[go: up one dir, main page]

WO2025247091A1 - Methods and apparatus for handling non-integrity protected handling in mobile communications - Google Patents

Methods and apparatus for handling non-integrity protected handling in mobile communications

Info

Publication number
WO2025247091A1
WO2025247091A1 PCT/CN2025/096758 CN2025096758W WO2025247091A1 WO 2025247091 A1 WO2025247091 A1 WO 2025247091A1 CN 2025096758 W CN2025096758 W CN 2025096758W WO 2025247091 A1 WO2025247091 A1 WO 2025247091A1
Authority
WO
WIPO (PCT)
Prior art keywords
snpn
access
list
reject message
plmn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2025/096758
Other languages
French (fr)
Inventor
Puneet PUNEET
Marko NIEMI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MediaTek Inc
Original Assignee
MediaTek Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MediaTek Inc filed Critical MediaTek Inc
Publication of WO2025247091A1 publication Critical patent/WO2025247091A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information

Definitions

  • the present disclosure is generally related to mobile communications and, more particularly, to handling non-integrity protected handling in mobile communications.
  • a mobile station or user equipment (UE)
  • UE user equipment
  • SNPN standalone non-public network
  • the MS/UE selects an SNPN, if available and allowable, in the following order: (1) the SNPN previously selected as result of an entry of a list of bullet (2) or (3) below with which the UE was last registered, if validity information of the entry is still met, or the equivalent SNPN if it is available and validity information of the entry of the SNPN previously selected as result of an entry of a list of bullet (2) or (3) below with which the UE was last registered is still met; (2) each SNPN which broadcasts the indication
  • cause #36 is a 5 th Generation Mobility Management (5GMM) rejection cause value that indicates an Integrated Access Backhaul (IAB) -node operation is not authorized.
  • This 5GMM cause is sent to a UE if the UE operating as an IAB-node requests a service, or if the network initiates a deregistration procedure, in a public land mobile network (PLMN) or SNPN where the UE by subscription is not authorized for an IAB operation.
  • PLMN public land mobile network
  • SNPN public land mobile network
  • SNPN public land mobile network
  • SNPN public land mobile network
  • An objective of the present disclosure is to propose solutions or schemes that address the issue (s) described herein. More specifically, various schemes proposed in the present disclosure are believed to provide solutions pertaining to handling non-integrity protected handling in mobile communications. It is believed that implementations of one or more of the schemes proposed herein may address or otherwise alleviate the issues described above.
  • a method may involve a UE receiving a reject message with a cause #36 from a network regarding an SNPN.
  • the method may involve the UE performing either or both of the following: (a) storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list in an even that the reject message with the cause #36 is received under a first condition; and (b) storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more group identifications for network selection (GINs) broadcasted by an SNPN in an even that the reject message with the cause #36 is received under a second condition.
  • GINs group identifications for network selection
  • a method may involve a UE receiving a reject message with a cause #36 from a network regarding an SNPN.
  • the method may involve the UE performing an operation corresponding to a first condition or a second condition under which the reject message is received.
  • the first condition may involve receiving the reject message and either of the following; (a) the SNPN being selected for the localized services in an SNPN access operation mode; or (b) the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  • the second condition may involve receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
  • a method may involve a UE receiving a reject message with a cause #36 from a network.
  • the method may involve the UE performing one or more operations.
  • the reject message may be received under one or more conditions including: (1) the message being received without integrity protection before the network established a secure exchange of NAS messages for a NAS signaling connection; and (2) the UE being in a PLMN or an SNPN.
  • radio access technologies such as 5G NR/Beyond Fifth-Generation (B5G) mobile communications
  • B5G Fifth-Generation
  • the proposed concepts, schemes and any variation (s) /derivative (s) thereof may be implemented in, for and by other types of radio access technologies, networks and network topologies such as, for example and without limitation, 4G/Long-Term Evolution (LTE) , LTE-Advanced, LTE-Advanced Pro, Internet-of-Things (IoT) , Narrow Band Internet of Things (NB-IoT) , Industrial Internet of Things (IIoT) , vehicle-to-everything (V2X) , and non-terrestrial network (NTN) communications.
  • LTE Long Term Evolution
  • LTE-Advanced Long Term Evolution-Advanced
  • LTE-Advanced Pro Internet-of-Things
  • IoT Internet-of-Things
  • NB-IoT Narrow Band Internet of Things
  • FIG. 1 is a diagram of an example network environment in which various solutions and schemes in accordance with the present disclosure may be implemented.
  • FIG. 2 is a block diagram of an example communication system under a proposed scheme in accordance with the present disclosure.
  • FIG. 3 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure.
  • FIG. 4 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure.
  • FIG. 5 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure. DETAILED DESCRIPTION OF PREFERRED IMPLEMENTATIONS
  • Implementations in accordance with the present disclosure relate to various techniques, methods, schemes and/or solutions pertaining to handling non-integrity protected handling in mobile communications. According to the present disclosure, a number of possible solutions may be implemented separately or jointly. That is, although these possible solutions may be described below separately, two or more of these possible solutions may be implemented in one combination or another.
  • FIG. 1 illustrates an example network environment 100 in which various solutions and schemes in accordance with the present disclosure may be implemented.
  • FIG. 2 ⁇ FIG. 5 illustrate examples of implementation of various proposed schemes in network environment 100 in accordance with the present disclosure. The following description of various proposed schemes is provided with reference to FIG. 1 ⁇ FIG. 5.
  • network environment 100 may involve a UE 110, such as a mobile device or smartphone, in wireless communication with a wireless network 120 as part of a communication network.
  • the wireless network 120 may be one or more public land mobile networks (PLMNs) including 5G/NR domain, 4G/LTE domain, and 2 nd Generation/3 rd Generation (2G/3G) domain.
  • PLMNs public land mobile networks
  • UE 110 may initially be in wireless communication with wireless network 120 via a base station or network node 125 (e.g., an eNB, gNB or transmit-receive point (TRP) ) .
  • UE 110 and the wireless network 120 may implement various schemes pertaining to handling non-integrity protected handling in mobile communications in accordance with the present disclosure, as described herein.
  • a lower layer may refer to a layer in the 5GMM protocol stack that is lower than the radio resource control (RRC) layer, such as a packet data convergence protocol (PDCP) layer, a radio control link (RLC) layer, a medium access control (MAC) layer, a physical (PHY) layer, or so forth.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • RLC radio control link
  • MAC medium access control
  • PHY physical
  • UE 110 may store the SNPN identity in a “temporarily forbidden SNPNs for access for localized services in SNPN" list.
  • UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" in an event that the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may perform one or more operations correspondingly.
  • a network e.g., wireless network 120
  • NAS non-access-stratum
  • the one or more operations may include at least one of the following: (a) discarding the message; (b) stopping an associated procedure timer (e.g., timer T3517 or T3510) ; (c) starting timer T3247 with a random value uniformly drawn from a range between 30 minutes and 60 minutes, if the timer is not running; (d) in case that UE 110 is in its home PLMN (HPLMN) or equivalent home PLMN (EHPLMN) , then performing one or more of the following operations: (i) setting the 5 th Generation System (5GS) update status to 5U3 ROAMING NOT ALLOWED; (ii) deleting the 5 th Generation Globally Unique Temporary Identity (5G-GUTI) , last visited registered tracking area identifier (TAI) , TAI list, ngKSI for 3GPP access, and a list of equivalent PLMNs; (iii) resetting a registration attempt counter and/or a service request attempt counter; (iv) setting the Evolve
  • UE 110 may perform one or more operations correspondingly.
  • a network e.g., wireless network 120
  • UE 110 may perform one or more operations correspondingly.
  • the one or more operations may include at least one of the following: (a) discarding the message; (b) stopping an associated procedure timer (e.g., timer T3517 or T3510) ; (c) in case that the SNPN sending the message was selected for localized services and there is next valid time period (s) for the SNPN start timer T3247 with a random value uniformly drawn from a range either between the start time point of the next valid time period for localized services in SNPN access operation mode is enabled and 30 minutes after the start time point of the next valid time period for localized services in SNPN access operation mode is enabled, in case that the next valid time period is longer than 30 minutes or between the start time point of the next valid time period for localized services in SNPN access operation mode is enabled and the end time point of the next valid time period for localized services in SNPN access operation mode is enabled, in case that the next valid time period is no longer than 30 minutes and/or otherwise, starting timer T3247 between a range of 15 minutes and 30 minutes; (d
  • UE 110 may delete a list of equivalent SNPNs (if available) .
  • UE 110 may reset a registration attempt counter and store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP Technical Specification (TS) 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • TS Technical Specification
  • UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may enter the state 5GMM-DEREGISTERED.
  • UE 110 may set the SNPN attempt counter for 3GPP access for the current SNPN to a UE implementation-specific maximum value.
  • UE 110 may reset a registration attempt counter and store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP TS 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may enter the state 5GMM-DEREGISTERED. PLMN-SEARCH and perform an SNPN selection according to 3GPP TS 23.122 [5] .
  • UE 110 may delete the list of equivalent SNPNs (if available) .
  • UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP TS 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
  • UE 110 may enter the state 5GMM-DEREGISTERED.
  • UE 110 may set the SNPN-specific attempt counter for 3GPP access for the current SNPN to a UE implementation-specific maximum value.
  • FIG. 2 illustrates an example communication system 200 having at least an example apparatus 210 and an example apparatus 220 in accordance with an implementation of the present disclosure.
  • apparatus 210 and apparatus 220 may perform various functions to implement schemes, techniques, processes and methods described herein pertaining to handling non-integrity protected handling in mobile communications, including the various schemes described above with respect to various proposed designs, concepts, schemes, systems and methods described above, including network environment 100, as well as processes described below.
  • Each of apparatus 210 and apparatus 220 may be a part of an electronic apparatus, which may be a network apparatus or a UE (e.g., UE 110) , such as a portable or mobile apparatus, a wearable apparatus, a vehicular device or a vehicle, a wireless communication apparatus or a computing apparatus.
  • a network apparatus e.g., UE 110
  • UE e.g., UE 110
  • each of apparatus 210 and apparatus 220 may be implemented in a smartphone, a smart watch, a personal digital assistant, an electronic control unit (ECU) in a vehicle, a digital camera, or a computing equipment such as a tablet computer, a laptop computer or a notebook computer.
  • ECU electronice control unit
  • Each of apparatus 210 and apparatus 220 may also be a part of a machine type apparatus, which may be an IoT apparatus such as an immobile or a stationary apparatus, a home apparatus, a roadside unit (RSU) , a wire communication apparatus or a computing apparatus.
  • IoT apparatus such as an immobile or a stationary apparatus, a home apparatus, a roadside unit (RSU) , a wire communication apparatus or a computing apparatus.
  • RSU roadside unit
  • each of apparatus 210 and apparatus 220 may be implemented in a smart thermostat, a smart fridge, a smart door lock, a wireless speaker or a home control center.
  • apparatus 210 and/or apparatus 220 may be implemented in an eNB in an LTE, LTE-Advanced or LTE-Advanced Pro network or in a gNB or TRP in a 5G network, an NR network, or an IoT network.
