WO2023187653A1 - Configuring localized services - Google Patents

Configuring localized services Download PDF

Info

Publication number
WO2023187653A1
WO2023187653A1 PCT/IB2023/053090 IB2023053090W WO2023187653A1 WO 2023187653 A1 WO2023187653 A1 WO 2023187653A1 IB 2023053090 W IB2023053090 W IB 2023053090W WO 2023187653 A1 WO2023187653 A1 WO 2023187653A1
Authority
WO
WIPO (PCT)
Prior art keywords
localized
message
services
configuration information
access
Prior art date
Application number
PCT/IB2023/053090
Other languages
French (fr)
Inventor
Hyung-Nam Choi
Joachim Löhr
Prateek Basu Mallick
Genadi Velev
Original Assignee
Lenovo (Singapore) Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo (Singapore) Pte. Ltd. filed Critical Lenovo (Singapore) Pte. Ltd.
Publication of WO2023187653A1 publication Critical patent/WO2023187653A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/12Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Definitions

  • the subject matter disclosed herein relates generally to wireless communications and more particularly relates to configuring localized services.
  • a hosting network may not properly limit the access of user equipments (“UEs”) to the localized services.
  • UEs user equipments
  • One embodiment of a method includes transmitting, from a communication network device, a first message to a communication device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the method includes transmitting a second message to the communication device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the method includes receiving a third message from the communication device.
  • the third message includes a service request for a localized service of the localized services.
  • One apparatus for configuring localized services includes a communication network device.
  • the apparatus includes a transmitter that: transmits a first message to a communication device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the apparatus includes a receiver that receives a third message from the communication device.
  • the third message includes a service request for a localized service of the localized services.
  • Another embodiment of a method for configuring localized services includes receiving, at a communication device, a first message from a communication network device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the method includes receiving a second message from the communication network device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the method includes determining whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message.
  • the method includes transmitting a third message to the communication network device.
  • the third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
  • Another apparatus for configuring localized services includes a communication device .
  • the apparatus includes a receiver that: receives a first message from a communication network device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the apparatus includes a processor that determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message.
  • the apparatus includes a transmitter that transmits a third message to the communication network device.
  • the third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
  • Figure 1 is a schematic block diagram illustrating one embodiment of a wireless communication system for configuring localized services
  • Figure 2 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for configuring localized services
  • Figure 3 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for configuring localized services
  • Figure 4 is a schematic block diagram illustrating one embodiment of a system for connectivity between a hosting network, home networks, and service providers;
  • Figure 5 is a schematic block diagram illustrating one embodiment of a system for cell deployment of a hosting network
  • FIG. 6 is a schematic block diagram illustrating one embodiment of a system for a message flow for performing a unified access control (“UAC”) barring check;
  • UAC unified access control
  • Figure 7 is a block diagram illustrating one embodiment of an an abstract syntax notation 1 (“ASN. l”) structure of an UAC-BarringlnfoSet information element (“IE”);
  • ASN. l an abstract syntax notation 1
  • IE UAC-BarringlnfoSet information element
  • Figure 8 is a schematic block diagram illustrating one embodiment of a system for a UAC barring check
  • Figure 9 is a diagram illustrating one embodiment of a correspondence of special Al-to-service mapping bitmap to uac-BarringForAccessIdentityAndLocalizedServices bitmap;
  • Figure 10 is a flow chart diagram illustrating one embodiment of a method for configuring localized services.
  • Figure 11 is a flow chart diagram illustrating another embodiment of a method for configuring localized services.
  • embodiments may be embodied as a system, apparatus, method, or program product. Accordingly, embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments may take the form of a program product embodied in one or more computer readable storage devices storing machine readable code, computer readable code, and/or program code, referred hereafter as code. The storage devices may be tangible, non-transitory, and/or non-transmission. The storage devices may not embody signals. In a certain embodiment, the storage devices only employ signals for accessing code.
  • modules may be implemented as a hardware circuit comprising custom very-large-scale integration (“VLSI”) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components.
  • VLSI very-large-scale integration
  • a module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
  • Modules may also be implemented in code and/or software for execution by various types of processors.
  • An identified module of code may, for instance, include one or more physical or logical blocks of executable code which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may include disparate instructions stored in different locations which, when joined logically together, include the module and achieve the stated purpose for the module.
  • a module of code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices.
  • operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different computer readable storage devices.
  • the software portions are stored on one or more computer readable storage devices.
  • the computer readable medium may be a computer readable storage medium.
  • the computer readable storage medium may be a storage device storing the code.
  • the storage device may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, holographic, micromechanical, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a storage device More specific examples (a non-exhaustive list) of the storage device would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (“RAM”), a read-only memory (“ROM”), an erasable programmable read-only memory (“EPROM” or Flash memory), a portable compact disc readonly memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Code for carrying out operations for embodiments may be any number of lines and may be written in any combination of one or more programming languages including an object oriented programming language such as Python, Ruby, Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the "C" programming language, or the like, and/or machine languages such as assembly languages.
  • the code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (“LAN”) or a wide area network (“WAN”), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider an Internet Service Provider
  • the code may also be stored in a storage device that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the storage device produce an article of manufacture including instructions which implement the function/act specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
  • the code may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the code which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the schematic flowchart diagrams and/or schematic block diagrams may represent a module, segment, or portion of code, which includes one or more executable instructions of the code for implementing the specified logical function(s).
  • Figure 1 depicts an embodiment of a wireless communication system 100 for configuring localized services.
  • the wireless communication system 100 includes remote units 102 and network units 104. Even though a specific number of remote units 102 and network units 104 are depicted in Figure 1, one of skill in the art will recognize that any number of remote units 102 and network units 104 may be included in the wireless communication system 100.
  • the remote units 102 may include computing devices, such as desktop computers, laptop computers, personal digital assistants (“PDAs”), tablet computers, smart phones, smart televisions (e.g., televisions connected to the Internet), set-top boxes, game consoles, security systems (including security cameras), vehicle on-board computers, network devices (e.g., routers, switches, modems), aerial vehicles, drones, or the like.
  • the remote units 102 include wearable devices, such as smart watches, fitness bands, optical head-mounted displays, or the like.
  • the remote units 102 may be referred to as subscriber units, mobiles, mobile stations, users, terminals, mobile terminals, fixed terminals, subscriber stations, UE, user terminals, a device, or by other terminology used in the art.
  • the remote units 102 may communicate directly with one or more of the network units 104 via uplink (“UL”) communication signals. In certain embodiments, the remote units 102 may communicate directly with other remote units 102 via sidelink communication.
  • UL uplink
  • the network units 104 may be distributed over a geographic region.
  • a network unit 104 may also be referred to and/or may include one or more of an access point, an access terminal, a base, a base station, a location server, a core network (“CN”), a radio network entity, a Node-B, an evolved node-B (“eNB”), a 5G node-B (“gNB”), a Home Node-B, a relay node, a device, a core network, an aerial server, a radio access node, an access point (“AP”), new radio (“NR”), a network entity, an access and mobility management function (“AMF”), a unified data management (“UDM”), a unified data repository (“UDR”), a UDM/UDR, a policy control function (“PCF”), a radio access network (“RAN”), a network slice selection function (“NSSF”), an operations, administration, and management (“0AM”), a session management function (“SMF”)
  • RAN radio access
  • the network units 104 are generally part of a radio access network that includes one or more controllers communicably coupled to one or more corresponding network units 104.
  • the radio access network is generally communicably coupled to one or more core networks, which may be coupled to other networks, like the Internet and public switched telephone networks, among other networks. These and other elements of radio access and core networks are not illustrated but are well known generally by those having ordinary skill in the art.
  • the wireless communication system 100 is compliant with NR protocols standardized in 3GPP, wherein the network unit 104 transmits using an orthogonal frequency division multiplexing (“OFDM”) modulation scheme on the downlink (“DL”) and the remote units 102 transmit on the UL using a single-carrier frequency division multiple access (“SC-FDMA”) scheme or an OFDM scheme. More generally, however, the wireless communication system 100 may implement some other open or proprietary communication protocol, for example, WiMAX, institute of electrical and electronics engineers (“IEEE”) 802.
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • UMTS universal mobile telecommunications system
  • LTE long term evolution
  • CDMA2000 code division multiple access 2000
  • Bluetooth® ZigBee
  • Sigfox among other protocols.
  • the present disclosure is not intended to be limited to the implementation of any particular wireless communication system architecture or protocol.
  • the network units 104 may serve a number of remote units 102 within a serving area, for example, a cell or a cell sector via a wireless communication link.
  • the network units 104 transmit DL communication signals to serve the remote units 102 in the time, frequency, and/or spatial domain.
  • a remote unit 102 may receive, at a communication device, a first message from a communication network device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the remote unit 102 may receive a second message from the communication network device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the remote unit 102 may determine whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message.
  • the remote unit 102 may transmit a third message to the communication network device.
  • the third message includes a service request for the localized service in response to the access attempt for the localized service being allowed. Accordingly, the remote unit 102 may be used for configuring localized services.
  • a network unit 104 may transmit, from a communication network device, a first message to a communication device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the network unit 104 may transmit a second message to the communication device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the network unit 104 may receive a third message from the communication device.
  • the third message includes a service request for a localized service of the localized services. Accordingly, the network unit 104 may be used for configuring localized services.
  • Figure 2 depicts one embodiment of an apparatus 200 that may be used for configuring localized services.
  • the apparatus 200 includes one embodiment of the remote unit 102.
  • the remote unit 102 may include a processor 202, a memory 204, an input device 206, a display 208, a transmitter 210, and a receiver 212.
  • the input device 206 and the display 208 are combined into a single device, such as a touchscreen.
  • the remote unit 102 may not include any input device 206 and/or display 208.
  • the remote unit 102 may include one or more of the processor 202, the memory 204, the transmitter 210, and the receiver 212, and may not include the input device 206 and/or the display 208.
  • the processor 202 may include any known controller capable of executing computer-readable instructions and/or capable of performing logical operations.
