H04L2101/654

METHOD AND APPARATUS FOR MANAGEMENT OF EXTENDED MOBILE DEVICE IDENTITY INFORMATION

A method of operating a terminal device to establish a radio resource control connection with network infrastructure equipment in a wireless telecommunications network, wherein the terminal device is associated with a previously-allocated temporary identifier that identifies the terminal device within the wireless telecommunications network; the method comprising: transmitting a first message to the network infrastructure equipment comprising an indication of a first portion of the temporary identifier; and transmitting a second message, which is separate from the first message, to the network infrastructure equipment comprising an indication of a second portion of the temporary identifier.

Bulk data processing system

The system allows real time collection and processing of massive data from many network elements. It has an elastic architecture that scales horizontally to support different network sizes. The system in a uniform data format for downstream consumption. It employs a pub/sub data distribution mechanism that supports multiple concurrent downstream subscribers efficiently in real-time.

Methods and system for transmitting a temporary identifier
11483736 · 2022-10-25 · ·

Various implementations of a method for transmitting a temporary identifier involve a wireless communication device: transmitting a first portion of a temporary identifier of the wireless communication device to a radio access network in a first message; and transmitting a second portion of the temporary identifier to the radio access network in a second message.

Method for transmitting an existing subscription profile from a mobile network operator to a secure element, corresponding servers and secure element
11601798 · 2023-03-07 · ·

A method for transmitting a subscription profile from an MNO to a secure element pre-provisioned with a temporary profile comprising a unique identifier, MCC and MNC, includes: —Transmitting from the MNO the unique identifier to a SM-DP; —Creating the subscription profile at the SM-DP; —Provisioning in a D-HSS server having the first MCC/MNC the unique identifier and a temporary IMSI comprising a second MCC, a second MNC; —Provisioning in the MNO the temporary IMSI and an ephemeral key; —At the first attempt of the secure element to connect to the D-HSS server, exchanging data in signaling messages for provisioning the secure element with the temporary IMSI; —At the next attempt of the secure element to connect to the MNO network with the temporary IMSI, open an APN and send from the SM-DP to the secure element the subscription profile.

Activation communication addresses of internet of things devices

A method of provisioning wireless communication service to wireless communication devices. The method comprises allocating telephone numbers to a first plurality of devices, allocating the same telephone numbers to a second plurality of devices, transmitting an eSIM provisioning data bundle in a short message service (SMS) message to the first plurality of devices by a first communication network routing node based on the corresponding one of the plurality of telephone numbers, transmitting an eSIM provisioning data bundle in a SMS message to the second plurality of devices by a second communication network routing node based on the corresponding one of the plurality of telephone numbers, wherein the first communication network routing node routes SMS messages in a first region and the second communication network routine node routes SMS messages in a second region, whereby a single telephone number is leveraged by two different devices located in different regions.

TOKEN-BASED SECURITY RISK ASSESSMENT FOR MULTI-FACTOR AUTHENTICATION
20230117620 · 2023-04-20 · ·

A token-based security risk assessment service for multi-factor authentication (MFA) is described. An enterprise may utilize the security risk assessment service, and a telecommunication service provider may provide the security risk assessment service as a network-based service. The security risk assessment service may be configured to monitor identifiers (IDs) of elements associated with users associated with an enterprise to determine if any have changed. Any changes may be factored into an adjustment to the user's security profile. Furthermore, the enterprise can utilize the security risk assessment service to implement a token-based MFA scheme where Short Message Service (SMS) is used as an authentication factor.

ENFORCING UNIQUE HANDOVER TRIGGER THRESHOLDS FOR USER EQUIPMENT

Presented herein are techniques to facilitate enforcing unique handover trigger thresholds for user equipment (UE) based on UE identity and/or UE group type. In one instance, a method is provided that may include provisioning a plurality of handover profiles for a plurality of user equipment for a mobile network in which each corresponding handover profile includes a profile identifier and one or more handover thresholds. The method may further include determining that a particular user equipment seeks a connection to the mobile network; identifying a particular handover profile for the particular user equipment, wherein the particular handover profile includes a particular profile identifier; providing the particular profile identifier to a radio access network node of the mobile network; identifying one or more particular handover thresholds for the particular user equipment based on the particular profile identifier; and providing one or more particular handover thresholds to the particular user equipment.

UE mobility across super-cells

Systems and methods are disclosed for a 3G gateway. In a first embodiment, a method is disclosed for a network, comprising: receiving a relocation request message at a home nodeB gateway (HNBGW), the HNBGW coupled to an operator core network, the relocation request message including a target super cell identifier and a user equipment (UE) identifier; sending a second relocation request message from the HNBGW to a coordinating node, the coordinating node having as its identifier the target super cell identifier; querying a lookup table at the coordinating node using the UE identifier to determine a target cell identifier; replacing, in the second relocation request message, the target super cell identifier with the target cell identifier to create a third relocation request message; and sending the third relocation request message to a target cell identified by the target cell identifier.

Method for transmitting an existing subscription profile from a MNO to a secure element, corresponding servers and secure element
20230164542 · 2023-05-25 · ·

The invention concerns a method for transmitting a subscription profile from a MNO to a secure element cooperating with a terminal, the secure element being pre-provisioned with a temporary profile comprising a unique identifier, a first MCC and a first MNC, the method comprising: Transmitting from a POS of the MNO the unique identifier of the secure element to a SM-DP; Creating or reserving the subscription profile at the SM-DP; Provisioning in a D-HSS server having the first MCC/MNC the unique identifier and a temporary IMSI comprising a second MCC, a second MNC; Provisioning in the HSS of the MNO the temporary IMSI and an ephemeral Ki; At the first attempt of the secure element to connect to the D-HSS server with its temporary profile, exchanging data in signaling messages between the secure element and the D-HSS for provisioning the secure element with the temporary IMSI; At the next attempt of the secure element to connect to the MNO network with the temporary IMSI, open an APN and send from the SM-DP to the secure element the subscription profile.

Method for supporting lawful interception of remote ProSe UE in network

The disclosure relates to a communication technique for converging, with an IoT technology, a 5G communication system for supporting a higher data transmission rate than a 4G system, and a system therefor. The disclosure may be applied to intelligent services, such as smart homes, smart buildings, smart cities, smart cars or connected cars, health care, digital education, retail businesses, and security and safety related services, on the basis of 5G communications technologies and IoT-related technologies. A method for operating relay UE in a mobile communication system includes transmitting, to a network node connected to the relay UE, a remote UE report message including remote UE information about a remote UE accessing a network via the relay UE, wherein the remote UE information includes IP address information allocated to the remote UE; starting a timer upon transmitting the remote UE report message to the network node; receiving, from the network node, a response message in reply to the remote UE report message; and stopping the timer upon receipt of the response message from the network node. the IP address information includes an IP address and port information of the remote UE in case that IPv4 is used as an address type.