Abstract: The present disclosure relates to a method and a system for transmitting a user location information (ULI) during a handover. The disclosure encompasses initiating, by a handover initiating unit [202], a request for the handover of User Equipment (UE) [102] from a first network to a second network; executing, by a handover execution unit [204], the request to perform the handover of the UE [102] from the first network to the second network; and transmitting, by a processing unit [206] via a Session Management Function (SMF) [108], the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312] during the handover, wherein transmission of ULI to the at least one of the PCF [122] and the CHF [312] is performed due to failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG) [304]. [FIG. 4]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“SYSTEM AND METHOD FOR TRANSMITTING A USER LOCATION INFORMATION (ULI) DURING A HANDOVER”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
SYSTEM AND METHOD FOR TRANSMITTING A USER LOCATION INFORMATION (ULI) DURING A HANDOVER
FIELD OF INVENTION
[0001] The present disclosure relates generally to the field of wireless
communication systems. More particularly, the present disclosure relates to methods and systems for a Session Management Function (SMF) sending a user location information (ULI) towards a Policy Control Function (PCF) and a Charging Function (CHF) in a communication system.
BACKGROUND
[0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third-generation 3G technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth-generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth-generation (5G) technology is
being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] Synchronization is the most important and critical process in a telecommunication system to ensure high level of accuracy in an end-to-end communication. In 5G, latency requirements are very stringent (less than 5ms) which generates requirement for a very precise and highly reliable clock and synchronization system implementation. To meet the target latency requirements of the 5G system, telecommunication operators are required to implement a stable clock and timing system in their network. This is implemented while utilizing secondary synchronization cards in radios and primary synchronization card in the centralized unit (CU).
[0005] There are a few drawbacks for instance, in the current existing solutions, such as a collection and utilization of a user location information in the 5G networks raises privacy concerns. Location data i.e., the user location information can be sensitive and reveal details about an individual's movements and habits. There is a risk that unauthorized access to this information or its misuse could compromise the user privacy. Strict safeguards, robust security measures, and compliance with privacy regulations are necessary to protect user location data from unauthorized access and ensure privacy is maintained.
[0006] Further, in the current existing solutions, cyberattacks or breaches targeting the telecommunication systems handling this data could lead to unauthorized access, data tampering, or service disruptions. Safeguarding the integrity and confidentiality of the location information is vital to prevent security compromising incidents and maintain the user trust in the 5G network.
[0007] Furthermore, in the current existing solutions there are concerns related to accuracy and reliability of the user location information in 5G networks that may vary depending on several factors. For instance, environmental conditions, network coverage limitations, or technical issues can affect the precision of the location data. Inaccurate or unreliable location information could lead to a suboptimal decision-making by a Policy Control Function (PCF) or a Charging Function (CHF), resulting in incorrect policy enforcement or charging. Ensuring location information is accurate, up-to-date, and reliable is crucial for the effective operation of policy control and charging functions in the 5G networks.
[0008] To mitigate these drawbacks, network operators and service providers must prioritize privacy protection, implement robust security measures, and continually improve the accuracy and reliability of the user location information which the existing solutions fails to do.
[0009] In the current existing solutions, the network is unable to retrieve the user location information over S2b interface when a user moves to the 5G during a voice over Evolved Packet Core-integrated Wi-Fi (VoWiFi). Therefore, in light of the foregoing discussion, there exists a need to overcome the aforementioned drawbacks.
[0010] Thus, there exists an imperative need in the art to provide a system and method for transmitting by a Session Management Function (SMF) a user location information (ULI) during a handover from saved user context and pass it to at least a Policy Control Function (PCF).
OBJECTS OF THE INVENTION
[0011] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0012] It is an object of the present invention to provide a PCF that may apply any specific policy although user moved in non-3GPP access network.
[0013] It is another object of the present invention that Session Management Function (SMF) sends Fifth Generation (5G) user location information (ULI) towards Policy Control Function (PCF)/ Charging Function (CHF) in a communication system.
[0014] It is yet another object of the present invention that when user moves to non-3GPP access then PCF may not have 5G User location information (ULI). In order to apply policy on the basis of User location information (ULI), SMF sends the saved 5G ULI towards PCF although same not received from ePDG at S2b interface.
[0015] It is yet another object of the present invention that on the basis of received 5G ULI, PCF can apply desired policy in non-3GPP access network.
SUMMARY
[0016] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0017] According to an aspect of the present disclosure, a method for transmitting a user location information (ULI) during a handover is disclosed. The method includes initiating, by a handover initiating unit, a request for the handover of User Equipment (UE) from a first network to a second network. The method further comprises executing, by a handover execution unit, the request to perform the
handover of the UE from the first network to the second network. Thereafter, the method comprises transmitting, by a processing unit via a Session Management Function (SMF), the ULI of the UE to at least one of a Policy Control Function (PCF) and a Charging Function (CHF) during the handover, wherein transmission of ULI to the at least one of the PCF and the CHF is performed due to failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG).
