H04W48/02

SYSTEM AND METHOD TO IDENTIFY UNAUTHORIZED AERIAL USER EQUIPMENT OVER A TERRESTRIAL NETWORK

Aspects of the subject disclosure may include, for example, a method in which a processing system detects user equipment (UE) in communication with a network via a serving cell of the network; the network is configured to facilitate communications by one or more terrestrial UEs and one or more aerial UEs. The system monitors messages from an aerial UE regarding detection of a cell other than the serving cell, and receives information from the aerial UE regarding the detected cell. The method further includes analyzing the information to estimate a first quantity associated with the detected cell location relative to the serving cell and a second quantity associated with a power received at the aerial UE from the detected cell. The method also includes determining, based on the analyzing, whether the aerial UE is an unauthorized aerial UE. Other embodiments are disclosed.

Back-off timer for network reattachment

Various communication systems may benefit from improved network signaling or attachment. A method, in certain embodiments, may include receiving at a network node an initial attachment request message from a user equipment. The method may also include issuing a back-off timer when accepting the initial attachment request from the user equipment. The back-off timer may include a duration of time in which the user equipment is not allowed to reattach to a network. In addition, the method may include receiving at the network node another attachment request message from the user equipment. Further, the method may include determining whether the duration of the back-off timer has lapsed, and rejecting the another attachment request from the user equipment when the duration of time of the back-off timer has not lapsed.

Back-off timer for network reattachment

Various communication systems may benefit from improved network signaling or attachment. A method, in certain embodiments, may include receiving at a network node an initial attachment request message from a user equipment. The method may also include issuing a back-off timer when accepting the initial attachment request from the user equipment. The back-off timer may include a duration of time in which the user equipment is not allowed to reattach to a network. In addition, the method may include receiving at the network node another attachment request message from the user equipment. Further, the method may include determining whether the duration of the back-off timer has lapsed, and rejecting the another attachment request from the user equipment when the duration of time of the back-off timer has not lapsed.

Access rejection method, apparatus and system, and storage medium and processor
11516727 · 2022-11-29 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

Access rejection method, apparatus and system, and storage medium and processor
11516727 · 2022-11-29 · ·

Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.

METHODS AND APPARATUS FOR CONTROLLING PERMISSIONS OF A UE FOR ACCESSING A NETWORK

Methods and systems for controlling permissions of a UE for accessing a network. A method disclosed herein includes initiating, by a User Equipment (UE), a registration procedure with a serving network for accessing a selected network, wherein the selected network includes one of at least one CAG cell of an NPN and a VPLMN. The registration procedure indicates a network selection mode using which the UE has selected the network and the network selection mode includes one of an automatic mode and a manual mode. The method further incudes determining, by the serving network, a reject mode for rejecting the registration request of the UE based on the network selection mode indicated in the registration request, when the permissions of the UE to access the selected network have not been verified, wherein the reject mode includes a protected reject mode and an unprotected reject mode.

ACCESS MANAGEMENT METHOD AND DEVICE FOR PERFORMING DATA COMMUNICATION SERVICE BY USING NAS PROTOCOL IN 5G ENVIRONMENT
20220377695 · 2022-11-24 ·

The present disclosure relates to a communication method and system for converging a 5.sup.th-Generation (5G) communication system for supporting higher data rates beyond a 4.sup.th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. According to one embodiment of the disclosure, terminal access is controlled or terminal access is permitted by using NAS protocol in a 5G communication, and thus a congested situation can be controlled.

SERVICE REQUEST PROCESSING METHOD AND DEVICE AND ELECTRONIC DEVICE
20220377648 · 2022-11-24 ·

A service request processing method. The service request processing method includes obtaining service response state information mapped by a first service node on a physical layer; detecting whether the service response state information satisfied an access condition; prohibiting outputting a physical layer access request for the first service node if the access condition is not satisfied; and outputting the physical layer access request for the first service node to request to establish a physical transmission link with the first service node to receive requested service information fed back by the first service node through the physical transmission link if the access condition is satisfied.

SERVICE REQUEST PROCESSING METHOD AND DEVICE AND ELECTRONIC DEVICE
20220377648 · 2022-11-24 ·

A service request processing method. The service request processing method includes obtaining service response state information mapped by a first service node on a physical layer; detecting whether the service response state information satisfied an access condition; prohibiting outputting a physical layer access request for the first service node if the access condition is not satisfied; and outputting the physical layer access request for the first service node to request to establish a physical transmission link with the first service node to receive requested service information fed back by the first service node through the physical transmission link if the access condition is satisfied.

Access control for network slices of a wireless communication system

A base station for a wireless communication network comprising a plurality of logical radio access networks, wherein the base station is configured to communicate with a plurality of users to be served by the base station for accessing one or more of the logical radio access networks, and the base station is configured to selectively control the physical resources of the wireless communication network assigned to the logical radio access networks and/or to control access of the users or user groups to one or more of the logical radio access networks, wherein, during a first operation mode of the wireless communication network, the base station is configured to allow access of users or user groups of one or more of the logical radio access networks (e.g., eMBB, URLLC, eMTC), and wherein, during a second operation mode of the wireless communication network, the base station is configured to adaptively limit access of users or user groups to one or more of the logical radio access networks, and/or adaptively reduce a number of enabled logical radio access networks.