Patents by Inventor Andreas Kunz

Andreas Kunz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190166647
    Abstract: This disclosure provides a User Equipment (UE), including: a transmitter configured to transmit at least one Protocol Data Unit (PDU) session identifier (ID), each of which indicates a PDU session that the UE needs to use in a Non Access Stratum (NAS) Service Request message to a Mobility Management Function (MMF) via an access network (AN) node when the UE has user data to send.
    Type: Application
    Filed: August 18, 2017
    Publication date: May 30, 2019
    Applicant: NEC CORPORATION
    Inventors: Genadi VELEV, Toshiyuki TAMURA, Andreas KUNZ
  • Patent number: 10306475
    Abstract: In order for making MTC more efficient and/or secure, a base station forming a communication system connects a UE to a core network. A node serves as an entering point to the core network for a service provider, and transmits traffic between the service provider and the UE. The node establishes, as a connection to the base station, a first connection for directly transceiving messages between the node and the base station. Alternatively, the node establishes a second connection for transparently transceiving the messages through a different node that is placed within the core network and has established a different secure connection to the base station.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: May 28, 2019
    Assignee: NEC Corporation
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad, Andreas Kunz, Genadi Velev, Toshiyuki Tamura
  • Patent number: 10299134
    Abstract: In order for making MTC more efficient and/or secure, a base station forming a communication system connects a UE to a core network. A node serves as an entering point to the core network for a service provider, and transmits traffic between the service provider and the UE. The node establishes, as a connection to the base station, a first connection for directly transceiving messages between the node and the base station. Alternatively, the node establishes a second connection for transparently transceiving the messages through a different node that is placed within the core network and has established a different secure connection to the base station.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: May 21, 2019
    Assignee: NEC Corporation
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad, Andreas Kunz, Genadi Velev, Toshiyuki Tamura
  • Publication number: 20190141081
    Abstract: A mobile network system comprises a security device and a network device. The security device stores slice security requirements which are different for each slice ID (identification). The slice ID indicates a network slice in a core network. The network device transmits, to the security device, a Slice Security Request including the slice ID. The network device receives, from the security device, a Slice Security Response including the slice security requirements related to the slice ID. The network device selects, based on the slice security requirements, a security algorithm for the network slice.
    Type: Application
    Filed: April 27, 2017
    Publication date: May 9, 2019
    Applicant: NEC Corporation
    Inventors: Andreas KUNZ, Anand Raghawa PRASAD, Naoaki SUZUKI, Hironori ITO
  • Publication number: 20190141563
    Abstract: A core network node supporting Control Plane CIoT (Celluar Internet of Things) EPS (Evolved Packet System) Optimization includes a transmitter configured to transmit to a radio access network node an information indicating overload from data transfer via the Control Plane CIoT EPS Optimization. A radio access network node includes a receiver configured to receive, from a core network node, an information indicating overload from data transfer via Control Plane CIoT (Celluar Internet of Things) EPS (Evolved Packet System) Optimization.
    Type: Application
    Filed: March 23, 2017
    Publication date: May 9, 2019
    Applicant: NEC Corporation
    Inventors: Iskren IANEV, Genadi VELEV, Andreas KUNZ, Toshiyuki TAMURA
  • Patent number: 10282395
    Abstract: Computer-implemented methods, media, and systems implemented to handling timer-based resizing events based on activity detection can trigger a start of a resize timer. The resize timer can periodically provide a notification to check for resize activity in a user interface displayed on a display device. In response to the notification, an absence of the resize activity can be determined after a threshold inactivity time period has expired from the start of the resize timer. In response, a stop of the resize timer can be triggered. After triggering the stop, a first resize activity associated with a first timestamp can be detected in the user interface. A restart of the resize timer from the first timestamp can be triggered to periodically provide the notification to check for resize activity in the user interface. Subsequent continuation or stopping of the resize timer can be based on further presence or absence of resize activity.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: May 7, 2019
    Assignee: SAP SE
    Inventors: Jens Pflueger, Frank Weigel, Andreas Kunz
  • Publication number: 20190123953
    Abstract: A method of facilitating P-CSCF restoration when a P-CSCF failure has occurred is disclosure. The method comprises a Proxy Call Session Control Function, ‘P-CSCF’ receiving a Session Initiation Protocol, ‘SIP’, message when said P-CSCF has been selected as an alternative P-CSCF to a failed P-CSCF and providing, to an associated Policy and Charging Rules Function, ‘PCRF’, a message comprising an indication that P-CSCF restoration is required.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 25, 2019
    Inventors: Andreas KUNZ, Gottfried PUNZ, Genadi VELEV, Toshiyuki TAMURA
  • Publication number: 20190123954
    Abstract: A method of facilitating P-CSCF restoration when a P-CSCF failure has occurred is disclosed. The method comprises a Proxy Call Session Control Function, ‘P-CSCF’ receiving a Session Initiation Protocol, ‘SIP’, message when said P-CSCF has been selected as a alternative P-CSCF to a failed P-CSCF and providing to an associated Policy and Charging Rules Function, ‘PCRF’, a message comprising to indication that P-CSCF restoration is required.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 25, 2019
    Inventors: Andreas KUNZ, Gottfried PUNZ, Genadi VELEV, Toshiyuki TAMURA
  • Publication number: 20190110195
    Abstract: An object is to provide a key generation method capable of maintaining a high security level in each of sliced networks when network slicing is applied to a core network. A key generation method according to this disclosure specifies network slice identification information indicating a network slice system that provides a service to be used by a communication terminal (50) among a plurality of network slice systems included in a core network (10) and, using the network slice identification information, generates a service key to be used for security processing in the network slice system indicated by the network slice identification information.