[0018] In an exemplary aspect of the present disclosure, a policy formation unit of at least one of the PCF and the CHF is configured for policy-based decisions for the UE , based on the ULI.
[0019] In an exemplary aspect of the present disclosure, the ULI is retrieved by the SMF from a stored Protocol Data Unit (PDU) context of an IP Multimedia Subsystem (IMS).
[0020] In an exemplary aspect of the present disclosure, the request for the handover is received at the ePDG from the UE.
[0021] In an exemplary aspect of the present disclosure, transmitting, by the handover execution unit via the ePDG, the request for the handover to the SMF without adding the ULI; and receiving, by the handover execution unit via the ePDG, a response to the request from the SMF for the handover.
[0022] In an exemplary aspect of the present disclosure, sending, by the processing unit via the SMF, a release session request to an Access and Mobility Management Function (AMF) for the handover of the UE from the first network to the second network.
[0023] In an exemplary aspect of the present disclosure, the interface is S2b interface.
[0024] According to another aspect of the present disclosure, a system for
transmitting a user location information (ULI) during a handover is disclosed. The
system comprising a handover initiating unit, configured to initiate a request for the
5 handover of User Equipment (UE) from a first network to a second network. The
system further comprises a handover execution unit connected to at least the handover initiating unit, wherein the handover execution unit is configured to execute the request to perform the handover of the UE from the first network to the second network. The system further comprises a processing unit connected to at
10 least the handover execution unit, wherein the processing unit is configured to
transmit via a Session Management Function (SMF), the ULI of the UE to at least one of a Policy Control Function (PCF) and a Charging Function (CHF) during the handover, wherein transmission of ULI to the at least one of the PCF and the CHF is performed due to failure of reception of ULI at an interface from an Evolved
15 Packet Data Gateway (ePDG).
[0025] According to yet another aspect of the present disclosure, a non-transitory computer-readable storage medium storing instructions for transmitting a user location information (ULI) during a handover is disclosed. The instructions include
20 executable code which, when executed by one or more units of a system, may cause
the a handover initiating of the system to initiate a request for the handover of User Equipment (UE) from a first network to a second network; a handover execution unit to execute the request to perform the handover of the UE from the first network to the second network; and a processing unit to transmit via a Session Management
25 Function (SMF), the ULI of the UE to at least one of a Policy Control Function
(PCF) and a Charging Function (CHF) during the handover, wherein transmission of ULI to the at least one of the PCF and the CHF is performed due to failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG).
30 DESCRIPTION OF THE DRAWINGS
7
[0026] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference numerals refer to the same parts throughout the
5 different drawings. Components in the drawings are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Some drawings may indicate the components using block diagrams and
may not represent the internal circuitry of each component. It will be appreciated
by those skilled in the art that disclosure of such drawings includes disclosure of
10 electrical components, electronic components or circuitry commonly used to
implement such components.
[0027] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture, in accordance with exemplary
15 embodiment of the present disclosure.
[0028] FIG. 2 illustrates an exemplary block diagram of a system for transmitting a user location information (ULI) during a handover, in accordance with exemplary embodiments of the present disclosure. 20
[0029] FIG. 3 illustrates an exemplary sequence flow diagram for transmitting a user location information (ULI) during a handover, in accordance with exemplary embodiments of the present disclosure.
25 [0030] FIG. 4 illustrates an exemplary method flow diagram for transmitting a user
location information (ULI) during a handover, in accordance with exemplary embodiments of the present disclosure.
[0031] FIG. 5 illustrates an exemplary block diagram of a computing device upon
30 which an embodiment of the present disclosure may be implemented.
8
[0032] The foregoing shall be more apparent from the following more detailed description of the disclosure.
5 DETAILED DESCRIPTION
[0033] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that
10 embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be
15 fully addressed by any of the features described herein. Example embodiments of
the present disclosure are described below, as illustrated in various drawings in which like reference numerals refer to the same parts throughout the different drawings.
20 [0034] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and
25 arrangement of elements without departing from the spirit and scope of the
disclosure as set forth.
[0035] It should be noted that the terms "mobile device", "user equipment", "user
device", “communication device”, “device” and similar terms are used
30 interchangeably for the purpose of describing the invention. These terms are not
9
intended to limit the scope of the invention or imply any specific functionality or
limitations on the described embodiments. The use of these terms is solely for
convenience and clarity of description. The invention is not limited to any particular
type of device or equipment, and it should be understood that other equivalent terms
5 or variations thereof may be used interchangeably without departing from the scope
of the invention as defined herein.
[0036] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of
10 ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without
15 unnecessary detail in order to avoid obscuring the embodiments.