  • the processor 202 may be a microcontroller, a microprocessor, a central processing unit (“CPU”), a graphics processing unit (“GPU”), an auxiliary processing unit, a field programmable gate array (“FPGA”), or similar programmable controller.
  • the processor 202 executes instructions stored in the memory 204 to perform the methods and routines described herein.
  • the processor 202 is communicatively coupled to the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212.
  • the memory 204 in one embodiment, is a computer readable storage medium.
  • the memory 204 includes volatile computer storage media.
  • the memory 204 may include a RAM, including dynamic RAM (“DRAM”), synchronous dynamic RAM (“SDRAM”), and/or static RAM (“SRAM”).
  • the memory 204 includes non-volatile computer storage media.
  • the memory 204 may include a hard disk drive, a flash memory, or any other suitable non-volatile computer storage device.
  • the memory 204 includes both volatile and non-volatile computer storage media.
  • the memory 204 also stores program code and related data, such as an operating system or other controller algorithms operating on the remote unit 102.
  • the input device 206 may include any known computer input device including a touch panel, a button, a keyboard, a stylus, a microphone, or the like.
  • the input device 206 may be integrated with the display 208, for example, as a touchscreen or similar touch-sensitive display.
  • the input device 206 includes a touchscreen such that text may be input using a virtual keyboard displayed on the touchscreen and/or by handwriting on the touchscreen.
  • the input device 206 includes two or more different devices, such as a keyboard and a touch panel.
  • the display 208 may include any known electronically controllable display or display device.
  • the display 208 may be designed to output visual, audible, and/or haptic signals.
  • the display 208 includes an electronic display capable of outputting visual data to a user.
  • the display 208 may include, but is not limited to, a liquid crystal display (“LCD”), a light emitting diode (“LED”) display, an organic light emitting diode (“OLED”) display, a projector, or similar display device capable of outputting images, text, or the like to a user.
  • the display 208 may include a wearable display such as a smart watch, smart glasses, a heads-up display, or the like.
  • the display 208 may be a component of a smart phone, a personal digital assistant, a television, a table computer, a notebook (laptop) computer, a personal computer, a vehicle dashboard, or the like.
  • the display 208 includes one or more speakers for producing sound.
  • the display 208 may produce an audible alert or notification (e.g., a beep or chime).
  • the display 208 includes one or more haptic devices for producing vibrations, motion, or other haptic feedback.
  • all or portions of the display 208 may be integrated with the input device 206.
  • the input device 206 and display 208 may form a touchscreen or similar touch-sensitive display.
  • the display 208 may be located near the input device 206.
  • the receiver 212 receives a first message from a communication network device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the processor 202 determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message.
  • the transmitter 210 transmits a third message to the communication network device.
  • the third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
  • the remote unit 102 may have any suitable number of transmitters 210 and receivers 212.
  • the transmitter 210 and the receiver 212 may be any suitable type of transmitters and receivers.
  • the transmitter 210 and the receiver 212 may be part of a transceiver.
  • FIG. 3 depicts one embodiment of an apparatus 300 that may be used for configuring localized services.
  • the apparatus 300 includes one embodiment of the network unit 104.
  • the network unit 104 may include a processor 302, a memory 304, an input device 306, a display 308, a transmitter 310, and a receiver 312.
  • the processor 302, the memory 304, the input device 306, the display 308, the transmitter 310, and the receiver 312 may be substantially similar to the processor 202, the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212 of the remote unit 102, respectively.
  • the transmitter 310 transmits a first message to a communication device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the receiver 312 receives a third message from the communication device.
  • the third message includes a service request for a localized service of the localized services.
  • fifth generation (“5G”) networks provide access to localized services.
  • Such 5G networks may offer one or more localized services in addition to connectivity to non-localized services to public networks and non-public networks (“NPNs”).
  • the localized services may be provided within a certain time and geographic location, and a local 5G network acts as a hosting network offering access to such localized services.
  • a hosting network may be a public land mobile network (“PLMN”), NPN (e.g., standalone NPN (“SNPN”), or public network integrated (“PNI”) NPN (“PNI-NPN”)), and may also be available only temporarily in time and location.
  • PLMN public land mobile network
  • NPN e.g., standalone NPN (“SNPN”), or public network integrated (“PNI”) NPN (“PNI-NPN”
  • PLMN public land mobile network
  • NPN e.g., standalone NPN (“SNPN”)
  • PNI-NPN public network integrated NPN
  • FIG. 4 is a schematic block diagram illustrating one embodiment of a system 400 for connectivity between a hosting network, home networks, and service providers.
  • the system 400 includes a UE 402 (e.g., including a first application (App 1)), a hosting network (HtNW) 404, a home network (“NW”) #1 406, a home NW #2 408, and a 3 rd party service platform 410.
  • App 1 a first application
  • HtNW hosting network
  • NW home network
  • 3 rd party service platform 410 3 rd party service platform
  • the HtNW 404 of Figure 4 includes a radio access network (“RAN”) (e.g., providing 3GPP access and/or non-3GPP access) and a core network (“CN”) and provides connectivity to one or more public PLMNs or NPNs over a roaming interface denoted as “Ro-IF”
  • RAN radio access network
  • CN core network
  • VoIP-IF A provisioning interface is denoted as “PV-IF” and is used to provision or negotiate various localized service requirements, including a quality of service (“QoS”), an expected and/or maximum number of users, event information for discovery, network slicing, and/or required internet protocol (“IP”) connectivity and routing policies.
  • QoS quality of service
  • IP internet protocol
  • non-localized services such as voice service, data service and so forth transmitted towards one or more public PLMNs (e.g., home NW#1 406) or NPNs (e.g., home NW#2 408) - service level agreements exist between the HtNW 404 and the home networks - in other words, the nonlocalized services may be connectivity and/or communication services to a home network, whereas the HtNW 404 acts as a neutral host -
  • the term “home network” is used from the UE's perspective - the home network is the network to which the UE has subscribed to (e.g., the home network stores and manages the UE's subscription data) the UE's subscription permanent identifier (“SUPI”) and credentials
  • SUPI subscription permanent identifier
  • localized services which are provided only within a certain time and geographic location from a local server or from 3rd party service providers (e.g., 3rd party service platform 410).
  • Examples of localized services may include multimedia performances, video streaming, and/or cloud gaming.
  • one localized service may be application 1 (Appl) where the Appl client is installed in the UE and Appl server is deployed either locally in the HtNW 404 domain or in the 3rd party domain outside the HtNW 404 domain. It may be assumed that the access to such localized services is based on a temporary subscription of the user. That means the user becomes a temporary subscriber of the HtNW 404 to access the temporary localized services.
  • Examples of hosting networks may include a stadium, a concert hall, or a fairground where the coverage of the hosting networks is overlapping with the coverage of the home networks. In other examples the hosting networks may provide coverage in areas where there is no coverage provided by home networks. [0056] In certain embodiments, when a HtNW has been setup at a defined time and location, temporary subscribers of the HtNW or subscribers of the localized services will select and register to the network (e.g., by manual network selection) for accessing the localized services.
  • a radio resource control (“RRC”) connection may need to be established in access stratum (“AS”) between each UE (e.g., of a temporary subscriber or subscriber of a localized service) and the HtNW.
  • AS access stratum
  • the HtNW may control these accesses by broadcasting UAC barring information.
  • UAC barring mechanisms may be based on access identities (e.g., referring to a type of UE) and access categories (e.g., referring to a type of access attempts) and may not properly support access control of UEs to localized services.
  • a hosting network may include multiple cells where each cell may support only a set of localized services.
  • FIG. 5 is a schematic block diagram illustrating one embodiment of a system 500 for cell deployment of a hosting network.
  • the system 500 includes a cell 1 504, a cell 2 506, a cell 3 508, a cell 4 510, a cell 5 512, and a cell 6 514.
  • a hosting network has been setup in a fairground area and consists of 6 cells and provides 6 localized services with service ID#1 to service ID#6. Each cell supports only a subset of these localized services as described in Table 1. As result, it may not be possible for a hosting network to properly limit the access of UEs to localized services in the cells where they are supported.
  • a UAC barring mechanism is used to allow a hosting network to better control or limit access of UEs to localized services in its network coverage area.
  • Table 1 Example of availability of localized services in a hosting network
  • a service specific access control mechanism there may be a service specific access control mechanism.
  • there may be separate access barring parameters e.g., barring factor and/or time or bitmap
  • UAC barring mechanism is described as found herein.
  • a UAC barring mechanism may be used for which an operator can control access of UEs in its network to control load and avoid congestion.
  • the UAC is applicable to UEs in RRC IDLE, RRC INACTIVE, and RRC CONNECTED states, and is performed based on access identities (“Al”) and access categories (“AC”).
  • An access identity refers to the type of UE, whereas an access category refers to the type of access attempt (e.g., mobile originated (“MO”) signaling, MO data, multimedia telephony (“MMTEL”) voice and/or video, short message service (“SMS”), and so forth.
  • the UAC barring information is provided by a network in a first system information block (“SIB1”) for the AIs 0, 1, 2, 11 to 15, and up to 63 ACs (e.g., AC 0 is not subject to access barring).
  • SIB1 first system information block
  • a UE is configured with Al 0 per default (e.g., corresponds to a normal UE).
  • it can be configured with one or more of the special AIs 1, 2, 11 to 15 (e.g., see Table 2).
  • the special AIs 1, 2, 11 to 15 have special validity.
  • the AIs 11 to 15 correspond to the access classes 11 to 15, and are allocated to UEs as shown in Table 3.
  • Table 4 shows the ACs.
  • the UAC framework supports standardized ACs as well as operator-defined ACs using their own criterion (e.g., network slicing, application, and application server).
  • FIG. 6 is a schematic block diagram illustrating one embodiment of a system 600 for a message flow for performing a UAC barring check.
  • the system 600 includes a UE 602 and a gNB 604. Each of the communications in the system 600 may include one or more messages.
  • SIB1 (e.g., including uac -Barringinfo) is transmitted from the gNB 604 to the UE 602.
  • the UE 602 performs 608 a UAC barring check.
  • an RRC connection establishment is performed between the UE 602 and the gNB 604.
  • the UAC barring information is broadcast in a cell via the SIB1 and contains the following parameters: 1) uac-BarringForCommon: common access control parameters for each AC supported in the network; 2) uac-BarringPerPLMN-List: PLMN-specific access control parameters for each AC supported in the network; 3) uac-BarringlnfoSetList: a list of access control parameter sets given by IE UAC-BarringlnfoSet - an AC can be configured with access parameters according to one of the sets; and/or 4) uac-AccessCategoryl-SelectionAssistancelnfo: information used to determine whether AC1 applies to the UE.
  • the access control parameters given by a UAC-BarringlnfoSet IE refer to the parameters uac-BarringFactor, uac-BarringTime and the 7-bit bitmap uac- BarringForAccessIdentity.
  • the parameters uac-BarringFactor, uac-BarringTime apply for AI0 whereas the 7-bit bitmap uac-BarringForAccessIdentity applies for the special AIs 1, 2, 11 to 15.
  • Figure 7 is a block diagram illustrating one embodiment of an ASN. 1 structure 700 of the UAC- BarringlnfoSet IE.
  • a value given by uac-BarringFactor refers to a probability that an access attempt would be allowed during an access barring check.
  • a UE draws a random number 'rand' uniformly distributed in the range: 0 ⁇ rand ⁇ 1. If the drawn 'rand' is lower than the value indicated by uac-BarringFactor, then the access attempt is allowed; otherwise, it is barred.
  • the value given by uac- BarringTime refers to an average time in seconds before a new access attempt is to be performed after an access attempt was barred at an access barring check for the same AC.
  • a 7-bit bitmap uac-BarringForAccessIdentity refers to special AIs 1, 2, 11 to 15.
  • the leftmost bit, bit 0, corresponds to All, bit 1 corresponds to AI2, bit 2 corresponds to All 1, bit 3 corresponds to Al 12, bit 4 corresponds to AI13, bit 5 corresponds to AI14, and bit 6 corresponds to AI15.
  • a bit set to a value 0 means that an access attempt is allowed for the corresponding Al; otherwise, an access attempt is not allowed for the corresponding Al.
  • the UE If a UE wants to access a 5GC, the UE performs access barring check to determine whether the access is allowed.
