Patents by Inventor Zhang Fu
Zhang Fu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250247776Abstract: Systems and methods are disclosed that related to Distributed Machine Learning (DML) or Federated Learning (FL) in core network of a mobile or cellular communications system. In one embodiment, a method performed by a server Network Data Analytics Function (NWDAF) for selecting one or more client NWDAFs comprises transmitting, to each of a set of client NWDAFs, a preparation request for DML or FL and receiving, from each of at least some of the set of client NWDAFs, a response to the preparation request for DML or FL. The method further comprises selecting one or more client NWDAFs based on the responses to the preparation requests for DML or FL. In this manner, the network is enabled to support DML or FL operations.Type: ApplicationFiled: March 29, 2023Publication date: July 31, 2025Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Jing YUE, Zhang FU, Ulf MATTSSON, Mirko D'ANGELO
-
Patent number: 12368706Abstract: Security and privacy mechanisms are provided to protect the L2 identifiers used in groupcast communications over the sidelink (e.g., PC5 interface) without requiring a UE to periodically refresh the L2 identifiers, which may cause extra signaling overhead, increased latency and greater risk of synchronization issues. To prevent tracking of a UE, a group identifier (ID) is used as a source layer 2 (L2) ID in groupcast messages. Additionally, a message authentication code (MAC) is introduced into the group discovery procedure to authenticate the UE sending a group discovery request.Type: GrantFiled: February 5, 2021Date of Patent: July 22, 2025Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Zhang Fu, Markus Hanhisalo, Shabnam Sultana, Noamen Ben Henda
-
Patent number: 12356489Abstract: A method performed by a first user equipment (UE) configured for device-to-device (D2D) wireless communication. The method includes starting a keep-alive timer associated with a unicast sidelink (SL) connection with a second UE configured for D2D wireless communication. In response to expiration of the keep-alive timer, without receiving a transmission from the second UE while the keep-alive timer was running, a keep-alive message is transmitted to the second UE. In response to not receiving an acknowledgement of the keep-alive message, from the second UE within a predetermined duration, release of the unicast SL connection with the second UE is initiated without transmitting a further keep-alive message to the second UE.Type: GrantFiled: October 12, 2020Date of Patent: July 8, 2025Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Zhang Fu, Congchi Zhang, Antonino Orsino, Shabnam Sultana
-
Patent number: 12342168Abstract: The invention relates to a method for a data consumer network function, NF, of a communication network to collect data from a data producer NF, the method comprising: ?sending (810), to a network repository function, NRF, in the communication network, a request for an access token for a service provided by a data collection coordination function, DCCF, in the communication network; ?receiving (820), from the NRF, at least one access token for the service provided by the DCCF; and ?using (830) the at least one access token, collecting data from the data producer NF in the communication network via the DCCF service.Type: GrantFiled: December 21, 2021Date of Patent: June 24, 2025Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Pinar Comak, Christine Jost, Ferhat Karakoc, Ulf Mattsson, Zhang Fu
-
Publication number: 20250184233Abstract: Embodiments include methods for a model training logical function (MTLF) of a network data analytics function (NWDAF) of a communication network. Such methods include receiving a message indicating that a first analytics logical function (AnLF) of the NWDAF is, or is capable of, monitoring drift of a machine learning (ML) model. Such methods also include, based on the message, sending a subscription request for drift monitoring notifications, by the first AnLF, that are associated with the ML model. Other embodiments include complementary methods for the first AnLF and for a common registration repository, as well as MTLFs, AnLFs, and common registration repositories configured to perform such methods.Type: ApplicationFiled: March 20, 2023Publication date: June 5, 2025Inventors: Miguel Angel Garcia Martin, Ulf Mattsson, Miguel Angel Monjas Llorente, Zhang Fu, Danesh Daroui
-
