GB2612708A - Network Slice Registration - Google Patents

Network Slice Registration Download PDF

Info

Publication number
GB2612708A
GB2612708A GB2218324.8A GB202218324A GB2612708A GB 2612708 A GB2612708 A GB 2612708A GB 202218324 A GB202218324 A GB 202218324A GB 2612708 A GB2612708 A GB 2612708A
Authority
GB
United Kingdom
Prior art keywords
nssai
pending
allowed
additional
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB2218324.8A
Other versions
GB202218324D0 (en
Inventor
Watfa Mahmoud
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to GB2218324.8A priority Critical patent/GB2612708A/en
Priority claimed from GB2011364.3A external-priority patent/GB2597915B/en
Publication of GB202218324D0 publication Critical patent/GB202218324D0/en
Publication of GB2612708A publication Critical patent/GB2612708A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method at a network entity (e.g. Access & Mobility Management Function (AMF)) comprising, when there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving from the UE a request indicating at least one single NSSAI (S-NSSAI) and determining whether the request is for using at least one additional network slice. The method may further comprise determining whether the one or more S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA) and if so, adding an indication of the one or more S-NSSAI to the pending NSSAI. A method at a UE comprising, when there is a pending NSSAI for the UE, transmitting to a network entity a first request for using at least one additional network slice, the first request indicating at least one S-NSSAI. Another method at a UE comprising, when there is a pending NSSAI for the UE, transmitting to a network entity a second request for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.

