H04W8/18

PREFERENCE SIGNALING FOR A MULTI-SUBSCRIPTION WIRELESS DEVICE
20230050907 · 2023-02-16 ·

Methods, systems, and devices for wireless communications are described. A user equipment (UE) associated with a first subscription and a second subscription may establish a connection with a base station, the first subscription in a connected state. The UE may use the first subscription to perform a communication activity with the base station while the first subscription is in the connected state. Upon completion of the communication activity, the UE may transmit UE assistance information (UAI) to the base station indicating a preference of the UE to switch the first subscription to an inactive state in response to a release message from the base station.

PREFERENCE SIGNALING FOR A MULTI-SUBSCRIPTION WIRELESS DEVICE
20230050907 · 2023-02-16 ·

Methods, systems, and devices for wireless communications are described. A user equipment (UE) associated with a first subscription and a second subscription may establish a connection with a base station, the first subscription in a connected state. The UE may use the first subscription to perform a communication activity with the base station while the first subscription is in the connected state. Upon completion of the communication activity, the UE may transmit UE assistance information (UAI) to the base station indicating a preference of the UE to switch the first subscription to an inactive state in response to a release message from the base station.

SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS

In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.

SELECTING COMMUNICATION SCHEMES BASED ON MACHINE LEARNING MODEL PREDICTIONS

In some implementations, a prediction and monitoring system may processing, using a machine learning model, account data associated with an account that is associated with a user of a user device to identify a series of recurring events associated with the user device. The prediction and monitoring system may generate, using the machine learning model, a predicted transaction date and a predicted transaction amount that are both associated with the series of recurring events. The prediction and monitoring system may select, based on additional account data associated with the account and at least one of the predicted transaction date or the predicted transaction amount, a particular communication scheme, of a plurality of communication schemes, for communicating with the user. The prediction and monitoring system may transmit at least one message according to the particular communication scheme to facilitate authentication of the user.

Automated security control using log information

Techniques, devices, and systems for receiving, from a mobile device, a request associated with a subscriber information module (SIM) are described herein. At least one of the mobile device, the SIM, or a communication identifier can be determined. A query can be transmitted, based on a difference between a first time associated with the query and a second time associated with a previous query meeting or exceeding a threshold amount of time. An action can be performed based on the query information being associated with the malicious activity information.

Automated security control using log information

Techniques, devices, and systems for receiving, from a mobile device, a request associated with a subscriber information module (SIM) are described herein. At least one of the mobile device, the SIM, or a communication identifier can be determined. A query can be transmitted, based on a difference between a first time associated with the query and a second time associated with a previous query meeting or exceeding a threshold amount of time. An action can be performed based on the query information being associated with the malicious activity information.

Methods and systems for managing decoding of control channels on a multi-SIM UE

Methods and systems for managing decoding of control channel on a multi-SIM UE. A method includes receiving, by the UE, the plurality of control channels from at least one Base Station (BS), the plurality of control channels corresponding to a plurality of Subscriber Identity Modules (SIMs), selecting, by the UE, a respective decoder for each of the plurality of SIMs, and decoding, by the UE, each respective control channel among the plurality of control channels using the respective decoder for a respective SIM among the plurality of SIMs, the respective SIM corresponding to the respective control channel.

Method for updating policy information, network device and terminal device

Provided are a wireless communication method, a network device and a terminal device. The method includes: after acquiring a PSI parameter of a terminal device, a first network device determines whether to update policy information of the terminal device, wherein the PSI parameter is used for identifying a part of policy information for the terminal device under a subscribed user. In an implementation of the present disclosure, after acquiring a Policy Section Identifier (PSI) parameter of a terminal device, a first network device directly determines whether to update policy information of the terminal device.

System and method for proximity based networked mobile communication storing proximity on a database
11582817 · 2023-02-14 ·

Communication is established between a plurality of users through mobile computing devices. A server communicates with the mobile computing devices. Unique User Identifiers (UUIDs) are registered on the server through a network, and a database connected to the server stores the uploaded UUIDs and associated data. The server receives and sends communications to and from the mobile computing devices, receives UUIDs and associated data from mobile computing devices, and sends UUIDs and associated data to one or more mobile computing devices.

Tamper resistant device for an integrated circuit card

A tamper resistant device can be used for an integrated circuit card. The device includes memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile. A first physical interface is configured to be coupled to a baseband processor configured to operate with a mobile telecommunications network. A second physical interface configured to be coupled to an application processor. The first physical interface configured to allow the baseband processor to access the telecommunication profile and the second physical interface is configured to allow the application processor to access the application profile. The tamper resistant device is configured to enable accessibility to the application profile if corresponding commands are received at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received at the second interface.