Patent classifications
H04L2101/654
Random access method, terminal device, and network device
A random access method includes determining a physical channel resource and a preamble sequence, where the physical channel resource or the preamble sequence is associated with a first beam determined by the terminal device and used by a network device for performing downlink transmission, sending the preamble sequence on the physical channel resource, receiving a random access response message and a paging message, where the random access response message includes a preamble identifier, the paging message includes first identification information of one or more to-be-paged terminal devices, and the paging message is sent on the first beam, sending a second identifier of the terminal device when the preamble identifier corresponds to the preamble sequence, and a first identifier of the terminal device matches the first identification information, receiving first indication information, and determining, based on the first indication information to complete a random access procedure.
eSIM-based card pool system and control method thereof
An eSIM-based card pool system is disclosed, the system comprising: a card pool unit comprising a plurality of eSIMs; an eSIM manager, comprising a database that stores corresponding relationships between a plurality of eSIM identifications and a plurality of eSIM addresses; and a connection manager, configured to request a first eSIM address from the eSIM manager based on a received download instruction, and write a specified eSIM profile into a first eSIM having the first eSIM address.
Method for controlling, via a terminal and a server, a standby mode of a communication module of the terminal
A method for controlling, via a terminal, a standby mode of a first communication module of the terminal. The first communication module exchanges data with a first wireless access network. The terminal includes a second communication module, which exchanges data with a second wireless access network. The second communication module has a maximum data rate that is lower than a maximum data rate of the first communication module. The terminal belongs to a group of terminals sharing a set of one or several identification codes for connecting to the first wireless network. When the first communication module is in standby mode, the second communication module listens to a downlink between the second wireless access network and the terminal. The first communication module is activated and connects to the first wireless network using the indicated identification code in the activation request received from the server.
SYSTEMS AND METHODS FOR INTER-NETWORK ROAMING USING A PRIVATE CELLULAR NETWORK
The present disclosure is directed to a private cellular network that includes a common evolved packet core component and a router configured to receive network traffic from a plurality of endpoints communicatively coupled to the router; identify each endpoint as an endpoint registered with the private cellular network and for which the router and an associated edge evolved packet core deployed at a location, serve as a home network, or an endpoint roaming on the private cellular network at the location; and route the network traffic via an interface of the router to the edge evolved packet core for each endpoint registered with the private cellular network and for which the router and the edge evolved packet core server as the home network, or via the common evolved packet core component to a corresponding home evolved packet core of each endpoint roaming on the private cellular network.
METHODS AND SYSTEMS FOR SELECTING A USER PLANE FUNCTION IN A WIRELESS COMMUNICATION NETWORK
A method for selecting a user plane function when a user equipment (UE) attaches to a wireless communication network may include determining a data throughput limit associated with the UE, identifying a first user plane function having a first data throughput capacity, and identifying a second user plane function having a second data throughput capacity, wherein the first throughput capacity is higher than the second throughput capacity. The method may further include selecting the first user plane function if the data throughput limit of the UE is above a predetermined threshold, selecting the second user plane function if the data throughput limit of the UE is below the predetermined threshold, and sending a session request to the selected first or second user plane function.
Method and system for quality-of-service authorization based on type of radio access technology and other data session attributes
A computer-implemented system and method for automated traffic flow control using quality of service authorization based on type of radio access technology and other parameters for one or more devices enabled for connectivity over cellular network are disclosed. The computer-implemented method includes receiving credit control request for the one or more devices from a subscriber; receiving quality of service (QoS) configuration authorized for the one or more devices for the subscriber from a configuration database; combining the authorized QoS parameters for the subscriber; comparing them against the requested QoS by the subscriber; and updating charging rules for the subscriber as an answer to the credit control request.
Load balancing and service selection in mobile networks
A method for service selection in mobile networks includes receiving from a control plane, a request for a user plane instance. The user plane instance is configured to perform packet processing for a user equipment during a communication session. The method also includes identifying a plurality of user plane instance candidates associated with a base station in communication with the user equipment. The plurality of user plane instance candidates is configurable by the control plane. For each user plane instance candidate, the method includes determining one or more selection parameters corresponding to a subset of key performance indicators for the base station. The method further includes selecting one of the plurality of user plane instance candidates to fulfill the request for the user plane instance from the control plane based on the one or more selection parameters determined for each of the plurality of user plane instance candidates.
Method and Apparatus for Network Function Service Discovery
Embodiments of the present disclosure provide methods, apparatus and computer program products for network function service discovery. A method implemented at a second network node in a wireless core network with service based architecture comprises: receiving a registration request for network function instance from a network function, the registration request comprising information identifying a subscriber group to which the network function instance is applicable; and storing the information in association with the network function instance. With embodiments of the disclosure, size of NF profile can be saved.
INTELLIGENT METHOD FOR SIM-SWAP FRAUD DETECTION AND PREVENTION
Intelligent systems for detecting SIM swap in mobile devices, wherein if a user requests access to an account via a mobile device, a mobile device application (MDA) sends the request along with mobile device ID and IMSI. If all information received from the MDA matches information stored in memory, the user can access the account. If the mobile device ID or IMSI received from the MDA do not match the mobile device ID or IMSI stored in memory, a social intelligence module compares a mobile device user profile with a profile for a user associated with the account ID. If the mobile device user profile matches or is within a confidence level of the profile for the user associated with the account ID, the user can access the account. Otherwise, additional methods to validate the user may be implemented to prevent possible fraudsters from accessing the account.
Method for managing communication between a server and a user equipment
The invention is a method for communication between a server and a user equipment through a set of command/response pairs. The user equipment uses an IMSI field of an Attach Request frame as defined by ETSI TS 124.008 to convey a command to the server. The server uses an Authentication parameter RAND field or an Authentication parameter AUTN field of an Authentication Request frame as defined by ETSI TS 124.008 to convey a response corresponding to the received command. The server sends the Authentication Request frame in response to the Attach Request frame.