Patents by Inventor Miguel-Angel Garcia-Martin
Miguel-Angel Garcia-Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240314027Abstract: A method implemented in a data collector node (DCN) is described. The DCN is configured to communicate at least with a network node and a data source node (DSN). The method includes determining a data collection coordination. The determined data collection coordination is associated with the DSN and includes determining whether any DCN is registered as a data collection coordinator of for the DSN. Upon determining there is no registered data collection coordinator of for the DSN, a request to register as the data collection coordinator of the DSN is transmitted to the network node. Upon determining the DCN is itself the data collection coordinator, data collection from the DSN is coordinated. Further, upon determining a second DCN is registered as the data collection coordinator, a subscription request for data collection from the DSN is transmitted to the second DCN.Type: ApplicationFiled: February 18, 2022Publication date: September 19, 2024Inventors: Zhang FU, Miguel Angel GARCIA MARTIN, Ulf MATTSSON
-
Publication number: 20240276359Abstract: A method performed by a radio network node for handling services in a wireless communications network. The radio network node receives, from a user equipment (UE), an indication indicating selection of a service associated with a service indication out of at least one service indication; and based on the received indication, selects a network node that supports the service indicated by the indication.Type: ApplicationFiled: April 28, 2022Publication date: August 15, 2024Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Christofer LINDHEIMER, Mai-Anh PHAN, Oscar OHLSSON, Hernán Felipe ARRAÑO SCHARAGER, Miguel Angel GARCIA MARTIN, Peter HEDMAN
-
Publication number: 20240259979Abstract: A technique for handling rejection and admission of a terminal device to a core network, CN, of a telecommunication system is provided. As to a method aspect, a method comprises a step of receiving a terminal device registration request indicative of the terminal device requesting access to the telecommunication system. The method further comprises the step of sending, to a network slice selection function, NSSF, of the CN, a CN registration request message indicative of the terminal device registration request. The CN registration request message comprises an identifier of the terminal device. The CN registration request message is further indicative of at least one network slice of the telecommunication system. The method further comprises the step of receiving, from the NSSF, a CN response message indicative of rejection or admission to at least one network slice regarding the terminal device based on the identifier of the terminal device.Type: ApplicationFiled: May 25, 2022Publication date: August 1, 2024Inventors: Emiliano Merino Vazquez, Miguel Angel Garcia Martin, Xinyu Zhang, George Foti
-
Patent number: 12052657Abstract: A method performed by an Access and mobility Management Function (AMF) node for allocating a target network slice instance to serve a (PDU) session for a User Equipment (UE). The AMF node receives (501), from a Network Slice Selection Function (NSSF) node, information about a decision to change an allocation of a first network slice instance that is serving the PDU session to the target network slice instance, and an identifier of the target network slice instance. The AMF node then retrieves (502), from a first Session Management Function (SMF) node of the first network slice instance, a UE context related to the UE and the PDU session. The AMF node transmits (504), towards a target SMF node of the target network slice instance, information about the retrieved UE context and Access Network (AN) tunnel information to be used for the PDU session. The AMF node receives (505), from the target SMF node, target Core Network (CN) tunnel information to be used for the PDU session.Type: GrantFiled: March 12, 2019Date of Patent: July 30, 2024Assignee: SAGO STRATEGIC SOLUTIONS LLCInventor: Miguel Angel Garcia Martin
-
Publication number: 20240250883Abstract: A method for event subscription management in a communications network performed by a Network Function producer (NFp) and a Network Function consumer (NFc). The method comprises establishing a subscription to an event from the NFc to the NFp and transmitting from the NFp to the NFc a notification including an indication to trigger the cancelation of the subscription. In some embodiments, the method may further comprise triggering at the NFc a subscription modification based on the received notification. In some embodiments, the subscription modification triggered at the NFc comprises at least one of cancelling or terminating the subscription with the NFp and removing the subscription context at the NFc. In some embodiments, the subscription modification triggered at the NFc comprises at least one of selecting a different NFp and establishing a new subscription to the different NFp.Type: ApplicationFiled: May 6, 2022Publication date: July 25, 2024Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Maria Belen PANCORBO MARCOS, Uif MATTSSON, Miguel Angel GARCIA MARTIN, Antenio INIESTA GONZALEZ, Jesús Ángel DE GREGORIO RODRIGUEZ
