Patent classifications
H04W8/02
Identity-based encryption of a message associated with a connection procedure
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
Identity-based encryption of a message associated with a connection procedure
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
Method and system for network slice authentication and authorization
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments disclose a method and system for handling a network slice specific authentication and authorization (NSSAA) process in a wireless network system.
Method and system for network slice authentication and authorization
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Embodiments disclose a method and system for handling a network slice specific authentication and authorization (NSSAA) process in a wireless network system.
COMMUNICATION SYSTEM AND METHOD FOR OPERATING A COMMUNICATION SYSTEM
Methods and devices provide for enhancements to the Steering of Roaming (SoR) provisioning during the registration procedure by introducing a new parameter generated by a user data management network function of the home network which indicates to roaming networks whether to request updated SoR information based on a registration type received in a registration request from a mobile terminal.
COMMUNICATION SYSTEM AND METHOD FOR OPERATING A COMMUNICATION SYSTEM
Methods and devices provide for enhancements to the Steering of Roaming (SoR) provisioning during the registration procedure by introducing a new parameter generated by a user data management network function of the home network which indicates to roaming networks whether to request updated SoR information based on a registration type received in a registration request from a mobile terminal.
METHOD AND APPARATUS FOR ESTIMATING CHANNEL IN WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a method for operating a terminal and a base station in a wireless communication system and an apparatus for supporting the same. In an embodiment of the present disclosure, a method for operating a terminal in a wireless communication system may include: transmitting a first message including information related to learning; receiving a second message including configuration information for learning; transmitting an uplink reference signal; and transmitting channel information related to a downlink channel measured based on a downlink reference signal.
METHOD AND APPARATUS FOR ESTIMATING CHANNEL IN WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a method for operating a terminal and a base station in a wireless communication system and an apparatus for supporting the same. In an embodiment of the present disclosure, a method for operating a terminal in a wireless communication system may include: transmitting a first message including information related to learning; receiving a second message including configuration information for learning; transmitting an uplink reference signal; and transmitting channel information related to a downlink channel measured based on a downlink reference signal.
Radio link recovery for user equipment
In response to a radio link failure between given user equipment and a source access node of a communication system during a data transfer operation over a control plane, a method is provided for recovering the radio link for the given user equipment through a target access node of the communication system. The radio link recovery is enabled via a mobility management node of the communication system using a non-access stratum security context previously established between the given user equipment and the mobility management node.
SERVICE MODIFICATION IN WIRELESS COMMUNICATION NETWORKS
A wireless communication network serves a wireless data service to a wireless User Equipment (UE). In the wireless communication network, a network controller receives a service request from the wireless UE. The network controller responsively indicates the service request to a Unified Data Management (UDM). The UDM receives the indication. The UDM identifies provisioned service values for the wireless UE. The UDM retrieves updated service values for the wireless UE. The UDM identifies a set of the provisioned service values that correspond to the updated service values. The UDM generates new provisioned service values by overriding the set of the provisioned service values based on the updated service values. The UDM transfers new provisioned service values to the network controller. The network controller receives the new provisioned service values. The network controller serves the wireless UE based on the new provisioned service values.