WO2024136493A1 - Method and apparatus for managing switching between access operation modes of user equipment - Google Patents
Method and apparatus for managing switching between access operation modes of user equipment Download PDFInfo
- Publication number
- WO2024136493A1 WO2024136493A1 PCT/KR2023/021183 KR2023021183W WO2024136493A1 WO 2024136493 A1 WO2024136493 A1 WO 2024136493A1 KR 2023021183 W KR2023021183 W KR 2023021183W WO 2024136493 A1 WO2024136493 A1 WO 2024136493A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- snpn
- operation mode
- access operation
- forbidden
- plmn
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
Definitions
- the present disclosure relates generally to telecommunication networks. More particularly, to a method and a user equipment (UE) for managing switching between access operation modes of the UE.
- UE user equipment
- 5 th generation (5G) mobile communication technologies define broad frequency bands such that high transmission rates and new services are possible, and can be implemented not only in "Sub 6 GHz” bands such as 3.5 gigahertz (GHz), but also in "Above 6 GHz” bands referred to as mmWave, including 28 GHz and 39 GHz.
- 6G mobile communication technologies (referred to as Beyond 5G systems) may be implemented in terahertz (THz) bands (e.g., 95GHz to 3THz bands) in order to accomplish transmission rates fifty times faster than 5G mobile communication technologies and ultra-low latencies one-tenth of 5G mobile communication technologies.
- THz terahertz
- V2X vehicle-to-everything
- NR-U new radio-unlicensed
- NTN non-terrestrial network
- IIoT industrial Internet of things
- IAB integrated access and backhaul
- DAPS conditional handover and dual active protocol stack
- RACH random access channel
- 5G baseline architecture e.g., service based architecture or service based interface
- NFV network functions virtualization
- SDN software-defined networking
- MEC mobile edge computing
- 5G mobile communication systems are commercialized, connected devices that have been exponentially increasing will be connected to communication networks, and it is expected that enhanced functions and performances of 5G mobile communication systems and integrated operations of connected devices will be necessary.
- new research is scheduled in connection with extended reality (XR) for efficiently supporting augmented reality (AR), virtual reality (VR), mixed reality (MR) and the like, 5G performance improvement and complexity reduction by utilizing artificial intelligence (AI) and machine learning (ML), AI service support, metaverse service support, and drone communication.
- XR extended reality
- AR augmented reality
- VR virtual reality
- MR mixed reality
- AI artificial intelligence
- ML machine learning
- AI service support metaverse service support
- drone communication drone communication.
- multi-antenna transmission technologies such as full dimensional MIMO (FD-MIMO), array antennas and large-scale antennas, metamaterial-based lenses and antennas for improving coverage of terahertz band signals, high-dimensional space multiplexing technology using orbital angular momentum (OAM), and reconfigurable intelligent surface (RIS), but also full-duplex technology for increasing frequency efficiency of 6G mobile communication technologies and improving system networks, AI-based communication technology for implementing system optimization by utilizing satellites and AI from the design stage and internalizing end-to-end AI support functions, and next-generation distributed computing technology for implementing services at levels of complexity exceeding the limit of UE operation capability by utilizing ultra-high-performance communication and computing resources.
- FD-MIMO full dimensional MIMO
- OFAM orbital angular momentum
- RIS reconfigurable intelligent surface
- a method performed by a terminal in a wireless communication system is provided.
- Information on a standalone non-public network (SNPN) may be stored in at least one list of one or more forbidden SNPNs, while operating in an SNPN access operation mode.
- the SNPN access operation mode may be deactivated.
- the at least one list of one or more forbidden SNPNs may be maintained.
- a method performed by a terminal in a wireless communication system is provided.
- Information on a public land mobile network (PLMN) may be stored in at least one list of one or more forbidden PLMNs.
- An SNPN access operation mode may be activated.
- the at least one list of one or more forbidden PLMNs may be maintained.
- a terminal in a wireless communication system includes a transceiver and a controller coupled with the transceiver.
- the controller may be configured to store information on an SNPN in at least one list of one or more forbidden SNPNs., deactivate an SNPN access operation mode, and maintain the at least one list of one or more forbidden SNPNs.
- a terminal in a wireless communication system includes a transceiver and a controller coupled with the transceiver.
- the controller may be configured to store information on a PLMN in at least one list of one or more forbidden PLMNs, activate an SNPN access operation mode, and maintain the at least one list of one or more forbidden PLMNs.
- the present disclosure discloses a method of managing switching between access operation modes of a User Equipment (UE).
- the method comprises detecting a switching from a not in SNPN access operation mode to a SNPN access operation mode. Further, the method comprises maintaining a plurality of forbidden lists of the not in SNPN access operation mode and execution of a timer initiated during the not in SNPN access operation mode, in the UE. Thereafter, the method comprises managing the switching between the SNPN access operation mode and not in SNPN access operation mode, by removing the plurality of forbidden lists of the not in SNPN access operation mode, upon the expiry of the timer in one of the SNPN access operation mode and the not in SNPN access operation mode.
- the present disclosure discloses a User Equipment (UE) for managing switching between access operation modes.
- the UE comprises a processor and a memory.
- the processor is configured to detect a switching from a not in SNPN access operation mode to a SNPN access operation mode. Further, the processor is configured to maintain a plurality of forbidden lists of the not in SNPN access operation mode and execution of a timer initiated during the not in SNPN access operation mode, in the UE.
- the processor is configured to manage the switching between the SNPN access operation mode and not in SNPN access operation mode, by removing the plurality of forbidden lists of the not in SNPN access operation mode, upon the expiry of the timer in one of the SNPN access operation mode and the not in SNPN access operation mode.
- the present disclosure discloses a User Equipment (UE) for managing switching between access operation modes.
- the UE comprises a processor and a memory.
- the processor is configured to detect a switching from a not in SNPN access operation mode to a SNPN access operation mode. Further, the processor is configured to maintain a plurality of forbidden lists of the not in SNPN access operation mode and execution of a timer initiated during the not in SNPN access operation mode, in the UE.
- the processor is configured to manage the switching between the SNPN access operation mode and not in SNPN access operation mode, by removing the plurality of forbidden lists of the not in SNPN access operation mode, upon the expiry of the timer in one of the SNPN access operation mode and the not in SNPN access operation mode.
- FIG. 1 is a diagram illustrating the managing of switching between access operation modes of a User Equipment (UE), according to an embodiment
- FIG. 2 is a diagram illustrating a UE for managing switching between the access operation modes, according to an embodiment
- FIG. 3A is a flowchart illustrating a method for managing switching from a SNPN access operation mode to a not in SNPN access operation mode, according to an embodiment
- FIG. 3B is a flowchart illustrating a method for managing switching from a not in SNPN access operation mode to a SNPN access operation mode, according to an embodiment
- FIG. 4 is a flowchart illustrating a method for managing switching from a SNPN access operation mode to a not in SNPN access operation mode, according to an embodiment
- FIG. 5 is a flowchart illustrating a method for managing switching from a not in SNPN access operation mode to a SNPN access operation mode, according to an embodiment
- FIG. 6 is a diagram illustrating a general-purpose computing system for managing switching between the access operation modes of the UE, according to an embodiment
- FIG. 7 is a diagram illustrating a structure of a UE or terminal, according to an embodiment
- FIG. 8 is a diagram illustrating a structure of a base station (BS), according to an embodiment.