Description

Network Slice Registration [0001] The present disclosure relates to methods, apparatus, and systems for registering to network slices. Further, certain examples of the present disclosure provide methods, apparatus and systems for registering to additional network slices during network slice-specific authentication and authorization in 3GPP 5G. Further, certain examples of the present disclosure provide methods, apparatus and systems for conditionally performing NSSAA.
BACKGROUND
[0002] Herein, the following documents are referenced: [1] 3GPP TS 23.501 V16.5.0 [2] 3GPP TS 23.502 V16.5.0 [3] 3GPP TS 24.501 V16.5.0 [0003] In 3GPP 5GS (3rd Generation Partnership Project 5th Generation System), the following are defined (e.g. in [1]). A Network Slice (NS) is defined as a logical network that provides specific network capabilities and network characteristics. A Network Slice Instance (NSI) is defined as a set of Network Function instances and the required resources (e.g. compute, storage and networking resources) which form a deployed NS. A Network Function (NF) is defined as a 3GPP adopted or 3GPP defined processing function in a network, which has defined functional behaviour and 3GPP defined interfaces.
[0004] A NS may be identified by Single Network Slice Selection Assistance Information (S-NSSAI).
Overview of network slice-specific authentication and authorization [0005] Network slice-specific authentication and authorization (NSSAA) was introduced as part of Rel-16 in 3GPP. The feature enables the network to perform slice-specific authentication and authorization for a set of S-NSSAI(s) (single network slice selection assistance information (NSSAI)) to ensure that the user is allowed to access these slices. The procedure is executed after the 5G mobility management (5GMM) authentication procedure has been completed and also after the registration procedure completes. The high-level description of the feature can be found in [1] whereas further details can be found in [2] and [3]. The key points about the NSSAA procedure are summarized in this section.
* NSSAA applies to both the 3GPP access and the non-3GPP access and is in fact access agnostic. That is, if a slice is successfully authorized, then it is considered as authorized for both access types (i.e. 3GPP and non-3GPP access type). The term "authorized" may be regarded as meaning that slice-specific authentication/authorization has succeeded for a particular S-NSSAI. However this does not mean that the S-NSSAI is allowed to be used in the current tracking area (TA) of the user equipment (UE) over the 3GPP access.
* \Mien a set of slices, each of which is identified by an S-NSSAI, is subject to NSSAA during registration procedure, the AMF will send the pending NSSAI to the UE in the Registration Accept message indicating these S-NSSAls for which NSSAA will be performed (or for which NSSAA is needed).
* The access and mobility management function (AMF), due to a need to perform NSSAA, may not send an allowed NSSAI to the UE in the Registration Accept message. In this case, the AMF sets the "NSSAA to be performed" indicator in the 5GS registration result I E set to "Network slice-specific authentication and authorization is to be performed", in addition to sending the pending NSSAI to the UE.
* There are some cases in which the UE may be allowed to use some slices without needing to run NSSAA again e.g. because the slices don't require NSSAA, or the slices have been subject to NSSAA already. In this case, the AMF will send the allowed NSSAI in the Registration Accept, where the allowed NSSAI contains these S-NSSAls for which NSSAA is not required. However, there may be other slices that do require NSSAA for which the AMF will send the pending NSSAI in the Registration Accept message, where the pending NSSAI contains the S-NSSAls that require NSSAA.
[0006] There is a requirement that prohibits the UE from sending a requested NSSAI with any S-NSSAI that is part of the pending NSSAI.
[0007] It should be noted that since Rel-15 (i.e., before NSSAA was introduced), the UE initiates a registration procedure when it needs to change the slice(s) it is currently registered to as specified in TS 24.501. In fact this is explicitly captured as a trigger for sending the Registration Request by the UE in section 5.5.1.3.2 of [3]: "i) when the UE needs to change the slice(s) it/s currently registered to" [0008] Therefore, when the UE needs to change the slice(s) it is currently registered to, the UE will send the Registration Request and include the Requested NSSAI IE in the 35 message.
[0009] It should be noted that the current Access and Mobility Management Function (AMF) behaviour is that it considers the requested NSSAI that was last received as the set of S-NSSAls that the user equipment (UE) wants to use. For example, if the UE sends a Registration Request with a requested NSSAI at time Ti then the AMF considers the entries of the requested NSSAI that was sent by the UE at Ti to be the latest set of S-NSSAls that the UE wants to use. If the UE then sends a Registration Request with a requested NSSAI at time T2 then the AMF considers the entries of the requested NSSAI that was sent by the UE at T2 to be the latest set of S-NSSAls that the UE wants to use.
[0010] Note that the requested NSSAI sent at time T2 may contain some entries from the requested NSSAI at time Ti, however what is important to note is that the AMF considers the last received requested NSSAI (i.e. at time T2 in this example) to contain the SNSSAls that the UE needs to use and therefore will consider any previous requested NSSAI from the UE e.g. at time Ti, to be invalid.
[0011] With the above, the following example may be useful: * At time Ti, the UE may send a requested NSSAI = {A, B}, for S-NSSAls {A, B}.
* At time T2, the UE may need to register to a new set of slices. If the UE still needs to use say S-NSSAI B, then the UE should ensure that the new requested NSSAI will contain entry B. Hence, if for example the UE needs to use S-NSSAls {B, C}, then the UE should send the requested NSSAI set to {B, * VVhen the AMF receives the requested NSSAI {B, C}, the AMF considers that the previous requested NSSAI {A, B}, which may have a corresponding allowed NSSAI {A, B}, is no longer required by the UE and the AMF then processes the requested NSSAI {B, C} to determine if this can be allowed. It should be noted that any previous allowed NSSAI based on {A, 13} will no longer be valid from this point onward due to the new requested NSSAI containing {B, Allowing the use of specific slices based on registration area [0012] Prior to NSSAA, network slicing uses an allowed NSSAI to indicate the S-NSSAls that are allowed for use by the UE in its current registration area (RA) (and for the current serving public land mobile network (PLMN)).
[0013] However, it is possible that some slices are not available, or are not allowed, in the UE's current RA. But this does not mean that the slices are altogether not allowed in the current serving PLMN. Hence, a slices may not be available or may not be allowed in a RA, say Area 1, but the slice may be available or be allowed in another RA, say Area 2, of the same serving PLMN.
[0014] If an S-NSSAI in the requested NSSAI is not allowed for a UE in the current RA, the AMF includes the S-NSSAI in the rejected NSSAI and sets the associated cause to "S-NSSAI not available in the current registration area". This means that the UE may be able to use the same slice when the UE enters a different RA.
[0015] On the other hand, if an S-NSSAI which was requested by the UE is not allowed for use in the entire PLMN, regardless of the RA, then the AMF will include the S-NSSAI in the rejected NSSAI and sets the associated cause to "S-NSSAI not available in the current PLMN or SNPN". This means that the UE will not be able to use the slice in the current PLMN regardless of the RA.
[0016] It should be noted that NSSAA comes as an addition to network slicing, wherein the network has to additionally verify if the slice is subject to NSSAA and if yes then the network runs NSSAA.
BRIEF SUMMARY OF THE DISCLOSURE
[0017] It is an aim of certain examples of the present disclosure to address, solve and/or mitigate, at least partly, at least one of the problems and/or disadvantages associated with the related art, for example at least one of the problems and/or disadvantages described herein. It is an aim of certain examples of the present disclosure to provide at least one advantage over the related art, for example at least one of the advantages described herein.
[0018] The present invention is defined in the independent claims. Advantageous features are defined in the dependent claims.
[0019] In accordance with an aspect of the present disclosure, there is provided a method of a network entity, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving, from the UE, a request indicating at least one first single NSSAI (S-NSSAI) over a first access technology; if the pending NSSAI includes an indication of one or more S-NSSAI over the first access technology, which were indicated in a previous request received from the UE: determining the request is for using at least one new network slice, and removing, from the pending NSSAI, the indication of the one or more S-NSSAI; wherein the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
[0020] In certain embodiments of the present disclosure, the method further comprises: determining whether one or more of the at least one first S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA); and if so, adding an indication of the one or more of the at least one first S-NSSAI to the pending NSSAI.
[0021] In certain embodiments of the present disclosure, the method further comprises: transmitting the pending NSSAI including the indication of the one or more of the at least one first S-NSSAI to the UE; or transmitting an additional pending NSSAI including the indication of the one or more of the at least one first S-NSSAI to the UE.
[0022] In certain embodiments of the present disclosure, the pending NSSAI includes an indication of at least one second S-NSSAI which were indicated in a previous request, received from the UE, over a second access technology different to the first access technology.
[0023] In certain embodiments of the present disclosure, the method further comprises: maintaining, in the pending NSSAI, the indication of the at least one second S-NSSAI.
[0024] In certain embodiments of the present disclosure, the method further comprises one or more of: transmitting an allowed NSSAI to the UE, the allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one first S-NSSAI determined to be allowed for the UE, or transmitting an additional allowed NSSAI to the UE, the additional allowed NSSAI including the information on the one or more of the at least one first S-NSSAI determined to be allowed for the UE; and if it is determined that one or more of the at least one first S-NSSAI are not allowed for the UE or are not available in a current registration area (RA) of the UE, transmitting, to the UE, a rejected NSSAI including an indication of the one or more of the at least one first S-NSSAI which are not allowed for the UE or which are not available in the current RA of the UE.
[0025] In certain embodiments of the present disclosure, for each S-NSSAI indicated in the pending NSSAI, the network entity stores a record of the access technology for which use of said S-NSSAI was requested.
[0026] In accordance with another aspect of the present disclosure, there is provided a method of a UE, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), transmitting, to a network entity, a request indicating at least one first single NSSAI (S-NSSAI) over a first access technology; wherein the request is a request for using at least one new network slice if the pending NSSAI includes an indication of one or more S-NSSAI over the first access technology, which were indicated in a previous request transmitted by the UE; and wherein the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
[0027] In certain embodiments of the present disclosure, the method further comprises receiving, from the network entity, a response to the request.
[0028] In certain embodiments of the present disclosure, if the request is the request for using at least one new network slice, the method further comprises: removing, from the pending NSSAI, the indication of the one or more S-NSSAI, based on the response.
[0029] In certain embodiments of the present disclosure, the method further comprises: based on the received response, modifying the pending NSSAI to include an indication of one or more of the at least one first S-NSSAI which are subject to network slice-specific authentication and authorization (NSSAA).
[0030] In certain embodiments of the present disclosure, the received response includes a pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA; or the received response includes an additional pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA.
[0031] In certain embodiments of the present disclosure, the method further comprises, in response to the received response, maintaining, in the pending NSSAI, an indication of any of the at least one second S-NSSAI for which NSSAA is not completed.
[0032] In certain embodiments of the present disclosure, the response includes at least one of: an allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one first S-NSSAI allowed for the UE, or an additional allowed NSSAI including the information on the one or more of the at least one first S-NSSAI allowed for the UE; and a rejected NSSAI including an indication of one or more of the at least one first S-NSSAI which are not allowed for the UE or which are not available in a current registration area of the UE.
[0033] In certain embodiments of the present disclosure, the pending NSSAI includes an indication of at least one second S-NSSAI over a second access technology different to the first access technology, which were indicated in a previous request transmitted to the network entity from the UE.
[0034] In accordance with another aspect of the present disclosure, there is provided a method of a network entity, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving, from the UE, a request indicating at least one single NSSAI (S-NSSAI); and determining whether the request is for using at least one additional network slice.
[0035] In certain embodiments of the present disclosure, it is determined that the request is for using at least one additional network slice if: the request includes a requested NSSAI; the request includes an additional requested NSSAI; or the network entity receives, from the UE, an indication that the request is for using at least one additional network slice.
[0036] In certain embodiments of the present disclosure, the request is for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the sae or a different access technology.
[0037] In certain embodiments of the present disclosure, the at least one S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
[0038] In certain embodiments of the present disclosure, the method further comprises: determining whether one or more of the at least one S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA); and if so, adding an indication of the one or more of the at least one S-NSSAI to the pending NSSAI.
[0039] In certain embodiments of the present disclosure, the method further comprises: transmitting the pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE; or transmitting an additional pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE.
[0040] In certain embodiments of the present disclosure, the method further comprises one or more of: transmitting an allowed NSSAI to the UE, the allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI determined to be allowed for the UE, or transmitting an additional allowed NSSAI to the UE, the additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI determined to be allowed for the UE; and if it is determined that one or more of the at least one S-NSSAI are not allowed for the UE or are not available in a current registration area (RA) of the UE, transmitting, to the UE, a rejected NSSAI including an indication of the one or more of the at least one S-NSSAI which are not allowed for the UE or which are not available in the current RA of the UE.
[0041] In certain embodiments of the present disclosure, if the request is for using at least one additional network slice, the method further comprises: processing the request without removing an indication of an S-NSSAI from the pending NSSAI.
[0042] In accordance with another aspect of the present disclosure, there is provided a method of a UE, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), transmitting, to a network entity, a first request for using at least one additional network slice, the first request indicating at least one single NSSAI (S-NSSAI); or, while there is the pending NSSAI for the UE, transmitting, to the network entity, a second request for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.
[0043] In certain embodiments of the present disclosure, use of the at least one additional network slice is requested in addition to use of one or more network slices corresponding to one or more S-NSSAI indicated in the pending NSSAI.
[0044] In certain embodiments of the present disclosure, at least one of: the first request is a requested NSSAI, or an additional requested NSSAI; and the UE transmits, to the network entity, an indication that the first request is for using at least one additional network slice.
[0045] In certain embodiments of the present disclosure, the method further comprises receiving, from the network entity, a response to the first request.
[0046] In certain embodiments of the present disclosure, the method further comprises: based on the received response, modifying the pending NSSAI to include an indication of one or more of the at least one first S-NSSAI which are subject to network slice-specific authentication and authorization (NSSAA).
[0047] In certain embodiments of the present disclosure, the received response includes a pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA; or the received response includes an additional pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA.
[0048] In certain embodiments of the present disclosure, the method further comprises: in response to the received response, maintaining, in the pending NSSAI, an indication of any S-NSSAI corresponding to a previously requested network slice for which NSSAA is not completed.
[0049] In certain embodiments of the present disclosure, the response comprises at least one of: an allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI allowed for the UE, or an additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI allowed for the UE; and a rejected NSSAI including an indication of one or more of the at least one S-NSSAI which are not allowed for the UE or which are not available in a current registration area of the UE.
[0050] In accordance with another aspect of the present disclosure, there is provided a method of a network entity, the method comprising: determining whether a single network slice selection assistance information (S-NSSAI) is available or allowed for a user equipment (UE) based on a registration area (RA) of the UE, and if not, including the SNSSAI in a rejected NSSAI without performing network slice-specific authentication and authorization (NSSAA) for the S-NSSAI; or performing NSSAA for the S-NSSAI, after performing NSSAA, determining whether the S-NSSAI is available or allowed for the UE based on the RA of the UE, and if not, including the S-NSSAI in the rejected NSSAI.
[0051] In certain embodiments of the present disclosure, the S-NSSAI is indicated in a request for use of a network slice received from the UE, or the S-NSSAI is marked as default in a subscription of the UE.
[0052] In certain embodiments of the present disclosure, it is determined that the S-NSSAI is not available or not allowed for the UE if the S-NSSAI is not available in the RA over a specific access technology.
[0053] In certain embodiments of the present disclosure, the method further comprises setting an indication that the reason for rejection is based on the RA.
[0054] In certain embodiments of the present disclosure, the method further comprises transmitting, to the UE, the rejected NSSAI and the indication.
[0055] In accordance with another aspect of the present disclosure, there is provided a network entity or UE configured to operate according to one or more of the methods recited above.
[0056] In accordance with another aspect of the present disclosure, there is provided a network comprising a network entity and/or a UE according to the previous paragraph.
[0057] In accordance with another aspect of the present disclosure, there is provided a computer program comprising instructions which, when the program is executed by a computer or processor, cause the computer or processor to carry out one or more of the methods recited above.
[0058] In accordance with another aspect of the present disclosure, there is provided a computer or processor-readable data carrier having stored thereon a computer program according to the previous paragraph.
[0059] Various aspects, advantages, and salient features will become apparent to those skilled in the art from the following detailed description, taken in conjunction with the annexed drawings, which disclose examples of the present disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
[0060] Embodiments of the invention are further described hereinafter with reference to the accompanying drawings, in which: [0061] Figure 1 illustrates an example structure of a network entity in accordance with an example of the present disclosure.
[0062] Figure 2 illustrates an example structure of a UE in accordance with an example of the present disclosure.
[0063] Figure 3 illustrates a method of a network entity in accordance with an example of
the present disclosure.
