Connecting to Virtualized Mobile Core Networks
First Claim
1. A method for use by an apparatus, wherein the apparatus comprises a processor and memory, and wherein the apparatuses further includes computer-executable instructions stored in the memory which, when executed by the processor, perform functions of a method comprising:
- receiving an initial connection message from a User Equipment (UE) including a temporary identifier and service descriptors;
using the temporary identifier to determine an authentication server;
communicating with the authentication server to authenticate the UE;
determining at least one network slice that the UE should connect to; and
responding to the UE with a response message including an indication of whether or not connection is permitted and new temporary identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A 5G Network Architecture uses virtualization and network slicing. The user equipment (UE) interacts with an underlay network that interacts with virtual network slices. The UE interacts with the underlay network (ULN) to establish a connection to a virtual network slice. Procedures are defined to assign a new slice instance to a UE (UE initiated and ULN initiated); to change a UE Profile (UE initiated and ULN Initiated); and to change a UE'"'"'s assigned slice instance (ULN Initiated).
239 Citations
22 Claims
-
1. A method for use by an apparatus, wherein the apparatus comprises a processor and memory, and wherein the apparatuses further includes computer-executable instructions stored in the memory which, when executed by the processor, perform functions of a method comprising:
-
receiving an initial connection message from a User Equipment (UE) including a temporary identifier and service descriptors; using the temporary identifier to determine an authentication server; communicating with the authentication server to authenticate the UE; determining at least one network slice that the UE should connect to; and responding to the UE with a response message including an indication of whether or not connection is permitted and new temporary identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for use by an apparatus, wherein the apparatus comprises a processor and memory, and wherein the apparatuses further includes computer-executable instructions stored in the memory which, when executed by the processor, perform functions of a method comprising:
-
at an underlay network, receiving a request to access the core network; providing a slice instance identifier; and using the slice instance identifier to connect the user equipment to a virtualized network slice of the core network. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus comprising a processor and a memory, the apparatus further including computer-executable instructions stored in the memory of the apparatus which, when executed by the processor of the apparatus, cause the apparatus to:
-
receive a initial connection message from a User Equipment (UE) including a temporary identifier and service descriptors; use the temporary identifier to determine an authentication server; communicate with the authentication server to authenticate the UE; determine at least one network slice that the UE should connect to; and respond to the UE with a response message including an indication of whether or not connection is permitted and new temporary identifier.
-
-
22. An apparatus comprising a processor and a memory, the apparatus further including computer-executable instructions stored in the memory of the apparatus which, when executed by the processor of the apparatus, cause the apparatus to:
-
at an underlay network, receive a request to access the core network; provide a slice instance identifier; and use the slice instance identifier to connect the user equipment to a virtualized network slice of the core network.
-
Specification