Historical data support enhancement for network entities

    公开(公告)号:US12081420B2

    公开(公告)日:2024-09-03

    申请号:US17449711

    申请日:2021-10-01

    CPC classification number: H04L43/06 H04L43/022 H04L43/028 H04L43/04

    Abstract: For example, within a communication network environment a possibility for retrieval of historical data indicative of events occurring within the communication network environment and obtained from one or more data sources within the communication network environment is provided. Selection criteria is specified at a first device to be applied to the historical data for a query to be performed on the historical data kept in a historical data repository associated with a second device. At least one processing instruction is specified at the first device. The processing instruction determines the generation of a report based on the defined query. The selection criteria and the processing instruction is transmitted to the second device, and the report generated at the second device based on the transmitted selection criteria and processing instruction is received.

    Authorization in communication networks

    公开(公告)号:US12034733B2

    公开(公告)日:2024-07-09

    申请号:US17494930

    申请日:2021-10-06

    CPC classification number: H04L63/102 H04L63/083 H04W12/06 H04W12/08

    Abstract: According to an example aspect of the present invention, there is provided a method comprising, receiving, by an intermediary network function, a subscription request from a network function consumer requesting data of a network function producer, wherein the subscription request comprises a client credential assertion of the network function consumer and an access token, authorizing and authenticating, by the intermediary network function, the network function consumer upon successful validation of the access token and the client credential assertion validation and transmitting, by the intermediary network function, an access token request to an authorization server to get another access token, wherein said another access token is to be used to validate the network function consumer to access services of the network function producer, and the access token request comprises the client credential assertion of the network function consumer requesting data of the network function producer.

    Optimization of network function profile administration and registration

    公开(公告)号:US12034704B2

    公开(公告)日:2024-07-09

    申请号:US17394828

    申请日:2021-08-05

    Abstract: There are provided measures for optimization of network function profile administration and registration. Such measures exemplarily comprise, at a network repository function entity, receiving, from a control entity, network entity profile template information, storing said network entity profile template information, wherein said network entity profile template information comprises a network entity profile template including an identifier of said network entity profile template and a profile content of said network entity profile template, said profile content including at least one profile attribute, receiving, from a network entity, a network entity registration request comprising said identifier of said network entity profile template, and generating a network entity profile for said network entity based on said at least one profile attribute.

    METHOD, APPARATUS AND COMPUTER PROGRAM
    24.
    发明公开

    公开(公告)号:US20240054353A1

    公开(公告)日:2024-02-15

    申请号:US18446199

    申请日:2023-08-08

    CPC classification number: G06N3/098 H04L9/0819

    Abstract: According to an aspect, there is provided an apparatus comprising means for receiving, from a server, an authorisation request for a federated learning operation, the authorisation request identifying a plurality of user equipments, and means for determining, using subscription data associated with each of the plurality of user equipments, whether each of the plurality of user equipments are authorised to be used by the server for the federated learning operation. The apparatus also comprising means for, in response to determining that at least two of the plurality of user equipments are authorised, providing a message to each of the at least two of the plurality of user equipments that are authorised, each message comprising an encryption key associated with the federated learning operation.

    System and method for saving mobile battery and empowering user equipment for incoming communication and paging

    公开(公告)号:US11864116B2

    公开(公告)日:2024-01-02

    申请号:US17279438

    申请日:2018-09-25

    CPC classification number: H04W52/0258 H04W68/02

    Abstract: A system and method for saving mobile battery and empowering user equipment for controlling incoming communication and paging are provided. Also provided are a system and method for determining whether a mobile a device is in an idle mode, and in response to receiving an incoming communication from a service, determining whether the service associated with the incoming communication is on a reject list of services or a preferred list of services. The system performs a first action specified by a determination that the service is on the reject list of services or the service is not on the preferred list of services, and performs a second action specified by a determination that the service is on the preferred list of services. The first action differs from the second action.

