CN116981002A - Method for processing updated CAG configuration and user equipment - Google Patents

Method for processing updated CAG configuration and user equipment Download PDF

Info

Publication number
CN116981002A
CN116981002A CN202310450730.0A CN202310450730A CN116981002A CN 116981002 A CN116981002 A CN 116981002A CN 202310450730 A CN202310450730 A CN 202310450730A CN 116981002 A CN116981002 A CN 116981002A
Authority
CN
China
Prior art keywords
network
snpn
cag
configuration
plmn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310450730.0A
Other languages
Chinese (zh)
Inventor
林元杰
赖家龄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MediaTek Inc
Original Assignee
MediaTek Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US18/129,064 external-priority patent/US20230354178A1/en
Application filed by MediaTek Inc filed Critical MediaTek Inc
Publication of CN116981002A publication Critical patent/CN116981002A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure relates to a method and user equipment for handling updated CAG configuration. A method is provided for handling updated NPN configurations received from a first unmanaged network via downlink non-access stratum (DL NAS) signaling. In one embodiment, the UE receives an updated CAG-related configuration containing one or more CAGs associated with (time) validity information. The UE enters the state PLMN-SEARCH and applies network selection processing using the updated CAG related configuration. The UE selects and registers with a second managed network having one or more CAGs, wherein the one or more CAGs are included in the updated CAG-related configuration and configured with associated (time) validity information, and the (time) validity criterion is satisfied.