Patent number: 12323852Abstract: A Data Compression Manager (DCM) that can help a data provider (DP) and a data consumer (DC) to establish a data transfer using an advantageous data compression method. In one embodiment, when a DC wants to get some data from a DC, the DP will contact the DCM and the DCM will then choose data compression information based on (i.e., based at least on), for example, current conditions within the network (e.g., a maximum available network bandwidth), information about the data to be compressed (e.g., the type of the data), and/or the DC's data error tolerance. Then the DCM will indicate to the DP the chosen data compression information. The DP will then i) inform the DC of the compression information that is needed by the DC to decompress the data and ii) provide the requested data to the DC in compressed form.Type: GrantFiled: July 1, 2020Date of Patent: June 3, 2025Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Zhang Fu, Peiliang Chang, Yifei Jin
-
Publication number: 20250119715Abstract: A process is defined for consumer-controllable ML model provisioning and training in a wireless communication network. The process comprises two procedures, which respectively correspond to the two phases of an ML model provisioning process in, e.g., 5GC, i.e., the preparation/provisioning phase and the training execution phase. For the preparation/provisioning phase, new parameters are added to the request from the ML model consumer to the ML model generator (e.g., NWDAF), so that the latter can conduct the ML model provisioning according to the consumer requirements. For the training execution phase, interactions between the ML model consumer and generator(s) are considered, and the corresponding procedure for a consumer controlling the ML model training execution phase is defined.Type: ApplicationFiled: July 21, 2022Publication date: April 10, 2025Inventors: Jing Yue, Zhang Fu, Ulf Mattsson, Mirko D'Angelo, Maria Belen Pancorbo Marcos
-
Publication number: 20250111223Abstract: When the consumer NWDAF requests a trained machine learning model from a producer NWDAF for a set of Analytic IDs associated with a plurality of UEs, the consumer NWDAF may include a reliability requirement in the model provisioning request to indicate a required accuracy for the machine learning model. The reliability requirement may be expressed in terms of a number of UEs, a percentage of UEs. or an accuracy target. The producer NWDAF determines whether it can provide a trained model satisfying the reliability requirement and responds accordingly. If a trained model meeting the reliability requirement is available, the producer NWDAF provides the location the trained model to the consumer NWDAF.Type: ApplicationFiled: December 29, 2022Publication date: April 3, 2025Inventors: Zhang Fu, Ulf Mattsson, Maria Belen Pancorbo Marcos
-
Publication number: 20250103904Abstract: A computer-implemented method, performed by a first node. The method is for handling an ongoing distributed machine-learning or federated learning (DML/FL) process for which the first node acts an aggregator of data or analytics from a first group of second nodes. The first node operates in a communications system. The first node obtains one or more first indications about one or more third nodes. The one or more first indications include respective information about the third nodes. The respective information indicates that the third nodes are eligible to be selected to participate in the ongoing DML/FL process. The one or more first indications are obtained during the ongoing DML/FL process. The first node then provides, to a fourth node operating in the communications system, an output of the ongoing DML/FL process based on the obtained one or more first indications.Type: ApplicationFiled: January 23, 2023Publication date: March 27, 2025Inventors: Jing YUE, Zhang FU, Ulf MATTSSON, Mirko D'ANGELO
-
Publication number: 20250081257Abstract: A relay communication device (12) is configured to relay traffic (18) for a remote communication device (14). The relay communication device (12) receives, from the remote communication device (14), an equipment identifier (20) associated with the remote communication device (14). Alternatively or additionally, the relay communication device (12) transmits, to a network node (22) in a communication network (10), a report (24) that reports an equipment identifier (20) associated with the remote communication device (14) as identifying the remote communication device (14) for which the relay communication device (12) is to relay traffic (18).Type: ApplicationFiled: September 29, 2023Publication date: March 6, 2025Inventors: Cheng Wang, Monica Wifvesson, Zhang Fu, Juying Gan
-