- FIG. 9 is a diagram illustrating a structure of a network entity, according to an embodiment.
- any block diagram herein represents conceptual views of illustrative systems embodying the principles of the present subject matter.
- any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and executed by a computer or processor, whether or not such computer or processor is explicitly shown.
- exemplary is used herein to mean serving as an example, instance, or illustration. Any embodiment or implementation described herein as exemplary is not necessarily to be construed as preferred or advantageous over other embodiments.
- NPNs Private networks or non-public networks
- the private networks are implemented in, for example, hospitals, industries, enterprises, stadiums, and the like.
- 3rd generation partnership project (3GPP) specifications support various configurations of NPNs. While there are many possible configurations of the NPNs, 3GPP defines two major categories of the NPNs: SNPN and public network integrated NPN (PNI-NPN).
- SNPN refers to an NPN that is operated by an NPN operator and does not rely on network functions provided by a PLMN.
- PNI-NPN is a non-public network deployed with the support of the PLMN.
- the 3GPP specifications define two access operation modes for a UE.
- the UE can operate in SNPN access operation mode or out of the SNPN access operation mode.
- the UE capable of operating in the SNPN access operation mode camps onto a SNPN and receives various services provided by the NPN operator via the SNPN.
- the UE is considered to be not operating in the SNPN access operation mode (also referred to as not in SNPN access operation mode). In such case, the UE performs PLMN selection and receives services provided by a PLMN operator.
- the UE When the UE is SNPN enabled, the UE can operate in the SNPN access operation mode.
- UE behavior is defined for the SNPN access operation mode and not in SNPN access operation mode.
- the 3GPP specifications require the UE to maintain specific access operation modes for configuring functionalities and receiving services from a network.
- TS24.501 specifies managing available SNPNs present in a list of temporarily forbidden SNPNs or a list of permanently forbidden SNPNs for an entry of a list of subscriber data.
- the 3GPP specifications also specify a forbidden PLMN list or a forbidden PLMNs for general packet radio service (GPRS) service list for an entry of the list of subscriber data or the PLMN subscription.
- GPRS general packet radio service
- the UE can select only SNPNs, and not PLMNs for any service.
- An SNPN is added to either of the forbidden lists, when the UE receives a registration reject, a service reject, a network initiated de-registration request, and/or the like.
- the SNPN is present in either of the forbidden lists, the UE in the SNPN access operation mode cannot select the SNPN for normal services.
- the UE is required to start a timer (e.g., T3245). The forbidden lists are cleared when the timer expires.
- Non-Public Networks are intended for the non-public or private use.
- SNPN refers to an NPN that is operated by an NPN operator and does not rely on network functions provided by a Public Land Mobile Network (PLMN).
- PLMN Public Land Mobile Network
- the UE can operate in SNPN access operation mode or out of the SNPN access operation mode.
- UE behaviour is defined for the SNPN access operation mode and not in SNPN access operation mode.
- forbidden lists both temporary and permanent reject causes
- the present disclosure provides a method and a UE for managing switching between access operation modes of the UE.
- the present disclosure provides a solution for maintaining forbidden lists of SNPNs or PLMNs when the UE switches between SNPN access operation mode and not in SNPN access operation mode.
- the present disclosure provides a solution for maintaining execution of a timer initiated during the SNPN access operation mode or PLMN access operation mode, and deletion of respective forbidden lists, upon expiry of the timer irrespective of the access operation mode. Accordingly, the switching between the access operation modes of the UE is managed.
- the present disclosure enables the UE to select a SNPN or a PLMN present in the forbidden lists when the UE switches back to respective access operation mode.
- the present subject matter relates generally to a field of wireless communication, more particularly, the present subject matter relates to switching of operation access modes by a user equipment.
- Stand-alone Non-Public Network is operated by an NPN operator and does not rely on network functions provided by a PLMN, or a public network integrated NPN (PNI-NPN), being a non-public network deployed with the support of a PLMN.
- PLMN Public Land Mobile Network
- 3GPP specifications have defined two operating modes for UEs (User Equipment). They can operate in SNPN access operation mode or out of SNPN access operation mode (for example when UE performs PLMN selection, it is referred to as, but not limited to, PLMN Mode) which can be termed as non-SNPN access mode or non-SNPN access operation mode.
- a UE capable of operating in SNPN access mode camps onto a SNPN and receives various services provided by the NPN operator to the UE via the SNPN. If the UE is not SNPN enabled, the UE is always considered to be not operating in SNPN access operation mode i.e., in non-SNPN access operation mode or operating in non-SNPN access mode. If the UE is SNPN enabled, the UE can operate in SNPN access operation mode. Details of activation and deactivation of SNPN access operation mode at the SNPN enabled UE are based on UE implementation.
- UE behavior is defined for standalone SNPN access operation mode and/or non SNPN access operation mode.
- 3GPP specification requires the UE to maintain specific access operation modes for its functionalities and services from the network. However, there is no clarity on UE behavior with respect to certain events when the UE switches between the available access mode of operations.
- 3GPP specifications also specified about entries and list of temporarily forbidden SNPNs or a list of permanently forbidden SNPNs or forbidden PLMN list or forbidden PLMNs for GPRS service list for an entry of the list of subscriber data or the PLMN subscription when the UE switches off or is restarted.
- the UE decides to perform access operation mode switch between its two available operating access modes, via SNPN access operation mode to non SNPN access operation mode or vice versa, then UE will not be able to manage above said lists which are applicable to a specific mode or common to both modes, when it switches to another mode.
- Embodiments disclose handling of UE behavior in line with 3GPP technical specifications so as to make them reasonable and acceptable with respect to the 3GPP standards.
- the UE is able to manage entries of SNPN or PLMN in the list of temporarily forbidden SNPNs or a list of permanently forbidden SNPNs or forbidden PLMN list or forbidden PLMNs for GPRS service list for an entry of the list of subscriber data or the PLMN subscription.
- UE behavior is specified with respect to timers (exemplified by but not limited toT3245, etc.) associated with these respective lists.
- the UE is capable of operating in an SNPN access operation mode and a non SNPN operation mode.
- the UE chooses to operate in a particular access mode, performs access operation mode specific selection, and maintains specific forbidden lists and timers.
- the UE and an access and mobility management function (AMF) perform SNPN/PLMN selection and registration. Due to some trigger, the UE may switch access operation mode. As the UE switches access operation mode, there is no clarity regarding whether to maintain a forbidden list and timers for a previous access operation mode or not.
- the UE and the AMF perform PLMN/SNPN selection and registration.
- clear entries are provided in respective forbidden list and timers.
- the UE may be capable of operating in an SNPN access operation mode and switching modes from the SNPN access operation mode to a non-SNPN access operation mode.
