Patent classifications
H04L2101/654
Access restriction for a private or neutral-host network
During operation, a computer receives an attachment request from a radio node, where the attachment request is associated with an electronic device, and includes an identifier of the radio node, an identifier of the electronic device and an identifier of a service provider. Then, the computer determines a first entity identifier of an entity based at least in part on the identifier of the radio node and a second entity identifier of the entity based at least in part on the identifier of the electronic device. When the first entity identifier matches the second entity identifier, the computer performs authentication of the electronic device. Alternatively, if the entity identifiers are different, but the identifier of the service provider matches a stored identifier, the computer performs the authentication of the electronic device. Otherwise, the computer does not allow the electronic device to attach to a private or neutral-host network.
Data Retention Probes and Related Methods
A data retention probe for a packet-switched, mobile telecommunications network employs interfaces to connect to interfaces carrying traffic on a mobile network side of a gateway node and on a global internet side of the gateway node. A FPGA creates for each packet at least one fingerprint of one or more fields that are unchanged as part of the address translation performed by the gateway node and to create informative metadata for those packets. A processing unit: (1) receives from the FPGA the fingerprints and metadata and maintains flow records for each flow of packets seen on each side of the gateway node; and (2) compares the fingerprints and, where a match is found, determines those packets to be part of the same communication session and creates a record correlating internal IP address or a subscriber identifier to external IP address and port number.
Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors
Aspects of the subject disclosure may include, for example, a system that manages utilization of mobile subscriber identity information including enabling use of such information by different communication devices. The use of the same mobile subscriber identity information by multiple devices can be based on locations and registration error messages, and other mobile subscriber identity information can be assigned to devices based on the locations. Other embodiments are disclosed.
eSIM-BASED CARD POOL SYSTEM AND CONTROL METHOD THEREOF
An eSIM-based card pool system is disclosed, the system comprising: a card pool unit comprising a plurality of eSIMs; an eSIM manager, comprising a database that stores corresponding relationships between a plurality of eSIM identifications and a plurality of eSIM addresses; and a connection manager, configured to request a first eSIM address from the eSIM manager based on a received download instruction, and write a specified eSIM profile into a first eSIM having the first eSIM address.
Systems and methods for porting communication devices
A communications management system for implementing a freeze on electronic transactions. For example, a device management system provides a means of preventing the porting of at least one communication device account—such as a cellular phone number—from one carrier to another through a list of identifiers that include phone numbers, device identifiers, or personal identifiers that have been enrolled in the device management system through an interface by an authorized user. Advantageously, the device management system provides a revision to the existing phone porting architecture and enables fraud detection and prevention.
Methods and systems for selecting a user plane function in a wireless communication network
A method for selecting a user plane function when a user equipment (UE) attaches to a wireless communication network may include determining a data throughput limit associated with the UE, identifying a first user plane function having a first data throughput capacity, and identifying a second user plane function having a second data throughput capacity, wherein the first throughput capacity is higher than the second throughput capacity. The method may further include selecting the first user plane function if the data throughput limit of the UE is above a predetermined threshold, selecting the second user plane function if the data throughput limit of the UE is below the predetermined threshold, and sending a session request to the selected first or second user plane function.
Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests
Aspects of the subject disclosure may include, for example, a system that manages utilization of mobile subscriber identity information including enabling use of such information by different communication devices. The use of the same mobile subscriber identity information by multiple devices can be based on locations and other mobile subscriber identity information can be assigned to devices based on the locations. Other embodiments are disclosed.
DATA FLOW TRANSMISSION METHOD, DEVICE, AND SYSTEM
The present invention relates to the communications field, and discloses a data flow transmission method, a device, and a system, so as to resolve a problem of resource waste caused when a relay user equipment provides a relay service for a remote user equipment. A specific solution is as follows: A first network device triggers a first relay user equipment to establish a common data flow bearer with a second network device, and the first network device sends an identifier of a common data flow to a remote user equipment in a first group before or after the first network device triggers the first relay user equipment to establish the common data flow bearer with the second network device. The present invention is applied to data flow transmission.
CELLULAR TELECOMMUNICATIONS NETWORK
This disclosure provides a method in a cellular telecommunications network, and a network node for performing the method, the cellular telecommunications network including a content store, and a User Equipment (UE) wherein the UE is identifiable in the cellular telecommunications network by an identifier having a form defined by a cellular telecommunications protocol, the method including receiving a content transaction request from an external node over a wireless connection, the content transaction request including a content store identifier for identifying the content store and further including a content identifier for identifying a content item, wherein the content store identifier has the form defined by the cellular telecommunications protocol for identifying the UE; and processing the content transaction request to perform a transaction with the identified content item in the identified content store.
METHODS AND APPARATUS FOR CONFIGURING NETWORK CONNECTIONS USING A MEMORY
Methods and apparatus for configuring network connections using memory are described. An example method for use in mobile equipment includes: reading a mobile subscriber identity from a memory device associated with the mobile equipment; determining if part or all of the mobile subscriber identity matches a data set entry within a file associated with the mobile equipment; determining if an elementary file is on the memory device; when the elementary file is on the memory device, determining if an access point name is stored in a location identified in the elementary file; and when the access point name is stored in the location identified in the elementary file, using the access point name to connect the mobile equipment to a mobile network. Other examples are disclosed.