[0064] Figure 4 illustrates a method of a UE in accordance with another example of the present disclosure.
[0065] Figure 5 illustrates a method of a network entity in accordance with another
example of the present disclosure.
[0066] Figure 6 illustrates a method of a UE in accordance with another example of the present disclosure.
[0067] Figure 7 illustrates a method of a network entity in accordance with another example of the present disclosure.
DETAILED DESCRIPTION
[0068] The following description of examples of the present disclosure, with reference to the accompanying drawings, is provided to assist in a comprehensive understanding of the present invention, as defined by the claims. The description includes various specific details to assist in that understanding but these are to be regarded as merely exemplary.
Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the scope of the invention.
[0069] The same or similar components may be designated by the same or similar reference numerals, although they may be illustrated in different drawings.
[0070] Detailed descriptions of techniques, structures, constructions, functions or processes known in the art may be omitted for clarity and conciseness, and to avoid obscuring the subject matter of the present invention.
[0071] The terms and words used herein are not limited to the bibliographical or standard meanings, but, are merely used to enable a clear and consistent understanding of the invention.
[0072] Herein, the words "comprise", "include" and "contain" and variations of the words, for example "comprising" and "comprises", means "including but not limited to", and is not intended to (and does not) exclude other features, elements, components, integers, steps, processes, operations, functions, characteristics, properties and/or groups thereof.
[0073] Herein, the singular form, for example "a", "an" and "the", encompasses the plural unless the context otherwise requires. For example, reference to "an object" includes reference to one or more of such objects.
[0074] Herein, language in the general form of "X for Y" (where Y is some action, process, operation, function, activity or step and X is some means for carrying out that action, process, operation, function, activity or step) encompasses means X adapted, configured or arranged specifically, but not necessarily exclusively, to do Y. [0075] Features, elements, components, integers, steps, processes, operations, functions, characteristics, properties and/or groups thereof described or disclosed in conjunction with a particular aspect, embodiment, example or claim of the present disclosure are to be understood to be applicable to any other aspect, embodiment, example or claim described herein unless incompatible therewith.
[0076] Certain examples of the present disclosure provide methods, apparatus and systems for performing authentication and authorization in a network. The following examples are applicable to, and use terminology associated with, 3GPP 5G. For example, certain examples of the present disclosure provide methods, apparatus and systems for performing NSSAA in 3GPP 5G. However, the skilled person will appreciate that the techniques disclosed herein are not limited to these examples or to 3GPP 5G, and may be applied in any suitable system or standard, for example one or more existing and/or future generation wireless communication systems or standards.
[0077] For example, the functionality of the various network entities and other features disclosed herein may be applied to corresponding or equivalent entities or features in other communication systems or standards. Corresponding or equivalent entities or features may be regarded as entities or features that perform the same or similar role, function, operation or purpose within the network. For example, the functionality of an AMF in the examples below may be applied to any other suitable type of entity performing access and mobility management functions, and the functionality of an SMF in the examples below may be applied to any other suitable type of entity performing session management functions.
[0078] The skilled person will appreciate that the present invention is not limited to the specific examples disclosed herein. For example: * The techniques disclosed herein are not limited to 3GPP 5G.
* One or more entities in the examples disclosed herein may be replaced with one or more alternative entities performing equivalent or corresponding functions, processes or operations.
* One or more of the messages in the examples disclosed herein may be replaced with one or more alternative messages, signals or other type of information carriers that communicate equivalent or corresponding information.
* One or more further elements, entities and/or messages may be added to the examples disclosed herein.
* One or more non-essential elements, entities and/or messages may be omitted in
certain examples.
* The functions, processes or operations of a particular entity in one example may be divided between two or more separate entities in an alternative example.
* The functions, processes or operations of two or more separate entities in one example may be performed by a single entity in an alternative example.
* Information carried by a particular message in one example may be carried by two or more separate messages in an alternative example.
* Information carried by two or more separate messages in one example may be carried by a single message in an alternative example.
* The order in which operations are performed may be modified, if possible, in alternative examples.
* The transmission of information between network entities is not limited to the specific form, type and/or order of messages described in relation to the examples disclosed herein.
[0079] Certain examples of the present disclosure may be provided in the form of an apparatus/device/network entity configured to perform one or more defined network functions and/or a method therefor. Certain examples of the present disclosure may be provided in the form of a system (e.g. a network) comprising one or more such apparatuses/devices/network entities, and/or a method therefor. For example, in the following examples, a network may include a UE, AMF and an SMF.
[0080] At least the following problems exist in view of the related art: 1. Problem: Registration to slices when NSSAA is ongoing [0081] The following scenario can occur: * Step 1 the UE may send a requested NSSAI in a Registration Request message; o For simplicity, assume this requested NSSAI contains entries {A,B}.
* Step 2 the UE receives a pending NSSAI in the Registration Accept message; o For simplicity, assume this pending NSSAI contains {B}, reflecting that NSSAA needs to be performed for slice B. * Step 3: the UE may also receive an allowed NSSAI in the Registration Accept message; o For simplicity, assume this contains {A}.
* Step 4: the UE needs to register to additional slices i.e. the UE needs to use more slices in addition to what was requested in step 1; o For simplicity, assume the UE needs to now use {A, B, C}.
[0082] If the pending NSSAI contains at least one S-NSSAI that was requested by the UE (in the requested NSSAI) in step 1, then according to a requirement that was previously stated, the UE will not be able to send a requested NSSAI containing the entry {B} because S-NSSAI B is in the pending NSSAI list.
[0083] With this, if the UE then sends a requested NSSAI {A, C}, then the AMF sees a new requested NSSAI {A, CI and will consider the last requested NSSAI (i.e., {A, B}) to be invalid. The AMF then concludes that the UE now wants to use slices {A, C} only and that the UE does not want to use slice {B} anymore. This may lead to the AMF removing the 5-NSSAI for slice B from the pending NSSAI.
[0084] With the example above, it can be seen that the given requirement that the requested NSSAI cannot contain any S-NSSAI that is in the pending NSSAI will lead to cases in which the UE cannot inform the AMF about the actual slices that the UE needs to use. Moreover, the AMF will make a wrong determination about the slices that the UE actually wants to use.
2. Problem: NSSAA for slices that are not available in the UE's registration area [0085] As indicated earlier, a slice should at least be available for a UE to use in the UE's registration area (RA). If available, and if the slice is subject to NSSAA, then the network will run NSSAA for the S-NSSAI in question.
[0086] As discussed above, the current specification does not require checking the availability of the slice in the UE's RA before checking for the need to run NSSAA. In other words, the AMF immediately checks if an S-NSSAI in the requested NSSAI is subject to NSSAA and if yes the AMF will run NSSAA. If this happens, then there can be a situation where signalling is unnecessarily used to execute NSSAA for an S-NSSAI that is in fact not even available for the UE in the first place. This may result in unnecessary use of computational resources also.
[0087] If the network is configured such that the availability of the slice in the UE's RA is not verified first, then the AMF will have to perform this verification after NSSAA is performed. Afterwards the AMF can either allow or indicate that the slice is not allowed for the PLMN and registration area combination. This component is also missing in the current
specification.
[0088] To further clarify the problem, the following text can be used from [3] (see: 5.5.1.2.4; 5.5.1.3.4): "If the UE indicated the support for network slice-specific authentication and authorization, and if the Requested NSSAI IF includes one or more S-NSSAls subject to network slice-specific authentication and authorization, the AMF shall in the REGISTRATION ACCEPT message include: a) the allowed NSSAI containing the S-NSSAI(s) or the mapped S-NSSAI(s), if any: 1) which are not subject to network slice-specific authentication and authorization and are allowed by the AMF; or 2) for which the network slice-specific authentication and authorization has been successfully performed; b) optionally, the rejected NSSAI for the failed or revoked NSSAA; c) pending NSSAI containing one or more S-NSSAls for which network slice-specific authentication and authorization will be performed or is ongoing, if any; and d) the "NSSAA to be performed" indicator in the 5GS registration result IE set to indicate whether network slice-specific authentication and authorization procedure will be performed by the network, if the allowed NSSAI is not included in the REGISTRATION ACCEPT message." [0089] From bullet al), it can be seen that the AMF verifies if the S-NSSAls "are allowed by the AMF'. Here it should be noted that the AMF does consider the UE's RA since the concept of allowed NSSAI is per the UE's RA (i.e. the entries of the allowed NSSAI are valid in the current RA only).
[0090] However, from bullet c) it can be seen that the AMF only verifies if NSSAA is required. As such, it is possible that NSSAA is always required for the S-NSSAI but this does not mean that the S-NSSAI is allowed to be used in the current RA even if NSSAA succeeds for this slice. Hence, the AMF behaviour needs to be updated to consider such a case in which an S-NSSAI requires NSSAA but the S-NSSAI is not allowed in the current RA.
1. Solution to allow registration to slices when NSSAA is ongoing [0091] As described above a problem may arise when the UE needs to register to additional slices, i.e., in addition to a slice for which there is pending NSSAA.
la. Use of a new information element (1E) to repister to additional slices [0092] A first solution disclosed herein is to use a new IE to solve the problem. A new IE can be defined for the purpose of indicating that the UE wants to register or use at least one S-NSSAI in addition to what the S-NSSAI(s) that the UE had initially requested and which are also in the pending NSSAI.
[0093] The new I E can be given any name; however, for the purpose of this explanation, this IF will be called Additional requested NSSAI IF (or in short, additional requested NSSAI) [0094] Two options for this first solution are now disclosed, although it will be appreciated that embodiments of the present disclosure are not limited to these: Option 1 [0095] When the UE needs to register to a set of slices where any of these slices has a corresponding S-NSSAI that is in the pending NSSAI in the UE, the UE shall send the Registration Request and include the Additional requested NSSAI IF (additional requested NSSAI). The UE shall set the contents of the Additional requested NSSAI I E to include the set of S-NSSAls that the UE needs to register to (or use) in addition to the set of S-NSSAls that is in the pending NSSAI. However, the additional requested NSSAI does not include any S-NSSAI from the pending NSSAI.
[0096] Note that the UE can send the additional requested NSSAI on a different access from which it had previously sent a requested NSSAI that led to the inclusion of at least one S-NSSAI into the pending NSSAI. By doing so i.e. by sending the requested additional NSSAI over a different access technology, the UE indicates that it wants to use the SNSSAls in the requested additional NSSAI in addition to the S-NSSAls in the pending NSSAI (and optionally in addition to the S-NSSAls in the allowed NSSAI, if any). Hence, the use of the requested additional NSSAI applies to any access technology as described herein. Moreover, the same behaviour of the UE as described herein may apply regardless of the access technology that is used by the UE to send the additional requested NSSAI.
[0097] The contents of the additional requested NSSAI can also be considered to be the set of S-NSSAls that are being requested in addition to any S-NSSAI that is in the allowed NSSAI if the UE has one (or if the AMF has one for the UE). As such, the purpose of the additional requested NSSAI is to indicate the slices that the UE wants to use in addition to the S-NSSAls in the pending NSSAI and also in addition to the S-NSSAls that the UE has received in the allowed NSSAI, if any. Hence, in this option, the additional requested NSSAI will not contain the entries of the allowed NSSAI.
[0098] Wien the AMF receives the additional requested NSSAI, the AMF should ensure that the total number of S-NSSAI entries in the pending NSSAI (due to a request from the current access technology), in the allowed NSSAI if any, and in the additional requested NSSAI, does not exceed a certain maximum number e.g. 8, for the current access technology. If it does exceed 8, the AMF should ignore the last M entries in the additional requested NSSAI, where M is an integer, such that the maximum number of S-NSSAls that the UE requests to use would not exceed a certain maximum number e.g. 8.
[0099] Wien the AMF receives the Additional requested NSSAI I E (or additional requested NSSAI) and (optionally) if there is a pending NSSAI for the UE, the AMF considers the S-NSSAls in the additional requested NSSAI as the new additional slices that the UE additionally wants to use or register to (i.e. in addition to the S-NSSAI entries in the pending NSSAI, and (optionally) in the allowed NSSAI, if any). The AMF should then verify if any S-NSSAI in the additional requested NSSAI is allowed for the UE (i.e. not subject to NSSA or for which NSSAA is not required or has been successfully performed) and also verifies if there is any S-NSSAI is subject to NSSAA and requires NSSAA.
[00100] Note that the AMF takes the actions described herein even if the additional requested NSSAI is received over a different access technology from the one that was previously used to request a set of slices for which at least one of the S-NSSAls that was requested was placed in the pending NSSAI. Hence, the AMF takes the same behaviour as described herein regardless of the access technology over which the additional requested NSSAI is received. Therefore, receipt of the requested additional NSSAI means that the UE wants to use the S-NSSAls in the additional requested NSSAI and the S-NSSAls in the pending NSSAI (and optionally the S-NSSAls in the allowed NSSAI, if any) on the access technology over which the requested NSSAI was received by the AMF. This also means that when NSSAA is successful, the AMF should send the allowed NSSAI over each and every access technology that the AMF has determined that the UE wants to use the corresponding S-NSSAls based on the access technology over which the additional requested NSSAI is received (as described above). For example, the AMF can send the allowed NSSAI to the UE using the Configuration Update Command message which should be sent over each access technology after the determination by the AMF as explained above.
[00101] If at least one of S-NSSAI in the additional requested NSSAI is subject to NSSAA, the AMF should update the list of pending NSSAI (or the S-NSSAls for which NSSAA is required) such that this S-NSSAI (from the additional requested NSSAI) is now also subject to NSSAA. The AMF should then perform NSSAA for this S-NSSAI. The AMF should also update the UE with a new list of pending NSSAI such that the pending NSSAI now contains any S-NSSAI, from the additional requested NSSAI, that requires NSSAA.
The AMF should send the new list of pending NSSAI to the UE in the Registration Accept message.
[00102] If at least one S-NSSAI in the additional requested NSSAI is allowed for the UE, the AMF may also include an allowed NSSAI in the Registration Accept message, where the allowed NSSAI: * Contains all the S-NSSAls that are allowed for the UE, including all the S-NSSAls that were previously allowed for the UE if any. Note that the allowed NSSAI can contain S-NSSAls from the additional requested NSSAI if any S-NSSAI does not require NSSAA (or for which NSSAA has been previously successfully performed) and is allowed for the UE (optionally, in the current registration area) * Contains any S-NSSAI for which NSSAA has been successfully completed (optionally, from a previous requested NSSAI). Note that the AMF may also remove such S-NSSAI from the pending NSSAI that is optionally sent to the UE in the Registration Accept message [00103] If at least one S-NSSAI in the additional requested NSSAI is not allowed for the UE, or is not available in the current registration area, the AMF should send the rejected NSSAI containing any such S-NSSAI and a corresponding cause value to indicate the reason for rejection.
[00104] In certain examples, the AMF can use a new Additional allowed NSSAI IF (or additional allowed NSSAI) to include any S-NSSAI from the additional requested NSSAI that are allowed for the UE. The AMF can send this IF to the UE in the Registration Accept message.
[00105] In certain examples, the AMF can use a new Additional pending NSSAI IE (or additional pending NSSAI) to include any S-NSSAI from the additional requested NSSAI that is subject to NSSAA (or for which NSSAA will be performed). The AMF can send this IE to the UE in the Registration Accept message.
[00106] In certain examples, the Additional allowed NSSAI IF and/or Additional pending NSSAI IE can also be sent to the UE in the Configuration Update Command (CUC) message.
[00107] If the UE receives the Additional allowed NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IE to the list of allowed NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) pending NSSAI that matches an S-NSSAI from the additional allowed NSSAI.
[00108] If the UE receives the Additional pending NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this I E to the list of pending NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) allowed NSSAI that matches an S-NSSAI from the additional pending NSSAI.
[00109] In certain examples, when the UE sends the additional requested NSSAI, the UE may not send the requested NSSAI in the same NAS message.
[00110] In certain examples, when the AMF sends the additional allowed NSSAI, the AMF 10 may not send the allowed NSSAI in the same NAS message.
[00111] In certain examples, when the AMF sends the additional pending NSSAI, the AMF may not send the pending NSSAI in the same NAS message.
Option 2: [00112] In contrast to Option 1, here the additional requested NSSAI should also include any S-NSSAI that is in the allowed NSSAI, if any. Hence, when the UE needs to register to (or use) slices in addition to what has been requested previously, the UE should send the Registration Request message including the additional requested NSSAI where the latter contains the additional (new) S-NSSAls that the UE wants to register to (or use) and the S-NSSAI that are included in the allowed NSSAI.
[00113] Wien the AMF receives the additional requested NSSAI, the AMF should ensure that the total number of S-NSSAI entries in the pending NSSAI (due to a request from the current access technology) and in the additional requested NSSAI does not exceed a certain maximum number e.g. 8, for the current access technology. If it does exceed 8, the AMF should ignore the last M entries in the additional requested NSSAI, where M is an integer, such that the maximum number of S-NSSAls that the UE requests to use would not exceed a certain maximum number e.g. 8.
[00114] Note that the UE can send the additional requested NSSAI on a different access from which it had previously sent a requested NSSAI that led to the inclusion of at least one S-NSSAI into the pending NSSAI. By doing so i.e. by sending the requested additional NSSAI over a different access technology, the UE indicates that it wants to use the SNSSAls in the requested additional NSSAI in addition to the S-NSSAls in the pending NSSAI. Hence, the use of the requested additional NSSAI applies to any access technology as described herein. Moreover, the same behaviour of the UE as described herein may apply regardless of the access technology that is used by the UE to send the additional requested NSSAI.
[00115] When the AMF receives the additional requested NSSAI and (optionally) if there is a pending NSSAI for the UE, the AMF verifies if there is any S-NSSAI that is allowed for the UE (i.e. not subject to NSSA or for which NSSAA is not required or has been successfully performed) and also verifies if there is any S-NSSAI is subject to NSSAA and requires NSSAA.
