Search

EP-4740635-A1 - A METHOD AND A SYSTEM TO RE-ROUTE A REGISTRATION REQUEST

EP4740635A1EP 4740635 A1EP4740635 A1EP 4740635A1EP-4740635-A1

Abstract

The present disclosure relates to a method and a system for re-routing a registration request by a network node in a wireless communication system The present disclosure encompasses receiving, at a network node [106] via a radio access network [RAN] [104], the registration request for establishment of a connection between a user equipment, UE [102] and a target network node [108]. The method then leads to authenticating, by the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request. The method then encompasses re-routing, by the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102].

Inventors

  • SINGH, MUKESH
  • Bisht, Birendra Singh
  • RAJESH, Durgesh
  • Banka, Venkatakrishna
  • DEVAL, Sunny
  • BEHERA, Dilip
  • RAJU, Neha
  • GOURH, Santosh
  • KUMAR, PRADEEP
  • BHATNAGAR, AAYUSH
  • NATALI, Fenil
  • MUKHERJEE, KOUSHIK
  • EDAKKARA, Jim
  • Ghag, Arpita Jaywant
  • BHATTACHARYA, Dipanjan
  • KUMAR, SANDEEP
  • Singh, Harbinder Pal

Assignees

  • Jio Platforms Limited

Dates

Publication Date
20260513
Application Date
20240611

Claims (16)

  1. 1. A method to re-route a registration request, the method comprising: receiving, by a transceiver unit [101] at a network node [106] via a radio access network (RAN) [104], the registration request for establishment of a connection between a user equipment (UE) [102], and a target network node [108]; authenticating, by an authenticator unit [103] at the network node [106], an identity of the UE [ 102] based on a communication with a first authentication network node for the received registration request; and re-routing, by a router unit [105] at the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102],
  2. 2. The method as claimed in claim 1, wherein the network node [106] is associated with a first access and mobility management function (AMF1) [106A] of a first type of network.
  3. 3. The method as claimed in claim 1, wherein the target network node [108] is associated with a second access and mobility management function (AMF2) [106B] of a second type of network, wherein the first type of network and the second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users.
  4. 4. The method as claimed in claim 1, wherein the first authentication network node is a first authentication server function (AUSF1) [108A] of the first type of network.
  5. 5. The method as claimed in claim 4, wherein the failure of the authentication corresponds to a reception of an error message from the first authentication network node (AUSF1) [108 A] while authenticating the UE [102],
  6. 6. The method as claimed in claim 5, wherein the error message is a 404 error message to indicate to the network node [106] that a user data is not provisioned in the first type of network.
  7. 7. The method as claimed in claim 3, further comprises: authenticating, by the target network node [108] via the authenticator unit [103], the identity of the UE [ 102] based on a communication with a second authentication server function (AUSF2) [108B] of the second type of network; and establishing, by the target network node [108] via an analyzer unit [109], the connection between the UE [102] and the target network node [108] based on a reception of a positive response from the second authentication server function (AUSF2) [ 108B] .
  8. 8. A system for re-routing a registration request, the system comprises: a storage unit [107]; a transceiver unit [101] coupled to the storage unit [107], wherein the transceiver unit [101] enables a network node [106] to receive, via a RAN [104], the registration request for establishment of a connection between a UE [102] and a target network node [108]; an authenticator unit [103] coupled to the transceiver unit [101], the authenticator unit [103] is configured to authenticate, at the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request; and a re-routing unit [105] coupled to the authenticator unit [103], the re-routing unit [105] is configured to re-route, at the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102],
  9. 9. The system as claimed in claim 8, wherein the network node [106] is associated with a first access and mobility management function (AMF1) [106A] of a first type of network.
  10. 10. The system as claimed in claim 8, wherein the target network node [108] is associated with a second access and mobility management function (AMF2) [106B] of a second type of network, wherein the first type of network and the second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users.
  11. 11. The system as claimed in claim 8, wherein the first authentication network node is a first authentication server function (AUSF1) [108A] of the first type of network.
  12. 12. The system as claimed in claim 11, wherein the failure of the authentication corresponds to the reception of an error message from the first authentication network node (AUSF1) [108 A] while authenticating the UE.
  13. 13. The system as claimed in claim 12, wherein the error message is a 404 error message to indicate to the network node [106] that a user data is not provisioned in the first type of network.
  14. 14. The system as claimed in claim 10, wherein: the authenticator unit [ 103] is configured to authenticate, by the target network node [108], an identity of the UE [102] based on a communication with a second authentication server function (AUSF2) [108B] of the second type of network; and an analyzer unit [109] connected to the authenticator unit [103] is configured to establish, by the target network node [108], the connection between the UE [102] and the target network node [108] based on a reception of a positive response from the second authentication server function (AUSF2) [ 108B] .
  15. 15. A User Equipment (UE) device for re-routing a registration request, via a user interface (UI), the User Equipment (UE) comprising: a memory; and a processor coupled to the memory, wherein the processor is configured to: send a registration request to a network node [106], wherein the registration request is used for establishing a connection between the User Equipment (UE) [102], and a target network node [108], and wherein the connection is established between the UE and the target network node based on: authentication, at the network node [106], of an identity of the UE [102] based on a communication with a first authentication network node for the received registration request; and re-routing, by the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102],
  16. 16. A non-transitory computer-readable storage medium storing instructions for re-routing registration requests, the storage medium comprising executable code which, when executed, causes: a transceiver unit [ 101 ] to receive, at a network node [106] via a radio access network RAN [104], the registration request for establishment of a connection between a User Equipment (UE) [102] and a target network node [108]; an authenticator unit [103] to authenticate, at the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request; and a re-routing unit [105] to re-route, at the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102],