  • each of apparatus 210 and apparatus 220 may be implemented in the form of one or more integrated-circuit (IC) chips such as, for example and without limitation, one or more single-core processors, one or more multi-core processors, one or more complex-instruction-set-computing (CISC) processors, or one or more reduced-instruction-set-computing (RISC) processors.
  • IC integrated-circuit
  • CISC complex-instruction-set-computing
  • RISC reduced-instruction-set-computing
  • each of apparatus 210 and apparatus 220 may be implemented in or as a network apparatus or a UE.
  • Each of apparatus 210 and apparatus 220 may include at least some of those components shown in FIG. 2 such as a processor 212 and a processor 222, respectively, for example.
  • Each of apparatus 210 and apparatus 220 may further include one or more other components not pertinent to the proposed scheme of the present disclosure (e.g., internal power supply, display device and/or user interface device) , and, thus, such component (s) of apparatus 210 and apparatus 220 are neither shown in FIG. 2 nor described below in the interest of simplicity and brevity.
  • components not pertinent to the proposed scheme of the present disclosure e.g., internal power supply, display device and/or user interface device
  • each of processor 212 and processor 222 may be implemented in the form of one or more single-core processors, one or more multi-core processors, or one or more CISC or RISC processors. That is, even though a singular term “a processor” is used herein to refer to processor 212 and processor 222, each of processor 212 and processor 222 may include multiple processors in some implementations and a single processor in other implementations in accordance with the present disclosure.
  • each of processor 212 and processor 222 may be implemented in the form of hardware (and, optionally, firmware) with electronic components including, for example and without limitation, one or more transistors, one or more diodes, one or more capacitors, one or more resistors, one or more inductors, one or more memristors and/or one or more varactors that are configured and arranged to achieve specific purposes in accordance with the present disclosure.
  • each of processor 212 and processor 222 is a special-purpose machine specifically designed, arranged, and configured to perform specific tasks including those pertaining to handling non-integrity protected handling in mobile communications in accordance with various implementations of the present disclosure.
  • apparatus 210 may also include a transceiver 216 coupled to processor 212.
  • Transceiver 216 may be capable of wirelessly transmitting and receiving data.
  • transceiver 216 may be capable of wirelessly communicating with different types of wireless networks of different radio access technologies (RATs) .
  • RATs radio access technologies
  • transceiver 216 may be equipped with a plurality of antenna ports (not shown) such as, for example, four antenna ports. That is, transceiver 216 may be equipped with multiple transmit antennas and multiple receive antennas for multiple-input multiple-output (MIMO) wireless communications.
  • apparatus 220 may also include a transceiver 226 coupled to processor 222.
  • Transceiver 226 may include a transceiver capable of wirelessly transmitting and receiving data.
  • transceiver 226 may be capable of wirelessly communicating with different types of UEs/wireless networks of different RATs.
  • transceiver 226 may be equipped with a plurality of antenna ports (not shown) such as, for example, four antenna ports. That is, transceiver 226 may be equipped with multiple transmit antennas and multiple receive antennas for MIMO wireless communications.
  • apparatus 210 may further include a memory 214 coupled to processor 212 and capable of being accessed by processor 212 and storing data therein.
  • apparatus 220 may further include a memory 224 coupled to processor 222 and capable of being accessed by processor 222 and storing data therein.
  • Each of memory 214 and memory 224 may include a type of random-access memory (RAM) such as dynamic RAM (DRAM) , static RAM (SRAM) , thyristor RAM (T-RAM) and/or zero-capacitor RAM (Z-RAM) .
  • RAM random-access memory
  • DRAM dynamic RAM
  • SRAM static RAM
  • T-RAM thyristor RAM
  • Z-RAM zero-capacitor RAM
  • each of memory 214 and memory 224 may include a type of read-only memory (ROM) such as mask ROM, programmable ROM (PROM) , erasable programmable ROM (EPROM) and/or electrically erasable programmable ROM (EEPROM) .
  • ROM read-only memory
  • PROM programmable ROM
  • EPROM erasable programmable ROM
  • EEPROM electrically erasable programmable ROM
  • each of memory 214 and memory 224 may include a type of non-volatile random-access memory (NVRAM) such as flash memory, solid-state memory, ferroelectric RAM (FeRAM) , magnetoresistive RAM (MRAM) and/or phase-change memory.
  • NVRAM non-volatile random-access memory
  • Each of apparatus 210 and apparatus 220 may be a communication entity capable of communicating with each other using various proposed schemes in accordance with the present disclosure.
  • a description of capabilities of apparatus 210, as a UE (e.g., UE 110) , and apparatus 220, as a network node (e.g., network node 125) of a network is provided below in the context of example processes 300, 400 and 500.
  • FIG. 3, FIG. 4 and FIG. 5 illustrates an example process 300, example process 400 or example process 500, respectively, in accordance with an implementation of the present disclosure.
  • Each of process 300, process 400 and process 500 may represent an aspect of implementing various proposed designs, concepts, schemes, systems and methods described above. More specifically, each of process 300, process 400 and process 500 may represent an aspect of the proposed concepts and schemes pertaining to handling non-integrity protected handling in mobile communications in accordance with the present disclosure.
  • Each of process 300, process 400 and process 500 may include one or more operations, actions, or functions as illustrated by one or more of blocks 310 and 320 for process 300, blocks 410 and 420 for process 400, and blocks 510 and 520 for process 500.
  • each of process 300, process 400 and process 500 may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation.
  • the blocks/sub-blocks of each of process 300, process 400 and process 500 may be executed in the order shown in FIG. 3, FIG. 4 and FIG. 5, respectively, or in a different order.
  • one or more of the blocks/sub-blocks of each of process 300, process 400 and process 500 may be executed repeatedly or iteratively.
  • Each of process 300, process 400 and process 500 may be implemented by or in apparatus 210 and apparatus 220 as well as any variations thereof.
  • each of process 300, process 400 and process 500 is described below in the context of apparatus 210 as a UE (e.g., UE 110) and apparatus 220 as a communication entity such as a network node or base station (e.g., network node 125) of a network (e.g., wireless network 120) .
  • Process 300 may begin at block 310.
  • process 300 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) regarding an SNPN.
  • a network e.g., wireless network 120 via apparatus 220 as network node 125
  • Process 300 may proceed from 310 to 320.
  • process 300 may involve processor 212, in response to the receiving, performing either or both of the following: (a) storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list in an even that the reject message with the cause #36 is received under a first condition; and/or (b) storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more GINs broadcasted by an SNPN in an even that the reject message with the cause #36 is received under a second condition.
  • the first condition may involve receiving the reject message and either: (a) the SNPN being selected for the localized services in an SNPN access operation mode; or (b) the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  • the first condition may involve the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  • process 300 may further involve processor 212 storing the one or more GINs broadcasted by one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list.
  • process 300 in storing the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list, process 300 may involve processor 212 storing the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list for a selected entry of a list of subscriber data or a selected PLMN subscription.
  • the second condition may involve receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
  • process 300 may involve processor 212 storing the SNPN identity in the “temporarily forbidden SNPNs” list along with the one or more GINs broadcasted by the SNPN for a selected entry of a list of subscriber data or a selected PLMN subscription.
  • Process 400 may begin at block 410.
  • process 400 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) regarding an SNPN.
  • a network e.g., wireless network 120 via apparatus 220 as network node 125
  • Process 400 may proceed from 410 to 420.
  • process 400 may involve processor 212, in response to the receiving, performing an operation corresponding to a first condition or a second condition under which the reject message is received.
  • the first condition may involve receiving the reject message and either: (1) the SNPN being selected for the localized services in an SNPN access operation mode; or (2) apparatus 210 supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  • the second condition may involve receiving the reject message and apparatus 210 supporting an access to the SNPN using one or more credentials from a credentials holder.
  • process 400 may involve processor 212 storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list.
  • process 400 may involve processor 212 storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more GINs broadcasted by an SNPN.
  • Process 500 may begin at block 510.
  • process 500 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) .
  • the reject message may be received under one or more conditions, such as: (a) the message being received without integrity protection before the network established a secure exchange of NAS messages for a NAS signaling connection (e.g., N1 NAS signaling connection) ; and/or (b) apparatus 210 being in a PLMN or an SNPN.
  • Process 500 may proceed from 510 to 520.
  • process 500 may involve processor 212, in response to the receiving, performing one or more operations.
  • the reject message may include a registration reject message or a service reject message.
  • the one or more operations may include at least one of the following operations: (a) discarding the reject message; (b) stopping an associated procedure timer; (c) starting a T3247 timer with a random value in a range between 30 minutes and 60 minutes; (d) in an event that the UE is in a home PLMN (HPLMN) or equivalent home PLMN (EHPLMN) , performing one or more of the following: (i) setting a 5GS update status to 5U3 ROAMING NOT ALLOWED; (ii) deleting a 5G-GUTI, a last visited registered TAI, a TAI list, an ngKSI for a 3GPP access, and a list of equivalent PLMNs; (iii) resetting either or both of a registration attempt counter and a service request attempt counter; (vi) setting an EPS update status to EU3 ROAMING NOT ALLOWED, deleting any 4G-GUTI, the last visited registered
  • the one or more operations may include at least one of the following operations: (a) discarding the reject message; (b) stopping an associated procedure timer; (c) starting timer T3247 between a range of 15 minutes and 30 minutes in an event that the SNPN, which sent the reject message, was selected for localized services and there is a next valid time period for an SNPN start timer T3247 with a random value in a range either between a start time point of the next valid time period for the localized services in the SNPN and 30 minutes after the start time point of the next valid time period for the localized services in the SNPN, in an event that the next valid time period is longer than 30 minutes or between the start time point of the next valid time period for the localized services in the SNPN and an end time point of the next valid time period for the localized services in the SNPN, or in an event that the next valid time period is no longer than 30 minutes; (d) incrementing an SNPN-specific attempt
  • any two components so associated can also be viewed as being “operably connected” , or “operably coupled” , to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being “operably couplable” , to each other to achieve the desired functionality.
  • operably couplable include but are not limited to physically mateable and/or physically interacting components and/or wirelessly interactable and/or wirelessly interacting components and/or logically interacting and/or logically interactable components.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Techniques pertaining to handling non-integrity protected handling in mobile communications are described. An apparatus (e.g., a UE) receives a reject message with a cause #36 from a network regarding a standalone non-public network (SNPN). In response, the apparatus performs either or both of the following operations: (a) storing an SNPN identity of the SNPN in a "temporarily forbidden SNPNs for access for localized services in SNPN" list in an even that the reject message with the cause #36 is received under a first condition; and (b) storing the SNPN identity in a "temporarily forbidden SNPNs" list along with one or more group identifications for network selection (GINs) broadcasted by an SNPN in an even that the reject message with the cause #36 is received under a second condition.