[00116] Note that the AMF takes the actions described herein even if the additional requested NSSAI is received over a different access technology from the one that was previously used to request a set of slices for which at least one of the S-NSSAls that was requested was placed in the pending NSSAI. Hence, the AMF takes the same behaviour as described herein regardless of the access technology over which the additional requested NSSAI is received. Therefore, receipt of the requested additional NSSAI means that the UE wants to use the S-NSSAls in the additional requested NSSAI and the S-NSSAls in the pending NSSAI on the access technology over which the requested NSSAI was received by the AMF. This also means that when NSSAA is successful, the AMF should send the allowed NSSAI over each and every access technology that the AMF has determined that the UE wants to use the corresponding S-NSSAls based on the access technology over which the additional requested NSSAI is received (as described above).
For example, the AMF can send the allowed NSSAI to the UE using the Configuration Update Command message which should be sent over each access technology after the determination by the AMF as explained above.
[00117] If at least one S-NSSAI from the additional requested NSSAI is subject to NSSAA, the AMF should update the list of pending NSSAI (or the S-NSSAls for which NSSAA is required) such that this S-NSSAI (from the additional requested NSSAI) is now also subject to NSSAA. The AMF should then perform NSSAA for this S-NSSAI. The AMF should also update the UE with a new list of pending NSSAI such that the pending NSSAI now contains any S-NSSAI, from the additional requested NSSAI, that requires NSSAA. The AMF should send the new list of pending NSSAI to the UE in the Registration Accept message.
[00118] If at least one S-NSSAI in the additional requested NSSAI is allowed for the UE, the AMF may also include an allowed NSSAI in the Registration Accept message, where the allowed NSSAI: * Contains all the S-NSSAls that are allowed for the UE, including all the S-NSSAls that were previously allowed for the UE if any. Note that the allowed NSSAI can contain S-NSSAls from the additional requested NSSAI if any S-NSSAI does not require NSSAA (or for which NSSAA has been previously successfully performed) and is allowed for the UE (optionally, in the current registration area) * Contains any S-NSSAI for which NSSAA has been successfully completed. Note that the AMF may also remove such S-NSSAI from the pending NSSAI that is optionally sent to the UE in the Registration Accept message [00119] If at least one S-NSSAI in the additional requested NSSAI is not allowed for the UE, or is not available in the current registration area, the AMF should send the rejected NSSAI containing any such S-NSSAI and a corresponding cause value to indicate the reason for rejection.
[00120] In certain examples, the AMF can use a new Additional allowed NSSAI IE (or additional allowed NSSAI) to include any S-NSSAI from the additional requested NSSAI that are allowed for the UE. The AMF can send this IE to the UE in the Registration Accept message.
[00121] In certain examples, the AMF can use a new Additional pending NSSAI IE (or additional pending NSSAI) to include any S-NSSAI from the additional requested NSSAI that is subject to NSSAA (or for which NSSAA will be performed). The AMF can send this IF to the UE in the Registration Accept message.
[00122] In certain examples, the Additional allowed NSSAI IF and/or Additional pending NSSAI IF can also be sent to the UE in the Configuration Update Command (CUC) message.
[00123] If the UE receives the Additional allowed NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IE to the list of allowed NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) pending NSSAI that matches an S-NSSAI from the additional allowed NSSAI.
[00124] If the UE receives the Additional pending NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IF to the list of pending NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) allowed NSSAI that matches an S-NSSAI from the additional pending NSSAI.
[00125] In certain examples, when the UE sends the additional requested NSSAI, the UE may not send the requested NSSAI in the same NAS message.
[00126] In certain examples, when the AMF sends the additional allowed NSSAI, the AMF may not send the allowed NSSAI in the same NAS message.
[00127] In certain examples, when the AMF sends the additional pending NSSAI, the AMF may not send the pending NSSAI in the same NAS message.
lb. Use the Requested NSSAI IE to reqister to additional slices [00128] A second solution disclosed herein is to use the existing Requested NSSAI IE (or requested NSSAI) to solve the problem. Here, the requested NSSAI should be used by the UE to register to slices that are in addition to the S-NSSAI entries which are included in the pending NSSAI.
[00129] Four options for this second solution are now disclosed, although it will be appreciated that embodiments of the present disclosure are not limited to these: Option 1 [00130] Wien the UE needs to register to a set of slices where any of these slices has a corresponding S-NSSAI that is in the pending NSSAI in the UE, the UE shall send the Registration Request and include the Requested NSSAI IE. The UE shall set the contents of the Requested NSSAI IE to contain the set of S-NSSAls that the UE needs to register to (or use) in addition to the set of S-NSSAls that is in the pending NSSAI. However, the requested NSSAI does not include any S-NSSAI from the pending NSSAI.
[00131] The contents of the requested NSSAI can also be considered to be the set of S-NSSAls that are being requested in addition to any S-NSSAI that is in the allowed NSSAI if the UE has one (or if the AMF has one for the UE). As such, the purpose of the requested NSSAI is to indicate the slices that the UE wants to use in addition to the S-NSSAls in the pending NSSAI and also in addition to the S-NSSAls that the UE has received in the allowed NSSAI, if any. Hence, in this option, the requested NSSAI will not contain the entries of the allowed NSSAI.
[00132] In certain examples, the UE can use a new bit in the 5GS update type IF to indicate if the contents of the requested NSSAI are new or sent in addition to what was already requested by the UE in the pending NSSAI and optionally in addition to any SNSSAI in the allowed NSSAI. The new bit can be called, as an example, "Additional slice(s) indication", where e.g. if the bit is set to '1' the bit means "Additional slice(s) requested", or if the bit is set to '0' then it means "Additional slice(s) not requested". Hence, if the UE is requesting additional slices to those in the pending NSSAI, and optionally to those in the allowed NSSAI, the UE sends the requested NSSAI and sets the new bit accordingly e.g. to 1'. On the other hand, if the UE is registering to a completely new slices (i.e. slices that are different from what is in the pending NSSAI, and allowed NSSAI if available), the UE sends the requested NSSAI and sets the value of this bit accordingly e.g. to '0'.
[00133] Note that the usage of the bit as proposed above can be to inform the AMF that the UE wants to also use all the S-NSSAI entries in the pending NSSAI over the access technology over which the UE sends the Registration Request with the bit set to '1'. Hence, the setting of the bit to e.g. '1' as described above should mean that the UE also wants to use the S-NSSAI entries in the pending NSSAI over the access technology use for sending the NAS message with the bit set to '1'. This however does not mean that the UE must also send the requested NSSAI.
[00134] For example, if the UE only wants to register to or use the slices which are in the pending NSSAI (e.g. from another/previous registration procedure over another access technology) over the current access technology, the UE should set the bit to indicate so e.g. to '1'. If in addition the UE also needs to register to or use other slices, in addition to what is in the pending NSSAI, the UE should also then include the requested NSSAI which should then contain the additional S-NSSAls that the UE wants to register to or use. It should be noted that such a solution may be used with any bit as proposed herein where the bit may have a different name instead of "Additional slice(s) indication". For example, this bit can be called "Request to use slices of the pending NSSAI", or any other name can be used. Hence, the name of the bit, and/or the value used to mean a specific indication only but rather as an example. Note that this bit may be used for the indicated reason (i.e. to indicate desire to use the slices in the pending NSSAI, or to request to use the slices in the pending NSSAI) on the same access technology over which the S-NSSAls that are in the pending NSSAI were previously sent, or over another access technology as described above.
[00135] Note that the examples of the bits provided above may mean that these two bits are both present and used as described above, or may mean that one of these bits is used as described above.
[00136] Wien the AMF receives the Requested NSSAI IE (or requested NSSAI) and (optionally) if there is a pending NSSAI for the UE, the AMF considers the S-NSSAls in the requested NSSAI as the new additional slices that the UE additionally wants to use or register to.
[00137] In certain examples, the AMF determines if the contents of the requested NSSAI are in addition to what the UE had already requested in the pending NSSAI, and, in further examples, what was requested in the allowed NSSAI, based on the value of the new bit in the 5GS update type IE.
[00138] If the bit is set to '1', for example, the AMF considers that the requested NSSAI contents are being requested in addition to the entries in the pending NSSAI, and optionally in addition to the entries in the current allowed NSSAI if one is available for the UE.
[00139] If the AMF receives a new indication e.g. a new bit in the 5GS update type IE (for example, where this bit is set to '1' to indicate that the UE wants to use additional slices or to indicate that the UE wants to use the slices in the pending NSSAI) but does not receive the requested NSSAI (or does not receive any other IE with a set of slices that are requested), the AMF should consider that the UE also wants to use the S-NSSAls in the pending NSSAI on the access technology over which the bit was received (or the indication was received) even though the NAS message did not contain a requested NSSAI. Hence, the reception of the new bit at the AMF may mean (and hence the AMF may determine) that the UE wants to also use the S-NSSAls in the pending NSSAI on the access technology over which the indication is received. Additionally, if the requested NSSAI is also received by the AMF, then the AMF also considers its S-NSSAI contents to be the additional slices that the UE wants to register to or use, in addition to those in the pending NSSAI and that the UE wants to use these slices on the access technology over which the bit is received and optionally over which the requested NSSAI may also have been received.
[00140] Otherwise, if the bit is set to '0', for example, the AMF determines that the contents of the requested NSSAI are being requested as completely new slices and hence the UE no longer wants to use the entries in the pending NSSAI that were requested over the current access, and optionally the UE no longer wants to use the entries in the allowed NSSAI if one is available for the UE. The AMF then processes the contents of the requested NSSAI as indicated below.
[00141] If the bit is set to '0', then the AMF may optionally process the contents of the requested NSSAI as proposed herein.
[00142] The use of the new bit by the UE as described above, and the handling of the new bit by the AMF, and optionally the handling of the requested NSSAI accordingly, can apply to other solutions options in this disclosure and hence this proposal for the UE and AMF, based on the new bit in the 5GS update type IE, is not specific to this solution option only.
[00143] According to certain examples, the new bit can be sent in any other IE and in any other NAS message and hence the proposal is not limited to the 5GS update type IE only and also not specific to the Registration Request message only.
[00144] The AMF should then verify if any S-NSSAI in the requested NSSAI is allowed for the UE (i.e. not subject to NSSA or for which NSSAA is not required or has been successfully performed) and also verifies if there is any S-NSSAI is subject to NSSAA and requires NSSAA.
[00145] If at least one of S-NSSAI in the requested NSSAI is subject to NSSAA, the AMF should update the list of pending NSSAI (or the S-NSSAls for which NSSAA is required) such that this S-NSSAI (from the requested NSSAI) is now also subject to NSSAA. The AMF should then perform NSSAA for this S-NSSAI. The AMF should also update the UE with a new list of pending NSSAI such that the pending NSSAI now contains any S-NSSAI, from the requested NSSAI, that requires NSSAA. The AMF should send the new list of pending NSSAI to the UE in the Registration Accept message.
[00146] If at least one S-NSSAI in the requested NSSAI is allowed for the UE, the AMF may also include an allowed NSSAI in the Registration Accept message, where the allowed NSSAI: * Contains all the S-NSSAls that are allowed for the UE, including all the S-NSSAls that were previously allowed for the UE if any. Note that the allowed NSSAI can contain S-NSSAls from the requested NSSAI if any S-NSSAI does not require NSSAA (or for which NSSAA has been previously successfully performed) and is allowed for the UE (optionally in the current registration area) * Contains any S-NSSAI for which NSSAA has been successfully completed. Note that the AMF may also remove such S-NSSAI from the pending NSSAI that is optionally sent to the UE in the Registration Accept message [00147] In certain examples, the AMF can use a new Additional allowed NSSAI IF (or additional allowed NSSAI) to include any S-NSSAI from the requested NSSAI that are allowed for the UE. The AMF can send this IF to the UE in the Registration Accept message.
[00148] In certain examples, the AMF can use a new Additional pending NSSAI IE (or additional pending NSSAI) to include any S-NSSAI from the requested NSSAI that is subject to NSSAA (or for which NSSAA will be performed). The AMF can send this IF to the UE in the Registration Accept message.
[00149] In certain examples, the Additional allowed NSSAI IF and/or Additional pending NSSAI IE can also be sent to the UE in the Configuration Update Command (CUC) message.
[00150] If the UE receives the Additional allowed NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IF to the list of allowed NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) pending NSSAI that matches an S-NSSAI from the additional allowed NSSAI.
[00151] If the UE receives the Additional pending NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IE to the list of pending NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) allowed NSSAI that matches an S-NSSAI from the additional pending NSSAI.
Option 2 [00152] In contrast to Option 1, here the requested NSSAI should also include any S-NSSAI that is in the allowed NSSAI, if any. Hence, when the UE needs to register to (or use) slices in addition to what has been requested previously, the UE should send the Registration Request message including the requested NSSAI where the latter contains the additional (new) S-NSSAls that the UE wants to register to (or use) and the S-NSSAI that are included in the allowed NSSAI.
[00153] When the AMF receives the requested NSSAI and (optionally) if there is a pending NSSAI for the UE, the AMF verifies if there is any S-NSSAI that is allowed for the UE (i.e. not subject to NSSA or for which NSSAA is not required or has been successfully performed) and also verifies if there is any S-NSSAI is subject to NSSAA and requires NSSAA.
[00154] If at least one S-NSSAI from the requested NSSAI is subject to NSSAA, the AMF should update the list of pending NSSAI (or the S-NSSAls for which NSSAA is required) such that this S-NSSAI (from the requested NSSAI) is now also subject to NSSAA. The AMF should then perform NSSAA for this S-NSSAI. The AMF should also update the UE with a new list of pending NSSAI such that the pending NSSAI now contains any S-NSSAI, from the requested NSSAI, that requires NSSAA. The AMF should send the new list of pending NSSAI to the UE in the Registration Accept message.
[00155] If at least one S-NSSAI in the requested NSSAI is allowed for the UE, the AMF may also include an allowed NSSAI in the Registration Accept message, where the allowed NSSAI: * Contains all the S-NSSAls that are allowed for the UE, including all the S-NSSAls that were previously allowed for the UE if any. Note that the allowed NSSAI can contain S-NSSAls from the requested NSSAI if any S-NSSAI does not require NSSAA (or for which NSSAA has been previously successfully performed) and is allowed for the UE (optionally in the current registration area) * Contains any S-NSSAI for which NSSAA has been successfully completed. Note that the AMF may also remove such S-NSSAI from the pending NSSAI that is optionally sent to the UE in the Registration Accept message [00156] In certain examples, the AMF can use a new Additional allowed NSSAI IE (or additional allowed NSSAI) to include any S-NSSAI from the requested NSSAI that are allowed for the UE. The AMF can send this I E to the UE in the Registration Accept message.
[00157] In certain examples, the AMF can use a new Additional pending NSSAI IF (or additional pending NSSAI) to include any S-NSSAI from the requested NSSAI that is subject to NSSAA (or for which NSSAA will be performed). The AMF can send this IE to the UE in the Registration Accept message.
[00158] In certain examples, the Additional allowed NSSAI IE and/or Additional pending NSSAI IE can also be sent to the UE in the Configuration Update Command (CUC) message.
[00159] If the UE receives the Additional allowed NSSAI IE in the Registration Accept message (or CUC message), the UE should add the entries of this IE to the list of allowed NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) pending NSSAI that matches an S-NSSAI from the additional allowed NSSAI.
[00160] If the UE receives the Additional pending NSSAI IF in the Registration Accept message (or CUC message), the UE should add the entries of this IF to the list of pending NSSAI. The UE should also remove any S-NSSAI from the rejected NSSAI or (additional) allowed NSSAI that matches an S-NSSAI from the additional pending NSSAI.
Option 3 [00161] Here, the UE is not allowed to register to any S-NSSAI that is in the pending NSSAI when such a list is available at the UE and/or at the AMF. Therefore, the only time the UE is allowed to send the requested NSSAI is when the UE requires to register to, or use, a set of S-NSSAls for which there is no matching S-NSSAI entry in the pending NSSAI. Moreover, this means that all the S-NSSAI entries in the pending NSSAI that were previously requested over the same access as the access that is used to send the new requested NSSAI are considered to be not required for use by the UE. In some examples, a 'matching entry' takes into account an access technology over which registration to the corresponding slice is requested.
[00162] In this case, when the AMF receives the requested NSSAI, the AMF considers that the UE is requesting a completely new set of S-NSSAI for which there is no matching S-NSSAI in the pending NSSAI. Therefore, when the AMF receives the requested NSSAI, and (optionally) when the AMF has a pending NSSAI for the UE, the AMF shall consider the new received requested NSSAI as valid and consider any previous allowed NSSAI for the current access as invalid.
[00163] The AMF should verify the contents of the requested NSSAI and compare them with those in the pending NSSAI.
[00164] For any S-NSSAI that is in the requested NSSAI that is received over this access technology, if the S-NSSAI was not requested over another access technology, the AMF should remove from the pending NSSAI any S-NSSAI that matches an entry from the requested NSSAI. This is because the UE may have requested another set of S-NSSAI over a different access technology that is also subject to NSSAA and hence that is in the pending NSSAI. The AMF should stop any ongoing NSSAA for any S-NSSAI that was requested over this access technology (i.e. over which the requested NSSAI is received).
[00165] For any S-NSSAI that is in the requested NSSAI that is received over this access technology, if the S-NSSAI was previously requested over another access technology, the AMF should not remove the S-NSSAI entry from the pending NSSAI if it is present. The AMF should then verify if the new requested NSSAI is subject to NSSAA or not as per existing procedures.
[00166] If the UE is not registered over another access technology, then the AMF can immediately consider the contents of the pending NSSAI as invalid or remove all SNSSAls from the pending NSSAI when the requested NSSAI is received.
[00167] The AMF should then verify if the new requested NSSAI is subject to NSSAA or not as per existing procedures. If yes, the AMF should include any S-NSSAI that is subject to NSSAA in the pending NSSAI and send the updated pending NSSAI to the UE, and the AMF should perform NSSAA for the S-NSSAI that is subject to NSSAA. Otherwise, if the S-NSSAI is allowed and available for the UE in the current RA, the AMF should include the S-NSSAI in the allowed NSSAI and send it to the UE. Note that the new requested NSSAI may not be subject to NSSAA and so the AMF may have removed some entries from the pending NSSAI as explained above. In this case, even if the AMF did not include any SNSSAI entry, the AMF should send the updated pending NSSAI after removing any 3NSSAI entry and send it to the UE.
[00168] The above may be explained by reference to the following illustrative examples:
[00169] Example 1:
* The UE sent a requested NSSAI = {A, B} over a first access.
* The UE sent a requested NSSAI = {C, D} over a second access.
* The AMF has a pending NSSAI = {A, B, C, D} for the UE.
* The UE sends a requested NSSAI = {E, F} over the first access; a The AMF should remove {A, B} from the pending NSSAI; The AMF should verify if {E, F} are subject to NSSAA: * If not, the AMF should send the pending NSSAI = {C, DI to the UE; * If yes, the AMF should send the pending NSSAI = {C, D, E, F} to the UE. 10 Option 4 [00170] Here, the UE is configured in a manner that indicates whether the requested NSSAI can contain an S-NSSAI entry from the pending NSSAI.
[00171] The UE may be pre-configured with this information in the USIM or the ME.
Alternatively, the network may indicate to the UE using a new bit that can be defined as part of the 5GS registration result IE or the 5GS network feature support IE.
[00172] For example, a new bit can be defined, e.g. "Registration to an S-NSSAI from the pending NSSAI" (RSPN) bit (noting that this name is just as an example and the bit can be called differently). For example, if the bit is set to a value '1', then this may mean "Registration to an S-NSSAI from the pending NSSAI allowed", or when it is set to '0' then this may mean "Registration to an S-NSSAI from the pending NSSAI not allowed". The AMF may set this bit to the corresponding value based on operator policy or UE subscription.
[00173] If configured to request, or register to, an S-NSSAI from the pending NSSAI, either with pre-configuration or using an indication from the network as described above, the UE may then include any S-NSSAI in the requested NSSAI even if this S-NSSAI is in the pending NSSAI.
[00174] If not configured to request, or register to, an S-NSSAI from the pending NSSAI, the UE may operate using any of the solution options proposed above. For example, whenever the UE sends the requested NSSAI, it means that the UE is requesting slices that are in addition to the pending NSSAI as in Option 2 (for Solution lb) discussed above. However, other solutions options can also be used in this case.
lc. Wait until pending NSSAI is empty [00175] As another solution to the problem identified above, the UE may be configured to wait until the pending NSSAI is empty before transmitting a request to use at least one other S-NSSAI in addition to at least one S-NSSAI that is in the pending NSSAI.
[00176] For example, the UE may wait for NSSAA to terminate or finish before registering to a new slice, or may wait to ensure that that slices that the UE wants to use (e.g. over an access technology) have no corresponding S-NSSAI entry in the pending NSSAI (even though the pending NSSAI may not be empty). For example, assume that the UE has requested to use slices {A, B} over the 3GPP access. Assume also that the pending NSSAI contains {A, B}. If during NSSAA, or while the pending NSSAI is not empty, the UE now wants to use slices {A, B, C}, then the UE should wait until no S-NSSAI entry (i.e. from {A, B, C} in this example) in the set of slices that the UE wants to use is present in the pending NSSAI. As such, when the pending NSSAI is empty or is modified such that an SNSSAI entry that is required by the UE is not present in it, the UE may then request to use the corresponding S-NSSAI by including it in the requested NSSAI and sending the latter in the Registration Request.
[00177] Optionally, the UE may be configured to wait for a specific pre-configured (e.g. in the USIM or in the non-volatile memory or in a management object file) or known time T during which the UE cannot request any S-NSSAI that is in the pending NSSAI. As such, the UE may start a timer with a length of T units (e.g. seconds, minutes, hours, etc) whenever a pending NSSAI is received or whenever the contents of the pending NSSAI are modified. During this time T, the UE is not allowed to request an S-NSSAI that is in the pending NSSAI. Upon expiry of the timer, the UE may then be allowed to request an 5NSSAI even if it is in still in the pending NSSAI. Alternatively, the UE may be provided with the value of the timer T in any NAS message such as the Registration Accept message or the Configuration Update Command message. The AMF may provide the length of the timer T in the NAS messages listed above and the AMF can do so at any time or whenever its policies require it to do so or whenever the AMF determines to change the duration of this timer.
2. Solution for handling of an S-NSSAI that is subject to NSSAA but that is not allowed in the UE's current registration area [00178] As described above a problem may arise when there is an S-NSSAI subject to NSSAA but not available or not allowed in the RA of the UE. Two solutions for handling the case of an S-NSSAI being subject to NSSAA but is not available in the current UE's registration area (RA) are now disclosed: 2a. The AMF does not perform NSSAA for slices that are not available in the UE's RA [00179] Here, the AMF should verify if an S-NSSAI (optionally: if the S-NSSAI is in the requested NSSAI (or in the requested mapped NSSAI, or in the additional requested NSSAI) and if the latter was sent by the UE, or an S-NSSAI that is marked as default in the UE's subscription if the UE did not send a requested NSSAI (or did not send the requested mapped NSSAI, or did not send the additional requested NSSAI) or the entries of the requested NSSAI (or in the requested mapped NSSAI, or in the additional requested NSSAI) are not available/allowed for the UE) is available/allowed for the UE in the UE's RA. In certain examples, this condition should be verified before or regardless of whether NSSAA is required for this S-NSSAI or not.
[00180] If the AMF determines that an S-NSSAI is not available/allowed for the UE in this RA, the AMF should not initiate NSSAA for the S-NSSAI. The AMF should include the SNSSAI in the rejected NSSAI and set the cause value accordingly to indicate the reason why an S-NSSAI is rejected. For example, the cause value can be set to "S-NSSAI not available in the current registration area".
[00181] This solution is optionally applicable on a per access basis since an S-NSSAI may be available for the UE in the current RA over one access technology but not the other.
2b. The AMF does perform NSSAA for slices that are not available in the UE's RA [00182] Here, the AMF may verify if an S-NSSAI (optionally: if the S-NSSAI is in the requested NSSAI (or in the requested mapped NSSAI, or in the additional requested NSSAI) and if the latter was sent by the UE, or an S-NSSAI that is marked as default in the UE's subscription if the UE did not send a requested NSSAI (or did not send the requested mapped NSSAI, or did not send the additional requested NSSAI) or the entries of the requested NSSAI (or in the requested mapped NSSAI, or in the additional requested NSSAI) are not available/allowed for the UE) is available/allowed for the UE in the UE's RA.
[00183] If the S-NSSAI is subject to NSSAA, the AMF may perform NSSAA even if the SNSSAI is not available in the current RA. After the completion of NSSAA: the AMF: * If NSSAA fails for the S-NSSAI, the AMF includes the S-NSSAI in the rejected NSSAI and sets the cause to "S-NSSAI not available due to the failed or revoked network slice-specific authentication and authorization" or to "S-NSSAI not available in the current registration area". The AMF sends the rejected NSSAI to the UE in the NAS message (e.g. Configuration Update Command message).
* If NSSAA succeeds for the S-NSSAI, the AMF includes the S-NSSAI in the rejected NSSAI and sets the cause to "S-NSSAI not available in the current registration area". The AMF sends the rejected NSSAI to the UE in the NAS message (e.g. Configuration Update Command message).
It will be appreciated that solution 2a and/or solution 2b may be combined with any of the options for solutions la and lb, as desired.
3. Further Discussion [00184] Further examples of the present disclosure are now provided. The skilled person would understand how these further examples may relate to one or more of the solutions options mentioned above.
[00185] Figure 1 provides a schematic diagram of the structure of a network entity 100 (for example, an AMF) which is arranged to operate in accordance with one or more of the examples described above. The network entity 100 includes a transmitter 102 arranged to transmit signals to a UE; a receiver 104 arranged to receive signals from a UE; and a controller 106 arranged to control the transmitter and receiver and to perform processing such as in accordance with the above described methods, and also to communicate with the network.
[00186] Figure 2 provides a schematic diagram of the structure of a UE 200 which is arranged to operate in accordance with one or more of the examples of the present disclosure described above. The UE 200 includes a transmitter 202 arranged to transmit signals to a network entity; a receiver 204 arranged to receive signals from a network entity; and a controller 206 arranged to control the transmitter and receiver and to perform processing in accordance with the above described methods.
[00187] Although in Figures 1 and 2 the transmitter, receiver, and controller have been illustrated as separate elements, any single element or plurality of elements which provide equivalent functionality may be used to implement the examples of the present disclosure described above.
[00188] Referring to Figure 3, there is illustrated a method in accordance with various
examples of the present disclosure.
[00189] The method of Fig. 3 may, in certain examples, be performed by a network entity such as that illustrated in Fig. 1. For example, the network entity may be an AMF.
[00190] In step 310, while there is a pending NSSAI for a UE, the network entity receives, from the UE, a request indicating at least one first S-NSSAI over a first access technology, the first S-NSSAI being different to any S-NSSAI indicated in the pending NSSAI.
[00191] It will be appreciated that the request may be a request to use (for example, to register to) at least one network slice corresponding to the at least one first S-NSSAI over the first access technology. For example, the request may be or include a requested NSSAI (for example, a requested NSSAI 1E).
[00192] In certain examples, any S-NSSAI indicated in the pending NSSAI may each correspond to a (different) network slice which the UE has previously transmitted a request to use (i.e., a previous/optionally different request to that mentioned above). Upon receiving said previous request, the network entity may have determined that one or more S-NSSAI included therein is/are subject to NSSAA and may therefore have added such one or more S-NSSAI to the pending NSSAI.
[00193] In certain examples, the UE may be prohibited, or prevented, from including, in a request to use a slice (such as the request mentioned in relation to step 310) any S-NSSAI(s) which are indicated in the pending NSSAI. That is, a request for using a network slice may not be able to indicate a S-NSSAI which is included in a pending NSSAI.
[00194] In certain examples, when the request is received by the network entity, NSSAA for one or more S-NSSAI included in the pending NSSAI at the UE at the time the UE transmitted the request may have been completed (e.g., NSSAA is successful). Here, the pending NSSAI for the UE at the network entity may be, or have been, updated to remove the indication of these one or more S-NSSAI for which NSSAA is completed. The UE may not have been informed of this yet, however, in which case the pending NSSAI at the UE still includes said indication. In the event that the network entity transmits a response to the request, the response may include an indication that NSSAA has been completed for the one or more of the S-NSSAI which are still indicated in the pending NSSAI at the UE, thereby informing the UE of this. For example, the network entity may transmit a (updated) pending NSSAI and an allowed NSSAI to the UE, where information for the one or more of the second S-NSSAI for which NSSAA has succeeded has been removed from the pending NSSAI and the allowed NSSAI indicates these one or more of the second S-NSSAI.
[00195] In certain examples if NSSAA has succeeded and the AMF has locally moved the S-NSSAI to the allowed NSSAI, and if the request from the UE is considered to be new (e.g., does not indicate any S-NSSAI indicated in a previous request), the AMF may remove the S-NSSAI, for which NSSAA has succeeded, from the allowed NSSAI. This is because the AMF may consider the first request to contain S-NSSAI entries that are mutually exclusive from those in the second request [00196] Similarly, if NSSAA failed for any of the S-NSSAI which were in the pending NSSAI at the UE at the time the UE transmitted the request, the network entity may remove information for such S-NSSAI from the pending NSSAI and add an indication for these S-NSSAI to a rejected NSSAI; this rejected NSSAI may also be transmitted to the UE to inform the UE of rejection of a request to use the slices(s) corresponding to these 5-NSSAI.
[00197] It will be appreciated that the request for at least one first S-NSSAI may, in certain examples, include information on the at least one first S-NSSAI, or an indication of each of the first S-NSSAI, such that the network entity is informed of the network slice(s) that the UE wants to use. Herein, it will be appreciated that, where reference is made to an indication of an S-NSSAI or at least one S-NSSAI (or similar), said indication may be, or include, the S-NSSAI itself/themselves, or may include a plurality of separate indications each indicating one of the S-NSSAI in some suitable manner (such as by providing or including the relevant S-NSSAI itself).
[00198] In step 320, it is essentially determined (or verified, checked etc.) whether the pending NSSAI includes an indication(s) of one or more S-NSSAI which were indicated in a previous request, received from the UE, over the first access technology. That is, it is checked whether the pending NSSAI includes an indication(s) of one or more S-NSSAI which were indicated in a request previously transmitted to the network entity by the UE, where this previously transmitted request was for using the network slice(s) corresponding to the one or more S-NSSAI over the same access technology as the more-recent request received from the UE. The indication(s) of one or more S-NSSAI over the first access technology in the pending NSSAI may include all S-NSSAI in the pending NSSAI which are/were requested over the first access technology.
[00199] Additionally or alternatively, the network entity may determine (or verify, check etc.) whether the pending NSSAI includes an indication of any S-NSSAI which were previously requested over a different access technology (i.e., a second access technology different to the first access technology). For instance, such S-NSSAI may have been indicated in a/another request previously transmitted to the network entity by the UE, where this previously transmitted request was for using the network slice(s) corresponding to such S-NSSAI over an access technology which is different to the first access technology.
[00200] In step 330, if the pending NSSAI includes an indication of one or more S-NSSAI which were indicated in a previous request from the UE over the first access technology, the network entity assumes that the request is for using at least one new network slice. In certain examples, the assumption that the request is for using at least one new network slice may also require that the pending S-NSSAI does not include any S-NSSAI (or any indication thereof) which were previously requested by the UE over a different access technology to the first access technology.
[00201] Following this, in step 340, the network entity removes the indication(s) of the one or more S-NSSAI from the pending NSSAI. For example, an indication(s), in the pending NSSAI, of any S-NSSAI over the first access technology, which were indicated to the network entity in the previous request from the UE 5 are removed from the pending NSSAI. It will be appreciated that, in certain examples, this can be seen to reflect the request being a request for using a new network slice, and in particular a new network slice over the first access technology. In certain example, it may be seen that the request for using a new network slice over an access technology is interpreted, by the network entity, to mean that a previous request over the same access technology is no longer valid.
[00202] Additionally or alternatively or optionally, step 330 may be considered to include an operation of determining whether an S-NSSAI indicated in the pending NSSAI, when the request is received, is to be removed, based on the access technology over which use of said S-NSSAI was requested. If the access technology over which use of said S-NSSAI in the pending NSSAI was requested is the first access technology, the method proceeds to step 340 in which the indication of said S-NSSAI is removed from the pending NSSAI. If, however, the access technology over which use of said S-NSSAI in the pending NSSAI was requested is a different access technology to the first access technology, the indication of said S-NSSAI is not removed from the pending NSSAI.
[00203] Although not shown in Fig. 3, it will be appreciated that the network entity may transmit a response to the first request, in certain examples.
[00204] For instance, a described further above, the network entity may transmit an (updated) pending NSSAI to the UE, in which one or more of the at least one first S-NSSAI are indicated, the one or more of the first S-NSSAI corresponding to slices for which NSSAA is required. Alternatively, the network entity may transmit an additional pending NSSAI to the UE (where this may be a newlE), in which said one or more of the first SNSSAI are indicated.
[00205] As another example, as described above, the network entity may also transmit an allowed NSSAI to the UE, where this may be modified based on the request; for example, to include an indication of one or more of the at least one first S-NSSAI to which the UE is allowed to register. Alternatively, the network entity may transmit an additional allowed NSSAI to the UE, which may be configured to include the indication of the one or more of the first S-NSSAI.
[00206] As yet another example, as described above, the network entity may also transmit a rejected NSSAI to the UE, where this may be modified, or generated, based on the request; for example, to include an indication of one or more of the at least one first SNSSAI for which the request for usage (e.g., a request to register) from the UE is rejected.
Alternatively, some other signal for indicating the one or more of the first S-NSSAI for which the UE registration is rejected may be sent to the UE.
[00207] It will be appreciated that one or more of the signals/messages transmitted in response to the request may be sent in a single signal. For example, in a registration accept message, or in a CUC (Configuration Update Command) message.
[00208] Referring now to Figure 4, there is illustrated a method of a UE in accordance with various examples of the present disclosure. It will be appreciated that the method may be performed by a UE such as illustrated in Fig. 2. It will also be appreciated that examples of the method of Fig. 4 may interrelate with examples of the method of Fig. 3.
[00209] In step 410, while there is a pending NSSAI for a UE, the UE transmits, to a network entity, a request indicating at least one first S-NSSAI over a first access technology, wherein the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
[00210] If the pending NSSAI includes an indication of one or more S-NSSAI over the first access technology, which were indicated in a previous request transmitted by the UE, the request is a request for using at least one new network slice. That is, where the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI, and where the request is sent over the same access technology as a previous request which indicated one or more S-NSSAI indicated in the pending NSSAI, the request is considered to be a request to use new network slices.
[00211] Fig. 4 also shows a step 420 of receiving a response to the request from the network entity, however it will be appreciated that this step may be omitted for certain examples of the present disclosure. This step 420 may be useful for further examples in which the contents of said response are used by the UE. For example, the response may include (separately or altogether), a pending NSSAI, an additional pending NSSAI, an allowed NSSAI, an additional allowed NSSAI, and/or a rejected NSSAI.
[00212] The pending NSSAI and the additional pending NSSAI may include an indication of one or more of the first S-NSSAI which are subject to NSSAA. The UE may use this to update the pending NSSAI at the UE to include the indication.
[00213] The allowed NSSAI may include an indication of any S-NSSAI previously allowed for the UE and an indication of any of the first S-NSSAI which are allowed for the UE, while the additional allowed NSSAI may include the indication of any of the first S-NSSAI which are allowed for the UE.
[00214] The rejected NSSAI may include an indication of any of the first S-NSSAI which are not allowed for the UE or which are not available in the current registration area of the UE.
[00215] Referring now to Figure 5, there is illustrated a method of a network entity in accordance with various examples of the present disclosure. It will be appreciated that the method may be performed by a network entity such as illustrated in Fig. 1. For example, the network entity may be an AMF.
[00216] In step 510, while there is a pending NSSAI for a UE, the network entity receives, from the UE, a request indicating at least one S-NSSAI.
[00217] In step 520, the network entity determines whether the request is for using at least one additional network slice.
