WO2024004808A1 - Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf) - Google Patents

Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf) Download PDF

Info

Publication number
WO2024004808A1
WO2024004808A1 PCT/JP2023/023058 JP2023023058W WO2024004808A1 WO 2024004808 A1 WO2024004808 A1 WO 2024004808A1 JP 2023023058 W JP2023023058 W JP 2023023058W WO 2024004808 A1 WO2024004808 A1 WO 2024004808A1
Authority
WO
WIPO (PCT)
Prior art keywords
nssai
registration
network
rejected
identification information
Prior art date
Application number
PCT/JP2023/023058
Other languages
English (en)
Japanese (ja)
Inventor
靖夫 菅原
周一郎 千葉
晶貴 泉
Original Assignee
シャープ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by シャープ株式会社 filed Critical シャープ株式会社
Publication of WO2024004808A1 publication Critical patent/WO2024004808A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the present invention relates to UE (User Equipment) and AMF (Access and Mobility Management Function).
  • Non-Patent Documents 1 to 3 One of the items to be considered in Release 18 is that when an event occurs such as an OS (Operating System) upgrade, security patch update, modem reset, or modem software update, the unavailability period Controlling the UE (User Equipment) and the network using the communication period (also referred to as the communication period, the communication unavailable period, or the unavailable period) is being considered (see Non-Patent Document 4).
  • OS Operating System
  • modem reset modem software update
  • the unavailability period Controlling the UE (User Equipment) and the network using the communication period also referred to as the communication period, the communication unavailable period, or the unavailable period
  • Non-Patent Document 4 partially describes UE behavior and network behavior when the above-mentioned event occurs, the description alone does not allow efficient operation of the system as a whole.
  • One aspect of the present invention has been made in view of the above circumstances, and it is an object of the present invention to clarify an efficient control method regarding the unavailability period, and UE behavior and network behavior related to the unavailability period.
  • the UE is a UE (User Equipment) that includes a transmitting/receiving unit and a control unit, the UE supports a function related to unavailability period, and the transmitting/receiving unit supports a timer that is longer than the unavailability period.
  • the control unit When receiving the value and/or information indicating that the setting of the unavailability period has been completed, the control unit is characterized in that it recognizes that the setting of the unavailability period has been completed.
  • the AMF of one embodiment of the present invention is an AMF (Access and Mobility Management Function) that includes a control unit, and if the UE (User Equipment) does not support a function related to unavailability period, the control unit It is characterized in that the registration acceptance message does not include information indicating that the setting of the period has been completed and/or a timer value longer than the unavailability period.
  • AMF Access and Mobility Management Function
  • an efficient control method regarding the unavailability period and UE behavior and network behavior related to the unavailability period can be clarified.
  • FIG. 1 is a diagram illustrating an outline of a mobile communication system (EPS/5GS).
  • FIG. 2 is a diagram illustrating the detailed configuration of a mobile communication system (EPS/5GS).
  • FIG. 2 is a diagram illustrating the device configuration of a UE.
  • FIG. 2 is a diagram illustrating the configuration of an access network device (gNB) in 5GS.
  • FIG. 2 is a diagram illustrating the configuration of a core network device (AMF/SMF/UPF) in 5GS. It is a figure explaining a registration procedure.
  • gNB access network device
  • AMF/SMF/UPF core network device
  • FIG. 1 is a diagram for explaining the outline of a mobile communication system 1 used in each embodiment
  • FIG. 2 is a diagram for explaining the detailed configuration of the mobile communication system 1.
  • the mobile communication system 1 is composed of UE_A10, access network_A80, core network_A90, PDN (Packet Data Network)_A5, access network_B120, core network_B190, and DN (Data Network)_A6. It is stated that
  • symbols may be omitted for these devices and functions, such as UE, access network_A, core network_A, PDN, access network_B, core network_B, DN, etc. .
  • Figure 2 also shows the devices and functions of UE_A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, UDM150, N3IWF170, etc. Interfaces that connect these devices and functions to each other are described.
  • the EPS Evolved Packet System
  • 4G system is configured to include an access network_A and a core network_A, but may also include a UE and/or a PDN.
  • 5GS which is a 5G system, is configured to include a UE, an access network_B, and a core network_B, but may also include a DN.
  • a UE is a device capable of connecting to network services via a 3GPP access (also referred to as a 3GPP access network, 3GPP AN) and/or a non-3GPP access (also referred to as a non-3GPP access network, non-3GPP AN).
  • the UE may be a terminal device capable of wireless communication such as a mobile phone or a smartphone, and may be a terminal device connectable to EPS and/or 5GS.
  • the UE may include a UICC (Universal Integrated Circuit Card) or an eUICC (Embedded UICC). Note that the UE may be expressed as a user device or a terminal device.
  • the access network_A corresponds to E-UTRAN (Evolved Universal Terrestrial Radio Access Network) and/or a wireless LAN access network.
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • eNB evolved Node B
  • eNB45 may be written with the symbol omitted, such as eNB.
  • each eNB is connected to each other by, for example, an X2 interface.
  • one or more access points are arranged in the wireless LAN access network.
  • access network_B corresponds to 5G access network (5G AN).
  • 5G AN consists of NG-RAN (NG Radio Access Network) and/or non-3GPP access network.
  • NG-RAN NG Radio Access Network
  • gNBs NR NodeBs
  • gNB 122 may be written with the symbol omitted, such as gNB.
  • the gNB is a node that provides the NR (New Radio) user plane and control plane to the UE, and is a node that connects to the 5GCN via the NG interface (including the N2 interface or the N3 interface).
  • gNB is a base station device newly designed for 5GS, and has different functions from a base station device (eNB) designed for EPS, which is a 4G system. Further, when there are multiple gNBs, each gNB is connected to each other by, for example, an Xn interface.
  • the non-3GPP access network may include an untrusted non-3GPP access network and a trusted non-3GPP access network.
  • the untrusted non-3GPP access network may be a non-3GPP access network that does not perform security management within the access network, such as a public wireless LAN.
  • the trusted non-3GPP access network may be an access network defined by 3GPP, and may include a TNAP (trusted non-3GPP access point) and a TNGF (trusted non-3GPP gateway function).
  • E-UTRAN and NG-RAN may be referred to as 3GPP access.
  • a wireless LAN access network or non-3GPP AN is sometimes referred to as non-3GPP access.
  • the nodes arranged in the access network_B may also be collectively referred to as NG-RAN nodes.
  • access network_A, access network_B, devices included in access network_A, and devices included in access network_B are referred to as access networks, access network devices, or devices within the access network. It is sometimes called.
  • core network_A corresponds to EPC (Evolved Packet Core).
  • EPC includes, for example, MME (Mobility Management Entity), SGW (Serving Gateway), PGW (Packet Data Network Gateway)-U, PGW-C, PCRF (Policy and Charging Rules Function), HSS (Home Subscriber Server), etc. Placed.
  • MME Mobility Management Entity
  • SGW Serving Gateway
  • PGW Packet Data Network Gateway
  • PGW-C Packet Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • Core Network_B corresponds to 5GCN (5G Core Network).
  • AMF Access and Mobility Management Function
  • UPF User Plane Function
  • SMF Session Management Function
  • PCF Policy Control Function
  • UDM Unified Data Management
  • 5GCN may be expressed as 5GC.
  • core network_A, core network_B, devices included in core network_A, and devices included in core network_B are referred to as core networks, core network devices, or devices within the core network. It is sometimes called.
  • a core network is a mobile communication carrier (Mobile It may be an IP mobile communications network operated by a Mobile Virtual Network Operator; ), or a core network for virtual mobile communication carriers or virtual mobile communication service providers such as MVNE (Mobile Virtual Network Enabler).
  • Mobile Mobile It may be an IP mobile communications network operated by a Mobile Virtual Network Operator; ), or a core network for virtual mobile communication carriers or virtual mobile communication service providers such as MVNE (Mobile Virtual Network Enabler).
  • MVNE Mobile Virtual Network Enabler
  • the PDN may be a DN (Data Network) that provides communication services to the UE.
  • the DN may be configured as a packet data service network or may be configured for each service.
  • the PDN may include connected communication terminals. Therefore, connecting to the PDN may mean connecting to a communication terminal or server device located in the PDN.
  • transmitting and receiving user data to and from the PDN may mean transmitting and receiving user data to and from a communication terminal and a server device located in the PDN.
  • a PDN may be expressed as a DN, or a DN may be expressed as a PDN.
  • access network_A, core network_A, PDN, access network_B, core network_B, DN, and/or one or more devices included therein are referred to as networks or network devices. It is sometimes called.
  • the network and/or network equipment sends and receives messages and/or performs procedures in the access network_A, core network_A, PDN, access network_B, core network_B, DN. means that at least some of them and/or one or more of the devices included therein send and receive messages and/or perform procedures.
  • the UE can connect to the access network. Furthermore, the UE can be connected to the core network via the access network. Furthermore, the UE can connect to the PDN or DN via the access network and the core network. That is, the UE can transmit and receive (communicate) user data with the PDN or DN. When transmitting and receiving user data, not only IP (Internet Protocol) communication but also non-IP communication may be used.
  • IP Internet Protocol
  • IP communication refers to data communication using IP, and data is sent and received using IP packets.
  • An IP packet consists of an IP header and a payload part.
  • the payload portion may include data transmitted and received by devices and functions included in EPS and devices and functions included in 5GS.
  • non-IP communication refers to data communication that does not use IP, and data is sent and received using a format different from the IP packet structure.
  • non-IP communication may be data communication realized by sending and receiving application data to which no IP header is attached, or it may be data communication realized by sending and receiving application data to which no IP header is attached, or the UE may attach another header such as a Mac header or an Ethernet (registered trademark) frame header.
  • User data to be transmitted and received may also be transmitted and received.
  • devices not shown in FIG. 2 may be configured in the access network_A, core network_A, access network_B, core network_B, PDN_A, and DN_A.
  • the core network_A and/or the core network_B may include an Authentication Server Function (AUSF) or an Authentication, Authorization, and Accounting (AAA) server (AAA-S).
  • AUSF Authentication Server Function
  • AAA Authentication, Authorization, and Accounting
  • the AUSF is a core network device equipped with an authentication function for 3GPP access and non-3GPP access. Specifically, it is a network function unit that receives an authentication request for 3GPP access and/or non-3GPP access from the UE and executes an authentication procedure.
  • the AAA server is a device that connects directly or indirectly to the AUSF via another network device and has authentication, authorization, and billing functions.
  • the AAA server may be a network device within the core network.
  • the AAA server may not be included in core network_A and/or core network_B, but may be included in PLMN. That is, the AAA server may be a core network device or a device outside the core network.
  • the AAA server may be a server device within a PLMN managed by a 3rd Party.
  • each device/function is shown one by one to simplify the diagram, but the mobile communication system 1 may include a plurality of similar devices/functions.
  • the mobile communication system 1 includes multiple UE_A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, and/or UDM150. Devices and functions such as the above may be configured.
  • each device may be configured as physical hardware, logical (virtual) hardware configured on general-purpose hardware, or configured as software. may be done. Furthermore, at least some (including all) of the functions of each device may be configured as physical hardware, logical hardware, or software.
  • each storage unit in each device/function that appears below is, for example, a semiconductor memory, SSD (Solid State Drive), HDD (Hard Disk Drive). ) etc.
  • each storage unit stores not only the information originally set from the shipping stage, but also devices and functions other than the own device and functions (for example, UE, and/or access network device, and/or core network device, and/or or PDN and/or DN), various information sent and received can be stored.
  • each storage unit can store identification information, control information, flags, parameters, etc. included in control messages transmitted and received during various communication procedures described below. Further, each storage unit may store this information for each UE.
  • each storage unit can store control messages and user data sent and received between devices and functions included in 5GS and/or EPS. can. At this time, not only what was sent and received via the N26 interface, but also what was sent and received without going through the N26 interface can be stored.
  • the UE is composed of a control unit_A300, an antenna 310, a transmitting/receiving unit_A320, and a storage unit_A340.
  • the control unit_A300, the transmitting/receiving unit_A320, and the storage unit_A340 are connected via a bus.
  • the transmitting/receiving unit_A320 is connected to the antenna 310.
  • the control unit_A300 is a functional unit that controls the operations and functions of the entire UE.
  • the control unit_A300 implements various processes in the UE by reading and executing various programs stored in the storage unit_A340 as necessary.