Description

Method for processing updated CAG configuration and user equipment
Cross Reference to Related Applications
The subject matter of U.S. provisional application entitled "Local Service Provided by NPN (PNI-NPN or SNPN-NPN) (NPN for localized services)", filed on 29:2022, 4:119, is hereby incorporated by reference herein in accordance with 35U.S. C..
Technical Field
The disclosed embodiments relate generally to wireless mobile communication networks and, more particularly, to methods for providing localized services by non-public networks and for handling updated closed access group (Closed Access Group, CAG) related configurations.
Background
A public land mobile network (Public Land Mobile Network, PLMN) is a network established and operated by a manager or approved operating agent (recognized operating agency, ROA) for the specific purpose of providing land mobile services to the public. The PLMN provides communication possibilities for mobile subscribers. The PLMN may provide services in one frequency band or a combination of multiple frequency bands. Access to PLMN services is achieved through an air interface involving wireless communication between mobile telephones and base stations with integrated IP network services. One PLMN may include multiple radio access networks (radio access network, RAN) utilizing different radio access technologies (radio access technology, RATs) to access mobile services. The radio access network is part of a mobile communication system implementing radio access technologies. Conceptually, a RAN resides between mobile devices and provides connectivity to its Core Network (CN). According to the standard, mobile phones and other wireless connected devices are variously referred to as UEs (i.e., MSs), terminal equipment (terminal equipment, TE), mobile Stations (MSs) (i.e., UEs), mobile terminals (mobile termination, MT), etc. Examples of different RATs include 2G GERAN (GSM) access networks, 3G UTRAN (UMTS) radio access networks, 4G E-UTRAN (LTE), 5G New Radio (NR) radio access networks, next-Generation RANs (NG-RANs), and other non-3 GPP access RATs including Wi-Fi.
In contrast to PLMNs, non-public networks (NPN) are non-public networks that are not commonly used. SNPN is an independent Non-Public Network (SNPN), i.e. is operated by NPN operators and does not depend on Network functions provided by PLMN; or public network integrated NPN (Public Network Integrated NPN, PNI-NPN), i.e. deployment of non-public networks with PLMN support. The credential holders (Credentials Holder, CH) can authenticate and authorize access to the SNPN separate from the credential holders. The combination of the PLMN ID and the network identifier (Network identifier, NID) identifies the SNPN. The UE may be supported for SNPN.
PNI-NPN is an NPN made available via the PLMN, for example by means of a dedicated DNN or by one or more network slice instances assigned to the NPN. When the PNI-NPN is made available via the PLMN, the UE should have a subscription to the PLMN to access the PNI-NPN. Since the network slice is not able to prevent the UE from attempting to access the network in areas where the UE is not allowed to use the network slice allocated for NPN, access control for PNI-NPN may be applied using the closed access group. The CAG identifies a set of subscribers allowed to access one or more CAG cells associated with the CAG. The CAG is used for the PNI-NPN to prevent UEs not allowed to access the NPN via the associated cell from automatically selecting and accessing the associated CAG cell. CAGs are used for access control, e.g. authorization at cell selection, and are configured in subscriptions as part of mobility restrictions. CAGs are identified by CAG identifiers that uniquely and uniquely identify within the PLMN ID.
A localized or localized service is a localized service (e.g., provided in a specific/limited area and/or bounded in time). A localized service provider is an application provider or network operator that localizes its services and provides them to end users via a hosted network. The hosting network is a network that provides (access to) localized services, and may be a SNPN or PNI-NPN, and the home network is a network that owns the current usage subscription or credentials of the UE. The home network may be a home PLMN or a subscribed SNPN. The end user may allow or prohibit access to the localized service. If the end user prohibits access to the localized service, the UE (i.e., MS) may not access the NPN that provides access to the localized service.
In order to provide (access to) localized services to a UE, the UE needs to be able to discover, select and access the NPN (as a hosted network) that provides access to the localized services.
Disclosure of Invention
According to one novel aspect, a method is provided for handling updated NPN configurations received from a first unmanaged network via Downlink Non-Access-Stratum (DL NAS) signaling. In one embodiment, the UE receives an updated CAG-related configuration containing one or more CAGs associated with (time) validity information. The UE enters the state PLMN-SEARCH and applies network selection processing using the updated CAG related configuration. The UE selects and registers with the second hosted network, wherein the one or more CAGs are included in the updated CAG-related configuration and configured with associated (time) validity information, and the (time) validity criterion is satisfied. In another embodiment, the UE receives an updated SNPN configuration containing one or more SNPNs associated with (time) validity information. The UE enters the PLMN-SEARCH state and applies network selection processing using the updated SNPN configuration. The UE selects and registers with a second hosted network that is included in the updated SNPN configuration and is configured with associated (time) validity information, and the (time) validity criteria are satisfied.
According to one novel aspect, a method is provided for handling updated NPN configurations received from a first managed network via DL NAS signaling. In one embodiment, the UE receives an updated CAG-related configuration that does not include the first hosted network or that a validity criterion associated with the first hosted network is not satisfied. The UE enters the state PLMN-SEARCH and applies network selection processing using the updated CAG related configuration. The UE selects and registers with a second unmanaged network. In another embodiment, the UE receives an updated SNPN configuration that does not include the first hosted network or for which the validity criteria associated with the first hosted network are not satisfied. The UE enters the PLMN-SEARCH state and applies network selection processing using the updated SNPN configuration. The UE selects and registers with a second unmanaged network.
Other embodiments and advantages are described in the detailed description that follows. This summary is not intended to limit the invention. The invention is defined by the claims.
Drawings
Fig. 1 schematically illustrates a communication system with PLMNs, SNPNs, and PNI-NPN supporting (hosting) a network and cell selection for localized services in accordance with one novel aspect.
Fig. 2 illustrates a simplified block diagram of a user equipment and a network entity according to an embodiment of the present invention.
Fig. 3A illustrates a first embodiment of a 5G system architecture for accessing a SNPN using credentials from a credential holder.
Fig. 3B illustrates a second embodiment of a 5G system architecture for accessing a SNPN using credentials from a credential holder.
Fig. 4 illustrates an example of NG-RAN mode broadcasting certain information in order to provide access to the SNPN.
Fig. 5A illustrates an example of a SNPN-enabled UE configured with 2 SNPN subscriptions (i.e., the SNPNs of the 2 subscriptions in the "subscriber data list").
Fig. 5B illustrates an example of a SNPN-enabled UE configured with 2 PLMN subscriptions (i.e., 2 USIMs).
Fig. 6 illustrates network selection in an SNPN access mode with automatic and manual SNPN network selection.
Fig. 7A illustrates a first embodiment of network and cell selection and access control for a PNI-NPN (CAG) cell, wherein access to the CAG cell is accepted.
Fig. 7B illustrates a second embodiment of network and cell selection and access control for non-CAG cells (public cells), wherein access to the PLMN is accepted.
Fig. 8A illustrates a first embodiment of network and cell selection and access control for a PNI-NPN (CAG) cell, wherein access to the CAG cell is denied.
Fig. 8B illustrates a second embodiment of network and cell selection and access control for non-CAG cells (public cells), wherein access to the PLMN is denied.
Fig. 9A illustrates one example of a UE using validity information to discover, select, and access an NPN (as a hosted network) that provides access to localized services.
Fig. 9B illustrates another example of a UE using validity information associated with a snp to discover, select, and access an NPN (as a managed network) and receive localized services.
Fig. 9C illustrates different examples of UEs using the validity information associated with CAGs (of PLMNs) to discover, select and access NPN (as a hosted network) and to receive localized services.
Fig. 10A illustrates a first example of accessing an SNPN (as a managed network) that provides access for localized services, where the access is accepted.
Fig. 10B illustrates a second example of accessing an SNPN (as a managed network) that provides access to localized services, where access is denied.
Fig. 11A illustrates a first example of an access PNI-NPN/CAG (as a managed network) providing access for localized services, wherein the access is accepted.
Fig. 11B illustrates a second example of access to a PNI-NPN/CAG (as a managed network) providing access to a localized service, wherein access is denied.
Fig. 12 illustrates a UE receiving an updated CAG configuration from an unmanaged network and thereby performing network selection to select a managed network (PNI-NPN/CAG) in accordance with a novel aspect.
Fig. 13 illustrates a UE receiving an updated SNPN configuration from an unmanaged network and thereby performing network selection to select a managed network (SNPN) in accordance with one novel aspect.
Fig. 14 illustrates a UE receiving an updated CAG configuration from a managed network (PNI-NPN/CAG) and thereby performing network selection to select an unmanaged network in accordance with a novel aspect.
Fig. 15 illustrates a UE receiving an updated SNPN configuration from a managed network (SNPN) and thereby performing network selection to select an unmanaged network in accordance with a novel aspect.
Fig. 16 is a flow diagram of a method for handling updated CAG related configurations from an unmanaged network in accordance with one novel aspect.
Fig. 17 is a flow diagram of a method for processing updated SNPN configurations from an unmanaged network in accordance with one novel aspect.
Fig. 18 is a flow diagram of a method for handling updated NPN configurations from a managed network in accordance with one novel aspect.
Detailed Description
Reference will now be made in detail to some embodiments of the invention, examples of which are illustrated in the accompanying drawings.
Fig. 1 schematically illustrates a communication system 100 having a PLMN 110, a standalone SNPN 120, and a PNI-NPN/CAG 130, the public network integrating NPN/CAG 130 providing access for localized services, according to one novel aspect. The PLMN network 110 includes control plane functions, user plane functions (e.g., UPF), and applications that provide various services by communicating with a plurality of UEs including the UE 101. The serving base station gNB 112 is part of the radio access network RAN 140. The RAN 140 provides radio access to the UE 101 via a RAT. Access and mobility management functions (mobility management function, AMF) in the PLMN 110 communicate with the gNB 112. The UE 101 can be equipped with a Radio Frequency (RF) transceiver or multiple RF transceivers.
The SNPN network 120 includes control plane functions, user plane functions (e.g., UPF), and applications that provide various services by communicating with a plurality of UEs including the UE 101. The combination of PLMN ID and NID identifies the SNPN. Serving base station gNB 122 is part of RAN 150. The RAN 150 provides radio access to the UE 101 via a RAT. The AMFs in the SNPN 120 communicate with the gNB 122. The SNPN 120 is operated by an NPN operator and relies on network functions provided by a public network. The Credential Holders (CH) may authenticate and authorize access to the SNPN separate from the credential holders. The NG-RAN node providing access to the SNPN broadcasts the following information: one or more PLMN IDs and a NID list (123) identifying, from PLMN ID to PLMN, non-public networks to which access is provided by the NG-RAN. The SNPN-enabled UE is configured with a PLMN ID and NID of the subscribed SNPN (SNPN ID), and the SNPN-enabled UE supporting access to the SNPN using credentials from the credential holder may be additionally configured with information (102) for SNPN selection (SNPN selection information or configuration) and registration (in SNPN access mode) using a SNPN subscription or using a PLMN subscription (USIM).
The PNI-NPN (CAG) network 130 includes control plane functions (which may optionally rely on control plane functions of a PLMN), user plane functions (which may optionally rely on user plane functions of a PLMN), and applications that provide various services by communicating with a plurality of User Equipment (UEs) including the UE 101. PNI-NPN (CAG) 130 is a non-public network deployed with support of PLMNs (e.g., PLMN 110) by sharing, for example, RAN/gNB 112 and, for example, control plane functions. The CAG identifies a set of subscribers allowed to access one or more CAG cells associated with the CAG. The CAG is used for the PNI-NPN to prevent UEs not allowed to access the NPN via the associated cell from automatically selecting and accessing the associated CAG cell. CAGs are identified by CAG identifiers that uniquely and uniquely identify within the PLMN ID. The CAG cell broadcasts one or more CAG identifiers (113) PLMN-by-PLMN and the UE is configured with CAG related configuration/information (e.g., a (enhanced) CAG information list containing a list of allowed CAGs PLMN-by-PLMN) (102).
