Forbidden tracking area optimization for private/home networks
First Claim
1. A method comprising:
- determining that access verification is to be done using an identifier of a first length or an identifier of a second length;
receiving a node address;
performing access verification by comparing a field of the received node address that has the determined first or second length against a locally stored access list; and
adding at least the compared field of the node address to a locally stored list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or excluding the compared field of the node address from the locally stored list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers.
4 Assignments
0 Petitions
Accused Products
Abstract
Access verification is adaptively done using an identifier of a first or a second length, by comparing a field of a node address that has the determined first or second length against a locally stored access list. At least the compared field of the node address is either added to a locally stored list of cell selection candidate nodes where the access list is allowed identifiers, or excluded from it where the access list is restricted identifiers. The node identifier is in three sections. The first section is service type, which the UE can use to determine whether or not it is restricted/allowed. The first length is the length of the second section, which is a service area ID of a group of network nodes. The second length is the length of the second section plus the third section, which identifies one node of the group of network nodes.
47 Citations
35 Claims
-
1. A method comprising:
-
determining that access verification is to be done using an identifier of a first length or an identifier of a second length; receiving a node address; performing access verification by comparing a field of the received node address that has the determined first or second length against a locally stored access list; and adding at least the compared field of the node address to a locally stored list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or excluding the compared field of the node address from the locally stored list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
a receiver configured to receive a node address; a processor configured to determine that access verification is to be done using an identifier of a first length or an identifier of a second length, and configured to perform access verification by comparing a field of the received node address that has the determined first or second length against a locally stored access list, and a local memory to which the processor adds at least the compared field of the node address to a list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or from which the processor excludes the compared field of the node address from the list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable memory embodying a program of machine-readable instructions executable by a digital data processor to perform actions directed toward performing access verification, the actions comprising:
-
determining that access verification is to be done using an identifier of a first length or an identifier of a second length; receiving a node address; performing access verification for comparing a field of the received node address that has the determined first or second length against a locally stored access list; and adding at least the compared field of the node address to a locally stored list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or excluding the compared field of the node address from the locally stored list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers.
-
-
22. An apparatus comprising:
-
receiving means for receiving a node address; processing means for determining that access verification is to be done using an identifier of a first length or an identifier of a second length, and for performing access verification by comparing a field of the received node address that has the determined first or second length against a locally stored access list, and memory means for adding at least the compared field of the node address to a list of cell selection candidate nodes for the case where the access list comprises a list of allowed identifiers, or for excluding the compared field of the node address from the list of cell selection candidate nodes for the case where the access list comprises a list of restricted identifiers.
-
-
23. A method comprising:
-
determining whether a first length identifier or a second length identifier is to be used for access verification by user equipments, and sending an indication that access verification is to be done using an identifier of the first length or an identifier of the second length; and sending a node address for access verification. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. An apparatus comprising:
-
a processor configured to determine whether a first length identifier or a second length identifier is to be used for access verification by user equipments; and a transmitter configured to send an indication that access verification is to be done using an identifier of the first length or an identifier of the second length, and configured to send a node address for the access verification. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
Specification