Include/exclude message scheme to indicate whether a network entity performs access control
A network entity and access control technology, applied in access restriction, network topology, broadcast service distribution, etc., can solve problems such as limitations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Various aspects of the disclosure are described below. Obviously, the teachings herein may be embodied in many different forms and any specific structure, function, or both disclosed herein is merely representative. Based on the teachings herein, those skilled in the art should understand that a certain aspect disclosed herein can be implemented independently of any other aspect, and two or more of these aspects can be combined in various ways. For example, any number of aspects presented herein may be used to implement an apparatus or to perform a method. In addition, such an apparatus may be implemented or such a method may be practiced using other structure, functionality, or both, in addition to or different from one or more aspects presented herein. Furthermore, an aspect may comprise at least one element of a claim.
[0023] figure 1 Several nodes (eg, portions of a communication network) of an example communication system 100 are shown. For purposes of illust...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 