Patent classifications
H04W48/02
Communication control apparatus and communication control method for partial spectrum use by different systems
A communication control apparatus (40) includes: a first determination unit (442) that periodically determines an operation parameter related to radio transmission of each of a single or a plurality of second wireless systems that perform wireless communication by utilizing a radio wave of a frequency band used by a single or a plurality of first wireless systems; a second determination unit (444) that determines, when a radio-wave use request is received from a new second wireless system in a determination period of the operation parameter, whether or not to define the new second wireless system as a system to be forcibly stopped when the first wireless system uses the radio wave; and a notification unit (445) that makes a notification to the new second wireless system regarding a radio-wave use permission before a next determination period of the operation parameter.
On-demand security for network resources or nodes, such as for a wireless 5G network
The disclosed embodiments include a method performed by a network access node to thwart unauthorized activity on a network such as a 5G wireless network. For example, the method can include employing contextual information to determine risk to the 5G wireless network. A network access node can detect that a wireless device seeks to perform unauthorized activity, and then implements security measures such that the unauthorized activity is thwarted at the network access node.
NETWORK ENTITY, USER EQUIPMENT AND METHOD
A network entity for a mobile telecommunications system, including circuitry configured to perform an admission control of a received connection request to the mobile telecommunications system, wherein the admission control is performed based on a plurality of admission control layers.
NETWORK ENTITY, USER EQUIPMENT AND METHOD
A network entity for a mobile telecommunications system, including circuitry configured to perform an admission control of a received connection request to the mobile telecommunications system, wherein the admission control is performed based on a plurality of admission control layers.
SYSTEMS AND METHODS FOR POLICY AND LOCATION-BASED DATA NETWORK SELECTION IN A WIRELESS NETWORK
A system described herein may dynamically determine whether a User Equipment (“UE”) is authorized to access a given Local Area Data Network (“LADN”) based on dynamically determined factors, such as temporal factors, network load factors, registration or de-registration of the UE for the LADN, etc. Updates to such polices may be further used to determine whether the UE is authorized to access the LADN. Thus, the providing of services associated with a LADN may be more dynamic and based on additional factors than a determination of whether UE subscription information (e.g., as provided by a UE information repository) indicates that a given UE has subscribed to the LADN.
METHOD AND AMF APPARATUS FOR NSAC OPERATION BASED ON UE'S ACTUAL USAGE
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein provide a method of an access and mobility management function (AMF). The method includes monitoring whether a user equipment (UE) registered to a network slice establishes a protocol data unit (PDU) session using the network slice for a time, determining that the UE does not establish the PDU session in the time based on an expiration of a timer and deregistering the UE for the network slice.
METHOD AND AMF APPARATUS FOR NSAC OPERATION BASED ON UE'S ACTUAL USAGE
The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. Embodiments herein provide a method of an access and mobility management function (AMF). The method includes monitoring whether a user equipment (UE) registered to a network slice establishes a protocol data unit (PDU) session using the network slice for a time, determining that the UE does not establish the PDU session in the time based on an expiration of a timer and deregistering the UE for the network slice.
Method for performing access control and device supporting the same
Provided are a method of access control and a device supporting the method. According to an embodiment of the present disclosure, the method includes: selecting access information for an access to a cell; determining channel access priority class (CAPC) mapped to the selected access information; performing a listen-before-talk (LBT) procedure based on the CAPC; and transmitting an access request to the cell, when a result of the LBT is successful. According to another embodiment of the present disclosure, the method includes: determining channel access priority class (CAPC) mapped to a control message; performing a listen-before-talk (LBT) procedure based on the CAPC; and transmitting the control message, when a result of the LBT is successful.
Method for performing access control and device supporting the same
Provided are a method of access control and a device supporting the method. According to an embodiment of the present disclosure, the method includes: selecting access information for an access to a cell; determining channel access priority class (CAPC) mapped to the selected access information; performing a listen-before-talk (LBT) procedure based on the CAPC; and transmitting an access request to the cell, when a result of the LBT is successful. According to another embodiment of the present disclosure, the method includes: determining channel access priority class (CAPC) mapped to a control message; performing a listen-before-talk (LBT) procedure based on the CAPC; and transmitting the control message, when a result of the LBT is successful.
Techniques in evolved packet core for restricted local operator services access
Embodiments of the present disclosure describe methods, apparatuses, storage media, and systems for performing a restricted local operator services (RLOS) authorization procedure. Various embodiments enable a network to authorize a user equipment (UE) with an RLOS access or subscription properly while aiding in minimizing or preventing potential denial-of-service (DoS) attacks. Other embodiments may be described and claimed.