  • Figure 8 shows an example of an access barring check if requested by a UE NAS (e.g., for MO signaling (resulting from other than paging) or MO data).
  • a UE AS indicates that an access attempt is allowed, a UE NAS initiates a procedure to send an NAS message for a concerned access attempt; otherwise, the UE NAS does not initiate the NAS procedure.
  • the UE AS initiates an RRC connection establishment procedure (e.g., if the UE is in RRC IDLE) or the RRC connection resume procedure (e.g., if the UE is in RRC INACTIVE).
  • FIG. 8 is a schematic block diagram illustrating one embodiment of a system 800 for a UAC barring check.
  • the system 800 includes a UE NAS 802 and a UE AS 804. Each of the communications in the system 800 may include one or more messages.
  • the UE NAS 802 determines 806 an applicable AC and AIs for an access attempt in a selected PLMN, registered PLMN (“RPLMN”), or equivalent PLMN.
  • RPLMN registered PLMN
  • the UE AS 804 performs 810 an access barring check based on the UAC barring information received on SIB1.
  • the UE AS 804 transmits an indication of whether an access attempt is allowed or barred.
  • Table 5 Example for per-PLMN UAC barring information and explicit AC barring list
  • a hosting network to better control or limit access of UEs to localized services in its network coverage area the following may be performed: 1) use of a fact that a UE that accesses a hosting network to use localized services may be configured with one or more access identities by its HPLMN, but its special access identities 1, 2, and 11 to 15 are not applicable to access localized services; 2) each cell of the hosting network broadcasts, in a new SIB (e.g., SIBX), a configuration of supported localized services and their mapping to special access identities and, in SIB1, the configuration of a new uac- BarringForAccessIdentityAndLocalizedServices bitmap - in some embodiments, a configuration of supported localized services and their mapping to special access identities may be broadcast in an existing SIB - Table 6 shows a signaling structure for a SIBX, 2a) the parameter “Special Alto-Service mapping” defines a mapping of special access identities (e.g., 1, 2, 11 to 15) to
  • each bit corresponds to special access identities (e.g., 1, 2, 11 to 15) in the uac-
  • the parameter “Access barring coding scheme” defines whether the UE shall apply hard-coding or soft-coding of the bits given by the uac- BarringForAccessIdentityAndLocalizedServices bitmap - a value “hard” indicates that the UE shall take the given bit value as either “allowed” (e.g., if bit value is set to “0”) or “barred” (e.g., if bit value is set to “1”) - a value “soft” indicates that if the given bit value is set to “allowed” (e.g., bit value is set to “0”), the UE shall apply the parameter uac-BarringFactor that is given as part of the UAC barring information in SIB 1 - that means the final decision of whether an access attempt is allowed or not depends on the random number that the UE needs to draw and whether the drawn random value
  • Figure 9 is a diagram illustrating one embodiment of a correspondence 900 of SIBX 902 (e.g., special Al-to-service mapping 904 bitmap) to SIB1 906 (e.g., uac- BarringForAccessIdentityAndLocalizedServices 908 bitmap).
  • SIBX 902 e.g., special Al-to-service mapping 904 bitmap
  • SIB1 906 e.g., uac- BarringForAccessIdentityAndLocalizedServices 908 bitmap.
  • a first embodiment there may be access control for localized services.
  • user A is a subscriber of HPLMN# 1 and is informed about an upcoming gaming event which will take place in a fairground area during the weekend.
  • 6 localized services e.g., Service ID#1 to Service ID#6
  • Service ID#1 to Service ID#6 will be provided during the event at different locations within the fairground area.
  • User A is interested in attending the event and subscribes to 2 temporary services (e.g., Service ID#1 and Service ID#4) over its HPLMN#1.
  • the localized services will be provided by an SNPN operator and a hosting network will be setup during the defined time and location.
  • the user A Based on a service agreement between the SNPN and HPLMN# 1, the user A receives the hosting network access information (e.g., time and location, hosting network identifier, user A’s temporary credentials) from its HPLMN# 1. Furthermore, it is assumed that the hosting network coverage is overlapping with the coverage of HPLMN# 1.
  • the hosting network access information e.g., time and location, hosting network identifier, user A’s temporary credentials
  • the user A is in the coverage area of the hosting network.
  • the user A manually selects and registers to the hosting network as temporary subscriber according to the received hosting network access information.
  • the hosting network includes 6 cells and the cell deployment according to Figure 5 is assumed. Each cell supports only a set of localized services as described in Table 1.
  • the user A is located in cell 2 where 4 localized services are supported (e.g., Service ID#1, Service ID#2, Service ID#3, Service ID#4).
  • 4 localized services e.g., Service ID#1, Service ID#2, Service ID#3, Service ID#4).
  • the following service and access related information are broadcast: 1) in a SIBX, the configuration of supported localized services and their mapping to special access identities are as shown in Table 7; and/or 2) in SIB1, the applicable UAC barring information in cell 2 may be as shown in Table 8.
  • the barring information contains the configuration for AC3 (e.g., “MO signaling on NAS level resulting from other than paging”), AC7 (e.g., “MO data that do not belong to any other Access Categories”), and AC9 (e.g., “MO IMS registration related signalling”). Due to a current load in cell 2 and the setting of the uac- BarringForAccessIdentityAndLocalizedServices bitmap, the access of the localized services with Service ID#1 to Service ID#4 for AC3 may be allowed, whereas access of the localized services with Service ID#2 and Service ID#3 for AC7 and AC9 may be temporarily barred.
  • AC3 e.g., “MO signaling on NAS level resulting from other than paging”
  • AC7 e.g., “MO data that do not belong to any other Access Categories”
  • AC9 e.g., “MO IMS registration related signalling”. Due to a current load in cell 2 and the setting of the uac- BarringFor
  • the user A may use the service with Service ID# 1 in cell 2. Therefore, it activates the corresponding application on its UE.
  • the UE NAS checks whether the access to the hosting network to initiate a NAS service request procedure for Service ID#1 is allowed or not.
  • the UE NAS requests UE AS to check whether an access to the hosting network is allowed for AC3 and Service ID#1.
  • the UE AS Based on the broadcast information received from cell 2, the UE AS performs an access barring check by evaluating the setting of the uac- BarringForAccessIdentityAndLocalizedServices bitmap for AC3 and indicates to the UE NAS that access attempt for AC3 and Service ID#1 is allowed.
  • the UE NAS initiates the NAS service request procedure, and the UE AS initiates the RRC connection establishment procedure with cell 2. It may be assumed that the UE is in an RRC IDLE state at initiation of the NAS service request procedure.
  • Table 7 Configuration of supported localized services and their mapping to special access identities according to the first embodiment
  • Table 8 UAC barring information according to the first embodiment
  • a second embodiment there may be access control for non-localized services.
  • the configuration of supported localized services and their mapping to special access identities, uac-BarringForAccessIdentityAndLocalizedServices bitmap, and UAC barring information is mostly the same as in the first embodiment.
  • the only difference between the first and second embodiment is that user A wants to use a non-localized service in cell 2 (e.g., IMS voice call that is provided towards the HPLMN#1 over the roaming interface Ro-IF). Therefore, it activates the corresponding voice application on its UE.
  • the UE NAS checks whether the access to the hosting network to initiate a NAS service request procedure for the IMS voice call is allowed.
  • the UE NAS requests that the UE AS check whether an access to the hosting network is allowed for AC3 and AIO. Based on the broadcast information received from cell 2, the UE AS performs access barring check by evaluating the setting of the parameter uac-BarringFactor for AC3 and drawing a random number 'rand' uniformly distributed in the range: 0 ⁇ rand ⁇ 1. Since the drawn 'rand' is lower than the value “p25” indicated by the parameter uac-BarringFactor, the UE AS indicates to UE NAS that access attempt for AC3 and AIO is allowed. As result, UE NAS initiates the NAS service request procedure and UE AS initiates the RRC connection establishment procedure with cell 2. It is assumed that the UE is in RRC IDLE state at initiation of the NAS service request procedure.
  • Figure 10 is a flow chart diagram illustrating one embodiment of a method 1000 for configuring localized services.
  • the method 1000 is performed by an apparatus, such as the network unit 104.
  • the method 1000 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
  • the method 1000 includes transmitting 1002, from a communication network device, a first message to a communication device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the method 1000 includes transmitting 1004 a second message to the communication device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the method 1000 includes receiving 1006 a third message from the communication device.
  • the third message includes a service request for a localized service of the localized services.
  • the first message and the second message carry different system information blocks.
  • at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device. In certain embodiments, the communication device comprises a device that is subscribed to the localized service. In some embodiments, the communication device comprises a UE.
  • Figure 11 is a flow chart diagram illustrating another embodiment of a method 1100 for configuring localized services.
  • the method 1100 is performed by an apparatus, such as the remote unit 102.
  • the method 1100 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
  • the method 1100 includes receiving 1102, at a communication device, a first message from a communication network device.
  • the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits.
  • the method 1100 includes receiving 1104 a second message from the communication network device.
  • the second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits.
  • the method 1100 includes determining 1106 whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message.
  • the method 1100 includes transmitting 1108 a third message to the communication network device.
  • the third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
  • the first message and the second message carry different system information blocks.
  • at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device. In certain embodiments, the communication device comprises a device that is subscribed to the localized service. In some embodiments, the communication device comprises a UE.
  • an apparatus comprises a communication network device.
  • the apparatus further comprises: a transmitter that: transmits a first message to a communication device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and a receiver that receives a third message from the communication device, wherein the third message comprises a service request for a localized service of the localized services.
  • the first message and the second message carry different system information blocks.
  • At least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device.
  • the communication device comprises a device that is subscribed to the localized service.
  • the communication device comprises a UE.
  • a method in a communication network device comprises: transmitting a first message to a communication device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; transmitting a second message to the communication device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and receiving a third message from the communication device, wherein the third message comprises a service request for a localized service of the localized services.
  • the first message and the second message carry different system information blocks.
  • At least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device.
  • the communication device comprises a device that is subscribed to the localized service.
  • the communication device comprises a UE.
  • an apparatus comprises a communication device.
  • the apparatus further comprises: a receiver that: receives a first message from a communication network device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; a processor that determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message; and a transmitter that transmits a third message to the communication network device, wherein the third message comprises a service request for the localized service in response to the access attempt for the localized service being allowed.
  • the first message and the second message carry different system information blocks.
  • At least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device.
  • the communication device comprises a device that is subscribed to the localized service.
  • the communication device comprises a UE.
  • a method in a communication device comprises: receiving a first message from a communication network device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; receiving a second message from the communication network device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; determining whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message; and transmitting a third message to the communication network device, wherein the third message comprises a service request for the localized service in response to the access attempt for the localized service being allowed.
  • the first message and the second message carry different system information blocks.
  • At least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
  • the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
  • the communication device comprises a device that is temporarily subscribed to the communication network device.
  • the communication device comprises a device that is subscribed to the localized service.
  • the communication device comprises a UE.

