Abstract:
A device may include a processor configured to detect that an Internet Protocol Security (IPsec) tunnel from a user equipment (UE) device connected via a WiFi connection has become idle, based on the IPsec tunnel meeting an idleness criterion, and instruct the UE device to tear down the IPsec tunnel, in response to detecting that the IPsec tunnel from the UE device connected via the WiFi connection meets the idleness criterion. The device may be further configured to receive a mobile terminating call for the UE device; establish a new IPsec tunnel to the UE device via the WiFi connection, in response to receiving the mobile terminating call for the UE device; and forward the received mobile terminating call to the UE device via the established new IPsec tunnel.
Abstract:
One or more devices are configured to receive a request, from a point of sale terminal, to verify a status of a user device being used to settle a transaction with the point of sale terminal. The status may indicate whether the user device has been reported stolen to an operator network. The one or more device may receive a user device identifier, from the point of sale terminal, that identifies the user device. The one or more devices may determine the status of the user device based on the user device identifier. The one or more devices may generate a response indicating the status of the user device. The one or more devices may send the response indicating the status of the user device to the point of sale terminal to permit the point of sale terminal to selectively settle the transaction.
Abstract:
A device may receive, from a mobile device and via a first radio access network, a request for a service. The device may receive a mobile device identifier that identifies the mobile device on a second radio access network. The second radio access network may be a different type of radio access network than the first radio access network. The device may provide the mobile device identifier to an equipment identity register. The device may receive, from the equipment identity register, an authentication indicator that indicates whether to permit or deny access to the service by the mobile device and via the first radio access network. The device may selectively permit or deny the mobile device access to the service, via the first radio access network, based on the authentication indicator.
Abstract:
A device establishes a first encrypted tunnel with a first active security gateway at a first data center to enable the device to communicate, via the first encrypted tunnel, with a first access and mobility management function (AMF) at the first data center. The device forwards, via the first encrypted tunnel and the first active security gateway, a first User Equipment device (UE) message to the first AMF. The device determines an occurrence of a failure or overload condition at the first active security gateway, and establishes, based on the determined occurrence of the failure or overload condition, a second encrypted tunnel with a standby security gateway at a second data center to enable the device to communicate, via the second encrypted tunnel, with the first AMF. The device forwards, via the second encrypted tunnel and the standby security gateway, at least one second UE message to the first AMF.
Abstract:
A system described herein may provide a technique for a selection of an Interworking Function (“IWF”) that facilitates an interworking between a licensed wireless network and another wireless network, such as an unlicensed wireless network, based on a geographical location of a User Equipment (“UE”) that is connected to the licensed wireless network and the other wireless network. The IWF may be selected from a set of candidate IWFs based on respective locations of the candidate IWFs and the UE and/or a wireless access point associated with the other wireless network. The IWF may communicate with the UE, via the other wireless network, using one or more tunnels. The IWF may identify control plane and user plane traffic received via the tunnel(s), and may forward such communications to appropriate network devices of the licensed wireless network.
Abstract:
A device may include a processor configured to detect that an Internet Protocol Security (IPsec) tunnel from a user equipment (UE) device connected via a WiFi connection has become idle, based on the IPsec tunnel meeting an idleness criterion, and instruct the UE device to tear down the IPsec tunnel, in response to detecting that the IPsec tunnel from the UE device connected via the WiFi connection meets the idleness criterion. The device may be further configured to receive a mobile terminating call for the UE device; establish a new IPsec tunnel to the UE device via the WiFi connection, in response to receiving the mobile terminating call for the UE device; and forward the received mobile terminating call to the UE device via the established new IPsec tunnel.
Abstract:
A device may include a processor configured to detect that an Internet Protocol Security (IPsec) tunnel from a user equipment (UE) device connected via a WiFi connection has become idle, based on the IPsec tunnel meeting an idleness criterion, and instruct the UE device to tear down the IPsec tunnel, in response to detecting that the IPsec tunnel from the UE device connected via the WiFi connection meets the idleness criterion. The device may be further configured to receive a mobile terminating call for the UE device; establish a new IPsec tunnel to the UE device via the WiFi connection, in response to receiving the mobile terminating call for the UE device; and forward the received mobile terminating call to the UE device via the established new IPsec tunnel.
Abstract:
Systems and method are provided for a temporary network slice usage barring service within a core network. A network device in the core network receives a slice barring information message for an application function (AF). The slice barring information message includes a unique subscriber identifier associated with a user equipment (UE) device to be barred from a network slice and indicates a barring expiration time. The network device stores barring parameters based on the slice barring information message. The barring parameters include a slice identifier associated with the AF, the unique subscriber identifier, and the barring expiration time. The network device sends a barring instruction message to another network device associated with the network slice. The barring instruction message includes the unique subscriber identifier and the barring expiration time. The other network device enforces temporary barring of the UE device from the network slice based on the barring instruction message.
Abstract:
A device may receive, from an access network, a mobile device identifier. The mobile device identifier may identify a mobile device that is connected to the access network. The device may receive or determine subscriber information associated with the mobile device identifier. The subscriber information may identify one or more users associated with the mobile device. The device may provide the mobile device identifier and the subscriber information for determination of an action indicator. The action indicator may indicate an action to perform with respect to the mobile device identifier. The device may receive the action indicator based on providing the mobile device identifier and the subscriber information. The device may provide the action indicator for routing toward the mobile device for performance of the action.
Abstract:
Systems and methods described herein enable 5G core session management function (SMF)/user plan function (UPF) relocation to support ATSSS-enabled evolved packet data gateways (ePDG). An ePDG receives an access traffic steering, switching and splitting (ATSSS) trigger message from a user equipment (UE) device. The UE device is connected via a first session using a session management function (SMF) and a via a second session using a packet data network gateway (PGW). The ATSSS trigger message includes an SMF identifier for the SMF. The ePDG sends, in response to the ATSSS trigger message, a request to the SMF to merge the first session and the second session into a single registration.