Abstract:
An approach is provided of generating real-world privacy policies based on in-game behavior. A privacy policy platform determines in-game behavior data associated with at least one user while the at least one user is playing at least one location-based game. The privacy platform causes, at least in part, a mapping of the in-game behavior data to one or more game locations within the at least one location-based game. The privacy platform further causes, at least in part, a correlation of the one or more game locations to one or more real-world locations. The privacy platform then causes, at least in part, a generating of one or more privacy policies for the one or more real-world locations based, at least in part, on the in-game behavior data mapped to the correlated one or more game locations.
Abstract:
A method and apparatus for performing an initial access procedure in a wireless communication system is provided. A low cost user equipment (UE) transmits a list of capabilities to a network, and receives a reject message from the network when at least one of the capabilities is not supported by the network. The list of capabilities may be transmitted during a random access procedure via a random access preamble on a physical random access channel (PRACH) or a message 3 on a physical uplink shared channel (PUSCH). The reject message may be received during the random access procedure a random access response or an acknowledge message for the message 3.
Abstract:
Methods, systems, and devices are described for reducing switches (e.g., ping- pongs) of a wireless communications device between two or more wireless networks. For example, a method includes determining a context of data use of a first wireless network to which a wireless communications device is connected. The method includes determining a time delay associated with performing a switch from the first wireless network to a second wireless network when at least one performance indicator of the first wireless network is below a threshold performance level needed to support the context of data use. The method further includes performing the switch from the first wireless network to the second wireless network in response to the time delay expiring while the at least one performance indicator remains below the threshold performance level.
Abstract:
A method and apparatus for performing access control for wireless local area network (WLAN) interworking in a wireless communication system is provided. A user equipment (UE) receives access class barring information for a traffic steered from a WLAN to 3rd generation partnership project (3GPP) long-term evolution (LTE) from a network, and performs access barring check for the traffic steered from the WLAN to the 3GPP LTE using the received access class barring information. If a cell is not barred according to the access barring check, the UE transmits a radio resource control (RRC) connection request message to the network.
Abstract:
A presence service can be provided by an access point (101) serving a small cell (100) by rejecting a request for registration from a user equipment (103) after acquiring its IMSI and sending the IMSI to a presence database (105). The user equipment determines if the cell is a presence cell by comparing the cell's location area code (LAC) with LACs stored in a list and looking for a match. It the cell is a presence cell then the user equipment, rather than placing the LAC in a forbidden list, re-tries registration again but only after a pre-set time period of 5-10 minutes has elapsed. This has the advantage that a presence service can be notified of subscribers who linger in a particular area or return to that area at regular intervals.
Abstract:
An access point for facilitating connection of one or more wireless user devices to a first communications channel and operable to allocate resources to said user devices, the access point comprising a user device authenticator for determining whether a user device is in possession of pre-determined user device authentication information for obtaining access to the first communications channel, the access point having first and second modes of operation, wherein in the first mode of operation, the entirety of said resources is available for use by all user devices and in the second mode of operation, a portion of the resources is reserved for user devices that are in possession of the device authentication information; the access point being configured to switch the mode of operation when one or more mode switch criteria are met, wherein one of the mode switch criteria is based on the current demand for resources.
Abstract:
The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method for Power Saving Mode (PSM) operation control of a UE in a mobile communication system is provided. The method includes: setting a PSM for the UE; triggering a connection request of the UE in the PSM; determining whether the connection request has been barred; and maintaining the PSM setting when it is determined that the connection request has been barred.
Abstract:
본 명세서의 일 개시는 사용자 장치(user equipment: UE)에서 서비스 요청 절차(Service Request procedure)를 수행하는 방법을 제공한다. 상기 방법은 ACB(Access Class Barring) 검사에 대한 스킵 정보를 수신하는 단계와; MMTEL(multimedia telephony) 서비스 및 단문 메시지 서비스(SMS ) 중 어느 하나를 위해 서비스 요청 절차를 수행해야 하는 경우, 상기 스킵 정보를 확인하는 단계와; 그리고 상기 스킵 정보에 상기 MMTEL 서비스 및 SMS 중 어느 하나를 위해서는 ACB 검사를 스킵하라고 설정되어 있는 경우, 상기 서비스 요청 절차를 위해 RRC(Radio Resource Control) 연결 요청 메시지를 전송하는 단계를 포함할 수 있다.
Abstract:
The present disclosure provides a method for supporting UE access control. A base station is informed by a ProSe Function via a MME or informed by the MME of information indicating whether a UE is authorized for a D2D service. The base station performs an access control to the UE according to the information indicating whether the UE is authorized for the D2D service. The present disclosure further provides a method in which a source base station informs a target base station of the information indicating whether the UE is authorized for a D2D service. The target base station performs an access control according to the information.