Abstract:
A user device may receive information indicating that a universal integrated circuit card has been installed in the user device, where the universal integrated circuit card may store a default table that includes network slice selection assistance information used to route data from the user device to correct slices of a network. The user device may execute an application stored in the user device based on receiving a selection of the application, where execution of the application may cause data to be generated. The user device may identify a slice of the network to which to route the data based on the network slice selection assistance information included in the default table. The user device may cause the data to be routed to the slice of the network identified based on the network slice selection assistance information included in the default table.
Abstract:
An orchestration device may receive a request to register available multi-access edge computing (MEC) resources to be shared with a network operator. For example, the available MEC resources may be provided by a provider operating a MEC host located in an edge region of a radio access network (RAN) associated with the network operator. The orchestration device may receive information related to a requested MEC session to support an application workload for a user equipment in communication with a base station located in the edge region of the RAN and assign at least a portion of the application workload to the MEC host based on a profile for the MEC host and a service level agreement specifying one or more performance requirements associated with the application workload. Accordingly, the orchestration device may cause the portion of the application workload to be transmitted to the MEC host.
Abstract:
A pre-provisioned mobile device and a system are provided that enables selection of proprietary feature services and proprietary applications specific to one cellular carrier from among two or more cellular carriers that have pre-provisioned the mobile device with carrier-specific proprietary feature services and proprietary applications. In response to insertion of a carrier-specific universal integrated circuit card, pre-provisioned proprietary feature services and proprietary applications specific to the carrier associated with the carrier-specific universal integrated circuit card are enabled for execution on the mobile device from a memory of the mobile device. Other examples allow for customized firmware and software builds.
Abstract:
A device may comprise a processor. The processor may be configured to determine, based on secure space information associated with the secure space, whether the device has entered the secure space. If the processor determines that the device has entered the secure space, the processor may disable an ability of the device to communicate wirelessly with networks other than a private network; enable an ability of the device to communicate wirelessly with the private network; connect the device wirelessly to the private network; and run an application hosted on the private network.
Abstract:
A device comprises a processor that may be configured to obtain a Public Land Mobile Network (PLMN) identifier (ID) from a signal broadcast by a network and determine whether the obtained PLMN ID is an original preferred PLMN ID of the device. When the processor determines that the obtained PLMN ID is the original preferred PLMN ID, the processor may attempt to attach to the network over a wireless link. When the attempt to attach to the network fails, the processor may rewrite, in a list of PLMN IDs, a non-preferred PLMN ID as a new preferred PLMN ID.
Abstract:
In some implementations, a first network device may receive an authorization request associated with a user device connecting to a network associated with first network device. The first network device may redirect the authorization request toward a second network device associated with a second service provider. The first network device may determine, based on a response to the authorization request, that the user device is subscribed to a service provided by the second service provider and that the user device is not authorized to connect to the network. The first network device may provide a temporary service to the user device to enable the user device to connect to the network for a limited period based on the user device being subscribed to the service provided by the second service provider and the user device not being authorized to connect to the network.
Abstract:
A computing device may receive a request to establish a virtualized environment to support a session for a client device in communication with the computing device over a network. The computing device may instantiate the virtualized environment in a trusted execution environment of the computing device, wherein the trusted execution environment may include one or more hardware resources that isolate the virtualized environment from a rich execution environment associated with the computing device. The computing device may cause a hardware security module associated with the computing device to obtain one or more cryptographic keys by communicating with a secure element of the client device, and the computing device may secure communication between a local operating system executing on the client device and the virtualized environment instantiated in the trusted execution environment using the one or more cryptographic keys.
Abstract:
An orchestration device may receive a request to register available multi-access edge computing (MEC) resources to be shared with a network operator. For example, the available MEC resources may be provided by a provider operating a MEC host located in an edge region of a radio access network (RAN) associated with the network operator. The orchestration device may receive information related to a requested MEC session to support an application workload for a user equipment in communication with a base station located in the edge region of the RAN and assign at least a portion of the application workload to the MEC host based on a profile for the MEC host and a service level agreement specifying one or more performance requirements associated with the application workload. Accordingly, the orchestration device may cause the portion of the application workload to be transmitted to the MEC host.
Abstract:
A device may scan for a carrier that includes an embedded Universal Integrated Circuit Card (eUICC), wherein the carrier is associated with a Mobile Network Operator (MNO). The device may hop on the carrier, authenticate with a network of the MNO without using an MNO profile stored in the eUICC, and gain limited access to the network in response to the authentication. The device may also register with the network while attached to the network. The registering may include downloading an operational MNO profile to the eUICC in the device and storing the MNO profile on the eUICC.
Abstract:
A system may determine, using first location data, that a client device is located in an interior of a premises in which multiple wireless network access points (APs) are deployed in a wireless network; identify, using second location data, locations of the client device within the interior; obtain, for the locations, a dataset including wireless network signal strength values corresponding to signal coverage areas associated with the wireless network APs; generate, using the dataset, a wireless network mapping corresponding to a layout of the interior; evaluate, against connectivity rules, the wireless network mapping with respect to overlapping signal coverage areas, the connectivity rules defining operations for connecting the client device to the wireless network as a function of the locations; and apply at least one of the operations to the client device at a current location relative to a preceding location and/or a succeeding location of the client device.