Description

METHODS AND APPARATUS FOR HANDLING NON-INTEGRITY PROTECTED HANDLING IN MOBILE COMMUNICATIONS
CROSS REFERENCE TO RELATED PATENT APPLICATION (S)
The present disclosure claims the priority benefit of Indian Patent Application Nos. 202421041165 and 202421041053, filed 27 May 2024 and 27 May 2024, respectively, the contents of which herein being incorporated by reference in their entirety.
TECHNICAL FIELD
The present disclosure is generally related to mobile communications and, more particularly, to handling non-integrity protected handling in mobile communications.
BACKGROUND
In wireless communications such as mobile communications under the current 3rd Generation Partnership Project (3GPP) specification, if a mobile station (MS) , or user equipment (UE) , supports access to a standalone non-public network (SNPN) providing access for localized services in SNPN and access for localized services in SNPN access operation mode is enabled, then, using the SNPN selection parameters for access for localized services in SNPN access operation mode is enabled in the selected entry of the "list of subscriber data" or associated with the selected PLMN subscription, the MS/UE selects an SNPN, if available and allowable, in the following order: (1) the SNPN previously selected as result of an entry of a list of bullet (2) or (3) below with which the UE was last registered, if validity information of the entry is still met, or the equivalent SNPN if it is available and validity information of the entry of the SNPN previously selected as result of an entry of a list of bullet (2) or (3) below with which the UE was last registered is still met; (2) each SNPN which broadcasts the indication that access using credentials from a credentials holder is supported and which is identified by an SNPN identity contained in an entry of the "credentials holder controlled prioritized list of preferred SNPNs for access for localized services in SNPN" (in priority order) , if the validity information of the entry is met; and (3) each SNPN which broadcasts the indication that access using credentials from a credentials holder is supported and which broadcast a Group Identification for Network selection (GIN) contained in an entry of the "credentials holder controlled prioritized list of preferred GINs for access for localized services in SNPN" (in priority order) , if the validity information of the entry is met. If more than one such SNPN broadcast the same GIN, the order in which the MS attempts registration on those SNPNs is MS implementation specific.
In 3GPP, cause #36 is a 5th Generation Mobility Management (5GMM) rejection cause value that indicates an Integrated Access Backhaul (IAB) -node operation is not authorized. This 5GMM cause is sent to a UE if the UE operating as an IAB-node requests a service, or if the network initiates a deregistration procedure, in a public land mobile network (PLMN) or SNPN where the UE by subscription is not authorized for an IAB operation. At the time of the present disclosure, UE behavior is undefined if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled and cause #36 is received. Moreover, UE behavior is also undefined when the UE receives cause #36 in a message from the network without integrity protection.
Therefore, there is a need for a solution of handling non-integrity protected handling in mobile communications.
SUMMARY
The following summary is illustrative only and is not intended to be limiting in any way. That is, the following summary is provided to introduce concepts, highlights, benefits, and advantages of the novel and non-obvious techniques described herein. Select implementations are further described below in the detailed description. Thus, the following summary is not intended to identify essential features of the claimed subject matter, nor is it intended for use in determining the scope of the claimed subject matter.
An objective of the present disclosure is to propose solutions or schemes that address the issue (s) described herein. More specifically, various schemes proposed in the present disclosure are believed to provide solutions pertaining to handling non-integrity protected handling in mobile communications. It is believed that implementations of one or more of the schemes proposed herein may address or otherwise alleviate the issues described above.
In one aspect, a method may involve a UE receiving a reject message with a cause #36 from a network regarding an SNPN. In response to the receiving, the method may involve the UE performing either or both of the following: (a) storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list in an even that the reject message with the cause #36 is received under a first condition; and (b) storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more group identifications for network selection (GINs) broadcasted by an SNPN in an even that the reject message with the cause #36 is received under a second condition.
In another aspect, a method may involve a UE receiving a reject message with a cause #36 from a network regarding an SNPN. In response to the receiving, the method may involve the UE performing an operation corresponding to a first condition or a second condition under which the reject message is received. The first condition may involve receiving the reject message and either of the following; (a) the SNPN being selected for the localized services in an SNPN access operation mode; or (b) the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled. The second condition may involve receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
In yet another aspect, a method may involve a UE receiving a reject message with a cause #36 from a network. In response to the receiving, the method may involve the UE performing one or more operations. The reject message may be received under one or more conditions including: (1) the message being received without integrity protection before the network established a secure exchange of NAS messages for a NAS signaling connection; and (2) the UE being in a PLMN or an SNPN.
It is noteworthy that, although the description provided herein may be in the context of certain radio access technologies, networks, and network topologies such as 5G NR/Beyond Fifth-Generation (B5G) mobile communications, the proposed concepts, schemes and any variation (s) /derivative (s) thereof may be implemented in, for and by other types of radio access technologies, networks and network topologies such as, for example and without limitation, 4G/Long-Term Evolution (LTE) , LTE-Advanced, LTE-Advanced Pro, Internet-of-Things (IoT) , Narrow Band Internet of Things (NB-IoT) , Industrial Internet of Things (IIoT) , vehicle-to-everything (V2X) , and non-terrestrial network (NTN) communications. Thus, the scope of the present disclosure is not limited to the examples described herein.
BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of the present disclosure. The drawings illustrate implementations of the disclosure and, together with the description, serve to explain the principles of the disclosure. It is appreciable that the drawings are not necessarily in scale as some components may be shown to be out of proportion than the size in actual implementation in order to clearly illustrate the concept of the present disclosure.
FIG. 1 is a diagram of an example network environment in which various solutions and schemes in accordance with the present disclosure may be implemented.
FIG. 2 is a block diagram of an example communication system under a proposed scheme in accordance with the present disclosure.
FIG. 3 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure.
FIG. 4 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure.
FIG. 5 is a flowchart of a second example process under a proposed scheme in accordance with the present disclosure.
DETAILED DESCRIPTION OF PREFERRED IMPLEMENTATIONS
Detailed embodiments and implementations of the claimed subject matters are disclosed herein. However, it shall be understood that the disclosed embodiments and implementations are merely illustrative of the claimed subject matters which may be embodied in various forms. The present disclosure may, however, be embodied in many different forms and should not be construed as limited to the exemplary embodiments and implementations set forth herein. Rather, these exemplary embodiments and implementations are provided so that description of the present disclosure is thorough and complete and will fully convey the scope of the present disclosure to those skilled in the art. In the description below, details of well-known features and techniques may be omitted to avoid unnecessarily obscuring the presented embodiments and implementations.
Overview
Implementations in accordance with the present disclosure relate to various techniques, methods, schemes and/or solutions pertaining to handling non-integrity protected handling in mobile communications. According to the present disclosure, a number of possible solutions may be implemented separately or jointly. That is, although these possible solutions may be described below separately, two or more of these possible solutions may be implemented in one combination or another.
FIG. 1 illustrates an example network environment 100 in which various solutions and schemes in accordance with the present disclosure may be implemented. FIG. 2 ~ FIG. 5 illustrate examples of implementation of various proposed schemes in network environment 100 in accordance with the present disclosure. The following description of various proposed schemes is provided with reference to FIG. 1 ~ FIG. 5.
Referring to FIG. 1, network environment 100 may involve a UE 110, such as a mobile device or smartphone, in wireless communication with a wireless network 120 as part of a communication network. The wireless network 120 may be one or more public land mobile networks (PLMNs) including 5G/NR domain, 4G/LTE domain, and 2nd Generation/3rd Generation (2G/3G) domain. UE 110 may initially be in wireless communication with wireless network 120 via a base station or network node 125 (e.g., an eNB, gNB or transmit-receive point (TRP) ) . In network environment 100, UE 110 and the wireless network 120 may implement various schemes pertaining to handling non-integrity protected handling in mobile communications in accordance with the present disclosure, as described herein.