  • the transmitting/receiving unit_A320 is a functional unit for wirelessly communicating with a base station device (eNB or gNB) in the access network via an antenna. That is, the UE can transmit and receive user data and/or control information between the access network device and/or the core network device and/or the PDN and/or the DN using the transmitter/receiver_A320. can.
  • a base station device eNB or gNB
  • the UE can communicate with the base station apparatus (eNB) in the E-UTRAN via the LTE-Uu interface by using the transmitting/receiving unit_A320.
  • the UE can communicate with a base station device (gNB) within the 5G AN by using the transceiver unit_A320.
  • the UE can transmit and receive NAS (Non-Access-Stratum) messages with the AMF via the N1 interface.
  • NAS Non-Access-Stratum
  • the storage unit_A340 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the UE. Furthermore, the storage unit_340 may have a function of storing control information transmitted and received between the access network device, the core network device, and the DN.
  • gNB is composed of a control unit_B500, an antenna 510, a network connection unit_B520, a transmitting/receiving unit_B530, and a storage unit_B540.
  • the control unit_B500, network connection unit_B520, transmission/reception unit_B530, and storage unit_B540 are connected via a bus.
  • the transmitting/receiving unit_B530 is connected to the antenna 510.
  • the control unit_B500 is a functional unit that controls the operations and functions of the entire gNB.
  • the control unit_B500 implements various processes in the gNB by reading and executing various programs stored in the storage unit_B540 as necessary.
  • the network connection unit_B520 is a functional unit for gNB to communicate with AMF and/or UPF. That is, the gNB can send and receive user data and/or control information to and from the AMF and/or UPF using the network connection unit_B520.
  • the transmitting/receiving unit_B530 is a functional unit for wirelessly communicating with the UE via the antenna 510. That is, the gNB can transmit and receive user data and/or control information to and from the UE using the transmitting and receiving unit_B530.
  • gNB in 5G AN can communicate with AMF via N2 interface by using network connection part_B520, and UPF via N3 interface. can communicate with. Furthermore, the gNB can communicate with the UE by using the transmitting/receiving unit_B530.
  • the storage unit_B540 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the gNB. Furthermore, the storage unit_540 may have a function of storing control information transmitted and received between the UE, another access network device (base station device), core network device, and DN.
  • base station device another access network device
  • DN DN
  • AMF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • AMF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire AMF.
  • the control unit_B700 implements various processes in the AMF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • Network connection part_B720 is for AMF to connect with base station equipment (gNB) in 5G AN, and/or SMF, and/or PCF, and/or UDM, and/or SCEF, and/or NSACF. It is a functional part. In other words, the AMF uses the network connection part_B720 to communicate with the base station equipment (gNB) in the 5G AN, and/or the SMF, and/or the PCF, and/or the UDM, and/or the SCEF. Data and/or control information can be sent and received.
  • gNB base station equipment
  • AMF in 5GCN can communicate with gNB via N2 interface by using network connection_A620, and communicate with UDM via N8 interface.
  • N11 interface it can communicate with the SMF, and through the N15 interface, it can communicate with the PCF.
  • the AMF can send and receive NAS messages to and from the UE via the N1 interface.
  • the N1 interface is logical, in reality, communication between the UE and AMF takes place via 5G AN.
  • the AMF supports the N26 interface, it can communicate with the MME via the N26 interface by using the network connection unit_A620.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the AMF. Furthermore, the storage unit_740 may have a function of storing control information transmitted and received between the UE, the access network device, other core network devices, and the DN.
  • AMF has a function to exchange control messages with the RAN using the N2 interface, a function to exchange NAS messages with the UE using the N1 interface, a function to perform encryption and integrity protection of NAS messages, and registration management.
  • RM Registration management
  • CM Connection management
  • SEA Security Anchor Functionality
  • SCM Security Context Management
  • N3IWF Non-3GPP Interworking Function
  • the RM state may be synchronized between the UE and the AMF.
  • the RM state includes a non-registered state (RM-DEREGISTERED state) and a registered state (RM-REGISTERED state).
  • RM-DEREGISTERED state the UE is not registered in the network, and the UE context in the AMF does not have valid location information or routing information for the UE, so the AMF cannot reach the UE.
  • the RM-REGISTERED state the UE is registered with the network, so the UE can receive services that require registration with the network.
  • the RM state may be expressed as a 5GMM state.
  • the RM-DEREGISTERED state may be expressed as a 5GMM-DEREGISTERED state
  • the RM-REGISTERED state may be expressed as a 5GMM-REGISTERED state.
  • 5GMM-REGISTERED may be a state where each device has established a 5GMM context or a state where a PDU session context has been established. Note that when each device is 5GMM-REGISTERED, UE_A10 may start transmitting and receiving user data and control messages, or may respond to paging. Furthermore, if each device is 5GMM-REGISTERED, the UE_A10 may execute a registration procedure other than the registration procedure for initial registration and/or a service request procedure.
  • 5GMM-DEREGISTERED may be a state where each device has not established a 5GMM context, a state where the location information of UE_A10 is not known to the network, or a state where the network has reached UE_A10. It may be in a state where it is impossible. Note that when each device is 5GMM-DEREGISTERED, UE_A10 may start a registration procedure, or may establish a 5GMM context by executing the registration procedure.
  • one or more AMFs may be placed within the core network_B.
  • the AMF may be an NF (Network Function) that manages one or more NSIs (Network Slice Instances).
  • the AMF may be a shared CP function (CCNF; Common CPNF (Control Plane Network Function)) shared among multiple NSIs.
  • CCNF Common CPNF (Control Plane Network Function)
  • N3IWF is a device and/or function placed between non-3GPP access and 5GCN when UE connects to 5GS via non-3GPP access.
  • the SMF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • the SMF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire SMF.
  • the control unit_B700 implements various processes in the SMF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • the network connection unit_B720 is a functional unit for SMF to connect with AMF, and/or UPF, and/or PCF, and/or UDM. That is, the SMF sends and receives user data and/or control information to/from the AMF and/or UPF and/or PCF and/or UDM and/or NSACF using the network connection_B720. be able to.
  • the SMF in 5GCN can communicate with AMF through N11 interface by using network connection_A620, and can communicate with UPF through N4 interface. Through the N7 interface, it can communicate with the PCF, and through the N10 interface, it can communicate with the UDM.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the SMF.
  • SMF has session management functions such as establishing, modifying, and releasing PDU sessions, IP address allocation and management functions for UEs, UPF selection and control functions, and appropriate destination (transmission destination) functions.
  • session management functions such as establishing, modifying, and releasing PDU sessions, IP address allocation and management functions for UEs, UPF selection and control functions, and appropriate destination (transmission destination) functions.
  • function to configure UPF to route traffic to It has the function of providing AN-specific (for each AN) SM information sent to the network, the function of determining the SSC mode (Session and Service Continuity mode) for the session, the roaming function, etc.
  • SSC mode Session and Service Continuity mode
  • the storage unit_740 may have a function of storing control information transmitted and received between the UE, the access network device, other core network devices, and the DN.
  • the UPF is composed of a control unit_B700, a network connection unit_B720, and a storage unit_B740.
  • the control unit_B700, network connection unit_B720, and storage unit_B740 are connected via a bus.
  • the UPF may be a node that handles the control plane.
  • the control unit_B700 is a functional unit that controls the operations and functions of the entire UPF.
  • the control unit_B700 implements various processes in the UPF by reading and executing various programs stored in the storage unit_B740 as necessary.
  • the network connection unit_B720 is a functional unit for UPF to connect to the base station device (gNB) and/or SMF and/or DN in the 5G AN.
  • the UPF uses the network connection part_B720 to transmit and receive user data and/or control information between the base station equipment (gNB) and/or SMF and/or DN in the 5G AN. Can be done.
  • the UPF in 5GCN can communicate with gNB via N3 interface by using network connection part_A620, and can communicate with SMF via N4 interface. Through the N6 interface, it can communicate with the DN, and through the N9 interface, it can communicate with other UPFs.
  • the storage unit_B740 is a functional unit for storing programs, user data, control information, etc. necessary for each operation of the UPF.
  • the UPF functions as an anchor point for intra-RAT mobility or inter-RAT mobility, as an external PDU session point for interconnecting to the DN (i.e., as a gateway between the DN and core network packet routing and forwarding functions, UL CL (Uplink Classifier) function that supports routing of multiple traffic flows to one DN, and multi-homed PDU sessions. It has branching point function, QoS (Quality of Service) processing function for user plane, uplink traffic verification function, downlink packet buffering, downlink data notification trigger function, etc.
  • QoS Quality of Service
  • the UPF may be a gateway for IP communication and/or non-IP communication. Further, the UPF may have a function of transferring IP communication, or may have a function of converting between non-IP communication and IP communication. Furthermore, the plurality of gateways may be a gateway that connects core network_B and a single DN. Note that the UPF may have connectivity with other NFs, and may be connected to each device via other NFs.
  • the storage unit_740 may have a function of storing control information transmitted and received between the UE, the access network device, other core network devices, and the DN.
  • the user plane refers to user data that is transmitted and received between the UE and the network.
  • the user plane may be transmitted and received using a PDN connection in the case of 4G or a PDU session in the case of 5G.
  • the user plane may be transmitted and received using the LTE-Uu interface and/or the S1-U interface and/or the S5 interface and/or the S8 interface and/or the SGi interface.
  • the user plane may be transmitted and received via the interface between the UE and the NG RAN, and/or the N3 interface, and/or the N9 interface, and/or the N6 interface.
  • the user plane may be expressed as U-Plane.
  • a control plane (also referred to as CP) is a control message that is sent and received to control communication of the UE.
  • the control plane may be transmitted and received using a NAS (Non-Access-Stratum) signaling connection between the UE and the MME.
  • the control plane may be transmitted and received using a NAS (Non-Access-Stratum) signaling connection between the UE and the AMF.
  • the control plane may be transmitted and received using the LTE-Uu interface and the S1-MME interface.
  • the control plane may be transmitted and received using the interface between the UE and the NG RAN, and the N2 interface.
  • the control plane may be expressed as a control plane or as a C-Plane.
  • the network refers to at least part of the access network_B, core network_B, and DN. Furthermore, one or more devices included in at least a portion of the access network_B, core network_B, and DN may be referred to as a network or a network device.
  • the fact that the network sends, receives, and/or processes messages may mean that devices within the network (network devices and/or control devices) send, receive, and/or process messages.
  • a device within a network may send, receive, and/or process messages, which may mean that the network sends, receives, and/or processes messages.
  • NSSF Network Slice Selection Function
  • NF Network Slice Selection Function
  • NWDAF Network Data Analytics Function
  • NF Network Data Analytics Function
  • AF Application Function
  • PCF Policy Control Function
  • Policy Control Function may be an NF that has a function of determining a policy for controlling network behavior.
  • the NRF Network Repository Function
  • the NRF may be an NF that has a service discovery function.
  • the NRF may be an NF that has a function of providing information on the discovered NF upon receiving a discovery request for another NF from a certain NF.
  • NSACF Network Slice Admission Control Function monitors the number of registered UEs per NS and/or the number of PDU sessions per NS for network slices (NS) related to NSAC (Network Slice Admission Control). and control functions.
  • the NSACF may also be configured for each NS associated with the NSAC with a maximum number of UEs per NS and/or a maximum number of PDU sessions per NS allowed.
  • the NSACF may have a function of increasing or decreasing the number of UEs to be registered with a certain NS so as not to exceed the maximum number of UEs allowed to be registered in that NS.
  • the NSACF may also maintain a list of UE IDs registered with NSs associated with the NSACF.
  • NSACF determines whether the ID of that UE is the same as the UE registered in that NS. Check whether the ID is already included in the list, and if the ID of the UE is not included in the list, further check whether the maximum number of UEs per NS has been reached for that NS. It may have a function. Additionally, if the registration status of the UE with respect to the NS associated with the NSAC changes during the registration procedure and/or non-registration procedure and/or NSSAA procedure, etc., the AMF shall notify the NSACF of the may also make a request regarding the maximum number of UEs.
  • the NSACF may have a function of increasing or decreasing the number of PDU sessions for a certain NS so as not to exceed the maximum number of PDU sessions allowed by that NS. Additionally, when the number of PDU sessions using an NS increases (for example, when a certain UE sends a PDU session establishment request message to that NS), NSACF informs the NS that the maximum number of UEs per NS has been reached. It may have a function to check whether there is a person present or not. The SMF may also make a request to the NSACF regarding the maximum number of PDU sessions per NS during the PDU session establishment procedure and/or the PDU session release procedure.
  • SM Session Management
  • NAS Non-Access-Stratum
  • PDU session establishment request messages PDU session establishment accept messages
  • PDU session establishment reject messages PDU session modification requests.
