Patent classifications
H04L2101/654
System and method for identifying imaging devices
Embodiments described herein facilitate receipt of image data, by providing apparatus and methods for constructing and/or utilizing a database of networked imaging devices. Communication transmitted over a network is identified as being from an imaging device. One or more identifiers, under which the communication is transmitted, are then extracted from the communication. For example, one or more Internet Protocol (IP) addresses may be extracted. The identifiers are associated in a database with respective physical locations. When a particular area is defined as an area of interest, at least one of the identifiers is selected from the database, the selected identifier being associated with a physical location that is within, or near, the area of interest. Image data transmitted under the selected identifier is then received by the interested parties.
Method and device for controlling congestion in mobile communication system
The present disclosure relates to a method and a device for controlling congestion in a mobile communication system. A method for controlling congestion of a network node according to the present disclosure comprises the steps of: receiving congestion-related information from at least one base station; transmitting a user equipment information request message for making a request for information on a piece of user equipment corresponding to the base station to a mobility management entity; receiving a user equipment information response message including the information on the user equipment corresponding to the base station from the mobility management entity; and transmitting the information on the piece of user equipment corresponding to the base station to another core network node.
Privacy Key in a Wireless Communication System
Core network equipment (20) in a wireless communication system transmits control plane signaling (22) to a user equipment (16) which receives that control plane signaling (22). The control plane signaling (22) indicates a privacy key (24) with which a subscriber identifier (e.g., an international mobile subscriber identity, IMSI) associated with the user equipment (16) is to be encrypted or decrypted. The control plane signaling (22) may be non-access stratum, NAS, signaling. The privacy key (24) may be a public key of a home network associated with the subscriber identifier.
Method for an eUICC embedded into a machine type communication device to trigger the download of a subscription profile
A method for an eUICC embedded into a machine type communication device to trigger the download of a subscription profile from a first network operator, the eUICC being provisioned with an eUICC identifier and a pre-loaded data set memorizing a range of International Mobile Subscription Identifiers associated to a second network operator by selecting randomly by the eUICC an IMSI number in the range memorized in the pre-loaded data set, sending an attachment request comprising the randomly selected IMSI, receiving in an authentication request message the request for getting the eUICC identifier, as a response, sending to the discovery server a authentication failure message, receiving in an authentication request message a temporary IMSI from the discovery server so that the machine type communication device is able to attach to the first network operator and download the pending subscription profile.
METHODS, SUBSCRIBER IDENTITY COMPONENT AND MANAGING NODE FOR PROVIDING WIRELESS DEVICE WITH CONNECTIVITY
A method and a subscriber identity component for providing a wireless device with connectivity as well as a managing node for managing a request for registration are disclosed. The subscriber identity component performs a set of actions, including providing a primary subscriber identity. The set of actions includes monitoring information related to ciphering of communication to the network. Additionally, the set of action includes monitoring information related to registration of a location of the wireless device. The managing node receives, from the wireless device, the request for registration. When an indication of availability is set to unavailable, the managing node refrains from forwarding the request, and transmits a response indicating that registration is denied.
Network based non-IP data delivery service authorization for wireless networks
A method for authorizing a non-IP data delivery service may include receiving a request from a user equipment device (UE) to attach to an access network based on a generic non-internet protocol (IP) access point name (APN), and performing an initial service authorization of the UE for a non-IP data delivery (NIDD) service with the generic non-IP APN. The method may further include generating a specific non-IP APN by combining the generic non-IP APN with an APN originating identifying anchor (OIA), where the APN OIA identifies an organization associated with the NIDD service. The method may include performing a secondary service authorization of the UE within the access network using the APN OIA, and notifying an application server (AS) of the UE availability for the NIDD service using the generic non-IP APN.
EXTENDING WIRELESS LOCAL GUEST ACCESS TO PRIVATE RADIO SERVICES
Methods are provided for extending sponsored Wi-Fi guest access capability to other enterprise tools and/or access technologies such as private access networks including private LTE and 5G networks. The methods include a controller detecting a user equipment (UE) that is connected to a guest access service provided by a wireless local access network (WLAN) and generating a profile for the guest access service. The methods further include the controller providing, to the UE, the profile to cause the UE to connect to the guest access service provided by another access network.
Electronic device identification system, apparatuses, and methods
A wireless device identification system including one or more sensors each having at least one software defined radio to passively receive signals transmitted between one or more wireless devices and a mobile wireless device, one or more processors, and one or more memory devices. The one or more memory devices having stored thereon instructions that when executed by the one or more processors cause the one or more processors to capture cellular information, Wi-Fi information, Bluetooth information, and local network information from the received signals. The instructions can include correlating the captured information to the mobile wireless device by creating a weighted edge relationship graph having a plurality of nodes, including a node corresponding to each of the cellular information, the Wi-Fi information, the Bluetooth information, and the local network information, and determining an association strength between each node of the relationship graph.
GROUPING USERS OF A MOBILE NETWORK
Identifying groupings of individual users of a mobile network. In particular, some embodiments are configured to obtain transaction data records from one or more mobile network provider(s). Groupings of users may be identified by capturing association patterns in the data by applying word embedding.
Intelligent Method for Sim-Swap Fraud Detection and Prevention
Intelligent systems for detecting SIM swap in mobile devices, wherein if a user requests access to an account via a mobile device, a mobile device application (MDA) sends the request along with mobile device ID and IMSI. If all information received from the MDA matches information stored in memory, the user can access the account. If the mobile device ID or IMSI received from the MDA do not match the mobile device ID or IMSI stored in memory, a social intelligence module compares a mobile device user profile with a profile for a user associated with the account ID. If the mobile device user profile matches or is within a confidence level of the profile for the user associated with the account ID, the user can access the account. Otherwise, additional methods to validate the user may be implemented to prevent possible fraudsters from accessing the account.