It is noteworthy that, while the various proposed schemes may be individually or separately described below, in actual implementations some or all of the proposed schemes may be utilized or otherwise implemented jointly. Of course, each of the proposed schemes may be utilized or otherwise implemented individually or separately. Moreover, as used herein, a lower layer may refer to a layer in the 5GMM protocol stack that is lower than the radio resource control (RRC) layer, such as a packet data convergence protocol (PDCP) layer, a radio control link (RLC) layer, a medium access control (MAC) layer, a physical (PHY) layer, or so forth.
Under a first proposed scheme in accordance with the present disclosure, in case that UE 110 receives a reject message with cause #36 and/or in case that the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled, then UE 110 may store the SNPN identity in a “temporarily forbidden SNPNs for access for localized services in SNPN" list.
Under a second proposed scheme in accordance with the present disclosure, in case that UE 110 receives a reject message with cause #36 and/or UE 110 supports access to an SNPN using credentials from a credentials holder, UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
Under a third proposed scheme in accordance with the present disclosure, in case that UE 110 receives a reject message with cause #36 and/or UE 110 supports access to an SNPN providing access for localized services in SNPN access operation mode is enabled and the access for localized services in SNPN access operation mode is enabled has been enabled, UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" in an event that the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription.
Under a fourth proposed scheme in accordance with the present disclosure, in case that UE 110 receives a 5GMM cause #36 in a message from a network (e.g., wireless network 120) , such as a REGISTRATION REJECT message or a SERVICE REJECT message, for example, and/or UE 110 receives the message without integrity protection before the network has established secure exchange of non-access-stratum (NAS) messages for the N1 NAS signaling connection, while the message is received for UE 110 in a PLMN, then UE 110 may perform one or more operations correspondingly. The one or more operations may include at least one of the following: (a) discarding the message; (b) stopping an associated procedure timer (e.g., timer T3517 or T3510) ; (c) starting timer T3247 with a random value uniformly drawn from a range between 30 minutes and 60 minutes, if the timer is not running; (d) in case that UE 110 is in its home PLMN (HPLMN) or equivalent home PLMN (EHPLMN) , then performing one or more of the following operations: (i) setting the 5th Generation System (5GS) update status to 5U3 ROAMING NOT ALLOWED; (ii) deleting the 5th Generation Globally Unique Temporary Identity (5G-GUTI) , last visited registered tracking area identifier (TAI) , TAI list, ngKSI for 3GPP access, and a list of equivalent PLMNs; (iii) resetting a registration attempt counter and/or a service request attempt counter; (iv) setting the Evolved Packet System (EPS) update status to EU3 ROAMING NOT ALLOWED and deleting any 4th Generation Globally Unique Temporary Identity (4G-GUTI) , last visited registered TAI, TAI list and eKSI, resetting an attach attempt counter or a tracking area updating attempt counter, and entering the state EMM-DEREGISTERED; (v) storing a current TAI in the list of "5GS forbidden tracking areas for roaming" , memorizing that the current TAI has been stored in the list of "5GS forbidden tracking areas for roaming" for non-integrity protected NAS reject message; (vi) entering the state 5GMM-DEREGISTERED. LIMITED-SERVICE; (vii) searching for a suitable cell in another tracking area; and/or (viii) performing a registration attempt over a non-3GPP access, in case that: (1) the non-3GPP access is available, (2) UE 110 is not registered over the non-3GPP access yet, and (3) the universal subscriber identification module (USIM) is not considered invalid for 5GS services over the non-3GPP access; (e) in case that UE 110 is not in its HPLMN or EHPLMN, then performing one or more of the following operations: (i) incrementing the PLMN-specific attempt counter for the PLMN, in case that the message was received via a 3GPP access and in case that a PLMN-specific attempt counter for the PLMN sending the reject message has a value less than a UE implementation-specific maximum value; (ii) setting the 5GS update status to 5U3 ROAMING NOT ALLOWED; (iii) deleting the 5G-GUTI, last visited registered TAI, TAI list, ngKSI for 3GPP access and the list of equivalent PLMNs; (iv) resetting the registration attempt counter and/or service request attempt counter; (v) storing the PLMN identity in a forbidden PLMN list; (vi) entering the state 5GMM-DEREGISTERED. PLMN-SEARCH; and/or (vii) performing a PLMN selection procedure.
Under a fifth proposed scheme in accordance with the present disclosure, in case that UE 110 receives a 5GMM cause #36 in a message from a network (e.g., wireless network 120) , such as a REGISTRATION REJECT message or a SERVICE REJECT message, for example, and/or UE 110 receives the message without integrity protection before the network has established secure exchange of NAS messages for the N1 NAS signaling connection, while the message is received for UE 110 in a SNPN, then UE 110 may perform one or more operations correspondingly. The one or more operations may include at least one of the following: (a) discarding the message; (b) stopping an associated procedure timer (e.g., timer T3517 or T3510) ; (c) in case that the SNPN sending the message was selected for localized services and there is next valid time period (s) for the SNPN start timer T3247 with a random value uniformly drawn from a range either between the start time point of the next valid time period for localized services in SNPN access operation mode is enabled and 30 minutes after the start time point of the next valid time period for localized services in SNPN access operation mode is enabled, in case that the next valid time period is longer than 30 minutes or between the start time point of the next valid time period for localized services in SNPN access operation mode is enabled and the end time point of the next valid time period for localized services in SNPN access operation mode is enabled, in case that the next valid time period is no longer than 30 minutes and/or otherwise, starting timer T3247 between a range of 15 minutes and 30 minutes; (d) incrementing a SNPN-specific attempt counter for the SNPN, if the message was received via a 3GPP access and if the SNPN-specific attempt counter for the SNPN sending the reject message has a value less than a UE implementation-specific maximum value; (e) setting the 5GS update status to 5U3 ROAMING NOT ALLOWED; (f) deleting the 5G-GUTI, last visited registered TAI, TAI list, ngKSI for 3GPP access and the list of equivalent SNPNs; (g) resetting the registration attempt counter and/or service request attempt counter; (h) storing the SNPN identity in the forbidden SNPN list; (j) entering the state 5GMM-DEREGISTERED. PLMN-SEARCH; and/or (k) performing an SNPN selection procedure.
As a first implementation example, in the context of receiving cause #36 during an initial registration not accepted by a network, in case that UE 110 is operating in an SNPN access operation mode, UE 110 may delete a list of equivalent SNPNs (if available) . UE 110 may reset a registration attempt counter and store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP Technical Specification (TS) 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN using credentials from a credentials holder, UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN providing access for localized services in SNPN access operation mode is enabled and the access for localized services in SNPN has been enabled, UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. UE 110 may enter the state 5GMM-DEREGISTERED. PLMN-SEARCH and perform an SNPN selection according to 3GPP TS 23.122 [5] . In an event that the message has been successfully integrity checked by the NAS, UE 110 may set the SNPN attempt counter for 3GPP access for the current SNPN to a UE implementation-specific maximum value.
As a second implementation example, in the context of receiving cause #36 during a network-initial deregistration procedure completion by UE 110, in case that UE 110 is operating in an SNPN access operation mode, UE 110 may reset a registration attempt counter and store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP TS 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN using credentials from a credentials holder, UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN providing access for localized services in SNPN access operation mode is enabled and the access for localized services in SNPN has been enabled, UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN, if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. UE 110 may enter the state 5GMM-DEREGISTERED. PLMN-SEARCH and perform an SNPN selection according to 3GPP TS 23.122 [5] .
As a third implementation example, in the context of receiving cause #36 during a service request procedure not accepted by the network, in case that UE 110 is operating in an SNPN access operation mode, UE 110 may delete the list of equivalent SNPNs (if available) . UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list or "temporarily forbidden SNPNs for access for localized services in SNPN" list if the SNPN is an SNPN selected for localized services in SNPN access operation mode is enabled (see 3GPP TS 23.122 [5] ) for 3GPP access for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN using credentials from a credentials holder, UE 110 may store the SNPN identity in the "temporarily forbidden SNPNs" list along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. In case that UE 110 supports access to an SNPN providing access for localized services in SNPN access operation mode is enabled and the access for localized services in SNPN has been enabled, UE 110 may store the SNPN identity in the list of "temporarily forbidden SNPNs for access for localized services in SNPN" (if the SNPN is an SNPN selected for localized services in SNPN (see 3GPP TS 23.122 [5] ) along with the GIN (s) broadcasted by the SNPN if any, for the selected entry of the "list of subscriber data" or the selected PLMN subscription. UE 110 may enter the state 5GMM-DEREGISTERED. PLMN-SEARCH and perform an SNPN selection according to 3GPP TS 23.122 [5] . In an event that the message has been successfully integrity checked by the NAS, UE 110 may set the SNPN-specific attempt counter for 3GPP access for the current SNPN to a UE implementation-specific maximum value.