A localized or localized service is a localized service (i.e., provided at a particular/limited area and/or bounded in time (a particular period of time)). A localized service provider is an application provider or network operator that localizes its services and provides them to end users via a hosted network. The managed network is a network that provides access for localized services and may be a SNPN or PNI-NPN, and the home network is a network that owns the current usage subscription or credentials of the UE. In the example of fig. 1, both the SNPN 120 and PNI-NPN (CAG) 130 may be hosted networks that provide access to the UE 101 for localized services.
The urs rules may include associations of UE applications and DNNs or network slices for specific localized services. The urs rules may also include "routing validity criteria" (time window and/or location criteria validity conditions) with time/location defined for a particular localized service. LADN (local access data network) may also be used to enable UEs to access localized services.
In order for the PNI-NPN or SNPN to provide access to the localized service, the PNI-NPN or SNPN operator enables the UE to configure the network according to information of the availability of the localized service to access the localized service, and the information is determined in conformity with the localized service provider, for example: (a) Such as the identity of the individual localized services to be used in the urs rules; (b) Validity criteria/limits for each localized service, e.g. duration and/or (area of) location.
When localized services in a network are completed, all UEs registered with the network are expected to move to another network or other cells within the same network. The other network may be an HPLMN, VPLMN or another SNPN. The UE may cease using network resources for local services for a number of reasons, such as: (a) completing a localized service in a network; (b) the validity condition of the network selection information is no longer satisfied; (c) The user decides to stop using the localized service before it is completed (e.g., the end user prohibits access to the localized service); (d) The network takes policy decisions, the effect of which is that the UE is de-registered before the localized service is completed. Validity information or restrictions or criteria or conditions (103) are provided or configured to the UE as part of the localized service information for restricting access by the UE to the SNPN/PNI-NPN (as a managed network) providing access to the localized service. In order to provide localized services to UEs, the UEs need to be able to discover, select and access the SNPN/PNI-NPN (as a managed network) that provides access to localized services. The discovery mechanism is based on providing or configuring the UE with appropriate information.
Fig. 2 illustrates a simplified block diagram of a wireless device (e.g., UE 201 and network entity 211) according to an embodiment of the present invention. The network entity 211 may be a base station combined with an AMF. The network entity 211 has an antenna 215 that sends and receives radio signals. A radio frequency RF transceiver module 214 coupled to the antenna receives the RF signal from the antenna 215, converts it to a baseband signal and transmits the baseband signal to the processor 213. The RF transceiver 214 also converts the baseband signal received from the processor 213 into an RF signal and transmits it to the antenna 215. The processor 213 processes the received baseband signal and invokes different functional modules to perform features in the base station 211. The memory 212 stores program instructions and data 220 that control the operation of the base station 211. In the example of fig. 2, network entity 211 also includes a set of control function modules and circuits 290. Registration circuitry 231 is responsible for registration and mobility procedures. Session management circuit 232 is responsible for session management functions. The configuration and control circuit 233 provides different parameters to configure and control the UE.
Similarly, the UE 201 has a memory 202, a processor 203, and a Radio Frequency (RF) transceiver module 204. The RF transceiver 204 is coupled to the antenna 205, receives RF signals from the antenna 205, converts them to baseband signals, and transmits the baseband signals to the processor 203. The RF transceiver 204 also converts the baseband signal received from the processor 203 into an RF signal and transmits it to the antenna 205. The processor 203 processes the received baseband signals and invokes various functional modules and circuits to perform the features in the UE 201. The memory 202 stores data and program instructions 210 to be executed by the processor to control the operation of the UE 201. Suitable processors include, by way of example, a special purpose processor, a digital signal processor (digital signal processor, DSP), a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, a controller, a microcontroller, application specific integrated circuits (application specific integrated circuit, ASIC), file programmable gate array (field programmable gate array, FPGA) circuits, and other types of integrated circuits (integrated circuit, ICs), and/or state machines. A processor associated with the software may be used to implement and configure features of the UE 201.
The UE 201 also includes a set of functional modules and control circuitry for performing the functional tasks of the UE 201. The protocol stack 260 includes a Non-Access-Stratum (NAS) layer in communication with an AMF entity connected to the core network, a radio resource control (Radio Resource Control, RRC) layer for higher layer configuration and control, a packet data convergence protocol/radio link control (Packet Data Convergence Protocol/Radio Link Control, PDCP/RLC) layer, a medium Access control (Media Access Control, MAC) layer, and a Physical (PHY) layer. The system modules and circuitry 270 may be implemented and configured by software, firmware, hardware, and/or combinations thereof. The functional modules and circuits, when executed by the processor through program instructions contained in the memory, interact with each other to allow the UE 201 to perform implementation and functional tasks and features in the network. In one example, the system modules and circuitry 270 include registration circuitry 221 to perform registration and mobility procedures with the network, network and cell selection circuitry 222 to perform network and cell selection, PLMN/PNI-NPN (CAG)/snp information maintenance circuitry 223 (the source of information may also come from signaling) responsible for the addition, removal and resetting of one or more PLMN/PNI-NPN (CAG)/snp information in SIM/USIM and/or UE (non-volatile) memory, configuration and control circuitry 224 responsible for configuration and control parameters. Note that network selection and registration related information, such as HPLMN, operator controlled PLMN/SNPN selector list, user controlled PLMN/SNPN selector list, may be stored in the (non-volatile) memory of the SIM/USIM225 and/or UE.
SNPN
Fig. 3A illustrates a first embodiment of a 5G system architecture for accessing a SNPN using credentials from a credential holder. Fig. 3A depicts a 5G system architecture with a SNPN of a credential holder using an AAA server for primary authentication and authorization. AUSF and UDM in the SNPN may use credentials from an AAA server in the Credential Holder (CH) to support primary authentication and authorization of the UE. The SNPN in fig. 3A may be the SNPN subscribed to for the UE (i.e., the NG-RAN broadcasts the SNPN ID of the subscribed SNPN). As a deployment option, the SNPN in fig. 3A may also be another SNPN than the subscribed SNPN for the UE (i.e., none of the SNPN IDs broadcast by the NG-RAN match the SNPN IDs corresponding to the subscribed SNPN). NSSAAF deployed in SNPN may use credentials from a credential holder using an AAA server (as depicted) to support primary authentication in SNPN and/or NSSAAF may support network slice-specific authentication and authorization with a network slice-specific AAA server (not depicted).
Fig. 3B illustrates a second embodiment of a 5G system architecture for accessing a SNPN using credentials from a credential holder. Fig. 3B depicts a 5G system architecture with a credential holder's SNPN using AUSF and UDM for primary authentication and authorization and network slicing. The SNPN may support primary authentication and authorization of a UE using credentials from a credential holder using AUSF and UDM. The credential holder may be a SNPN or PLMN. The credential holder UDM provides subscription data to the SNPN.
Fig. 4 illustrates an example of NG-RAN mode broadcasting certain information in order to provide access to a SNPN. The Credential Holders (CH) may authenticate and authorize access to the SNPN separate from the credential holders. For the SNPN identification, the combination of PLMN ID and NID identifies the SNPN. NID supports two assignment models. In the self-assigned mode, the NID is selected by the SNPN alone (and thus may not be unique) at deployment time, but uses a different number space than the coordinated assigned NID. In the coordinated allocation mode, NID is allocated using one of two options: 1) Assigning the NID such that it is globally unique, independent of the PLMN ID used; or 2) assign the NID such that the combination of NID and PLMN ID is globally unique.
The group ID (Group IDs for Network Selection, GIN) for network selection supports two allocation models. In the self-assignment mode, GIN is selected alone and therefore may not be unique. In the coordinated allocation mode, GIN uses a combination of PLMN ID and NID and is allocated using one of two options: 1) The GIN is assigned such that the NID is globally unique (e.g., using an IANA private enterprise number) regardless of the PLMN ID used; or 2) assign GIN such that the combination of NID and PLMN ID is globally unique.
In the example of fig. 4, NG-RAN 401 provides access to the SNPN and broadcasts the following information (410): one or more PLMN IDs and a NID list (e.g., SNPN 1 and SNPN 2) identifying non-public networks to which access is provided by the NG-RAN, PLMN-by-PLMN ID. Optionally, the broadcasted information further comprises the following: SNPN-by-SNPN human-readable network names (human-readable network name, HRNN); an indication of whether or not access using credentials from a credential holder is supported by the SNPN-by-SNPN; a list of supported group IDs (e.g., GIN 1 and GIN 2) for network selection on an SNPN-by-SNPN basis; and an indication of whether or not a single SNPN allows a registration attempt from a UE that is not explicitly configured to select that SNPN, for that SNPN, by the SNPN, i.e., the UE does not have any SNPN ID (PLMN id+nid) or GIN broadcast by that SNPN in the preferred SNPN/GIN prioritization list controlled by the credential holder.
Fig. 5A illustrates an example of a SNPN-enabled UE configured with SNPN subscription information for each subscribed SNPN. In the example of fig. 5A, the SNPN enabled UE 501 is configured with two SNPN subscriptions, as shown by 510/520 of the SNPN for each subscription: the SNPN ID (PLMN ID+NID) of the subscribed SNPN (e.g., SNPN 1 in entry 1 of "subscriber data List," SNPN 2 in entry 2 of "subscriber data List"); and a subscription identifier (Subscription identifier, SUPI) and credentials configured for each of the subscribed SNPNs. If the UE supports access to the SNPN using credentials from the credential holders for each subscribed SNPN, the UE is further configured with: 1) A prioritized list of user-controlled preferred SNPNs (e.g., SNPN 111, SNPN 112 for entry 1; SNPN 211, SNPN 212 for entry 2); 2) A prioritized list of preferred SNPNs controlled by the credential holders (e.g., SNPN 121, SNPN 122 for entry 1; SNPN 221, SNPN 222 for entry 2); and 3) prioritized lists of credential holders controlled GINs (e.g., GIN 131, GIN 132 for entry 1; GIN 231, GIN 232 for entry 2).
Fig. 5B illustrates an example of a SNPN-enabled UE configured with 2 PLMN subscriptions (i.e., 2 USIMs). A SNPN-enabled UE supporting access to SNPN using credentials from a credential holder and equipped with a PLMN subscription (USIM) may be additionally configured with information (in SNPN access mode) for selecting and registering SNPN using PLMN subscription. For example, PLMN subscription 1 is associated with information 530 for SNPN selection as follows: 1) A prioritized list of user-controlled preferred SNPNs (e.g., SNPN 311, SNPN 312); 2) Prioritized lists of SNPNs controlled by the credential holders (e.g., SNPN 321, SNPN 322); and 3) prioritized lists of GINs controlled by credential holders (e.g., GIN 331, GIN 332). Similarly, PLMN subscription 2 is associated with information 540 for SNPN selection: 1) A prioritized list of user-controlled preferred SNPNs (e.g., SNPN 411, SNPN 412); 2) Prioritized lists of SNPNs controlled by the credential holders (e.g., SNPN 421, SNPN 422); and 3) prioritized lists of GINs controlled by credential holders (e.g., GIN 431, GIN 432).
The subscription of the SNPN is identified by a SUPI containing a network specific identifier in the form of a network access identifier (Network Access Identifier, NAI). The area (realm) portion of the NAI may include the NID of the SNPN; or by SUPI containing IMSI. For a SNPN enabled UE with a SNPN subscription, the prioritized list of preferred SNPNs/GINs controlled by the credential holders may be updated by the CH using a roaming steering (Steering of Roaming, soR) procedure. For a SNPN-enabled UE with PLMN subscription, the prioritized list of preferred SNPNs/GINs controlled by the credential holders may be updated by the CH using the SoR procedure. When the credential holder updates the UE with the prioritized list of preferred snps and GINs controlled by the credential holder, the UE may again perform snp selection, e.g., to potentially select the SNPN with the higher priority.
Fig. 6 illustrates network selection in an SNPN access mode with automatic and manual SNPN network selection. The SNPN-enabled UE 601 supports access to SNPN (in SNPN access mode). When the UE is set to operate in the SNPN access mode, the UE selects and registers only with the SNPN. When the UE is set to operate in the SNPN access mode, the UE does not perform a normal PLMN selection procedure. There are two SNPN network selection procedures: an automatic SNPN network selection process and an artificial SNPN network selection process.