[00218] In certain examples, this determination is performed based on the request. For example, if the request is, or includes, a requested NSSAI (e.g., a requested NSSAI 1E), then the network entity is configured to consider the request to be for using additional network slice(s). As another example, if the request is, or includes, an additional requested NSSAI (e.g., a requested additional NSSAI 1E), then the network entity is configured to consider the request to be for using additional network slice(s).
[00219] In certain examples, the UE may transmit an indication, either in the request or separately, that the request indicating the at least one first S-NSSAI is a request for using at least one additional network slices. When receiving such an indication, the network entity may be configured to assume that the request is for using (for example, registering to) at least one additional network slice. The indication maybe received in addition to a requested NSSAI or an additional requested NSSAI.
[00220] In certain examples, as a result of the request being for requesting use of at least one additional slice, the network entity may not remove any S-NSSAI (for which NSSAA is still ongoing or pending) from the pending NSSAI. The network entity may, however, add, to the pending NSSAI, an indication of any of the requested first S-NSSAI which are subject to NSSAA. In certain examples, the network entity may then transmit this pending NSSAI to the UE, or may include this indication in an additional pending NSSAI and send this additional pending NSSAI to the UE.
[00221] In certain examples, the network entity may also determine if any of the first SNSSAI are allowed for the UE. The network entity may include any allowed first S-NSSAI in an allowed NSSAI (or in an additional allowed NSSAI) and transmit this to the UE. In certain examples, the network entity may determine if any of the first S-NSSAI are rejected for the UE (for example, for one or more of the reasons for rejection as are discussed throughout the present disclosure). The network entity may include any rejected first SNSSAI in a rejected NSSAI, and transmit this to the UE.
[00222] Referring now to Figure 6, there is illustrated a method of a UE in accordance with various examples of the present disclosure. It will be appreciated that the method may be performed by a UE such as illustrated in Fig. 2. It will also be appreciated that examples of the method of Fig. 6 may interrelate with examples of the method of Fig. 5.
[00223] In step 610, while there is a pending NSSAI for a UE, the UE transmits, to a network entity, a first request for using at least one additional network slice, the first request indicating at least one S-NSSAI; or the UE transmits, to the network entity, a second request for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over a different access technology. For example, the second request may be a (new) bit, as discussed above for Option 1 of Solution 1 b.
[00224] It will be appreciated that, in certain examples, this may be achieved by request being, or including, a requested NSSAI (e.g., a requested NSSAI 1E), then the network entity is configured to consider the request to be for using additional network slice(s). As another example, if the request is, or includes, an additional requested NSSAI (e.g., a requested additional NSSAI 1E), then the network entity is configured to consider the request to be for using additional network slice(s). Furthermore, in certain examples, the UE may transmit an indication, either in the request or separately, that the request indicating the at least one first S-NSSAI is a request for using at least one additional network slices. When receiving such an indication, the network entity may be configured to assume that the request is for using (for example, registering to) at least one additional network slice. The indication maybe transmitted in addition to a requested NSSAI or an additional requested NSSAI.
[00225] Fig. 6 also shows a step 620 of receiving a response to the request from the network entity, however it will be appreciated that this step may be omitted for certain examples of the present disclosure. This step 620 may be useful for further examples in which the contents of said response are used. For example, the response may include (separately or altogether), a pending NSSAI, an additional pending NSSAI, an allowed NSSAI, an additional allowed NSSAI, and/or a rejected NSSAI. These, and their usage, is discussed above in relation to the method of Fig. 5.
[00226] Referring now to Fig. 7, there is illustrated another method in accordance with
various examples of the present disclosure.
[00227] The method of Fig. 7 may, in certain examples, be performed by a network entity such as that illustrated in Fig. 1. For example, the network entity may be an AMF.
[00228] In certain examples, Fig. 7 begins with the network entity being in a state in which it is to determine whether access to a network slice is allowed for a UE. In certain examples, this may follow the receiving of a request to use said network slice from the UE, or it may be the case that said network slice is marked as default in the subscription of the UE. Following this, the network entity is configured to perform one or two procedures. It will be appreciated that the present disclosure includes a network entity configured to perform only one of these procedures and a network entity configured to perform both (and, for example, configured to switch between either procedure at will or in response to some factor or condition).
[00229] In step 710, the network entity determines/identifies whether a S-NSSAI is available or allowed for a UE based on a registration area (RA) of the UE. In certain examples, the determination may include checking whether the S-NSSAI is available or allowed in the current registration area of the UE.
[00230] In certain examples, (not shown in Fig. 7), if the S-NSSAI is available or allowed for the UE, then the network entity may proceed as described in [3]. For example, the network entity may check whether the S-NSSAI is subject to NSSAA and, depending on the outcome of this, include the S-NSSAI in a pending NSSIA, in an allowed NSSAI or in a rejected NSSAI.
[00231] However, in step 720, if the S-NSSAI is determined to not be available or to not be allowed for the UE based on the RA of the UE, the network entity includes the S-NSSAI in a rejected NSSAI without performing NSSAA for the S-NSSAI;. In certain examples, the network entity may indicate, as the reason for rejection, that the S-NSSAI is not available in the RA of the UE. That is, the network entity may configure an indication showing the cause for rejection being that the S-NSSAI is not available in the current RA of the UE.
[00232] In step 730, as an alternative to step 710, the network entity may perform NSSAA for the S-NSAI.
[00233] In step 740, the network entity then determines whether the S-NSSAI is available or allowed for the UE based on the RA of the UE. It will be appreciated that this may be carried out regardless of the outcome of the NSSAA, in certain examples.
[00234] In step 750, if it is determined that the S-NSSAI is not available or not allowed for the UE based on the RA of the UE, the S-NSSAI is included in a rejected NSSAI. For example, if the S-NSSAI is not available in the RA of the UE, the S-NSSAI may be included in the rejected NSSAI. In certain examples, the network entity may also indicate, as the reason for rejection, that the S-NSSAI is not available in the RA of the UE. That is, the network entity may configure an indication showing the cause for rejection being that the S-NSSAI is not available in the current RA of the UE [00235] In certain examples (not shown in Fig. 7), the network entity, for either alternative, may then transmit the rejected NSSAI to the UE and/or transmit the reason for rejection (or the indication thereof) to the UE.
[00236] The techniques described herein may be implemented using any suitably configured apparatus and/or system. Such an apparatus and/or system may be configured to perform a method according to any aspect, embodiment, example or claim disclosed herein. Such an apparatus may comprise one or more elements, for example one or more of receivers, transmitters, transceivers, processors, controllers, modules, units, and the like, each element configured to perform one or more corresponding processes, operations and/or method steps for implementing the techniques described herein. For example, an operation/function of X may be performed by a module configured to perform X (or an X-module). The one or more elements may be implemented in the form of hardware, software, or any combination of hardware and software.
[00237] It will be appreciated that examples of the present disclosure may be implemented in the form of hardware, software or any combination of hardware and software. Any such software may be stored in the form of volatile or non-volatile storage, for example a storage device like a ROM, whether erasable or rewritable or not, or in the form of memory such as, for example, RAM, memory chips, device or integrated circuits or on an optically or magnetically readable medium such as, for example, a CD, DVD, magnetic disk or magnetic tape or the like.
[00238] It will be appreciated that the storage devices and storage media are embodiments of machine-readable storage that are suitable for storing a program or programs comprising instructions that, when executed, implement certain examples of the present disclosure. Accordingly, certain example provide a program comprising code for implementing a method, apparatus or system according to any example, embodiment, aspect and/or claim disclosed herein, and/or a machine-readable storage storing such a program. Still further, such programs may be conveyed electronically via any medium, for example a communication signal carried over a wired or wireless connection.
[00239] While the invention has been shown and described with reference to certain examples, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the scope of the invention, as defined by the appended claims.
[00240] Annex It will also be appreciated that certain examples, aspects and embodiments of the disclosure provide subject matter in accordance with the following numbered paragraphs: Paragraph 1. A method of a network entity, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving, from the UE, a request indicating at least one first single NSSAI (S-NSSAI) over a first access technology; if the pending NSSAI includes an indication of one or more S-NSSAI over the first access technology which were indicated in a previous request received from the UE: determining the request is for using at least one new network slice, and removing, from the pending NSSAI, the indication of the one or more SNSSAI; wherein the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
Paragraph 2. The method of Paragraph 1, further comprising: determining whether one or more of the at least one first S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA); and if so, adding an indication of the one or more of the at least one first S-NSSAI to the pending NSSAI.
Paragraph 3. The method of Paragraph 2, further comprising: transmitting the pending NSSAI including the indication of the one or more of the at least one first S-NSSAI to the UE; or transmitting an additional pending NSSAI including the indication of the one or more of the at least one first S-NSSAI to the UE.
Paragraph 4. The method of any previous Paragraph, wherein the pending NSSAI includes an indication of at least one second S-NSSAI over a second access technology, different to the first access technology, which were indicated in a previous request received from the UE.
Paragraph 5. The method of Paragraph 4, further comprising: maintaining, in the pending NSSAI, the indication of the at least one second S-
NSSAI
Paragraph 6. The method of any previous Paragraph, further comprising one or more of: transmitting an allowed NSSAI to the UE, the allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one first S-NSSAI determined to be allowed for the UE, or transmitting an additional allowed NSSAI to the UE, the additional allowed NSSAI including the information on the one or more of the at least one first S-NSSAI determined to be allowed for the UE; and if it is determined that one or more of the at least one first S-NSSAI are not allowed for the UE or are not available in a current registration area (RA) of the UE, transmitting, to the UE, a rejected NSSAI including an indication of the one or more of the at least one first S-NSSAI which are not allowed for the UE or which are not available in the current RA of the UE.
Paragraph 7. The method of any previous Paragraph, wherein, for each S-NSSAI indicated in the pending NSSAI, the network entity stores a record of the access technology over which use of said S-NSSAI was requested.
Paragraph 8. A method of a user equipment (UE), the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), transmitting, to a network entity, a request indicating at least one first single NSSAI (S-NSSAI) over a first access technology; wherein the request is a request for using at least one new network slice if the pending NSSAI includes an indication of one or more S-NSSAI over the first access technology which were indicated in a previous request transmitted by the UE; and wherein the at least one first S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
Paragraph 9. The method of Paragraph 8, further comprising: receiving, from the network entity, a response to the request.
Paragraph 10. The method of Paragraph 9, wherein, if the request is the request for using at least one new network slice, the method further comprises: removing, from the pending NSSAI, the indication of the one or more S-NSSAI, based on the response.
Paragraph 11. The method of Paragraph 9 or Paragraph 10, further comprising: based on the received response, modifying the pending NSSAI to include an indication of one or more of the at least one first S-NSSAI which are subject to network slice-specific authentication and authorization (NSSAA).
Paragraph 12. The method of Paragraph 11, wherein: the received response includes a pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA; or the received response includes an additional pending NSSAI including the indication of one or more of the at least one first S-NSSAI which are subject to NSSAA.
Paragraph 13. The method of any of Paragraphs 9 to 12, wherein the response includes at least one of: an allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one first S-NSSAI allowed for the UE, or an additional allowed NSSAI including the information on the one or more of the at least one first S-NSSAI allowed for the UE; and a rejected NSSAI including an indication of one or more of the at least one first SNSSAI which are not allowed for the UE or which are not available in a current registration area of the UE.
Paragraph 14. The method of any of Paragraphs 8 to 13, wherein the pending NSSAI includes an indication of at least one second S-NSSAI over a second access technology different to the first access technology which were indicated in a previous request transmitted to the network entity from the UE.
Paragraph 15. The method of Paragraph 14, further comprising: in response to the received response, maintaining, in the pending NSSAI, an indication of any of the at least one second S-NSSAI for which NSSAA is not completed.
Paragraph 16. A method of a network entity, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving, from the UE, a request indicating at least one single NSSAI (S-NSSAI); and determining whether the request is for using at least one additional network slice.
Paragraph 17. The method of Paragraph 16, wherein it is determined that the request is for using at least one additional network slice if: the request includes a requested NSSAI; the request includes an additional requested NSSAI; or the network entity receives, from the UE, an indication that the request is for using at least one additional network slice Paragraph 18. The method of Paragraph 16, wherein the request is for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.
Paragraph 19. The method of any of Paragraphs 16 to 18, wherein the at least one S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
Paragraph 20. The method of any of Paragraphs 16 to 19, further comprising: determining whether one or more of the at least one S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA); and if so, adding an indication of the one or more of the at least one S-NSSAI to the pending NSSAI.
Paragraph 21. The method of Paragraph 20, further comprising: transmitting the pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE; or transmitting an additional pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE.
Paragraph 22. The method of any of Paragraphs 16 to 21, further comprising one or more of: transmitting an allowed NSSAI to the UE, the allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI determined to be allowed for the UE, or transmitting an additional allowed NSSAI to the UE, the additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI determined to be allowed for the UE; and if it is determined that one or more of the at least one S-NSSAI are not allowed for the UE or are not available in a current registration area (RA) of the UE, transmitting, to the UE, a rejected NSSAI including an indication of the one or more of the at least one S-NSSAI which are not allowed for the UE or which are not available in the current RA of the UE.
Paragraph 23. The method of any of Paragraphs 16 to 22 wherein, if the request is for using at least one additional network slice, the method further comprises: processing the request without removing an indication of an S-NSSAI from the pending NSSAI.
Paragraph 24. A method of a user equipment (UE), the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), transmitting, to a network entity, a first request for using at least one additional network slice, the first request indicating at least one single NSSAI (S-NSSAI); or while there is the pending NSSAI for the UE, transmitting, to the network entity, a second request for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.
Paragraph 25. The method of Paragraph 24, wherein use of the at least one additional network slice is requested in addition to use of one or more network slices corresponding to one or more S-NSSAI indicated in the pending NSSAI.
Paragraph 26. The method of Paragraph 24 or Paragraph 25, wherein at least one of: the first request is a requested NSSAI, or an additional requested NSSAI; and the UE transmits, to the network entity, an indication that the first request is for using at least one additional network slice.
Paragraph 27. The method of any of Paragraphs 24 to 26, further comprising: receiving, from the network entity, a response to the first request.
Paragraph 28. The method of Paragraph 27, further comprising: based on the received response, modifying the pending NSSAI to include an indication of one or more of the at least one S-NSSAI which are subject to network slice-specific authentication and authorization (NSSAA).
Paragraph 29. The method of Paragraph 28, wherein: the received response includes a pending NSSAI including the indication of one or more of the at least one S-NSSAI which are subject to NSSAA; or the received response includes an additional pending NSSAI including the indication of one or more of the at least one S-NSSAI which are subject to NSSAA.
Paragraph 30. The method of any of Paragraphs 27 to 29, further comprising: in response to the received response, maintaining, in the pending NSSAI, an indication of any S-NSSAI corresponding to a previously requested network slice for which NSSAA is not completed.
Paragraph 31. The method of any of Paragraphs 27 to 30, wherein the response comprises at least one of: an allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI allowed for the UE, or an additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI allowed for the UE; and a rejected NSSAI including an indication of one or more of the at least one SNSSAI which are not allowed for the UE or which are not available in a current registration area of the UE.
Paragraph 32. A method of a network entity, the method comprising either: determining whether a single network slice selection assistance information (SNSSAI) is available or allowed for a user equipment (UE) based on a registration area (RA) of the UE, and if not, including the S-NSSAI in a rejected NSSAI without performing network slice-specific authentication and authorization (NSSAA) for the S-NSSAI; or performing NSSAA for the S-NSSAI, after performing NSSAA, determining whether the S-NSSAI is available or allowed for the UE based on the RA of the UE, and if not, including the S-NSSAI in the rejected NSSAI.
Paragraph 33. The method of Paragraph 32, wherein the S-NSSAI is indicated in a request for use of a network slice received from the UE, or the S-NSSAI is marked as default in a subscription of the UE.
Paragraph 34. The method of Paragraph 32 or Paragraph 33, wherein it is determined that the S-NSSAI is not available or not allowed for the UE if the S-NSSAI is not available in the RA over a specific access technology.
Paragraph 35. The method of any of Paragraphs 32 to 34, further comprising: setting an indication that the reason for rejection is based on the RA.
Paragraph 36. The method of Paragraph 35, further comprising: transmitting, to the UE, the rejected NSSAI and the indication.
Paragraph 37. A network entity or UE configured to operate according to a method of any preceding Paragraph.
Paragraph 38. A network comprising a network entity and/or a UE according to Paragraph 37.
Paragraph 39. A computer program comprising instructions which, when the program is executed by a computer or processor, cause the computer or processor to carry out a method according to any of Paragraphs 1 to 36.
Paragraph 40. A computer or processor-readable data carrier having stored thereon a computer program according to Paragraph 39.

