Patent classifications
H04L2101/654
METHOD FOR CONTROLLING, VIA A TERMINAL AND A SERVER, A STANDBY MODE OF A COMMUNICATION MODULE OF THE TERMINAL
A method for controlling, via a terminal, a standby mode of a first communication module of the terminal. The first communication module exchanges data with a first wireless access network. The terminal includes a second communication module, which exchanges data with a second wireless access network. The second communication module has a maximum data rate that is lower than a maximum data rate of the first communication module. The terminal belongs to a group of terminals sharing a set of one or several identification codes for connecting to the first wireless network. When the first communication module is in standby mode, the second communication module listens to a downlink between the second wireless access network and the terminal. The first communication module is activated and connects to the first wireless network using the indicated identification code in the activation request received from the server.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR NON-INTERNET PROTOCOL (NON-IP) DATA DELIVERY BETWEEN USER EQUIPMENT (UEs) AND MULTIPLE APPLICATION SERVERS (ASs)
A method for mobile originated (MO) non-Internet protocol data delivery (NIDD) to plural application servers (ASs) includes creating an AS group NIDD context record at an exposure function node for an AS group including a plurality of ASs to receive MO NIDD communications from a same UE. The method further includes receiving, at the exposure function node, a request for creating a single packet data network (PDN) connection with the exposure function node on behalf of the UE. The method further includes updating the AS group NIDD context record to include PDN connection information for the single PDN connection. The method further includes receiving, at the exposure function node and over the single PDN connection, MO NIDD data from the UE. The method further includes distributing, from the exposure function node and using the AS group NIDD context record, the MO NIDD data to each of the plural ASs identified as members of the group in the AS group NIDD context record.
Machine-type communication proxy function
One embodiment includes a method and apparatus for routing messages in a machine-type communication (MTC) architecture. The method includes receiving a request at a MTC-proxy residing at an egress of a network. The request includes an international mobile subscriber identity (IMSI) for which a destination is outside the network. The method further includes replacing, by the MTC-proxy, the IMSI in the request with an external identifier.
Gateway Selection Controlled by Network
A method, computer program product and a user equipment (UE) are provided for assisting a user equipment (UE) in selecting a network function. A first message is received from the UE. The first message includes UE request capabilities. A second message is sent to the UE. The second message includes an indication that promotes the UE attempting to connect to a particular Public Land Mobile Network (PLMN) using a network function belonging to the particular PLMN.
User Equipment (UE), Evolved Node-B (ENB) and Methods of Paging in Accordance with a Relay Arrangement
Embodiments of a User Equipment (UE), an Evolved Node-B (eNB) and methods for communication are generally described herein. An UE may be configurable to operate as an eRelay UE. The eRelay UE may be configured to operate as a relay between an eNB and an eRemote UE. The eRelay UE may receive, from the eRemote UE, a message that includes an identifier of the eRemote UE for paging of the eRemote UE. The eRelay UE may determine whether a first paging message from the eNB includes the identifier of the eRemote UE. If it is determined that the first paging message includes the identifier of the eRemote UE, the eRelay UE may transmit, to the eRemote UE, a second paging message to page the eRemote UE. The second paging message includes the identifier of the eRemote UE.
Method for supporting lawful interception of remote prose UE in network
The present disclosure relates to a communication technique for converging, with an IoT technology, a 5G communication system for supporting a higher data transmission rate than a 4G system, and a system therefor. The present disclosure may be applied to intelligent services, such as smart homes, smart buildings, smart cities, smart cars or connected cars, health care, digital education, retail businesses, and security and safety related services, on the basis of 5G communications technologies and IoT-related technologies. More specifically, a method for operating relay user equipment (UE) in a mobile communication system of the present invention comprises the steps of: transmitting, to a mobility management entity (MME) connected to relay UE, a remote UE report message comprising remote UE information on remote UE accessing a network via the relay UE; and receiving, from the MME, a response message corresponding to the remote UE report message.
Temporary identifier in a wireless communication system
A method is performed by a wireless device (16). The method comprises determining whether a core network functionality (12) of a wireless communication system (10) refreshes a temporary identifier (18) associated with the wireless device (16) in accordance with a defined procedure. The method also comprises, responsive to determining that the core network functionality (12) does not refresh the temporary identifier (18) in accordance with the defined procedure, performing one or more actions. The action(s) may for instance include recording at the wireless device (16) that the core network functionality (12) does not refresh a temporary identifier (18) in accordance with the defined procedure and/or reporting the core network functionality (12) as not refreshing the temporary identifier (18) in accordance with the defined procedure.
METHOD TO SELECT THE RIGHT UDM INSTANCE AND ENSURE THE UDM INSTANCE SECURITY
Methods for (i) finding/discovering the right UDM instances and (ii) ensuring the UDM instance security are provided. The method for (i), includes the steps of: (i-1) pre-provisioning of UDM instance discovery information/parameters to the UE/USIM, (i-2) sending the UDM instance discovery related parameters to a core network element, and (i-3) discovering the right UDM instance at the core network element based on the discovery parameters and related routing information either at the UDM consumer/NRF. The method for (ii) includes the steps of: (ii-1) Secured choice of parameter for UDM instance discovery (e.g. UDM instance identifier) to the core network element and (ii-2) the secured UDM instance identifier generation and management at the UDM to prevent attack on UDM instances. Also a method to identify the cleartext IMSI/SUPI is provided for the re-authentication scenario along with the relevant procedures.
Internet of things services architecture
According to at least one example embodiment, the present disclosure may be implemented in the form of a method or system for performing data traffic inspections and selecting an IMSI according to a switching logic. The example embodiment may include a data inspection module configured to inspect data requests from a mobile device assigned a first IMSI. The data inspection module may be further configured to determine data usage information of the mobile device from the inspected data requests. The example embodiment further includes a switching logic module communicatively coupled to the data inspection module. The switching logic module is configured to select a second IMSI associated with a second mobile network to assign to the mobile device, the selection of the second IMSI being at least partially based on the data service being requested by the mobile device.
Method for estimating the time-varying energy balance of a collection of energy sinks, harvesters, and storage devices
An embodiment of the invention includes a computer-readable medium storing instructions that, when executed by at least one computer, cause the at least computer to carry out a method for estimating a time-varying energy balance of a power system. A mission plan for a mission is received. The mission plan includes at least one activity and at least one route. Each route of the at least one route includes at least one time and at least one location. A plurality of power load identifications is received for at least one time-varying power load for use in the mission plan. A time-varying power requirement to complete the mission plan is determined. A baseline plurality of energy storage devices required to satisfy the time-varying power requirement is determined by the energy analysis code. The baseline plurality of energy storage devices includes a baseline number and type of energy storage devices.