- the UE may delete all entries in the list of temporarily forbidden SNPNs or the list of permanently forbidden SNPNs for all entries of the list of subscriber data. If there is any running timer related to a list of temporarily forbidden SNPNs or the list of permanently forbidden SNPNs, either specific to the SNPN access operation mode or common to both operating modes (exemplified by but not limited toT3245, etc.), then that timer may be stopped. Any implementation specific timer, related to the SNPN access operation mode may also be stopped. If there are any non-zero retry counters, either specific to the SNPN access mode or common to both operating modes, then they may be reset to 0.
- the UE is capable of an SNPN access operation mode and a non-SNPN operation mode.
- the UE chooses to operate in the SNPN access operation mode, performs SNPN selection, and maintains SNPN specific forbidden lists and timers.
- the UE and an AMF perform SNPN selection and registration. Due to some trigger, the UE switches from the SNPN access operation mode to the non-SNPN access operation mode. As the UE is out of the SNPN access operation mode, the UE shall clear the forbidden lists specific to the SNPN access operation mode and clear retry counters, and stop timers specific to SNPN or common to both modes if running (ex. T3245).
- the UE and the AMF perform PLMN selection and registration.
- the UE may be capable of operating in an SNPN access operation mode, and switches modes from the non -SNPN access operation mode to the SNPN access operation mode.
- the UE may delete all entries in the forbidden PLMN list or the forbidden PLMNs for GPRS service list for the PLMN subscription. If there is any running timer related to the forbidden PLMN list or the list of forbidden PLMNs for GPRS service, either specific to the non-SNPN access operation mode or common to both operating modes (exemplified by but not limited toT3245, etc.), then that timer may be stopped. Any implementation specific timer, related to the SNPN access operation mode may also be stopped. If there are any non-zero retry counters, either specific to the SNPN access operation mode or common to both operating modes, then they may be reset to 0.
- entries may be maintained in respective forbidden list and timers.
- the UE may be capable of operating in the SNPN access operation mode, and switches modes from the SNPN access operation mode to the non-SNPN access operation mode.
- the UE may store and maintain all entries in the list of temporarily forbidden SNPNs or the list of permanently forbidden SNPNs for all entries of the list of subscriber data. If there is any running timer related to the list of temporarily forbidden SNPNs or the list of permanently forbidden SNPNs, either specific to the SNPN access operation mode or common to both operating modes (exemplified by but not limited toT3245, etc.), then that timer may be maintained (i.e., continues to run). Any implementation specific timer, related to the SNPN access operation mode may also be maintained. If there are any non-zero retry counters, either specific to the SNPN access operation mode or common to both operating modes, then they may be maintained.
- the UE is capable of the SNPN access operation mode and the non-SNPN access operation mode.
- the UE chooses to operate in the SNPN access operation mode, performs SNPN selection, and maintains SNPN specific forbidden lists and timers.
- the UE and an AMF perform SNPN selection and registration. Due to some trigger, the UE switches from the SNPN access operation mode to the non-SNPN access operation mode.
- the UE shall maintain the forbidden lists specific to the SNPN access operation mode, and retry counters and timers specific to SNPN or common to both modes, if running (e.g., T3245).
- the UE and the AMF perform PLMN selection and registration. The maintained and running timer is expired.
- the UE may reset retry counters and delete forbidden lists using the below exemplary logic:
- the UE may be capable of operating in the SNPN access operation mode, and switches modes from the non-SNPN access operation mode to the SNPN access operation mode.
- the UE may store and maintain all entries in the forbidden PLMN list or forbidden PLMNs for a GPRS service list. If there is any running timer related to forbidden PLMN list or the list of forbidden PLMNs for GPRS service list, either specific to the non-SNPN access operation mode or common to both operating modes (exemplified by but not limited toT3245, etc.), then that timer may be maintained (i.e., continues to run). Any implementation specific timer, related to the SNPN access operation mode may also be maintained. If there are any non-zero retry counters, either specific to the SNPN access operation mode or common to both operating modes, then they may be maintained.
- the UE is capable of the SNPN access operation mode and the non-SNPN access operation mode.
- the UE chooses to operate in the non-SNPN access operation mode, performs PLMN selection, and maintains PLMN specific forbidden lists and timers.
- the UE and an AMF perform PLMN selection and registration. Due to some trigger, the UE switches from the non-SNPN access operation mode to the SNPN access operation mode.
- the UE may maintain the forbidden lists specific to the non-SNPN access operation mode, and retry counters and all timers specific to the non-SNPN or common to both modes, if running (ex. T3245).
- the UE and the AMF perform SNPN selection and registration. The maintained and running timer is expired.
- the UE may reset retry counters and delete forbidden lists using the below exemplary logic:
- the UE may be capable of operating in the SNPN access operation mode, and switching modes from the SNPN access operation mode to the non-SNPN access operation mode or vice versa.
- the entries in the list of temporarily forbidden SNPNs or forbidden PLMN list or the list of permanently forbidden SNPNs or forbidden PLMNs for GPRS service list for an entry of the list of subscriber data or the PLMN subscription may be needed to be maintained along with the respective timers (exemplified by but not limited toT3245, etc.).
- the below logic can be used to maintain those timers.
- T3245 continues to run when the UE switches between its two available operation access modes. If the UE operation access mode is switched when the timer T3245 is running, the UE may behave as follows. That is, when the UE is switched back to a previous access operation mode and a selected SNPN subscription remains same, let t1 be the time remaining for T3245 timeout at access operation mode switch and let t be the time elapsed between access operation switch and a return to same access operation mode. If t1 is greater than t, then the timer shall be restarted with the value t1 - t. If t1 is less than or equal to t, then the UE may follow the behavior as defined in the paragraph above upon expiry of the timer T3245. If the UE is not capable of determining t, then the UE shall restart the timer with the value t1.
- the UE may erase the permanently forbidden SNPNs list(s) and temporarily forbidden SNPNs list(s) and set the selected entry of the list of subscriber data or the selected PLMN subscription to be valid for 3GPP access and non-3GPP access.
- the UE performs cell selection according to 3GPP TS 38.304. This deletion/erasing is to be performed immaterial of the current operating access mode of the UE.
- the UE may erase permanently forbidden SNPNs list(s) and temporarily forbidden SNPNs list(s), the forbidden PLMN list and forbidden PLMNs for GPRS service list and set the USIM or the selected entry of the list of subscriber data or the selected PLMN subscription to valid for 3GPP access and non-3GPP access based on current UE operating access mode. This deletion/erasing may be performed immaterial of the current operating access mode of the UE.
- FIG. 1 is a diagram illustrating an exemplary environment for managing switching between access operation modes of a UE, according to an embodiment.
- An exemplary environment 100 comprises a UE 102 and a plurality of networks, including a SNPN 104a and PLMNs 106a, 106b, and 106c.
- Embodiments relate to managing switching between the access operation modes of the UE 102.
- the UE 102 may be any device configured to communicate in a wireless network in an SNPN access mode. Examples of the UE 102 include, but are not limited to, mobile phones, smartphones, laptops, wearables, and the like.
- SNPN refers to an NPN that is operated by an NPN operator and does not rely on network functions provided by a PLMN.
