Patent classifications
H04W12/102
Methods for support of user plane separation and user plane local offloading for 5G non-3GPP access
Methods to support User Plane Separation (UPS) and User Plane Local offloading (UPL) for Fifth Generation (5G) non-Third Generation Partnership Project (3GPP) access are provided, including solutions for untrusted non-3GPP, trusted non-3GPP, and fixed/wireline communications via a Non-3GPP interworking Function (N3IWF) node. Three UPS solutions methods are provided, as well as UPL solution methods for 5G non-3GPP access involving N3IWFs with or without separated Control Plane (CP) and User Plane (UP) that are combined with a User Plane Function (UPF). Solutions to allow multiple CP entities to control the same single UP entity are also provided.
User Plane Security Enforcement Information Determining Method, Apparatus, and System
A user plane security enforcement information determining method and an apparatus are provided, to ensure a security requirement of transmitted data of a remote device. In this application, a session management network element may receive a first request for creating a relay-type session of a first terminal device. Then, the session management network element determines first user plane security enforcement information of the session based on first information, and sends the first user plane security enforcement information of the session to an access network device, where the first user plane security enforcement information of the session is for determining a first user plane security activation status of the session between the first terminal device and the access network device.
User Plane Security Enforcement Information Determining Method, Apparatus, and System
A user plane security enforcement information determining method and an apparatus are provided, to ensure a security requirement of transmitted data of a remote device. In this application, a session management network element may receive a first request for creating a relay-type session of a first terminal device. Then, the session management network element determines first user plane security enforcement information of the session based on first information, and sends the first user plane security enforcement information of the session to an access network device, where the first user plane security enforcement information of the session is for determining a first user plane security activation status of the session between the first terminal device and the access network device.
Automatic Connectivity for Voice over WI-FI Calls
A UE can enable a VoWIFI service, receive hidden SSID information, and register with a core network via a RAN. The UE can monitor a first signal strength of a first signal from the RAN. The UE can scan for a second signal from a WLAN, and when found, can measure a second signal strength of the second signal. The UE can determine whether the first signal strength is at or below a first threshold. If so, and if the WLAN is untrusted, the UE can probe it with the hidden SSID information. If the untrusted WLAN responds, the UE can send an access request to an untrusted WLAN access point. The UE can receive, via the untrusted WLAN access point, an authentication challenge from an ePDG. If the UE passes the authentication challenge, the UE can register with the core network via the untrusted WLAN and the ePDG.
Automatic Connectivity for Voice over WI-FI Calls
A UE can enable a VoWIFI service, receive hidden SSID information, and register with a core network via a RAN. The UE can monitor a first signal strength of a first signal from the RAN. The UE can scan for a second signal from a WLAN, and when found, can measure a second signal strength of the second signal. The UE can determine whether the first signal strength is at or below a first threshold. If so, and if the WLAN is untrusted, the UE can probe it with the hidden SSID information. If the untrusted WLAN responds, the UE can send an access request to an untrusted WLAN access point. The UE can receive, via the untrusted WLAN access point, an authentication challenge from an ePDG. If the UE passes the authentication challenge, the UE can register with the core network via the untrusted WLAN and the ePDG.
INTEGRITY PROTECTION FAILURE HANDLING METHOD AND APPARATUS, AND USER EQUIPMENT
An integrity protection failure handling method and apparatus, and user equipment are provided. The method includes: performing, by a first user equipment, a security control operation in at least a case that an integrity check failure indication for a sidelink signaling bearer is received.
Dynamic cellular network spectrum sharing
Various arrangements for allocating spectrum between a cellular network provider and a secondary operator are presented. A cellular network component of the secondary operator may determine that spectrum at a secondary operator radio unit (RU) is not currently needed. The cellular network component of the secondary operator may cause the spectrum to be released for use by a cellular network operator such that the secondary operator RU is not permitted to use the released spectrum. A cellular network operator RU may then communicate with a first set of user equipment (UE) using the released spectrum. The secondary operator RU and cellular network operator RU may be located at a same location.
Dynamic cellular network spectrum sharing
Various arrangements for allocating spectrum between a cellular network provider and a secondary operator are presented. A cellular network component of the secondary operator may determine that spectrum at a secondary operator radio unit (RU) is not currently needed. The cellular network component of the secondary operator may cause the spectrum to be released for use by a cellular network operator such that the secondary operator RU is not permitted to use the released spectrum. A cellular network operator RU may then communicate with a first set of user equipment (UE) using the released spectrum. The secondary operator RU and cellular network operator RU may be located at a same location.
Method and apparatus for link configuration and routing of relay system
An operation method of a first terminal may include: configuring a Uu access link with a base station, and receiving a first message from the base station, the first message including a relay RNTI for identifying the first terminal, a node address of the base station, and a RAP entity ID for identifying a RAP entity configured for the first terminal; configuring a relay link with a second terminal when communication with the base station is disconnected; requesting link switching by transmitting to the base station a second message via the second terminal, the second message including the relay RNTI, node address, and RAP entity ID; and receiving a response to the second message from the base station via the second terminal, and switching a link with the base station from the Uu access link to the relay link.
Method and apparatus for link configuration and routing of relay system
An operation method of a first terminal may include: configuring a Uu access link with a base station, and receiving a first message from the base station, the first message including a relay RNTI for identifying the first terminal, a node address of the base station, and a RAP entity ID for identifying a RAP entity configured for the first terminal; configuring a relay link with a second terminal when communication with the base station is disconnected; requesting link switching by transmitting to the base station a second message via the second terminal, the second message including the relay RNTI, node address, and RAP entity ID; and receiving a response to the second message from the base station via the second terminal, and switching a link with the base station from the Uu access link to the relay link.