Abstract

Apparatuses, methods, and systems are disclosed for configuring localized services. One method (1000) includes transmitting (1002), from a communication network device, a first message to a communication device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. The method (1000) includes transmitting (1004) a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. The method (1000) includes receiving (1006) a third message from the communication device. The third message includes a service request for a localized service of the localized services.

Description

CONFIGURING LOCALIZED SERVICES
FIELD
[0001] The subject matter disclosed herein relates generally to wireless communications and more particularly relates to configuring localized services.
BACKGROUND
[0002] In certain wireless communications networks, localized services may be used. In such embodiments, a hosting network may not properly limit the access of user equipments (“UEs”) to the localized services.
BRIEF SUMMARY
[0003] Methods for configuring localized services are disclosed. Apparatuses and systems also perform the functions of the methods. One embodiment of a method includes transmitting, from a communication network device, a first message to a communication device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the method includes transmitting a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the method includes receiving a third message from the communication device. The third message includes a service request for a localized service of the localized services.
[0004] One apparatus for configuring localized services includes a communication network device. In some embodiments, the apparatus includes a transmitter that: transmits a first message to a communication device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In various embodiments, the apparatus includes a receiver that receives a third message from the communication device. The third message includes a service request for a localized service of the localized services.
[0005] Another embodiment of a method for configuring localized services includes receiving, at a communication device, a first message from a communication network device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the method includes receiving a second message from the communication network device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the method includes determining whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message. In various embodiments, the method includes transmitting a third message to the communication network device. The third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
[0006] Another apparatus for configuring localized services includes a communication device . In some embodiments, the apparatus includes a receiver that: receives a first message from a communication network device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In various embodiments, the apparatus includes a processor that determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message. In certain embodiments, the apparatus includes a transmitter that transmits a third message to the communication network device. The third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0007] A more particular description of the embodiments briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only some embodiments and are not therefore to be considered to be limiting of scope, the embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
[0008] Figure 1 is a schematic block diagram illustrating one embodiment of a wireless communication system for configuring localized services;
[0009] Figure 2 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for configuring localized services; [0010] Figure 3 is a schematic block diagram illustrating one embodiment of an apparatus that may be used for configuring localized services;
[0011] Figure 4 is a schematic block diagram illustrating one embodiment of a system for connectivity between a hosting network, home networks, and service providers;
[0012] Figure 5 is a schematic block diagram illustrating one embodiment of a system for cell deployment of a hosting network;
[0013] Figure 6 is a schematic block diagram illustrating one embodiment of a system for a message flow for performing a unified access control (“UAC”) barring check;
[0014] Figure 7 is a block diagram illustrating one embodiment of an an abstract syntax notation 1 (“ASN. l”) structure of an UAC-BarringlnfoSet information element (“IE”);
[0015] Figure 8 is a schematic block diagram illustrating one embodiment of a system for a UAC barring check;
[0016] Figure 9 is a diagram illustrating one embodiment of a correspondence of special Al-to-service mapping bitmap to uac-BarringForAccessIdentityAndLocalizedServices bitmap;
[0017] Figure 10 is a flow chart diagram illustrating one embodiment of a method for configuring localized services; and
[0018] Figure 11 is a flow chart diagram illustrating another embodiment of a method for configuring localized services.
DETAILED DESCRIPTION
[0019] As will be appreciated by one skilled in the art, aspects of the embodiments may be embodied as a system, apparatus, method, or program product. Accordingly, embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments may take the form of a program product embodied in one or more computer readable storage devices storing machine readable code, computer readable code, and/or program code, referred hereafter as code. The storage devices may be tangible, non-transitory, and/or non-transmission. The storage devices may not embody signals. In a certain embodiment, the storage devices only employ signals for accessing code.
[0020] Certain of the functional units described in this specification may be labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom very-large-scale integration (“VLSI”) circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
[0021] Modules may also be implemented in code and/or software for execution by various types of processors. An identified module of code may, for instance, include one or more physical or logical blocks of executable code which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may include disparate instructions stored in different locations which, when joined logically together, include the module and achieve the stated purpose for the module.
[0022] Indeed, a module of code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different computer readable storage devices. Where a module or portions of a module are implemented in software, the software portions are stored on one or more computer readable storage devices.
[0023] Any combination of one or more computer readable medium may be utilized. The computer readable medium may be a computer readable storage medium. The computer readable storage medium may be a storage device storing the code. The storage device may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, holographic, micromechanical, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
[0024] More specific examples (a non-exhaustive list) of the storage device would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (“RAM”), a read-only memory (“ROM”), an erasable programmable read-only memory (“EPROM” or Flash memory), a portable compact disc readonly memory (“CD-ROM”), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
[0025] Code for carrying out operations for embodiments may be any number of lines and may be written in any combination of one or more programming languages including an object oriented programming language such as Python, Ruby, Java, Smalltalk, C++, or the like, and conventional procedural programming languages, such as the "C" programming language, or the like, and/or machine languages such as assembly languages. The code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (“LAN”) or a wide area network (“WAN”), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
[0026] Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment, but mean “one or more but not all embodiments” unless expressly specified otherwise. The terms “including,” “comprising,” “having,” and variations thereof mean “including but not limited to,” unless expressly specified otherwise. An enumerated listing of items does not imply that any or all of the items are mutually exclusive, unless expressly specified otherwise. The terms “a,” “an,” and “the” also refer to “one or more” unless expressly specified otherwise.
[0027] Furthermore, the described features, structures, or characteristics of the embodiments may be combined in any suitable manner. In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments. One skilled in the relevant art will recognize, however, that embodiments may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of an embodiment.
[0028] Aspects of the embodiments are described below with reference to schematic flowchart diagrams and/or schematic block diagrams of methods, apparatuses, systems, and program products according to embodiments. It will be understood that each block of the schematic flowchart diagrams and/or schematic block diagrams, and combinations of blocks in the schematic flowchart diagrams and/or schematic block diagrams, can be implemented by code. The code may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
[0029] The code may also be stored in a storage device that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the storage device produce an article of manufacture including instructions which implement the function/act specified in the schematic flowchart diagrams and/or schematic block diagrams block or blocks.
[0030] The code may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the code which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
[0031] The schematic flowchart diagrams and/or schematic block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of apparatuses, systems, methods and program products according to various embodiments. In this regard, each block in the schematic flowchart diagrams and/or schematic block diagrams may represent a module, segment, or portion of code, which includes one or more executable instructions of the code for implementing the specified logical function(s).
[0032] It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more blocks, or portions thereof, of the illustrated Figures.
[0033] Although various arrow types and line types may be employed in the flowchart and/or block diagrams, they are understood not to limit the scope of the corresponding embodiments. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the depicted embodiment. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted embodiment. It will also be noted that each block of the block diagrams and/or flowchart diagrams, and combinations of blocks in the block diagrams and/or flowchart diagrams, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and code. [0034] The description of elements in each figure may refer to elements of proceeding figures. Like numbers refer to like elements in all figures, including alternate embodiments of like elements.
[0035] Figure 1 depicts an embodiment of a wireless communication system 100 for configuring localized services. In one embodiment, the wireless communication system 100 includes remote units 102 and network units 104. Even though a specific number of remote units 102 and network units 104 are depicted in Figure 1, one of skill in the art will recognize that any number of remote units 102 and network units 104 may be included in the wireless communication system 100.
[0036] In one embodiment, the remote units 102 may include computing devices, such as desktop computers, laptop computers, personal digital assistants (“PDAs”), tablet computers, smart phones, smart televisions (e.g., televisions connected to the Internet), set-top boxes, game consoles, security systems (including security cameras), vehicle on-board computers, network devices (e.g., routers, switches, modems), aerial vehicles, drones, or the like. In some embodiments, the remote units 102 include wearable devices, such as smart watches, fitness bands, optical head-mounted displays, or the like. Moreover, the remote units 102 may be referred to as subscriber units, mobiles, mobile stations, users, terminals, mobile terminals, fixed terminals, subscriber stations, UE, user terminals, a device, or by other terminology used in the art. The remote units 102 may communicate directly with one or more of the network units 104 via uplink (“UL”) communication signals. In certain embodiments, the remote units 102 may communicate directly with other remote units 102 via sidelink communication.
[0037] The network units 104 may be distributed over a geographic region. In certain embodiments, a network unit 104 may also be referred to and/or may include one or more of an access point, an access terminal, a base, a base station, a location server, a core network (“CN”), a radio network entity, a Node-B, an evolved node-B (“eNB”), a 5G node-B (“gNB”), a Home Node-B, a relay node, a device, a core network, an aerial server, a radio access node, an access point (“AP”), new radio (“NR”), a network entity, an access and mobility management function (“AMF”), a unified data management (“UDM”), a unified data repository (“UDR”), a UDM/UDR, a policy control function (“PCF”), a radio access network (“RAN”), a network slice selection function (“NSSF”), an operations, administration, and management (“0AM”), a session management function (“SMF”), a user plane function (“UPF”), an application function, an authentication server function (“AUSF”), security anchor functionality (“SEAF”), trusted non- third generation partnership project (“3GPP”) gateway function (“TNGF”), or by any other terminology used in the art. The network units 104 are generally part of a radio access network that includes one or more controllers communicably coupled to one or more corresponding network units 104. The radio access network is generally communicably coupled to one or more core networks, which may be coupled to other networks, like the Internet and public switched telephone networks, among other networks. These and other elements of radio access and core networks are not illustrated but are well known generally by those having ordinary skill in the art.
[0038] In one implementation, the wireless communication system 100 is compliant with NR protocols standardized in 3GPP, wherein the network unit 104 transmits using an orthogonal frequency division multiplexing (“OFDM”) modulation scheme on the downlink (“DL”) and the remote units 102 transmit on the UL using a single-carrier frequency division multiple access (“SC-FDMA”) scheme or an OFDM scheme. More generally, however, the wireless communication system 100 may implement some other open or proprietary communication protocol, for example, WiMAX, institute of electrical and electronics engineers (“IEEE”) 802. 11 variants, global system for mobile communications (“GSM”), general packet radio service (“GPRS”), universal mobile telecommunications system (“UMTS”), long term evolution (“LTE”) variants, code division multiple access 2000 (“CDMA2000”), Bluetooth®, ZigBee, Sigfox, among other protocols. The present disclosure is not intended to be limited to the implementation of any particular wireless communication system architecture or protocol.
[0039] The network units 104 may serve a number of remote units 102 within a serving area, for example, a cell or a cell sector via a wireless communication link. The network units 104 transmit DL communication signals to serve the remote units 102 in the time, frequency, and/or spatial domain.
[0040] In various embodiments, a remote unit 102 may receive, at a communication device, a first message from a communication network device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the remote unit 102 may receive a second message from the communication network device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the remote unit 102 may determine whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message. In various embodiments, the remote unit 102 may transmit a third message to the communication network device. The third message includes a service request for the localized service in response to the access attempt for the localized service being allowed. Accordingly, the remote unit 102 may be used for configuring localized services. [0041] In certain embodiments, a network unit 104 may transmit, from a communication network device, a first message to a communication device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the network unit 104 may transmit a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the network unit 104 may receive a third message from the communication device. The third message includes a service request for a localized service of the localized services. Accordingly, the network unit 104 may be used for configuring localized services.
[0042] Figure 2 depicts one embodiment of an apparatus 200 that may be used for configuring localized services. The apparatus 200 includes one embodiment of the remote unit 102. Furthermore, the remote unit 102 may include a processor 202, a memory 204, an input device 206, a display 208, a transmitter 210, and a receiver 212. In some embodiments, the input device 206 and the display 208 are combined into a single device, such as a touchscreen. In certain embodiments, the remote unit 102 may not include any input device 206 and/or display 208. In various embodiments, the remote unit 102 may include one or more of the processor 202, the memory 204, the transmitter 210, and the receiver 212, and may not include the input device 206 and/or the display 208.