Under automatic SNPN network selection, the UE selects and attempts to register with available and allowed SNPNs in the following order: 1) The SNPN (if available) or equivalent (equivalent) SNPN (if available) to which the UE last registered; 2) A subscribed SNPN identified by a SNPN ID (PLMN id+nid) (for which the UE has SUPI and credentials); 3) If the UE supports access to the SNPN using credentials from the credential holder, the UE proceeds by selecting and attempting to register on an available and allowable SNPN that broadcasts an indication of support for access using credentials from the credential holder in the following order: a) The SNPN (in order of priority) in the prioritized list of user-controlled preferred SNPN; b) The SNPN (in order of priority) in the prioritized list of preferred SNPN controlled by the credential holder; c) A SNPN that additionally broadcasts GINs (in order of priority) contained in a prioritized list of preferred GINs controlled by the credential holder; and 4) a SNPN that additionally broadcasts an indication that the SNPN allows a registration attempt from a UE that is not explicitly configured to select SNPN, i.e., the broadcasted SNPN ID or GIN is not present in the prioritized list of preferred SNPN/GINs controlled by the credential holder in the UE.
In the example of fig. 6, the UE 601 registers with the SNPN 100, the subscribed SNPN is SNPN 1 and has three lists for credentials. The prioritized list of preferred SNPN of the user comprises SNPN 111 and SNPN 112; the prioritized list of preferred SNPNs controlled by the credential holders includes SNPN 121, SNPN 122; the prioritized list of GINs controlled by the credential holders includes GINs 131, 132. There is a list of SNPN/GINs available at the current UE location (broadcast by one or more NG-RANs), such as SNPN 100, SNPN 1, SNPN 111, SNPN 112, SNPN 121, SNPN 300/GIN 131. The UE 601 selects and attempts to register with the SNPN in the following order of preference/priority: SNPN 100, SNPN 1, SNPN 111, SNPN 112, SNPN 121, and SNPN 300, which also broadcasts GIN 131.
Under manual network selection, a UE operating in an SNPN access mode provides the user with a list of SNPNs (identified by PLMN IDs and NIDs, respectively) and associated human-readable network names (if available) of the SNPNs for which the UE has corresponding SUPI and credentials available. If the UE supports access to the SNPN using the credential from the credential holder, the UE also presents an available SNPN broadcasting an indication of "support for access using the credential from the credential holder" and a human-readable name associated with the SNPN, if available. When the UE performs initial registration for the SNPN, the UE should indicate to the NG-RAN the selected PLMN ID and NID broadcast by the selected SNPN. The NG-RAN should inform the AMF of the selected PLMN ID and NID.
If a UE performs a registration or service request procedure in the SNPN identified by the PLMN ID and the self-assigned NID and there is no subscription to the UE, the AMF should reject the UE with an appropriate cause code to temporarily prevent the UE from automatically selecting and registering to the same SNPN. If the UE performs a registration or service request procedure in the SNPN identified by the PLMN ID and NID allocated in coordination, and there is no subscription to the UE, the AMF should reject the UE with an appropriate cause code to permanently prevent the UE from automatically selecting and registering to the same SNPN. If the UE performs registration in the SNPN using the credentials from the credential holder and the UE is not authorized to access that particular SNPN, the UDM may reject the UE, which results in the AMF rejecting the registration request from the UE with the appropriate reason code to prevent the UE from selecting and registering in the same SNPN using the credentials from the credential holder. To prevent access to the SNPNs by one or more UEs that are authorized in the event of network congestion/overload, unified access control information (i.e., as part of the subscription information that the UE has for a given SNPN) is configured and provided to the UE from SNPN to SNPN.
PNI-NPN(CAG)
PNI-NPN (CAG) is an NPN available via the PLMN, for example, by means of a dedicated DNN or by one or more network slice instances assigned to the NPN. The existing network slicing function is applicable. When the PNI-NPN is made available via the PLMN, the UE will have a subscription to the PLMN to access the PNI-NPN. The CAG identifies a set of subscribers allowed to access one or more CAG cells associated with the CAG. The CAG is used for the PNI-NPN to prevent UEs not allowed to access the NPN via the associated cell from automatically selecting and accessing the associated CAG cell. CAGs are identified by CAG identifiers that uniquely and uniquely identify within the PLMN ID. The CAG cell broadcasts one or more CAG identifiers from PLMN to PLMN. The CAG cell may also broadcast HRNN on a CAG identifier-by-CAG identifier basis.
To use CAGs, UEs supporting CAGs indicated as part of the UE 5GMM core network capabilities may be preconfigured or (re) configured with the following CAG related information. If the UE supports CAG, the network may provide the UE with a CAG-related configuration consisting of zero or more entries (e.g., (enhanced) CAG information (list) containing a list of allowed CAGs per PLMN)), each entry containing: a) PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally "indication that UE is only allowed to access 5GS via CAG cell". The HPLMN may use a UE configuration update procedure or other 5GMM procedure (e.g., registration procedure or service procedure) to (pre) configure or reconfigure the UE with the CAG related configuration described above. The CAG related configuration described above is provided by the HPLMN PLMN by PLMN. In a PLMN, the UE should consider only CAG information provided for that PLMN.
When the relevant configuration of the subscribed CAG changes, the UDM sets a CAG information subscription change indication and sends it to the AMF. When the UDM indicates that the CAG related configuration within the access and mobility subscription data has changed, the AMF should provide the CAG related configuration to the UE. When the AMF receives an indication from the UDM that the CAG related configuration within the access and mobility subscription has changed, the AMF updates the UE with the CAG related configuration received from the UDM. When the AMF updates the UE and obtains an acknowledgement from the UE, the AMF notifies the UDM that the update was successful, and the UDM clears the CAG information subscription change indication flag. The AMF may update the UE using a UE configuration update procedure after the registration procedure is completed, or by including a new CAG-related configuration in a registration accept or registration reject or deregistration request or service reject.
When the UE is roaming and the serving PLMN provides CAG related configurations, the UE will update the CAG related configurations provided only for the serving PLMN, and not the CAG related configurations stored for the other PLMNs. When the UE is not roaming and the HPLMN provides a CAG related configuration, the UE will update the CAG related configuration stored in the UE with the received CAG related configuration for all PLMNs. The UE should store the latest available CAG related configuration for each PLMN it provides and keep its storage when the UE is de-registered or powered off. The CAG related configuration is only applicable to 5GS.
For network and cell selection, the CAG cell should broadcast information so that the cell is accessed only by CAG-enabled UEs; the cell is a CAG cell or a normal PLMN cell (non-CAG cell). For access control, to prevent authorized UEs from accessing the NPN in case of network congestion or overload, existing mechanisms defined for control plane load control, congestion and overload control, as well as access control and barring functions, may be used, or unified access control with access categories may be used. The mobility restriction should be able to restrict the mobility of the UE according to the allowed CAG list (if configured in the subscription) and include an indication as to whether the UE is only allowed to access 5GS via the CAG cell (if configured in the subscription).
During the transition from CM idle to CM connected and during registration after connected mode mobility from E-UTRAN to NG-RAN, the AMF should verify whether UE access is allowed by mobility restrictions. If the UE accesses 5GS via the CAG cell and if at least one of the CAG identifiers received from the NG-RAN is part of the UE's allowed CAG list, the AMF accepts the NAS request. If the UE accesses 5GS via the CAG cell and if none of the CAG identifiers received from the NG-RAN is part of the UE's allowed CAG list, the AMF denies the NAS request and the AMF may include (carry) the CAG related configuration in the NAS rejection message. The AMF then releases the NAS signaling connection for the UE by triggering AN release procedure. If the UE accesses 5GS via a non-CAG cell and the subscription of the UE contains an indication that the UE is only allowed to access 5GS via a CAG cell, the AMF denies the NAS request and the AMF shall include (carry) the CAG related configuration in the NAS rejection message. The AMF then releases the NAS signaling connection for the UE by triggering AN release procedure.
During the transition from RRC inactive to RRC connected state, when the UE initiates an RRC recovery procedure in the CAG cell for RRC inactive to RRC connected state transition, the NG-RAN will reject an RRC recovery request from the UE if none of the CAG identifiers supported by the CAG cell are part of the allowed CAG list of the UE according to the mobility restrictions received from the AMF, or if no allowed CAG list is received from the AMF. When a UE initiates an RRC recovery procedure for RRC inactivity to RRC connected state transition in a non-CAG cell, the NG-RAN shall reject the recovery request of the UE if only the UE is allowed to access the CAG cell according to mobility restrictions received from the AMF.
During a connected mode mobility procedure (i.e., a handover procedure) within the NG-RAN, the source NG-RAN should not handover the UE to the target NG-RAN node if the target is a CAG cell and none of the CAG identifiers supported by the target CAG cell are part of the allowed CAG list of the UE in the mobility restriction list, or if no allowed CAG list is received from the AMF. If only the UE is allowed to access the CAG cell based on the mobility restriction list, the source NG-RAN does not handover the UE to a non-CAG cell. If the target cell is a CAG cell, the target NG-RAN will reject the N2 based handover procedure if none of the CAG identifiers supported by the CAG cell are part of the allowed CAG list for the UE in the mobility restriction list, or if no allowed CAG list is received from the AMF. If the target cell is a non-CAG cell, the target NG-RAN should reject the N2 based handover procedure if the UE is only allowed to access the CAG cell based on the mobility restriction list. When the AMF receives the nudm_sdm_notification from the UDM and the AMF determines that the list of allowed CAGs or the indication of whether the UE is only allowed to access the CAG cell has changed, the AMF should update the mobility restrictions in the UE and NG-RAN accordingly under this condition.
Fig. 7A illustrates a first embodiment of network and cell selection and access control for a PNI-NPN (CAG) cell, wherein access to the CAG cell is accepted. In the example of fig. 7A, the UE 711 is configured with a CAG related configuration (e.g., a CAG information list 710) including a list of entries. For each entry, it includes a) a PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally an "indication that the UE is only allowed to access 5GS via the CAG cell". For example, entry 1 includes PLMN 111, and an allowed CAG list with CAG-ID AAA and BBB. The CAG cell broadcasts one or more CAG-IDs PLMN-by-PLMN through the 5G core network (5G core network,5GC)/AMF and NG-RAN, e.g., CAG-ID AAA and CCC may be accessed via the CAG cell 712. Thus, the UE 711 may access the CAG cell 712 in the PLMN 111.
Fig. 7B illustrates a second embodiment of network and cell selection and access control for non-CAG cells, wherein access to the PLMN is accepted. In the example of fig. 7B, UE 721 is configured with a CAG related configuration (e.g., CAG information list 720) that includes a list of entries. For each entry, it includes a) a PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally an "indication that the UE is only allowed to access 5GS via the CAG cell". For example, entry 1 includes PLMN 111, and an allowed CAG list with CAG-ID AAA and BBB. Furthermore, there is no indication in entry 1 that the UE is only allowed to access 5GS via the CAG cell. Through the 5GC/AMF and NG-RAN722, the UE 721 discovers non-CAG cells in the PLMN 111 (i.e., the cell 722 does not broadcast a CAG ID). Since UE 721 is allowed to access 5GS via the non-CAG cell, UE 721 may access non-CAG cell 722 in PLMN 111.
Fig. 8A illustrates a first embodiment of network and cell selection and access control for a PNI-NPN (CAG) cell, wherein access to the CAG cell is denied. In the example of fig. 8A, UE 811 is configured with a CAG related configuration (e.g., CAG information list 810) that includes a list of entries. For each entry, it includes a) a PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally an "indication that the UE is only allowed to access 5GS via the CAG cell". For example, entry 1 includes PLMN 111, and an allowed CAG list with CAG-ID AAA and BBB. The CAG cell broadcasts one or more CAG-IDs, e.g., CAG-ID CCC and DDD, PLMN by PLMN via 5GC/AMF and NG-RAN 812. However, neither the CAG-ID CCC nor the CAG-ID DDD is in the "allowed CAG list". Thus, the UE 811 cannot access this CAG cell CCC/DDD of the PLMN 111.
Fig. 8B illustrates a second embodiment of network and cell selection and access control for a PNI-NPN (CAG) cell, wherein access to the PLMN is denied. In the example of fig. 8B, the UE 821 is configured with a CAG related configuration (CAG information list 820) including a list of entries. For each entry, it includes a) a PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally an "indication that the UE is only allowed to access 5GS via the CAG cell". For example, entry 1 includes PLMN 111, an allowed CAG list with CAG-ID AAA and BBB. Furthermore, in entry 1 there is an indication that the UE is only allowed to access 5GS via the CAG cell. Through the 5GC/AMF and NG-RAN 822, the ue 821 discovers non-CAG cells in the PLMN 111 (i.e., the cell 822 does not broadcast a CAG cell ID). Since the UE 821 is not allowed to access 5GS via the non-CAG cell, the UE 821 cannot access the non-CAG cell 822 in the PLMN 111.
NPN (as managed network) providing access to localized services.