    Type: Application
    Filed: April 18, 2017
    Publication date: April 11, 2019
    Applicant: NEC Corporation
    Inventors: Hironori ITO, Anand Raghawa PRASAD, Naoaki SUZUKI, Andreas KUNZ
  • Patent number: 10257711
    Abstract: In order for making MTC more efficient and/or secure, a base station forming a communication system connects a UE to a core network. A node serves as an entering point to the core network for a service provider, and transmits traffic between the service provider and the UE. The node establishes, as a connection to the base station, a first connection for directly transceiving messages between the node and the base station. Alternatively, the node establishes a second connection for transparently transceiving the messages through a different node that is placed within the core network and has established a different secure connection to the base station.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: April 9, 2019
    Assignee: NEC Corporation
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad, Andreas Kunz, Genadi Velev, Toshiyuki Tamura
  • Publication number: 20190053328
    Abstract: A method and apparatus provide for attachment for restricted local operator services for an apparatus, such as a user equipment. An attach procedure for the restricted local operator services for the apparatus can be performed. A proxy call session control function address for the restricted local operator services can be received during the attach procedure. A session initiation protocol register request message can be generated. The session initiation protocol register request message can include an indication for the restricted local operator services and can include an internet protocol multimedia public user identification based on an identification of the apparatus. The session initiation protocol register request message to the proxy call session control function address can be sent, the session initiation protocol register request message can include the indication for the restricted local operator services.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 14, 2019
    Inventors: Andreas Kunz, Genadi Velev
  • Publication number: 20190053049
    Abstract: A method and apparatus provide for security for restricted local operator services. At least one of a restricted local operator services indication and security capabilities associated with the restricted local operator services can be sent. A non-access stratum key exchange request including a symmetric root key can be received. The symmetric root key can be encrypted with a public key. The non-access stratum key exchange request can be acknowledged. A non-access stratum security key can be derived with the symmetric root key. Radio interface keys for user plane and radio resource control can be derived with the symmetric root key.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 14, 2019
    Inventors: Andreas Kunz, Genadi Velev
  • Publication number: 20190053139
    Abstract: A determination can be made as to whether a mobile equipment has valid credentials for accessing an available public land mobile network. Availability of restricted operator services access support can be detected. A cell of a public land mobile network that supports restricted operator services access can be selected as a serving cell if restricted operator services access support is available and the mobile equipment does not have valid credentials for accessing the available public land mobile network. An attach procedure can be performed for restricted operator services using the public land mobile network of the selected cell as a selected public land mobile network.
