Patent classifications
H04W88/182
PROVIDING ALTERNATE COMMUNICATION PROXIES FOR MEDIA COLLECTION DEVICES
Described herein are techniques that may be used to facilitate interactions between a media collection device and a remote computing device via the use of a proxy device. Such techniques may comprise establishing a first communication session between a media collection device and a proxy device via a short-range communication channel, transmitting, by the media collection device to the proxy device, status information via the first communication session, at least a portion of the status information subsequently forwarded by the proxy device to a remote computing device, determining that the media collection device is to be activated, upon determining that the media collection device is to be activated, establishing a second communication session between the media collection device and the remote computing device via a long-range communication channel, and transmitting, by the media collection device to the computing device, media content via the second communication session.
Service definition for private networks based on enhanced PLMN identifiers
A method for performing service authorization for private networks based on an enhanced PLMN identifier. The method includes receiving an attach request from a user equipment device (UE) via a private network, where the attach request includes an international mobile subscriber identity value (IMSI). The method further includes determining, based on the IMSI, an organization identifier and a token associated with the private network, where the token is included in an enhanced PLMN for granting the UE access to resources in the private network. The method further includes sending the token to the UE and a network proxy within the private network.
DEVICE FOR MANAGING UPDATE OF VEHICLE, METHOD FOR OPERATING THE SAME, AND VEHICLE
A device for managing update of a vehicle includes a communication device in communication with at least one control device of the vehicle and in communication with an OTA (Over The Air) server for software update of the at least one control device, and a controller that relays communication between the at least one control device and the OTA server, and controls the at least one control device.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING SERVICE COMMUNICATIONS PROXY (SCP) OR SECURITY EDGE PROTECTION PROXY (SEPP) TO APPLY OR OVERRIDE PREFERRED-LOCALITY ATTRIBUTE DURING NETWORK FUNCTION (NF) DISCOVERY
A method for applying or overriding a preferred-locality attribute during network function (NF) discovery includes, at a service communications proxy (SCP) or security edge protection proxy (SEPP) including at least one processor, receiving, from an NF, an NF discovery request including a preferred-locality attribute or lacking a preferred-locality attribute. The method further includes selecting, by the SCP or SEPP, a value for the preferred-locality attribute for the NF discovery request. The method further includes inserting, by the SCP or SEPP, the value for the preferred-locality attribute into the NF discovery request. The method further includes transmitting, by the SCP or SEPP, the NF discovery request to a network function repository function (NRF).
METHODS AND APPARATUS FOR SUPPORTING EFFICIENT MULTI-UNIVERSAL SUBSCRIBER IDENTIFY MODULE (MUSIM) USER EQUIPMENT (UE) OPERATION USING A MULTI-PATH PROXY
A communications system includes a non-MUSIM enhanced PLMN and a MUSIM enhanced PLMN. The MUSIM enhanced PLMN includes a novel Multi-Path (MP) Proxy node. The MP Proxy Node is controlled to switch between two alternative DL data flow paths to facilitate graceful path changeovers. Downlink (DL) data flow toward the non MUSIM enhanced network (e.g., PLMN-A) is based on the interaction between the MUSIM UE and the MUSIM enhanced network (e.g., PLMN-B) together with the novel MultiPath (MP) Proxy node.
Clientless VPN roaming with 802.1x authentication
The present disclosure is directed to systems and methods for clientless virtual private network (VPN) roaming with 802.1x authentication and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including, receiving, at a local proxy, an 802.1x communication including authentication information from a remote device wirelessly connected to a visited network, wherein the remote device requests access to an enterprise network; authenticating the remote device with the enterprise network using the authentication information; establishing an encrypted tunnel between the visited network and the enterprise network; and transmitting data between the remote device and the enterprise network through the encrypted tunnel.
WIRELESS COMMUNICATION NETWORK COMMUNICATIONS THROUGH SESSION COMMUNICATION PROXIES
A wireless communication network exchanges data communication over Session Communication Proxies (SCPs). In the wireless network, the SCPs determine and transfer location information and status data to a Network Repository Function (NRF). The NRF receives the location information and status data and prioritizes the SCPs based on the location information and the status data. A requesting Network Function (NF) transfers an NF request to the NRF. The NRF receives the NF request from the requesting NF. In response, the NRF generates and transfers a list that prioritizes the SCPs based on the location information and the status data to the requesting NF. The requesting NF selects one of the SCPs based on the location information and the status data and transfers NF data to the selected one of the SCPs. The selected one of the SCPs forwards the NF data to a target NF.
Use Of IP Networks For Routing Of Cellular Data Packets
A cellular data communication network includes a BBU connected to a UPF by an IP network. A first translation module translates GFP packets into IP packets transmitted over the IP network. A second translation module translates the IP packets back into IP packets and forwards the IP packets to the UPF. A PFCP proxy intercepts control packets of the UPF. Information snooped by the PFCP proxy is provided to a routing/SDN controller that programs the translation modules and a routing module to perform routing of packets in bypass of the UPF.
Mobile Accelerator
A mobile accelerator system includes point of presences (POPs) that includes an entry POP. The entry POP receives a query to a content server from a mobile device via a dedicated transport channel. The entry POP determines a direct connection score for a direct connection between the mobile device and the content server that does not traverse the mobile accelerator system. The entry POP determines a POP connection score for a connection between the mobile device and the content server through the entry POP and a candidate exit POP. The entry POP determines a dynamic path ranking based on the direct connection score, the POP connection score, and other POP connection score(s) associated with other candidate exit POP(s). The entry POP determines at least a portion of a dynamic path between the mobile device based on the dynamic path ranking and routes data transfers through that dynamic path.
Radio base station, edge server, and methods therein
A RAN node (2) receives, from a core network node (6, 7, 8), a first identifier that is used by a service, an application, or an edge server (5) to identify a radio terminal (1) connected to the RAN node (2), and associates the first identifier with a second identifier that is used by the RAN node (2) to identify the radio terminal (1). Further, the RAN node (2) communicates with the edge server (5) using the first identifier. It is thus, for example, possible to allow an MEC server (or an MEC application hosted on the MEC server) and a radio access network (RAN) node to directly exchange therebetween a control message regarding a specific radio terminal.