摘要:
Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
摘要:
Systems and methodologies are described that facilitate managing access control to Closed Subscriber Groups (CSGs) in a wireless communication environment. A user equipment (UE) can store an operator CSG list, which can be read only and controlled by an operator. Further, the operator CSG list can lack synchronization to a CSG subscription for the UE retained in the network. Thus, upon selecting to access a CSG cell associated with a CSG with a corresponding CSG Identifier (ID) included in the operator CSG list of the UE, a reject message that indicates that the UE lacks authorization for the CSG can be received. Moreover, the CSG ID can be stored as a forbidden CSG ID of the UE in a set of forbidden CSG IDs in response to receipt of the reject message when the CSG ID is included in the operator CSG list.
摘要:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
摘要:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
摘要:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
摘要:
An access terminal may switch to a different mode of wireless network selection as a result of manual selection of a wireless cell set (e.g., a closed subscriber group) associated with one or more wireless cells. For example, if the user of an access terminal selects a closed subscriber group in a wireless network that is different than the current wireless network, the access terminal may enter a manual mode of wireless network selection, select the wireless network corresponding to the closed subscriber group, and register on a closed subscriber group cell in the selected wireless network. In addition, an access terminal may automatically switch to a different mode of wireless network selection (e.g., the prior mode) upon losing coverage of a wireless cell set. An access terminal may also automatically select a cell of a wireless cell set if the access terminal returns to a cell of the cell set within a defined period of time after losing coverage of the cell set. Furthermore, an access terminal may return to a prior wireless network upon losing coverage of a wireless cell set.
摘要:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
摘要:
Systems and methodologies are described that facilitate fetching a native security context between network nodes in a core network after an inter-system handover of a mobile device. For instance, a mobility message that is integrity protected by a security context (e.g., the native security context, a mapped security context, . . . ) can be obtained at a network node from the mobile device. Further, the network node can send a request to a disparate network node within a core network. The request can include information that can be used by the disparate network node to establish that the mobile device is authenticated. Moreover, the native security context can be received from the disparate network node in response to the request. Accordingly, the native security context need not be recreated between the network node and the mobile device.
摘要:
Systems and methodologies are described that facilitate supporting multiple access modes for a base station in a wireless communication environment. The base station can leverage hybrid, closed, or open access mode. A whitelist of a mobile device that successfully registers on the base station can be selectively updated to include a CSG ID of the base station. For example, the CSG ID of the base station can be added to the whitelist when the base station operates in closed access mode, while adding the CSG ID can be skipped when the base station operates in hybrid access mode. According to another example, the CSG ID can be selectively added based upon a received accept cause value. Additionally or alternatively, a CSG ID and an access mode indicator can be transmitted from a base station to a network node for implementing access control and/or paging optimization at the network node.
摘要:
Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list.