Description

A METHOD AND A SYSTEM TO RE-ROUTE A REGISTRATION REQUEST FIEED OF THE DISCEOSURE [0001] Embodiments of the present disclosure relates generally to the field of wireless communication systems. More particularly, embodiments of the present disclosure relate to a method and system to re-route a registration request to a correct Access and Mobility Function (AMF) when multiple dedicated isolated networks exist simultaneously within a Public Land Mobile Network (PLMN). BACKGROUND [0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art. [0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third- generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. [0004] To meet an increasing demand for radio data traffic, efforts have been made to develop an improved fifth-Generation (5G) communication system or a pre-5G communication system or 5G technology. The 5G communication system or the pre-5G communication system may also be referred to as a beyond 4G network communication system or a post LTE system. Presently, the 5G communication system is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users. [0005] To achieve a high data transmission rate, the 5G communication system is considered to be implemented in a very high frequency (mm Wave) band (e.g., 60 GHz band). [0006] Still further, in order to relieve path loss of a radio wave and increase a transfer distance of the radio wave in the very high frequency band, beamforming, massive multiple input multiple output (mMIMO), full dimensional MIMO (FD-MIMO), array antennas, analog beam-forming, and large-scale antenna technologies have been discussed in connection with 5G communication system. [0007] With a view to enhance or improve a network of the 5G communication system, technologies such as an evolved small cell, an advanced small cell, a cloud Radio Access Network (cloud RAN), an ultra-dense network, a device -to-de vice communication (D2D), a wireless backhaul, a moving network, cooperative communication, coordinated multi-points (CoMPs), and reception interference cancellation have been developed. [0008] Additionally, the Internet has evolved from a human-centered connection network through which a human being generates and consumes information to an Internet of things (loT) network that is configured to transmit or receive information between distributed components, i.e., things, and processes the information. The Internet of everything (loE) technology in which the big data processing technology, etc., is combined with the loT technology by connection with a cloud server, etc., has also emerged. [0009] In order to implement the loT, technology elements, such as a sensing technology, wired and wireless communication and network infrastructure, a service interface technology, and a security technology, are required. For example, technologies such as a sensor network, machine to machine (M2M), and machine type communication (MTC) for connecting between things have been extensively researched. In another example, the loT environment provides an intelligent Internet technology (IT) service. Such IT service creates a new value in human life by collecting and analyzing data generated in the connected things. The loT finds its applicability in various fields such as a smart home, a smart building, a smart city, a smart car or a connected car, a smart grid, health care, smart appliances, and an advanced healthcare service, by fusing and combining existing IT with various industries. Thus, various attempts have been made to apply the 5G communication system to the loT network. [0010] In view of the foregoing, with the development of 5G communication technology, a method is required for providing an efficient service in the 5G mobile communication environment by allowing