Controlling provision of access to restricted local operator services by user equipment

A user equipment, operator technology, applied in the field of communication systems

Pending Publication Date: 2022-02-01
NOKIA TECHNOLOGLES OY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of this communication presents several challenges in existing 5G approaches

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controlling provision of access to restricted local operator services by user equipment
  • Controlling provision of access to restricted local operator services by user equipment
  • Controlling provision of access to restricted local operator services by user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Embodiments will be described herein in connection with an example communication system and associated techniques for providing security in the communication system, eg, for user equipment seeking restricted local access to a mobile network. It should be understood, however, that the scope of the claims is not limited to the specific types of communication systems and / or processes disclosed. Embodiments may be implemented in various other types of communication systems using alternative procedures and operations. For example, although described in the context of a wireless cellular system utilizing 3GPP system elements, such as 3GPP Next Generation Systems (5G), the disclosed embodiments may be adapted in a straightforward manner to various other types of communication systems.

[0019] According to an illustrative embodiment implemented in the context of a 5G communication system, one or more 3GPP Technical Specifications (TS) and Technical Reports (TR) provide support...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Improved techniques are provided for security management in communication systems particularly with respect to access to restricted local operator services in the case of roaming user devices. In one example in accordance with user equipment in a communication system, a method includes initiating a request for access to restricted local operator services, acquiring a network identifier comprising a first country code, and comparing the acquired network identifier with a stored network identifier comprising a second country code. A determination is made whether the first country code and the second country code are different. At least a first action is performed in response to an affirmative determination, and at least a second action is performed in response to a negative determination.

Description

technical field [0001] The field relates generally to communication systems, and more particularly, but not exclusively, to security management within such systems. Background technique [0002] This section introduces aspects that may help to facilitate a better understanding of the invention. Accordingly, the statements in this section should be read in this light and should not be construed as an acknowledgment of what exists in the prior art or what does not exist in the prior art. [0003] Fourth generation (4G) wireless mobile communication technology, also known as long-term evolution (LTE) technology, is designed to provide high-capacity mobile multimedia with high data rates, especially for human interaction. Next-generation or fifth-generation (5G) technology is intended not only for human interaction, but also for machine-type communication in so-called Internet of Things (IoT) networks. [0004] While 5G networks are designed to enable massive IoT services (e.g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/121H04W12/122
CPCH04W12/121H04W12/122H04W12/06H04W12/08
Inventor S·奈尔
Owner NOKIA TECHNOLOGLES OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products