Abstract:
A method, a corresponding apparatus, and a computer program product for dynamic charging over multiple network nodes. The method comprises collecting, at a first network node which has a first connection with a user equipment, charging information with respect to a second connection established between the user equipment and a second network node, wherein the second network node is connected with the first network node. The method also comprises combining charging information with respect to the first connection and the charging information with respect to the second connection. The method additionally comprises sending the combined charging information from the first network node to a core network entity for charging the user equipment. With the claimed inventions, the core network and wireless operators could be able to bill the services based on specific offloaded bearers considering associated QoS information, regarding to the case of multi-PLMN scenarios under network sharing.
Abstract:
A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection between the user equipment and a second network node which has a third connection with the first network node; setting an indicator in a packet to indicate whether a destination of user data in the packet is the first network node or the second network node; and transmitting the packet from the user equipment to the first network node via the first connection.
Abstract:
A method for proxy algorithm identity selection may comprise: selecting, at a first network node, a security algorithm identity for a user equipment which is determined to handover to a second network node, based at least in part on security information of the user equipment and a list of security algorithm identities for the second network node; generating security keys for a communication between the user equipment and the second network node, based at least in part on the selected security algorithm identity; providing the security keys and the selected security algorithm identity to the second network node from the first network node; and sending the selected security algorithm identity to the user equipment from the first network node, in response to a handover acknowledgement from the second network node.
Abstract:
A method, a corresponding apparatus, and a computer program product for dynamic charging over multiple network nodes. The method comprises collecting, at a first network node which has a first connection with a user equipment, charging information with respect to a second connection established between the user equipment and a second network node, wherein the second network node is connected with the first network node. The method also comprises combining charging information with respect to the first connection and the charging information with respect to the second connection. The method additionally comprises sending the combined charging information from the first network node to a core network entity for charging the user equipment. With the claimed inventions, the core network and wireless operators could be able to bill the services based on specific offloaded bearers considering associated QoS information, regarding to the case of multi-PLMN scenarios under network sharing.
Abstract:
Embodiments of the disclosure provide a method, device and computer readable medium for authentication. According to embodiments of the present disclosure, only the first terminal device in a group of terminal devices which requests to connect to a network needs to finish the whole authentication. Upon the first terminal device successfully accesses to the network, the remaining terminal devices in the same group can ignore the authentication. In this way, time for authentication is reduced and the calculation efforts related to authentication is reduced for a large number for terminal devices.
Abstract:
In accordance with an example embodiment of the present invention, there is provided an apparatus such as for example a mobile or a base station, comprising at least one processing core configured to compile a message comprising information concerning resources used in a communication network, the at least one processing core being configured to perform a first determination, that a second user equipment is engaged in a device-to-device session with a first user equipment, the at least one processing core being configured to, responsive to the first determination, include in the message information concerning the second user equipment, and a transmitter configured to cause the message to be transmitted toward a network node. The message may comprise a resource usage report and/or charging report, for example.
Abstract:
A fast-accessing method may comprise: establishing a first security connection between a first network node and a user equipment; obtaining first information from a second network node, wherein the first information comprises at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing second information to the second network node, in response to an indication of the second network node from the user equipment, wherein the second information comprises security information related to the user equipment; and sending the first information to the user equipment for establishing a second security connection between the user equipment and the second network node.
Abstract:
Methods and apparatus are provided for key pairing between peer D2D UEs in different eNBs or D2D areas. A method may comprise: receiving at a first access network node serving a first D2D area from a first user equipment in the first D2D area, a request for keys for a D2D communication between the first user equipment and a second user equipment, wherein the request comprises an identification of a second D2D area where the second user equipment is located and being different from the first D2D area; identifying a second access network node serving the second D2D area based on the identification; sending to the second access network node, a request for a security context of the second user equipment; and receiving from the second access network node the security context for obtaining the keys for the D2D communication.
Abstract:
A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection between the user equipment and a second network node which has a third connection with the first network node; setting an indicator in a packet to indicate whether a destination of user data in the packet is the first network node or the second network node; and transmitting the packet from the user equipment to the first network node via the first connection.
Abstract:
Methods for D2D connection re-establishment and related user equipments and radio access node are disclosed, wherein the D2D connection is established between a first user equipment and a second user equipment under the control of a radio access node. In one embodiment, the method comprises: receiving, by the first user equipments, a first message from the second user equipments, the first message comprising a first credential which is calculated by the second user equipment; verifying the first credential by the first user equipment; and sending a second message indicating acknowledgement of the D2D connection re-establishment from the first user equipment to the second user equipment upon successful verification of the first credential.