Publication number: 20250056374Abstract: A first terminal device connects with a second terminal device via at least one third terminal device acting as a relay between the first terminal device and the second terminal device. The first terminal device determines identification information for identifying the first terminal device and/or the second terminal device on a link between the first and second terminal devices. The first terminal device assigns the determined identification information to at least one corresponding hop on the link between the first terminal device and the second terminal device.Type: ApplicationFiled: December 19, 2022Publication date: February 13, 2025Inventors: Nithin Srinivasan, Zhang Zhang, Antonino Orsino, Min Wang, Zhang Fu, Liwei Qiu
-
Publication number: 20250031039Abstract: A remote communication device performs an authentication procedure with a home communication network, via a relay communication device, to authenticate the remote communication device to the home communication network for a proximity-based service, ProSe. Performing the authentication procedure comprises deriving one or more keys included in an authentication vector. The remote communication device generates an anchor key for the ProSe directly from the one or more keys included in the authentication vector. The remote communication device protects ProSe direct communication between the remote communication device and the relay communication device using security key material derived from the anchor key.Type: ApplicationFiled: October 18, 2022Publication date: January 23, 2025Inventors: Zhang Fu, Monica Wifvesson, Juying Gan, Cheng Wang, Qian Chen, David Castellanos Zamora
-
Publication number: 20240397313Abstract: A method (300) for determining whether a remote user equipment, UE (101), is authorized to receive a service. The method includes a relay UE (102) receiving from the remote UE a request message (202) indicating that the remote UE is requesting to receive the service. The method also includes, as a result of receiving the request message, the relay UE performing an authorization process that comprises: the relay UE transmitting, via a base station (104), a message (204) for triggering a first network function (112) to determine whether the remote UE is authorized to receive the service. The method also includes the relay UE receiving, via the base station, a response to the message, wherein the response indicates whether nor not the remote UE is authorized to receive the service.Type: ApplicationFiled: September 13, 2022Publication date: November 28, 2024Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Zhang FU, Juying GAN
-
Publication number: 20240380744Abstract: Embodiments include methods for a data consumer network function (NF) of a communication network. These methods include sending, to a network repository function (NRF) of the communication network, a request for an access token for the following: a service provided by a 5 data collection coordination function (DCCF) of the communication network, and data to be collected via the DCCF service. These methods include receiving from the NRF at least one access token for the DCCF service and for the data to be collected via the DCCF service and, using the at least one access token, collecting the data from a data producer NF of the communication network via the DCCF service. Other embodiments include complementary methods for DCCFs 0 and NRFs, as well as data consumer NFs, DCCFs, and NRFs configured to perform such methods.Type: ApplicationFiled: May 2, 2022Publication date: November 14, 2024Inventors: Pinar Comak, Ferhat Karakoc, Christine Jost, Zhang Fu, Ulf Mattsson
-
Patent number: 12120200Abstract: Methods and systems for providing flexible information exposure in a Fifth Generation (5G) Core (5GC) and an Operations, Administration, and Maintenance (OAM) system are provided. According to one aspect of the present disclosure, a method, performed by a first network node of a 5GC for providing flexible information exposure in the 5GC and an OAM system, comprises: receiving, from a second network node, a request to register the second network node as a provider of data and/or a compute function; registering the second network node as a provider of the data and/or the compute function; storing information associating the second network node with the data and/or compute function provided by the second network node; and sending, to the second network node, a response to the request to register the second network node as a provider of data and/or a compute function.Type: GrantFiled: January 21, 2020Date of Patent: October 15, 2024Assignee: Telefonaktieabolaget LM Ericsson (Publ)Inventors: Zhang Fu, Göran Eriksson, Dinand Roeland
-