    Type: Application
    Filed: August 8, 2018
    Publication date: February 14, 2019
    Inventors: Prateek Basu Mallick, Joachim Löhr, Genadi Velev, Andreas Kunz, Ravi Kuchibhotla
  • Patent number: 10194347
    Abstract: A mobile communication network (MCN) and method for managing (overload in) an MCN having a radio access network and core network connected to the radio access network, wherein a plurality of user devices in form of non-MTC user devices like mobile phones and MTC user devices is connected to base station(s) of the radio access network, includes: a) detecting a presence of a network overload in the MCN, b) generating an overload report according to the detected network overload comprising one or more resource identifiers of the resources of the MCN on which the overload was detected, c) identifying (W1) user device(s) (UD) and/or application(s) affected by the network overload (OL) based on the overload report, and d) informing one or more serving entities serving the resolved UD for temporarily suppressing communication requests, preferably in form of devices triggers (DT), for the resolved UD, preferably MTC UD.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: January 29, 2019
    Assignee: NEC CORPORATION
    Inventors: Andreas Kunz, JaeSeung Song, Genadi Velev, Gottfried Punz
  • Patent number: 10178542
    Abstract: A communication system is disclosed in which a home subscriber server, ‘HSS’, of a communication network, receives, from a service capability exposure function, ‘SCEF’, at least one communication pattern parameter set together with an associated validity time, stores the at least one communication pattern parameter set, and when the validity time for a communication pattern parameter set stored in the HSS expires, autonomously deletes the associated communication pattern parameter set.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 8, 2019
    Assignee: NEC Corporation
    Inventors: Andreas Kunz, Genadi Velev, Iskren Ianev
  • Publication number: 20180376331
    Abstract: A method and apparatus for refreshing the security keys of a subset of configured radio bearers including less than all of the currently configured radio bearers is provided. An indication is received from a network entity to release one or more radio bearers from the subset of configured radio bearers for which the refresh of security keys is desired. A new radio bearer is added for each of the one or more radio bearers being released. Each of the new radio bearers is added with new security keys.
    Type: Application
    Filed: June 23, 2018
    Publication date: December 27, 2018
    Inventors: Joachim Löhr, Prateek Basu Mallick, Andreas Kunz, Ravi Kuchibhotla
  • Publication number: 20180376330
    Abstract: A method and apparatus for handling security keys for individual bearers of the user equipment include dividing between a plurality of different sub-groups, a plurality of individual bearers, each sub-group having a different base value from which the security keys for the associated bearers are derived. When the security keys associated with the individual bearers of one particular sub-group are refreshed, the security keys of the individual bearers, which are not a part of the particular sub-group do not need to be refreshed.
    Type: Application
    Filed: June 23, 2018
    Publication date: December 27, 2018
    Inventors: Prateek Basu Mallick, Andreas Kunz, Joachim Löhr, Ravi Kuchibhotla
  • Publication number: 20180367303
    Abstract: Apparatuses, methods, and systems are disclosed for transmitting and/or receiving rogue unit detection information. One method includes maintaining rogue unit detection information. The rogue unit detection information includes a public key and a validity time corresponding to the public key. The method includes determining whether the validity time for the public key is within an expiration window. The method includes, in response to determining that the validity time for the public key is within the expiration window, transmitting a request for new rogue unit detection information. In some embodiments, the method includes receiving the new rogue unit detection information.
    Type: Application
    Filed: May 18, 2018
    Publication date: December 20, 2018
    Inventors: Genadi Velev, Andreas Kunz, Joachim Loehr, Prateek Basu Mallick, Ravi Kuchibhotla
  • Publication number: 20180367998
    Abstract: Apparatuses, methods, and systems are disclosed for reporting monitored parameter information. One method includes receiving an indication to monitor parameters in an idle mode. The method includes monitoring the parameters in the idle mode. The method includes transmitting a request to a first base station. The method includes, in response to not receiving a correct response from the first base station: performing a cell reselection resulting in selection of a second base station; and transmitting a failure report to the second base station. The failure report includes information corresponding to the parameters monitored in the idle mode.
    Type: Application
    Filed: June 18, 2018
    Publication date: December 20, 2018
    Inventors: Andreas Kunz, Prateek Basu Mallick, Joachim Loehr, Genadi Velev, Ravi Kuchibhotla
  • Publication number: 20180352528
    Abstract: A communication apparatus for supporting a registration procedure for an inbound roamer user equipment, ‘UE’, in a visited public land mobile network, ‘VPLMN’ that includes a transceiver and a controller. The controller is configured to: control the transceiver to receive, from a communicator of the VPLMN, a request for authentication information; retrieve the authentication information from a communicator of a home public land mobile network, ‘HPLMN’; and control the transceiver to transmit the authentication information to the serving CSCF of the VPLMN for use in the registration procedure.
    Type: Application
    Filed: October 28, 2016
    Publication date: December 6, 2018
    Inventors: Andreas Kunz, Genadi Velev, Iskren Ianev, Filipe Alexandre, Rodrigues de Moura Leitao