Patent classifications
H04L2101/654
Enhanced and/or more efficient fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network
A method for providing fixed-mobile convergence capabilities and/or device discovery capabilities within a telecommunications network includes: a specific client device or user equipment is connected to or connects to the home gateway device in order to connect to the telecommunications network; the home gateway device uses the connection to the specific client device or user equipment to initiate an exchange of messages according to an authentication or key exchange protocol, wherein the authentication or key exchange protocol is an extensible authentication protocol (EAP) or an enhanced authentication and key agreement (AKA), wherein identity information of the specific client device or user equipment is transmitted to the home gateway device as part of at least one message of the authentication or key exchange protocol; and the authentication or key exchange protocol is prematurely terminated.
Systems and methods for user-specific slice configuration for an application
A device may receive, from a user equipment, a token request associated with an application, wherein the token request is associated with a device identifier. The device may generate a device token for the application and the user equipment. The device may provide, using the device identifier, the device token to the user equipment to enable a user to access the application via an application platform. The device may receive, from the application platform, a slice request for a network slice of a network that is to be used for an application session. The device may determine that the user equipment is associated with the application session based on the device token and the device identifier. The device may configure a network slice instance of the network slice. The device may determine a user equipment route selection policy for the application session according to the network slice instance.
Gateway selection controlled by network
A method, computer program product and a user equipment (UE) are provided for assisting a user equipment (UE) in selecting a network function. A first message is received from the UE. The first message includes UE request capabilities. A second message is sent to the UE. The second message includes an indication that promotes the UE attempting to connect to a particular Public Land Mobile Network (PLMN) using a network function belonging to the particular PLMN.
ACCESS RESTRICTION FOR A PRIVATE OR NEUTRAL-HOST NETWORK
During operation, a computer receives an attachment request from a radio node, where the attachment request is associated with an electronic device, and includes an identifier of the radio node, an identifier of the electronic device and an identifier of a service provider. Then, the computer determines a first entity identifier of an entity based at least in part on the identifier of the radio node and a second entity identifier of the entity based at least in part on the identifier of the electronic device. When the first entity identifier matches the second entity identifier, the computer performs authentication of the electronic device. Alternatively, if the entity identifiers are different, but the identifier of the service provider matches a stored identifier, the computer performs the authentication of the electronic device. Otherwise, the computer does not allow the electronic device to attach to a private or neutral-host network.
System and method for managing visitor location register (VLR) records by updating duplicate records
There is a method and system of removing duplicate Visitor Location Register (VLR) records, and updating the VLR's Global Title Address (GTA) in their Home Location Register (HLR) to avoid duplicate VLR impact to customer service, which may result in missed inbound calls and delayed inbound SMS. Duplicate VLR GTA means that one subscriber has more than one VLR record in different Mobile Switching Stations (MSS) or Mobile Switching Centers (MSC). The valid VLR is identified by comparing the “last active timestamp” of the same subscriber identity (IMSI, or MSISDN, or MDN) of VLR records obtained from each MSS/MSC. The VLR that has the most recent “last active timestamp” is used to identify the active/valid VLR which serves the subscriber. Afterwards the non-active VLR records will be deleted, and the VLR's GTA in HLR will be updated as needed.
Paging occasion reallocation of incapable user equipment
According to certain embodiments, a method performed by a wireless device for paging occasion (PO) allocation is provided. The method includes determining that a PO configured for the wireless device in a Discontinuous Reception (DRX) cycle is problematic. A non-problematic PO is selected based on one or more criteria. One or more paging messages are monitored for during the selected non-problematic PO.
Interconnection functionality between a first mobile communication network and a second mobile communication network
A method for an interconnection functionality between a first mobile communication network and a second mobile communication network includes: associating or assigning private identifier information to specific public land mobile network (PLMN) identifier information related to the second mobile communication network; and in respect of signalling messages and/or data traffic packets that are to be routed or to be addressed or to be processed, providing for or supporting, by a network identifier and number translating functionality, a replacement and/or a translation, in both directions, between the private identifier information and the specific PLMN identifier information related to the second mobile communication network.
Time and frequency synchronization method, network device and terminal
The present disclosure provides a time-and-frequency synchronization method, a network device, and a terminal. The time-and-frequency synchronization method for the terminal includes: subsequent to determining that the terminal in an idle state or a DRX state needs to be woken up to receive a downlink signal, receiving a physical signal for time-and-frequency synchronization from the network device; and performing time-and-frequency synchronization in accordance with the physical signal.
Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication
This disclosure relates to techniques for performing Wi-Fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a RSA-OAEP(SHA-256) encryption scheme may be used to protect the permanent identity when the EAP client needs to send the user's permanent identity to the server in the absence of pseudonym or fast re-authentication identity. In some embodiments, a server certificate is used to authenticate a iWLAN tunnel to protect an IMSI during setup of a Wi-Fi call. Using the methods described herein on both or either of the EAP client and server side may offer improved privacy protection.
System and method of acquiring network-centric information for customer premises equipment (CPE) management
A method, device, and computer-readable medium are provided for sending, by a customer-premises equipment (CPE) device to a wireless access device via a CPE network interface, an Internet protocol (IP) address lease request, wherein the wireless access device terminates a wireless backhaul connection to a service provider network; receiving, responsive to the IP address lease request, an acknowledge message that includes a requested IP address and a protocol configuration option (PCO) providing identification information for the wireless access device; connecting, via the wireless access device and using the requested IP address, to a bootstrap server device associated with the service provider network; receiving, via the wireless access device, attachment information associated with a network management server and the service provider network; and sending, via the wireless access device, the identification information to the network management server in an attachment procedure using the attachment information.