- the UE 102 may operate in the SNPN access operation mode or out of the SNPN access operation mode. When the UE 102 operates out of the SNPN access operation mode, such a mode is termed as “not in SNPN access operation mode”. As shown in FIG. 1, the UE 102 capable of operating in an SNPN access operation mode 104 camps onto the SNPN 104a and receives various services provided by the NPN operator via the SNPN 104a. When the UE 102 is not operating in the SNPN access operation mode 104, the UE 102 may be switched to not in SNPN access operation mode 106.
- the UE 102 may perform PLMN selection and receives services provided by a PLMN operator via PLMNs 106a, 106b, 106c.
- PLMNs 106a, 106b, 106c The number of SNPNs and PLMNs shown in FIG. 1 are shown for exemplary purposes only.
- the plurality of forbidden lists of the SNPN access operation mode 104 may include a permanently forbidden SNPNs list, a temporarily forbidden SNPNs list managed per access type independently, a permanently forbidden SNPNs list for network onboarding services, and a temporarily forbidden SNPNs list for network onboarding services.
- An SNPN may be added to a forbidden list, when the UE 102 receives a registration reject, a service reject, or a network initiated de-registration request, with cause value #74 (temporarily not authorized for this SNPN) or #75 (permanently not authorized for this SNPN).
- the UE 102 cannot select the SNPN for normal services, when operating in the SNPN access operation mode 104.
- the UE 102 When the SNPN is added to the one of the plurality of lists, the UE 102 is required to start a timer (e.g., T3245). The plurality of forbidden lists is cleared when the timer expires.
- the UE 102 may have SNPN 104b (not shown) in the plurality of forbidden lists when operating in the SNPN access operation mode 104.
- the plurality of forbidden lists including the SNPN 104b may not be removed. In such case, the UE 102 may not be able to select the SNPN 104b, when the UE 102 switches back to the SNPN access operation mode 104.
- the UE 102 is configured to maintain the plurality of forbidden lists of the SNPN access operation mode 104 and execution of the timer initiated during the SNPN access operation mode 104, in the UE 102.
- the UE 102 may continue execution of the timer initiated during the SNPN access operation mode 104, and store the plurality of forbidden lists of the SNPN access operation mode 104. Then, the UE 102 may remove the plurality of forbidden lists of the SNPN access operation mode 104, upon expiry of the timer in the SNPN access operation mode 104 or the not in SNPN access operation mode 106. In this way, the UE 102 is able to select the SNPN 104b, when operating in the SNPN access operation mode 104.
- the UE 102 may detect a switching from the not in SNPN access operation mode 106 to the SNPN access operation mode 104.
- the UE 102 switches from the not in SNPN access operation mode 106 to the SNPN access operation mode 104, when the SNPN access operation mode 104 is activated.
- the UE 102 may move out from the PLMN 106a to the SNPN 104a.
- the UE 102 may have a plurality of forbidden lists of the not in SNPN access operation mode 106.
- the plurality of forbidden lists of the not in SNPN access operation mode 106 may include lists of forbidden PLMN managed independently per access type, list of forbidden PLMNs for GPRS service, and the list of forbidden PLMNs for non-3GPP access to 5GCN.
- a PLMN may be added to a forbidden list, when the UE 102 receives a registration reject, a service reject, or a network initiated de-registration request, with cause value #74 (temporarily not authorized for this PLMN) or #75 (permanently not authorized for this PLMN).
- the PLMN is in the plurality of forbidden lists, the UE 102 cannot select the PLMN, when operating in the not in SNPN access operation mode 106.
- the UE 102 may have PLMN 106c in the plurality of forbidden lists when operating in the not in SNPN access operation mode 106.
- the plurality of forbidden lists including the PLMN 106c may not be removed when the UE switches to the SNPN access operation mode 104. In such case, the UE 102 may not be able to select the PLMN 106c, when the UE 102 switches back to the not in SNPN access operation mode 106.
- FIG. 2 is a diagram illustrating the UE 102 for managing switching between the access operation modes, according to an embodiment.
- Diagram 200 illustrates that the UE 102 may include central processing units (CPUs) (also referred as processor 206), an input/output (I/O) interface 202, and a memory 204.
- the memory 204 may be communicatively coupled to the processor 206.
- the memory 204 stores instructions executable by the processor 206.
- the processor 206 may comprise at least one data processor for executing program components for executing user or system-generated requests.
- the memory 204 may be communicatively coupled to the processor 206.
- the memory 204 stores instructions, executable by the processor 206, which, on execution, may cause the processor 206 to manage the switching between the access operation modes.
- the memory 204 may include one or more modules 210 and data 208.
- the one or more modules 210 may be configured to perform the steps of the present disclosure using the data 208, to manage the switching between the access operation modes.
- Each of the one or more modules 210 may be a hardware unit which may be outside the memory 204 and coupled with the UE 102.
- the term “modules” refers to an application specific integrated circuit (ASIC), an electronic circuit, a field-programmable gate array (FPGA), programmable system-on-chip (PSoC), a combinational logic circuit, and/or other suitable components that provide described functionality.
- ASIC application specific integrated circuit
- FPGA field-programmable gate array
- PSoC programmable system-on-chip
- the one or more modules 210 when configured with the described functionality defined herein will result in a novel hardware.
- the I/O interface 202 is coupled with the processor 206 through which an input signal or/and an output signal is communicated.
- the detection module 220 may be configured to detect a switching of the UE 102 from the SNPN access operation mode 104 to the not in SNPN access operation mode 106.
- the UE 102 may be capable of operating in the SNPN access operation mode to access SNPN services. In such case, the UE 102 may be capable of operating in two modes (i.e., the SNPN access operation mode 104 and the not in SNPN access operation mode 106). Initially, the UE 102 may be operating in the SNPN access operation mode 104.
- the UE 102 may select an SNPN and complete registration to the SNPN by communicating with an AMF server.
- the UE 102 When the UE 102 is in a mobile state, the UE 102 may move out from the SNPN and the SNPN access operation mode 104 may be deactivated.
- the detection module 220 may detect the switching of the UE 102 from the SNPN access operation mode 104 to the not in SNPN access operation mode 106.
- a location of the UE 102 may be in a hospital which includes the SNPN services. The UE 102 may move out from the hospital. In such case, the SNPN access operation mode 104 may be deactivated.
- the UE 102 may be capable of operating in two modes (i.e., the SNPN access operation mode 104 and the not in SNPN access operation mode 106). As shown in block 2, the UE 102 may communicate with the AMF server 302 to perform the SNPN selection and registration. As shown in block 3, the detection module 220 may detect the switching of the UE 102 from the SNPN access operation mode 104 to the not in SNPN access operation mode 106.
- the detection module 220 may be configured to detect a switching of the UE 102 from the not in SNPN access operation mode 106 to the SNPN access operation mode 104.
- the UE 102 switches from the not in SNPN access operation mode 106 to the SNPN access operation mode 104 when the SNPN access operation mode 104 is activated.
