CN-122003890-A - Behavior of user equipment in case of connection failure of emergency bearer service due to network authentication failure
Abstract
In one aspect of the disclosure, a method, computer-readable medium, and apparatus are provided. The device may be a User Equipment (UE). The user equipment receives AUTHENTICATION REJECT a message from the network during an attempt to establish emergency services through the first procedure. The user equipment performs a general operation of authentication rejection. The user equipment informs the upper layer of the first procedure failure. Or the user equipment attempts to execute the second procedure.
Inventors
- Bonnit. Bonnit
- Margo Nayemi
Assignees
- 联发科技(新加坡)私人有限公司
Dates
- Publication Date
- 20260508
- Application Date
- 20240929
- Priority Date
- 20231003
Claims (20)
- 1. A method of wireless communication for a user device, comprising: Receiving AUTHENTICATION REJECT a message from the network during an attempt to establish emergency services through the first procedure; Performing a general operation of authentication rejection, and Notifying upper layers that the first procedure failed or attempting to execute the second procedure.
- 2. The method of claim 1, wherein the first procedure comprises a registration procedure for initiating an emergency PDU session or a service request procedure for initiating an emergency PDU session, and the second procedure comprises an initial registration for emergency services.
- 3. The method of claim 2, wherein the registration procedure includes an initial registration or mobility and a periodic registration update.
- 4. The method of claim 1, wherein the first procedure comprises an attach procedure for initiating a packet data network connection for an emergency bearer service, a tracking area update procedure for initiating a packet data network connection for an emergency bearer service, or a traffic request procedure for initiating a packet data network connection for an emergency bearer service, and the second procedure comprises an attach procedure for an emergency bearer service.
- 5. The method of claim 1, wherein notifying the upper layer causes the upper layer to request implementation of a specific mechanism to attempt the emergency service through another IP connection access network.
- 6. The method of claim 1, further comprising: An attempt is made to select an E-UTRA cell connected to an evolved packet core or 5G core network.
- 7. The method of claim 1, wherein the generic operation of authentication denial comprises: Setting an update status to indicate roaming is not allowed; Deleting the stored network identifier and security parameters, and The generic subscriber identity module is considered invalid.
- 8. The method of claim 1, wherein the attempting to establish the emergency service is performed when a home network of the user equipment is unavailable.
- 9. The method of claim 1, wherein the first procedure comprises a service request procedure and the second procedure comprises an initial registration for emergency services.
- 10. The method of claim 1, wherein the second procedure is performed while the user equipment is continuously in the same selected public land mobile network as the last procedure was attempted.
- 11. The method of claim 1, further comprising: the local deregistration of the current network is performed without informing the network before attempting an initial registration dedicated to the emergency service.
- 12. The method of claim 1, further comprising: If the user equipment supports the legacy radio access technology, an attempt is made to establish the emergency service over the circuit switched domain.
- 13. The method of claim 1, wherein the first procedure comprises a tracking area update procedure for initiating a packet data network connection for an emergency bearer service, and the second procedure comprises EPS attachment dedicated to the emergency bearer service.
- 14. The method of claim 1, wherein notifying the upper layer of the failure allows the upper layer to request establishment of a circuit switched emergency call or other implementation specific mechanism.
- 15. The method of claim 1, wherein the user equipment receives AUTHENTICATION REJECT a message when attempting to establish emergency services with the visited public land mobile network after the home network is unavailable.
- 16. An apparatus for wireless communication, the apparatus being a user equipment, comprising: Memory, and At least one processor coupled to the memory and configured to: Receiving AUTHENTICATION REJECT a message from the network during an attempt to establish emergency services through the first procedure; Performing a general operation of authentication rejection, and Notifying upper layers that the first process failed or attempted to execute a second process.
- 17. The apparatus of claim 16, wherein the first procedure comprises a registration procedure for initiating an emergency PDU session or a service request procedure for initiating an emergency PDU session, and the second procedure comprises an initial registration for emergency services.
- 18. The apparatus of claim 17, wherein the registration procedure includes an initial registration or mobility and a periodic registration update.