The localized or localized services are localized (i.e., provided at a specific/limited area and/or may be bounded in time). The service may be implemented via an application (e.g., live or on-demand audio/video streaming, electronic gaming, IMS, etc.) or connectivity (e.g., UE-to-UE, UE-to-data network, etc.). A localized service provider is an application provider or network operator that localizes its services and provides them to end users via a hosted network, which is a network that provides access to localized or localized services. The home network is the network that owns the current usage subscription or credentials of the UE. The home network may be a home PLMN or a subscribed SNPN. The SNPN may support primary authentication and authorization for UEs that use credentials from credential holders using AUSF and UDM. The credential holder may be a home PLMN or subscribed SNPN. For SNPN as a managed network, the home network may be considered a CH. For PNI-NPN (CAG) as a managed network, the home network may be regarded as a (home) PLMN. In order to provide localized services to UEs, the UEs need to be able to discover, select and access the NPN (as a hosted network) that provides access to the localized services. The discovery mechanism is based on providing/(pre) configuration/signaling appropriate information to the UE.
Fig. 9A illustrates one example of a UE using validity information to discover, select, and access an NPN (as a hosted network) and receive localized services. When a UE uses the subscription/credentials of its home network to access the NPN (as a managed network), only two cases are considered. If the home network (or CH) is a PLMN, the hosting network may be PNI-NPN or SNPN. The managed network may be a SNPN only if the home network (or CH) is a SNPN. If the UE accesses the hosted network using a subscription or credentials from the UE home network and the UE has multiple credentials or subscriptions, the UE needs to determine which credentials or subscriptions to use to access the hosted network. Validity information or condition information provided to the UE as part of the localized service information may be used to limit the UE's access to the hosted network, including: (time and/or location) validity information or condition information ((time and/or location) duration, criteria or constraints) associated with the SNPN (ID) or GIN; and (time and/or location) validity information/conditions ((time and/or location) duration, criteria or limits) associated with the PNI-NPN/CAG-ID.
As shown at 910, the SNPN-enabled UEs are configured with the following information for each subscribed SNPN: PLMN ID and NID (SNPN ID) of the subscribed SNPN (e.g., SNPN 1); and a subscription identifier (SUPI) and credentials for the subscribed SNPN. If the UE supports access to the SNPN using credentials from the credential holder, the UE is further configured with: 1) A prioritized list of user-controlled preferred SNPNs (e.g., SNPN 111, SNPN 112); 2) A prioritized list of preferred SNPNs controlled by the credential holders (e.g., SNPN 121, SNPN 122, SNPN 123); and 3) prioritized lists of GINs controlled by credential holders (e.g., GIN131, GIN 132).
Fig. 9B illustrates another example of a UE using validity information to discover, select, and access an NPN (as a hosted network) and receive localized services. For automatic network selection, in the case of a SNPN for localized services (as a hosted network), there may be associated (time (duration) and/or location (limitation)) validity information for the SNPN or GIN. For example, as shown at 910, (1) a prioritized list of preferred SNPN (and GINs) controlled by an existing credential holder may be extended with (time and/or location) validity information or condition information for each entry in the list; or as another example depicted by 911, (2) there may be one or more new list types defined to provide entries with validity information for the SNPN (and GIN) (e.g., defining a prioritized list of preferred SNPNs/GINs controlled by the new CH (with each entry containing a SNPN and/or GIN identification for access localized services) including (optional) validity information/conditions).
As shown at 910 or 911, SNPN 121 has an associated time (duration) validity condition of 1 month 1 day to 1 month 2 days (duration (e.g., start and end times) that allows a UE to access SNPN 121), SNPN 123 has an associated time validity condition of 1 month 1 day to 1 month 3 days, and GIN 131 has an associated time (duration) validity condition of 1 month 1 day to 1 month 3 days. Such time (duration) validity/condition information is provided to the UE as part of the localized service information to limit the UE's access to the (managed network) localized services. The validity/condition information may also optionally include location validity/condition information, which may be in the form of geolocation (of the serving network (serving PLMN/PNI-NPN or serving snp) and/or TAI/cell, which may be used to help the UE know where to start searching for the SNPN hosted network.
Fig. 9C illustrates another example of a UE using validity/condition information to discover, select, and access an NPN (as a hosted network) and receive localized services. For automatic network selection, in the case of PNI-NPN with CAG, the CAG-ID (in the (enhanced/extended (allowed)) CAG list) may optionally be associated with time validity/condition or restriction information (duration (e.g. start and end times) for which the UE is allowed to access PNI-NPN/CAG) and/or location validity/condition or restriction information. The duration and/or location validity/condition or limitation may be provided with the CAG identifier. For example, a (((enhanced/extended) allowed) CAG list may be provided to the UE and AMF for implementation to ensure that the UE does not access the CAG cell outside of the duration or (/ and) outside of the allowed location. The location validity/condition information may be in the form of geolocation (of the serving network (serving PLMN/PNI-NPN or serving SNPN)) and/or TAI/cell, which may be used to help the UE know where to start searching for PNI-NPN managed networks.
Note that (time and/or location) validity information may be stored alongside the CAG-IDs (e.g., enhanced/extended original allowed CAG list), as shown at 920, or stored separately in the UE and associated with one or more CAG-IDs; or as indicated at 921, there may be one or more new list types defined to provide entries with validity information for CAGs. For example, as shown at 920, the ((enhanced/extended) allowed) CAG list for PLMN 111 includes CAG AAA, BBB, and CCC. The CAG-ID AAA is associated with 1 month 1 day to 1 month 3 days time availability information, and the CAG-ID CCC is associated with 1 month 1 day to 1 month 2 days time availability information. Similar logic applies to location validity (if any). Such (time and location) validity conditions are provided to the UE as part of the local service information to limit the UE's access to the local services (managed network).
Fig. 10A illustrates a first example of accessing localized services via a SNPN (as a managed network), where access is accepted. In the example of fig. 10A, UE 1001 is configured with the following SNPN subscriptions: the subscribed snpn=snpn1, a prioritized list of preferred SNPNs controlled by the credential holders, including SNPN 121, SNPN 122 and SNPN 123.SNPN 121 is associated with a time availability condition of 1 month, 1 day, and 1 month, 2 days, and SNPN 123 is associated with a time availability condition of 1 month, 1 day, and 1 month, 3 days. With 5GC/AMF and NG-RAN 1002, SNPN 123 broadcasts its SNPN id+=123, along with an indication that access using credentials from the credential holder is supported. Since UE 1001 subscribes to SNPN 1 and SNPN 123 is included as the preferred SNPN in the entry of the "subscriber data list" for SNPN 1, UE 1001 may attempt to access SNPN 123 using credentials from SNPN 1. Since the time validity condition is associated with the SNPN 123, the UE 1001 needs to determine whether this time validity condition is satisfied before access. The UE 1001 checks that the current time is 1 month 2 days, which is within a period of 1 month 1 day to 1 month 3 days. As a result, UE 1001 may access SNPN 123 using credentials from (subscribed to) SNPN 1. The SNPN 123 is a localized service provider. The SNPN 123 is a managed network. SNPN 1 is the credential holder. (if location validity information is available, in this example we assume that location validity is satisfied in accordance with the location validity information).
Fig. 10B illustrates a second example of accessing localized services via a SNPN (as a managed network), where access is not allowed (the network would be denied if the UE attempted access). In the example of fig. 10B, UE 1001 is configured with the following SNPN subscriptions: the subscribed snpn=snpn1, a prioritized list of preferred SNPNs controlled by the credential holders, including SNPN 121, SNPN 122 and SNPN 123.SNPN 121 is associated with a time availability condition of 1 month, 1 day, and 1 month, 2 days, and SNPN 123 is associated with a time availability condition of 1 month, 1 day, and 1 month, 3 days. Through 5GC/AMF and NG-RAN 1002, managed network SNPN 123 broadcasts its SNPN id+=123, along with an indication of supporting access using credentials from the credential holder. Since UE 1001 subscribes to SNPN 1 and SNPN 123 is included as the preferred SNPN in the entry of the "subscriber data list" for SNPN 1, UE 1001 may attempt to access SNPN 123. However, since the time validity condition is associated with the SNPN 123, the UE 1001 also needs to additionally determine whether this time validity condition is met prior to access. The UE 1001 checks that the current time is 1 month 4 days, which is outside the period of 1 month 1 day to 1 month 3 days. As a result, UE 1001 cannot access SNPN 123 using credentials from SNPN 1.
Fig. 11A illustrates a first example of accessing localized services via PNI-NPN with CAG (as a managed network), where access is accepted. In the example of fig. 11A, UE 1101 is configured with a CAG related configuration 1110 that includes a list of entries. For example, entry 1 includes PLMN 111, and an enhanced or extended allowed CAG list with CAG-ID AAA, BBB, and CCC. CAG AAA is associated with a time availability condition of 1 month 1 day to 1 month 3 days, and CAG CCC is associated with a time availability condition of 1 month 1 day to 1 month 2 days. The CAG cell broadcasts one or more CAG-IDs from PLMN to PLMN, e.g., CAG-ID AAA of PLMN 111, through 5GC/AMF and NG-RAN 1102. Since the time validity condition is associated with the CAG AAA, UE 1101 needs to determine whether this time validity condition is met prior to access. UE 1101 checks that the current time is 1 month 2 days, which is within a period of 1 month 1 day to 1 month 3 days associated with the CAG AAA. Thus, UE 1101 may access the CAG AAA of PLMN 111 via the cell. (PNI-NPN/CAG-AAA is a service provider, PNI-NPN/CAG-AAA is a managed network, home PLMN of the USIM currently in use is a home network, and home PLMN is a credential holder.) (if location validity information is available, in this example we assume that location validity is satisfied in accordance with the location validity information).
Fig. 11B illustrates a second example of accessing localized services via PNI-NPN with CAG (as a managed network), where access is denied. In the example of fig. 11B, UE 1101 is configured with a CAG related configuration 1110 that includes a list of entries. For example, entry 1 includes PLMN 111, and an enhanced or extended allowed CAG list with CAG-ID AAA, BBB, and CCC. CAG AAA is associated with a time availability condition of 1 month 1 day to 1 month 3 days, and CAG CCC is associated with a time availability condition of 1 month 1 day to 1 month 2 days. The CAG cell broadcasts one or more CAG-IDs from PLMN to PLMN, e.g., CAG-ID AAA and CAG-ID CCC of PLMN 111, via 5GC/AMF and NG-RAN 1102. Since time validity conditions are associated with the CAG AAA and CCC, the UE 1101 needs to determine whether such time validity conditions are met prior to access. UE 1101 checks that the current time is 1 month 4 days, which is outside the 1 month 1 day to 1 month 3 day period associated with the CAG AAA, and outside the 1 month 1 day to 1 month 2 day period associated with the CAG CCC. Thus, UE 1101 cannot access either CAG cell AAA or CCC.
Processing of updated CAG configuration
When the PNI-NPN is made available via the PLMN, the UE should have a subscription to the PLMN to access the PNI-NPN. The CAG identifies a set of subscribers allowed to access one or more CAG cells associated with the CAG. The CAG may be used to apply access control to PNI-NPN. When a PNI-NPN (managed network) provides localized services, the CAG cells of the PNI-NPN managed network broadcast one or more CAG identifiers from PLMN to PLMN, and each CAG-ID may be associated with validity information, such as time and/or location validity criteria.
To use CAG, a CAG-enabled UE may be configured and/or reconfigured or updated with a CAG-related configuration, the support of CAG being indicated as part of the UE 5GMM core network capabilities. The CAG related configuration (e.g., the (enhanced) CAG information (list) containing a PLMN-by-PLMN allowed CAG list)) comprises zero or more entries, each entry containing a) a PLMN ID, b) an "allowed CAG list" with zero or more CAG-IDs, and c) optionally an "indication that the UE is only allowed to access 5GS via the CAG cell".
When the subscribed CAG related configuration changes, the UDM sets a CAG information subscription change indication and sends it to the AMF. When the UDM indicates that the CAG related configuration within the access and mobility subscription data has changed, the AMF should provide the updated CAG related configuration to the UE. When the UE receives an updated CAG related configuration from an unmanaged network, and at least one managed network (PNI-NPN/CAG) is included in the updated CAG related configuration and the validity criteria are met, the UE needs to reselect one of the managed networks whose validity criteria are met. Similarly, when the UE receives an updated CAG related configuration from the managed network, the managed network (PNI-NPN/CAG) is not included in the updated CAG related configuration, or the validity criteria of all the managed networks (PNI-NPN/CAG) included in the updated CAG related configuration are not satisfied, and the UE needs to reselect to the non-managed network (PLMN or PNI-NPN/CAG).