Illustrative Implementations
FIG. 2 illustrates an example communication system 200 having at least an example apparatus 210 and an example apparatus 220 in accordance with an implementation of the present disclosure. Each of apparatus 210 and apparatus 220 may perform various functions to implement schemes, techniques, processes and methods described herein pertaining to handling non-integrity protected handling in mobile communications, including the various schemes described above with respect to various proposed designs, concepts, schemes, systems and methods described above, including network environment 100, as well as processes described below.
Each of apparatus 210 and apparatus 220 may be a part of an electronic apparatus, which may be a network apparatus or a UE (e.g., UE 110) , such as a portable or mobile apparatus, a wearable apparatus, a vehicular device or a vehicle, a wireless communication apparatus or a computing apparatus. For instance, each of apparatus 210 and apparatus 220 may be implemented in a smartphone, a smart watch, a personal digital assistant, an electronic control unit (ECU) in a vehicle, a digital camera, or a computing equipment such as a tablet computer, a laptop computer or a notebook computer. Each of apparatus 210 and apparatus 220 may also be a part of a machine type apparatus, which may be an IoT apparatus such as an immobile or a stationary apparatus, a home apparatus, a roadside unit (RSU) , a wire communication apparatus or a computing apparatus. For instance, each of apparatus 210 and apparatus 220 may be implemented in a smart thermostat, a smart fridge, a smart door lock, a wireless speaker or a home control center. When implemented in or as a network apparatus, apparatus 210 and/or apparatus 220 may be implemented in an eNB in an LTE, LTE-Advanced or LTE-Advanced Pro network or in a gNB or TRP in a 5G network, an NR network, or an IoT network.
In some implementations, each of apparatus 210 and apparatus 220 may be implemented in the form of one or more integrated-circuit (IC) chips such as, for example and without limitation, one or more single-core processors, one or more multi-core processors, one or more complex-instruction-set-computing (CISC) processors, or one or more reduced-instruction-set-computing (RISC) processors. In the various schemes described above, each of apparatus 210 and apparatus 220 may be implemented in or as a network apparatus or a UE. Each of apparatus 210 and apparatus 220 may include at least some of those components shown in FIG. 2 such as a processor 212 and a processor 222, respectively, for example. Each of apparatus 210 and apparatus 220 may further include one or more other components not pertinent to the proposed scheme of the present disclosure (e.g., internal power supply, display device and/or user interface device) , and, thus, such component (s) of apparatus 210 and apparatus 220 are neither shown in FIG. 2 nor described below in the interest of simplicity and brevity.
In one aspect, each of processor 212 and processor 222 may be implemented in the form of one or more single-core processors, one or more multi-core processors, or one or more CISC or RISC processors. That is, even though a singular term “a processor” is used herein to refer to processor 212 and processor 222, each of processor 212 and processor 222 may include multiple processors in some implementations and a single processor in other implementations in accordance with the present disclosure. In another aspect, each of processor 212 and processor 222 may be implemented in the form of hardware (and, optionally, firmware) with electronic components including, for example and without limitation, one or more transistors, one or more diodes, one or more capacitors, one or more resistors, one or more inductors, one or more memristors and/or one or more varactors that are configured and arranged to achieve specific purposes in accordance with the present disclosure. In other words, in at least some implementations, each of processor 212 and processor 222 is a special-purpose machine specifically designed, arranged, and configured to perform specific tasks including those pertaining to handling non-integrity protected handling in mobile communications in accordance with various implementations of the present disclosure.
In some implementations, apparatus 210 may also include a transceiver 216 coupled to processor 212. Transceiver 216 may be capable of wirelessly transmitting and receiving data. In some implementations, transceiver 216 may be capable of wirelessly communicating with different types of wireless networks of different radio access technologies (RATs) . In some implementations, transceiver 216 may be equipped with a plurality of antenna ports (not shown) such as, for example, four antenna ports. That is, transceiver 216 may be equipped with multiple transmit antennas and multiple receive antennas for multiple-input multiple-output (MIMO) wireless communications. In some implementations, apparatus 220 may also include a transceiver 226 coupled to processor 222. Transceiver 226 may include a transceiver capable of wirelessly transmitting and receiving data. In some implementations, transceiver 226 may be capable of wirelessly communicating with different types of UEs/wireless networks of different RATs. In some implementations, transceiver 226 may be equipped with a plurality of antenna ports (not shown) such as, for example, four antenna ports. That is, transceiver 226 may be equipped with multiple transmit antennas and multiple receive antennas for MIMO wireless communications.
In some implementations, apparatus 210 may further include a memory 214 coupled to processor 212 and capable of being accessed by processor 212 and storing data therein. In some implementations, apparatus 220 may further include a memory 224 coupled to processor 222 and capable of being accessed by processor 222 and storing data therein. Each of memory 214 and memory 224 may include a type of random-access memory (RAM) such as dynamic RAM (DRAM) , static RAM (SRAM) , thyristor RAM (T-RAM) and/or zero-capacitor RAM (Z-RAM) . Alternatively, or additionally, each of memory 214 and memory 224 may include a type of read-only memory (ROM) such as mask ROM, programmable ROM (PROM) , erasable programmable ROM (EPROM) and/or electrically erasable programmable ROM (EEPROM) . Alternatively, or additionally, each of memory 214 and memory 224 may include a type of non-volatile random-access memory (NVRAM) such as flash memory, solid-state memory, ferroelectric RAM (FeRAM) , magnetoresistive RAM (MRAM) and/or phase-change memory.
Each of apparatus 210 and apparatus 220 may be a communication entity capable of communicating with each other using various proposed schemes in accordance with the present disclosure. For illustrative purposes and without limitation, a description of capabilities of apparatus 210, as a UE (e.g., UE 110) , and apparatus 220, as a network node (e.g., network node 125) of a network (e.g., wireless network 120 as a 5G/NR mobile network) , is provided below in the context of example processes 300, 400 and 500.
Illustrative Processes
Each of FIG. 3, FIG. 4 and FIG. 5 illustrates an example process 300, example process 400 or example process 500, respectively, in accordance with an implementation of the present disclosure. Each of process 300, process 400 and process 500 may represent an aspect of implementing various proposed designs, concepts, schemes, systems and methods described above. More specifically, each of process 300, process 400 and process 500 may represent an aspect of the proposed concepts and schemes pertaining to handling non-integrity protected handling in mobile communications in accordance with the present disclosure. Each of process 300, process 400 and process 500 may include one or more operations, actions, or functions as illustrated by one or more of blocks 310 and 320 for process 300, blocks 410 and 420 for process 400, and blocks 510 and 520 for process 500. Although illustrated as discrete blocks, various blocks of each of process 300, process 400 and process 500 may be divided into additional blocks, combined into fewer blocks, or eliminated, depending on the desired implementation. Moreover, the blocks/sub-blocks of each of process 300, process 400 and process 500 may be executed in the order shown in FIG. 3, FIG. 4 and FIG. 5, respectively, or in a different order. Furthermore, one or more of the blocks/sub-blocks of each of process 300, process 400 and process 500 may be executed repeatedly or iteratively. Each of process 300, process 400 and process 500 may be implemented by or in apparatus 210 and apparatus 220 as well as any variations thereof. Solely for illustrative purposes and without limiting the scope, each of process 300, process 400 and process 500 is described below in the context of apparatus 210 as a UE (e.g., UE 110) and apparatus 220 as a communication entity such as a network node or base station (e.g., network node 125) of a network (e.g., wireless network 120) .
Process 300 may begin at block 310.
At 310, process 300 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) regarding an SNPN. Process 300 may proceed from 310 to 320.
At 320, process 300 may involve processor 212, in response to the receiving, performing either or both of the following: (a) storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list in an even that the reject message with the cause #36 is received under a first condition; and/or (b) storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more GINs broadcasted by an SNPN in an even that the reject message with the cause #36 is received under a second condition.
In some implementations, the first condition may involve receiving the reject message and either: (a) the SNPN being selected for the localized services in an SNPN access operation mode; or (b) the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
In some implementations, the first condition may involve the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
In some implementations, process 300 may further involve processor 212 storing the one or more GINs broadcasted by one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list. In some implementations, in storing the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list, process 300 may involve processor 212 storing the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list for a selected entry of a list of subscriber data or a selected PLMN subscription.
