Patent classifications
H04W84/042
POSITIONING REQUEST PROCESSING METHOD, AND DEVICE AND SYSTEM
The present disclosure relates to positioning request processing methods, devices, and systems In one example method, a mobility management network element receives a request message, and sends a first message to a location management network element based on the request message, where the first message is used to trigger the location management network element to obtain location information of a first terminal device through user plane positioning. After receiving the first message, the location management network element sends a second message to the first terminal device based on the first message by using a protocol data unit (PDU) session of the first terminal device, where the second message indicates the first terminal device to report positioning data.
RANDOM ACCESS METHOD AND DEVICE
A random access method and a terminal device are provided. The method may be performed by the terminal device and includes: receiving an SIB message from a cell, where the SIB message includes slice information of the cell and a mapping relationship between the slice information and at least one of the following: a PRACH resource or a preamble; selecting a slice based on the slice information; and selecting, based on the mapping relationship, a preamble and a PRACH resource that are corresponding to the slice to initiate a random access procedure.
APPARATUS AND METHOD OF WIRELESS COMMUNICATION
An apparatus and a method of wireless communication are provided. The method by a first next generation radio access network (NG-RAN) includes performing, by the first NG-RAN, a non-public network (NPN) cell identification on an access stratum (AS) level for downlink (DL), wherein performing, by the first NG-RAN, the NPN cell identification includes at least one of the followings: wherein a synchronization sequence for NPN can be transmitted in one or more synchronization signal blocks (SSBs) on an initial bandwidth part (BWP) by an NPN cell, wherein in a broadcasting system information on a DL BWP, an NPN identifier (ID) is present in an NPN access related information information element (IE), wherein the DL BWP for NPN is used to transmit an SSB and related system information, or wherein an access class permission is transmitted in system information on the DL BWP for NPN access allowance.
Methods and systems for mitigating denial of service (DoS) attack in a wireless network
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution. Methods and systems for mitigating Denial of Service (DOS) attacks in wireless networks, by performing admission control by verifying a User Equipment's (UE's) registration request via a Closed Access Group (CAG) cell without performing a primary authentication are provided. Embodiments herein disclose methods and system for verifying permissions of the UE to access a CAG cell based on the UE's Subscription identifier, before performing the primary authentication. The method for mitigating DOS attacks in wireless networks includes requesting a public land mobile network for accessing a non-public network (NPN) through a CAG cell, verifying the permissions of a UE to access the requested NPN through the CAG cell, and performing a primary authentication.
QUANTUM RESISTANT SECURE KEY DISTRIBUTION IN VARIOUS PROTOCOLS AND TECHNOLOGIES
A quantum resistant method is provided for supporting user equipment (UE) roaming across APs/eNBs/gNBs belonging to various Wireless LAN Controllers (WLCs) in enterprise 5G and WiFi co-located deployments. The method may include initializing a SKS server in an electrical communication with a master WLC with a random post-quantum common secret seed (PQSEED) to generate a post-quantum pre-shared key (PQPSK) and a respective PQPSK-ID. The method may also include sending an encrypted PQSEED along with a PQPSK-ID to a second WLC. The method may further include joining AP (WiFi) to the master WLC using a CAPWAP/DTLS protocol. The method may further include sending the PQPSK-ID from the master WLC to the UE in an EAP success packet when the UE is associated with the AP (WiFi).
SYSTEM AND METHOD TO MANAGE STORED NETWORK SLICE SELECTION ASSISTANCE INFORMATION
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. In some implementations, a user equipment (UE) and method to manage a rejected network slice selection assistance information (NSSAI) is disclosed. The method may include receiving, from a network, an activate default EPS bearer context request message with a Single-NSSAI (S-NSSAI) and a Public Land Mobile Network (PLMN) identifier (ID). In addition, the method may include removing the S-NSSAI from a rejected NSSAI list for a current PLMN.
Beam Forming and Beam Steering Using Antenna Arrays
Antenna systems are provided. In one example, an antenna system includes a first antenna array having a plurality of first antenna elements. The first antenna elements are operable to communicate one or more signals via a communication protocol tin a multiple input multiple output (MIMO) mode. The antenna system includes a second antenna array having a plurality of second antenna elements. The antenna system includes a control circuit configured to control operation of one or more of the second antenna elements of the second antenna array in a first mode or a second mode. In the first mode, one or more of the second antenna elements are configured to provide a secondary function to support communication of the first antenna elements via the communication protocol. In a second mode. One or more of the second antenna elements are configured to support beam forming or beam steering of the first antenna elements.
Method and system for controlling software updates on a network connected device
A method at a computing device acting as a switchboard between an electronic device and a device to be updated, the method including receiving, at the computing device, a connection request from the electronic device, the connection request including an identifier for the device to be updated; receiving, at the computing device, a connection request from the device to be updated; associating, at the computing device, the connection request from the electronic device and the connection request from the device to be updated; forwarding, at the computing device, a message from the device to be updated to the electronic device that update conditions have been met; forwarding, at the computing device, a message from the electronic device to the device to be updated to start an update process; and forwarding, at the computing device, update status information from the device to be updated to the electronic device.
RECOVERY FROM AUTHENTICATION FAILURE
Techniques to recover from authentication failure are disclosed. During authentication of a user equipment (UE) with a public land mobile network (PLMN), the UE may receive an AUTHENTICATION REJECT with an extensible authentication protocol (EAP)-failure message. When this occurs, instead of invalidating the universal subscriber identity module (USIM) of the UE, the UE can search for other PLMNs that can potentially pass the authentication challenge. If one is found, the UE can register with the found PLMN.
BINDING INDICATIONS FOR LOAD BALANCING AND REDUNDANCY FOR COMMUNICATIONS BETWEEN NETWORK FUNCTION INSTANCES IN A 5G CORE NETWORK
In a Fifth Generation (5G) network having an enhanced SBA (eSBA) architecture, a message with a header used to signal binding information (e.g. HTTP custom header for 3gpp-Sbi-Binding) may be received at a recipient NF (service) instance in a direct communication or via a service communication proxy (SCP) in an indirect communication. A binding indication comprising an address of an NF (service) instance may be obtained from the header. One or more alternative binding indications comprising one or more alternative addresses of one or more alternative NF (service) instances may also be obtained from the header. The one or more alternative NF (service) instances may be equivalent NFs (services) of the same NF (Service) Set as the NF (service) instance. The address may be used for communication of messages to the NF (service) instance, and the one or more alternative addresses may be used for load balancing or backup failure.