-
Publication number: 20240214431Abstract: There is provided a method for capturing traffic in a network. The method is performed by a first entity in response to a first request to initiate a session in which to capture traffic between microservices. The microservices are distributed across a plurality of nodes in the network. The method comprises initiating (300) transmission of a second request towards one or more second entities. The second request is a request that the one or more second entities initiate the session and the second request comprises one or more capture filters generated for use by the one or more second entities to capture the traffic between the microservices.Type: ApplicationFiled: April 30, 2020Publication date: June 27, 2024Inventors: Pablo Martinez de la Cruz, Miguel Angel Garcia Martin
-
Publication number: 20240172095Abstract: A method performed by a radio network node (12) for handling communication in a wireless communications network. The radio network node (12) configures a UE (10) with a mapping, wherein the mapping maps a name indication to a GID, and/or a type indication of a type of service offered by one or more networks identified by the GID.Type: ApplicationFiled: March 29, 2022Publication date: May 23, 2024Inventors: Christofer Lindheimer, Mai-Anh Phan, Oscar Ohlsson, Hernán Felipe Arraño Scharager, Miguel Angel Garcia Martin, Peter Hedman
-
Patent number: 11979302Abstract: There is provided mechanisms for enabling discovery of a service-providing NF in a 3GPP communication network. A method is performed by a Network Repository Function. The method comprises registering locality information of service-providing NFs according to locality attribute of each service-providing NF. Each locality attribute comprises structured values of location information of its service-providing NF. The method comprises obtaining a request from a service-requesting NF for one of the service-providing NFs. The request specifies a preferred locality of the requested service-providing NF. The preferred locality indicates, in terms of structured values of location information, geographical location where the service-requesting NF is deployed.Type: GrantFiled: January 16, 2020Date of Patent: May 7, 2024Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Pablo Martinez de la Cruz, Miguel Angel Garcia Martin
-
Publication number: 20240064129Abstract: Embodiments include methods for a user equipment, UE (510, 1010, 1100), to obtain security credentials for accessing a non-public network, NPN. Such methods include performing (610) a primary authentication procedure to, obtain a key KAUSF for secure communication between the UE and an onboarding network ON. Such methods also include receiving (620), from a unified data management, UDM, function, encrypted UE credentials for accessing the NPN, and decrypting (630) the encrypted UE credentials based on KAUSF. Other embodiments include complementary methods for UDM functions, authentication server functions (AUSF), and NPN provisioning servers, PVS, as well as UEs or network nodes configured to perform the exemplary methods.Type: ApplicationFiled: December 20, 2021Publication date: February 22, 2024Inventors: Noamen Ben Henda, Henrik Normann, Helena Vahidi Mazinani, Miguel Angel Garcia Martin
-
Publication number: 20240007903Abstract: A method implemented by a first network node in a telecommunication network is provided. The method includes: determining whether a background data transfer, BDT, policy is to be applied to a first core network, a second core network or both; and in response to the BDT policy being to be applied to both the first core network and the second core network, transmitting, to a second network node, a request for negotiating a common BDT policy for both the first core network and the second core network. If the negotiated BDT policy is applicable to both the first and the second core networks, the applicability of the policy is independent of network coverage, UE support for 5G, availability of the 5G subscription, and whether the UE sessions are handled by the PCF or the PCRF.Type: ApplicationFiled: October 23, 2020Publication date: January 4, 2024Inventors: Miguel Angel GARCIA MARTIN, Antonio INIESTA GONZALEZ, Ping CHEN
-
