H04W48/02

Systems, methods, and devices for access control for private slices in a PLMN
11711757 · 2023-07-25 · ·

Systems and methods provide user equipment (UE) access parameters for access control when, for example, the UE is accessing a non-public network, the UE is accessing a private slice in a public land mobile network (PLMN), the UE is accessing a non-public network for PLMN service, and/or the UE is accessing a private slice in a PLMN for a non-public network service.

DETECTION OF A DELINQUENT MOBILE DEVICE
20180013898 · 2018-01-11 ·

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

Apparatus and method for providing operator specific service

Convergence of a 5.sup.th-Generation communication system supporting higher data rates beyond 4.sup.th-Generation system(s) with a technology for Internet of Things (IoT) may be applied to intelligent services. Operator specific services are permitted and provided by allowing an unauthorized terminal to search for and access the such services, and includes notifying a terminal of information corresponding to “operator specific services” by allowing a base station to broadcast predetermined information, displaying information acquired by a terminal, matching information acquired by the terminal with information broadcast from a base station to arrange services, requesting access and notifying a terminal performs an access for “operator specific services” upon accessing a network, providing a menu for determining whether neighboring base stations are capable of “operator specific services” to a user of a terminal, and allowing the terminal to determine whether there is the base station broadcasting the information.

Apparatus and method for providing operator specific service

Convergence of a 5.sup.th-Generation communication system supporting higher data rates beyond 4.sup.th-Generation system(s) with a technology for Internet of Things (IoT) may be applied to intelligent services. Operator specific services are permitted and provided by allowing an unauthorized terminal to search for and access the such services, and includes notifying a terminal of information corresponding to “operator specific services” by allowing a base station to broadcast predetermined information, displaying information acquired by a terminal, matching information acquired by the terminal with information broadcast from a base station to arrange services, requesting access and notifying a terminal performs an access for “operator specific services” upon accessing a network, providing a menu for determining whether neighboring base stations are capable of “operator specific services” to a user of a terminal, and allowing the terminal to determine whether there is the base station broadcasting the information.

NETWORK SLICING INFORMATION PROCESSING METHOD, TERMINAL DEVICE, AND NETWORK DEVICE
20230239774 · 2023-07-27 ·

The present application relates to a network slicing information processing method, a terminal device, and a network device. The method comprises: the terminal device receives first information, the first information comprising network slicing information and a limiting condition corresponding to the network slicing information, and the first information being used for determining priority information of a cell or frequency point by the terminal device when performing cell selection or reselection. Embodiments of the present application can be used for determining the cell or frequency point priority information by the terminal device when performing the cell selection or reselection.

METHOD AND APPARATUS FOR RECEIVING DOWNLINK DATA PACKETS OVER N3GPP ACCESS

Methods and apparatus for receiving downlink data packets over Non-Third Generation Partnership Project (N3GPP) access. A User Equipment (UE) is configured to manage the triggering of Service Request procedures for receiving N3GPP Mobile Terminating (MT) packets in a coverage area of N3GPP access from a 5th Generation (5G) network. A Service Request procedure is triggered by the UE if the UE detects that the UE is in the coverage area of N3GPP access and that the UE is in 5th Generation Mobility Management (5GMM)-IDLE mode over N3GPP access and the back-off timer has expired. The detection is based on the UE determining that an access stratum connection is established between the UE and the 5G network over N3GPP access.

DATA TRANSMISSION METHOD, ELECTRONIC DEVICE, AND STORAGE MEDIUM

A data transmission method is provided. The method comprises: a terminal device receiving first indication information, wherein the first indication information is used to determine whether the terminal device is valid; and the terminal device determining, according to the first indication information, whether to transmit first data. Further disclosed are another data transmission method, an electronic device, and a storage medium.

ACCESS RESTRICTION FOR A PRIVATE OR NEUTRAL-HOST NETWORK
20230007574 · 2023-01-05 · ·

During operation, a computer receives an attachment request from a radio node, where the attachment request is associated with an electronic device, and includes an identifier of the radio node, an identifier of the electronic device and an identifier of a service provider. Then, the computer determines a first entity identifier of an entity based at least in part on the identifier of the radio node and a second entity identifier of the entity based at least in part on the identifier of the electronic device. When the first entity identifier matches the second entity identifier, the computer performs authentication of the electronic device. Alternatively, if the entity identifiers are different, but the identifier of the service provider matches a stored identifier, the computer performs the authentication of the electronic device. Otherwise, the computer does not allow the electronic device to attach to a private or neutral-host network.

Access control for wireless cellular communication systems

Described is an apparatus of a User Equipment (UE). The apparatus may comprise a first circuitry, a second circuitry, and a third circuitry. The first circuitry may be operable to determine that the UE is in an Inactive Radio Resource Control (RRC) state. The second circuitry may be operable to process a first transmission received by the UE while the UE is in the Inactive RRC state, the first transmission carrying a set of one or more Access Control (AC) parameters. The third circuitry may be operable to regulate the sending of a second transmission, in accordance with the set of one or more AC parameters, while the UE is in the Inactive RRC state.

Access control for wireless cellular communication systems

Described is an apparatus of a User Equipment (UE). The apparatus may comprise a first circuitry, a second circuitry, and a third circuitry. The first circuitry may be operable to determine that the UE is in an Inactive Radio Resource Control (RRC) state. The second circuitry may be operable to process a first transmission received by the UE while the UE is in the Inactive RRC state, the first transmission carrying a set of one or more Access Control (AC) parameters. The third circuitry may be operable to regulate the sending of a second transmission, in accordance with the set of one or more AC parameters, while the UE is in the Inactive RRC state.