Abstract:
A network component communicating with a user equipment (UE) and a server. The network component receives a first packet from the UE, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, receives a second packet from the server and determines whether to transmit a signal to the UE based on the second packet received from the server. A UE having a transceiver and a processor. The UE transmits a first packet to the network component, wherein the first packet indicates to the network component that the network component is to perform operations on behalf of the UE to maintain a persistent connection, identifies an out of service (OOS) event, receives registration information from the network component and registers with the server based on the registration information received from the network component.
Abstract:
Techniques to protect subscriber identity in messages communicated between a user equipment (UE) and a cellular wireless network entity by using multiple ephemeral asymmetric keys are disclosed. The UE determines multiple ephemeral UE public and secret key pairs, while the cellular wireless network entity provides a network public key to the UE. The network public key may be updated over time. Multiple encryption keys based on the multiple ephemeral UE secret keys and the public network key are derived and used to encrypt a subscription permanent identifier (SUPI) to generate multiple subscription concealed identifiers (SUCIs). Each SUCI is used only once for messages communicated to a cellular wireless network and discarded after use. New SUCI are generated when the network public key is updated.
Abstract:
Apparatus and methods to support IP flow mobility (IFOM) via multiple wireless accesses in a wireless device are disclosed. The wireless device initiates network-based IFOM (NB-IFOM) to establish and manage IP flows. Support for NB-IFOM is negotiated during initial attach procedures to either or both wireless accesses and by using packet data network (PDN) connectivity procedures. The wireless device sends routing rules including priorities to apply to both existing and future IP flows or to future IP flows only. The wireless device requests to move IP flows from a source access to a target access. When a new wireless access is added to an existing PDN connection, an identical IP address for the wireless device is allocated as used for the existing PDN connection. The network establishes a GPRS tunneling protocol (GTP) tunnel for the new wireless access while maintaining a previously established GTP tunnel for the existing wireless access.
Abstract:
Apparatus and methods to support handover of emergency services sessions by network elements and by a wireless device between wireless networks are disclosed. The wireless device indicates an emergency services handover to applicable network elements, including an evolved Packet Data Gateway (ePDG), in one more messages when transferring an established emergency services session from a cellular wireless network to an untrusted non-cellular wireless network. In some embodiments, the wireless device includes a predefined string as part of a set of identification data in an IKE_AUTH request message sent to the ePDG. In some embodiments, the wireless device includes a previously allocated IP address within a payload of the IKE_AUTH request message to indicate handover of an existing session. By providing both the predefined “EMERGENCY” string and the previously allocated IP address, the wireless indicates a handover of an emergency services session between wireless networks.
Abstract:
Apparatus and methods to support location specific control to allow and/or disallow access to services through untrusted wireless networks by a wireless communication device are disclosed. One or more network elements obtain a location of the wireless communication device and selectively allow and/or disallow access to one or more cellular network services and/or one or more access point names (APNs) based on the location of the wireless communication device when connecting through an untrusted wireless network.
Abstract:
Disclosed are systems, methods, integrated circuits and computer readable storage media for configuring time sensitive communications (TSC). The configuring of the TSC includes monitoring, by a user plane function (UPF), a source and destination of packets in a first protocol data unit (PDU) session of a first user equipment (UE) and in a second PDU session of a second UE, pairing a first device side TSN translator (DS-TT) port of the first UE with a second DS-TT port of the second UE when the first PDU session and the second PDU session are served by the same UPF, wherein the pairing is based on the monitoring of the first and second PDU sessions and when the first DS-TT and second DS-TT ports are paired, communicating the packets between the first UE and the second UE in a UE-UE communication without traversing the TSN.
Abstract:
This Application sets forth techniques for routing emergency (SMS) messages under limited-service scenarios. One technique can be implemented by a network entity associated with a mobile network operator (MNO), and include the steps of (1) receiving an SMS message from a wireless device, and (2) in response to determining that (i) the wireless device is communicatively coupled to the MNO under a limited-service connection due to being unaffiliated with the MNO, and (ii) a destination address of the SMS message corresponds to an emergency service: (a) identifying at least one emergency service provider that corresponds to the MNO, and (b) providing at least a portion of the SMS message to the emergency service provider.
Abstract:
Systems and methods provide steering of roaming (SoR) information during a user equipment (UE) mobility registration process. In other systems and methods, instead of triggering mobility and periodic registration, a UE performs initial registration until a valid SoR is received in a visited country or network as long as a subscriber identification module (SIM) or a universal SIM (USIM) of the UE indicates that the UE is expected to receive SoR information due to initial registration in a visited public land mobile network (VPLMN).
Abstract:
A user equipment (UE) is configured to transmit a first registration request to a network, receive a registration accept message in response to the first registration request comprising a rejected network slice and an indication of a rejection cause corresponding to the rejected network slice and transmit a second registration request to the network comprising a requested network slice, wherein the requested network slice and the rejected network slice are a same network slice.
Abstract:
Apparatus and methods to support parallel access to services of multiple subscriber identity modules (SIMs) and/or electronic SIMs (eSIMs) by a wireless device are disclosed. The wireless device is a single-radio wireless device that includes wireless circuitry that supports an active voice or video connection via a single radio access network of a cellular wireless network at a time. To send or receive data for a second SIM/eSIM, when an active voice or video connection for a first SIM/eSIM uses the wireless circuitry, the single-radio wireless device can i) establish parallel, linked protocol data unit (PDU) sessions for different SIMs, ii) multiplex traffic for different SIMs over a common radio connection with SIM information embedded in protocol headers for routing by network equipment, and/or iii) use an additional dedicated bearer using a first, active SIM for each data network name (DNN) over which to route for a second, suspended SIM.