Patent classifications
H04W84/105
Enhancement to system information block (SIB) validity check for non-public networks (NPNs)
This disclosure provides systems, methods, and apparatus, including computer programs encoded on computer storage media, for operating a user equipment (UE) in a next generation (NG) radio access network (RAN) (NG-RAN) to validate a system information block (SIB) for non-public networks (NPNs). In one aspect, a UE receiving a SIB-one (SIB1) from a cell of the NG-RAN may determine whether the cell supports non-public networks (NPNs) based on the received SIB1. If so case, the UE may determine whether an NPN-identifier (NPN-ID) in the received SIB1 matches an NPN-ID of a SIB stored in memory. If so, the UE may validate the stored SIB based at least in part on the received SIB1. If not, the UE may invalidate the stored SIB and obtain a new SIB per standard procedures.
Wireless management and connectivity across multiple networks
A communication management resource receives notification of a registration request associated with user equipment present in a wireless network environment. In response to receiving the registration request, the communication management resource executes a roaming management function on behalf of the user equipment. Via the roaming management function, the communication management resource manages roaming of the user equipment in the wireless network environment. Using an SoR type mechanism as described herein allows a PLMN/SNPN operator to control their subscribers to what roaming SNPN network that they should select/reselect during wireless registration and at any time after registration based on the type of wireless services.
SYSTEMS AND METHODS FOR INTER-NETWORK ROAMING USING A PRIVATE CELLULAR NETWORK
The present disclosure is directed to a private cellular network that includes a common evolved packet core component and a router configured to receive network traffic from a plurality of endpoints communicatively coupled to the router; identify each endpoint as an endpoint registered with the private cellular network and for which the router and an associated edge evolved packet core deployed at a location, serve as a home network, or an endpoint roaming on the private cellular network at the location; and route the network traffic via an interface of the router to the edge evolved packet core for each endpoint registered with the private cellular network and for which the router and the edge evolved packet core server as the home network, or via the common evolved packet core component to a corresponding home evolved packet core of each endpoint roaming on the private cellular network.
Network profile anti-spoofing on wireless gateways
A mechanism of authenticating a communication device onto a radio access network via a private wireless gateway is described. This includes communicating with a communication device via a first wireless interface authentication information, a preferred roaming list (PRL), and an initial access value are obtained from the communication device. A first expected access value is determined based on rolling code data and a secret function. The PRL is authenticated when the first expected access value matches the initial access value. The communication device is proxied onto a radio access network via a second wireless interface. The proxying includes providing the authentication information and the PRL to a cell site attached to the radio access network.
SUBSCRIBER IDENTIFICATION MODULE (SIM) MANAGEMENT FOR CLOUD-BASED PRIVATE MOBILE NETWORKS
The present disclosure relates to devices, methods, and systems for subscriber identification module (SIM) management for a private mobile network. The methods and systems may include a private mobile network service on a cloud computing system. Users of the cloud computing system may use the private mobile network service to create a private mobile network. The private mobile network service may facilitate the creation of the private mobile network by providing interfaces for secure communications with the users of the cloud computing system, the SIM service partners, and the packet core partners. The mobile network service may also manage the SIM cards for the private mobile networks by coordinating the transmission of the SIM operation details for the SIM cards.
PARAMETERS HANDLING FOR SNPN-ENABLED UE
A method of handling parameters of a subscribed network upon accessing a selected Stand-alone Non-Public Network (SNPN) using credentials from a credential holder is proposed. The UE selects an SNPN using a configured list of subscriber data, e.g., based on SNPN selection parameters contained in a selected entry of the list of subscriber data, or selects the SNPN based on SNPN selection parameters associated with a PLMN subscription of a USIM card. The UE accesses the selected SNPN using credentials supplied by a subscribed network, which is identified by the selected entry or by the USIM card. Upon successful registration to the selected SNPN, the UE applies a list of 3GPP PS_Data_Off exempt services that is different from a configured list of 3GPP PS_Data_Off exempt services associated with the selected entry, and evaluates a URSP that is different from the pre-configured URSP of the subscribed network.
Generating a Core Instance at a First Access Network Core Configurator to Facilitate Operation of a Second Access Network
Generating a core instance via a first access network device of a first access network, wherein the core instance facilitates operation of a second access network via a second access network device of the second access network is disclosed. Generally, implementing a core network can be highly resource intensive, e.g., high labor, equipment, and monetary costs. The level of resources that are conventionally committed in developing a core instance can be a significant barrier for many small or medium sized entities. The disclosed subject matter discloses a configuration component that can generate a core instance that can be performed at a remotely located access network. In an embodiment, a remotely implemented core instance can be updatable. Further, in response to a remotely implemented core instance failing to perform, a monitoring component can facilitate a failover operation.
ACCESS CONTROL METHOD AND COMMUNICATIONS APPARATUS
Example access control methods and apparatus are described. One example method includes receiving an initial user equipment (UE) message by a core network device from an access network device. The core network device sends an initial context setup request message to the access network device, where the initial context setup request message includes one or more of the following information: public network integrated non-public network (PNI-NPN) identification information of a PNI-NPN accessible by a terminal device, a public land mobile network (PLMN) identity of a PLMN accessible by the terminal device, or an indication of whether the terminal device is allowed to access a network only by using a closed access group (CAG) cell.
GATEWAY DEVICE, CORE NETWORK DEVICE, COMMUNICATION SYSTEM, DELIVERY METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
The gateway device (10) according to the present disclosure includes a communication unit (11) that receives SNPN identification information to be used for identifying a SNPN from a SNPN core network device deployed in the SNPN and transmits emergency information to the SNPN core network device after receiving a distribution message for requesting for distributing the emergency information via a network operated by a communication carrier, and a distribution control unit (12) that selects, when receiving the distribution message, at least one piece of SNPN identification information from among a plurality of pieces of SNPN identification information received from a plurality of the SNPN core network devices. The communication unit (11) transmits the emergency information to the SNPN core network device deployed in the SNPN identified by the selected SNPN identification information.
Changing topology in a wireless network
Methods, apparatuses, and embodiments related to a technique for changing topology of a wireless network in a multi-band wireless networking system. In a wireless network with multiple wireless networking devices and one or more client devices, communications between the wireless networking devices occurs via a backhaul channel, and communication between the client(s) and the wireless networking devices occurs via a fronthaul channel. At boot up, a wireless networking device configures the wireless network with a certain topology. After the topology is initially configured, the wireless networking device determines a network-related parameter and changes the topology of the wireless network based on the network-related parameter.