Publication number: 20230422004Abstract: Embodiments include methods of updating a background data transfer (BDT) policy negotiated between an application function (AF) and a core network (CN) of a telecommunication network. Such methods can be performed by a Policy Control Function (PCF) of the CN and can include, in response to receiving a notification of degraded network performance of a network area, determining that the negotiated BDT policy is affected by the degraded network performance and an Application Service Provider (ASP) associated with the negotiated BDT policy requested a warning notification. Such methods can include determining, at least based on operator policies, updated BDT policy information for the negotiated BDT policy, wherein the updated BDT policy information comprises at least one of the following: at least one candidate BDT policy, and updated conditions for the negotiated BDT policy. Such methods can include sending the updated BDT policy information to the AF.Type: ApplicationFiled: September 6, 2023Publication date: December 28, 2023Inventors: Antonio Iniesta Gonzalez, Wenliang Xu, Susana Fernandez Alonso, Miguel Angel Garcia Martin, Miguel Angel Puente Pestaña, Maria Belen Pancorbo Marcos
-
Patent number: 11822299Abstract: A device manager (200; 300; 400) and associated method for controlling one or more devices (203a-c; 403a-c). The device manager comprises a receiver (304) configured to receive sensor data from one or more sensors (202a-d; 402a-d). The device manager comprises a device controller (314) configured to determine device control data for controlling the operation of one or more devices based on the received sensor data and one or more policy rules stored in a memory (306). The device manager comprises a transmitter (302) configured to transmit the device control data to the one or more devices. The receiver is further configured to receive, from a network node (212, 214; 412) of a telecommunications network, user equipment, UE, data relating to one or more UEs (426a-c) associated with the one or more devices. The device controller is further configured to determine the device control data based on the received UE data.Type: GrantFiled: January 26, 2015Date of Patent: November 21, 2023Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Miguel Angel Garcia Martin, Veronica Sanchez Vega
-
Publication number: 20230354007Abstract: The present disclosure provides a method for a first network element in a communication network to perform service subscriptions for a UE. The method includes: in response to receiving a request comprising service subscription information for the UE from a second network element serving the UE and assisting in the service, cross referencing the service subscription information for the UE in the request with stored service subscription information for the UE for consistency; and in response to being not consistent, initiating updating of service subscriptions for the UE in the second network element according to the stored service subscription information for the UE. Corresponding devices, computer readable storage medium, carrier, etc. are also provided.Type: ApplicationFiled: September 21, 2020Publication date: November 2, 2023Inventors: Miguel Angel GARCIA MARTIN, David CASTELLANOS ZAMORA, Emiliano MERINO VAZQUEZ, Pablo ACEVEDO MONTSERRAT, Juying GAN, Yunjie LU
-
Patent number: 11792612Abstract: A method of updating a background data transfer, BDT, policy negotiated between an application function, AF, and a Core Network, CN, is disclose. The method is performed by a Policy Control Function, PCF, of the CN and comprises determining updated BDT policy information including updated conditions for the negotiated BDT policy and at least one candidate BDT policy for the AP to select when the PCF determines that the negotiated BDT policy is affected by degraded network performance. The determined updated BDT policy information is then sent to the AF by the PCF using notification type interaction, thereby effectively updating the negotiated BDT policy.Type: GrantFiled: April 23, 2020Date of Patent: October 17, 2023Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Antonio Iniesta Gonzalez, Wenliang Xu, Susana Fernandez Alonso, Miguel Angel Garcia Martin, Miguel Angel Puente Pestaña, Maria Belen Pancorbo Marcos
-
Publication number: 20230209326Abstract: A method, performed by a first node (111), for handling subscriptions in a communications network (100). The first node (111) operates in the communications network (100). The first node (111) sends (303), to a second node (112), a first indication. The first indication requests subscription to report new accessibility for a device (140) to a second domain different than a first domain currently accessible by the device (140). The first node (111) receives (304) a second indication from the second node (112). The second indication indicates the new accessibility by the device (140) to the second domain. A fifth node (115) receives (501), from the first node (111), a fifth indication indicating a notification of an event by the device (140) after the new accessibility has been enabled. The fifth indication is received based on a previous indication sent by the fifth node (115) prior to the new accessibility has been enabled.Type: ApplicationFiled: June 29, 2020Publication date: June 29, 2023Inventors: Emiliano MERINO VAZQUEZ, Miguel Angel GARCIA MARTIN, Beatriz MAROTO GIL, David CASTELLANOS ZAMORA
