H04W88/182

Apparatuses and methods for configuration information retrieval

The present disclosure relates to radio network communication. In one of its aspects, the disclosure presented herein concerns a method for retrieving configuration information from a target Base Station (BS) in an E-UTRA New Radio-Dual Connectivity (EN-DC) wireless communication system. The method is performed by a source en-gNB. According to the method, a request message requesting configuration information from the target BS is transmitted to a first proxy evolved Node B (eNB). The request message comprises identifiers identifying the source en-gNB and the target BS, respectively.

Method for Performing Verification by Using Shared Key, Method for Performing Verification by Using Public Key and Private Key, and Apparatus
20230007475 · 2023-01-05 ·

A method and an apparatus for performing verification using a shared key are disclosed. The method includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second network identifier information is obtained by processing the first network identifier information by using a shared key, and the shared key is a key used between the first network element and the second network element; verifying, by the first network element, the registration request message by using the shared key; and sending, by the first network element, a registration response message to the second network element. When receiving a registration request from a visited network, a home network verifies the registration request message by using a shared key, to avoid a spoofing attack from the visited network.

WIRELESS COMMUNICATION NETWORK COMMUNICATIONS THROUGH SESSION COMMUNICATION PROXIES
20230239964 · 2023-07-27 ·

Session Communication Proxies (SCPs) generate SCP status information and/or SCP location information. A source network function selects one of the SCPs based on the SCP status information and/or the SCP location information. The source network function transfers data to the selected one of the SCPs. The selected one of the SCPs receives the data, selects a target network function, and transfers the data to the target network function. In some examples, a Network Repository Function (NRF) prioritizes the SCPs based on the SCP status information and/or the SCP location information, and the source network function selects the one of the SCPs based on the SCP prioritization.

Apparatus, method and computer program related to information about SCP(s) and SEPP(s) stored in NRF

There is provided an apparatus that comprises means for receiving a request from a second network function including information relating to the second network function, determining, based on the information relating to the second network function, at least one proxy function and in response to the request, providing to the second network function information relating to the at least one determined proxy function.

HSS-BASED P-CSCF RESTORATION TRIGGERED BY AS

Described herein are techniques, devices, and systems for using an application server (AS) to trigger home subscriber server (HSS)-based proxy call session control function (P-CSCF) restoration for a user equipment (UE) in order to restore service to the UE via an in-service P-CSCF node. For example, an AS is configured to receive, from a serving CSCF (S-CSCF) node, an indication that a P-CSCF node assigned to a UE is unavailable, and, in response, the AS is configured to send, to a HSS, a request to initiate P-CSCF restoration for the UE. In turn, the HSS or a Unified Data Management (UDM) node is configured to send, to a control node, an indication to perform the P-CSCF restoration for the UE. The disclosed AS-triggered, HSS-based P-CSCF restoration procedure restores service to the UE.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR OPTIMIZING NETWORK TRAFFIC DISTRIBUTION USING TIMESLOT-BASED TRACKED PRODUCER NETWORK FUNCTION (NF) PERFORMANCE DURING PRODUCER NF SELECTION

A method for optimizing network traffic distribution using timeslot-based tracked producer network function (NF) performance during producer NF selection is performed at a service communications proxy (SCP) including at least one processor. The method includes tracking a performance characteristic of producer NFs across different timeslots. The method further includes receiving, from a consumer NF, a service based interface (SBI) service request. The method further includes identifying eligible producer NFs capable of handling the SBI service request. The method further includes selecting, from the eligible producer NFs, in a manner that at least partially overrides priorities of the eligible producer NFs, and based on the tracked performance characteristic across the different timeslots, a producer NF to handle the SBI service request. The method further includes forwarding the SBI service request to the producer NF.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RESOLUTION OF INTER-NETWORK DOMAIN NAMES
20220417204 · 2022-12-29 ·

A method for resolution of inter-network domain names between telecommunications networks includes storing, at a security edge protection proxy (SEPP) of a home network, a mapping between a domain name and a network address of a producer network function of the home network. The method includes receiving, at the SEPP of the home network, a request message from a consumer network function of a visitor network. The method includes resolving, at the SEPP of the home network, a request message domain name of the request message using the mapping between the domain name and the network address of the producer network function of the home network.

MEC-based distributed computing environment with multiple edge hosts and user devices

Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.

WIRELESS COMMUNICATION METHOD BETWEEN A CLIENT OBJECT AND A SERVER OBJECT
20220408264 · 2022-12-22 ·

The present inventions concerns a method for wireless communication between a client object (2) and a server object (1), characterized in that it comprises the implementation by a gateway (10) of steps of: (a) Detecting advertising packets broadcast by said server object (1); (b) Establishing a first connection between the gateway (10) and said server object (1) so as to block the broadcasting by said server object (1) of advertising packets, and retrieving identification information from said server object (1); (c) Establishing a second connection between the gateway (10) and said client object (2), by using as gateway (10) identification information said retrieved identification information of said server object (1), so as to simulate with the client object (2) a connection with the server object (1).

Methods, wireless communications networks and infrastructure equipment

A method of controlling communications within a wireless communications network is provided. The method comprises receiving, at a first infrastructure equipment acting as a donor node connected to a core network part of a wireless communications network, signals representing data from one or more others of infrastructure equipment, the data having been received at the one or more others of the infrastructure equipment from one or more communications devices or from other infrastructure equipment, and transmitting, by the first infrastructure equipment, the data from the one or more others of the infrastructure equipment to the core network part of the wireless communications network. At least one of the infrastructure equipment uses at least one spectral efficiency enhancing technique to receive the signals, the at least one spectral efficiency enhancing technique allowing the at least one infrastructure equipment to receive the signals in the backhaul communications link.