H04L2101/654

METHOD AND USER EQUIPMENT FOR HANDLING SERVICE CONNECTIVITY IN WIRELESS COMMUNICATION SYSTEM

A method for handling a service connection in a wireless communication system, including detecting, by a User Equipment (UE), a Mobility Management (MM) service state of the UE is set to ATTEMPTING TO UPDATE, receiving, by the UE, a valid Temporary Mobile Subscriber Identity (TMSI) in a TMSI reallocation procedure from a base station via a Radio Resource Control (RRC) connection, changing, by the UE, the MM service state to a NORMAL SERVICE state in response to the receiving a valid TMSI and the detecting a MM service state, and sending, by the UE, a paging response message to the base station in response to the changing the MM service state and a paging indication message received from the base station to establish the service connection, the paging indication message including the valid TMSI.

Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IoT (MIoT) deployments

In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.

Data transfer using a dual SIM phone

A first subscriber identification module (SIM) of a dual SIM device is connected to a network. A small cell is informed that the dual SIM device is a dual SIM-type device and a first radio frequency device of the dual SIM device is attached to the network. A second radio frequency device of the dual SIM device is attached to the network. The small cell is configured to treat a second SIM as a control SIM and to treat the first SIM a data SIM. User data is transferred to the first radio frequency device, a control channel switch command is sent to the dual SIM device, and control information is transferred to the second radio frequency device.

Systems and methods for secure automatic system-network dual-activation
11277734 · 2022-03-15 · ·

A method comprising: detecting a delivery trigger indicative of delivery of a new User Equipment (UE) to a user, the new UE having a new subscriber identity module (SIM) card associated with a new phone number, the user having an existing UE with an existing SIM card associated with an existing phone number; and duplicating the existing phone number with the new phone number by instructing network devices to: block incoming telephony messages to the new phone number; spoof outgoing message from the new phone number to present as the existing phone number; duplicate incoming messages to the existing phone number; and deliver the duplicated incoming messages to the new phone number.

Extending wireless local guest access to private radio services

Methods are provided for extending sponsored Wi-Fi guest access capability to other enterprise tools and/or access technologies such as private access networks including private LTE and 5G networks. The methods include a controller detecting a user equipment (UE) that is connected to a guest access service provided by a wireless local access network (WLAN) and generating a profile for the guest access service. The methods further include the controller providing, to the UE, the profile to cause the UE to connect to the guest access service provided by another access network.

SYSTEM AND METHOD FOR PROVISIONING ENHANCED SIM PROFILES AS STANDARD eUICC PROFILES
20220116763 · 2022-04-14 · ·

A method and system for provisioning an embedded SIM (eSIM) with an enhanced SIM profile are provided. The method includes creating an eSIM card with a single enhanced SIM profile on a connected device, wherein the created eSIM includes at least an applet; initiating a subscription management data exchange between the eSIM card and various components of a cellular network; initiating a bootstrap control of the applet to restart the eSIM; and configuring the eSIM with the plurality of multi-international mobile subscriber identity (multi-IMSI) profiles and actions related to IMSI profiles, wherein the configuration is performed using over-the-air (OTA) configuration, thereby configuring the enhanced SIM profile with plurality IMSI profiles.

SYSTEMS AND METHODS FOR EXPOSING USER EQUIPMENT IDENTITY

A device, located in a core network associated with a radio access network (RAN), may include a processor configured to expose services or capabilities to application servers outside the core network, wherein the device is located in a core network associated with a radio access network (RAN). The processor may be further configured to receive a subscriber identifier message from a gateway device that established a connection to a user equipment (UE) device via the RAN, wherein the subscriber identifier message includes information identifying the UE device; receive a request from an application server associated with the connection for the information identifying the UE device; and provide the requested information identifying the UE device to the application server, in response to receiving the request from the application server.

A METHOD FOR CONNECTING A SECURE ELEMENT TO A NETWORK OF A MOBILE NETWORK OPERATOR AND CORRESPONDING SECURE ELEMENT
20220070813 · 2022-03-03 · ·

A method for connecting a secure element to a network of a first mobile network operator using an ephemeral first IMSI, in order to get a second IMSI, from the first mobile network operator, includes: Selecting a first radio serving network, the first selected network being not listed in the Forbidden VPLMN list of the secure element; Sending a REGISTER REQUEST message comprising the first IMSI to the first selected network; If the first selected network does not route the message to the network of the first mobile network operator, stop trying to register with the first selected network and put the MCC/MNC codes of the first selected network in the Forbidden VPLMN list of the secure element; Searching for a another network to register with; and Repeat the foregoing steps until a network routes the first IMSI to the network of the first mobile network operator.

Communication method and device
11272478 · 2022-03-08 · ·

This application discloses a communication method and a device, and the method includes: sending, by a first base station, a first request message, where the first request message is used to request one or more second base stations located in a paging notification area of a target terminal to page the target terminal; and if the first base station receives, within preset duration, a second request message that is sent by one of the one or more second base stations and that is used to obtain a context of the target terminal, sending, by the first base station, the context of the target terminal to the second base station that sends the second request message. A terminal device in a third mode may be paged by using the method and the device in this application.

METHODS AND SYSTEMS FOR ENABLING IDENTITY-BASED SERVICES USING A RANDOM IDENTIFIER

A network (e.g., Wi-Fi network, Internet, a private network, a public network, a content delivery network, cellular network, etc.) may be configured to uniquely identifying a user device (e.g., a mobile device, a smart device, a computer/computing device, a client device, etc.) using a random identifier (e.g., a random Media Access Control (MAC) address, etc.) and provide the user device identity-based services based on a secure transfer and identification of a persistent identifier (e.g., a MAC address, etc.) of the user device. The identity-based services may include: login-less network connection and/or reconnection, one or more subscription services, parental controls, content/advertisement tracking, private network access (e.g., identifier-based routing to private SSIDs, etc.), and/or the like.