- the UE 102 may be capable of operating in two modes (i.e., the SNPN access operation mode 104 and the not in SNPN access operation mode 106). As shown in block 2, the UE 102 may communicate with the AMF server 302 to perform the PLMN selection and registration. As shown in block 3, the detection module 220 may detect the switching the UE 102 from the not in SNPN access operation mode 106 to the SNPN access operation mode 106. Referring back to FIG. 2, data related to detection of the switching between the access operation modes may be stored as the detection data 212 in the memory 204.
- the execution module 222 may be configured to receive the detection data 212 from the detection module 220. Further, the execution module 222 may be configured to maintain the plurality of forbidden lists of the SNPN access operation mode 104.
- the plurality of forbidden lists of the SNPN access operation mode 104 may include a permanently forbidden SNPNs list, a temporarily forbidden SNPNs list managed per access type independently, a permanently forbidden SNPNs list for network onboarding services, and a temporarily forbidden SNPNs list for network onboarding services.
- the execution module 222 may store the forbidden lists of the SNPN access operation mode 104 in the memory 204 of the UE 102.
- the execution module 222 may be configured to maintain execution of the timer initiated during the SNPN access operation mode 104, in the UE 102.
- the timer may include T3245.
- the execution module 222 may be configured to continue execution of the timer or running of the timer upon the switching.
- the plurality of forbidden lists may include SNPN ‘2’.
- a value of the timer may be 60 minutes. Considering that the timer executed for 40 minutes prior to the switching, the execution module 222 continues to execute the timer for next 20 minutes.
- the execution module 222 may maintain the plurality of forbidden lists of the SNPN access operation mode 104 and the timer specific to the SNPN access operation mode 104.
- the UE 102 may perform the PLMN selection and registration upon maintaining the plurality of forbidden lists of the SNPN access operation mode 104 and the timer specific to the SNPN access operation mode 104.
- the execution module 222 may be configured to maintain the plurality of forbidden lists of the not in SNPN access operation mode 106, when the UE 102 switches from the not in SNPN access operation mode 106 to the SNPN access operation mode 104.
- the plurality of forbidden lists of the not in SNPN access operation mode 106 may include lists of forbidden PLMN managed independently per access type, a list of forbidden PLMNs for GPRS service and a list of forbidden PLMNs for non-3GPP access to 5GCN.
- the execution module 222 may store the forbidden lists of the not in SNPN access operation mode 106 in the memory 204 of the UE 102.
- the execution module 212 may be configured to maintain execution of the timer initiated during the not in SNPN access operation mode 106, in the UE 102.
- the timer may include T3245.
- the execution module 222 may be configured to continue execution of the timer or running of the timer upon the switching.
- the execution module 212 may maintain the plurality of forbidden lists of the not in SNPN access operation mode 106 and the timer specific to the not in SNPN access operation mode 106. Then, the UE 102 may perform the SNPN selection and registration upon maintaining the plurality of forbidden lists of the not in SNPN access operation mode 106 and the timer specific to the not in SNPN access operation mode 106.
- the plurality of forbidden lists and an execution state of the timer may be stored as the execution data 214 in the memory 204.
- the management module 224 may be configured to manage the switching between the SNPN access operation mode 104 and the not in SNPN access operation mode 106.
- the management module 224 may be configured to remove the plurality of forbidden lists of the SNPN access operation mode 104, upon the expiry of the timer in the SNPN access operation mode 104 and the not in SNPN access operation mode 106.
- the management module 224 may reset any retry counters specific to the SNPN access operation mode 104, and remove the plurality of forbidden lists of the SNPN access operation mode 104, as shown in block 8 in FIG. 3A.
- the management module 224 may be configured to remove the plurality of forbidden lists of the not in SNPN access operation mode 106, upon the expiry of the timer in the SNPN access operation mode 104 and the not in SNPN access operation mode 106.
- the management module 224 may reset any retry counters specific to the not in SNPN access operation mode 106, and remove the plurality of forbidden lists of the not in SNPN access operation mode 106, as shown in block 8 in FIG. 3B.
- the other data 218 may store data, including temporary data and temporary files, generated by the one or more modules 210 for performing the various functions of the UE 102.
- the one or more modules 210 may also include the other modules 226 to perform various miscellaneous functionalities of the UE 102.
- the other data 218 may be stored in the memory 204.
- the one or more modules 210 may be represented as a single module or a combination of different modules.
- FIG. 4 is a flowchart illustrating a method for managing the switching of the UE 102 from the SNPN access operation mode 104 to the not in SNPN access operation mode 106, according to an embodiment.
- a method 400 may comprise one or more steps.
- the method 400 may be described in the general context of computer executable instructions.
- computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, and functions, which perform particular functions or implement particular abstract data types.
- the order in which the method 400 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method. Additionally, individual blocks may be deleted from the method without departing from the scope of the subject matter described herein. Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof.
- a switching from the SNPN access operation mode 104 to the not in SNPN access operation mode 106 is detected.
- the UE 102 switches from the SNPN access operation mode 104 to the not in SNPN access operation mode 106, when the SNPN access operation mode 104 is deactivated.
- the plurality of forbidden lists of the SNPN access operation mode 104 and execution of the timer initiated during the SNPN access operation mode 104 is maintained in the UE 102.
- the plurality of forbidden lists of the SNPN access operation mode 104 may include a permanently forbidden SNPNs list, a temporarily forbidden SNPNs list managed per access type independently, a permanently forbidden SNPNs list for network onboarding services, and a temporarily forbidden SNPNs list for network onboarding services.
- step 406 the switching between the SNPN access operation mode 104 and the not in SNPN access operation mode 106, by removing the plurality of forbidden lists of the SNPN access operation mode 104, upon the expiry of the timer in one of the SNPN access operation mode 104 and the not in SNPN access operation mode 106.
- FIG. 5 is a flowchart illustrating a method for managing the switching of the UE 102 from the not in SNPN access operation mode 106 to the SNPN access operation mode 104, according to an embodiment.
- a method 500 may include one or more steps.
- the method 500 may be described in the general context of computer executable instructions.
- computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, and functions, which perform particular functions or implement particular abstract data types.
- a switching from the not in SNPN access operation mode 106 to the SNPN access operation mode 104 is detected.
- the UE 102 switches from the not in SNPN access operation mode 106 to the SNPN access operation mode 104, when the SNPN access operation mode 104 is activated.
- the plurality of forbidden lists of the not in SNPN access operation mode 106 and execution of the timer initiated during the not in SNPN access operation mode 106 is maintained in the UE 102.
- the plurality of forbidden lists of the not in SNPN access operation mode 106 may include lists of forbidden PLMN managed independently per access type, a list of forbidden PLMNs for GPRS service, and a list of forbidden PLMNs for non-3GPP access to 5GCN.
- the switching between the SNPN access operation mode 104 and the not in SNPN access operation mode 106 is managed, by removing the plurality of forbidden lists of the not in SNPN access operation mode 106, upon the expiry of the timer in one of the SNPN access operation mode 104 and the not in SNPN access operation mode 106.
- FIGs. 4 and 5 show certain events occurring in a certain order. In alternative embodiments, certain operations may be performed in a different order, modified, or removed. Moreover, steps may be added to the above-described logic and still conform to the described embodiments. Further, operations described herein may occur sequentially or certain operations may be processed in parallel. Yet further, operations may be performed by a single processing unit or by distributed processing units.
