SYSTEMS AND METHODS FOR GENERATING NETWORK POLICY DECISIONS FOR DATA SESSIONS

    公开(公告)号:US20240187532A1

    公开(公告)日:2024-06-06

    申请号:US18061719

    申请日:2022-12-05

    IPC分类号: H04M15/00

    CPC分类号: H04M15/66

    摘要: A method may include receiving, by a policy control function (PCF), a first message including presence reporting area (PRA) information and status information identifying a type of network coverage associated with the PRA information. The method may also include determining, by the PCF, a policy for a user equipment (UE) device data session based on the received first message, and forwarding, by the PCF and prior to establishing the UE device data session, a second message identifying the determined policy to at least one of a session management function (SMF) or an access and mobility management function (AMF). The method may further include applying the determined policy to the UE device data session.

    SYSTEM AND METHOD FOR MONITORING USAGE IN A CONVERGED CHARGING SYSTEM

    公开(公告)号:US20220239746A1

    公开(公告)日:2022-07-28

    申请号:US17463665

    申请日:2021-09-01

    IPC分类号: H04L29/08 H04L12/26

    摘要: Systems and methods described herein include receiving, at a network device, a message including an identifier associated with a subscriber and an identifier associated with a rating group associated with one or more data flows and determining a data quota and one or more usage monitoring thresholds associated with the subscriber. The data quota indicates a first amount of data associated with the rating group that the subscriber is authorized to use during a time period and the one or more usage monitoring thresholds indicate one or more second amounts of data associated with the rating group and one or more service flows that the subscriber is authorized to use during the time period. The network device transmits the data quota and the one or more usage monitoring thresholds, receives data usage information, and processes the data usage information.

    METHOD AND SYSTEM FOR CARRIER-INITIATED TRAFFIC TUNING AND COMMUNICATION OF SUBSCRIBER PARAMETERS

    公开(公告)号:US20190268808A1

    公开(公告)日:2019-08-29

    申请号:US15906931

    申请日:2018-02-27

    摘要: A network device for a mobile carrier network sends, to a third-party content platform, a client message including a first dedicated subscription parameter extension. The first dedicated subscription parameter extension indicates one or more subscription parameters for a data flow between a user equipment (UE) device that originated the client message and the third-party content platform. The network device receives, from the third-party content platform, a server message including a second dedicated subscription parameter extension. The second dedicated subscription parameter extension confirms the third-party content platform will abide by the one or more subscription parameters. The network device generates, based on the one or more subscription parameters, a policy enforcement rule for the data flow that relies, at least in part, on cooperation of the third-party content platform.

    SYSTEMS AND METHODS FOR DYNAMIC ACCESS AND MOBILITY POLICY REFRESH IN WIRELESS NETWORKS

    公开(公告)号:US20240284176A1

    公开(公告)日:2024-08-22

    申请号:US18169921

    申请日:2023-02-16

    IPC分类号: H04W12/08 H04W12/37

    CPC分类号: H04W12/08 H04W12/37

    摘要: A system described herein may output a first access policy request associated with a User Equipment (“UE”). The system may receive a first access policy in response to the first access policy request, and may identify, after receiving the first access policy, that the first access policy has expired. The system may output, based on identifying that the first access policy has expired, a second access policy request associated with the UE, may receive a second access policy in response to the second access policy request, and may output the second access policy to at least one of the UE, or a radio access network (“RAN”) to which the UE is connected. The RAN may provide access to the UE in accordance with the first access policy until receiving the second access policy, after which the RAN may provide access to the UE in accordance with the second access policy.

    Systems and methods for network-based encryption of a user equipment identifier

    公开(公告)号:US11985497B2

    公开(公告)日:2024-05-14

    申请号:US17656145

    申请日:2022-03-23

    IPC分类号: H04W12/02

    CPC分类号: H04W12/02

    摘要: A network device may receive a request for authentication data, for a UE attempting to register with a network, and an indication that a SUCI utilized by the UE is unencrypted, and may request, from a data store, the authentication data for the UE. The network device may provide, to the data store, a notification instructing the data store to push a UE parameters update (UPU) once a registration process is complete for the UE, and may receive the authentication data from the data store. The network device may complete the registration process for the UE based on the authentication data, and may receive the UPU from the data store based on the registration process being completed. The network device may cause the UE to detach from the network after utilizing the UPU, and may cause the UE to reconnect to the network with an encrypted SUCI.

    Systems and methods for authenticating user devices

    公开(公告)号:US11949668B2

    公开(公告)日:2024-04-02

    申请号:US18168710

    申请日:2023-02-14

    IPC分类号: H04L9/40

    CPC分类号: H04L63/08

    摘要: A method may include receiving, from a user device, a registration request that includes a subscription concealed identifier (SUCI), identifying a network element to decode the SUCI and forwarding the SUCI to the identified network element. The method may also include decoding the SUCI to identify a subscription permanent identifier (SUPI), identifying a unified data management (UDM) device associated with the SUPI and transmitting an authentication request to the identified UDM device to obtain authentication information associated with the user device. The method may further include receiving the authentication information and authenticating the user device based on the received authentication information.