In some implementations, the second condition may involve receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
In some implementations, in storing the SNPN identity in the “temporarily forbidden SNPNs” list along with the one or more GINs, process 300 may involve processor 212 storing the SNPN identity in the “temporarily forbidden SNPNs” list along with the one or more GINs broadcasted by the SNPN for a selected entry of a list of subscriber data or a selected PLMN subscription.
Process 400 may begin at block 410.
At 410, process 400 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) regarding an SNPN. Process 400 may proceed from 410 to 420.
At 420, process 400 may involve processor 212, in response to the receiving, performing an operation corresponding to a first condition or a second condition under which the reject message is received. The first condition may involve receiving the reject message and either: (1) the SNPN being selected for the localized services in an SNPN access operation mode; or (2) apparatus 210 supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled. The second condition may involve receiving the reject message and apparatus 210 supporting an access to the SNPN using one or more credentials from a credentials holder.
In some implementations, in performing the operation corresponding to the first condition, process 400 may involve processor 212 storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list.
In some implementations, in performing the operation corresponding to the second condition, process 400 may involve processor 212 storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more GINs broadcasted by an SNPN.
Process 500 may begin at block 510.
At 510, process 500 may involve processor 212 of apparatus 210, as UE 110, receiving, via transceiver 216, a reject message with a cause #36 from a network (e.g., wireless network 120 via apparatus 220 as network node 125) . The reject message may be received under one or more conditions, such as: (a) the message being received without integrity protection before the network established a secure exchange of NAS messages for a NAS signaling connection (e.g., N1 NAS signaling connection) ; and/or (b) apparatus 210 being in a PLMN or an SNPN. Process 500 may proceed from 510 to 520.
At 520, process 500 may involve processor 212, in response to the receiving, performing one or more operations.
In some implementations, the reject message may include a registration reject message or a service reject message.
In some implementations, responsive to apparatus 210 being in the PLMN, the one or more operations may include at least one of the following operations: (a) discarding the reject message; (b) stopping an associated procedure timer; (c) starting a T3247 timer with a random value in a range between 30 minutes and 60 minutes; (d) in an event that the UE is in a home PLMN (HPLMN) or equivalent home PLMN (EHPLMN) , performing one or more of the following: (i) setting a 5GS update status to 5U3 ROAMING NOT ALLOWED; (ii) deleting a 5G-GUTI, a last visited registered TAI, a TAI list, an ngKSI for a 3GPP access, and a list of equivalent PLMNs; (iii) resetting either or both of a registration attempt counter and a service request attempt counter; (vi) setting an EPS update status to EU3 ROAMING NOT ALLOWED, deleting any 4G-GUTI, the last visited registered TAI, the TAI list, and an eKSI, resetting an attach attempt counter or a tracking area updating attempt counter, and entering a state EMM-DEREGISTERED; (v) storing a current TAI in a list of "5GS forbidden tracking areas for roaming" , memorizing that the current TAI was stored in the list of "5GS forbidden tracking areas for roaming" for a non-integrity protected NAS reject message; (vi) entering a state 5GMM-DEREGISTERED. LIMITED-SERVICE; (vii) searching for a cell in another tracking area; (viii) performing a registration attempt over a non-3GPP access responsive to: (1) the non-3GPP access being available, (2) apparatus 210 being not registered over non-3GPP access yet, and (3) a USIM being not considered invalid for 5GS services over the non-3GPP access; (e) responsive to apparatus 210 not being in the HPLMN or EHPLMN, performing one or more of the following: (i) incrementing a PLMN-specific attempt counter for the PLMN, in an event that the message was received via the 3GPP access and that the PLMN-specific attempt counter for the PLMN, which sent the reject message, has a value less than a UE implementation-specific maximum value; (ii) setting the 5GS update status to 5U3 ROAMING NOT ALLOWED; (iii) deleting the 5G-GUTI, the last visited registered TAI, the TAI list, the ngKSI for the 3GPP access, and the list of equivalent PLMNs; (iv) resetting either or both of the registration attempt counter and the service request attempt counter; (v) storing a PLMN identity of the PLMN in a forbidden PLMN list; (vi) entering a state 5GMM-DEREGISTERED. PLMN-SEARCH; and (vii) performing a PLMN selection procedure. In some implementations, the associated procedure timer may include T3517 or T3510.
In some implementations, responsive to apparatus 210 being in the SNPN, the one or more operations may include at least one of the following operations: (a) discarding the reject message; (b) stopping an associated procedure timer; (c) starting timer T3247 between a range of 15 minutes and 30 minutes in an event that the SNPN, which sent the reject message, was selected for localized services and there is a next valid time period for an SNPN start timer T3247 with a random value in a range either between a start time point of the next valid time period for the localized services in the SNPN and 30 minutes after the start time point of the next valid time period for the localized services in the SNPN, in an event that the next valid time period is longer than 30 minutes or between the start time point of the next valid time period for the localized services in the SNPN and an end time point of the next valid time period for the localized services in the SNPN, or in an event that the next valid time period is no longer than 30 minutes; (d) incrementing an SNPN-specific attempt counter for the SNPN, in an event that the reject message was received via a 3GPP access and in an event that the SNPN-specific attempt counter for the SNPN sending the reject message has a value less than a UE implementation-specific maximum value; (e) setting a 5GS update status to 5U3 ROAMING NOT ALLOWED; (f) deleting a 5G-GUTI, a last visited registered TAI, a TAI list, an ngKSI for the 3GPP access, and a list of equivalent SNPNs; (g) resetting either or both of a registration attempt counter and a service request attempt counter; (h) storing an SNPN identity of the SNPN in a forbidden SNPN list; (j) entering a state 5GMM-DEREGISTERED. PLMN-SEARCH; and (k) performing an SNPN selection procedure. In some implementations, the associated procedure timer may include T3517 or T3510.
Additional Notes
The herein-described subject matter sometimes illustrates different components contained within, or connected with, different other components. It is to be understood that such depicted architectures are merely examples, and that in fact many other architectures can be implemented which achieve the same functionality. In a conceptual sense, any arrangement of components to achieve the same functionality is effectively "associated" such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality can be seen as "associated with" each other such that the desired functionality is achieved, irrespective of architectures or intermedial components. Likewise, any two components so associated can also be viewed as being "operably connected" , or "operably coupled" , to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being "operably couplable" , to each other to achieve the desired functionality. Specific examples of operably couplable include but are not limited to physically mateable and/or physically interacting components and/or wirelessly interactable and/or wirelessly interacting components and/or logically interacting and/or logically interactable components.
Further, with respect to the use of substantially any plural and/or singular terms herein, those having skill in the art can translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity.
Moreover, it will be understood by those skilled in the art that, in general, terms used herein, and especially in the appended claims, e.g., bodies of the appended claims, are generally intended as “open” terms, e.g., the term “including” should be interpreted as “including but not limited to, ” the term “having” should be interpreted as “having at least, ” the term “includes” should be interpreted as “includes but is not limited to, ” etc. It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases "at least one" and "one or more" to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles "a" or "an" limits any particular claim containing such introduced claim recitation to implementations containing only one such recitation, even when the same claim includes the introductory phrases "one or more" or "at least one" and indefinite articles such as "a" or "an, " e.g., “a” and/or “an” should be interpreted to mean “at least one” or “one or more; ” the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should be interpreted to mean at least the recited number, e.g., the bare recitation of "two recitations, " without other modifiers, means at least two recitations, or two or more recitations. Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc. ” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention, e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc. In those instances where a convention analogous to “at least one of A, B, or C, etc. ” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention, e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc. It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase “A or B” will be understood to include the possibilities of “A” or “B” or “A and B. ”
From the foregoing, it will be appreciated that various implementations of the present disclosure have been described herein for purposes of illustration, and that various modifications may be made without departing from the scope and spirit of the present disclosure. Accordingly, the various implementations disclosed herein are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims (16)