- FIG. 6 is a diagram illustrating an exemplary computer system for implementing embodiments consistent with the present disclosure.
- a computer system 600 may be the UE 102.
- the computer system 600 may be used to manage the switching between the access operation modes of the UE 102.
- the computer system 600 may communicate with an AMF 624, over a communication network 618.
- the computer system 600 may comprise a CPU (also referred as a processor 604).
- the processor 604 may comprise at least one data processor.
- the processor 604 may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc.
- the processor 604 may be disposed in communication with one or more I/O devices via an I/O interface 602.
- the I/O interface 602 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, Institute of Electrical and Electronics Engineers (IEEE) -1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), radio frequency (RF) antennas, S-Video, VGA, IEEE 802.n /b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.
- CDMA code-division multiple access
- HSPA+ high-speed packet access
- GSM global system for mobile communications
- LTE long-term evolution
- WiMax or
- an input device 620 may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, stylus, scanner, storage device, transceiver, video device/source, etc.
- An output device 622 may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, plasma display panel (PDP), organic light-emitting diode display (OLED) or the like), audio speaker, etc.
- CTR cathode ray tube
- LCD liquid crystal display
- LED light-emitting diode
- PDP plasma display panel
- OLED organic light-emitting diode display
- the processor 604 may be disposed in communication with a communication network 618 via a network interface 606.
- the network interface 606 may communicate with the communication network 618.
- the network interface 606 may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc.
- the communication network 618 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using wireless application protocol (WAP)), the Internet, etc.
- LAN local area network
- WAN wide area network
- WAP wireless application protocol
- the network interface 606 may employ connection protocols include, but not limited to, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc.
- connection protocols include, but not limited to, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc.
- the communication network 618 includes, but is not limited to, a direct interconnection, an e-commerce network, a peer to peer (P2P) network, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, Wi-Fi, and such.
- the first network and the second network may either be a dedicated network or a shared network, which represents an association of the different types of networks that use a variety of protocols, for example, hypertext transfer protocol (HTTP), transmission control protocol/internet protocol (TCP/IP), WAP, etc., to communicate with each other.
- HTTP hypertext transfer protocol
- TCP/IP transmission control protocol/internet protocol
- WAP etc.
- the first network and the second network may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, etc.
- the processor 604 may be disposed in communication with a memory 610 (e.g., random access memory (RAM), read only memory (ROM), etc.) via a storage interface 608.
- the storage interface 608 may connect to memory 610 including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc.
- the memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc.
- the memory 610 may store a collection of program or database components, including, without limitation, user interface 612, an operating system 614, web browser 616 etc.
- the computer system 600 may store user/application data, such as, the data, variables, records, etc., as described herein.
- databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle ® or Sybase®.
- the operating system 614 may facilitate resource management and operation of the computer system 600.
- Examples of operating systems include, without limitation, APPLE MACINTOSH R OS X, UNIX R , UNIX-like system distributions (E.G., BERKELEY SOFTWARE DISTRIBUTION TM (BSD), FREEBSD TM , NETBSD TM , OPENBSD TM , etc.), LINUX DISTRIBUTIONS TM (E.G., RED HAT TM , UBUNTU TM , KUBUNTU TM , etc.), IBM TM OS/2, MICROSOFT TM WINDOWS TM (XP TM , VISTA TM /7/8, 10 etc.), APPLE R IOS TM , GOOGLE R ANDROID TM , BLACKBERRY R OS, or the like.
- the computer system 600 may implement the web browser 616 stored program component.
- the web browser 616 may be a hypertext viewing application, for example MICROSOFT R INTERNET EXPLORER TM , GOOGLE R CHROME TM0 , MOZILLA R FIREFOX TM , APPLE R SAFARI TM , etc.
- Secure web browsing may be provided using secure hypertext transport protocol (HTTPS), secure sockets layer (SSL), transport layer security (TLS), etc.
- Web browsers 616 may utilize facilities such as AJAX TM , DHTML TM , ADOBE R FLASH TM , JAVASCRIPT TM , JAVA TM , application programming interfaces (APIs), etc.
- the computer system 600 may implement a mail server stored program component.
- the mail server may be an Internet mail server such as Microsoft Exchange, or the like.
- the mail server may utilize facilities such as ASP TM , ACTIVEX TM , ANSI TM C++/C#, MICROSOFT R , NET TM , CGI SCRIPTS TM , JAVA TM , JAVASCRIPT TM , PERL TM , PHP TM , PYTHON TM , WEBOBJECTS TM , etc.
- the mail server may utilize communication protocols such as Internet message access protocol (IMAP), messaging application programming interface (MAPI), MICROSOFT R exchange, post office protocol (POP), simple mail transfer protocol (SMTP), or the like.
- IMAP Internet message access protocol
- MAPI messaging application programming interface
- PMP post office protocol
- SMTP simple mail transfer protocol
- the computer system 600 may implement a mail client stored program component.
- the mail client may be a mail viewing application, such as APPLE R MAIL TM , MICROSOFT R ENTOURAGE TM , MICROSOFT R OUTLOOK TM , MOZILLA R THUNDERBIRD TM , etc.
- a computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored.
- a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein.
- the term "computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include RAM, ROM, volatile memory, non-volatile memory, hard drives, compact disc read-only memory (CD ROMs), digital video discs (DVDs), flash drives, disks, and any other known physical storage media.
- the present disclosure provides a method and a UE of managing switching between access operation modes of the UE.
- the present disclosure provides a solution of maintaining forbidden lists of SNPNs or PLMNs when the UE switches between SNPN access operation mode and not in SNPN access operation mode.
- the present disclosure provides a solution of maintaining execution of a timer initiated during the SNPN access operation mode or PLMN access operation mode, and deletion of respective forbidden lists, upon expiry of the timer irrespective of the access operation mode. Accordingly, the switching between the access operation modes of the UE is managed.
- the present disclosure enables the UE to select a SNPN or a PLMN present in the forbidden lists when the UE switches back to respective access operation mode.
- FIG. 7 is a diagram illustrating a structure of a UE, according to an embodiment.
- the UE may include a transceiver 710, a memory 720, and a processor 730.
- the transceiver 710, the memory 720, and the processor 730 of the UE may operate according to a communication method of the UE described above.
- the components of the UE are not limited thereto.
- the UE may include more or fewer components than those described above.
- the processor 730, the transceiver 710, and the memory 720 may be implemented as a single chip.
- the processor 730 may include at least one processor.
- the UE of FIG. 7 corresponds to the UE 102 of FIGS. 1 through 3B.
- the transceiver 710 collectively refers to a UE receiver and a UE transmitter, and may transmit/receive a signal to/from a base station or a network entity.
- the signal transmitted or received to or from the base station or a network entity may include control information and data.
- the transceiver 710 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
- the transceiver 710 may receive and output, to the processor 730, a signal through a wireless channel, and transmit a signal output from the processor 730 through the wireless channel.
- the memory 720 may store a program and data required for operations of the UE. Also, the memory 720 may store control information or data included in a signal obtained by the UE.