  • PDU session modification command message PDU session modification complete message
  • PDU session modification command reject message PDU session modification reject message
  • PDU session modification command message PDU session modification complete message
  • PDU session modification command reject message PDU session modification command reject message
  • PDU session release request message PDU session release reject message
  • PDU session release command message PDU session release complete message
  • PDU session release complete message A message etc. may also be included.
  • the SM procedure (also referred to as the procedure for SM) includes the PDU session establishment procedure, the PDU session modification procedure, and the UE-requested PDU session release procedure. ) may be included. Note that each procedure may be a procedure initiated from the UE or may be initiated from the NW.
  • MM (Mobility management) message may be a NAS message used for procedures for the MM, and may be a control message sent and received between the UE_A10 and the AMF_A240.
  • MM messages include Registration request messages, Registration accept messages, Registration reject messages, De-registration request messages, and De-registration request messages. De-registration accept message, configuration update command message, configuration update complete message, service request message, service accept message , a service reject message, a notification message, a notification response message, and the like.
  • the MM procedure (also referred to as the procedure for MM) includes the registration procedure (Registration procedure), de-registration procedure (De-registration procedure), generic UE configuration update procedure, It may include authentication/authorization procedures, service request procedures, paging procedures, and notification procedures.
  • the 5GS (5G System) service may be a connection service provided using the core network_B190.
  • the 5GS service may be a service different from the EPS service, or may be a service similar to the EPS service.
  • non-5GS service may be a service other than the 5GS service, and may include an EPS service and/or a non-EPS service.
  • the PDN (Packet Data Network) type indicates the type of PDN connection, and includes IPv4, IPv6, IPv4v6, and non-IP. If IPv4 is specified, it indicates that data will be sent and received using IPv4. If IPv6 is specified, it indicates that data will be sent and received using IPv6. If IPv4v6 is specified, it indicates that data is sent and received using IPv4 or IPv6. If non-IP is specified, it indicates that communication is not using IP, but using a communication method other than IP.
  • a PDU (Protocol Data Unit) session can be defined as an association between a UE and a DN that provides PDU connectivity services, but it is also a connection established between a UE and an external gateway. There may be.
  • the UE can send and receive user data to and from the DN using the PDU session.
  • this external gateway may be UPF, SCEF, etc.
  • the UE can use the PDU session to send and receive user data to and from a device such as an application server located in the DN.
  • each device may manage a PDU session by associating one or more pieces of identification information with it.
  • these identification information may include one or more of DNN, QoS rules, PDU session type, application identification information, NSI identification information, and access network identification information, and may further include other information. It's okay.
  • each piece of identification information associated with the PDU sessions may have the same content or may have different content.
  • DNN Data Network Name
  • DNN may be identification information that identifies the core network and/or the external network such as DN.
  • the DNN can also be used as information for selecting a gateway such as PGW_A30/UPF_A235 to connect the core network B190.
  • the DNN may correspond to an APN (Access Point Name).
  • a network slice is a logical network that provides specific network capabilities and network characteristics.
  • the UE and/or network may support network slices (NW slices; NS) in 5GS.
  • NW slices; NS network slices
  • a network slice may also be simply called a slice.
  • a network slice instance is composed of an instance (entity) of a network function (NF) and a set of necessary resources, and forms a deployed network slice.
  • NF is a processing function in a network, and is adopted or defined by 3GPP.
  • NSI is an entity of NS configured at least one in core network_B.
  • the NSI may be configured by a virtual NF (Network Function) generated using an NST (Network Slice Template).
  • NST Network Slice Template
  • NST Network Slice Template
  • NST Network Slice Template
  • NST Network Slice Template
  • the NSI may be an aggregation within the core network_B190 configured by a plurality of NFs.
  • the NSI may be a logical network configured to separate user data distributed by services or the like.
  • One or more NFs may be configured in the NS.
  • the NF configured in an NS may or may not be a device shared with other NSs.
  • the UE and/or devices within the network may be configured to use one or more NSSAIs based on registration information such as NSSAI and/or S-NSSAI and/or UE usage type and/or one or more NSI IDs, and/or APN. can be assigned to NS.
  • the UE usage type is a parameter value included in the UE registration information and used to identify the NSI.
  • the UE usage type may be stored in the HSS.
  • AMF may select SMF and UPF based on UE usage type.
  • NSSAI Network Slice Selection Assistance Information
  • S-NSSAI Network Slice Selection Assistance Information
  • the UE may store the NSSAI granted by the network for each PLMN. Additionally, NSSAI may be information used to select an AMF.
  • configured NSSAI is NSSAI that is applicable to one or more PLMNs or SNPNs, and is provided to and stored in the UE.
  • the UE may store configured NSSAI for each PLMN, or may store configured NSSAI for each NPN (hereinafter, SNPN and/or PNI-NPN may be collectively expressed as NPN).
  • the configured NSSAI may be information set by the network (PLMN or SNPN).
  • S-NSSAI included in configured NSSAI may be expressed as configured S-NSSAI.
  • configured S-NSSAI may be configured to include S-NSSAI and mapped S-NSSAI.
  • the configured NSSAI may include configured NSSAI stored in the UE and configured NSSAI transmitted from the network to the UE.
  • Requested NSSAI is the NSSAI provided by the UE to the network (current PLMN (serving PLMN, also referred to as current PLMN) or NPN (serving NPN, also referred to as current NPN)) during the registration procedure.
  • the S-NSSAI included in the requested NSSAI may be an S-NSSAI selected from one or more S-NSSAIs included in the configured NSSAI and/or allowed NSSAI associated with the current PLMN or NPN.
  • the S-NSSAI included in the requested NSSAI may be an S-NSSAI selected not to include one or more S-NSSAI included in the pending NSSAI and/or rejected NSSAI.
  • the requested NSSAI may be information indicating a network slice that the UE wishes to register or access.
  • the S-NSSAI included in the requested NSSAI may be expressed as the requested S-NSSAI.
  • the requested NSSAI is included in NAS messages such as registration request messages and/or RRC (Radio Resource Control) messages including NAS (Non-Access-Stratum) messages sent from the UE to the network (PLMN or SNPN).
  • the requested NSSAI may include a requested NSSAI stored in the UE and a requested NSSAI transmitted from the UE to the network (PLMN or SNPN).
  • the mapped S-NSSAI (also referred to as Mapped S-NSSAI) may be the S-NSSAI of the HPLMN mapped to the S-NSSAI of the registered PLMN in a roaming scenario. Additionally, the mapped S-NSSAI may basically be the S-NSSAI used when the UE is roaming, and the S-NSSAI that is not used when the UE is not roaming (also referred to as non-roaming). -Can be NSSAI. Further, the UE may store one or more mapped S-NSSAIs mapped to the configured NSSAIs and the S-NSSAIs included in the Allowed NSSAIs of each access type.
  • the UE may store one or more mapped S-NSSAIs included in the rejected NSSAIs, or mapped S-NSSAIs corresponding to the S-NSSAIs included in the rejected NSSAIs.
  • the mapped NSSAI may include a mapped NSSAI stored in the UE and a mapped NSSAI transmitted from the network to the UE.
  • rejected NSSAI is information indicating one or more network slices in which the UE is not permitted.
  • the rejected NSSAI is information that identifies a network slice to which the network does not allow the UE to connect.
  • the rejected NSSAI may be information that includes one or more combinations of S-NSSAI and rejection reason value (hereinafter also referred to as reason value or rejection reason).
  • the rejection reason value is information indicating the reason why the network rejects the corresponding S-NSSAI.
  • the UE and the network may appropriately store and manage rejected NSSAIs based on the rejection reason value associated with each S-NSSAI.
  • the rejected NSSAI may be included in a NAS message sent from the network to the UE, or an RRC message containing the NAS message, such as a registration acceptance message, a configuration update command, or a registration rejection message.
  • S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected NSSAI may mean any of the first to fourth rejected NSSAIs.
  • the rejected S-NSSAI may mean a rejected S-NSSAI included in any of the first to fourth rejected NSSAIs.
  • the rejected NSSAI may be any one of the first to fourth rejected NSSAIs and pending NSSAIs, or may be a combination thereof.
  • S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected S-NSSAI may include an S-NSSAI and a mapped S-NSSAI.
  • the first rejected NSSAI may be the rejected NSSAI for the current PLMN or SNPN.
  • the first rejected NSSAI may be an NSSAI that is not available in the current PLMN or SNPN.
  • the first rejected NSSAI may be a set of one or more S-NSSAIs that are not available in the current PLMN or SNPN among the S-NSSAIs included in the requested NSSAIs by the UE.
  • the first rejected NSSAI may be a 5GS rejected NSSAI for current PLMN or SNPN.
  • the first rejected S-NSSAI may be a rejected S-NSSAI for current PLMN or SNPN, or may be an S-NSSAI included in a rejected NSSAI for current PLMN or SNPN.
  • the first rejected NSSAI may be a rejected NSSAI stored in the UE and/or the NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the first rejected NSSAI may be information including one or more combinations of an S-NSSAI and a reason value. This rejection reason value may indicate "S-NSSAI not available in the current PLMN or SNPN", and the S-NSSAI associated with the rejection reason value is currently may mean that it is not available for PLMN or SNPN.
  • the first rejected NSSAI may be valid for the entire registered PLMN or registered SNPN.
  • the UE and/or NW may treat the first rejected NSSAI and the S-NSSAI included in the first rejected NSSAI as information independent of the access type.
  • the first rejected NSSAI may be information valid for 3GPP access and non-3GPP access.
  • the UE may delete the first rejected NSSAI from its memory.
  • the UE may delete the first rejected NSSAI from its memory.
  • the UE may delete the first rejected NSSAI. It's fine.
  • the S-NSSAI included in the first rejected NSSAI in the storage unit of the UE may be treated as unusable in the entire current PLMN or SNPN. That is, the UE may be in a state where the MM procedure and/or SM procedure using its S-NSSAI is prohibited in the entire current PLMN or SNPN.
  • the second rejected NSSAI may be the rejected NSSAI for the current registration area (also referred to as registration area).
  • the second rejected NSSAI may be an NSSAI that is not available in the current registration area.
  • the second rejected NSSAI may be a set of one or more S-NSSAIs that are not available in the current registration area among the S-NSSAIs included in the requested NSSAIs by the UE.
  • the second rejected NSSAI may be the rejected NSSAI for the current registration area of 5GS.
  • the second rejected NSSAI may be a rejected NSSAI stored in the UE and/or the NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the second rejected NSSAI When the second rejected NSSAI is a rejected NSSAI transmitted from the NW to the UE, the second rejected NSSAI may be information including one or more combinations of an S-NSSAI and a reason value.
  • This reason value may indicate "S-NSSAI not available in the current registration area", and the S-NSSAI associated with the reason value may indicate that the S-NSSAI is not available in the current registration area. May mean unavailable in the area.
  • the second rejected NSSAI may be valid within the current registration area. That is, the UE and/or NW may treat the second rejected NSSAI and the S-NSSAI included in the second rejected NSSAI as information for each access type. In other words, the second rejected NSSAI may be information valid for each of 3GPP access and non-3GPP access. That is, once the UE transitions to a non-registered state for a certain access, it may delete the second rejected NSSAI from its memory.
  • the S-NSSAI included in the second rejected NSSAI in the storage unit of the UE may be treated as unusable in the current registration area. That is, the UE may be in a state where the MM procedure and/or SM procedure using the S-NSSAI is prohibited in the current registration area.
  • the third rejected NSSAI is an S-NSSAI that requires NSSAA, and is a set of one or more S-NSSAIs for which NSSAA for that S-NSSAI has failed or been cancelled.
  • the third rejected NSSAI may be an NSSAI stored in the UE and/or the NW, or may be transmitted from the NW to the UE.
  • the third rejected NSSAI may be information including one or more combinations of S-NSSAI and rejection reason value.
  • the reason for refusal value at this time may be "S-NSSAI is not available due to the failed or revoked network slice-specific authorization and authentication)", It may be information indicating that NSSAA for the S-NSSAI associated with the rejection reason value has failed or been cancelled.
  • the third rejected NSSAI is valid for the entire registered PLMN.
  • the UE and/or NW may treat the third rejected NSSAI and the S-NSSAI included in the third rejected NSSAI as information independent of the access type.
  • the third rejected NSSAI may be information valid for 3GPP access and non-3GPP access.
  • the third rejected NSSAI may be a different NSSAI than the rejected NSSAI.
