, the requested PDU type of the PDU session can be consistent with a PDU type requested by the application, such that the application can normally perform communication.
Systems and methods for configuring an application platform using resources of a network
A network device may determine, based on a provisioning request to host an application platform, a configuration of resources of a network for maintaining the application platform within the network. The network device may provision the resources to permit access to the application platform via a domain. The network device may receive, from a user device, a domain request that includes the domain, wherein the domain request is associated with configuring an application session between an application of the user device and the application platform. The network device may provide, to the user device, a response that includes an address of a host resource of the application platform, wherein the host resource is one of the resources. The network device may receive, from the user device, a session request that includes the address and may establish the application session between the user device and the host resource.
Systems and methods for scalable remote SIM provisioning
A system, method, and computer-readable medium provide for determining that a user device does not include a subscriber identity module (SIM) profile activated to provision a wireless service of a first mobile network operator (MNO); obtaining location data for the user device; generating multiple mobile network codes (MNCs) and corresponding public land mobile network (PLMN) identifiers (IDs) for multiple MNOs that service an area associated with the location data, wherein the multiple MNOs include the first MNO; configuring, using the PLMN IDs, a radio frequency (RF) channel associated with each of the MNOs using each PLMN ID; generating temporary device IDs for the user device; transmitting a discovery message including each device ID via the RF channel associated with each MNO; receiving from the first MNO storing a reserved SIM profile for the device ID, a network address; and downloading the reserved SIM profile via the network address.
NETWORK ACCESS AUTHENTICATION METHOD AND DEVICE
Embodiments of the prevent invention provide a network access authentication method and device. The method comprises: receiving an authentication request message sent by a first serving network, wherein the authentication request message carries a user equipment pseudonym identifier generated by a user equipment; determining whether a local user equipment pseudonym identifier is asynchronous with the user equipment pseudonym identifier generated by the user equipment; and obtaining, if the determination result is yes, an encrypted international mobile subscriber identity (IMSI) to carry out network access authentication on the user equipment. The embodiments of the present invention can solve the problem that a network access process in the related art does not provide a processing method for the case where the user equipment pseudonym identifier in the user equipment is asynchronous with the user equipment pseudonym identifier in a home network.
Method for transmitting/receiving signal in wireless communication system, and device therefor
The present invention relates to a method for receiving a paging signal in a wireless communication system, and a device therefor, the method comprising the steps of: determining index information indicating a wake up signal (WUS) resource; and monitoring a WUS on the basis of the determined index information, wherein, when a user equipment (UE) supports machine type communication (MTC), the index information indicating the WUS resource is determined on the basis of identification information of the UE, parameters related to a discontinuous reception (DRX) cycle of the UE, information related to the number of paging narrowbands, and information related to the number of UE groups for the WUS.
System and method for de-anonymizing actions and messages on networks
A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
Mobile network user monitoring system
Apparatus comprising a plurality of servers and at least one router that are configured to receive from a communications network data records that the network generates, which are associated with IMSIs and comprise metadata characterizing communications that the network propagates, associate IMSIs with the data records, and store data records associated with a same IMSI in a memory correlated with their shared associated IMSI.
NETWORK CONNECTIVITY
A method is provided which includes receiving location information, performing a selection operation to select an International Mobile Subscriber Identity (IMSI) for obtaining temporary bootstrap connectivity, and attempting to register with a network using the selected IMSI. The selection operation is configured to select one of a first plurality of IMSIs in a first location and one of a second, different, plurality of IMSIs in a second location. Each of the first plurality of IMSIs includes a first predetermined value for at least the first portion of each respective IMSI and each of the second plurality of IMSIs includes a second, different, predetermined value for at least the first potion of each respective IMSI. The selection operation comprises a first and second preconfigured selection characteristic. A network access element, host device, and network node, according to the method, are also described.