-
Publication number: 20230171603Abstract: The present disclosure relates to provisioning of a UE with credentials to access a communication network, such as a SNPN. A DCS maintains a binding of UE onboarding credentials and a UE identifier with network information for the authorized SNPN. After obtaining the network information from the DCS, the onboarding network requests authorization from a provisioning server (190) in the SNPN to initiate a provisioning procedure with the SNPN. The provisioning server (190) verifies that the UE is authorized to access the SNPN and determines the type of provisioning procedure to use (e.g., control plane provisioning or user plane provisioning). If verification is successful, the provisioning server (190) sends a response authorizing the onboarding network to initiate provisioning of the UE and indicating the type of provisioning procedure to use. The authorization procedure prevents rogue or malicious UEs from attempting to initiate a provisioning procedure with the ANPN without prior authorization.Type: ApplicationFiled: May 12, 2021Publication date: June 1, 2023Inventors: Miguel Angel Garcia Martin, David Castellanos Zamora, Peter Hedman
-
Publication number: 20230156577Abstract: Methods and apparatus are provided to enable a consumer network function (consumer NF) to discover instances of a NWDAF 90 co-located with NFs in the 5GC 30 of a communication network 10. Existing procedures and messages between NFs are leveraged to distribute lists of NWDAFs 90 co-located with a NF, such as a UPF 35, AMF 40 or SMF 45. A NF can provide a list of NWDAF instances for a particular UE 15 that are co-located with either the same NF or a separate producer NF when the communication procedure for the UE 15 is invoked. Over time, the consumer NFs build a database associating the co-located NWDAFs in other NFs with corresponding UEs 15 served by the consumer NF. When the consumer NF needs analytic data for one or more UEs 15 served by the consumer NF, the consumer NF can use a UE ID to look up the co-located NWDAFs for the UE 15 and subscribe with the co-located NWDAF instances to receive analytics data for the UE 15.Type: ApplicationFiled: March 5, 2021Publication date: May 18, 2023Inventors: Miguel Angel Muñoz de la Torre Alonso, Ulf Mattsson, Antonio Iniesta Gonzalez, Miguel Angel Garcia Martin, Maria Belen Pancorbo Marcos
-
Publication number: 20230148296Abstract: A technique for maintaining a subscription of a subscriber Network Function, NF, for receiving events related to a User Equipment, UE, from a serving NF in a telecommunication system is disclosed, wherein the UE is served by a first instance of the serving NF.Type: ApplicationFiled: July 1, 2020Publication date: May 11, 2023Inventors: Miguel Angel Puente Pestaña, Ulf Mattsson, Maria Belen Pancorbo Marcos, Miguel Angel Garcia Martin
-
Publication number: 20230050944Abstract: The invention relates to a method for operating a container (100) providing a service to a user in a cloud environment, wherein the container is generated from a container image (51) which comprises an encrypted software package, the container image further comprising a decryption entity, wherein the method comprises the steps of receiving a message to set up the container (100) out of the container image (51), the message comprising an access identifier allowing access to a restricted area (60) to which the access is not provided without the access identifier, the restricted area comprising a plurality of decryption keys, and accessing the restricted area (60) using the access identifier received with the message, and retrieving a decryption key from the restricted area (60) based on the access identifier, and decrypting the encrypted software package with the retrieved decryption key in order to generate a decrypted software package, providing the service to the user based on the decrypted software package.Type: ApplicationFiled: April 3, 2020Publication date: February 16, 2023Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Pablo MARTINEZ DE LA CRUZ, Miguel Angel GARCIA MARTIN
-
Publication number: 20230036465Abstract: Methods and apparatus in a network node are provided. In an example, a method in a network node in a network is provided. The method comprises sending, to a network data management function, information identifying an association between a Network Data Analytics Function (NWDAF) and (i) a first network function in the network, and/or (ii) a User Equipment (UE) in the network.Type: ApplicationFiled: December 9, 2020Publication date: February 2, 2023Inventors: Ulf Mattsson, Aldo Bolle, Miguel Angel Garcia Martin, Stefan Håkansson