摘要:
A scheme for managing security key architecture in a network environment where a user equipment (UE) device can engage in multiple security contexts depending on the access technology. In one embodiment, when multiple security contexts are engaged and different sets of authentication vectors are created, an adapter component of the UE device manages potential interference that may be caused among the different sets of the authentication vectors as to where they are stored and which authentication vectors are used for service handovers.
摘要:
A method performed by an access device of a first network cell in a communications network for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, receiving identification of a location area (LA) in which the UE is registered, identifying a second network cell providing the service in the LA in which the UE is registered, and transmitting the identification of the second network cell to the UE.
摘要:
A method in user equipment (UE) associated with a first network cell in a wireless telecommunications system includes performing idle mode measurements of one or more network cells other than the first network cell when the UE is operating in an idle mode, receiving a request to access a first service unavailable through the first network cell, communicating with an access device associated with the first network cell based on results of the idle mode measurements, receiving from the access device an identification of a second network cell, and accessing the first service through the second network cell.
摘要:
In a communications network having a first network cell and an associated access device, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, identifying the radio coverage of a second network cell, and when the radio coverage of the first network cell is within the radio coverage of the second network cell, directing the UE to the second network cell without requesting measurement data from the UE.
摘要:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
摘要:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE and informing a second network cell that the UE is requesting to obtain the service unavailable through the first network cell. The request may be received from a user of the UE or may be a paging message.
摘要:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
摘要:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE, and receiving a message from an access device associated with the first network cell, wherein the message identifies a plurality of second network cells providing the service.
摘要:
A method performed by user equipment (UE) includes receiving a request to access a service unavailable through a first network cell associated with the UE and informing a second network cell that the UE is requesting to obtain the service unavailable through the first network cell. The request may be received from a user of the UE or may be a paging message.
摘要:
In an access device associated with a first network cell, a method for enabling user equipment (UE) to obtain a service unavailable through the first network cell includes receiving a request for the UE to access the service, and identifying, in a message to the UE, a plurality of second network cells providing the service.