  • the third rejected NSSAI may be the first rejected NSSAI.
  • the third rejected NSSAI is a rejected NSSAI in which the UE identifies slices that are rejected due to NSSAA failure or cancellation from the core network. Specifically, while the UE stores the third rejected NSSAI, the UE does not initiate a registration request procedure for the S-NSSAI included in the third rejected NSSAI.
  • the third rejected NSSAI may be identification information that includes one or more S-NSSAIs received from the core network in association with a rejection reason value indicating failure of the NSSAA.
  • the third rejected NSSAI is information that does not depend on the access type.
  • the UE attempts to send a registration request message containing the S-NSSAI included in the third rejected NSSAI to both the 3GPP access and the non-3GPP access. You don't have to.
  • the UE can transmit a registration request message including the S-NSSAI included in the third rejected NSSAI based on the UE policy.
  • the UE may delete the third rejected NSSAI based on the UE policy and transition to a state where it can send a registration request message including the S-NSSAI included in the third rejected NSSAI.
  • the UE may remove the S-NSSAI from the third rejected NSSAI. good.
  • the S-NSSAI included in the third rejected NSSAI in the storage unit of the UE may be treated as unusable in the entire current PLMN or SNPN. That is, the UE may be in a state where the MM procedure and/or SM procedure using the S-NSSAI is prohibited in the current registration area.
  • the fourth rejected NSSAI may be a rejected NSSAI for the current tracking area.
  • the fourth rejected NSSAI may be an NSSAI that is not available in the current tracking area.
  • the fourth rejected NSSAI may be a rejected NSSAI for the current tracking area in the current registration area.
  • the fourth rejected NSSAI may be an NSSAI that is not available in the current tracking area in the current registration area.
  • the fourth rejected NSSAI may be an NSSAI that cannot be used in the current tracking area in the current registration area, but may be an NSSAI that can be used in other tracking areas in the current registration area.
  • the fourth rejected NSSAI is an NSSAI that cannot be used in the current tracking area in the current registration area, and can be used in other tracking areas in the current registration area, and in other registration areas (different from the current registration area). It may be NSSAI available in
  • the fourth rejected NSSAI is a set of S-NSSAIs included in the requested NSSAI by the UE, which are determined by the AMF to be S-NSSAIs that are not available in the current tracking area, or S-NSSAIs that are not available in the current tracking area. It may be a set of S-NSSAIs sent with a rejection reason indicating unavailability.
  • the fourth rejected NSSAI may include one or more S-NSSAIs for the current PLMN, and may include a set of mapped S-NSSAIs if available.
  • the fourth rejected NSSAI may be a rejected NSSAI stored in the UE and/or the NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the fourth rejected NSSAI may be information including one or more combinations of an S-NSSAI and a reason value. This reason value may be the twelfth identification information.
  • the fourth rejected NSSAI may be valid for 3GPP access and/or non-3GPP access.
  • the UE and/or NW may treat the fourth rejected NSSAI as independent of the access type, or may treat the fourth rejected NSSAI as dependent on the access type.
  • the UE and/or NW may manage and/or store the fourth rejected NSSAI for each access type, or may not manage and/or store the fourth rejected NSSAI for each access type.
  • the fourth rejected NSSAI does not depend on the access type. For example, if the UE receives the fourth rejected NSSAI via 3GPP access, the fourth rejected NSSAI or the S - May mean that NSSAI is not only not available via 3GPP access, but also not available via non-3GPP access. Similarly, if the UE receives a fourth rejected NSSAI via a non-3GPP access, the fourth rejected NSSAI or the S-NSSAI included in the fourth rejected NSSAI is not only unavailable via the 3GPP access; It may also mean that it cannot be used via non-3GPP access.
  • the UE and/or NW does not store the fourth rejected NSSAI for each access type (that is, it does not store it separately for each access type, It is preferable, but not limited to, to simply remember the fourth rejected NSSAI.
  • the fourth rejected NSSAI depends on the access type means, for example, if the UE receives the fourth rejected NSSAI via 3GPP access, the fourth rejected NSSAI or the S - May mean that NSSAI is not available via 3GPP access, but does not need to mean that it is not available via non-3GPP access. In other words, it may mean that the use of the fourth rejected NSSAI or the S-NSSAI included in the fourth rejected NSSAI is not restricted for non-3GPP access. Similarly, if the UE receives a fourth rejected NSSAI over a non-3GPP access, it indicates that the fourth rejected NSSAI or the S-NSSAI included in the fourth rejected NSSAI is not available over a non-3GPP access.
  • the UE and/or NW stores the fourth rejected NSSAI for each access type (i.e., stores the fourth rejected NSSAI for each access type). It is desirable to do so, but it is not limited to this.
  • the fourth rejected NSSAI may be applicable to the registration area and/or tracking area that received the rejected NSSAI.
  • the fourth rejected NSSAI may be applied to these PLMNs or SNPNs in the current registration area and/or current tracking area.
  • the fourth rejected NSSAI may be applied not only to the current PLMN or SNPN but also to the equivalent PLMN or equivalent SNPN.
  • the AMF may reject the registration request message.
  • the 5GS registration type indicates mobility registration updating, and the purpose of starting the registration procedure is not to change the network slice to which the UE is currently registered, and the UE is in the current registration area or current tracking area.
  • the UE may not include the requested NSSAI during the registration procedure.
  • the S-NSSAI included in the fourth rejected NSSAI may be associated with one or more tracking areas where the rejected S-NSSAI (fourth rejected S-NSSAI) is not available. It may be.
  • the UE may replace the stored configured NSSAI with the new configured NSSAI.
  • the UE may also delete the mapped S-NSSAI for the stored configured NSSAI and store the mapped S-NSSAI for the new configured NSSAI, or delete the stored mapped S-NSSAI for the configured NSSAI, or delete the stored mapped S-NSSAI for the configured NSSAI.
  • You may delete the S-NSSAI included in the mapped S-NSSAI for the new configured NSSAI for the current PLMN or SNPN from the mapped S-NSSAI for the fourth rejected NSSAI that you remember. good.
  • the UE when it receives a new allowed NSSAI for the current PLMN or SNPN, it may delete the S-NSSAI included in the new allowed NSSAI from the stored fourth rejected NSSAI. In this case, the UE may also delete the S-NSSAI included in the mapped S-NSSAI for the new allowed NSSAI for the current PLMN or SNPN from the stored mapped S-NSSAI for the fourth rejected NSSAI. good.
  • the UE also recognizes the S-NSSAI (fourth rejected S-NSSAI) included in the rejected NSSAI (fourth rejected NSSAI), the received fourth rejected S-NSSAI may be stored in the rejected NSSAI and the mapped S-NSSAI for the rejected NSSAI in the UE based on the reason for rejection, or the fourth rejected , and may be stored in the mapped S-NSSAI for the fourth rejected NSSAI.
  • the UE detects the S-NSSAI (fourth rejected S-NSSAI) included in the rejected NSSAI (fourth rejected NSSAI) and the S-NSSAI is included in the Rejected NSSAI IE, from the allowed NSSAI for the current PLMN or SNPN and its equivalent PLMN or equivalent SNPN that the UE remembers,
  • the S-NSSAI included in the fourth rejected NSSAI related to the same access type (fourth rejected S-NSSAI) may be deleted.
  • the UE detects the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected If a rejected S-NSSAI) is received and the S-NSSAI is included in the Extended rejected NSSAI IE, the current PLMN or SNPN and its equivalent PLMN or equivalent SNPN that the UE remembers , the S-NSSAI included in the fourth rejected NSSAI related to the same access type (fourth rejected S-NSSAI) may be deleted from the allowed NSSAI.
  • the UE receives the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected rejected S-NSSAI) and the S-NSSAI is included in the Extended rejected NSSAI IE, the current PLMN or SNPN and its equivalent PLMN or equivalent SNPN that the UE remembers:
  • the S-NSSAI included in the fourth rejected NSSAI related to the same access type (fourth rejected S-NSSAI) may be deleted from the allowed NSSAI.
  • the UE detects the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected rejected S-NSSAI), the UE remembers the current PLMN or SNPN and its equivalent PLMN or equivalent SNPN from the allowed NSSAI to the fourth rejected NSSAI associated with the same access type.
  • S-NSSAI included in mapped S-NSSAI may be deleted.
  • the UE receives the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected rejected S-NSSAI), the UE remembers the S-NSSAI included in the mapped S-NSSAI for the fourth rejected NSSAI related to the same access type from the mapped S-NSSAI for the allowed NSSAI. You may delete it.
  • the UE detects the S-NSSAI (fourth rejected S-NSSAI) included in the rejected NSSAI (fourth rejected NSSAI) and the S-NSSAI is included in the Rejected NSSAI IE, the current PLMN or SNPN that the UE remembers and the pending NSSAI for its equivalent PLMN or SNPN
  • the S-NSSAI included in the fourth rejected NSSAI related to the access type may be deleted.
  • the UE detects the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected If a rejected S-NSSAI) is received and the S-NSSAI is included in the Extended rejected NSSAI IE, the current PLMN or SNPN and its equivalent PLMN or SNPN stored by the UE,
  • the S-NSSAI included in the fourth rejected NSSAI related to the same access type may be deleted from the pending NSSAI.
  • the UE detects the S-NSSAI (fourth rejected NSSAI) included in the rejected NSSAI (fourth rejected If a rejected S-NSSAI) is received and the S-NSSAI is included in the Extended rejected NSSAI IE, the current PLMN or SNPN and its equivalent PLMN or SNPN stored by the UE,
  • the S-NSSAI contained in the mapped S-NSSAI to a fourth rejected NSSAI related to the same access type may be deleted from the pending NSSAI.
  • the UE deregisters via the access that received the fourth rejected NSSAI or the fourth rejected S-NSSAI, in other words, if the UE completes the deregistration procedure via the access, the UE The fourth rejected NSSAI and/or its access type may be deleted.
  • the UE remembers the fourth rejected NSSAI and/or its access. Types may be deleted.
  • the UE when the UE transitions from the 5GMM-REGISTERED state to the 5GMM-DEREGISTERED state, or from the 5GMM-DEREGISTERED state to the 5GMM-REGISTERED state, the UE stores the fourth rejected NSSAI and/or its Access types may be deleted.
  • the UE that has received the fourth rejected NSSAI included in the registration acceptance message, registration refusal message, configuration update command message, or non-registration request message will receive the rejected S-NSSAI (the fourth rejected Actions may be taken based on the reasons for rejection included in the S-NSSAI).
  • the reason for rejection included in the rejected S-NSSAI is "S-NSSAI not available in the current tracking area" and/or "S-NSSAI not available in the current tracking area” and/or "S-NSSAI not available in the current tracking area” Indicates "S-NSSAI not available in the current tracking area in the current registration area" and/or "No network slices available” , the UE may be prohibited from using its fourth S-NSSAI in the current tracking area. That is, the UE may be in a state where the MM procedure and/or SM procedure using the fourth S-NSSAI is prohibited in the current tracking area.
  • this restriction may be lifted if the fourth rejected S-NSSAI is removed. That is, the UE may be in a state where it can execute the MM procedure and/or the SM procedure using the fourth S-NSSAI in the current tracking area.
  • the UE when the UE sends a registration request message including the requested NSSAI, the UE remembers the S-NSSAI included in the fourth rejected NSSAI (fourth rejected S-NSSAI) and/or the fourth rejected
  • the S-NSSAI included in the requested NSSAI may be selected from among the S-NSSAIs other than the S-NSSAI included in the mapped S-NSSAI for the NSSAI.
  • AMF shall identify its S-NSSAI as "S-NSSAI not available in the current tracking area” and/or "S-NSSAI not available in the current tracking area” and/or "S-NSSAI not available in the current tracking area” -NSSAI (S-NSSAI not available in the current tracking area in the current registration area)" and/or "No network slices available”. You may also send a registration acceptance message containing:
  • the fourth rejected S-NSSAI may be not only the rejected S-NSSAI included in the fourth rejected NSSAI but also the rejected S-NSSAI not included in the fourth rejected NSSAI. Further, the description regarding the fourth rejected NSSAI described above may be read as the description regarding the fourth rejected S-NSSAI.
  • the fourth rejected NSSAI and the fourth rejected S-NSSAI may be included as LADN information included in the registration acceptance message or configuration update command, and may be notified from the core network side to the UE.
  • the mapped S-NSSAI for the fourth rejected NSSAI may be the mapped S-NSSAI corresponding to the fourth rejected NSSAI.
  • the mapped S-NSSAI for the fourth rejected NSSAI is the S-NSSAI of the registered PLMN (i.e., the S-NSSAI included in the fourth rejected NSSAI, or the fourth rejected S-NSSAI) in the roaming scenario. It may be the S-NSSAI of HPLMN mapped to .
  • the mapped S-NSSAI for the fourth rejected NSSAI may be valid for 3GPP access and/or non-3GPP access.
  • the UE and/or NW may treat the mapped S-NSSAI for the fourth rejected NSSAI as independent of the access type, or treat the mapped S-NSSAI for the fourth rejected NSSAI as dependent on the access type. It may be treated as such.
  • the UE and/or NW may or may not manage and/or store the mapped S-NSSAI for the fourth rejected NSSAI for each access type. Good too.
  • the mapped S-NSSAI for the fourth rejected NSSAI does not depend on the access type. For example, if the UE receives the mapped S-NSSAI for the fourth rejected NSSAI via 3GPP access, the mapped S-NSSAI for the fourth rejected NSSAI This may mean that the mapped S-NSSAI for is not only not available via 3GPP access, but also not available via non-3GPP access. Similarly, if the UE receives a mapped S-NSSAI for the fourth rejected NSSAI via non-3GPP access, the mapped S-NSSAI for the fourth rejected NSSAI is not only unavailable via the 3GPP access but also non- It may also mean that it is not available via 3GPP access.
  • the UE and/or NW does not store the mapped S-NSSAI for the fourth rejected NSSAI for each access type (in other words, the mapped S-NSSAI for the fourth rejected NSSAI does not depend on the access type).
  • the mapped S-NSSAI for the fourth rejected NSSAI does not depend on the access type.
  • the mapped S-NSSAI for the fourth rejected NSSAI depends on the access type, for example, if the UE receives the mapped S-NSSAI for the fourth rejected NSSAI via 3GPP access, then the mapped S-NSSAI for the fourth rejected NSSAI This may mean that the mapped S-NSSAI is not available via 3GPP access, but it does not need to mean that it is not available via non-3GPP access. In other words, it may mean that the mapped S-NSSAI for the fourth rejected NSSAI is not restricted from being used in non-3GPP access.
  • the UE receives a mapped S-NSSAI for the fourth rejected NSSAI via non-3GPP access, it means that the mapped S-NSSAI for the fourth rejected NSSAI is not available via non-3GPP access. However, this does not mean that it cannot be used via 3GPP access. In other words, it may mean that the mapped S-NSSAI for the fourth rejected NSSAI is not restricted from being used in 3GPP access. Note that when the mapped S-NSSAI for the fourth rejected NSSAI depends on the access type, the UE and/or NW stores the mapped S-NSSAI for the fourth rejected NSSAI for each access type (that is, the mapped S-NSSAI for the fourth rejected NSSAI depends on the access type). It is preferable, but not limited to, to memorize the fourth rejected NSSAI for each NSSAI.
  • the fourth rejected NSSAI and/or the fourth rejected S-NSSAI in the storage unit of the UE, and/or the S-NSSAI included in the mapped S-NSSAI for the fourth rejected NSSAI are in the current tracking area. , or may be treated as unavailable in the current tracking area in the current registration area. That is, the UE may be in a state in which the MM procedure and/or SM procedure using its S-NSSAI is prohibited in the current tracking area or in the current tracking area in the current registration area. In other words, the UE is prohibited from performing MM and/or SM procedures using its S-NSSAI in a tracking area other than the current tracking area or in a tracking area other than the current tracking area in the current registration area. It may be in a state where there is no.
  • pending NSSAI (also referred to as Pending NSSAI) is an S-NSSAI in which the network requires network slice specific authentication, and network slice specific authentication has not been completed and cannot be used with the current PLMN.
  • a pending NSSAI may be a 5GS Rejected NSSAI due to NSSAA or a pending NSSAI.
  • the pending NSSAI may be an NSSAI stored in the UE or the NW, or may be an NSSAI sent from the NW to the UE. Note that the pending NSSAI is not limited to the rejected NSSAI, but may be an NSSAI independent of the rejected NSSAI.
  • the pending NSSAI When the pending NSSAI is an NSSAI transmitted from the NW to the UE, the pending NSSAI may be information including one or more combinations of S-NSSAI and rejection reason value.
  • the reason for rejection value at this time may be "S-NSSAI is pending for the S-NSSAI", and the S-NSSAI associated with the reason for rejection value is The information may indicate that the UE is prohibited from using the NSSAI or is pending until the NSSAA for the NSSAI is completed.
  • the pending NSSAI is valid for the entire registered PLMN.
  • the UE and/or NW may treat the S-NSSAI included in the third rejected NSSAI and pending NSSAI as information independent of the access type.
  • the pending NSSAI may be valid information for 3GPP access and non-3GPP access.
  • the pending NSSAI may be different from the rejected NSSAI.
  • the pending NSSAI may be the first rejected NSSAI.
  • the pending NSSAI is an NSSAI that is composed of one or more S-NSSAIs that identify slices for which the UE has pending procedures. Specifically, while storing the pending NSSAI, the UE does not initiate a registration request procedure for the S-NSSAI included in the pending NSSAI. In other words, the UE does not use the S-NSSAI included in the pending NSSAI during the registration procedure until the NSSAA for the S-NSSAI included in the pending NSSAI is completed.
  • pending NSSAI is identification information that includes one or more S-NSSAIs received from the core network in association with a rejection reason value indicating pending NSSAA.
  • pending NSSAI is information independent of access type. Specifically, if the UE stores the pending NSSAI, the UE does not attempt to send a registration request message including the S-NSSAI included in the pending NSSAI to both the 3GPP access and the non-3GPP access.
  • a tracking area is one or more ranges managed by the core network that can be represented by the location information of UE_A10.
  • the tracking area may be composed of multiple cells. Further, the tracking area may be a range where control messages such as paging are broadcast, or a range where UE_A10 can move without performing a handover procedure. Furthermore, the tracking area may be a routing area, a location area, or anything similar thereto.
  • the tracking area may be a TA (Tracking Area).
  • the tracking area may be identified by TAI (Tracking Area Identity), which is composed of TAC (Tracking area code) and PLMN.
  • a registration area (also referred to as a registration area) is a collection of one or more TAs assigned to a UE by the AMF. Note that while the UE_A10 is moving within one or more TAs included in the registration area, it may be possible to move without transmitting or receiving a signal for updating the tracking area. In other words, the registration area may be a group of information indicating an area to which the UE_A10 can move without executing a tracking area update procedure.
  • a registration area may be identified by a TAI list made up of one or more TAIs.
  • the UE ID is information for identifying the UE.
  • the UE ID is SUCI (SUbscription Concealed Identifier), SUPI (Subscription Permanent Identifier), GUTI (Globally Unique Temporary Identifier), IMEI (International Mobile Subscriber Identity), or IMEISV (IMEI Software Version).
  • SUCI SUbscription Concealed Identifier
  • SUPI Subscribe Permanent Identifier
  • GUTI Globally Unique Temporary Identifier
  • IMEI International Mobile Subscriber Identity
  • IMEISV IMEI Software Version
  • the UE ID may be other information configured within the application or network.
  • the UE ID may be information for identifying a user.
  • NSSAA Network Slice-Specific Authentication and Authorization
  • a PLMN and a network device equipped with the NSSAA function can perform NSSAA procedures for a certain S-NSSAI based on the registration information of the UE.
  • a UE with NSSAA functionality may manage and store rejected NSSAIs for pending NSSAA and/or rejected NSSAIs for failure of NSSAA.
  • NSSAA may be referred to as network slice-specific authentication and authorization procedures or authentication and authorization procedures.
  • An S-NSSAI that requires NSSAA is an S-NSSAI that requires NSSAA and is managed by a core network and/or a core network device.
  • the core network and/or core network device may store S-NSSAIs that require NSSAA by associating and storing information indicating whether or not S-NSSAIs are required.
  • the core network and/or the core network device may further include an S-NSSAI that requires NSSAA and information indicating whether the NSSAA is complete or in a state where the NSSAA is complete and allowed or successful. The information may be stored in association with the other information.
  • the core network and/or the core network device may manage S-NSSAI that requires NSSAA as information that is not related to the access network.
  • a UE in single registration mode has only one active MM state. That is, a UE in single registration mode is only active in either the RM state (5GMM state) in 5GC or the EMM state in EPC. Also, a UE in single registration mode is in 5GC NAS mode when connecting to 5GC, and in EPC NAS mode when connecting to EPC. Also, since a UE in single registration mode can only register to either 5GC or EPC, when moving between EPC and 5GC, mapping between EPS-GUTI (also referred to as 4G-GUTI) and 5G-GUTI is required. It is necessary to
  • a UE in dual registration mode may be in a state where it can register independently with the 5GC and EPC.
  • a UE in dual registration mode can maintain 5G-GUTI and EPS-GUTI (also referred to as 4G-GUTI) independently.
  • SNPN is also a type of NPN that is 5GS deployed for non-public use, and is an NPN that is operated by an NPN operator and does not depend on the NF provided by a PLMN. Further, the SNPN is identified by a combination of PLMN ID and NID (Network Identifier). Further, a UE that can use SNPN may support SNPN access mode (also referred to as SNPN access operation mode). Additionally, a UE configured to operate in the SNPN access mode may be able to select and register with an SNPN, or may not be able to select a PLMN.
  • SNPN access mode also referred to as SNPN access operation mode
  • a UE configured to operate in the SNPN access mode may be able to perform the SNPN selection procedure, or may not be able to perform the PLMN selection procedure. Additionally, even if the UE is SNPN enabled, a UE that is not configured to operate in SNPN access mode may not be able to select and register with SNPN, and may not be able to select SNPN and register with SNPN. It's good to be able to choose. Furthermore, a UE that is not configured to operate in the SNPN access mode may not be able to perform the SNPN selection procedure, or may be able to perform the PLMN selection procedure.
  • a UE operating in SNPN access mode may be able to select SNPN via Uu (3GPP access). Additionally, a UE operating in SNPN access mode can select SNPN via Uu or NWu established via a PDU session provided by the selected PLMN via Uu or NWu (non-3GPP access). Good too. Additionally, a UE that does not operate in SNPN access mode can select a PLMN via Uu or NWu established via a PDU session provided by the selected SNPN via Uu or NWu (non-3GPP access). Good too.
  • the SNPN access mode may be managed and/or applied on an access basis. That is, it may be managed and/or applied separately for 3GPP access and non-3GPP access.
  • activation or deactivation of the SNPN access mode for 3GPP access and activation or deactivation of the SNPN access mode for non-3GPP access may be independent. That is, when the SNPN access mode for 3GPP access is activated, the SNPN access mode for non-3GPP access may be activated or deactivated. Further, when the SNPN access mode for 3GPP access is deactivated, the SNPN access mode for non-3GPP access may be activated or deactivated.
  • SNPN access mode for 3GPP access is SNPN access mode for 3GPP access, SNPN access mode over 3GPP access, and SNPN access mode via 3GPP access. ) may also be called.
  • SNPN access mode for non-3GPP access is SNPN access mode for non-3GPP access
  • SNPN access mode for non-3GPP access is SNPN access mode for non-3GPP access. It may also be referred to as access mode (SNPN access mode via non-3GPP access).
  • activation may be replaced with “operating” and “deactivation” may be replaced with “not operating.” That is, activation of the SNPN access mode for 3GPP access may mean operating in the SNPN access mode for 3GPP access. Furthermore, deactivation of the SNPN access mode for 3GPP access may mean that the SNPN access mode for 3GPP access is not operated. Furthermore, activation of the SNPN access mode for non-3GPP access may mean operating in the SNPN access mode for non-3GPP access. Furthermore, the fact that the SNPN access mode for non-3GPP access is deactivated may mean that the SNPN access mode for non-3GPP access is not operated.
  • the SNPNs may be classified into Home SNPNs (also referred to as HSNPNs) and Visited SNPNs (also referred to as VSNPNs). Note that if the UE does not roam between SNPNs, the SNPN may be treated as the same as the Home SNPN.
  • the Home SNPN may be an SNPN that the UE can register as a home. Further, the Home SNPN may be an SNPN that the UE selects first in SNPN selection. Further, the Home SNPN may be an SNPN in which at least part of the information included in the SNPN identity (also referred to as SNPN ID) matches at least part of the information included in the IMSI of the UE. In addition, the Home SNPN is an SNPN where the MCC and MNC included in the PLMN Identity (also referred to as PLMN ID) included in the SNPN identity (also referred to as SNPN ID) match the MCC and MNC included in the IMSI of the UE. There may be.
  • the Visited SNPN may be an SNPN that the UE can register as a non-home SNPN. Furthermore, the Visited SNPN may be an SNPN that the UE does not register as a home. In addition, the visited SNPN may be an SNPN that the UE does not select first in SNPN selection. Furthermore, the Visited SNPN may be an SNPN in which at least part of the information included in the SNPN identity (also referred to as SNPN ID) does not match at least part of the information included in the IMSI of the UE.
  • SNPN identity also referred to as SNPN ID
  • a Visited SNPN is an SNPN in which the MCC and MNC included in the PLMN Identity (also referred to as PLMN ID) included in the SNPN identity (also referred to as SNPN ID) do not match the MCC and MNC included in the UE's IMSI. There may be.
  • equivalent HSNPN also referred to as equivalent Home SNPN, EHSNPN
  • EHSNPN equivalent Home SNPN
  • HSNPN home SNPN
  • the equivalent HSNPN may be one or more SNPNs included in the equivalent HSNPN list, or may be one or more SNPNs not included in the equivalent VSNPN list.
  • equivalent VSNPN (also referred to as equivalent Visited SNPN, EVSNPN) is mutually equivalent to the current SNPN (herein Visited SNPN (also referred to as VSNPN)) in SNPN selection, cell selection, and/or cell reselection. It may be an SNPN that is considered as a SNPN. Further, the equivalent VSNPN may be one or more SNPNs included in the equivalent VSNPN list, or one or more SNPNs not included in the equivalent HSNPN list.
  • equivalent SNPN may be a concept that includes equivalent HSNPN and/or equivalent VSNPN. That is, ESNPN may refer to equivalent HSNPN and/or equivalent VSNPN.
  • the SNPN that the UE has successfully registered may be an RSNPN (Registered SNPN; also referred to as a registered SNPN).
  • RSNPN Registered SNPN
  • identification information transmitted and received, and stored and/or managed by each device will be described.
  • the first identification information is requested NSSAI (also referred to as requested NSSAI IE).
  • the second identification information is unavailability period or information including unavailability period.
  • the third identification information is information indicating the type of registration requested.
  • the third identification information may be 5GS registration type.
  • the third identification information may indicate initial registration, mobility registration updating, or periodic registration updating. may indicate emergency registration, may indicate SNPN onboarding registration, may indicate disaster roaming mobility registration update, It may also indicate disaster roaming initial registration. Additionally, the third identification information may indicate that the registration is for an unavailability period, or that the registration is for an unavailability period, or that the registration is for unavailability, or that the registration is for unavailability. .
  • the fourth identification information is UE capability information.
  • the fourth identification information may be 5GMM capability. Further, the fourth identification information may be information indicating whether the UE supports a function related to unavailability period. Further, the fourth identification information may be information indicating that the UE supports a function related to unavailability period.
  • the fifth identification information may be information indicating that transmission of an updated timer value is requested. Further, the fifth identification information may be information indicating that transmission of the updated twelfth identification information is requested.
  • the sixth identification information is information that includes at least one of the first to fifth identification information.
  • the eleventh identification information may be information indicating a network slice.
  • the eleventh identification information may be NSSAI.
  • the eleventh identification information is an allowed NSSAI, and/or a rejected NSSAI, and/or an extended rejected NSSAI, and/or a pending NSSAI, and/or a configured NSSAI, which is transmitted from the network to the UE. good.
  • the twelfth identification information is a timer value.
  • the twelfth identification information may be a T3512 value.
  • the T3512 value may be a timer value set in a periodic registration update timer.
  • the thirteenth identification information is information indicating an extension of the periodic registration update timer.
  • the thirteenth identification information may be information indicating an extension of the periodic registration update timer that has already been set.
  • the fourteenth identification information is network capability information.
  • the fourteenth identification information may be 5GS network feature support.
  • the fourteenth identification information may be information indicating whether the network supports a function related to unavailability period.
  • the fourteenth identification information may be information indicating that the network supports a function related to unavailability period.
  • the fifteenth identification information is information indicating whether the settings regarding the unavailability period have been completed. Further, the fifteenth identification information may indicate that the settings regarding the unavailability period have been completed, or may indicate that the settings regarding the unavailability period have not been completed.
  • the 16th identification information is information that includes at least one of the 11th to 15th identification information.
  • the first to sixth identification information and the eleventh to 16th identification information are stored in advance by the UE, the base station, and/or the AMF, and/or the core network device or network function other than the AMF. It may be information that exists. Furthermore, when these pieces of identification information are transmitted and received, the receiving side may store the received identification information.
  • the hardware is configured as physical hardware, the same logical hardware, or the same software.
  • the content described in this embodiment is also applicable when these are configured as different devices/functions (that is, different physical hardware, or different logical hardware, or different software).
  • data may be sent and received directly between them, data may be sent and received via the N26 interface between the AMF and MME, or data may be sent and received via the UE.
  • the registration procedure is a procedure for the UE to take the lead in registering with the access network_B and/or the core network_B and/or the DN.
  • the UE may execute this procedure in a state in which it is not registered with the network (also referred to as the non-registered state or 5GMM-DEREGISTERED state) or in a state in which it is registered in the network (also referred to as the registered state or 5GMM-REGISTERED state). ) to execute this procedure.
  • a UE in an unregistered state may start this procedure at any timing.
  • each device can transition to a registered state (5GMM-REGISTERED state) based on the completion of the registration procedure.
  • the registration status may be managed by each device for each access.
  • each device may independently manage the registration state for 3GPP access (registered state or unregistered state) and the registration state for non-3GPP access.
  • the registration procedure includes a procedure for updating the location registration information of the UE in the network, a procedure for periodically notifying the UE status from the UE to the network, and/or a procedure for specifying the UE in the network. It may also be a procedure for updating the parameters of.
  • the UE may initiate the registration procedure when it moves to a TA outside its current registration area. In other words, the UE may start the registration procedure when it moves to a TA different from the TA indicated in the TA list it maintains. Additionally, the UE may initiate a registration procedure when the context of each device needs to be updated due to disconnection or invalidation of a PDU session. Additionally, the UE may initiate a registration procedure if there is a change in the capability information and/or preferences regarding the UE's PDU session establishment. Furthermore, the UE may periodically initiate a registration procedure. Furthermore, the UE may initiate a registration procedure based on the completion of the MM procedure or the SM procedure, or based on information received from the network in each procedure. Further, the UE may start this procedure after completing this procedure. Note that the UE is not limited to these, and may execute the registration procedure at any timing.
  • this procedure may be started by a UE in an unregistered state, (b) this procedure may be started by a UE in a registered state, or (c) this procedure may be started by a UE in a registered state. (d) This procedure may be initiated by a UE that is not scheduled for an event such as an OS upgrade, security patch update, modem reset, modem software update, etc., or (d) a UE that is in a registered state.
  • an event such as an OS upgrade, security patch update, modem reset, modem software update, etc.
  • this procedure may be executed in a PLMN (HPLMN or VPLMN), an equivalent PLMN, an SNPN, or an equivalent SNPN.
  • PLMN HPLMN or VPLMN
  • SNPN SNPN
  • the above-mentioned procedure for transitioning the UE from the state where it is not registered with the network (non-registered state) to the state where it is registered (registered state) is the initial registration procedure, or the initial registration procedure. It may be a registration procedure for initial registration.
  • the registration procedure executed when the UE is registered in the network (registration state) is the registration procedure for mobility and periodic registration update, or the registration procedure for mobility and periodic registration update, or the registration procedure for mobility and periodic registration update. It may be a mobility and periodic registration procedure.
  • the UE may store at least one of each NSSAI and/or each S-NSSAI included in each NSSAI described in Section 2.6.
  • the UE starts the registration procedure by transmitting a registration request message to the AMF (S600) (S602) (S604). Specifically, the UE transmits an RRC message including a registration request message to a base station device (5G AN, also referred to as gNB) (S600).
  • the registration request message is a NAS message sent and received on the N1 interface.
  • the RRC message may be a control message transmitted and received between the UE and the base station device.
  • NAS messages are processed at the NAS layer, and RRC messages are processed at the RRC layer. Note that the NAS layer is a layer higher than the RRC layer.
  • the UE can transmit the first to sixth identification information by including them in the registration request message and/or the RRC message.
  • the first to sixth identification information may be as described in Section 2.6.
  • the UE transmits this identification information to a different control message, for example, a layer lower than the RRC layer (for example, MAC (Medium Access Control) layer, RLC (Radio Link Control) layer, PDCP (Packet Data It may also be transmitted while being included in a control message of the Convergence Protocol layer, SDAP (Service Data Adaptation Protocol) layer, etc.).
  • MAC Medium Access Control
  • RLC Radio Link Control
  • PDCP Packet Data It may also be transmitted while being included in a control message of the Convergence Protocol layer, SDAP (Service Data Adaptation Protocol) layer, etc.
  • the UE may indicate that the UE supports each function, may indicate the UE's request, or may indicate both of these. .
  • the information indicating whether or not to support the function requested by the UE and the information indicating whether or not to permit use of that function may be transmitted as the same identification information.
  • transmitting information indicating that the UE supports a certain feature may indicate that the UE requests use of that feature.
  • the UE may indicate that it supports a certain feature by transmitting information indicating that the UE requests use of that feature.
  • the UE may indicate that it does not request use of a certain feature by transmitting information indicating that the UE does not support that feature.
  • the UE may also indicate that it does not support a certain feature by transmitting information indicating that the UE does not request use of that feature.
  • the UE determines which identification information among the first to sixth identification information to transmit to the network based on the UE's capability information, the UE policy, the UE state, and/or the user. The selection and determination may be made based on the registration information of the UE, the context held by the UE, and/or the identification information transmitted and received in a procedure executed before this procedure.
  • the UE may decide each time which identification information among the first to sixth identification information is to be transmitted to the network in the above (a) to (f).
  • a UE that does not support functionality related to the unavailability period does not need to transmit the second identification information.
  • a UE that does not support functionality related to unavailability period may be registered for unavailability period, or registered for unavailability period, or registered for unavailability, or registered for unavailability. There is no need to transmit the third identification information indicating that the
  • a UE that does not support functionality related to unavailability period may be registered for unavailability period, or registered for unavailability period, or registered for unavailability, or registered for unavailability.
  • Third identification information indicating something other than "certain" may be transmitted.
  • a UE that does not support a function related to the unavailability period may transmit fourth identification information indicating that the UE does not support the function related to the unavailability period.
  • a UE that does not support the function related to the unavailability period does not need to transmit the fourth identification information indicating that it supports the function related to the unavailability period.
  • a UE that supports the functionality related to the unavailability period does not need to transmit the second identification information in the cases of (a) and/or (c) and/or (f).
  • a UE that supports the functionality related to the unavailability period may transmit the second identification information in (d) and/or (e).
  • second identification information indicating the new (updated) unavailability period may be transmitted.
  • a UE that supports functionality related to unavailability period may be registered for unavailability period, or registration for unavailability period. Even if you send third identifying information that indicates something other than "the registration is for unavailability, the registration is for unavailability, or the registration is for unavailability" (e.g., initial registration, mobile registration renewal, periodic registration renewal, etc.) good.
  • a UE supporting functions related to unavailability period may be registered for unavailability period, or unavailability period, or unavailability period.
  • Third identification information indicating that the registration is for "unavailability” or “registration for unavailability” may be transmitted.
  • a UE that supports a function related to an unavailability period may transmit fourth identification information indicating that it supports a function related to an unavailability period.
  • a UE that supports a function related to the unavailability period does not need to transmit fourth identification information indicating that the UE does not support the function related to the unavailability period.
  • the UE may set a second timer containing the value of the unavailability period after the change. Identification information may be transmitted.
  • the UE may transmit the second identification information.
  • the UE may generate an unavailability period based on information notified from an upper layer.
  • the unavailability period may be transmitted to the UAV-C (UAV controller).
  • UAV-C UAV controller
  • the UE is a UAV
  • USS Uncrewed Aerial System Service Supplier
  • UTM Uncrewed Aerial System Traffic Management
  • UAS-NF Uncrewed Aerial System Network Function
  • An unavailability period may be sent to the UAV-C.
  • the unavailability period may be sent to the USS and/or UTM and/or UAS-NF.
  • the UE does not need to be limited to the above conditions when deciding which of the first to sixth pieces of identification information to send to the network. It may be carried out under a combination of conditions.
  • the UE may include information other than the first to sixth identification information in the registration request message and/or RRC message, for example, the UE ID and/or PLMN ID and/or AMF identification information. It's okay.
  • the AMF identification information may be information that identifies an AMF or a set of AMFs, such as 5G S-TMSI (5G S-Temporary Mobile Subscription Identifier) or GUAMI (Globally Unique AMF Identifier). It's fine.
  • the base station device selects an AMF to which to transfer the registration request message (S602).
  • the base station device may select an AMF based on identification information included in the registration request message and/or the RRC message. For example, the base station device may select an AMF included in the network slice identified by the first identification information, or an AMF that has connectivity to the network slice identified by the first identification information.
  • the AMF selection method is not limited to this, and the base station apparatus may select the AMF based on conditions other than this.
  • the base station device extracts the registration request message from the received RRC message and transfers the registration request message to the selected AMF (S604). Note that if the first to sixth pieces of identification information are included in the RRC message but not in the registration request message, those pieces of identification information may be transferred to the selected AMF together with the registration request message (S604). .
  • the AMF when the AMF receives the registration request message and/or the identification information, it may perform the first condition determination.
  • the first condition determination is for determining whether the network accepts the request from the UE. If the AMF determines that the first condition is true, it may execute the procedures from S610 to S612. Further, when the AMF determines that the first condition determination is false, the AMF may execute the procedure of S610.
  • the first condition determination may be performed by a network function (also referred to as NF) other than the AMF.
  • NF network function
  • the AMF provides the NF with at least the information necessary to perform the first condition determination, specifically, the information received from the UE. (S606). If the NF determines whether the first condition determination is true or false based on the information received from the AMF, it sends information including the result of the first condition determination (that is, whether it is true or false) to the AMF. You can tell me.
  • the AMF may determine the identification information and/or control message to transmit to the UE based on the first condition determination result received from the NF.
  • control message transmitted and received in S610 may be a registration accept message or a registration reject message.
  • the control message sent and received in S610 may be a registration acceptance message, and if the first condition determination is false, the control message sent and received in S610 is It may be a registration acceptance message or a registration rejection message.
  • the first condition determination is based on reception of a registration request message, and/or each identification information included in the registration request message, subscriber information, and/or network capability information, and/or operator policy, and/or each identification information included in the registration request message. It may be executed based on the state of the network, the user's registration information, the context held by the AMF, and/or the like.
  • the first condition determination may be determined to be true; if the network does not permit or reject the UE's request, the first condition determination may be determined to be false. It's okay to be. Furthermore, the first condition determination may be determined to be true even if the network permits or does not reject only part of the UE's requests, or even if there are some UE requests that are not permitted. Furthermore, if the network does not permit or rejects all of the UE's requests, the first condition determination may be determined to be false.
  • the first condition determination may be determined to be true; If not, the first condition determination may be determined to be false. Furthermore, if the identification information to be transmitted and received is permitted, the first condition determination may be determined to be true, and if the identification information to be transmitted and received is not permitted, the first condition determination may be determined to be false.
  • the AMF may include one or more pieces of identification information among the eleventh to sixteenth pieces of identification information in the control message, and transmit the control message to the UE via the base station device.
  • the 11th to 16th identification information may be as shown in Chapter 2.6.
  • the AMF may indicate whether the network supports each function or not, and may indicate whether the UE's request has been accepted. or a combination thereof. Note that the information indicating support for each function and the information indicating a request to use each function may be transmitted and received as the same identification information, or may be transmitted and received as different identification information.
  • the information indicating whether or not to support the function requested by the UE and the information indicating whether or not to permit use of the function may be transmitted as the same identification information. For example, by transmitting information indicating that a function requested by the UE is supported, it may be possible to indicate that use of the function is permitted. Furthermore, by transmitting information indicating that use of the function requested by the UE is permitted, it may be indicated that the function requested by the UE is supported. Further, by transmitting information indicating that the function requested by the UE is not supported, the UE may indicate that the use of the function is not permitted. Alternatively, the terminal may indicate that the function requested by the UE is not supported by transmitting information indicating that the use of the function requested by the UE is not permitted.
  • the AMF receives a registration request message from the UE that includes at least one of the first to sixth identification information, or if the AMF receives a registration request message that does not include at least one of the first to sixth identification information from the UE, When the request message is received, at least one of the eleventh to sixteenth pieces of identification information may be included in the control message and transmitted.
  • the AMF determines which identification information among the 11th to 16th identification information is to be included in the control message, based on each received identification information, and/or subscriber information, and/or network capability information, and /or based on operator policies, and/or network conditions, and/or user registration information, and/or context held by AMF, and/or identification information sent and received in procedures executed prior to this procedure. , may be determined.
  • the AMF determines which identification information among the 11th to 16th identification information to transmit to the UE based on the received control message and/or identification information. You may decide on a case-by-case basis.
  • the AMF makes a decision without considering the unavailability period indicated by the second identification information.
  • the twelfth identification information may be transmitted.
  • the AMF may not transmit the thirteenth identification information.
  • the AMF does not need to transmit the fifteenth identification information.
  • the AMF indicates the timer value determined by considering the second identification information. Twelfth identification information may be transmitted. For example, when the AMF is not transmitting a T3512 value to the UE, the AMF sets the T3512 value to a period longer than the period indicated by the second identity, and sets the twelfth identity indicating the T3512 value. You can also send it. Also, for example, if the AMF has already sent the T3512 value to the UE, it compares the T3512 value with the period indicated by the second identity, and the T3512 value is transmitted to the UE.
  • the T3512 value may be set to the period that has already been transmitted, and the twelfth identification information indicating the T3512 value may be transmitted. Conversely, if the T3512 value is the same as or shorter than the period indicated by the second identification information, the AMF sets the T3512 value to a period longer than the period indicated by the second identification information, and the AMF sets the T3512 value to a period longer than the period indicated by the second identification information. Twelfth identification information indicating the value may be transmitted.
  • the AMF may determine the second identity information without considering the second identity information. 12 identification information may be transmitted.
  • the network supports a function related to unavailability period, "registration for unavailability period, or registration for unavailability period, or registration for unavailability," If the third identification information indicating that the registration is related to unavailability has not been received from the UE, the twelfth identification information and/or the thirteenth identification information may not be transmitted.
  • the AMF may transmit the twelfth identification information and/or the thirteenth identification information.
  • the AMF may transmit the thirteenth identification information.
  • the AMF shall transmit the twelfth identification information and/or the thirteenth identification information. good.
  • the AMF may transmit fourteenth identification information indicating that the network supports the function related to the unavailability period.
  • the AMF may send the twelfth identification information, and when the procedure is performed via non-3GPP access, the AMF does not need to transmit the twelfth identification information.
  • the AMF may send the 11th to 16th identification information regardless of whether this procedure is performed via 3GPP access or non-3GPP access.
  • the AMF may also include a second identifying information and/or a "registration for an unavailability period; or a registration for an unavailability period; or a registration for unavailability;
  • the UE may recognize that an event has occurred, the UE may recognize that an event will occur in the near future, or the UE may recognize that an event will occur in the near future. It may be recognized that an event occurs after this procedure is completed, or the twelfth identification information and/or the thirteenth identification information may be transmitted.
  • the AMF may not send the twelfth identification information indicating a timer value longer than the unavailability period and take the unavailability period into account.
  • the twelfth identification information that has not been identified may be transmitted.
  • the AMF may transmit twelfth identification information indicating a timer value longer than the unavailability period.
  • the AMF shall update the timer value. Twelfth identification information indicating the timer value that has been set may be transmitted.
  • the AMF may transmit the fifteenth identification information. For example, if the UE and the network support a function related to the unavailability period, and the settings related to the unavailability period are completed, the AMF sends the 15th identification information indicating that the settings related to the unavailability period are completed. A control message containing the information may be sent. For example, if the UE and the network support functions related to the unavailability period, and the settings related to the unavailability period have not been completed, the AMF may A control message containing the identification information of the user may be sent.
  • the AMF receives the second identification information from the UE, the AMF will not be able to recognize the content.
  • the second identification information may be ignored, or the second identification information may be discarded.
  • the AMF may not be able to recognize the content, may ignore it, or may It may be discarded, or any registration other than "registration for unavailability period, or registration relating to unavailability period, registration for unavailability, or registration relating to unavailability" (for example, initial registration, mobile registration update, periodic registration update, etc.) and may be stored.
  • the AMF may be able to recognize or store the content.
  • the AMF may be able to recognize or store the content.
  • the network supports a function related to unavailability period, "registration for unavailability period, or registration for unavailability period, or registration for unavailability," Even when the AMF receives third identification information from the UE indicating that the registration is for unavailability period, or that the registration is for unavailability period, or It may be recognized and stored as a registration other than "registration for unavailability" (for example, initial registration, mobile registration update, periodic registration update, etc.).
  • the stored unavailability period for that UE is updated and the timer is stopped. may be started using an unavailability period that updates its timer.
  • an unavailability period if second identification information indicating an updated unavailability period is received from the UE, the stored unavailability period for that UE is updated, the unavailability period is stopped, and the updated An unavailability period may be started.
  • the AMF may start a timer using the unavailability period indicated by the second identification information or an unavailability period.
  • the AMF may start a timer with the unavailability period indicated by the second identity, and the UE context for that UE (configuration information for that UE). ), the unavailability period may be stored.
  • the AMF may store in the UE context for that UE an unavailability period (i.e., a period during which the UE is unable to communicate) for that UE, and/or that the UE is unable to communicate for an unavailability period.
  • the AMF may recognize that the validity period of these configuration information stored in this UE context is the period of unavailability period indicated by the second identification information.
  • the AMF may store these configuration information in the UE context for the UE and start a timer with the unavailability period indicated by the second identification information, or an unavailability period. The AMF may then delete these configuration information from the UE context for the UE when this timer expires or when the unavailability period elapses.
  • the AMF may not send control information (e.g., NAS messages) to the UE while a timer using the unavailability period for the UE is running or during the unavailability period for the UE.
  • the UE may not transmit user data, may buffer control information or user data, or may instruct the UE to buffer control information or user data within another network device. It's okay.
  • the AMF may also send control information (e.g., a NAS message) to the UE if a timer using the unavailability period for the UE expires or if the unavailability period for the UE elapses.
  • user data may be transmitted to that UE, control information or user data that was buffered may be transmitted, or control information or user data that was buffered within another network device may be transmitted. may be instructed to transmit to the UE.
  • the AMF may notify the base station device serving the UE that the UE is unable to communicate and/or The unavailability period for the UE may be notified. Then, the base station device that receives this information may recognize that the UE is in a communication-disabled state, or may not transmit control messages and/or RRC messages to the UE. .
  • the AMF when the AMF stores the above configuration information in the UE context for the UE, it may notify the core network device NEF (Network Exposure Function) of the unavailability period for the UE. good.
  • NEF Network Exposure Function
  • the NEF that receives this may memorize the unavailability period for the UE, may recognize that the UE is in a communication unavailable state, or may notify the AF (Application Function) of the unavailability period for the UE.
  • the unavailability period may be notified.
  • the AF that receives this may store the unavailability period for the UE, or may recognize that the UE is in a communication unavailable state.
  • the AMF may receive information from the UE that does not include the second identification information and/or registers for "unavailability period". or registration for an unavailability period, registration for unavailability, or registration for unavailability (e.g., initial registration, mobile registration renewal, periodic registration renewal, etc.).
  • the configuration information stored in the UE context may be deleted, or the UE may remember and recognize that it is now able to communicate. good.
  • the AMF when the AMF deletes the above information from the UE context for that UE, it requests the core network device NEF (Network Exposure Function) to delete the unavailability period for that UE. Good too.
  • NEF Network Exposure Function
  • the NEF that receives this may delete the unavailability period for the UE, may recognize that the UE is in a communicable state, or may notify the AF (Application Function) of the unavailability period for the UE. You may request that the unavailability period be removed.
  • the AF that receives this may delete the unavailability period for the UE, or may recognize that the UE is in a communicable state.
  • the AMF may transmit twelfth identification information indicating a timer value that does not take the unavailability period into account.
  • AMF does not need to be limited to the above conditions when deciding which of the 11th to 16th pieces of identification information to send to the network. It may be carried out under a combination of conditions.
  • the AMF may also indicate that the UE's request has been accepted by sending a Registration Accept message, or may indicate that the UE's request has been rejected by sending a Registration Reject message. .
  • the UE receives the control message (registration acceptance message or registration rejection message) and/or the transmitted eleventh to sixteenth identification information via the base station device (S610).
  • the control message is a registration acceptance message
  • the UE recognizes that the UE's request in the registration request message has been accepted and the content of each identification information included in the registration acceptance message by receiving the registration acceptance message. , may be memorized.
  • the control message is a registration refusal message
  • the UE by receiving the registration refusal message, informs that the UE's request based on the registration request message has been rejected and the contents of each identification information included in the registration refusal message. May be recognized and remembered. Additionally, the UE may take actions based on the received control message and/or identification information.
  • the UE may start a timer using the unavailability period, or may start the unavailability period.
  • This unavailability period may be the one sent with the second identification information.
  • the UE may start a timer using the updated unavailability period, or start the updated unavailability period. You may.
  • This unavailability period may be the one sent with the second identification information.
  • the UE determines the allowed NSSAI, and/or rejected NSSAI, and/or Extended rejected NSSAI, and/or pending NSSAI, and/or configured You may memorize NSSAI.
  • the UE may start a timer using the T3512 value indicated by the twelfth identification information.
  • the UE in 5GMM-CONNECTED mode on 3GPP access may then reset the timer and start using the initial value if the timer expires.
  • a UE in 5GMM-IDLE mode on 3GPP access may initiate a registration procedure for periodic registration update when its timer expires.
  • a UE supporting the functionality related to unavailability period when a UE supporting the functionality related to unavailability period receives the 13th identification information, it resets the running timer using the T3512 value that has already started and The timer may be started using the T3512 value indicated by the twelfth identification information being received.
  • the UE supporting the functionality related to the unavailability period receives the 14th identification information indicating that the network supports the functionality related to the unavailability period, the UE supports the functionality related to the unavailability period. If you receive a 14th identification indicating that the network does not support the functionality associated with the unavailability period, you may acknowledge that the network does not support the functionality associated with the unavailability period. good.
  • a UE that supports the functionality related to unavailability period will not send an event after completing this procedure even if it receives the 14th identification information indicating that the network does not support the functionality related to the unavailability period. May be executed.
  • the second identification information may not be included in the registration request message in the registration procedure or the non-registration request message in the non-registration procedure initiated by the UE, and the There is no need to send a registration request message or a non-registration request message that includes the identification information in step 2.
  • a UE that does not support the functionality related to unavailability period receives the 13th identification information, it may not be able to recognize the content, may ignore it, or it may May be discarded.
  • a UE that does not support a function related to unavailability period receives the 14th identification information indicating that it supports a function related to unavailability period or does not support a function related to unavailability period, it recognizes the content. It may not be possible, it may be ignored, or the fourteenth identification information may be discarded.
  • a UE that does not support the functionality related to unavailability period receives the 15th identification information, it may not be able to recognize the content, it may ignore it, or it may not be able to recognize the 15th identification information. May be discarded.
  • a UE that does not support the functionality related to the unavailability period may not be able to start a timer using the unavailability period or the unavailability period when receiving the control message.
  • a UE that supports a function related to unavailability period may start a timer or unavailability period using unavailability period.
  • a UE that supports a function related to unavailability period receives the 14th identification information indicating that it supports a function related to unavailability period, it starts a timer or unavailability period using unavailability period. Good too.
  • a UE that supports a function related to unavailability period receives the 14th identification information indicating that it does not support a function related to unavailability period, it starts a timer or unavailability period using unavailability period. You don't have to.
  • a UE that supports the functionality related to the unavailability period receives a control message in the registration procedure started in (d) above, it recognizes that the settings related to the unavailability period in the network have been completed. It's okay.
  • a UE that supports the functionality related to unavailability period displays a T3512 value that is larger than the T3512 value set in the timer that has already started.
  • the identification information of 12 it may be recognized that the configuration regarding the unavailability period in the network is completed.
  • a UE supporting functions related to unavailability period receives the twelfth identification information indicating a T3512 value larger than the unavailability period in the registration procedure started at the time of (d) above.
  • the fifteenth identification information indicating that the settings regarding the period have been completed, it may be recognized that the settings regarding the unavailability period in the network have been completed.
  • a UE that supports functionality related to the unavailability period receives the 15th identification information indicating that the settings related to the unavailability period have not been completed in the registration procedure started in (d) above. may recognize that the configuration regarding the network unavailability period is not complete. In this case, the UE may start the registration procedure again or may start the non-registration procedure in order to have settings regarding the unavailability period performed.
  • the UE may start the registration procedure again or may start the non-registration procedure in order to have settings regarding the unavailability period performed.
  • the UE updates the unavailability period while a timer using the unavailability period is operating, the UE updates the stored unavailability period, stops the timer, and uses the updated unavailability period. or may send a registration request message or a non-registration request message including second identification information indicating the updated unavailability period.
  • the UE may start with the updated unavailability period and request a registration request that includes second identification information indicating the updated unavailability period. Message or non-registration request message may be sent.
  • the UE may delete the unavailability period it has stored, or if there is a timer using the unavailability period that is running, it may stop that timer. , may terminate the unavailability period, or may send a registration request message that does not include the second identification information.
  • the UE may initiate a PDU session release procedure.
  • the UE if it has established a PDU session or MA PDU session before starting the unavailability period, it initiates a PDU session release procedure to release the established PDU session or MA PDU session. You may.
  • a PDU session or MA PDU session is established after completing the procedure started in (d) or (e) above, but before executing the event, the established PDU session or A PDU session release procedure may be initiated to release the MA PDU session.
  • the UE may not initiate the PDU session establishment procedure or perform the MM procedure and/or the SM procedure during the operation of a timer using the unavailability period or during the unavailability period. good.
  • the UE ignores the MM message and/or SM message. You can either delete it or discard it.
  • the UE in 5GMM-IDLE mode may transition to 5GMM-CONNECTED mode at the timing when this procedure is started, or may transition to 5GMM-CONNECTED mode at the timing when this procedure is started.
  • the UE may maintain 5GMM-CONNECTED mode.
  • a UE that was in 5GMM-IDLE mode at the time this procedure was started may maintain 5GMM-IDLE mode, or it may be in 5GMM-CONNECTED mode at the time this procedure is started. UE may transition to 5GMM-IDLE mode.
  • the UE may execute an event.
  • the UE can further transmit a registration completion message to the AMF via the base station device as a response message to the registration acceptance message (S612).
  • the registration completion message is a NAS message transmitted and received on the N1 interface, but may be included in an RRC message and transmitted and received between the UE and the base station apparatus.
  • the AMF receives the registration completion message via the base station device (S612). Furthermore, each device completes this procedure based on sending and receiving a registration acceptance message and/or a registration completion message.
  • each device may complete the registration procedure based on the transmission and reception of the registration rejection message.
  • each device shall not be able to change or maintain the state in which the UE is registered in the network (RM-REGISTERED state or 5GMM-REGISTERED state) based on the transmission and reception of the registration acceptance message and/or registration completion message.
  • the UE changes the current PLMN to the unregistered state (RM-DEREGISTERED state, or 5GMM-DEREGISTERED state) on the access where the registration refusal message was received. It may be transitioned or maintained.
  • the transition of each device to each state may be performed based on the transmission and reception of a registration completion message or the completion of a registration procedure.
  • each device may perform processing based on the information transmitted and received in the registration procedure, based on the completion of the registration procedure. For example, if information indicating that some of the UE's requests have been rejected is sent or received, the reason why the UE's requests were rejected may be recognized. Furthermore, each device may perform this procedure again based on the reason why the UE request was rejected, or may perform the registration procedure with respect to core network_A or another cell.
  • the UE may store the identification information received with the registration acceptance message and/or the registration rejection message and may recognize the network's decision based on the completion of the registration procedure.
  • each device may store the information transmitted and received in this procedure in association with each other.
  • a program that runs on a device related to one aspect of the present invention may be a program that controls a central processing unit (CPU) or the like to cause a computer to function so as to realize the functions of the embodiments related to the present invention.
  • Programs or information handled by programs are temporarily stored in volatile memory such as Random Access Memory (RAM), non-volatile memory such as flash memory, hard disk drive (HDD), or other storage system.
  • volatile memory such as Random Access Memory (RAM), non-volatile memory such as flash memory, hard disk drive (HDD), or other storage system.
  • a program for realizing the functions of the embodiment related to one aspect of the present invention may be recorded on a computer-readable recording medium.
  • the program recorded on the recording medium may be read into a computer system and executed.
  • the "computer system” herein refers to a computer system built into the device, and includes hardware such as an operating system and peripheral devices.
  • a "computer-readable recording medium” refers to a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a medium that dynamically stores a program for a short period of time, or any other computer-readable recording medium. Good too.
  • each functional block or feature of the device used in the embodiments described above may be implemented or executed in an electrical circuit, such as an integrated circuit or multiple integrated circuits.
  • An electrical circuit designed to perform the functions described herein may be a general purpose processor, digital signal processor (DSP), application specific integrated circuit (ASIC), field programmable gate array (FPGA), or other programmable logic devices, discrete gate or transistor logic, discrete hardware components, or combinations thereof.
  • a general purpose processor may be a microprocessor or a conventional processor, controller, microcontroller, or state machine.
  • the electric circuit described above may be composed of a digital circuit or an analog circuit.
  • an integrated circuit technology that replaces the current integrated circuit emerges due to advances in semiconductor technology, one or more aspects of the present invention may use a new integrated circuit based on that technology.
  • the present invention is not limited to the above-described embodiments.
  • one example of the device is described; however, one embodiment of the present invention is not limited to this, and can be applied to stationary or non-movable electronic equipment installed indoors or outdoors, such as AV equipment. It can be applied to terminal devices or communication devices such as kitchen equipment, cleaning/washing equipment, air conditioning equipment, office equipment, vending machines, and other household appliances.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention clarifie un procédé de commande efficace pour une période d'indisponibilité, et un comportement de réseau ainsi qu'un comportement d'UE connectés à la période d'indisponibilité. Un UE prend en charge une fonction associée à une période d'indisponibilité, et reconnaît que le réglage de période d'indisponibilité a été achevé lorsque des informations sont reçues indiquant l'achèvement d'un réglage de la période d'indisponibilité et/ou une valeur de temporisateur plus longue que la période d'indisponibilité.
PCT/JP2023/023058 2022-06-27 2023-06-22 Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf) WO2024004808A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2022-102469 2022-06-27
JP2022102469 2022-06-27

Publications (1)

Publication Number Publication Date
WO2024004808A1 true WO2024004808A1 (fr) 2024-01-04

Family

ID=89382910

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2023/023058 WO2024004808A1 (fr) 2022-06-27 2023-06-22 Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)

Country Status (1)

Country Link
WO (1) WO2024004808A1 (fr)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED. New Solution for KI#1, KI#2: Support of UE Triggered Generalized Unavailability Period. 3GPP TSG SA WG2 #151E S2-2205373. 20 May 2022 *

Similar Documents

Publication Publication Date Title
WO2021241114A1 (fr) Équipement utilisateur (ue), dispositif de réseau central, fonction de gestion d'accès et de mobilité (amf) et fonction de gestion de sessions (smf)
WO2022097702A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication exécuté par l'ue
WO2022097703A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication effectué par l'ue
WO2022004699A1 (fr) Équipement d'utilisateur (ue) et procédé de commande de communication pour ue
JP2023072093A (ja) UE(User Equipment)
WO2023013276A1 (fr) Équipement utilisateur (ue)
WO2022138730A1 (fr) Équipement utilisateur (eu)
CN111972038A (zh) Ue以及ue的通信控制方法
WO2024004808A1 (fr) Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)
WO2024004809A1 (fr) Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)
WO2024004810A1 (fr) Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)
WO2023112771A1 (fr) Équipement utilisateur (ue)
WO2023112753A1 (fr) Équipement utilisateur (ue)
WO2023112754A1 (fr) Équipement utilisateur (ue)
WO2023013277A1 (fr) Équipement utilisateur (ue)
WO2023013278A1 (fr) Équipement utilisateur (ue)
WO2024024689A1 (fr) Équipement utilisateur (ue)
WO2024024690A1 (fr) Ue (équipement d'utilisateur)
WO2023248883A1 (fr) Équipement utilisateur (ue)
WO2023248884A1 (fr) Équipement utilisateur (ue)
WO2022215593A1 (fr) Équipement utilisateur (ue)
WO2022215592A1 (fr) Équipement utilisateur (ue)
US20240147576A1 (en) User equipment (ue)
WO2023157484A1 (fr) Équipement utilisateur (ue)
US20240147403A1 (en) User equipment (ue)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23831252

Country of ref document: EP

Kind code of ref document: A1