Claims (20)

  1. CLAIMS1. A method of a network entity, the method comprising: while there is a pending network slice selection assistance information (NSSAI) for a user equipment (UE), receiving, from the UE, a request indicating at least one single NSSAI (S-NSSAI); and determining whether the request is for using at least one additional network slice.
  2. 2. The method of claim 1, wherein it is determined that the request is for using at least one additional network slice if: the request includes a requested NSSAI; the request includes an additional requested NSSAI; or the network entity receives, from the UE, an indication that the request is for using at least one additional network slice.
  3. 3. The method of claim 1, wherein the request is for using at least one network slice Cr) corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.
  4. 4. The method of any of claims 1 to 2, wherein the at least one S-NSSAI are different to any S-NSSAI indicated in the pending NSSAI.
  5. 5. The method of any of claim 1 to 4, further comprising: determining whether one or more of the at least one S-NSSAI are subject to network slice-specific authentication and authorization (NSSAA); and if so, adding an indication of the one or more of the at least one S-NSSAI to the pending NSSAI.
  6. 6. The method of claim 5, further comprising: transmitting the pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE; or transmitting an additional pending NSSAI including the indication of the one or more of the at least one S-NSSAI to the UE.
  7. 7. The method of any of claims 1 to 6, further comprising one or more of: transmitting an allowed NSSAI to the UE, the allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI determined to be allowed for the UE, or transmitting an additional allowed NSSAI to the UE, the additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI determined to be allowed for the UE; and if it is determined that one or more of the at least one S-NSSAI are not allowed for the UE or are not available in a current registration area (RA) of the UE, transmitting, to the UE, a rejected NSSAI including an indication of the one or more of the at least one SNSSAI which are not allowed for the UE or which are not available in the current RA of the UE.
  8. 8. The method of any of claims 1 to 7 wherein, if the request is for using at least one additional network slice, the method further comprises: processing the request without removing an indication of an S-NSSAI from the pending NSSAI.
  9. 9. A method of a user equipment (UE), the method comprising: while there is a pending network slice selection assistance information (NSSAI) for Cr) a user equipment (UE), transmitting, to a network entity, a first request for using at least one additional network slice, the first request indicating at least one single NSSAI (SNSSAI); or while there is the pending NSSAI for the UE, transmitting, to the network entity, a second request for using at least one network slice corresponding to an S-NSSAI indicated in the pending NSSAI over the same or a different access technology.
  10. 10. The method of claim 9, wherein use of the at least one additional network slice is requested in addition to use of one or more network slices corresponding to one or more S-NSSAI indicated in the pending NSSAI.
  11. 11. The method of claims 9 or claim 10, wherein at least one of: the first request is a requested NSSAI, or an additional requested NSSAI; and the UE transmits, to the network entity, an indication that the first request is for using at least one additional network slice.
  12. 12. The method of any of claims 9 to 11, further comprising: receiving, from the network entity, a response to the first request.
  13. 13. The method of claim 12, further comprising: based on the received response, modifying the pending NSSAI to include an indication of one or more of the at least one S-NSSAI which are subject to network slice-specific authentication and authorization (NSSAA).
  14. 14. The method of claim 13, wherein: the received response includes a pending NSSAI including the indication of one or more of the at least one S-NSSAI which are subject to NSSAA; or the received response includes an additional pending NSSAI including the indication of one or more of the at least one S-NSSAI which are subject to NSSAA.
  15. 15. The method of any of claims 12 to 14, further comprising: in response to the received response, maintaining, in the pending NSSAI, an indication of any S-NSSAI corresponding to a previously requested network slice for which NSSAA is not completed.
  16. Cr) of: an allowed NSSAI including information on S-NSSAI previously allowed for the UE and information on one or more of the at least one S-NSSAI allowed for the UE, or an additional allowed NSSAI including the information on the one or more of the at least one S-NSSAI allowed for the UE; and a rejected NSSAI including an indication of one or more of the at least one SNSSAI which are not allowed for the UE or which are not available in a current registration area of the UE.
  17. 17. A network entity or UE configured to operate according to a method of any preceding claim.
  18. 18. A network comprising a network entity and/or a UE according to claim 17.
  19. 19. A computer program comprising instructions which, when the program is executed by a computer or processor, cause the computer or processor to carry out a method according to any of claims 1 to 16.16. The method of any of claims 12 to 15, wherein the response comprises at least one
  20. 20. A computer or processor-readable data carrier having stored thereon a computer program according to claim 19.
GB2218324.8A 2020-07-22 2020-07-22 Network Slice Registration Pending GB2612708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2218324.8A GB2612708A (en) 2020-07-22 2020-07-22 Network Slice Registration

