Abstract:
The present invention relates to a method and apparatus for performing handover in a wireless communication system. The method comprises the following processes: confirming whether or not a terminal security information value list on the terminal is stored, upon receipt, from a base station, of a path switch request message related to the terminal; if the terminal security information value list is stored, generating a response message to the path switch request, containing an unused terminal security information value of the stored terminal security information value list; and transmitting, to the base station, the generated response message to the path switch request. According to the present invention, loads caused by the terminal handover signal generated by the base station can be reduced by means of the above-described processes.
Abstract:
The present invention relates to a method and apparatus for transmitting data in a wireless communication network. A base station having information of idle mode user equipment transmits a connecting operation mode to user equipment when the idle mode user equipment is connected to the base station. The user equipment transmits small-sized data together with a connection request completion message to the base station. The base station transmits, over a network, the data received from the user equipment, without being interlinked with a mobility management entity, and the user equipment returns back to an idle operation mode after data transmission. Thus, signaling the base station for acquiring context information of the user equipment can be reduced in order to provide the user equipment with an efficient data transmission environment.
Abstract:
A method and an apparatus for controlling network access of a User Equipment (UE) based on the network's load and time tolerance (delay tolerance) are provided. A network access method for a terminal in a wireless communication system includes sending an access request message containing a time-tolerant indicator at a predefined time, determining, when a reject message is received, a cause value and a hold time contained in the reject message, and re-sending the access request message after the hold time elapses.
Abstract:
A method and system for generating an allowed list based on regions for a wireless terminal are disclosed. The method generates an allowed list based on regions to control network access of a stationary wireless terminal, and includes: sending, by the wireless terminal, an attach request to a network; creating, by the network, an allowed list that contains information on regions in which the wireless terminal is permitted to access the network; and controlling, by the network, network access of the wireless terminal on the basis of the allowed list. Hence, the allowed list, which stores information regarding regions in which the MTC terminal 110 is permitted to access the network, may be dynamically created by the terminal or the MME.
Abstract:
Provided are a system and method for managing unregistered devices with authentication information sharing. The method includes receiving an authentication information duplication request from the unregistered device by the registered device, obtaining authentication information from a Universal Subscriber Identity Module (USIM) by the registered device when the registered device receives the authentication information duplication request, and transmitting the obtained authentication information to the unregistered device by the registered device.
Abstract:
The present invention relates to a method and apparatus for setting terminal connection control information in a mobile communication system. The method and apparatus of the present invention involve determining connection control information for the network connection of a terminal, and allowing network connection on the basis of the connection control information in order to provide the terminal with a network service. According to the present invention, the quality of service provided to a plurality of terminals may be maintained at a uniform level in a wireless communication system.
Abstract:
The present invention relates to a method for establishing a connection between a node of a communication system and a node of a data service network in a wireless communication system. A method in which a mobility management entity establishes a connection with a node of a network according to one embodiment of the present invention comprises a step in which the mobility management entity acquires an address identification address; a step in which the mobility management entity transmits a create session request to a serving gateway; a step in which the mobility management entity receives a create session response corresponding to the create session request from the serving gateway; a step in which the mobility management entity transmits, to the serving gateway, downlink bearer information for receiving data from the serving gateway; and a step in which the mobility management entity communicates with a node by using a mobility management entity identification address and the node identification address in accordance with uplink bearer information and downlink bearer information. According to one embodiment of the present invention, a connection between a node of a user data network and a node of a communication system can be established in an efficient manner.
Abstract:
The present invention relates to a mobile communication system, and more particularly, to a method and system for efficiently supporting security in a mobile communication system. The method for supporting the security of a terminal in a mobile communication system according to the present invention comprises: a process of transmitting an information provision request message to a network; a process of performing a verification for the network and security; a process of receiving an information provision response message, comprising an index of an encrypted security key, an International Mobile Subscriber Identity (IMSI), and a security-related profile from the network when the verification is completed; and a process of selecting a security key on the basis of the index of an encrypted security key, and then storing the selected security key, the IMSI, and the profile.
Abstract:
An access admission control method and system for and SAE/LTE system is provided for determining whether to accept or reject an access of a User Equipment (UE) to a Home evolved Node B (HeNB) based on the subscriber information of the UE. In an access admission control method according to the present invention, a HeNB or HeNB Gateway (HGW) transmits, when an access request message is received from a UE, the access request message to a Mobility Management Entity (MME) together with a CSG ID of the HeNB, and the MME determines, whether to accept or reject the access of the UE to the HeNB based on whether the CSG ID is contained in a white list associated with the UE.
Abstract:
An access admission control method and system for and SAE/LTE system is provided for determining whether to accept or reject an access of a User Equipment (UE) to a Home evolved Node B (HeNB) based on the subscriber information of the UE. In an access admission control method according to the present invention, a HeNB or HeNB Gateway (HGW) transmits, when an access request message is received from a UE, the access request message to a Mobility Management Entity (MME) together with a CSG ID of the HeNB, and the MME determines, whether to accept or reject the access of the UE to the HeNB based on whether the CSG ID is contained in a white list associated with the UE.