[0043] The processor 202, in one embodiment, may include any known controller capable of executing computer-readable instructions and/or capable of performing logical operations. For example, the processor 202 may be a microcontroller, a microprocessor, a central processing unit (“CPU”), a graphics processing unit (“GPU”), an auxiliary processing unit, a field programmable gate array (“FPGA”), or similar programmable controller. In some embodiments, the processor 202 executes instructions stored in the memory 204 to perform the methods and routines described herein. The processor 202 is communicatively coupled to the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212.
[0044] The memory 204, in one embodiment, is a computer readable storage medium. In some embodiments, the memory 204 includes volatile computer storage media. For example, the memory 204 may include a RAM, including dynamic RAM (“DRAM”), synchronous dynamic RAM (“SDRAM”), and/or static RAM (“SRAM”). In some embodiments, the memory 204 includes non-volatile computer storage media. For example, the memory 204 may include a hard disk drive, a flash memory, or any other suitable non-volatile computer storage device. In some embodiments, the memory 204 includes both volatile and non-volatile computer storage media. In some embodiments, the memory 204 also stores program code and related data, such as an operating system or other controller algorithms operating on the remote unit 102.
[0045] The input device 206, in one embodiment, may include any known computer input device including a touch panel, a button, a keyboard, a stylus, a microphone, or the like. In some embodiments, the input device 206 may be integrated with the display 208, for example, as a touchscreen or similar touch-sensitive display. In some embodiments, the input device 206 includes a touchscreen such that text may be input using a virtual keyboard displayed on the touchscreen and/or by handwriting on the touchscreen. In some embodiments, the input device 206 includes two or more different devices, such as a keyboard and a touch panel.
[0046] The display 208, in one embodiment, may include any known electronically controllable display or display device. The display 208 may be designed to output visual, audible, and/or haptic signals. In some embodiments, the display 208 includes an electronic display capable of outputting visual data to a user. For example, the display 208 may include, but is not limited to, a liquid crystal display (“LCD”), a light emitting diode (“LED”) display, an organic light emitting diode (“OLED”) display, a projector, or similar display device capable of outputting images, text, or the like to a user. As another, non-limiting, example, the display 208 may include a wearable display such as a smart watch, smart glasses, a heads-up display, or the like. Further, the display 208 may be a component of a smart phone, a personal digital assistant, a television, a table computer, a notebook (laptop) computer, a personal computer, a vehicle dashboard, or the like.
[0047] In certain embodiments, the display 208 includes one or more speakers for producing sound. For example, the display 208 may produce an audible alert or notification (e.g., a beep or chime). In some embodiments, the display 208 includes one or more haptic devices for producing vibrations, motion, or other haptic feedback. In some embodiments, all or portions of the display 208 may be integrated with the input device 206. For example, the input device 206 and display 208 may form a touchscreen or similar touch-sensitive display. In other embodiments, the display 208 may be located near the input device 206.
[0048] In certain embodiments, the receiver 212: receives a first message from a communication network device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In various embodiments, the processor 202 determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message. In certain embodiments, the transmitter 210 transmits a third message to the communication network device. The third message includes a service request for the localized service in response to the access attempt for the localized service being allowed.
[0049] Although only one transmitter 210 and one receiver 212 are illustrated, the remote unit 102 may have any suitable number of transmitters 210 and receivers 212. The transmitter 210 and the receiver 212 may be any suitable type of transmitters and receivers. In one embodiment, the transmitter 210 and the receiver 212 may be part of a transceiver.
[0050] Figure 3 depicts one embodiment of an apparatus 300 that may be used for configuring localized services. The apparatus 300 includes one embodiment of the network unit 104. Furthermore, the network unit 104 may include a processor 302, a memory 304, an input device 306, a display 308, a transmitter 310, and a receiver 312. As may be appreciated, the processor 302, the memory 304, the input device 306, the display 308, the transmitter 310, and the receiver 312 may be substantially similar to the processor 202, the memory 204, the input device 206, the display 208, the transmitter 210, and the receiver 212 of the remote unit 102, respectively.
[0051] In certain embodiments, the transmitter 310: transmits a first message to a communication device, wherein the first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In various embodiments, the receiver 312 receives a third message from the communication device. The third message includes a service request for a localized service of the localized services.
[0052] It should be noted that one or more embodiments described herein may be combined into a single embodiment.
[0053] In certain embodiments, fifth generation (“5G”) networks provide access to localized services. Such 5G networks may offer one or more localized services in addition to connectivity to non-localized services to public networks and non-public networks (“NPNs”). In such embodiments, the localized services may be provided within a certain time and geographic location, and a local 5G network acts as a hosting network offering access to such localized services. Moreover, a hosting network (“HtNW”) may be a public land mobile network (“PLMN”), NPN (e.g., standalone NPN (“SNPN”), or public network integrated (“PNI”) NPN (“PNI-NPN”)), and may also be available only temporarily in time and location. One example of a HtNW deployment is shown in Figure 4.
[0054] Figure 4 is a schematic block diagram illustrating one embodiment of a system 400 for connectivity between a hosting network, home networks, and service providers. The system 400 includes a UE 402 (e.g., including a first application (App 1)), a hosting network (HtNW) 404, a home network (“NW”) #1 406, a home NW #2 408, and a 3rd party service platform 410. The HtNW 404 of Figure 4 includes a radio access network (“RAN”) (e.g., providing 3GPP access and/or non-3GPP access) and a core network (“CN”) and provides connectivity to one or more public PLMNs or NPNs over a roaming interface denoted as “Ro-IF” A provisioning interface is denoted as “PV-IF” and is used to provision or negotiate various localized service requirements, including a quality of service (“QoS”), an expected and/or maximum number of users, event information for discovery, network slicing, and/or required internet protocol (“IP”) connectivity and routing policies. Furthermore, the following services may be offered by the HtNW 404: 1) non-localized services such as voice service, data service and so forth transmitted towards one or more public PLMNs (e.g., home NW#1 406) or NPNs (e.g., home NW#2 408) - service level agreements exist between the HtNW 404 and the home networks - in other words, the nonlocalized services may be connectivity and/or communication services to a home network, whereas the HtNW 404 acts as a neutral host - it should be noted that the term “home network” is used from the UE's perspective - the home network is the network to which the UE has subscribed to (e.g., the home network stores and manages the UE's subscription data) the UE's subscription permanent identifier (“SUPI”) and credentials; 2) localized services which are provided only within a certain time and geographic location from a local server or from 3rd party service providers (e.g., 3rd party service platform 410). Examples of localized services may include multimedia performances, video streaming, and/or cloud gaming. In Figure 4, one localized service may be application 1 (Appl) where the Appl client is installed in the UE and Appl server is deployed either locally in the HtNW 404 domain or in the 3rd party domain outside the HtNW 404 domain. It may be assumed that the access to such localized services is based on a temporary subscription of the user. That means the user becomes a temporary subscriber of the HtNW 404 to access the temporary localized services.
[0055] Examples of hosting networks may include a stadium, a concert hall, or a fairground where the coverage of the hosting networks is overlapping with the coverage of the home networks. In other examples the hosting networks may provide coverage in areas where there is no coverage provided by home networks. [0056] In certain embodiments, when a HtNW has been setup at a defined time and location, temporary subscribers of the HtNW or subscribers of the localized services will select and register to the network (e.g., by manual network selection) for accessing the localized services. But to access a service in the HtNW, a radio resource control (“RRC”) connection may need to be established in access stratum (“AS”) between each UE (e.g., of a temporary subscriber or subscriber of a localized service) and the HtNW. To control the load and avoid congestion in the network, the HtNW may control these accesses by broadcasting UAC barring information. However, UAC barring mechanisms may be based on access identities (e.g., referring to a type of UE) and access categories (e.g., referring to a type of access attempts) and may not properly support access control of UEs to localized services.
[0057] Depending on cell deployment, a hosting network may include multiple cells where each cell may support only a set of localized services.
[0058] Figure 5 is a schematic block diagram illustrating one embodiment of a system 500 for cell deployment of a hosting network. The system 500 includes a cell 1 504, a cell 2 506, a cell 3 508, a cell 4 510, a cell 5 512, and a cell 6 514. In Figure 5, a hosting network has been setup in a fairground area and consists of 6 cells and provides 6 localized services with service ID#1 to service ID#6. Each cell supports only a subset of these localized services as described in Table 1. As result, it may not be possible for a hosting network to properly limit the access of UEs to localized services in the cells where they are supported.
[0059] In certain embodiments, a UAC barring mechanism is used to allow a hosting network to better control or limit access of UEs to localized services in its network coverage area.
Table 1: Example of availability of localized services in a hosting network
Figure imgf000014_0001
[0060] In some embodiments, there may be a service specific access control mechanism. In such embodiments, there may be separate access barring parameters (e.g., barring factor and/or time or bitmap) that may be specified for localized services. However, such embodiments may be in contradiction with UAC barring mechanism. [0061] In various embodiments, a UAC barring mechanism is described as found herein.
[0062] In certain embodiments, a UAC barring mechanism may be used for which an operator can control access of UEs in its network to control load and avoid congestion. The UAC is applicable to UEs in RRC IDLE, RRC INACTIVE, and RRC CONNECTED states, and is performed based on access identities (“Al”) and access categories (“AC”). An access identity refers to the type of UE, whereas an access category refers to the type of access attempt (e.g., mobile originated (“MO”) signaling, MO data, multimedia telephony (“MMTEL”) voice and/or video, short message service (“SMS”), and so forth. In AS, the UAC barring information is provided by a network in a first system information block (“SIB1”) for the AIs 0, 1, 2, 11 to 15, and up to 63 ACs (e.g., AC 0 is not subject to access barring).
[0063] In some embodiments, a UE is configured with Al 0 per default (e.g., corresponds to a normal UE). In addition, it can be configured with one or more of the special AIs 1, 2, 11 to 15 (e.g., see Table 2). The special AIs 1, 2, 11 to 15 have special validity. The AIs 11 to 15 correspond to the access classes 11 to 15, and are allocated to UEs as shown in Table 3. Table 4 shows the ACs. The UAC framework supports standardized ACs as well as operator-defined ACs using their own criterion (e.g., network slicing, application, and application server).
Table 2: Access Identities
Figure imgf000016_0001
Table 3: Definition of Access Classes
Figure imgf000016_0002
Table 4: Access Categories
Figure imgf000016_0003
Figure imgf000017_0001
Figure imgf000018_0001
E is authorized to send exception data.
Figure imgf000018_0002
[0064] Figure 6 is a schematic block diagram illustrating one embodiment of a system 600 for a message flow for performing a UAC barring check. The system 600 includes a UE 602 and a gNB 604. Each of the communications in the system 600 may include one or more messages.
[0065] In a first communication 606, SIB1 (e.g., including uac -Barringinfo) is transmitted from the gNB 604 to the UE 602. The UE 602 performs 608 a UAC barring check. In a second communication 610, an RRC connection establishment is performed between the UE 602 and the gNB 604. The UAC barring information is broadcast in a cell via the SIB1 and contains the following parameters: 1) uac-BarringForCommon: common access control parameters for each AC supported in the network; 2) uac-BarringPerPLMN-List: PLMN-specific access control parameters for each AC supported in the network; 3) uac-BarringlnfoSetList: a list of access control parameter sets given by IE UAC-BarringlnfoSet - an AC can be configured with access parameters according to one of the sets; and/or 4) uac-AccessCategoryl-SelectionAssistancelnfo: information used to determine whether AC1 applies to the UE.
[0066] The access control parameters given by a UAC-BarringlnfoSet IE refer to the parameters uac-BarringFactor, uac-BarringTime and the 7-bit bitmap uac- BarringForAccessIdentity. The parameters uac-BarringFactor, uac-BarringTime apply for AI0 whereas the 7-bit bitmap uac-BarringForAccessIdentity applies for the special AIs 1, 2, 11 to 15. Figure 7 is a block diagram illustrating one embodiment of an ASN. 1 structure 700 of the UAC- BarringlnfoSet IE.
[0067] In certain embodiments, a value given by uac-BarringFactor refers to a probability that an access attempt would be allowed during an access barring check. To determine whether an access attempt is barred or not, a UE draws a random number 'rand' uniformly distributed in the range: 0 < rand < 1. If the drawn 'rand' is lower than the value indicated by uac-BarringFactor, then the access attempt is allowed; otherwise, it is barred. Moreover, the value given by uac- BarringTime refers to an average time in seconds before a new access attempt is to be performed after an access attempt was barred at an access barring check for the same AC. Further, a 7-bit bitmap uac-BarringForAccessIdentity refers to special AIs 1, 2, 11 to 15. The leftmost bit, bit 0, corresponds to All, bit 1 corresponds to AI2, bit 2 corresponds to All 1, bit 3 corresponds to Al 12, bit 4 corresponds to AI13, bit 5 corresponds to AI14, and bit 6 corresponds to AI15. A bit set to a value 0 means that an access attempt is allowed for the corresponding Al; otherwise, an access attempt is not allowed for the corresponding Al. [0068] If a UE wants to access a 5GC, the UE performs access barring check to determine whether the access is allowed. Figure 8 shows an example of an access barring check if requested by a UE NAS (e.g., for MO signaling (resulting from other than paging) or MO data). If a UE AS indicates that an access attempt is allowed, a UE NAS initiates a procedure to send an NAS message for a concerned access attempt; otherwise, the UE NAS does not initiate the NAS procedure. If an NAS procedure is initiated, then the UE AS initiates an RRC connection establishment procedure (e.g., if the UE is in RRC IDLE) or the RRC connection resume procedure (e.g., if the UE is in RRC INACTIVE).
[0069] Figure 8 is a schematic block diagram illustrating one embodiment of a system 800 for a UAC barring check. The system 800 includes a UE NAS 802 and a UE AS 804. Each of the communications in the system 800 may include one or more messages. The UE NAS 802 determines 806 an applicable AC and AIs for an access attempt in a selected PLMN, registered PLMN (“RPLMN”), or equivalent PLMN. In a first communication 808, the UE NAS 802 sends a request for an access attempt for the applicable AC and AIs to the UE AS 804. Moreover, the UE AS 804 performs 810 an access barring check based on the UAC barring information received on SIB1. Further, in a second communication 812, the UE AS 804 transmits an indication of whether an access attempt is allowed or barred.
