Abstract:
Aspects described herein relate to managing service data flows and corresponding data radio bearers. An indication of a binding between a service data flow and a data radio bearer with an access point can be received. The data radio bearer for binding to the service data flow can be determined as either an existing data radio bearer that supports one or more quality-of-service (QoS) parameters of the service data flow or a new data radio bearer to support one or more data flows of the service data flow. An existing data radio bearer can be modified or a new data radio bearer can be established based on the determination. Based on the binding, a packet can be transmitted using the data radio bearer based at least in part on classifying the packet as related to the service data flow.
Abstract:
Aspects of the disclosure relate to mechanisms for interworking between legacy and next generation core networks in a communication network. In some examples, a connectivity request originated by a user equipment towards a legacy core network may be transferred to a next generation core network when the user equipment supports the radio access technology of the next generation core network.
Abstract:
A method, operational at a radio access network (RAN) node, is provided for establishing a secure interface with a service network node. A service registration request is received from a client device. A service network associated with the connectivity network is determined or ascertained, wherein the service network node operates within the service network. The service registration request is forwarded to a connectivity network node within the connectivity network. A secure connection is then established with a service network node via the connectivity network node. Communications between the radio access network node and the client device may then be secured based on the key.
Abstract:
In an aspect, a network may support a number of client devices. In such a network, a client device transmits a request to communicate with a network, establishes a security context, and receives one or more encrypted client device contexts from the network. An encrypted client device context enables reconstruction of a context at the network for communication with the client device, where the context includes network state information associated with the client device. The client device transmits a message (e.g., including an uplink data packet) to the network that includes at least one encrypted client device context. Since the network device can reconstruct the context for the client device based on an encrypted client device context, the network device can reduce an amount of the context maintained at the network device in order to support a greater number of client devices.
Abstract:
According to one aspect, a method includes obtaining, at a device, a plurality of contexts with a plurality of serving nodes. Each of the plurality of contexts may be associated with a context-unique identifier. Each context-unique identifier may uniquely identify one context in the plurality of contexts and be associated with data corresponding to a respective context. The data may be sent via the plurality of contexts via a radio link shared by the plurality of contexts. According to another aspect, a method includes associating each of the plurality of contexts with a separate set of credentials. Each set of credentials uniquely identifies one context and may be associated with data corresponding to a respective context. The data corresponding to a respective context may be encrypted based on the set of credentials associated with the context and sent via a radio link shared by the plurality of contexts.
Abstract:
The disclosure relates in some aspects to the establishment, discovery, and creation of virtual wireless communication networks. A device can create a virtual wireless communication network with a serving mobile network operator (MNO), e.g., via a service provider, and provide information regarding connectivity to the virtual wireless communication network. Provided information can include, without limitation, restricted access to content and uploaded specific content. The disclosure also relates in some aspects to enabling a network to configure access and policing entities to support a virtual wireless communication network.
Abstract:
Mobile devices may provide information in registration messages to improve registration and paging. A mobile device may, for example, indicate services or available connections, or both, in a registration message. Additionally, mobile devices may include context and/or mobility information in the registration message (e.g. it may include an indication that the mobile device is capable of receiving a paging message via a non-cellular RAT which indication may include an IP address and/or a port number at which the mobile device can receive a page. In some examples, the mobility information may include a mobility status of the mobile device and/or a predication of a time during for non-cellular RAT coverage). Information included in registration messages may be identified according to sets of active services, available connections (e.g. RATs available for connection for the mobile device), or network capabilities. In some examples, a reporting policy or user indication may provide for certain information to be included in a registration message (e.g. indicating the services which could be included in the registration message).
Abstract:
A method to support two scenarios in trusted wireless local area network (WLAN) access is provided herein. The method may be performed, for example, by a user equipment (UE). The method generally includes requesting a nonseamless wireless offload (NSWO) connection to a network during an extensible authentication protocol (EAP) procedure and receiving, after successful authentication, at least one of an internet protocol (IP) address or a reason code from a network entity indicating NSWO is not allowed.
Abstract:
Certain aspects of the present disclosure provide techniques for establishing a dual third generation partnership project (3 GPP) access protocol data unit (PDU) session. An example method performed by a user equipment includes selecting a first access link for a protocol data unit (PDU) session, selecting a second access link based on the first access link, and establishing the PDU session based on the selected first access link and the second access link.
Abstract:
Various embodiments enable broadcast communications security. Various embodiments enable the authentication of broadcast communications. Various embodiments may enable asymmetric authentication and integrity protection of small size messages, such as one or more signed messages totaling a length of 250 bytes or less. Various embodiments may support cryptographic signing of beacon type messages using certificates. Various embodiments may include generating a beacon type message, cryptographically signing the beacon type message at least in part using a certificate to generate a signed beacon message, and sending the signed beacon type message in one or more broadcast transmissions in conjunction with, or independently of, certificate information used to verify the signed beacon message.