OPENROAMING AUGMENTATION METHOD FOR EAP FAILURES

    公开(公告)号:US20220141665A1

    公开(公告)日:2022-05-05

    申请号:US17388267

    申请日:2021-07-29

    Abstract: The presently claimed disclosure is directed to methods that may be implemented at a computer. Methods and systems consistent with the present disclosure may include extending protocols associated with authenticating client (i.e. supplicant) devices and with authorizing those supplicant devices to access a wireless network. These methods may include sending data relating to the failure of an authentication and/or an authorization process to a supplicant device attempting to access a wireless network. Methods discussed within may include securely sending failure codes or reasons to a supplicant device that identify why an authentication or authorization process failed. These methods may include sending messages between a supplicant device, an authenticator device, and an authentication and authorization server. After a first failure, the supplicant device may be able to access the wireless network after a reason or code of that failure has been reported to the supplicant device.

    REDUCING INTERFERENCE IN CBRS NETWORKS

    公开(公告)号:US20210352675A1

    公开(公告)日:2021-11-11

    申请号:US17379035

    申请日:2021-07-19

    Abstract: Systems, methods, and computer-readable media for radio resource management in a Citizens Broadband Radio Service (CBRS) network include one or more CBRS devices (CBSDs) which can obtain a group type associated with the CBSDs and their associated Radio Environment Map (REM) reports of one or more frequency channels of the CBRS network. The group type and the REM reports may be provided to a Self-Organizing Network (SON) manager of the CBRS network, where the SON manager may determine and provide to the CBSDs, one or more of a channel utilization information, transmission power, or mobility load management information for the CBSD, based on the group type and the REM reports.

    DISTRIBUTED MOBILITY MANAGEMENT FUNCTIONALITY

    公开(公告)号:US20200322776A1

    公开(公告)日:2020-10-08

    申请号:US16377642

    申请日:2019-04-08

    Abstract: Techniques are described for providing wireless network connectivity using a distributed mobility management functionality. In one example, each of a plurality of on-premise access points co-locate a mobility management functionality and a packet routing and forwarding functionality. Each of the plurality of on-premise access points obtain, from user equipment, a request to wirelessly connect to the on-premise access point. Each of the plurality of on-premise access points provide the user equipment with wireless network connectivity using the co-located mobility management functionality and the packet routing and forwarding functionality.

    Enterprise fabric configured to support cellular mobility

    公开(公告)号:US10791535B1

    公开(公告)日:2020-09-29

    申请号:US16562912

    申请日:2019-09-06

    Abstract: A mobility management entity (MME) controls an enterprise fabric. The MME receives from a mobile device via a cellular network a request to initiate an attach procedure. In response, the MME acquires from the mobile device a unique equipment identifier of the mobile device. The MME generates an enterprise identity for the mobile device based on the unique equipment identifier, and registers the enterprise identity in the enterprise fabric. The MME signals to a user plane function of the cellular network that the mobile device has been registered, to trigger the user plane function to acquire an Internet Protocol (IP) address of the mobile device based on the enterprise identity. The MME receives from the user plane function the acquired IP address. The MME sends to the mobile device, through the cellular network, an attach accept message that includes the acquired IP address for use by the mobile device.

    Mobile communications over secure enterprise networks

    公开(公告)号:US10785195B2

    公开(公告)日:2020-09-22

    申请号:US15854181

    申请日:2017-12-26

    Abstract: In various implementations, a method includes receiving a request to establish an end-to-end encrypted session between a device in an enterprise network and an external entity that is outside the enterprise network. In some implementations, the end-to-end encrypted session allows encrypted packets to be transmitted between the device and the external entity. In various implementations, the method includes determining whether the request satisfies an enterprise security criterion for establishing the end-to-end encryption session. In various implementations, the method includes in response to determining that the request satisfies the enterprise security criterion, triggering the establishment of the end-to-end encrypted session between the device in the enterprise network and the external entity that is outside the enterprise entity.

Patent Agency Ranking