A method is provided for processing updated NPN configurations received from a first unmanaged network via DL NAS signaling. In one embodiment, the UE receives an updated CAG-related configuration that contains one or more CAGs associated with validity information. The UE enters the state PLMN-SEARCH and applies network selection processing using the updated CAG related configuration. The UE selects and registers with a second hosted network, wherein the one or more CAGs are included in the updated CAG-related configuration and configured with associated validity information, and the validity criteria are satisfied. In another embodiment, the UE receives an updated SNPN configuration containing one or more SNPNs associated with the validity information. The UE enters the PLMN-SEARCH state and applies network selection processing using the updated SNPN configuration. The UE selects and registers with a second hosted network that is included in the updated SNPN configuration and is configured with associated validity information, and validity criteria are met.
According to one novel aspect, a method is provided for handling updated NPN configurations received from a first managed network via DL NAS signaling. In one embodiment, the UE receives an updated CAG-related configuration that does not include the first hosted network or that a validity criterion associated with the first hosted network is not satisfied. The UE enters the state PLMN-SEARCH and applies network selection processing using the updated CAG related configuration. The UE selects and registers with a second unmanaged network. In another embodiment, the UE receives an updated SNPN configuration that does not include the first hosted network or for which the validity criteria associated with the first hosted network are not satisfied. The UE enters the PLMN-SEARCH state and applies network selection processing using the updated SNPN configuration. The UE selects and registers with a second unmanaged network.
UE access to a hosted network providing access to localized services means: a UE accesses a PLMN via a CAG cell broadcasting a CAG ID, and in a UE configuration, the CAG ID has validity/restriction information and validity/restriction criteria are satisfied; or 2. The UE accesses an SNPN broadcasting an SNPN ID, and in the UE configuration, the SNPN ID has validity/restriction information, and validity/restriction criteria are satisfied; or 3. The UE accesses the SNPN broadcasting the GIN and in the UE configuration, the GIN has validity/restriction information and validity or restriction criteria are met.
Accessing an unmanaged network by a UE means: the UE accesses PLMN via non-CAG cell; or 2. The UE accesses the PLMN via a CAG cell broadcasting a CAG-ID, and in the UE configuration, the CAG ID has no validity/restriction information; or 3. The UE accesses an SNPN broadcasting an SNPN ID and in the UE configuration the SNPN ID has no validity/restriction information, or 4. The UE accesses an SNPN broadcasting a GIN and in the UE configuration the GIN has no validity/restriction information.
In one example, the validity information includes time-only validity information, wherein the validity criterion is satisfied if the time validity information matches a current time of the UE, and wherein the validity criterion is not satisfied if the time validity information does not match the current time of the UE. In another example, the validity information includes location-only validity information, wherein the validity criterion is satisfied if the location validity information matches a current location of the UE, and wherein the validity criterion is not satisfied if the location validity information does not match the current location of the UE. In yet another example, the validity information includes both time validity information and location validity information, wherein the validity criterion is satisfied if the time validity information matches a current time of the UE and the location validity information matches a current location of the UE, and wherein the validity criterion is not satisfied if the time validity information does not match the current time of the UE or the location validity information does not match the current location of the UE.
Fig. 12 illustrates a UE receiving an updated CAG configuration from an unmanaged network and thereby performing network selection to select a managed network (PNI-NPN/CAG) in accordance with a novel aspect. In the example of fig. 12, UE 1201 is accessing PLMN 111, i.e. the first unmanaged network, via 5GC/NG-RAN 1202. Later, the UE 1201 is configured with the updated CAG related configuration 1210 via a downlink NAS signaling message comprising a plurality of entries including an entry containing a PLMN ID 222 with (enhanced/extended) (allowed) CAG list. The (enhanced or extended) (allowed) CAG list also includes a plurality of allowed CAG IDs of the PLMN 222, including CAG BBB, CAG CCC. In allowing CAG-ID, for localized services, the CAG BBB is associated with a time availability criterion (1 month 1 day to 1 month 5 days) and the CAG CCC is associated with a time availability criterion (1 month 3 day to 1 month 5 days). If the current time is 1 month 2 days, the validity criterion for the CAG BBB is met.
In response, UE 1201 performs a network selection process, such as PLMN selection, or SNPN selection, or escrow network selection, or localized service network selection, or PLMN selection for localized services. The UE may enable or enter a managed network access mode, a localized or localized service access mode, a managed network selection mode, or a localized or localized network selection mode. The UE may also be configured with "managed network or localized service preferences" and trigger a network selection process. As a result, for example, UE 1201 selects a CAG cell of PLMN 222 and broadcast CAG-ID BBB for localized services.
Fig. 13 illustrates a UE receiving an updated SNPN configuration from an unmanaged network and thereby performing network selection to select a managed network (SNPN) in accordance with one novel aspect. In the example of fig. 13, a UE 1301 accesses a first unmanaged network SNPN 111 via NG-RAN 1302. Later, UE 1301 is configured with updated SNPN configuration 1310 via a downlink NAS signaling message that includes a prioritized list of preferred SNPNs controlled by the credential holder, including SNPN 122 and SNPN 123. In the preferred SNPN, for localized services, SNPN 122 is associated with (1 month 1 day-1 month 5 day) time availability or constraint information/criteria, and SNPN 123 is associated with (1 month 3 day-1 month 5 day) time availability or constraint information/criteria. If the current time is 1 month 2 days, the validity criteria for SNPN 122 are met.
In response, UE 1301 performs network selection processing, such as PLMN selection, or SNPN selection, or escrow network selection, or localized service network selection, or PLMN selection for localized services. The UE may enable or enter a managed network access mode, a localized or localized service access mode, a managed network selection mode, or a localized or localized network selection mode. The UE may also be configured with "managed network or localized service preferences" and trigger a network selection process. As a result, for example, UE 1301 selects SNPN 122 for localized services.
Fig. 14 illustrates a UE receiving an updated CAG configuration from a managed network (PNI-NPN/CAG) and thereby performing network selection to select an unmanaged network in accordance with a novel aspect. In the example of fig. 14, a UE 1401 is configured with a CAG related configuration 1410. Thus, UE 1401 accesses a first hosted network, such as PLMN 111/CAG BBB, for localized services. The validity/restriction information/conditions associated with the CAG BBB are met, for example, the current time 1 month 2 days is within a time period of 1 month 1 day to 1 month 5 days. Later, the UE 1401 receives a DL NAS signaling message carrying an updated CAG related configuration 1420. The updated CAG related configuration does not include the first managed network (PLMN 111/CAG BBB).
In response, the UE 1401 performs a network selection process, e.g. PLMN selection, or SNPN selection, or unmanaged network selection, or localized service network selection, or PLMN selection for localized services. The UE may disable or leave the managed network access mode, the localized or localized service access mode, the managed network selection mode, or the localized or localized network selection mode. The UE may also be configured with "managed network or localized service is not preferred" and trigger a network selection process. As a result, for example, the UE 1401 selects a second network, e.g. PLMN 222 and a CAG cell broadcasting a CAG-ID FFF or a CAG-ID GGG, as an unmanaged network.
Fig. 15 illustrates a UE receiving an updated SNPN configuration from a managed network (SNPN) and thereby performing network selection to select an unmanaged network in accordance with a novel aspect. In the example of fig. 15, UE 1501 is configured with an SNPN configuration 1510. Thus, the UE 1501 accesses a first hosted network, such as SNPN 121, for localized services. Validity/restriction information/conditions associated with the SNPN 121 are satisfied, for example, the current time 1 month 2 days is within a period of 1 month 1 day to 1 month 5 days. Later, the UE 1501 receives a DL NAS signaling message carrying the updated SNPN configuration 1520. The updated SNPN configuration does not include the first managed network (SNPN 121) in any preferred SNPN list.
In response, the UE 1501 performs network selection processing, e.g., PLMN selection, or SNPN selection, or unmanaged network selection, or localized service network selection, or PLMN selection for localized services. The UE may disable or leave the managed network access mode, the localized or localized service access mode, the managed network selection mode, or the localized or localized network selection mode. The UE may also be configured with "managed network or localized service is not preferred" and trigger a network selection process. As a result, for example, UE 1501 selects and accesses a second network, such as SNPN 122, as an unmanaged network.
Fig. 16 is a flow diagram of a method for handling updated CAG related configurations from an unmanaged network in accordance with one novel aspect. In step 1601, the UE maintains a UE configuration for PLMN or SNPN selection. In step 1602, the UE accesses a first network, wherein the first network is an unmanaged network. Accessing an unmanaged network includes: (1) the UE accessing the PLMN through a non-CAG cell, or (2) the UE accessing the PLMN through a CAG cell broadcasting a CAG-ID, in which the CAG ID has no validity or restriction information, or (3) the UE accessing an SNPN broadcasting an SNPN ID, in which the SNPN ID has no validity/restriction information, or (4) the UE accessing an SNPN broadcasting a GIN, in which the GIN has no validity/restriction information. In step 1603, the UE receives in the DL NAS message an updated CAG-related configuration comprising information of the second network, wherein the updated CAG-related configuration comprises a CAG-ID list for the second network, and wherein CAG-IDs from the CAG-ID list are associated with validity information comprising corresponding validity criteria (for localized services). In step 1604, the UE performs network selection processing based on the updated CAG related configuration. In step 1605, the UE selects and registers with a second network, wherein validity criteria associated with the CAG-ID are satisfied.
Fig. 17 is a flow diagram of a method for processing updated SNPN configurations from an unmanaged network in accordance with one novel aspect. In step 1701, the UE maintains a UE configuration for PLMN or SNPN selection. In step 1702, a UE accesses a first network, wherein the first network is an unmanaged network. Accessing the unmanaged network includes: (1) the UE accessing the PLMN via a non-CAG cell, or (2) the UE accessing the PLMN via a CAG cell broadcasting a CAG-ID, in which UE configuration the CAG ID has no validity or restriction information, or (3) the UE accessing the SNPN broadcasting a SNPN ID, in which UE configuration the SNPN ID has no validity/restriction information, or (4) the UE accessing the SNPN broadcasting a GIN, in which UE configuration the GIN has no validity/restriction information. In step 1703, the UE receives an updated SNPN configuration containing information of the second network in a DL NAS message, wherein the updated SNPN configuration comprises a SNPN list, wherein the SNPNs from the SNPN list are associated with validity/restriction information/criteria of the localized service. In step 1704, the UE performs a network selection process based on the updated SNPN configuration. In step 1705, the UE selects and registers with the second network, wherein respective validity criteria associated with the SNPN identification are met.
Fig. 18 is a flow diagram of a method for handling updated NPN configurations from a managed network in accordance with one novel aspect. In step 1801, the UE maintains a UE configuration for PLMN or SNPN selection. In step 1802, a UE accesses a first network, wherein the first network is a managed network. The access hosting network comprises: accessing a PLMN via a CAG cell broadcasting a CAG ID, and in a UE configuration, the CAG ID having validity information and validity criteria being satisfied; accessing an SNPN broadcasting an SNPN ID, and in a UE configuration, the SNPN ID has validity information and a validity criterion is satisfied; or access the SNPN of the broadcast GIN, and in the UE configuration, the GIN has validity information and the corresponding validity criteria are met. In step 1803, the UE receives an updated NPN configuration containing information of the second network in the DL NAS message, wherein the updated NPN configuration does not include the first managed network or, based on the updated NPN configuration, validity criteria associated with the first managed network are not satisfied. In step 1804, the UE performs a network selection process based on the updated NPN configuration. In step 1805, the UE selects and registers with the second network.
Although the invention has been described in connection with certain specific embodiments for purposes of illustration, the invention is not limited thereto. Accordingly, various modifications, adaptations, and combinations of the various features of the described embodiments can be practiced without departing from the scope of the invention as set forth in the claims.

