Abstract:
The present invention relates to a system for enabling a communication function of a device, and a method for communicating by a terminal, according to one embodiment of the present invention, comprises the steps of: transmitting, to an MME, an attach request message including a public safety indication and/or a group communication indication; receiving, from the MME, an attach accept message including at least one type of information from among a ProSe identifier, a ProSe group identifier, and a ProSe group for performing a ProSe, ProSe-related functions of the terminal, and a proximity-related security key (ProSe key); transmitting a ProSe registration request to a ProSe function server; and receiving, from the ProSe function server, a ProSe registration response message pending authentication of the terminal. According to one embodiment of the present invention, devices can mutually provide or receive information within a group in an environment such as an EUTRAN or a UTRAN/GERAN.
Abstract:
The present invention relates to a method and apparatus for installing a profile, and more specifically, to a method for managing mobile communication subscriber information (profile), such as for remotely installing and uninstalling a profile onto a security module (Universal Integrated Circuit Card (UICC)) that is embedded inside a terminal and that is not attachable or detachable, thereby replacing UICC. Accordingly, the present invention relates to a method for a server installing a profile, wherein the method for the server installing the profile for a terminal having an embedded security module comprises the steps of: receiving from the terminal a profile installation request including an identifier of the terminal embedded security module; receiving an encrypted profile corresponding to the installation request; and transmitting to the terminal the encrypted profile.
Abstract:
The disclosure relates to a method and apparatus for protecting information in a wireless communication system, and an operating method of a user equipment (UE) in the wireless communication system may include: transmitting, to an access and mobility management function (AMF), a registration request message including security information related to a security key processing capability of the UE; receiving, from the AMF, an authentication request message; transmitting, to the AMF, an authentication response message in response to the authentication request message; receiving, from the AMF, a security mode command message; and transmitting a security mode complete message in response to the security mode command message.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. The present invention relates to an authentication method applied to a next generation 5G communication system and an apparatus for performing same, network slices, a method for managing the network slices, and an apparatus for performing the same.
Abstract:
A communication method performed by a user equipment (UE) in a mobile communication system, according to an embodiment, includes: transmitting, to an access and mobility management function (AMF) or a session management function (SMF), UE capability information including first information about whether or not extended session management is supported; receiving from the AMF or the SMF network capability information including second information about whether or not the extended session management is supported; and receiving, from the AMF or the SMF, a result of mapping a protocol data unit (PDU) session to an evolved packet system (EPS) bearer, performed based on the first information and the second information.
Abstract:
A method for acquiring security related information for Proximity based security (Prose) search and prose communication by User Equipment (UE) in a mobile communication network is provided. A security communication method for UE for prose includes transmitting an attach request to an evolved Node B (eNB), receiving an attach response that includes security related information for the prose from the eNB, and performing device-to-device communication using the security related information.
Abstract:
The present invention relates to a method and an apparatus for employing an embedded subscriber identity module (hereinafter referred to as eSIM) to apply a policy such as a subsidy policy to, activate, deactivate, add to, update, and delete a user profile in a mobile communications network. The present invention enables a mobile device to determine whether to host the policy of a new service provider when it changes the present service provider or to perform a lock for prohibiting the policy change, and to change the profile related to the determination. The present invention also enables a mobile device to replace the policy related to the service provider by applying the policy, or to employ eSIM so as to activate, deactivate, revise, add, or delete the rules of the policy related to the service provider. The present invention provides various examples of hosting and applying the policy and various examples of activating, deactivating, revising, adding, deleting the policy rules so as to make eSIM identify the subscriber as the existing subscriber identity module. The invention also enables the device or eSIM to be reused when changing the service provider throughout the life cycle thereof without limiting the use of eSIM to a single service provider. The invention also provides a method for locking the policy applied per service provider, and the use of eSIM when changing to another service provider by the policy per service provider. The present invention also provides a method for checking the criteria of decision and verifying the power of decision when administering the policy rules and eSIM through deleting, adding, revising, activating, and deactivating the profile management plan and policy rules by applying the service provider's policy. Thus the present invention enables the device to host a new service provider's policy for communicating therewith when changing from the existing service provider to the new service provider, or when the government changes the service provider for an M2M device related to the electricity, infrastructure, etc. under an environment such as EUTRAN (Evolved Universal Terrestrial Radio Access Network) or UTRAN (Universal Terrestrial Radio Access Network)/GERAN (GSM/EDGE Radio Access Network). The present invention also is advantageous in that if the change of a service provider is not allowed according the policy of the existing service provider, the information related to communication and the security information are set revised safely by locking, thus enhancing the communication efficiency and security. The present invention also enables the device to verify the power of the user or to revise safely the information of eSIM for adding, revising, deleting, activating, and deactivating the policy rules for managing the operation profile for administration of the policy of the service provider under an environment such as EUTRAN (Evolved Universal Terrestrial Radio Access Network) or UTRAN (Universal Terrestrial Radio Access Network)/GERAN (GSM/EDGE Radio Access Network), thus enhancing the communication efficiency and security.
Abstract:
Provided is a system that enables a device to perform a communication function. A communication method for a user equipment (UE) may include: sending a subscription request for a first network; receiving information regarding an identifier of a first profile associated with the first network and the date on which the first profile is deactivated; and determining whether a subscription to the first network is allowed on the basis of the date information. Accordingly, in an environment such as Universal Terrestrial Radio Access Network (UTRAN), GSM/EDGE Radio Access Network (GERAN) or Evolved UTRAN (EUTRAN), when a device having an eSIM attempts to make a re-subscription to an MNO, or when the device attempts to make a re-subscription or additional subscription to an MNO according to a national electricity or infrastructure plan for M2M equipment, it is possible to accommodate MNO policies and determine whether a re-subscription to an MNO is allowed according to the MNO policies. When MNO re-subscription is not allowed, a lock may be placed so as to update or reconfigure communication and security information in an easy and safe manner.
Abstract:
Disclosed are security schemes for device-to-device (hereinafter referred to as “D2D”) discovery and D2D group communication in performing proximity based service (hereinafter referred to as “prose”), prose discovery, prose communication, and D2D group communication in a mobile communication network. A device that performs communication can perform a security method for prose discovery, prose communication, and group communication. On the other hand, User Equipment (UE) can perform safe communication by discovering another UE, receiving and verifying security related information in performing group communication. Accordingly, in an environment, such as an Evolved Universal Terrestrial Radio Access Network (hereinafter referred to as “EUTRAN”) or a Universal Terrestrial Radio Access Network (hereinafter referred to as “UTRAN”)/GSM/EDGE Radio Access Network (hereinafter referred to as “GERAN”), the UE can provide or receive information in a group, receive security key related information, and perform a security procedure using such a security key to enhance communication efficiency and security.
Abstract:
Provided is a system that enables a device to perform a communication function. A communication method for a user equipment (UE) may include: sending a subscription request for a first network; receiving information regarding an identifier of a first profile associated with the first network and the date on which the first profile is deactivated; and determining whether a subscription to the first network is allowed on the basis of the date information. Accordingly, in an environment such as Universal Terrestrial Radio Access Network (UTRAN), GSM/EDGE Radio Access Network (GERAN) or Evolved UTRAN (EUTRAN), when a device having an eSIM attempts to make a re-subscription to an MNO, or when the device attempts to make a re-subscription or additional subscription to an MNO according to a national electricity or infrastructure plan for M2M equipment, it is possible to accommodate MNO policies and determine whether a re-subscription to an MNO is allowed according to the MNO policies. When MNO re-subscription is not allowed, a lock may be placed so as to update or reconfigure communication and security information in an easy and safe manner.