  1. A method, comprising:
    receiving, by a processor of a user equipment (UE) , a reject message with a cause #36 from a network regarding a standalone non-public network (SNPN) ; and
    responsive to the receiving, performing, by the processor, either or both of:
    storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list in an even that the reject message with the cause #36 is received under a first condition; and
    storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more group identifications for network selection (GINs) broadcasted by the SNPN or another SNPN in an even that the reject message with the cause #36 is received under a second condition.
  2. The method of Claim 1, wherein the first condition comprises receiving the reject message and either:
    the SNPN being selected for the localized services in an SNPN access operation mode; or
    the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  3. The method of Claim 2, wherein the first condition comprises the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled.
  4. The method of Claim 3, further comprising:
    storing the one or more GINs broadcasted by one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list.
  5. The method of Claim 4, wherein the storing of the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list comprises storing the one or more GINs broadcasted by the one SNPN in the “temporarily forbidden SNPNs for access for localized services in SNPN” list for a selected entry of a list of subscriber data or a selected PLMN subscription.
  6. The method of Claim 1, wherein the second condition comprises receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
  7. The method of Claim 6, wherein the storing of the SNPN identity in the “temporarily forbidden SNPNs” list along with the one or more GINs comprises storing the SNPN identity in the “temporarily forbidden SNPNs” list along with the one or more GINs broadcasted by the SNPN for a selected entry of a list of subscriber data or a selected PLMN subscription.
  8. A method, comprising:
    receiving, by a processor of a user equipment (UE) , a reject message with a cause #36 from a network regarding a standalone non-public network (SNPN) ; and
    responsive to the receiving, performing, by the processor, an operation corresponding to a first condition or a second condition under which the reject message is received,
    wherein the first condition comprises receiving the reject message and either:
    the SNPN being selected for the localized services in an SNPN access operation mode; or
    the UE supporting an access to the SNPN providing an access for the localized services in the SNPN access operation mode and the access for the localized services in the SNPN access operation mode having been enabled, and
    wherein the second condition comprises receiving the reject message and the UE supporting an access to the SNPN using one or more credentials from a credentials holder.
  9. The method of Claim 8, wherein the performing of the operation corresponding to the first condition comprises storing an SNPN identity of the SNPN in a “temporarily forbidden SNPNs for access for localized services in SNPN” list.
  10. The method of Claim 8, wherein the performing of the operation corresponding to the second condition comprises storing the SNPN identity in a “temporarily forbidden SNPNs” list along with one or more group identifications for network selection (GINs) broadcasted by an SNPN.
  11. A method, comprising:
    receiving, by a processor of a user equipment (UE) , a reject message with a cause #36 from a network; and
    responsive to the receiving, performing, by the processor, one or more operations,
    wherein the reject message is received under one or more conditions comprising:
    the message being received without integrity protection before the network established a secure exchange of non-access-stratum (NAS) messages for a NAS signaling connection; and
    the UE being in a public land mobile network (PLMN) or a standalone non-public network (SNPN) .
  12. The method of Claim 11, wherein the reject message comprises a registration reject message or a service reject message.
  13. The method of Claim 11, wherein, responsive to the UE being in the PLMN, the one or more operations comprise at least one of:
    discarding the reject message;
    stopping an associated procedure timer;
    starting a T3247 timer with a random value in a range between 30 minutes and 60 minutes;
    in an event that the UE is in a home PLMN (HPLMN) or equivalent home PLMN (EHPLMN) , performing one or more of:
    setting a 5th Generation System (5GS) update status to 5U3 ROAMING NOT ALLOWED;
    deleting a 5th Generation Globally Unique Temporary Identity (5G-GUTI) , a last visited registered tracking area identifier (TAI) , a TAI list, an ngKSI for a 3rd Generation Partnership Project (3GPP) access, and a list of equivalent PLMNs;
    resetting either or both of a registration attempt counter and a service request attempt counter;
    setting an Evolved Packet System (EPS) update status to EU3 ROAMING NOT ALLOWED, deleting any 4th Generation Globally Unique Temporary Identity (4G-GUTI) , the last visited registered TAI, the TAI list, and an eKSI, resetting an attach attempt counter or a tracking area updating attempt counter, and entering a state EMM-DEREGISTERED;
    storing a current TAI in a list of "5GS forbidden tracking areas for roaming" , memorizing that the current TAI was stored in the list of "5GS forbidden tracking areas for roaming" for a non-integrity protected NAS reject message;
    entering a state 5GMM-DEREGISTERED. LIMITED-SERVICE;
    searching for a cell in another tracking area;
    performing a registration attempt over a non-3GPP access responsive to:
    the non-3GPP access being available,
    the UE being not registered over non-3GPP access yet, and
    a universal subscriber identification module (USIM) being not considered invalid for 5GS services over the non-3GPP access;
    responsive to the UE not being in the HPLMN or EHPLMN, performing one or more of:
    incrementing a PLMN-specific attempt counter for the PLMN, in an event that the message was received via the 3GPP access and that the PLMN-specific attempt counter for the PLMN, which sent the reject message, has a value less than a UE implementation-specific maximum value;
    setting the 5GS update status to 5U3 ROAMING NOT ALLOWED;
    deleting the 5G-GUTI, the last visited registered TAI, the TAI list, the ngKSI for the 3GPP access, and the list of equivalent PLMNs;
    resetting either or both of the registration attempt counter and the service request attempt counter;
    storing a PLMN identity of the PLMN in a forbidden PLMN list;
    entering a state 5GMM-DEREGISTERED. PLMN-SEARCH; and
    performing a PLMN selection procedure.
  14. The method of Claim 13, wherein the associated procedure timer comprises T3517 or T3510.
  15. The method of Claim 11, wherein, responsive to the UE being in the SNPN, the one or more operations comprise at least one of:
    discarding the reject message;
    stopping an associated procedure timer;
    starting timer T3247 between a range of 15 minutes and 30 minutes in an event that the SNPN, which sent the reject message, was selected for localized services and there is a next valid time period for an SNPN start timer T3247 with a random value in a range either between a start time point of the next valid time period for the localized services in the SNPN and 30 minutes after the start time point of the next valid time period for the localized services in the SNPN, in an event that the next valid time period is longer than 30 minutes or between the start time point of the next valid time period for the localized services in the SNPN and an end time point of the next valid time period for the localized services in the SNPN, or in an event that the next valid time period is no longer than 30 minutes;
    incrementing an SNPN-specific attempt counter for the SNPN, in an event that the reject message was received via a 3rd Generation Partnership Project (3GPP) access and in an event that the SNPN-specific attempt counter for the SNPN sending the reject message has a value less than a UE implementation-specific maximum value;
    setting a 5th Generation System (5GS) update status to 5U3 ROAMING NOT ALLOWED;
    deleting a 5th Generation Globally Unique Temporary Identity (5G-GUTI) , a last visited registered tracking area identifier (TAI) , a TAI list, an ngKSI for the 3GPP access, and a list of equivalent SNPNs;
    resetting either or both of a registration attempt counter and a service request attempt counter;
    storing an SNPN identity of the SNPN in a forbidden SNPN list;
    entering a state 5GMM-DEREGISTERED. PLMN-SEARCH; and
    performing an SNPN selection procedure.
  16. The method of Claim 15, wherein the associated procedure timer comprises T3517 or T3510.
PCT/CN2025/096758 2024-05-27 2025-05-23 Methods and apparatus for handling non-integrity protected handling in mobile communications Pending WO2025247091A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IN202421041165 2024-05-27
IN202421041053 2024-05-27
IN202421041165 2024-05-27
IN202421041053 2024-05-27

