17932695. SYSTEMS AND METHODS FOR SERVICE-BASED AUTOMATIC IDENTITY SWITCHING FOR A DEVICE IN A PRIVATE NETWORK simplified abstract (Verizon Patent and Licensing Inc.)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR SERVICE-BASED AUTOMATIC IDENTITY SWITCHING FOR A DEVICE IN A PRIVATE NETWORK

Organization Name

Verizon Patent and Licensing Inc.

Inventor(s)

Sylvestre Demonget of Millburn NJ (US)

Anand J. Shah of Parsippany NJ (US)

David Albert Rossetti of Randolph NJ (US)

Madhusudan Mandyam Bheemarayan of Hillsborough NJ (US)

SYSTEMS AND METHODS FOR SERVICE-BASED AUTOMATIC IDENTITY SWITCHING FOR A DEVICE IN A PRIVATE NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 17932695 titled 'SYSTEMS AND METHODS FOR SERVICE-BASED AUTOMATIC IDENTITY SWITCHING FOR A DEVICE IN A PRIVATE NETWORK

Simplified Explanation

The system described in the patent application can identify unauthorized traffic associated with a User Equipment (UE) connected to a first network, determine a second network where the traffic is authorized, and instruct the UE to switch to a specific UE identity associated with the second network to output the traffic.

  • The system can identify traffic associated with a UE connected to a first network.
  • The system can determine if the traffic is not authorized via the first network based on policies.
  • The system can identify a second network where the traffic is authorized and instruct the UE to switch to a specific UE identity associated with the second network to output the traffic.

Potential Applications

This technology could be applied in mobile networks, IoT devices, and other communication systems where seamless network switching based on authorization policies is required.

Problems Solved

This technology solves the problem of unauthorized traffic being sent over a network that does not support it, by automatically switching to a network where the traffic is authorized.

Benefits

The benefits of this technology include improved network security, efficient utilization of network resources, and seamless user experience when switching between networks.

Potential Commercial Applications

A potential commercial application of this technology could be in mobile network operators' systems to ensure that only authorized traffic is transmitted over their networks, enhancing network reliability and security.

Possible Prior Art

One possible prior art for this technology could be the concept of network selection in mobile devices based on signal strength and network availability, but not specifically based on traffic authorization policies.

Unanswered Questions

How does the system handle cases where the second network is not available or authorized for the UE to switch to?

The system may need to have a fallback mechanism in place to handle situations where the second network is not accessible or authorized for the UE to switch to.

What happens if the UE encounters issues when switching to the specific UE identity associated with the second network?

The system may need to have error handling procedures in place to address any issues that may arise when the UE attempts to switch to the specific UE identity associated with the second network.


Original Abstract Submitted

A system described herein may identify traffic associated with a User Equipment (“UE”) that is connected to a first network. The UE may maintain a plurality of UE identities via one or more SIM (“Subscriber Identification Module”) cards, Universal Integrated Circuit Cards (“UICCs”), etc. The system may determine, based on one or more policies, that the traffic is not authorized via the first network. In some situations, the traffic may not be authorized if the first network does not support a type, service, etc. of the traffic. The system may identify a second network, based on the one or more policies, via which the traffic is authorized, and may indicate the second network to the UE. The UE may automatically (e.g., without user intervention) switch to a particular UE identity that is associated with the second network, and may output the traffic via the second network using such UE identity.