- the memory 720 may be a storage medium, such as ROM, RAM, a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
- the processor 730 may control a series of processes such that the UE operates as described above.
- the transceiver 710 may receive a data signal including a control signal transmitted by the base station or the network entity, and the processor 730 may determine a result of receiving the control signal and the data signal transmitted by the base station or the network entity.
- FIG. 8 is a diagram illustrating a structure of a base station according to an embodiment of the disclosure.
- the base station may include a transceiver 810, a memory 820, and a processor 830.
- the transceiver 810, the memory 820, and the processor 830 of the base station may operate according to a communication method of the base station described above.
- the components of the base station are not limited thereto.
- the base station may include more or fewer components than those described above.
- the processor 830, the transceiver 810, and the memory 820 may be implemented as a single chip.
- the processor 830 may include at least one processor.
- the base station of FIG. 8 corresponds to the BSs of FIG. 1.
- the transceiver 810 collectively refers to a base station receiver and a base station transmitter, and may transmit/receive a signal to/from a terminal (UE) or a network entity.
- the signal transmitted or received to or from the terminal or a network entity may include control information and data.
- the transceiver 810 may include a RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
- the transceiver 810 may receive and output, to the processor 830, a signal through a wireless channel, and transmit a signal output from the processor 830 through the wireless channel.
- the memory 820 may store a program and data required for operations of the base station. Also, the memory 820 may store control information or data included in a signal obtained by the base station.
- the memory 820 may be a storage medium, such as ROM, RAM, a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
- the processor 830 may control a series of processes such that the base station operates as described above.
- the transceiver 810 may receive a data signal including a control signal transmitted by the terminal, and the processor 830 may determine a result of receiving the control signal and the data signal transmitted by the terminal.
- FIG. 9 is a diagram illustrating a structure of a network entity, according to an embodiment.
- the network entity may include a transceiver 910, a memory 920, and a processor 930.
- the transceiver 910, the memory 920, and the processor 930 of the network entity may operate according to a communication method of the network entity described above.
- the components of the terminal are not limited thereto.
- the network entity may include more or fewer components than those described above.
- the processor 930, the transceiver 910, and the memory 920 may be implemented as a single chip.
- the processor 930 may include at least one processor.
- the network entity illustrated in FIG. 9 may correspond to the network entity (e.g., AMF entity 302 in FIG. 3A and 3B or AMF entity 624 in FIG. 6).
- the transceiver 910 collectively refers to a network entity receiver and a network entity transmitter, and may transmit/receive a signal to/from a base station or a UE.
- the signal transmitted or received to or from the base station or the UE may include control information and data.
- the transceiver 910 may include an RF transmitter for up-converting and amplifying a frequency of a transmitted signal, and a RF receiver for amplifying low-noise and down-converting a frequency of a received signal.
- the transceiver 910 may receive and output, to the processor 930, a signal through a wireless channel, and transmit a signal output from the processor 930 through the wireless channel.
- the memory 920 may store a program and data required for operations of the network entity. Also, the memory 920 may store control information or data included in a signal obtained by the network entity.
- the memory 920 may be a storage medium, such as ROM, RAM, a hard disk, a CD-ROM, and a DVD, or a combination of storage media.
- the processor 930 may control a series of processes such that the network entity operates as described above.
- the transceiver 910 may receive a data signal including a control signal, and the processor 930 may determine a result of receiving the data signal.
- a computer-readable recording medium having one or more programs (software modules) recorded thereon may be provided.
- the one or more programs recorded on the computer-readable recording medium are configured to be executable by one or more processors in an electronic device.
- the one or more programs include instructions to execute the methods according to the embodiments described in the claims or the detailed description of the present disclosure.
- the programs may be stored in RAM, non-volatile memory including flash memory, ROM, electrically erasable programmable read-only memory (EEPROM), a magnetic disc storage device, CD-ROM, a DVD, another type of optical storage device, or a magnetic cassette.
- the programs may be stored in a memory system including a combination of some or all of the above-mentioned memory devices.
- each memory device may be included by a plural number.
- the programs may also be stored in an attachable storage device which is accessible through a communication network such as the Internet, an intranet, a LAN, a wireless LAN (WLAN), or a storage area network (SAN), or a combination thereof.
- the storage device may be connected through an external port to an apparatus according the embodiments of the present disclosure.
- Another storage device on the communication network may also be connected to the apparatus performing the embodiments of the present disclosure.
- the user equipment can include any number of each component in any suitable arrangement.
- the figures do not limit the scope of this disclosure to any particular configuration(s).
- figures illustrate operational environments in which various user equipment features disclosed in this patent document can be used, these features can be used in any other suitable system.
- At least some of the example embodiments described herein may be constructed, partially or wholly, using dedicated special-purpose hardware.
- Terms such as “component”, “module” or “unit” used herein may include, but are not limited to, a hardware device, such as circuitry in the form of discrete or integrated components, a FPGA or ASIC, which performs certain tasks or provides the associated functionality.
- the described elements may be configured to reside on a tangible, persistent, addressable storage medium and may be configured to execute on one or more processors.
- These functional elements may in some embodiments include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- components such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
- any of the above variation embodiments can be utilized independently or in combination with at least one other variation embodiment.
- the above flowchart(s) illustrate example methods that can be implemented in accordance with the principles of the present disclosure and various changes could be made to the methods illustrated in the flowcharts herein. For example, while shown as a series of steps, various steps in each figure could overlap, occur in parallel, occur in a different order, or occur multiple times. In another example, steps may be omitted or replaced by other steps.
- the specification has described a method and apparatus for selecting a selective security mode for applying selective security and flow management for selective security for User Equipment (UE) under mobility. Further, the specification has described a method and apparatus for flow management for selective security during the handover.
- the illustrated steps are set out to explain the embodiments shown, and it should be anticipated that on-going technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
- an embodiment means “one or more (but not all) embodiments of the invention(s)" unless expressly specified otherwise.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (15)
- A method performed by a terminal in a wireless communication system, the method comprising:storing information on a stand-alone non-public network (SNPN) in a plurality of lists of forbidden SNPN, while operating in an SNPN access operation mode;deactivating the SNPN access operation mode; andmaintaining the plurality of lists of forbidden SNPN.
- The method of claim 1, further comprising:deleting the plurality of lists of forbidden SNPN, upon expiry of a timer, andwherein the timer comprises T3245.
- The method of claim 1,wherein the plurality of lists of forbidden SNPN comprises a list of permanently forbidden SNPN and a list of temporarily forbidden SNPN,wherein storing the information on the SNPN comprises selecting the SNPN while operating in the SNPN access operation mode,wherein the information on the SNPN is included in a service reject message, andwherein the method further comprises:setting a selected entry or a selected public land mobile network (PLMN) subscription to valid for 3rd generation partnership project (3GPP) access and non-3GPP access; andperforming cell selection.
- A method performed by a terminal in a wireless communication system, the method comprising:storing information on a public land mobile network (PLMN) in a plurality of lists of forbidden PLMN;activating a stand-alone non-public network (SNPN) access operation mode; andmaintaining the plurality of lists of forbidden PLMN.