Publication number: 20240314027Abstract: A method implemented in a data collector node (DCN) is described. The DCN is configured to communicate at least with a network node and a data source node (DSN). The method includes determining a data collection coordination. The determined data collection coordination is associated with the DSN and includes determining whether any DCN is registered as a data collection coordinator of for the DSN. Upon determining there is no registered data collection coordinator of for the DSN, a request to register as the data collection coordinator of the DSN is transmitted to the network node. Upon determining the DCN is itself the data collection coordinator, data collection from the DSN is coordinated. Further, upon determining a second DCN is registered as the data collection coordinator, a subscription request for data collection from the DSN is transmitted to the second DCN.Type: ApplicationFiled: February 18, 2022Publication date: September 19, 2024Inventors: Zhang FU, Miguel Angel GARCIA MARTIN, Ulf MATTSSON
-
Publication number: 20240292225Abstract: A method performed by a first network function is provided. The method comprises receiving a request for Non-Access Stratum (NAS) traffic information. The request was transmitted by a second network function. The method further comprises after receiving the request, sending towards the second network function a report comprising: i) a NAS message type identifier identifying a type of NAS message and information indicating a number of received NAS messages of the identified type and/or ii) user equipment (UE) type information indicating a type of UE and information indicating a number of NAS messages transmitted by UEs of the indicated type.Type: ApplicationFiled: September 8, 2022Publication date: August 29, 2024Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Zhang FU, Pinar COMAK, Ferhat KARAKOC
-
Publication number: 20240259797Abstract: Systems and methods are disclosed for supporting remote User Equipment (UE) authentication via a relay UE. In one embodiment, a method performed by a relay UE comprises receiving a first message conveyed by a remote UE and sending a second message to a relay access and mobility function (AMF), wherein the second message comprises a UE-to-Network (U2N) connection mapping identification (ID) that identifies the remote UE. In this manner, the relay UE and relay AMF are able to identify that the second message (e.g., an authentication related message) is for the remote UE. Embodiments of a relay UE and embodiments of a relay AMF and methods of operation thereof are also disclosed.Type: ApplicationFiled: August 23, 2022Publication date: August 1, 2024Inventors: Zhang Fu, Monica Wifvesson, Ivo Sedlacek
-
Publication number: 20240244434Abstract: A data collection coordination function, DCCF, network node receives (1a) a request for data from a data consumer, determines (2) a data source for the requested data, verifies (3a, 3b) with a network node that the data consumer and the DCCF are authorized by the data source, receives (3b) a message container for the data consumer from the network node, the message container for the data consumer including a data encryption key KE and a data integrity key Ki, and receives (3b) a message container for the data source from the network node, the message container for the data source including the data encryption key KE and the data integrity key Ki. The DCCF network node transmits (4a) the message container for the data consumer to the data consumer and transmits (5) the message container for the data source to the data source.Type: ApplicationFiled: March 15, 2022Publication date: July 18, 2024Inventors: Pinar Comak, Christine Jost, Ferhat Karakoc, Stefan Håkansson, Ulf Mattsson, Zhang Fu
-
Publication number: 20240236775Abstract: A technique for forwarding a mobility update report from a remote radio device (100-RM) that is in relayed radio communication with a radio access network, RAN (530), through a relay radio device (100-RL; 1100; 1391; 1392; 1430), is described. The remote radio device (100-RM) is in a first radio resource control, RRC, state (502-RM) relative to the RAN (530), and the relay radio device (100-RL; 1100; 1391; 1392; 1430) is in a second RRC state (502-RL) relative to the RAN (530), wherein the first RRC state is different from the second RRC state. As to a method aspect of the technique, the method (300-RL) performed by the relay radio device (100-RL; 1100; 1391; 1392; 1430) comprises or initiated the step of receiving (302-RL) the mobility update report from the remote radio device (100-RM) on a sidelink, SL, between the remote radio device (100-RM) and the relay radio device (100-RL; 1100; 1391; 1392; 1430), the mobility update report being indicative of a mobility update of the remote radio device (100-RM).Type: ApplicationFiled: January 13, 2022Publication date: July 11, 2024Inventors: Min Wang, Zhang Fu