Claims (22)

1. A method of processing an updated closed access group configuration, comprising:
maintaining a User Equipment (UE) configuration for Public Land Mobile Network (PLMN) or independent non-public network (SNPN) selection;
accessing, by the UE, a first network, wherein the first network is an unmanaged network;
receiving an updated Closed Access Group (CAG) -related configuration comprising information of a second network in a downlink non-access stratum (DL NAS) message, wherein the updated CAG-related configuration comprises a CAG-ID list for the second network, and wherein a CAG-ID from the CAG-ID list is associated with validity information comprising a corresponding validity criterion;
performing a network selection process based on the updated CAG-related configuration; and
select and register with the second network, wherein respective validity criteria associated with the CAG-ID are satisfied.
2. The method of claim 1, wherein accessing the unmanaged network comprises: accessing a PLMN via a non-CAG cell, accessing a PLMN via a CAG cell broadcasting the CAG-ID and the CAG-ID having no validity information in the UE configuration, accessing an SNPN broadcasting an SNPN ID and the SNPN ID having no validity information in the UE configuration, or accessing an SNPN broadcasting a Group ID (GIN) for network selection and the GIN having no validity information in the UE configuration.
3. The method of claim 1, wherein the network selection process is a PLMN selection process, or a SNPN selection process, or a managed network selection process, or a localized service network selection process, or a PLMN selection for localized service process.
4. The method of claim 1, wherein the UE enables a hosted network access mode for localized services or the UE enters a hosted network selection mode for localized services.
5. The method of claim 1, wherein the UE performs the network selection process when the UE is configured with preferences of a hosted network for localized services.
6. The method of claim 1, wherein the validity information comprises at least one of time validity information and location validity information.
7. The method of claim 1, wherein the UE selects a CAG cell in the second network that broadcasts a CAG-ID associated with the validity information.
8. A method of processing an updated closed access group configuration, comprising:
maintaining a User Equipment (UE) configuration for Public Land Mobile Network (PLMN) or independent non-public network (SNPN) selection;
accessing, by the UE, a first network, wherein the first network is an unmanaged network;
receiving an updated SNPN configuration containing information of a second network in a downlink non-access stratum (DL NAS) message, wherein the updated SNPN configuration includes a SNPN identification associated with validity information including corresponding validity criteria;
performing a network selection process based on the updated SNPN configuration; and
select and register with the second network, wherein respective validity criteria associated with the SNPN identification are satisfied.
9. The method of claim 8, wherein accessing the unmanaged network comprises: access to a PLMN via a non-Closed Access Group (CAG) cell, access to a PLMN via a CAG cell broadcasting a CAG-ID and having no validity information for said CAG ID in said UE configuration, access to an SNPN broadcasting an SNPN ID and having no validity information for said SNPN ID in said UE configuration, or access to an SNPN broadcasting a Group ID (GIN) for network selection and having no validity information for said GIN in said UE configuration.
10. The method of claim 8, wherein the network selection process is a PLMN selection process, or a SNPN selection process, or a managed network selection process, or a localized service network selection process, or a PLMN selection for localized service process.
11. The method of claim 8, wherein the UE enables a hosted network access mode for localized services or the UE enters a hosted network selection mode for localized services.
12. The method of claim 8, wherein the UE performs the network selection process when the UE is configured with preferences of a hosted network for localized services.
13. The method of claim 8, wherein the validity information comprises at least one of time validity information and location validity information.
14. A method of processing an updated closed access group configuration, comprising:
maintaining a User Equipment (UE) configuration for Public Land Mobile Network (PLMN) or independent non-public network (SNPN) selection;
accessing, by the UE, a first network, wherein the first network is a hosted network;
receiving an updated non-public network (NPN) configuration containing information of a second network in a downlink non-access stratum (DL NAS) message, wherein the updated NPN configuration does not include the first managed network or, based on the updated NPN configuration, validity criteria associated with the first managed network are not satisfied;
Performing a network selection process based on the updated NPN configuration; and
selecting and registering with the second network.
15. The method of claim 14, wherein accessing the hosted network comprises: a CAG cell that broadcasts a Closed Access Group (CAG) ID and has validity information and meets validity criteria in the UE configuration accesses a PLMN, accesses an SNPN that broadcasts an SNPN ID and has validity information and meets validity criteria in the UE configuration, or accesses an SNPN that broadcasts a Group ID (GIN) for network selection and has validity information and meets corresponding validity criteria in the UE configuration.
16. The method of claim 14, wherein the updated NPN configuration is a CAG-related configuration of the second network.
17. The method of claim 14, wherein the updated NPN configuration is an SNPN configuration.
18. The method of claim 14, wherein the network selection process is a PLMN selection process, or a SNPN selection process, or an unmanaged network selection process, or a localized service network selection, or a PLMN selection for localized services.
19. The method of claim 14, wherein the UE disables a hosted network access mode for localized services or the UE leaves a hosted network selection mode for localized services.
20. The method of claim 14, wherein the second network is an unmanaged network, wherein the second network is a non-CAG cell of a PLMN, a CAG cell broadcasting a CAG-ID and the CAG ID has no validity information in the UE configuration, a SNPN broadcasting a SNPN ID and the SNPN ID has no validity information in the UE configuration, or a SNPN broadcasting a GIN and the GIN has no validity information in the UE configuration.
21. A user equipment for handling updated closed access group configurations, comprising:
a processor coupled to a memory and to a transceiver, the memory having stored therein program instructions and data which, when executed by the processor, cause the user equipment to perform the operations of the method of any of claims 1-20.
22. A non-volatile memory storing program instructions and data which, when executed by a processor for processing updated closed access group configured user equipment, cause the user equipment to perform the operations of the method of any of claims 1-20.
CN202310450730.0A 2022-04-29 2023-04-24 Method for processing updated CAG configuration and user equipment Pending CN116981002A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US63/336,354 2022-04-29
US18/129,064 2023-03-30
US18/129,064 US20230354178A1 (en) 2022-04-29 2023-03-30 Handling of updated cag configuration

