18063638. METHODS FOR TRACKING UE LOCATION TO ENABLE ACCESS TO A NON-PUBLIC NETWORK simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

METHODS FOR TRACKING UE LOCATION TO ENABLE ACCESS TO A NON-PUBLIC NETWORK

Organization Name

Cisco Technology, Inc.

Inventor(s)

Sri Gundavelli of San Jose CA (US)

Vimal Srivastava of Bangalore (IN)

Irfan Ali of Palo Alto CA (US)

METHODS FOR TRACKING UE LOCATION TO ENABLE ACCESS TO A NON-PUBLIC NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 18063638 titled 'METHODS FOR TRACKING UE LOCATION TO ENABLE ACCESS TO A NON-PUBLIC NETWORK

The patent application describes a method for a user equipment (UE) to connect to a non-public network (NPN) based on time and location requirements received from a home public land mobile network (h-PLMN).

  • The method involves the UE receiving a steering of roaming update from the h-PLMN, which includes a steering of roaming record.
  • The UE is configured to connect to the NPN when its context meets the specified time and location requirements as per the steering of roaming record.
  • Upon meeting the requirements, the UE establishes a session with the NPN.

Potential Applications: - This technology could be used in scenarios where users need to connect to secure networks based on specific time and location parameters, such as in corporate environments or government facilities. - It could also be applied in IoT devices that require secure connections to private networks for data transmission.

Problems Solved: - Ensures secure and timely connections to non-public networks based on predefined criteria. - Helps in managing network access for users in a controlled manner.

Benefits: - Enhanced security by allowing connections only when specific conditions are met. - Efficient utilization of network resources by enabling connections as needed.

Commercial Applications: Title: Secure Network Access Management System This technology could find applications in industries requiring strict access control to private networks, such as finance, healthcare, and defense sectors. It could also be integrated into IoT devices for secure data transfer.

Questions about the technology: 1. How does the method ensure that the UE meets the time and location requirements before connecting to the NPN? 2. What are the potential implications of this technology on network security and data privacy?


Original Abstract Submitted

Disclosed herein are systems, methods, and computer-readable media for causing an user equipment (UE) to connect to a non-public network (NPN) while meeting time and location requirements. In one aspect, a method includes receiving, by the UE and from a home public land mobile network (h-PLMN), a steering of roaming update providing a steering of roaming record. In one aspect, the UE, is configured based on the steering of roaming record, to connect to the non-public network (NPN) when a context of the UE meets time and location requirements. In one aspect, the method includes establishing, by the UE, a session with the NPN when the context of the UE meets the time and location requirements.