PERMISSION BASED RESOURCE AND SERVICE DISCOVERY

    公开(公告)号:US20210328997A1

    公开(公告)日:2021-10-21

    申请号:US17365255

    申请日:2021-07-01

    Abstract: Current discovery mechanisms lack capabilities, such as capabilities related to permissions associated with a given registrant for example. In an example embodiment, a registrant of a service layer can communicate with a network node that hosts the service layer. The network node may receive a discovery request for a resource from the registrant. The discovery may request include various context. For example, the context of the discovery request may be indicative of an operation that the registrant intends to perform on the resource, a role that the registrant intends to assume if the registrant accesses the resource, a location in which the registrant intends to access the resource, or a subscription plan that the registrant intends to use if the registrant accesses the resource. Based on the context of the discovery request, the network node may determine whether one or more resources at the service layer satisfy the discovery request.

    Managing MBMS membership at the service capability exposure function

    公开(公告)号:US11051359B2

    公开(公告)日:2021-06-29

    申请号:US16685198

    申请日:2019-11-15

    Abstract: The present application is directed to an apparatus on a network including a non-transitory memory having executable instructions for configuring membership of a group, and a processor that is operably coupled to the non-transitory memory. The processor is configured to receive a request from a server to add a device to the group, to send a reply to the server that the device is authorized to join the group, to deliver a message to the device when a predetermined condition is met. The device status is selected from joined, active, authorized and combinations thereof. The predetermined condition is selected from a percentage or number of devices in the group are listening, a set time has elapsed, and combinations thereof. The present application is also directed to a networked system including a server and an apparatus in communication with the server.

    SERVICE CAPABILITY EXPOSURE AT THE USER EQUIPMENT

    公开(公告)号:US20210136548A1

    公开(公告)日:2021-05-06

    申请号:US17149902

    申请日:2021-01-15

    Abstract: The present application is directed to an apparatus communicating with a mobile core network. The apparatus includes a non-transitory memory including instructions stored thereon for configuring a service. The apparatus also includes a processor operably coupled to the non-transitory memory configured to execute the instructions of: (i) receiving, from a core network node, first information for accessing a Network Exposure Function (NEF); (ii) receiving a request for the service from an application on user equipment (UE); (iii) creating a request for the service; (iv) using the first information to send the created request to the NEF; (v) receiving a response from the NEF, the response includes a second information; and (vi) sending the second information to the application. The service includes one or more of buffering, background data transfer, communication pattern configuration, sponsored services, reachability, mobile originating/paging-off mode, and value added services. Moreover, the received request includes parameters to configure the service. Further, the second information includes parameters selected from desired time window, desired data transfer size, desire quality of service, indication whether flow is sponsored, maximum cost basis, qualitative measurements and combinations thereof.

    System and methods for achieving end-to-end security for hop-by-hop services

    公开(公告)号:US10999289B2

    公开(公告)日:2021-05-04

    申请号:US15770900

    申请日:2016-10-28

    Abstract: An IoT E2E Service Layer Security Management system supports methods and procedures to allow an application to establish, use, and teardown an IoT SL communication session that has application specified E2E security preferences and that targets one or more SL addressable targets (e.g., an IoT application, device, or gateway SL addressable resource). E2E SL Session based methods and procedures described herein achieve a required overall E2E security level, by allowing IoT SL instances to influence and coordinate hop security for a multi-hop communication path spanning across multiple intermediary nodes. The methods and procedures described herein reduce overhead, simplify and obviate the need for E2E service level nodes (initiation and termination nodes) from having to perform security service negotiation, in order to establish secure hop-by-hop security associations aligned with an E2E security requirement.

    MTC service selection in the (S)Gi-LAN

    公开(公告)号:US10965588B2

    公开(公告)日:2021-03-30

    申请号:US15748829

    申请日:2016-07-29

    Abstract: As described herein, various nodes in a 3GPP network, including a user equipment (UE), can be used to insert metadata in uplink traffic so that the network and/or an (S)Gi-LAN can make traffic steering decisions based on the metadata. For example, the UE can insert metadata into its uplink traffic so that the services in the (S)Gi-LAN can be better leveraged. In one embodiment, network nodes are able to insert metadata that relates directly to the UE and that relates to the operating conditions of the network nodes that the UE is using to send uplink data, so that the services in the (S)Gi-LAN can be better leveraged.

Patent Agency Ranking