Publications (1)

Publication Number Publication Date
WO2025247091A1 true WO2025247091A1 (en) 2025-12-04

Family

ID=97869553

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2025/096758 Pending WO2025247091A1 (en) 2024-05-27 2025-05-23 Methods and apparatus for handling non-integrity protected handling in mobile communications

Country Status (1)

Country Link
WO (1) WO2025247091A1 (en)

Similar Documents

Publication Publication Date Title
US11570834B2 (en) Protocol improvement for redirection to another system in mobile communications
EP4210404A1 (en) Handling of multiple tracking area identifiers in satellite access
US12193095B2 (en) UE and network behavior at and after a network disaster
US12245328B2 (en) UE behavior for failed registration request or service request for emergency services fallback
WO2024169686A1 (en) Method and apparatus for handling non-access stratum mobility management cause for non-terrestrial network access
US20240014886A1 (en) Signaling Over Satellite Access In Mobile Communications
WO2025247091A1 (en) Methods and apparatus for handling non-integrity protected handling in mobile communications
WO2025055685A1 (en) User equipment behavior when non-satellite access is not allowed in mobile communications
WO2025066744A1 (en) Starting a non-integrity timer in localized services in mobile communications
WO2025237173A1 (en) Methods and apparatus for handling emergency services and forbidden list in mobile communications
WO2025209041A1 (en) Handling of selected n3iwf or tngf not compatible with allowed nssai in non-3gpp mobile communications
WO2025007730A1 (en) Methods and apparatus of reenabling n1 mode capability after no slices being available in wireless communications
WO2025242023A1 (en) Methods and apparatus for handling forbidden list, shared network and deregistration procedure in mobile communications
WO2025036021A1 (en) Adding tracking area identities of current registration area in forbidden tracking area identity list after no slices available in wireless communications
WO2025180256A1 (en) Handling equivalent plmn list upon plmn being not allowed to operate at a present ue location in mobile communications
WO2025247133A1 (en) Methods and apparatus for handling reject cause timer in deregistered state in mobile communications
WO2025209040A1 (en) Handling of unmanned aerial system (uas) services not allowed cause for user equipment not supporting uas services in mobile communications
WO2025055715A1 (en) Methods and apparatus of snpn selection order for localized services for user reselection procedure
WO2025161612A1 (en) Handling mbs back-off timer during unavailability period activation in mobile communications
WO2025256425A1 (en) Methods and apparatus for handling timer for plmn with satellite ng-ran not allowed during power saving optimization in mobile communications
WO2025050887A1 (en) Methods and apparatus of handling equivalent snpn for localized services
WO2025237118A1 (en) Handling registration and deregistration collison and access to fplmns for emergency in mobile communications
WO2025055668A1 (en) Non-access-stratum signaling connection and no service optimization in mobile communications
US20250240703A1 (en) Handling Attempt Counters When Unavailability Period Is Activated In Mobile Communications
WO2025055677A1 (en) Unavailability activation using initial registration procedure in mobile communications