- The method of claim 4, further comprising:deleting the plurality of lists of forbidden PLMN, upon expiry of a timer, andwherein the timer comprises T3245.
- The method of claim 4, wherein the plurality of lists of forbidden PLMN comprises a list of forbidden PLMN and a list of forbidden PLMN for general packet radio service (GPRS).
- The method of claim 4,wherein storing the information on the PLMN comprises selecting the PLMN while not in the SNPN access operation mode,wherein the information on the PLMN is included in a registration reject message, andwherein the method further comprises:setting a universal subscriber identity module (USIM) of the terminal to valid for 5th generation system (5GS) service for 3rd generation partnership project (3GPP) access and non-3GPP access; andperforming cell selection.
- A terminal in a wireless communication system, the terminal comprising:a transceiver; anda controller coupled with the transceiver and configured to:store information on a stand-alone non-public network (SNPN) in a plurality of lists of forbidden SNPN;deactivate an SNPN access operation mode; andmaintain the plurality of lists of forbidden SNPN.
- The terminal of claim 8,wherein the controller is further configured to delete the plurality of lists of forbidden SNPN, upon expiry of a timer, andwherein the timer comprises T3245.
- The terminal of claim 8, wherein the plurality of lists of forbidden SNPN comprises a list of permanently forbidden SNPN and a list of temporarily forbidden SNPN.
- The terminal of claim 8,wherein the controller is further configured to select the SNPN while in the SNPN access operation mode,wherein the information on the SNPN is included in a service reject message, andwherein the controller is further configured to:set selected entry or selected public land mobile network (PLMN) subscription to valid for 3rd generation partnership project (3GPP) access and non-3GPP access; andperform cell selection.
- A terminal in a wireless communication system, the terminal comprising:a transceiver; anda controller coupled with the transceiver and configured to:store information on a public land mobile network (PLMN) in a plurality of lists of forbidden PLMN;activate a stand-alone non-public network (SNPN) access operation mode; andmaintain the plurality of lists of forbidden PLMN.
- The terminal of claim 12,wherein the controller is further configured to delete the plurality of lists of forbidden PLMN, upon expiry of a timer, andwherein the timer comprises T3245.
- The terminal of claim 12, wherein the plurality of lists of forbidden PLMN comprises a list of forbidden PLMN and a list of forbidden PLMN for general packet radio service (GPRS).
- The terminal of claim 12,wherein the controller is further configured to select the PLMN while not in the SNPN access operation mode,wherein the information on the PLMN is included in a registration reject message, andwherein the controller is further configured to:set a universal subscriber identity module (USIM) of the terminal to valid for 5th generation system (5GS) service for 3rd generation partnership project (3GPP) access and non-3GPP access; andperform cell selection.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN202241074299 | 2022-12-21 | ||
IN202241074299 | 2023-12-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024136493A1 true WO2024136493A1 (en) | 2024-06-27 |
Family
ID=91585283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2023/021183 WO2024136493A1 (en) | 2022-12-21 | 2023-12-21 | Method and apparatus for managing switching between access operation modes of user equipment |
Country Status (2)
Country | Link |
---|---|
US (1) | US20240214915A1 (en) |
WO (1) | WO2024136493A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021052346A (en) * | 2019-09-26 | 2021-04-01 | 日本電気株式会社 | Radio terminal, core network node, and method thereof |
US20210127325A1 (en) * | 2019-10-29 | 2021-04-29 | FG Innovation Company Limited | Method and apparatus for cell reservation and access restriction |
WO2022211527A1 (en) * | 2021-03-31 | 2022-10-06 | Lg Electronics Inc. | Signalling of associated network identifier |
-
2023
- 2023-12-21 US US18/392,387 patent/US20240214915A1/en active Pending
- 2023-12-21 WO PCT/KR2023/021183 patent/WO2024136493A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021052346A (en) * | 2019-09-26 | 2021-04-01 | 日本電気株式会社 | Radio terminal, core network node, and method thereof |
US20210127325A1 (en) * | 2019-10-29 | 2021-04-29 | FG Innovation Company Limited | Method and apparatus for cell reservation and access restriction |
WO2022211527A1 (en) * | 2021-03-31 | 2022-10-06 | Lg Electronics Inc. | Signalling of associated network identifier |
Non-Patent Citations (2)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3; (Release 18)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 24.501, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG1, no. V18.0.1, 26 September 2022 (2022-09-26), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 1007, XP052211191 * |
VIVO: "5GMM cause value #13 not supporting roaming for SNPN", 3GPP DRAFT; C1-202198, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG1, no. Online Meeting ;20200416 - 20200424, 9 April 2020 (2020-04-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051869645 * |
Also Published As
Publication number | Publication date |
---|---|
US20240214915A1 (en) | 2024-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023003333A1 (en) | System and method to manage stored network slice selection assistance information | |
WO2022260472A1 (en) | Method and amf apparatus for nsac operation based on ue's actual usage | |
WO2024136493A1 (en) | Method and apparatus for managing switching between access operation modes of user equipment | |
WO2023153804A1 (en) | Method and system for a hybrid automatic repeat request (harq) process in a nr mbs | |
WO2024085730A1 (en) | Method and apparatus for logging events in communication networks | |
WO2022215937A1 (en) | Method and system for providing wireless communication network assurance | |
WO2022186591A1 (en) | Method and system for releasing pdu session | |
WO2023059096A1 (en) | Wireless network and methods for handling pdu session handover admission control in wireless network | |
WO2023055101A1 (en) | Method and apparatus for network slice admission control for interworking with epc in wireless network | |
WO2024096659A1 (en) | Method and apparatus for managing forbidden tracking areas in communication network | |
EP4292339A1 (en) | Method and system for managing cell selection in a cellular network based on early-measurement feature | |
WO2024205159A1 (en) | Method and system for deploying application servers on federated edge networks | |
WO2024196124A1 (en) | Method and apparatus for enhanced edge federation in a wireless communication system | |
WO2023149699A1 (en) | Method and system for managing network slices in a communication network | |
WO2025042133A1 (en) | Method and system for handling capability changes in multi-sim devices | |
WO2024237576A1 (en) | Method and server for service parameter provisioning | |
WO2024123111A1 (en) | Method and apparatus for selecting a network entity for user equipment camping in a wireless communication system | |
KR20250124373A (en) | Method and device for managing transition between access operation modes of a user terminal | |
WO2022245130A1 (en) | Methods and systems for manual mode search following a disaster condition | |
WO2024196229A1 (en) | Method and apparatus for performing ltm coordination in dual connectivity | |
WO2024005535A1 (en) | Methods and user equipment for managing protocol data unit session | |
WO2023200260A1 (en) | Method and apparatus for handling pemc switchover in wireless communication system | |
WO2024258106A1 (en) | Method and apparatus for migration and co-existence deployments between service based architecture and p2p architectures in a wireless communication system | |
WO2022240168A1 (en) | Method and apparatus for handling plmn selection during disaster condition | |
WO2025014270A1 (en) | Apparatus and method for managing terminal configuration information in wireless communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23907776 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023907776 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023907776 Country of ref document: EP Effective date: 20250620 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020257024509 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |