Sign In to Follow Application
View All Documents & Correspondence

A Method And A System To Re Route A Registration Request

Abstract: The present disclosure relates to a method and a system for re-routing a registration request by a network node in a wireless communication system. The present disclosure encompasses receiving, at a network node [106] via a radio access network [RAN] [104], the registration request for establishment of a connection between a user equipment, UE [102] and a target network node [108]. The method then leads to authenticating, by the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request. The method then encompasses re-routing, by the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102]. FIG. 2A

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 July 2023
Publication Number
2/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India

Inventors

1. Mukesh Singh
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India

Specification

FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“A METHOD AND A SYSTEM TO RE-ROUTE A REGISTRATION
REQUEST”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.

5 A METHOD AND A SYSTEM TO RE-ROUTE A REGISTRATION
REQUEST
FIELD OF THE DISCLOSURE
10 [0001] Embodiments of the present disclosure relates generally to the field of
wireless communication systems. More particularly, embodiments of the present disclosure relate to a method and system to re-route a registration request to a correct Access and Mobility Function (AMF) when multiple dedicated isolated networks exist simultaneously within a Public Land Mobile Network (PLMN).
15
BACKGROUND
[0002] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may
20 include certain aspects of the art that may be related to various features of the
present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
25 [0003] Wireless communication technology has rapidly evolved over the past
few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data
30 services became possible, and text messaging was introduced. The third-generation
(3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security.
35
2

5 [0004] To meet an increasing demand for radio data traffic, efforts have been
made to develop an improved fifth-Generation (5G) communication system or a
pre-5G communication system or 5G technology. The 5G communication system
or the pre-5G communication system may also be referred to as a beyond 4G
network communication system or a post LTE system. Presently, the 5G
10 communication system is being deployed, promising even faster data speeds, low
latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
15 [0005] To achieve a high data transmission rate, the 5G communication system
is considered to be implemented in a very high frequency (mmWave) band (e.g., 60 GHz band).
[0006] Still further, in order to relieve path loss of a radio wave and increase a
20 transfer distance of the radio wave in the very high frequency band, beamforming,
massive multiple input multiple output (mMIMO), full dimensional MIMO (FD-MIMO), array antennas, analog beam-forming, and large-scale antenna technologies have been discussed in connection with 5G communication system.
25 [0007] With a view to enhance or improve a network of the 5G communication
system, technologies such as an evolved small cell, an advanced small cell, a cloud Radio Access Network (cloud RAN), an ultra-dense network, a device-to-device communication (D2D), a wireless backhaul, a moving network, cooperative communication, coordinated multi-points (CoMPs), and reception interference
30 cancellation have been developed.
[0008] Additionally, the Internet has evolved from a human-centered
connection network through which a human being generates and consumes
information to an Internet of things (IoT) network that is configured to transmit or
35 receive information between distributed components, i.e., things, and processes the
3

5 information. The Internet of everything (IoE) technology in which the big data
processing technology, etc., is combined with the IoT technology by connection with a cloud server, etc., has also emerged.
[0009] In order to implement the IoT, technology elements, such as a sensing
10 technology, wired and wireless communication and network infrastructure, a
service interface technology, and a security technology, are required. For example,
technologies such as a sensor network, machine to machine (M2M), and machine
type communication (MTC) for connecting between things have been extensively
researched. In another example, the IoT environment provides an intelligent
15 Internet technology (IT) service. Such IT service creates a new value in human life
by collecting and analyzing data generated in the connected things. The IoT finds
its applicability in various fields such as a smart home, a smart building, a smart
city, a smart car or a connected car, a smart grid, health care, smart appliances, and
an advanced healthcare service, by fusing and combining existing IT with various
20 industries. Thus, various attempts have been made to apply the 5G communication
system to the IoT network.
[0010] In view of the foregoing, with the development of 5G communication
technology, a method is required for providing an efficient service in the 5G mobile
25 communication environment by allowing a user to quickly find network providing
services that are desired by the user equipment (UE), when the user equipment initially accesses the 5G network.
[0011] Also, in 5G-NR communication system, different dedicated isolated
30 networks e.g., a cellular IoT network and a mobility network, can exist
simultaneously within a common Public Land Mobile Network (PLMN), where the
different isolated networks are deployed with dedicated Authentication Server
Function (AUSF), Unified Data Management (UDM), and the other network
function entities. The AUSF is mainly for Authentication Process and the UDM is
35 a function/service that manages user data for all process. The UDM is interfaced
4

5 with many other services: AUSF, Access and Mobility Management Function
(AMF), Session Management Function (SMF), Short Message Service Function (SMSF). It means when services such as the AUSF, the AMF, the SMF, the SMSF needs subscriber data, it requests it to the UDM and the UDM provide the subscriber data to the services that requested.
10
[0012] In addition, data between a UE and network entities (or another UE) is
transmitted on a data path through various components. This resource allocation and the data path is configured statically or semi-statically. However, the resource allocation and parameters of the components can be configured along the data path
15 dynamically (by automation), by defining a set of parameters on the data path for
specific UEs. The set of parameters assigned for the UEs is called a ‘Slice’ of the network. Thus, network slice is a concept of splitting all resources along the data path into multiple sets, each of which is optimized for specific UEs.
20 [0013] Conventionally, the user data is not shared among the network entities
between different 5G networks, and thus re-routing a registration request from a UE to a particular or target AMF based on network slice is not feasible and the authentication fails or terminates for a wrongly routed UE.
25 [0014] Thus, there exists an imperative need in the art to allow a UE (or a
registration request of the UE) to be re-routed to an appropriate or target AMF when different dedicated isolated networks e.g., a cellular IoT network, a mobility network, exist in a common PLMN.
30 OBJECTS OF THE DISCLOSURE
[0015] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
5

5 [0016] It is an object of the present disclosure to provide a system and a method
that allows the UE or the registration request of the UE to be re-routed to a desired AMF when two or more isolated networks, e.g., a cellular IoT network and a mobility network, exist in a common PLMN.
10 [0017] It is another object of the present disclosure to provide a system and a
method for allowing successfully registration of the UE in an appropriate network in an efficient manner.
SUMMARY OF THE DISCLOSURE
15
[0018] This section is provided to introduce certain aspects of the present
disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
20
[0019] According to an aspect of the present disclosure, a method to re-route a
registration request is disclosed. The method includes receiving, by a transceiver unit at a network node via a Radio Access Network (RAN), a registration request for establishment of a connection between a User Equipment (UE) and a target
25 network node. Next, the method includes authenticating, by an authenticator unit at
the network node, an identity of the UE based on a communication with a first authentication network node for the received registration request. Thereafter, the method includes re-routing, by a router unit at the network node via the RAN, the registration request to a target network node based on a failure of the authentication
30 of the identity of the UE.
[0020] Further, the network node is associated with a first access and mobility
management function (AMF1) of a first type of network.
35
6

5 [0021] Further, the target network node is associated with a second access and
mobility management function (AMF2) of a second type of network, wherein the first type of network and the second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users. 10
[0022] Further, the first authentication network node is a first authentication
server function (AUSF1) of the first type of network.
[0023] Further, the failure of the authentication corresponds to a reception of
15 an error message from the first authentication network node (AUSF1) while
authenticating the UE.
[0024] Also, the error message is a 404 error message to indicate to the network
node that an user data is not provisioned in the first type of network.
20
[0025] Further, the method encompasses: authenticating, by the target network
node via the authenticator unit, the identity of the UE based on a communication with a second authentication server function (AUSF2) of the second type of network; and establishing, by the target network node via an analyzer unit, the
25 connection between the UE and the target network node based on a reception of a
positive response from the second authentication server function (AUSF2).
[0026] According to another aspect of the present disclosure, a system for re-
routing a registration request is disclosed. The system comprising a storage unit and
30 a transceiver unit coupled to the storage unit, wherein the transceiver unit is
configured to receive via a RAN , a registration request for establishment of a connection between a UE and a target network node. The system further comprises an authenticator unit connected to the transceiver unit, wherein the authenticator unit is configured to authenticate at the network node an identity of the UE based
35 on a communication with a first authentication network node for the received
7

5 registration request. The authenticator unit is connected to a re-routing unit, wherein
the re-routing unit is configured to rerouteat the network node via the RAN the registration request to the target network node based on a failure of the authentication of the identity of the UE.
10 [0027] Another aspect of the present disclosure relates to user equipment (UE)
device for re-routing a registration request, via a user interface (UI). The User Equipment (UE) may include a memory and a processor coupled to the memory. The processor may be configured to send a registration request to a network node. The registration request may be used for establishing a connection between the UE
15 and a target network node. Further, the connection may be established between the
UE and the target network node based on: authentication of an identity of UE, at the network node, based on a communication with a first authentication network node for the received registration request; and re-routing, by the network node via the RAN, the registration request to the target network node based on a failure of
20 the authentication of the identity of the UE.
[0028] Yet another aspect of the present disclosure relates to a non-transitory
computer-readable storage medium storing instructions for re-routing registration requests within a telecommunication network. These instructions entail executable
25 code that, when executed by one or more units of the system the instructions
facilitate: a transceiver unit to receive, via a RAN, the registration request for establishment of a connection between a UE and a target network node; an authenticator unit to authenticate, at the network node, an identity of the UE based on a communication with a first authentication network node for the received
30 registration request; and
a re-routing unit to re-route, at the network node via the RAN, the registration request to the target network node based on a failure of the authentication of the identity of the UE.
35
8

5 BRIEF DESCRIPTION OF DRAWINGS
[0029] The accompanying drawings, which are incorporated herein, and
constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same
10 parts throughout the different drawings. Components in the drawings are not
necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such
15 drawings includes disclosure of electrical components, electronic components or
circuitry commonly used to implement such components.
[0030] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture [100A], in accordance with exemplary
20 embodiment of the present disclosure;
[0031] FIG. 1A illustrates an exemplary system diagram depicting a system
[100] for re-routing a registration request in accordance with exemplary embodiments of the present disclosure;
25
[0032] FIG. 1B illustrates an exemplary diagram of a communication network
architecture [100B] of a Public Land Mobile Network (PLMN) network with two isolated network types, in accordance with exemplary embodiments of the present disclosure;
30
[0033] FIG. 2A illustrates an exemplary method flow diagram indicating a
process [200] of re-routing registration request performed by an initial access and mobility management function (AMF) with two isolated networks in same PLMN, in accordance with exemplary embodiments of the present disclosure; and
35
9

5 [0034] FIG. 2B illustrates an exemplary signalling flow diagram [300]
indicating a process performed by an initial access and mobility management
function (AMF), in accordance with exemplary embodiments of the present
disclosure.
10 [0035] FIG.3 illustrates an exemplary block diagram of a computing device
upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0036] The foregoing shall be more apparent from the following more detailed
15 description of the disclosure.
DETAILED DESCRIPTION
20
[0037] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific
25 details. Several features described hereafter can each be used independently of one
another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein. Example embodiments of
30 the present disclosure are described below, as illustrated in various drawings in
which like reference numerals refer to the same parts throughout the different drawings.
[0038] The ensuing description provides exemplary embodiments only, and is
35 not intended to limit the scope, applicability, or configuration of the disclosure.
10

5 Rather, the ensuing description of the exemplary embodiments will provide those
skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
10
[0039] It should be noted that the terms "mobile device", "user equipment",
"user device", “communication device”, “device” and similar terms are used interchangeably for the purpose of describing the disclosure. These terms are not intended to limit the scope of the disclosure or imply any specific functionality or
15 limitations on the described embodiments. The use of these terms is solely for
convenience and clarity of description. The disclosure is not limited to any particular type of device or equipment, and it should be understood that other equivalent terms or variations thereof may be used interchangeably without departing from the scope of the disclosure as defined herein.
20
[0040] Specific details are given in the following description to provide a
thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other
25 components may be shown as components in block diagram form in order not to
obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
30 [0041] Also, it is noted that individual embodiments may be described as a
process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged.
11

5 A process is terminated when its operations are completed but could have additional
steps not included in a figure.
[0042] In addition, each block may indicate some of modules, segments, or
codes including one or more executable instructions for executing a specific logical
10 function(s). Further, functions mentioned in the blocks occur regardless of a
sequence in some alternative embodiments. For example, two blocks that are contiguously illustrated may be simultaneously performed in fact or be performed in a reverse sequence depending on corresponding functions.
15 [0043] Herein, the term "unit" indicates software or hardware components,
such as a Field-Programmable Gate Array (FPGA) and an Application-Specific Integrated Circuit (ASIC). However, the meaning of the "unit" is not limited to software or hardware. For example, a "unit" may be configured to be in a storage medium that may be addressed and may also be configured to be reproduced one or
20 more processor. Accordingly, a "unit" may include components such as software
components, object oriented software components, class components, and task components and processors, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuit, data, database, data structures, tables, arrays, and variables. The functions provided in the
25 components and the "units" may be combined with a smaller number of
components, and the "units" or may be further separated into additional components and "units". In addition, the components and the "units" may also be implemented to reproduce one or more central processing units (CPUs) within a device or a security multimedia card.
30
[0044] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not
35 necessarily to be construed as preferred or advantageous over other aspects or
12

5 designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding
10 any additional or other elements.
[0045] As used herein, an “electronic device”, or “portable electronic device”,
or “user device” or “communication device” or “user equipment” or “device” refers to any electrical, electronic, electromechanical and computing device. The user device is capable of receiving and/or transmitting one or parameters, performing
15 function/s, communicating with other user devices and transmitting data to the
other user devices. The user equipment may have a processor, a display, a memory, a battery and an input-means such as a hard keypad and/or a soft keypad. The user equipment may be capable of operating on any radio access technology including but not limited to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low
20 Energy, Near Field Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For instance,
the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other device as may be obvious to a person skilled in the art for
25 implementation of the features of the present disclosure.
[0046] Further, the user device may also comprise a “processor”
or “processing unit” includes processing unit, wherein processor refers to any logic circuitry for processing instructions. The processor may be a general-purpose
30 processor, a special purpose processor, a conventional processor, a digital signal
processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing,
35 in used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a
13

5 smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a
wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart
10 phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other
15 such unit(s) which are required to implement the features of the present disclosure.
[0047] As used herein, “storage unit” or “memory unit” refers to a machine or
computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable
20 medium includes Read-Only Memory (“ROM”), Random Access Memory
(“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions input/output processing, and/or any other functionality
25 that enables the working of the system according to the present disclosure. More
specifically, the processor is a hardware processor.
[0048] As portable electronic devices and wireless technologies continue to
improve and grow in popularity, the advancing wireless technologies for data
30 transfer are also expected to evolve and replace the older generations of
technologies. In the field of wireless data communications, the dynamic advancement of various generations of cellular technology are also seen. The development, in this respect, has been incremental in the order of second generation (2G), third generation (3G), fourth generation (4G), and now fifth generation (5G),
35 and more such generations are expected to continue in the forthcoming time.
14

5
[0049] Hereinafter, terms identifying an access node, terms indicating network
entities, terms indicating messages, terms indicating an interface between network
entities, and terms indicating various pieces of identification information, as used
in the following description, are exemplified for convenience of explanation.
10 Accordingly, the disclosure is not limited to terms to be described below, and other
terms indicating objects having equal technical meanings may be used.
[0050] Hereinafter, for convenience of explanation, the disclosure may use
terms and names defined in the 3rd Generation Partnership Project Long Term
15 Evolution (3GPP LTE) standards or technical specifications. However, the
disclosure is not limited to such terms and names, and may also be applied to systems following other standards. In the disclosure, depending on a use case or an implementation, an evolved Node B (eNB) may be interchangeably used with a next-generation Node B (gNB) for convenience of explanation. That is, a Base
20 Station (BS) described by an eNB may represent a gNB.
[0051] In the following descriptions, the term "base station" refers to an entity
for allocating resources to a User Equipment (UE) and may be used interchangeably with at least one of a gNode B, an eNode B, a node B, a base station (BS), a radio
25 access unit, a Radio Access Network (RAN), a Base Station Controller (BSC), or a
node over a network. The term "terminal" may be used interchangeably with a user equipment (UE), a mobile station (MS), a cellular phone, a smartphone, a computer, or a multimedia system capable of performing communication functions. However, the disclosure is not limited to the aforementioned examples.
30
[0052] In particular, the disclosure is applicable to 3GPP new radio (NR) (or
5th generation (5G)) mobile communication standards. The disclosure is applicable to intelligent services (e.g., smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail trade, security, and safety
35 services) based on 5G communication technologies and Internet of things (IoT)-
15

5 related technologies. The term UE may also indicate a mobile phone, NB-IoT
devices, sensors, and other wireless communication devices.
[0053] Radio Access Technology (RAT) refers to the technology used by
mobile devices/ User Equipment (UE) to connect to a cellular network. It refers to
10 the specific protocol and standards that govern the way devices communicate with
base stations, which are responsible for providing the wireless connection. Further, each RAT has its own set of protocols and standards for communication, which define the frequency bands, modulation techniques, and other parameters used for transmitting and receiving data. Examples of RATs include GSM (Global System
15 for Mobile Communications), CDMA (Code Division Multiple Access), UMTS
(Universal Mobile Telecommunications System), LTE (Long-Term Evolution), and 5G. The choice of RAT depends on a variety of factors, including the network infrastructure, the available spectrum, and the mobile device's/device's capabilities. Mobile devices often support multiple RATs, allowing them to connect to different
20 types of networks and provide optimal performance based on the available network
resources.
[0054] As discussed in the background section, the user data is not shared
among the network entities of between different 5G networks and thus re-routing a
25 registration request from a UE to a particular or target access and mobility
management function (AMF) based on network slice is not feasible, since the authentication fails or terminates for the wrongly routed user or the UE.
[0055] The present disclosure aims to overcome the above-mentioned and
30 other existing problems in this field of technology by allowing the UE (or the
registration request of the UE) to be re-routed to an appropriate or target AMF when
two or more isolated networks e.g., a cellular IoT network, a mobility network, exist
in a common PLMN. In particular, the present disclosure provides a novel method
and system performed by the AMF in a wireless communication system having
35 dedicated isolated networks such a cellular IoT network and a mobility network.
16

5 According to the proposed solution, an initial AMF receives an initial registration
request message from the UE through a radio access network (RAN). Since the
initial AMF is not an appropriate AMF for the registration request from the UE, the
initial AMF generates an error message. Upon receiving such an error message and
identifying that the initial AMF is not suitable for serving the UE, the initial AMF
10 – instead of terminating the registration request of the UE - may reject the
registration request and re-route the registration request of the UE to the target AMF of another dedicated isolated network having a common PLMN.
[0056] Thus, the technical effect of the proposed solution is to re-route the
15 registration request of the UE to the desired or target AMF thereby improving the
efficiency of service in 5G communication environment. Thus, the overall user
experience in using the 5G services is enhanced since the proposed solution does
not terminate the registration request of the UE and the UE does not have to again
re-initiate registration request to a different AMF of the dedicated network, unlike
20 network slicing where the authentication fails for the wrongly routed user or the
UE.
[0057] The technical advancement of the proposed solution is that it enables
seamless operation of 5G services in a 5G network environment. Further, it avoids
25 unnecessary transmission of registration request to a different AMF thereby saving
the resources and battery consumption of the UE.
[0058] The present disclosure proposes a method and a system performed by
an Access and Mobility Management Function (AMF) in a wireless communication
30 system. The term ‘AMF’ as used herein, refers to an access and mobility
management function which is responsible for managing the mobility of User Equipment (UE) within the network. It also handles authentication and security functions for UE accessing the network. In particular, the wireless communication system includes two or more dedicated isolated networks e.g., a cellular IoT
35 network and mobility network, existing simultaneously within a common a public
17

5 land mobile network (PLMN). The term ‘cellular IoT’ network as used herein,
refers to the deployment of cellular network technologies to support the connectivity and communication requirements of IoT (Internet of Things) devices. Further, the term ‘mobility network’ indicates a type of network infrastructure designed to facilitate seamless connectivity and communication for mobile devices.
10 The term ‘PLMN’ as used herein is a wireless telecommunications network that
provides mobile communication services to users within a defined geographic area. It consists of various network elements, including base stations, switches, and network nodes, interconnected to facilitate mobile communication. The two or more isolated networks are deployed with dedicated Authentication Server
15 Function (AUSF), Unified Data Management (UDM), and the other network
function entities.
[0059] According to an embodiment of the present disclosure, the AMF
receives an initial registration request message from a UE. The registration request
20 message from the UE is routed to the AMF through a Radio Access Network
(RAN). The registration request message from the UE includes, but not limited to, a first information includes different parameters associated with the registration request message. Upon receiving such a registration request message of a UE, the AMF may need to reroute the Registration request to another AMF, e.g. when the
25 initial AMF is not the appropriate AMF to serve the UE. The term ‘re-route’ refers
to a process of redirecting requests from one path or destination to another within a network. In the context of the described system, re-routing involves redirecting registration requests from the original network node to a different target network node in response to authentication failure or other predetermined conditions.
30 Exemplarily, when the initial AMF is not the appropriate AMF to serve the UE, the
initial AMF may receive an error message indicating that the initial AMF is not the appropriate AMF to serve the UE.
[0060] Hereinafter, exemplary embodiments of the present disclosure will be
35 described with reference to the accompanying drawings.
18

5
[0061] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture, in accordance with exemplary embodiment of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100A] includes a user equipment (UE) [102a], a radio access network
10 (RAN) [104a], an access and mobility management function (AMF) [106a], a
Session Management Function (SMF) [108a], a Service Communication Proxy (SCP) [110a], an Authentication Server Function (AUSF) [112a], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114a], a Network Slice Selection Function (NSSF) [116a], a Network Exposure Function (NEF)
15 [118a], a Network Repository Function (NRF) [120a], a Policy Control Function
(PCF) [122a], a Unified Data Management (UDM) [124a], an application function (AF) [126a], a User Plane Function (UPF) [128a], a data network (DN) [130a], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present
20 disclosure.
[0062] The User Equipment (UE) [102a] interfaces with the network via the
Radio Access Network (RAN) [104a]; the Access and Mobility Management Function (AMF) [106a] manages connectivity and mobility, while the Session
25 Management Function (SMF) [108a] administers session control; the service
communication proxy (SCP) [110a] routes and manages communication between network services, enhancing efficiency and security, and the Authentication Server Function (AUSF) [112a] handles user authentication; the Non-Standalone Access Architecture Function (NSSAAF) [114a] for integrating the 5G core network with
30 existing 4G LTE networks i.e., to enable Non-Standalone (NSA) 5G deployments,
the Network Slice Selection Function (NSSF) [116a], Network Exposure Function (NEF) [118a], and Network Repository Function (NRF) [120a] enable network customization, secure interfacing with external applications, and maintain network function registries respectively; the Policy Control Function (PCF) [122a] develops
35 operational policies, and the Unified Data Management (UDM) [124a] manages
19

5 subscriber data; the Application Function (AF) [126a] enables application
interaction, the User Plane Function (UPF) [128a] processes and forwards user data,
and the Data Network (DN) [130a] connects to external internet resources;
collectively, these components are designed to enhance mobile broadband, ensure
low-latency communication, and support massive machine-type communication,
10 solidifying the 5GC as the infrastructure for next-generation mobile networks.
[0063] Radio Access Network (RAN) [104a] is the part of a mobile
telecommunications system that connects user equipment (UE) [102a] to the core
network (CN) and provides access to different types of networks (e.g., 5G network).
15 It consists of radio base stations and the radio access technologies that enable
wireless communication.
[0064] Access and Mobility Management Function (AMF) [106a] is a 5G core
network function responsible for managing access and mobility aspects, such as UE
20 registration, connection, and reachability. It also handles mobility management
procedures like handovers and paging.
[0065] Session Management Function (SMF) [108a] is a 5G core network
function responsible for managing session-related aspects, such as establishing,
25 modifying, and releasing sessions. It coordinates with the User Plane Function
(UPF) for data forwarding and handles IP address allocation and QoS enforcement.
[0066] Service Communication Proxy (SCP) [110a] is a network function in
the 5G core network that facilitates communication between other network
30 functions by providing a secure and efficient messaging service. It acts as a
mediator for service-based interfaces.
[0067] Authentication Server Function (AUSF) [112a] is a network function in
the 5G core responsible for authenticating UEs during registration and providing
35 security services. It generates and verifies authentication vectors and tokens.
20

5
[0068] Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114a] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized. 10
[0069] Network Slice Selection Function (NSSF) [116a] is a network function
responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
15 [0070] Network Exposure Function (NEF) [118a] is a network function that
exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
[0071] Network Repository Function (NRF) [120a] is a network function that
20 acts as a central repository for information about available network functions and
services. It facilitates the discovery and dynamic registration of network functions.
[0072] Policy Control Function (PCF) [122a] is a network function responsible
for policy control decisions, such as QoS, charging, and access control, based on
25 subscriber information and network policies.
[0073] Unified Data Management (UDM) [124a] is a network function that
centralizes the management of subscriber data, including authentication, authorization, and subscription information. 30
[0074] Application Function (AF) [126a] is a network function that represents
external applications interfacing with the 5G core network to access network capabilities and services.
21

5 [0075] User Plane Function (UPF) [128a] is a network function responsible for
handling user data traffic, including packet routing, forwarding, and QoS enforcement.
[0076] Data Network (DN) [130a] refers to a network that provides data
10 services to user equipment (UE) in a telecommunications system. The data services
may include but are not limited to Internet services, private data network related services.
[0077] Referring to figure 1A, an exemplary system diagram depicting a
15 system [100] for re-routing the registration request in accordance with exemplary
embodiments of the present disclosure is shown.
[0078] The system comprises a storage unit [107] and a transceiver unit [101],
the transceiver unit [101] coupled to the storage unit [107], wherein the transceiver
20 enables a network node [106] to receive, via a Radio Access Network (RAN) [104],
the registration request for establishment of a connection between a User Equipment (UE) [102] and a target network node [108]. The term ‘storage unit’ serves as a repository for storing and managing data related to registration requests, authentication processes, and system operations. The term ‘transceiver unit’ is a
25 combined transmitter and receiver component used in systems to facilitate the
transmission and reception of signals. It enables communication between User Equipment (UE) [102] and network nodes by transmitting registration requests and receiving responses via the Radio Access Network (RAN). The transceiver unit [101] serves as the intermediary between the network node [106] and the user
30 equipment (UE) [102], responsible for managing communication flow. When the
registration request is received via the Radio Access Network (RAN) [104], the transceiver unit [101] directs it to the network node [106] for processing.
[0079] An authenticator unit [103] of the system is then configured to
35 authenticate, at the network node [106], an identity of the UE [102] based on a
22

5 communication with a first authentication network node for the received
registration request. The term ‘authenticator unit’ refers as a component within the network node [106] responsible for verifying the identity of the user equipment (UE) [102] attempting to connect to the network node [106]. It communicates with a first authentication network node to authenticate the UE [102] based on the
10 received registration request. The system [100] is further enhanced by its ability to
handle various network configurations. The network node [106] is as associated with the first Access And Mobility function (AMF1) [106A] of a specific network type, while the target network node [108] is as associated with the second access And mobility function (AMF2) [106B] of another network type. These networks,
15 although isolated, belong to the same Public Land Mobile Network (PLMN) and
offer distinct services to users.
[0080] A re-routing unit [105] of the system is then configured to re-route, at
the network node [106] via the RAN [104], the registration request to the target
20 network node [108] based on a failure of the authentication of the identity of the
UE [102]. The term ‘router unit’ is a networking device responsible for directing data packets between different networks. The first authentication network node, known as the first authentication server function (AUSF1) [108A]. The router unit [105] at the network node [106], re-routes the registration requests to the target
25 network node [108] in the event of authentication failure. This ensures that
registration requests are directed to the appropriate destination for further processing. In the event of authentication failure, a reception of a predefined error message, such as a 404 error, alerts the network node [106] about the unavailability of user data in the network. For instance, the error message is a 404 error message
30 to indicate to the network node [106] that a user data is not provisioned in the first
type of network. This information enables the system [100] to make informed decisions regarding re-routing strategies.
[0081] The authenticator unit [103] is therefore configured to authenticate, at
35 the network node [106], the identity of the UE [102] based on the communication
23

5 with the first authentication network node for the received registration request.
Thereafter, the re-routing unit [105] re-routes at the network node [106] via the
RAN [104], the registration request to the target network node [108] based on the
failure of the authentication of the identity of the UE [102], wherein the failure of
the authentication corresponds to the reception of the error message from the first
10 authentication network node (AUSF1) [108A] while authenticating the UE.
[0082] The authenticator unit [103], at the target network node [108], is also
configured to authenticate the identity of the UE [102] based on a communication with a second authentication server function (AUSF2) [108B] of the second type of
15 network. Further, the target network node [108] via an analyser unit [109] of the
system, establishes the connection between the UE [102] and the target network node [108] based on a reception of a positive response from the second Authentication Server Function (AUSF2) [108B]. This system, as described, may have extra functions to make it work better. For instance, when a device wants to
20 join a network, a part of the network called the “target network node [108]” checks
if the device is allowed to join. It does this by talking to another part of the network called the “second Authentication Server Function [108B].” This check is done by a special unit called the “authenticator unit [103].” Once the device's identity is confirmed, another part of the network, known as the “target network node [108],”
25 uses the “analyser unit [109]” to make sure the device can smoothly connect to the
network.
[0083] Referring to Figure 1B, an exemplary diagram of a communication
network architecture [100B] for a Public Land Mobile Network (PLMN) network
30 with two isolated network types is shown in accordance with exemplary
embodiments of the present disclosure. As shown in Figure 1B, the PLMN [100B] network has two isolated networks i.e., a network node [106] and a target network node [108]. The Network A/Network Node [106] may be such as, but not limited to, a cellular IoT network, and the Network B/Target network node [108] may be
35 such as, but not limited to, a mobility network. The UE [102] is connected to RAN
24

5 [104] and may connect with AMF1 [106A] in the Network ‘A’ (e.g. cellular IoT) or
with AMF2 [106B] in the Network ‘B’ (e.g. mobility network) after performing authentication process from corresponding authentication function of network.
[0084] In an example, the procedure of re-routing a UE from an initial AMF to
10 another or target AMF is performed based on network slicing, as discussed in 3GPP
technical specification.
[0085] According to another embodiment of the present disclosure, in a
wireless communication system having two or more dedicated isolated networks
15 e.g., a cellular IoT network and a mobility network, existing simultaneously within
a common public land mobile network (PLMN), one network may not have a user data of another network provisioned at its AUSF/UDM.
[0086] According to another embodiment of the present disclosure, when the
20 initial AMF receives the registration request of the UE and the initial AMF is not
the appropriate AMF to serve the UE, the AMF may receive an error from the AUSF during the authentication process. In an example, when the initial AMF receives the registration request of the UE and the initial AMF is not the appropriate AMF to serve the UE, the AMF may receive a 404 error message from the AUSF during the
25 authentication process. Upon receiving such an error, e.g., a 404 error message, the
AMF may initiate the re-routing procedure and may reject the registration request of the UE. In an example, the initial AMF may re-route the registration request message of the UE to a target AMF of the other dedicated isolated network existing simultaneously with a common PLMN and thus, the UE may be successfully
30 registered at the desired and appropriate AMF of the network existing within the
same or common PLMN. Expressed differently, the present disclosure allows the UE to be re-routed to an appropriate or target AMF of the desired network - existing within the common PLMN – thereby providing an efficient service in 5G communication environment.
35
25

5 [0087] In an exemplarily embodiment of the present disclosure, the wireless
communication system includes two dedicated isolated networks e.g., a cellular IoT
and a mobility network, existing simultaneously within a common a Public Land
Mobile Network (PLMN). That is, the two isolated networks are deployed with
dedicated Authentication Server Function (AUSF), Unified Data Management
10 (UDM), and the other network function entities.
[0088] According to the 3GPP technical specification, the process of re-routing
a registration request of a UE to another AMF is performed based on network
slicing. However, in a network deployment where the two isolated networks are
15 completely isolated from each other e.g., a cellular IoT network and a mobility
network, one network may not have a user data of another network provisioned at its dedicated AUSF/UDM.
[0089] Exemplarily, when the registration request of a cellular IoT user is
20 received at an AMF of the mobility network, the AMF may receive an error
message, e.g., a 404 error message from the AUSF during the authentication
process. Upon receiving such an error message, the AMF of the mobility network
may re-route the registration request of the cellular IoT user to the AMF of the
cellular IoT network. Thus, the registration request of the cellular IoT user is re-
25 routed to the AMF of the cellular IoT network and the UE is successfully registered
at the cellular IoT network.
[0090] According to another embodiment of the present disclosure, in case the
re-routed target AMF is also not an appropriate AMF to serve the UE, the target
30 AMF may reject the registration request of the UE thereby terminating the
registration procedure. This ensures that the UE is not indefinitely re-routed among the isolated networks.
[0091] Referring to Figure 2A, an exemplary method flow diagram indicating
35 a process [200] for re-routing registration request performed by an initial AMF with
26

5 two isolated networks in same PLMN in a 5G network environment is shown in
accordance with exemplary embodiments of the present disclosure is shown. In an implementation the method [200] is performed by one of the components of the system [100] for example, AMF.
10 [0092] In the 5G network environment, dedicated isolated networks e.g., a
cellular IoT network and a mobility network, exist simultaneously within a common a Public Land Mobile Network (PLMN). That is, the two or more isolated networks are deployed with dedicated Authentication Server Function (AUSF), Unified Data Management (UDM), and the other network function entities.
15
[0093] As shown in Figure 2, the method [200] starts at step [202].
[0094] At step [204], the method as disclosed by the present disclosure
comprises receiving by a transceiver unit [101], at a network node [106] via a radio
20 access network (RAN) [104], the registration request for establishment of a
connection between a user equipment (UE) [102] and a target network node [108]. The network node [106] is associated with a first access and mobility management function (AMF1) [106A] of a first type of network. The target network node [108] is associated with a second access and mobility management function (AMF2)
25 [106B] of a second type of network, wherein the first type of network and the
second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users.
[0095] According to the present disclosure, the first/initial AMF [106A] of
30 network, such as, cellular IoT network, receives an initial registration request
message from a UE [102]. The registration request message from the UE [102] is routed to the initial AMF [106A] through a RAN/gNB [104]. The registration request message from the UE [102] includes, but not limited to, a first information that includes different parameters associated with the registration request message. 35
27

5 [0096] Next, at step [206], the method [200] as disclosed by the present
disclosure comprises authenticating by an authenticator unit [103] at, the network
node [106], an identity of the UE [102] based on a communication with a first
authentication network node for the received registration request. The first
authentication network node is a first authentication server function (AUSF1)
10 [108A] of the first type of network.
[0097] The initial AMF [106A] receives the registration request of the UE
[102] and the initial AMF [106A] is not the appropriate or the target AMF to serve the UE [102], the AMF [106A] then receives an error from the first authentication
15 network node (AUSF1) [108A] during the authentication process. In an example,
when the initial AMF [106A] receives the registration request of the UE [102] and the initial AMF [106A] is not the appropriate AMF to serve the UE, the AMF [106A] may receive a 404 error message from the AUSF1 [108A] during the authentication process. The error message is a 404 error message to indicate to the
20 network node [106] that a user data is not provisioned in the first type of network.
[0098] Next, at step [208], the method [200] as disclosed by the present
disclosure comprises re-routing by a router unit [105], at the network node [106] via a RAN (104), the registration request to the target network node [108] based on
25 a failure of the authentication of the identity of the UE [102]. The failure of the
authentication corresponds to a reception of an error message from the first authentication network node (AUSF1) [108A] while authenticating the UE [102]. The error message is a 404 error message to indicate to the network node [106] that a user data is not provisioned in the first type of network. In response to receiving
30 such an error (e.g., a 404 error message) from the AUSF1 [108A], the initial AMF
[106A] may initiate a re-routing procedure to a target AMF [106B] of a different dedicated isolated network, such as, but not limited to, mobility network. In an example, the initial AMF [106A] may re-route the registration request message of the UE [102] to a target AMF [106B] through a RAN [104] of the other dedicated
35 isolated network existing simultaneously with a common Public Land Mobile
28

5 Network PLMN, as one network may not have a user data of another network
provisioned at its AUSF/UDM and thus, the UE [102] may be successfully registered at the desired and appropriate AMF [106B] of the network existing within the same or common PLMN.
10 [0099] In the implementation of the method, the method further comprises
authenticating, by the target network node [108] via the authenticator unit [103], the identity of the UE [102] based on a communication with a second Authentication Server Function (AUSF2) [108B] of the second type of network. The method then leads to establishing, by the target network node [108] via an
15 analyzer unit [109] (or may be referred herein as analysis unit), the connection
between the UE [102] and the target network node [108] based on a reception of a positive response from the second AUSF (AUSF2) [108B]. The method may also involves additional steps to improve its functionality. For instance, when a device seeks to connect to a network, a node within the network, known as the "target
20 network node [108]," verifies if the device is permitted to join. This verification is
conducted by interacting with another network component called the "second Authentication Server Function (AUSF2) [108B]." Utilizing a specialized component called the "Authenticator Unit [103]," the network ensures that the device's identity is genuine. Once the device's identity is authenticated, another step
25 is taken by the target network node [108], which employs the "analyser unit [109]"
to facilitate a seamless connection between the device and the network. These supplementary procedures enhance the system's ability to securely and efficiently accommodate device connections, ensuring a reliable and user-friendly network experience. Thereafter, the method terminates at step [210].
30
[0100] Referring to Figure 2B, an exemplary signalling flow diagram [300]
indicating a process performed by an initial access and mobility management function (AMF) in a 5G network environment, in accordance with exemplary embodiments of the present disclosure is shown. In an implementation the method
29

5 [300] is performed by at least one of the components of the system [100] for
example, AMF, AUSF, UE and gNB.
[0101] In the 5G network environment, dedicated isolated networks e.g., a
cellular IoT network and a mobility network, exist simultaneously within a common
10 a public land mobile network (PLMN).
[0102] As shown in Figure 2B, the method [300] starts at step [S1]
[0103] At step [S1], the method [300] as disclosed by the present disclosure
15 depicts that a registration request is sent to gNB/RAN [204] from UE [202].
[0104] At step [S2], the gNB/RAN [204] sends the registration request to first
AMF [206] i.e., AMF-1[206].
20 [0105] At step [S3], the AMF-1 [206] sends to AUSF-1 [210] a NAUSF-
AUTHENTICATION [NAS] to fetch authentication vectors from the AUSF-1 [210].
[0106] At step [S4], AUSF-1 [210] cannot locate user details or the
25 authentication vectors, it sends 404 user not found error to AMF-1 [206].
[0107] At step [S5], The AMF-1 [206] reroutes NAS with AMF set ID of AMF-
2 [208] to gNB/RAN [204]. The "AMF Set ID" uniquely identifies the AMF Set
within the AMF region. It serves as a reference or identifier for a specific group of
30 AMF instances within the network, allowing for efficient routing and management
of registration requests and authentication procedures.
[0108] At step [S6], the gNB/RAN [204] then sends to AMF-2 [208] the
registration request and set ID corresponding to the AMF-2 [208]. 35
30

5 [0109] At step [S7], thereafter, AMF-2 [208] sends to AUSF-2 [212] NAUSF-
AUTHENTICATION [NAS] to fetch authentication vectors from the AUSF-2 [212].
[0110] At last step [S8], the registration procedure is continued throughout and
if the AUSF-2 [212] also responds with 404 User Not Found, then the registration
10 is rejected.
[0111] It is pertinent to note that the AMF1 and AUSF1 belongs to the same
network node and AMF2 and AUSF2 belongs to same target network node.
15 [0112] Thereafter, the method [300] terminates at step [S8].
[0113] Fig. 3 illustrates an exemplary block diagram of a computing device
[600] upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an
20 implementation, the computing device [600] may also implement the method [200]
for re-routing registration request performed by an initial access and nobility management function (AMF) by utilising the system [600]. In another implementation, the computing device [600] itself implements the method [200] for re-routing registration request performed by an initial access and nobility
25 management function (AMF) using one or more units configured within the
computing device [600], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0114] The computing device [600] may include a bus [602] or other
30 communication mechanism for communicating information, and a hardware
processor [604] coupled with bus [602] for processing information. The hardware
processor [604] may be, for example, a general purpose microprocessor. The
computer system [600] may also include a main memory [606], such as a random
access memory (RAM), or other dynamic storage device, coupled to the bus [602]
35 for storing information and instructions to be executed by the processor [604]. The
31

5 main memory [606] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [604]. Such instructions, when stored in non-transitory storage media
accessible to the processor [604], render the computer system [600] into a special-
purpose machine that is customized to perform the operations specified in the
10 instructions. The computer system [600] further includes a read only memory
(ROM) [608] or other static storage device coupled to the bus [602] for storing static information and instructions for the processor [604].
[0115] A storage device [610], such as a magnetic disk, optical disk, or solid-
15 state drive is provided and coupled to the bus [602] for storing information and
instructions. The computer system [600] may be coupled via the bus [602] to a
display [612], such as a cathode ray tube (CRT), Liquid crystal Display (LCD),
Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
displaying information to a computer user. An input device [614], including
20 alphanumeric and other keys, touch screen input means, etc. may be coupled to the
bus [602] for communicating information and command selections to the processor
[604]. Another type of user input device may be a cursor control [616], such as a
mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [604], and for controlling
25 cursor movement on the display [612]. This input device typically has two degrees
of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0116] The computer system [600] may implement the techniques described
30 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computer system [600] causes
or programs the computer system [600] to be a special-purpose machine. According
to one implementation, the techniques herein are performed by the computer system
[600] in response to the processor [604] executing one or more sequences of one or
35 more instructions contained in the main memory [606]. Such instructions may be
32

5 read into the main memory [606] from another storage medium, such as the storage
device [610]. Execution of the sequences of instructions contained in the main
memory [606] causes the processor [604] to perform the process steps described
herein. In alternative implementations of the present disclosure, hard-wired
circuitry may be used in place of or in combination with software instructions.
10
[0117] The computer system [600] also may include a communication
interface [618] coupled to the bus [602]. The communication interface [618]
provides a two-way data communication coupling to a network link [620] that is
connected to a local network [622]. For example, the communication interface
15 [618] may be an integrated services digital network (ISDN) card, cable modem,
satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [618] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be
20 implemented. In any such implementation, the communication interface [618]
sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
[0118] The computer system [600] can send messages and receive data,
25 including program code, through the network(s), the network link [620] and the
communication interface [618]. In the Internet example, a server [630] might
transmit a requested code for an application program through the Internet [628], the
ISP [626], the local network [622] and the communication interface [618]. The
received code may be executed by the processor [604] as it is received, and/or stored
30 in the storage device [610], or other non-volatile storage for later execution.
[0119] Moreover, an aspect of the present disclosure relates to a non-transitory
computer-readable storage medium storing instructions for re-routing registration
requests within a telecommunication network. These instructions entail executable
35 code that, when executed by one or more units of the system the instructions
33

5 facilitates: receiving, by a transceiver unit at a network node via a radio access
network (RAN), the registration request for establishment of a connection between
a user equipment (UE), and a target network node; authenticating, by an
authenticator unit at the network node, an identity of the UE based on a
communication with a first authentication network node for the received
10 registration request; and re-routing, by a router unit at the network node via the
RAN, the registration request to the target network node based on a failure of the authentication of the identity of the UE.
[0120] As is evident from the above, the present disclosure provides a
15 technically advanced solution for re-routing the registration request of the UE to
the desired or target AMF thereby improving the efficiency of service in 5G
communication environment. Thus, the overall user experience in using the 5G
services is enhanced since the present solution does not terminate the registration
request of the UE and the UE does not have to again re-initiate registration request
20 to a different AMF of the dedicated network.
[0121] The technical advancement of the proposed solution is that it enables
seamless operation of 5G services in a 5G network environment. Still further, it
avoids unnecessary transmission of registration request to a different AMF thereby
25 saving the resources and battery consumption of the UE.
[0122] While considerable emphasis has been placed herein on the disclosed
embodiments, it will be appreciated that many embodiments can be made and that
many changes can be made to the embodiments without departing from the
30 principles of the present disclosure. These and other changes in the embodiments
of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
34

5 [0123] Further, in accordance with the present disclosure, it is to be
acknowledged that the functionality described for the various the components/units
can be implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
10 functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
35

We Claim:
1. A method to re-route a registration request, the method comprising:
receiving, by a transceiver unit [101] at a network node [106] via a radio access network (RAN) [104], the registration request for establishment of a connection between a user equipment (UE) [102], and a target network node [108];
authenticating, by an authenticator unit [103] at the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request; and
re-routing, by a router unit [105] at the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102].
2. The method as claimed in claim 1, wherein the network node [106] is associated with a first access and mobility management function (AMF1) [106A] of a first type of network.
3. The method as claimed in claim 1, wherein the target network node [108] is associated with a second access and mobility management function (AMF2) [106B] of a second type of network, wherein the first type of network and the second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users.
4. The method as claimed in claim 1, wherein the first authentication network node is a first authentication server function (AUSF1) [108A] of the first type of network.
5. The method as claimed in claim 4, wherein the failure of the authentication corresponds to a reception of an error message from the first authentication network node (AUSF1) [108A] while authenticating the UE [102].
6. The method as claimed in claim 5, wherein the error message is a 404 error message to indicate to the network node [106] that a user data is not provisioned in the first type of network.

7. The method as claimed in claim 3, further comprises:
authenticating, by the target network node [108] via the authenticator unit [103], the identity of the UE [102] based on a communication with a second authentication server function (AUSF2) [108B] of the second type of network; and
establishing, by the target network node [108] via an analyzer unit [109], the connection between the UE [102] and the target network node [108] based on a reception of a positive response from the second authentication server function (AUSF2) [108B].
8. A system for re-routing a registration request, the system comprises:
a storage unit [107];
a transceiver unit [101] coupled to the storage unit [107], wherein the transceiver unit [101] enables a network node [106] to receive, via a RAN [104], the registration request for establishment of a connection between a UE [102] and a target network node [108];
an authenticator unit [103] coupled to the transceiver unit [101], the authenticator unit [103] is configured to authenticate, at the network node [106], an identity of the UE [102] based on a communication with a first authentication network node for the received registration request; and
a re-routing unit [105] coupled to the authenticator unit [103], the re-routing unit [105] is configured to re-route, at the network node [106] via the RAN [104], the registration request to the target network node [108] based on a failure of the authentication of the identity of the UE [102].
9. The system as claimed in claim 8, wherein the network node [106] is associated with a first access and mobility management function (AMF1) [106A] of a first type of network.
10. The system as claimed in claim 8, wherein the target network node [108] is associated with a second access and mobility management function (AMF2) [106B] of a second type of network, wherein the first type of network and the second type of network are isolated networks and belong to a same public land mobile networks (PLMN) to provide different services to users.

11. The system as claimed in claim 8, wherein the first authentication network node is a first authentication server function (AUSF1) [108A] of the first type of network.
12. The system as claimed in claim 11, wherein the failure of the authentication corresponds to the reception of an error message from the first authentication network node (AUSF1) [108A] while authenticating the UE.
13. The system as claimed in claim 12, wherein the error message is a 404 error message to indicate to the network node [106] that a user data is not provisioned in the first type of network.
14. The system as claimed in claim 10, wherein:
the authenticator unit [103] is configured to authenticate, by the target network node [108], an identity of the UE [102] based on a communication with a second authentication server function (AUSF2) [108B] of the second type of network; and
an analyzer unit [109] connected to the authenticator unit [103] is configured to establish, by the target network node [108], the connection between the UE [102] and the target network node [108] based on a reception of a positive response from the second authentication server function (AUSF2) [108B].
15. A User Equipment (UE) device for re-routing a registration request, via a user interface
(UI), the User Equipment (UE) comprising:
a memory; and
a processor coupled to the memory, wherein the processor is configured to:
send a registration request to a network node [106], wherein the
registration request is used for establishing a connection between the User
Equipment (UE) [102], and a target network node [108], and wherein the
connection is established between the UE and the target network node based on:
authentication, at the network node [106], of an identity of the
UE [102] based on a communication with a first authentication network
node for the received registration request; and
re-routing, by the network node [106] via the RAN [104], the
registration request to the target network node [108] based on a failure
of the authentication of the identity of the UE [102].

Documents

Application Documents

# Name Date
1 202321044316-STATEMENT OF UNDERTAKING (FORM 3) [03-07-2023(online)].pdf 2023-07-03
2 202321044316-PROVISIONAL SPECIFICATION [03-07-2023(online)].pdf 2023-07-03
3 202321044316-FORM 1 [03-07-2023(online)].pdf 2023-07-03
4 202321044316-FIGURE OF ABSTRACT [03-07-2023(online)].pdf 2023-07-03
5 202321044316-DRAWINGS [03-07-2023(online)].pdf 2023-07-03
6 202321044316-FORM-26 [06-09-2023(online)].pdf 2023-09-06
7 202321044316-Proof of Right [03-10-2023(online)].pdf 2023-10-03
8 202321044316-ORIGINAL UR 6(1A) FORM 1 & 26)-261023.pdf 2023-11-04
9 202321044316-ENDORSEMENT BY INVENTORS [31-05-2024(online)].pdf 2024-05-31
10 202321044316-DRAWING [31-05-2024(online)].pdf 2024-05-31
11 202321044316-CORRESPONDENCE-OTHERS [31-05-2024(online)].pdf 2024-05-31
12 202321044316-COMPLETE SPECIFICATION [31-05-2024(online)].pdf 2024-05-31
13 Abstract1.jpg 2024-06-28
14 202321044316-FORM 3 [31-07-2024(online)].pdf 2024-07-31
15 202321044316-Request Letter-Correspondence [09-08-2024(online)].pdf 2024-08-09
16 202321044316-Power of Attorney [09-08-2024(online)].pdf 2024-08-09
17 202321044316-Form 1 (Submitted on date of filing) [09-08-2024(online)].pdf 2024-08-09
18 202321044316-Covering Letter [09-08-2024(online)].pdf 2024-08-09
19 202321044316-CERTIFIED COPIES TRANSMISSION TO IB [09-08-2024(online)].pdf 2024-08-09
20 202321044316-FORM 18 [29-01-2025(online)].pdf 2025-01-29