- 19. The apparatus of claim 16, wherein the first procedure comprises an attach procedure for initiating a packet data network connection for an emergency bearer service, a tracking area update procedure for initiating a packet data network connection for an emergency bearer service, or a traffic request procedure for initiating a packet data network connection for an emergency bearer service, and the second procedure comprises an attach procedure for an emergency bearer service.
- 20. A computer-readable medium for wireless communication of user equipment, storing computer-executable code, comprising computer-executable code for: Receiving AUTHENTICATION REJECT a message from the network during an attempt to establish emergency services through the first procedure; Performing a general operation of authentication rejection, and Notifying upper layers that the first process failed or attempted to execute a second process.
Description
Behavior of user equipment in case of connection failure of emergency bearer service due to network authentication failure Cross reference The present application claims priority to indian patent application serial No. 202321066166, entitled "A METHOD TO DEFINE UE BEHAVIOR WHEN EMERGENCY SERVICES FALLBACK IS FAILED DUE TO AUTHENTICATION FAILURE",, filing date 2023, month 10, 3, and to indian patent application serial No. 202321066167, entitled "A METHOD TO DEFINE UE BEHAVIOR WHEN EMERGENCY SERVICES FALLBACK IS FAILED DUE TO AUTHENTICATION FAILURE",, filing date 2023, month 10, 3, the entire contents of both of which are incorporated herein by reference. Technical Field The present disclosure relates generally to communication systems, and more particularly, to techniques for handling authentication failures during emergency service flows in a wireless communication network. Background The statements in this section merely provide background information related to the present disclosure and may not constitute prior art. Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, imaging, data, messaging, and broadcast. A typical wireless communication system may employ multiple multi-user access technologies to support communication with multiple users by sharing available system resources. Examples of such multi-user access techniques include code division multiple access (code division multiple access, CDMA) systems, time division multiple access (time division multiple access, TDMA) systems, frequency division multiple access (frequency division multiple access, FDMA) systems, orthogonal frequency division multiple access (orthogonal frequency division multiple access, OFDMA) systems, single-carrier frequency division multiple access (single-carrier frequency division multiple access, SC-FDMA) systems, and time division synchronous code division multiple access (time division synchronous code division multiple access, TD-SCDMA) systems. These multi-user access technologies have been employed in various telecommunications standards to provide a generic protocol that enables different wireless devices to communicate at the market level, the country level, the regional level, and even worldwide. An example of a telecommunications standard is the 5G new air interface (5G New Radio,5G NR). The 5G NR is part of the ongoing mobile broadband evolution facilitated by the third generation partnership project (Third Generation Partnership Project,3 GPP) to meet new requirements related to latency, reliability, security, scalability (e.g., related to the internet of things (Internet of Things, ioT)) and other requirements. Certain aspects of 5G NR may be based on the 4G long term evolution (Long Term Evolution, LTE) standard. The 5G NR technology still needs further improvement. These improvements are also applicable to other multi-user access technologies and telecommunication standards employing these technologies. Disclosure of Invention The following presents one or more aspects in a simplified form to provide a basic understanding of such aspects. This abstract is not a comprehensive overview of all contemplated aspects, and is not intended to identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later. In one aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The device may be a User Equipment (UE). The user equipment receives AUTHENTICATION REJECT a message from the network during an attempt to establish emergency services through the first procedure. The user equipment performs a general operation of authentication rejection. The user equipment informs an upper layer of the first procedure failure. Or the user equipment attempts to execute the second procedure. To the accomplishment of the foregoing and related ends, one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed and the present description is intended to include all such aspects and their equivalents. Drawings Fig. 1 is a schematic diagram of an example wireless communication system and access network. Fig. 2 is a schematic diagram of a base station communicating with user equipment in an access network. Fig. 3 illustrates a logical architecture of a distributed access network. Fig. 4 illustrates the physical architecture of a distributed access network. Fig. 5 is an example schematic diagram of a downlink-centric time slot. Fig. 6 is an example s