[0070] In Table 5, an example for per-PLMN UAC barring information and explicit AC barring list is shown. In this example it is assumed that two PLMNs share the cell. For each PLMN (e.g., PLMN1, PLMN2) the cell broadcasts applicable UAC barring information. For PLMN1, the parameters uac-BarringFactor and uac-BarringTime are set to “p25” and “sl6” respectively, whereas, for PLMN2, the parameters uac-BarringFactor and uac-BarringTime are set to “p50” and “s8” respectively. For both PLMNs, no barring of the special AIs (e.g., 1, 2, 11 to 15) is applied.
Table 5: Example for per-PLMN UAC barring information and explicit AC barring list
Figure imgf000019_0001
Figure imgf000020_0001
[0071] In certain embodiments, to allow a hosting network to better control or limit access of UEs to localized services in its network coverage area the following may be performed: 1) use of a fact that a UE that accesses a hosting network to use localized services may be configured with one or more access identities by its HPLMN, but its special access identities 1, 2, and 11 to 15 are not applicable to access localized services; 2) each cell of the hosting network broadcasts, in a new SIB (e.g., SIBX), a configuration of supported localized services and their mapping to special access identities and, in SIB1, the configuration of a new uac- BarringForAccessIdentityAndLocalizedServices bitmap - in some embodiments, a configuration of supported localized services and their mapping to special access identities may be broadcast in an existing SIB - Table 6 shows a signaling structure for a SIBX, 2a) the parameter “Special Alto-Service mapping” defines a mapping of special access identities (e.g., 1, 2, 11 to 15) to the localized services supported in the cell - the parameter indicates, for each access identity bit, the localized services which are mapped onto this bit - with regards to the mapping, a service identifier (“ID”) can be only mapped onto one bit, but multiple service IDs can be mapped onto the same bit
- each bit corresponds to special access identities (e.g., 1, 2, 11 to 15) in the uac-
BarringForAccessIdentityAndLocalizedServices bitmap that is signaled as part of the UAC barring information in SIB1 (e.g., Figure 9) - the cell sets the uac-
BarringForAccessIdentityAndLocalizedServices bitmap according to a setting of a parameter “Special Al-to-Service mapping”, 2b) the parameter “Access barring coding scheme” defines whether the UE shall apply hard-coding or soft-coding of the bits given by the uac- BarringForAccessIdentityAndLocalizedServices bitmap - a value “hard” indicates that the UE shall take the given bit value as either “allowed” (e.g., if bit value is set to “0”) or “barred” (e.g., if bit value is set to “1”) - a value “soft” indicates that if the given bit value is set to “allowed” (e.g., bit value is set to “0”), the UE shall apply the parameter uac-BarringFactor that is given as part of the UAC barring information in SIB 1 - that means the final decision of whether an access attempt is allowed or not depends on the random number that the UE needs to draw and whether the drawn random value is lower than the value indicated by uac-BarringFactor - the hosting network may configure the access barring coding scheme in accordance with the current load in a cell or network - for instance, in low and medium load scenarios, it may use the value “hard”, and in high load scenarios it may use the value “soft” - in the latter scenario, a frequent update of the UAC barring information in SIB1 can be avoided; 3) if a UE wants to access a localized service in a cell then it uses the configuration of supported localized services and their mapping to special access identities in SIBX and evaluates the corresponding setting of the uac- BarringForAccessIdentityAndLocalizedServices bitmap for the applicable AC in the UAC barring information in SIB1; and/or 4) if a cell of a hosting network supports non-localized services and a UE wants to access a non-localized service, then it uses the default AIO and evaluates the corresponding setting of the parameters uac-BarringFactor and uac-BarringTime for the applicable AC in the UAC barring information in SIB 1.
[0072] Figure 9 is a diagram illustrating one embodiment of a correspondence 900 of SIBX 902 (e.g., special Al-to-service mapping 904 bitmap) to SIB1 906 (e.g., uac- BarringForAccessIdentityAndLocalizedServices 908 bitmap).
Table 6: Signaling for configuration of supported localized services and their mapping to special Access Identities
Figure imgf000021_0001
Figure imgf000022_0001
[0073] In a first embodiment, there may be access control for localized services. In an example of the first embodiment, user A is a subscriber of HPLMN# 1 and is informed about an upcoming gaming event which will take place in a fairground area during the weekend. 6 localized services (e.g., Service ID#1 to Service ID#6) will be provided during the event at different locations within the fairground area. User A is interested in attending the event and subscribes to 2 temporary services (e.g., Service ID#1 and Service ID#4) over its HPLMN#1. The localized services will be provided by an SNPN operator and a hosting network will be setup during the defined time and location. Based on a service agreement between the SNPN and HPLMN# 1, the user A receives the hosting network access information (e.g., time and location, hosting network identifier, user A’s temporary credentials) from its HPLMN# 1. Furthermore, it is assumed that the hosting network coverage is overlapping with the coverage of HPLMN# 1.
[0074] Further, at the scheduled start of the gaming event, the user A is in the coverage area of the hosting network. The user A manually selects and registers to the hosting network as temporary subscriber according to the received hosting network access information. The hosting network includes 6 cells and the cell deployment according to Figure 5 is assumed. Each cell supports only a set of localized services as described in Table 1. The user A is located in cell 2 where 4 localized services are supported (e.g., Service ID#1, Service ID#2, Service ID#3, Service ID#4). In cell 2, the following service and access related information are broadcast: 1) in a SIBX, the configuration of supported localized services and their mapping to special access identities are as shown in Table 7; and/or 2) in SIB1, the applicable UAC barring information in cell 2 may be as shown in Table 8. It may be assumed that, in cell 2, the barring information contains the configuration for AC3 (e.g., “MO signaling on NAS level resulting from other than paging”), AC7 (e.g., “MO data that do not belong to any other Access Categories”), and AC9 (e.g., “MO IMS registration related signalling”). Due to a current load in cell 2 and the setting of the uac- BarringForAccessIdentityAndLocalizedServices bitmap, the access of the localized services with Service ID#1 to Service ID#4 for AC3 may be allowed, whereas access of the localized services with Service ID#2 and Service ID#3 for AC7 and AC9 may be temporarily barred.
[0075] Moreover, the user A may use the service with Service ID# 1 in cell 2. Therefore, it activates the corresponding application on its UE. The UE NAS then checks whether the access to the hosting network to initiate a NAS service request procedure for Service ID#1 is allowed or not. The UE NAS requests UE AS to check whether an access to the hosting network is allowed for AC3 and Service ID#1. Based on the broadcast information received from cell 2, the UE AS performs an access barring check by evaluating the setting of the uac- BarringForAccessIdentityAndLocalizedServices bitmap for AC3 and indicates to the UE NAS that access attempt for AC3 and Service ID#1 is allowed. As result, the UE NAS initiates the NAS service request procedure, and the UE AS initiates the RRC connection establishment procedure with cell 2. It may be assumed that the UE is in an RRC IDLE state at initiation of the NAS service request procedure. Table 7: Configuration of supported localized services and their mapping to special access identities according to the first embodiment
Figure imgf000023_0001
Table 8: UAC barring information according to the first embodiment
Figure imgf000023_0002
Figure imgf000024_0001
[0076] In a second embodiment, there may be access control for non-localized services. In this embodiment, the configuration of supported localized services and their mapping to special access identities, uac-BarringForAccessIdentityAndLocalizedServices bitmap, and UAC barring information is mostly the same as in the first embodiment. The only difference between the first and second embodiment is that user A wants to use a non-localized service in cell 2 (e.g., IMS voice call that is provided towards the HPLMN#1 over the roaming interface Ro-IF). Therefore, it activates the corresponding voice application on its UE. The UE NAS then checks whether the access to the hosting network to initiate a NAS service request procedure for the IMS voice call is allowed. The UE NAS requests that the UE AS check whether an access to the hosting network is allowed for AC3 and AIO. Based on the broadcast information received from cell 2, the UE AS performs access barring check by evaluating the setting of the parameter uac-BarringFactor for AC3 and drawing a random number 'rand' uniformly distributed in the range: 0 < rand < 1. Since the drawn 'rand' is lower than the value “p25” indicated by the parameter uac-BarringFactor, the UE AS indicates to UE NAS that access attempt for AC3 and AIO is allowed. As result, UE NAS initiates the NAS service request procedure and UE AS initiates the RRC connection establishment procedure with cell 2. It is assumed that the UE is in RRC IDLE state at initiation of the NAS service request procedure.
[0077] Figure 10 is a flow chart diagram illustrating one embodiment of a method 1000 for configuring localized services. In some embodiments, the method 1000 is performed by an apparatus, such as the network unit 104. In certain embodiments, the method 1000 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
[0078] In various embodiments, the method 1000 includes transmitting 1002, from a communication network device, a first message to a communication device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the method 1000 includes transmitting 1004 a second message to the communication device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the method 1000 includes receiving 1006 a third message from the communication device. The third message includes a service request for a localized service of the localized services.
[0079] In certain embodiments, the first message and the second message carry different system information blocks. In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits. In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
[0080] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device. In certain embodiments, the communication device comprises a device that is subscribed to the localized service. In some embodiments, the communication device comprises a UE.
[0081] Figure 11 is a flow chart diagram illustrating another embodiment of a method 1100 for configuring localized services. In some embodiments, the method 1100 is performed by an apparatus, such as the remote unit 102. In certain embodiments, the method 1100 may be performed by a processor executing program code, for example, a microcontroller, a microprocessor, a CPU, a GPU, an auxiliary processing unit, a FPGA, or the like.
[0082] In various embodiments, the method 1100 includes receiving 1102, at a communication device, a first message from a communication network device. The first message includes configuration information for localized services and configuration information for mapping the localized services to access identity bits. In some embodiments, the method 1100 includes receiving 1104 a second message from the communication network device. The second message includes configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits. In certain embodiments, the method 1100 includes determining 1106 whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message. In various embodiments, the method 1100 includes transmitting 1108 a third message to the communication network device. The third message includes a service request for the localized service in response to the access attempt for the localized service being allowed. [0083] In certain embodiments, the first message and the second message carry different system information blocks. In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits. In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
[0084] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device. In certain embodiments, the communication device comprises a device that is subscribed to the localized service. In some embodiments, the communication device comprises a UE.
[0085] In one embodiment, an apparatus comprises a communication network device. The apparatus further comprises: a transmitter that: transmits a first message to a communication device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; and transmits a second message to the communication device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and a receiver that receives a third message from the communication device, wherein the third message comprises a service request for a localized service of the localized services.
[0086] In certain embodiments, the first message and the second message carry different system information blocks.
[0087] In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
[0088] In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
[0089] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device.
[0090] In certain embodiments, the communication device comprises a device that is subscribed to the localized service.
[0091] In some embodiments, the communication device comprises a UE.
[0092] In one embodiment, a method in a communication network device comprises: transmitting a first message to a communication device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; transmitting a second message to the communication device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and receiving a third message from the communication device, wherein the third message comprises a service request for a localized service of the localized services.
[0093] In certain embodiments, the first message and the second message carry different system information blocks.
[0094] In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
[0095] In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
[0096] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device.
[0097] In certain embodiments, the communication device comprises a device that is subscribed to the localized service.
[0098] In some embodiments, the communication device comprises a UE.
[0099] In one embodiment, an apparatus comprises a communication device. The apparatus further comprises: a receiver that: receives a first message from a communication network device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; and receives a second message from the communication network device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; a processor that determines whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message; and a transmitter that transmits a third message to the communication network device, wherein the third message comprises a service request for the localized service in response to the access attempt for the localized service being allowed.
[0100] In certain embodiments, the first message and the second message carry different system information blocks.
[0101] In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
[0102] In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location. [0103] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device.
[0104] In certain embodiments, the communication device comprises a device that is subscribed to the localized service.
[0105] In some embodiments, the communication device comprises a UE.
[0106] In one embodiment, a method in a communication device comprises: receiving a first message from a communication network device, wherein the first message comprises configuration information for localized services and configuration information for mapping the localized services to access identity bits; receiving a second message from the communication network device, wherein the second message comprises configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; determining whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message; and transmitting a third message to the communication network device, wherein the third message comprises a service request for the localized service in response to the access attempt for the localized service being allowed.
[0107] In certain embodiments, the first message and the second message carry different system information blocks.
[0108] In some embodiments, at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
[0109] In various embodiments, the communication network device comprises a local network device that provides services at a defined time and a defined geographic location.
[0110] In one embodiment, the communication device comprises a device that is temporarily subscribed to the communication network device.
[0111] In certain embodiments, the communication device comprises a device that is subscribed to the localized service.
[0112] In some embodiments, the communication device comprises a UE.
[0113] Embodiments may be practiced in other specific forms. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims

1 . An apparatus for wireless communication, the apparatus comprising: a processor; and a memory coupled to the processor, the memory comprising instructions executable by the processor to cause the apparatus to: transmit, to a communication device, a first message comprising configuration information for localized services and configuration information for mapping the localized services to access identity bits; transmit, to the communication device, a second message comprising configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and receive, from the communication device, a third message comprising a service request for a localized service of the localized services.
2. The apparatus of claim 1, wherein the first message and the second message carry different system information blocks.
3. The apparatus of claim 1, wherein at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits.
4. The apparatus of claim 1, wherein the apparatus comprises a local network device that provides services at a defined time and a defined geographic location.
5. The apparatus of claim 1, wherein the communication device comprises a device that is temporarily subscribed to the apparatus.
6. A method in a communication network device, the method comprising: transmitting, to a communication device, a first message comprising configuration information for localized services and configuration information for mapping the localized services to access identity bits; transmitting, to the communication device, a second message comprising configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; and receiving, from the communication device, a third message comprising a service request for a localized service of the localized services. The method of claim 6, wherein the first message and the second message carry different system information blocks. The method of claim 6, wherein at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits. The method of claim 6, wherein the communication network device comprises a local network device that provides services at a defined time and a defined geographic location. The method of claim 6, wherein the communication device comprises a device that is temporarily subscribed to the communication network device. An apparatus for wireless communication, the apparatus comprising: a processor; and a memory coupled to the processor, the memory comprising instructions executable by the processor to cause the apparatus to: receive, from a communication network device, a first message comprising configuration information for localized services and configuration information for mapping the localized services to access identity bits; receives, from the communication network device, a second message comprising configuration information for setting the access identity bits according to the configuration information for the localized services and the configuration information for mapping the localized services to the access identity bits; determine whether an access attempt for a localized service of the localized services is allowed in accordance with the first message and the second message; and transmit, to the communication network device, a third message comprising a service request for the localized service in response to the access attempt for the localized service being allowed. The apparatus of claim 11, wherein the first message and the second message carry different system information blocks. The apparatus of claim 11, wherein at least one localized service of the localized services is mappable to the same access identity bit of the access identity bits. The apparatus of claim 11, wherein the communication network device comprises a local network device that provides services at a defined time and a defined geographic location. The apparatus of claim 11, wherein the apparatus comprises a device that is temporarily subscribed to the communication network device.
PCT/IB2023/053090 2022-03-28 2023-03-28 Configuring localized services WO2023187653A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263324234P 2022-03-28 2022-03-28
US63/324,234 2022-03-28

Publications (1)

Publication Number Publication Date
WO2023187653A1 true WO2023187653A1 (en) 2023-10-05

Family

ID=86271306

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2023/053090 WO2023187653A1 (en) 2022-03-28 2023-03-28 Configuring localized services

Country Status (1)

Country Link
WO (1) WO2023187653A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190045577A1 (en) * 2017-08-03 2019-02-07 Samsung Electronics Co., Ltd. Method and apparatus for controlling access in next generation mobile communication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190045577A1 (en) * 2017-08-03 2019-02-07 Samsung Electronics Co., Ltd. Method and apparatus for controlling access in next generation mobile communication system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service requirements for the 5G system; Stage 1 (Release 16)", 24 December 2021 (2021-12-24), XP052089183, Retrieved from the Internet <URL:https://ftp.3gpp.org/3guInternal/3GPP_ultimate_versions_to_be_transposed/sentToDpc/22261-gg0.zip 22261-gg0.doc> [retrieved on 20211224] *
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on 5G Networks Providing Access to Localized Services; Stage 1 (Release 18)", no. V18.2.0, 24 December 2021 (2021-12-24), pages 1 - 45, XP052083484, Retrieved from the Internet <URL:https://ftp.3gpp.org/Specs/archive/22_series/22.844/22844-i20.zip 22844-i20.doc> [retrieved on 20211224] *

Similar Documents

Publication Publication Date Title
US20230300790A1 (en) Receiving a paging message
EP3881606B1 (en) Access network selection for a ue not supporting nas over non-3gpp access
US20230156584A1 (en) Target network slice information for target network slices
US20230276527A1 (en) Discontinuous reception configuration parameters for communication
US20230073757A1 (en) Guti reallocation for mt-edt
WO2021191873A1 (en) Requesting an information element of a system information block
US11876868B2 (en) Deriving an operating system identity
US20230254736A1 (en) System information block sizing
WO2023187653A1 (en) Configuring localized services
WO2023057081A1 (en) Configuring protocol data unit sessions
EP4190057A1 (en) Paging management
WO2023143751A1 (en) Registering with multiple networks
US20240129845A1 (en) Data connection establishment in response to a disaster condition
US20240147235A1 (en) Network slice admission control
WO2022021155A1 (en) Method and apparatus for managing access control information
WO2023078576A1 (en) Multi-access protocol data unit session access type usage
US20230328575A1 (en) Network access request based on user equipment capabilities
US20230300725A1 (en) Acquiring on-demand system information
WO2024088573A1 (en) Network slice availability for legacy devices in a wireless communication network
KR20240044422A (en) Organize disaster assistance information
WO2023213419A1 (en) Differentiated registering to network slices in a wireless communications network
WO2023117148A1 (en) Slice-based network selection information
WO2024088598A1 (en) Network mapping of policy sections in a wireless communication network
WO2022208363A1 (en) Including a serving cell identity in a discovery message
WO2022180617A1 (en) Network slice admission control

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23720176

Country of ref document: EP

Kind code of ref document: A1