H04W4/24

POLICY CONTROL FOR BROADCAST SESSION
20230049862 · 2023-02-16 ·

Systems, methods, apparatuses, and computer program products for policy control for broadcast sessions. One method may include receiving, by a multicast/broadcast session management function, at least one broadcast session creation request comprising at least one broadcast session indication associated with at least one policy control function. The multicast/broadcast session management function may receive at least one policy update from the at least one policy control function, and transmit at least one resource allocation request associated with at least one broadcast session transmission to at least one application management function.

DATA NETWORK NAME (DNN) MODIFICATION FOR A WIRELESS USER EQUIPMENT (UE) IN WIRELESS COMMUNICATION NETWORKS
20230048870 · 2023-02-16 ·

A wireless communication network serves a wireless data service to a wireless User Equipment (UE). In the wireless communication network, a network controller receives a service request from a wireless UE and transfers a UE context request to a Unified Data Management (UDM). The UDM retrieves a subscriber profile for the wireless UE. The UDM identifies a wireless service type for the wireless UE and identifies a set of virtual Data Network Names (vDNNs) in the subscriber profile. The UDM selects one of the vDNNs for the wireless UE based on the wireless service type of the wireless UE. The UDM indicates the selected one of the vDNNs to the network controller. The network controller overrides provisioned DNN values using the selected one of the vDNNs. The network controller establishes a wireless data session for the wireless UE based on the selected one of the vDNNs.

DATA NETWORK NAME (DNN) MODIFICATION FOR A WIRELESS USER EQUIPMENT (UE) IN WIRELESS COMMUNICATION NETWORKS
20230048870 · 2023-02-16 ·

A wireless communication network serves a wireless data service to a wireless User Equipment (UE). In the wireless communication network, a network controller receives a service request from a wireless UE and transfers a UE context request to a Unified Data Management (UDM). The UDM retrieves a subscriber profile for the wireless UE. The UDM identifies a wireless service type for the wireless UE and identifies a set of virtual Data Network Names (vDNNs) in the subscriber profile. The UDM selects one of the vDNNs for the wireless UE based on the wireless service type of the wireless UE. The UDM indicates the selected one of the vDNNs to the network controller. The network controller overrides provisioned DNN values using the selected one of the vDNNs. The network controller establishes a wireless data session for the wireless UE based on the selected one of the vDNNs.

SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS

A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.

SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS

A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.

Method for assisting unregistered user device to access private network service and communication system

The disclosure provides a method for assisting an unregistered user device to access private network services and a communication system. The method includes steps as follows. A request to access a private service of a private network is sent by a user device. In response to determining that the user device not registered on the private network wants to access the private service, the user device is assisted to obtain a temporary user profile by a mobile edge computing server through an emergency type attachment procedure. In response to determining that the user device is registered on the private network through the emergency type attachment procedure, a regular attachment procedure is executed by the user device based on the temporary user profile. In response to determining that the user device executes the regular attachment procedure, the mobile edge computing server provides the user device with the private service.

Method for minimizing financial risk for wireless services

A method and system for managing financial risk through the use of postpaid processing during use of wireless services is presented within the scope of the following invention. The present invention uses credit card authorization to pre-reserve credit card funds for wireless services in excess of planned usage. Authorizations eliminate the credit risk associated with overages and payment timing, and also maintain a customer experience identical to postpaid processing. The authorizations are invisible to the customer and no charge is brought to a customer's credit card until the monthly bill is settled. Separating the authorization and settlement stages of retail wireless payment processing allows the branded wireless provider to avoid inherent areas of credit risk during the tenure of a customer's wireless service, while maintaining a familiar customer experience.

Method for minimizing financial risk for wireless services

A method and system for managing financial risk through the use of postpaid processing during use of wireless services is presented within the scope of the following invention. The present invention uses credit card authorization to pre-reserve credit card funds for wireless services in excess of planned usage. Authorizations eliminate the credit risk associated with overages and payment timing, and also maintain a customer experience identical to postpaid processing. The authorizations are invisible to the customer and no charge is brought to a customer's credit card until the monthly bill is settled. Separating the authorization and settlement stages of retail wireless payment processing allows the branded wireless provider to avoid inherent areas of credit risk during the tenure of a customer's wireless service, while maintaining a familiar customer experience.

Techniques for extending a cellular quality of service bearer through an enterprise fabric

Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.

Adapting network policies based on device service processor configuration

Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.