    Security enhancement on inter-network communication

    公开(公告)号:US11818102B2

    公开(公告)日:2023-11-14

    申请号:US17232579

    申请日:2021-04-16

    CPC classification number: H04L63/0281 H04L63/08

    Abstract: Embodiments of the present disclosure relate to methods, apparatuses and computer readable storage media for inter-network communication. A first edge protection proxy in a first network receives a request for an access token from a network repository function in the first network. The access token is to be used by a first network function in the first network to request a service from a second network function in a second network. The first edge protection proxy validates the request based on configurations allowed to access services provided by networks different from the first network. If the validation of the request is successful, the first edge protection proxy transmits the request to a second edge protection proxy in the second network. The transmitted request comprises verified information concerning the first network function.

    AUTHORIZED MACHINE LEARNING MODEL RETRIEVAL FOR A COMMUNICATIONS NETWORK

    公开(公告)号:US20230353561A1

    公开(公告)日:2023-11-02

    申请号:US18306434

    申请日:2023-04-25

    CPC classification number: H04L63/0853 G06N20/00

    Abstract: Methods, systems, apparatuses, and computer program products are provided for authorized machine learning model retrieval for a communications network. In this regard, an access token request for one or more machine learning models related to a communications network is received from a network function service consumer (NFc). The access token request includes information to identify the one or more machine learning models. The NFc is then authorized with respect to the one or more machine learning models based on the information included in the access token request. Additionally, enhanced an access token for retrieving the one or more machine learning models is provided to the NFc based on valid authorization of the NFc with respect to the one or more machine learning models.

    Inter-PLMN communication
    28.
    发明公开

    公开(公告)号:US20230141233A1

    公开(公告)日:2023-05-11

    申请号:US18047355

    申请日:2022-10-18

    CPC classification number: H04W12/086 H04W12/106 H04W12/069

    Abstract: There is disclosed an apparatus. The apparatus comprises means for performing: initiating establishment of an N32-c transport layer security connection with an entity, the apparatus located in a first public land mobile network and the entity located in a second public land mobile network; sending from the apparatus to the entity on the N32-c transport layer security connection an N32-c handshake signalling message comprising domain name information of the apparatus to be used by the entity for establishing an N32-f transport layer security connection towards the apparatus; receiving a reply from the entity, the reply comprising domain name information of the entity to be used by the apparatus for establishing the N32-f transport layer security connection towards the entity; and using the domain name information received in the reply to establish the N32-f transport layer security connection towards the entity.

    Apparatus, method and computer program

    公开(公告)号:US12262427B2

    公开(公告)日:2025-03-25

    申请号:US17622921

    申请日:2019-06-28

    Abstract: An apparatus including means for receiving, from a first user equipment associated with a network via a first path, a request at a second user equipment associated with the network, for the second user equipment to act as a relay node for the first user equipment acting as a master node to provide a second path between the first user equipment and the network, wherein the first user equipment and the second user equipment are connected using a proximity service interface, performing, at the second user equipment, an authorisation procedure with the network to act as a relay node for the first user equipment and providing an indication to the first user equipment that the second user equipment is authorised to act as a relay node for the first user equipment.

    POST QUANTUM KEY ENCAPSULATION MECHANISM BASED SUCI ENCRYPTION

    公开(公告)号:US20250038969A1

    公开(公告)日:2025-01-30

    申请号:US18758392

    申请日:2024-06-28

    Abstract: Example embodiments of the present disclosure relate to SUCI encryption based on a post quantum key encapsulation mechanism. In an aspect, a terminal device generates a subscription concealed identifier (SUCI) of the terminal device based on a subscription permanent identifier (SUPI) of the terminal device and a public key of a home network of the terminal device, wherein the public key is generated based on a post quantum cryptography (PQC) key encapsulation mechanism (KEM). The terminal device then transmits the SUCI to a network device. According to some embodiments of the present disclosure, a new fully Post Quantum based SUCI ensures to avoid different kinds of attacks.

Patent Agency Ranking