Publications (1)

Publication Number Publication Date
CN116981002A true CN116981002A (en) 2023-10-31

Family

ID=88482144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310450730.0A Pending CN116981002A (en) 2022-04-29 2023-04-24 Method for processing updated CAG configuration and user equipment

Country Status (1)

Country Link
CN (1) CN116981002A (en)

Similar Documents

Publication Publication Date Title
US20230354239A1 (en) Subscription selection for manual snpn hosting network selection
US20230354183A1 (en) Nas-as interface for accessing pni-npn as hosting network
US20230354176A1 (en) Enhanced network selection for pni-npn as hosting network
TWI839202B (en) Method and user equipment for manual network selection
US20230354178A1 (en) Handling of updated cag configuration
US20230354180A1 (en) Multiple previously registered networks for network selection
US20230354179A1 (en) Hosting network manual selection and ue-triggered registration update
US20230354167A1 (en) Cag configuration updated by downlink signal message
US20230354155A1 (en) Limited service and hosting network
US20230354177A1 (en) Cag configuration updated by downlink signal message
US20230354174A1 (en) Ue auto update cag configuration when accessing pni-npn as hosting network for localized services
US20230354181A1 (en) Forbidden snpn list handling for localized services
US20230354244A1 (en) Abnormal handling of deregistration for hosting network
US20230354175A1 (en) Enhanced npn manual selection mode for access localized services
US20230362801A1 (en) Manual network selection at switch on for ue supporting cag
CN116981002A (en) Method for processing updated CAG configuration and user equipment
US20230354182A1 (en) Congestion control backoff timer handling for hosting network
US20230354472A1 (en) Nas connection release for hosting network
US20230354455A1 (en) Emergency service and hosting network access restriction
CN116981026A (en) Method for processing updated CAG configuration and user equipment
CN116981024A (en) Method for processing updated CAG configuration and user equipment
CN116981025A (en) Method for executing cell selection or reselection and determining proper cell and user equipment
CN116981013A (en) Network selection method and user equipment
CN116981014A (en) Method for entering limited service state and user equipment
CN116981016A (en) Method for manually selecting managed network and triggering registration update and user equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination