H04L2101/654

Systems and methods for user-specific slice configuration for an application

A device may receive, from a user equipment, a token request associated with an application, wherein the token request is associated with a device identifier. The device may generate a device token for the application and the user equipment. The device may provide, using the device identifier, the device token to the user equipment to enable a user to access the application via an application platform. The device may receive, from the application platform, a slice request for a network slice of a network that is to be used for an application session. The device may determine that the user equipment is associated with the application session based on the device token and the device identifier. The device may configure a network slice instance of the network slice. The device may determine a user equipment route selection policy for the application session according to the network slice instance.

METHOD AND SYSTEM FOR INTELLIGENT TRANSPORTATION SYSTEM CERTIFICATE REVOCATION LIST REDUCTION

A method at a computing device within an Intelligent Transportation System (ITS), the method including: receiving a first message, the first message including at least tailoring information for a first ITS endpoint and intended journey details for the first ITS endpoint; storing all or a subset of data from the first message; obtaining a full certificate revocation list; creating a tailored certificate revocation list based on data in the first message and the full certificate revocation list, the tailored certificate revocation list containing certificates or identifiers of certificates for ITS endpoints that may be encountered by the first ITS endpoint when navigating a route provided in the intended journey details; and providing the tailored certificate revocation list to the first ITS endpoint.

Unmanned aerial vehicle access method and device
11212856 · 2021-12-28 · ·

A method for access of an unmanned aerial vehicle (UAV) to a cellular network, includes: receiving an access request sent by the UAV; verifying an identity of a user using the UAV and a device identity of the UAV according to the attach request to obtain a verification result; if the verification result indicates that a verification succeeds, allow the access of the UAV and send a first attach response for indicating that access is allowed to the UAV; and if the verification result indicates that the verification fails, reject the access of the UAV and send a second attach response for indicating that access is rejected to the UAV.

Private local network access, authentication, and association for 5G or other next generation network

Access and user association can be enabled for private and hybrid public/private 5G new radio (NR) networks. More specifically, this disclosure discloses how to perform initial access, user authentication and association, Internet protocol (IP) address assignment for routing, and/or mobility management. The aforementioned process can facilitate the user equipment (UE) to engage in peer-to-peer, local breakout, and private/public network communication, via a local manager (LM) access point, without requiring connectivity to a public radio access network (RAN) or core network.

Communication client manager
11206528 · 2021-12-21 · ·

Techniques for designating non-native communication clients as the primary client for user equipment are discussed herein. A primary client can be the communication client designated to receive incoming communications for the user equipment. The user equipment may use the primary client to send, to a network device, a Session Initiation Protocol (SIP) instance to set primary client. The SIP instance may include a primary designator and a Universally Unique Identifier (UUID) associated with the client. The network device may store the information for the user equipment including the UUID and capability set. A second user equipment may poll the network device for the communications capabilities of the first user equipment before establishing a connection.

METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT
20210392489 · 2021-12-16 · ·

The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a—Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b—Sending from the server to the secure element, in at least a firstsignaling message: At least a command; A correlation identifier if further messages have to be sent from the secure element to the server; A first payload comprising data; c—Executing at the secure element the command.

SYSTEMS AND METHODS FOR USER-SPECIFIC SLICE CONFIGURATION FOR AN APPLICATION

A device may receive, from a user equipment, a token request associated with an application, wherein the token request is associated with a device identifier. The device may generate a device token for the application and the user equipment. The device may provide, using the device identifier, the device token to the user equipment to enable a user to access the application via an application platform. The device may receive, from the application platform, a slice request for a network slice of a network that is to be used for an application session. The device may determine that the user equipment is associated with the application session based on the device token and the device identifier. The device may configure a network slice instance of the network slice. The device may determine a user equipment route selection policy for the application session according to the network slice instance.

Systems and methods for configuring an application platform using resources of a network

A network device may determine, based on a provisioning request to host an application platform, a configuration of resources of a network for maintaining the application platform within the network. The network device may provision the resources to permit access to the application platform via a domain. The network device may receive, from a user device, a domain request that includes the domain, wherein the domain request is associated with configuring an application session between an application of the user device and the application platform. The network device may provide, to the user device, a response that includes an address of a host resource of the application platform, wherein the host resource is one of the resources. The network device may receive, from the user device, a session request that includes the address and may establish the application session between the user device and the host resource.

ENHANCED AND/OR MORE EFFICIENT FIXED-MOBILE CONVERGENCE CAPABILITIES AND/OR DEVICE DISCOVERY CAPABILITIES WITHIN A TELECOMMUNICATIONS NETWORK
20210377213 · 2021-12-02 ·

A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.

Categorizing IP-based network traffic using DNS data

A method and system for categorizing Internet Protocol (IP) based network traffic is configured to monitor domain name system (DNS) transactions between at least one customer device and a DNS service. The DNS transactions are used to populate a data table, which is used to enrich a data record (e.g., IPDR). In particular, an IP address and/or customer ID in the data record is used to look up the corresponding domain name in the data table, which is added to the data record. The enriched data record is used to categorize the IP traffic.