Techniques to prevent and/or minimize user equipment service disruptions in virtualized radio access network architectures

    公开(公告)号:US11304109B1

    公开(公告)日:2022-04-12

    申请号:US17094163

    申请日:2020-11-10

    Abstract: Presented herein are techniques to prevent and/or minimize user equipment (UE) service disruptions in a virtualized Radio Access Network (vRAN) architecture. In one example, a method may include establishing, via a central unit of a vRAN, a first radio connection for a UE via a first cell belonging to a first shared cell for the vRAN; determining that the UE is dual connectivity capable; instructing the UE to perform measurements for one or more other cells belonging to one or more other shared cells that have available capacity; obtaining measurement information from the UE for the one or more other cells; determining, based on the measurement information, a second cell among the one or more other cells having a highest measured signal strength; and establishing a second radio connection for the UE via the second cell belonging to the second shared cell.

    THIRD GENERATION PARTNERSHIP PROJECT (3GPP) PLUG AND PLAY (PNP) OPERATION IN A HYBRID OPEN RADIO ACCESS NETWORK (O-RAN) ENVIRONMENT

    公开(公告)号:US20210314211A1

    公开(公告)日:2021-10-07

    申请号:US16875272

    申请日:2020-05-15

    Inventor: Mark Grayson

    Abstract: Presented herein are techniques to facilitate Third (3rd) Generation Partnership Project (3GPP) Plug and Play (PnP) operation in a hybrid Open Radio Access Network (O-RAN) architecture. In one example, a method is provided that may include establishing a first network configuration session between a first network entity and a second network entity using first network configuration session triggers, wherein the second network entity is identified in a list of known network entities; repeatedly transmitting second network configuration session triggers to establish a second network configuration session between the first network entity and a third network entity not identified in the list of known network entities; and upon establishing the second network configuration session between the first network entity and the third network entity not identified in the list of known network entities, stopping the transmitting of the second network configuration session triggers.

    WIRELESS LAN (WLAN) PUBLIC IDENTITY FEDERATION TRUST ARCHITECTURE

    公开(公告)号:US20210218727A1

    公开(公告)日:2021-07-15

    申请号:US16742576

    申请日:2020-01-14

    Abstract: The disclosed technology relates to a process of evaluating any number of different identity providers (IDPs) and their respective set of credentials that are used to authenticate corresponding users to assist with the onboarding of the different IDPs in connection with Wi-Fi identity federations. In particular, the process allows a person's electronic identity and attributes (stored across one or more IDPs) to be determined once using a standard. Once trust has been established for the user, that trust can then be utilized across a number of different systems (e.g., Single-sign on). The same trust determination can be used without the need for the authenticity of the user identity to be re-evaluated with each new access request.

    TECHNIQUES FOR DECOUPLING AUTHENTICATION AND SUBSCRIPTION MANAGEMENT FROM A HOME SUBSCRIBER SERVER

    公开(公告)号:US20210185506A1

    公开(公告)日:2021-06-17

    申请号:US16896399

    申请日:2020-06-09

    Abstract: Techniques are described to provide for authentication and subscription management that are decoupled from a Home Subscriber Server (HSS). In one example, a method includes providing a device profile at an authentication function, wherein the device profile comprises identification information for a device for a plurality of access types including a first identifier for the device associated with a cellular access and a second identifier for the device associated with a wireless local area network access; obtaining an access request message associated with the device for the cellular access, wherein the access request message comprises the first identifier and an authentication attribute; generating authentication information for authenticating the device for the cellular access based, at least in part, on the authentication attribute; and generating, for transmission, an access accept message for the cellular access, wherein the access accept message comprises the first identifier, the second identifier, and the authentication information.

    CONTROLLING ACCESS TO NETWORKS IN A HETEROGENEOUS NETWORK ENVIRONMENT

    公开(公告)号:US20210120000A1

    公开(公告)日:2021-04-22

    申请号:US17136426

    申请日:2020-12-29

    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.

    SCALABLE PUBLIC KEY IDENTIFICATION MODEL

    公开(公告)号:US20210076215A1

    公开(公告)日:2021-03-11

    申请号:US16561949

    申请日:2019-09-05

    Inventor: Mark Grayson

    Abstract: The present technology pertains to a system, method, and non-transitory computer-readable medium for confirming the identities of devices requesting roaming access on a network by authoritative identity providers and proxies for authoritative identity providers. The technology can, in response to a receipt of a request from a device for roaming access, connect to an identity entity at an address by a network access provider, wherein the request for roaming access identifies an authoritative identity provider host name; receive a certificate from the identity entity; and determine, using the certificate, whether the identity entity is an authoritative identity provider or a proxy for an authoritative identity provider.

    Controlling access to networks in a heterogeneous network environment

    公开(公告)号:US10911453B2

    公开(公告)日:2021-02-02

    申请号:US15854155

    申请日:2017-12-26

    Abstract: Various implementations disclosed herein enable controlling access to networks. In various implementations, a method of controlling access to a network is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes obtaining an indication that a mobile device having access to a first network utilizing a first radio access technology (RAT) has requested access to a second network utilizing a second RAT. In some implementations, the method includes determining whether the access to the first network satisfies an authentication criterion associated with the second network. In some implementations, the method includes granting the mobile device access to the second network in response to determining that the access to the first network satisfies the authentication criterion associated with the second network. In some implementations, accessing the second network via the authentication criterion satisfies an operating threshold associated with the mobile device.

Patent Agency Ranking