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB2218324.8A GB2612708A (en) 2020-07-22 2020-07-22 Network Slice Registration
GB2011364.3A GB2597915B (en) 2020-07-22 2020-07-22 Network slice registration

Publications (2)

Publication Number Publication Date
GB202218324D0 GB202218324D0 (en) 2023-01-18
GB2612708A true GB2612708A (en) 2023-05-10

Family

ID=85986975

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2218324.8A Pending GB2612708A (en) 2020-07-22 2020-07-22 Network Slice Registration

Country Status (1)

Country Link
GB (1) GB2612708A (en)

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
3GPP Draft C1-202250 (Ericsson) Request S-NSSAI pending the NW slice-specific authentication and authorization (09.04.2020) https://www.3gpp.org/ftp/tsg_ct/WG1_mm-cc-sm_ex-CN1/TSGC1_123e/Docs/C1-202250.zip *
3GPP Draft C1-202473 (Huawei, HiSilicon, China Telecom) Discussion on including pending S-NSSAI(s) in the requested NSSAI (09.04.2020) https://www.3gpp.org/ftp/tsg_ct/WG1_mm-cc-sm_ex-CN1/TSGC1_123e/Docs/C1-202473.zip *
3GPP Draft C1-202474 (CT1) LS on handling pending NSSAI during ongoing NSSAA (09.04.2020) https://www.3gpp.org/ftp/tsg_ct/WG1_mm-cc-sm_ex-CN1/TSGC1_123e/Docs/C1-202474.zip *
3GPP Draft C1-203965 (Samsung, Huawei, HiSilicon, Interdigital) Storage of pending NSSAI (08.06.2020) https://www.3gpp.org/ftp/tsg_ct/WG1_mm-cc-sm_ex-CN1/TSGC1_124e/docs/C1-203965.zip *
3GPP Draft Meeting Report for TSG CT WG1 meeting 122e C1-202006 (09.04.2020) https://www.3gpp.org/ftp/tsg_ct/WG1_mm-cc-sm_ex-CN1/TSGC1_123e/Docs/C1-202006.zip *

Also Published As

Publication number Publication date
GB202218324D0 (en) 2023-01-18

Similar Documents

Publication Publication Date Title
EP2986046A2 (en) Method, system, and apparatus for preventing bidding down attacks during motion of user equipment
US8185936B1 (en) Automatic device-profile updates based on authentication failures
US20200100111A1 (en) Connection establishment method, device, and system
CN104244227A (en) Terminal access authentication method and device in internet of things system
US20210400482A1 (en) Authentication Result Update Method and Communications Apparatus
US9426043B2 (en) Method for registering and providing notice of a trap event, and terminal using same
WO2020221175A1 (en) Registration method and apparatus
GB2593147A (en) Slice-specific authentication and authorization
EP3247080B1 (en) Certificate management method, device and system
GB2595751A (en) Slice specific authentication and authorization
GB2593713A (en) Network slice-specific authentication and authorization
GB2593436A (en) Slice-specific authentication and authorization
EP2115626B1 (en) Method for re-enabling a disabled capability of a terminal and a device management system for the same
GB2612708A (en) Network Slice Registration
GB2610352A (en) Network slice registration
GB2597915A (en) Network slice registration
CN113286300B (en) Block chain-based network fragment authentication method, system, network element and storage medium
JP7254166B2 (en) Apparatus, methods, computer programs, and computer program products supporting mutually exclusive access to network slices
EP4207676A1 (en) Method and apparatus for establishing secure communication
JP2023527338A (en) Network slice-specific authentication and authorization
CN111464324A (en) Secure communication method, device and system
CN111465019B (en) Capability reporting and key negotiation methods and devices, terminal, communication equipment and system
US20230396655A1 (en) Efficient authentication information exchange between nodes in a 5g compliant network
CN108419229B (en) Access method and device
CN117641301A (en) Passive Internet of things tag management method and device, electronic equipment and storage medium