CN-121986506-A - Behavior of user when emergency service rollback procedure fails due to 5G system network authentication failure
Abstract
In one aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The device may be a User Equipment (UE). The user equipment performs a procedure for emergency service fallback. The user equipment receives AUTHENTICATION REJECT a message from the network during the first procedure. The user equipment performs a general operation of authentication rejection by the network. These general operations may involve updating the internal state of the user device and clearing certain security parameters to maintain network integrity.
Inventors
- Bonnit. Bonnit
- Margo Nayemi
Assignees
- 联发科技(新加坡)私人有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20240929
- Priority Date
- 20231003
Claims (20)
- 1.A wireless communication method for a user device, comprising: Performing a first procedure for emergency services fallback; receiving AUTHENTICATION REJECT a message from the network during the first procedure, and A general operation of authentication rejection by the network is performed.
- 2. The method of claim 1, further comprising: notifying upper layers of the first process failure.
- 3. The method of claim 2, wherein upper layers are notified when the user equipment does not attempt to select an E-UTRA cell connected to an evolved packet system or 5G core network and camps on a new air interface or E-UTRA cell connected to the 5G core network and on the same public land mobile network as the last service request attempt.
- 4. The method of claim 1, wherein the first procedure includes mobility and periodic registration update requests triggered by upper layer requests to perform the emergency services fallback.
- 5. The method of claim 1, wherein the first procedure comprises a service request procedure for the emergency service fallback.
- 6. The method of claim 1, further comprising: logging off locally from the current network when the network is not notified, and An initial registration dedicated to emergency services is attempted.
- 7. The method of claim 1, wherein the generic operation of authentication denial comprises: setting the update status to not allow roaming; The stored identifiers are deleted, including a 5G globally unique temporary identifier, a tracking area identification list, a last access registered tracking area identification, and a next generation key set identifier.
- 8. The method of claim 1, further comprising: an emergency call is attempted to be made through a different IP connection access network.
- 9. The method of claim 1, further comprising: If the user equipment supports the legacy radio access technology, an emergency call is attempted over the circuit switched domain.
- 10. The method of claim 1, further comprising: After performing the general operation of authentication rejection, a 5G mobility management registration state is entered.
- 11. A wireless communication method for a user device, comprising: Performing a first procedure for emergency services fallback; And encountering an authentication failure due to the user equipment determining that the network fails the authentication check And performing a general operation of authentication failure.
- 12. The method of claim 11, wherein the authentication failure is due to one or more of a message authentication code failure, a synchronization failure, non-5G authentication being unacceptable, or a next generation keyset identifier having been used.
- 13. The method of claim 11, further comprising: suspending the first flow; stopping a timer associated with the first process, and Any resources allocated for the first procedure are released locally.
- 14. The method of claim 11, wherein the first procedure comprises a registration procedure for mobility and periodic registration updates.
- 15. The method of claim 11, further comprising: logging off locally from the current network when the network is not notified, and An initial registration dedicated to emergency services is attempted.
- 16. The method of claim 11, further comprising: an attempt is made to select an E-UTRA cell connected to an evolved packet system or 5G core network.
- 17. The method of claim 11, further comprising: notifying upper layers of the authentication failure.
- 18. The method of claim 11, wherein the user equipment enters a 5G mobility management registration state after performing the authentication failed generic operation.
- 19. The method of claim 11, further comprising: an emergency call is attempted to be made through a different IP connection access network.
- 20. The method of claim 11, further comprising: If the user equipment supports the legacy radio access technology, an emergency call is attempted over the circuit switched domain.
Description
Behavior of user when emergency service rollback procedure fails due to 5G system network authentication failure Cross reference The present application claims priority to indian patent application serial No. 202321066164, entitled "A METHOD TO DEFINE UE BEHAVIOR WHEN EMERGENCY SERVICES FALLBACK IS FAILED DUE TO AUTHENTICATION FAILURE",, filing date 2023, month 10, 3, and to indian patent application serial No. 202321066165, entitled "A METHOD TO DEFINE UE BEHAVIOR WHEN EMERGENCY SERVICES FALLBACK IS FAILED DUE TO AUTHENTICATION FAILURE",, filing date 2023, month 10, 3, the entire contents of both of which are incorporated herein by reference. Technical Field The present disclosure relates generally to communication systems, and more particularly, to techniques for handling authentication failures during emergency service fallback procedures in a mobile network. Background The statements in this section merely provide background information related to the present disclosure and may not constitute prior art. Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcast. A typical wireless communication system may employ a variety of multiple access techniques to support communication with multiple users by sharing the available system resources. Examples of such multiple access techniques include code division multiple access (code division multiple access, CDMA) systems, time division multiple access (time division multiple access, TDMA) systems, frequency division multiple access (frequency division multiple access, FDMA) systems, orthogonal frequency division multiple access (orthogonal frequency division multiple access, OFDMA) systems, single-carrier frequency division multiple access (single-carrier frequency division multiple access, SC-FDMA) systems, and time division synchronous code division multiple access (time division synchronous code division multiple access, TD-SCDMA) systems. These multiple access techniques have been employed in various telecommunications standards to provide a generic protocol that enables different wireless devices to communicate at the market level, the country level, the regional level, and even worldwide. An example of a telecommunications standard is the 5G New air interface (5G New radio, nr). The 5G NR is part of the ongoing mobile broadband evolution facilitated by the third generation partnership project (Third Generation Partnership Project,3 GPP) to meet new requirements related to latency, reliability, security, scalability (e.g., internet of things (Internet of Things, ioT)) and other requirements. Certain aspects of 5G NR may be based on the 4G long term evolution (Long Term Evolution, LTE) standard. There remains a need for further improvements in 5G NR technology. These improvements are applicable to other multiple access techniques and telecommunication standards employing these techniques. Disclosure of Invention The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later. In one aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a User Equipment (UE). The user equipment performs a procedure for emergency service fallback. During the first procedure, the user equipment receives AUTHENTICATION REJECT a message from the network. The user equipment performs a general operation of authentication rejection by the network. These general operations may involve updating the internal state of the user device and clearing certain security parameters to maintain network integrity. In another aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a user equipment. The user equipment performs a procedure for emergency service fallback. The user equipment encounters an authentication failure because the user equipment determines that the network fails the authentication check. The user equipment performs a general operation of authentication failure. These operations may involve updating the internal state of the user device and clearing certain security parameters to maintain network integrity. To the accomplishment of the foregoing and related ends, one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of