[0037] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
20 a sequential process, many of the operations can be performed in parallel or
concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
25 [0038] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or
30 designs, nor is it meant to preclude equivalent exemplary structures and techniques
10
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive in a manner similar
to the term “comprising” as an open transition word without precluding any
5 additional or other elements.
[0039] As used herein, an “electronic device”, or “portable electronic device”, or “user device” or “communication device” or “user equipment” or “device” refers to any electrical, electronic, electromechanical and computing device. The user
10 device is capable of receiving and/or transmitting one or parameters, performing
function/s, communicating with other user devices and transmitting data to the other user devices. The user equipment may have a processor, a display, a memory, a battery and an input-means such as a hard keypad and/or a soft keypad. The user equipment may be capable of operating on any radio access technology including
15 but not limited to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low
Energy, Near Field Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For instance, the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer,
20 mainframe computer, or any other device as may be obvious to a person skilled in
the art for implementation of the features of the present disclosure.
[0040] Further, the user device may also comprise a “processor” or “processing unit” includes processing unit, wherein processor refers to any logic circuitry for
25 processing instructions. The processor may be a general-purpose processor, a
special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
30 The processor may perform signal coding data processing, input/output processing,
11
and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor is a hardware processor.
[0041] As portable electronic devices and wireless technologies continue to
5 improve and grow in popularity, the advancing wireless technologies for data
transfer are also expected to evolve and replace the older generations of
technologies. In the field of wireless data communications, the dynamic
advancement of various generations of cellular technology are also seen. The
development, in this respect, has been incremental in the order of second generation
10 (2G), third generation (3G), fourth generation (4G), and now fifth generation (5G),
and more such generations are expected to continue in the forthcoming time.
[0042] Radio Access Technology (RAT) refers to the technology used by mobile devices/ user equipment (UE) to connect to a cellular network. It refers to the
15 specific protocol and standards that govern the way devices communicate with base
stations, which are responsible for providing the wireless connection. Further, each RAT has its own set of protocols and standards for communication, which define the frequency bands, modulation techniques, and other parameters used for transmitting and receiving data. Examples of RATs include GSM (Global System
20 for Mobile Communications), CDMA (Code Division Multiple Access), UMTS
(Universal Mobile Telecommunications System), LTE (Long-Term Evolution), and 5G. The choice of RAT depends on a variety of factors, including the network infrastructure, the available spectrum, and the mobile device's/device's capabilities. Mobile devices often support multiple RATs, allowing them to connect to different
25 types of networks and provide optimal performance based on the available network
resources.
[0043] As discussed in the background section, the current known solutions
implemented in a telecommunication network for determining a user location
30 information during a handover is unable to retrieve the user location information
12
over a S2b interface when a user moves to a fifth generation 5G during to a voice
over Evolved Packet Core-integrated Wi-Fi (VoWiFi). The present disclosure aims
to overcome the above-mentioned and other existing problems in this field of
technology for a Session Management Function (SMF) sending the user location
5 information (ULI) towards a Policy Control Function (PCF) and a Charging
Function (CHF).
[0044] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings.
10
[0045] As used herein, user location information (ULI) refers to a group of identities relating to the location of a mobile device within the network coverage area. The ULI may comprise a location area identifier (LAI), E-UTRAN Cell Global Identifier (ECGI), tracking area identity (TAI), routing area identity (RAI),
15 service area identifier (SAI) and a cell global identifier (CGI).
[0046] As used herein, Evolved Packet Data Gateway (ePDG) provides secure communication between the evolved packet core (EPC) and non-3GPP networks, such as Wi-Fi access networks.
20
[0047] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture, in accordance with exemplary embodiment of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network
25 (RAN) [104], an access and mobility management function (AMF) [106], a Session
Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a
30 Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122],
13
a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure. 5
[0048] The User Equipment (UE) [102] interfaces with the network via the Radio Access Network (RAN) [104]; the Access and Mobility Management Function (AMF) [106] manages connectivity and mobility, while the Session Management Function (SMF) [108] administers session control; the service communication
10 proxy (SCP) [110] routes and manages communication between network services,
enhancing efficiency and security, and the Authentication Server Function (AUSF) [112] handles user authentication; the NSSAAF [114] for integrating the 5G core network with existing 4G LTE networks i.e., to enable Non-Standalone (NSA) 5G deployments, the Network Slice Selection Function (NSSF) [116], Network
15 Exposure Function (NEF) [118], and Network Repository Function (NRF) [120]
enable network customization, secure interfacing with external applications, and maintain network function registries respectively; the Policy Control Function (PCF) [122] develops operational policies, and the Unified Data Management (UDM) [124] manages subscriber data; the Application Function (AF) [126]
20 enables application interaction, the User Plane Function (UPF) [128] processes and
forwards user data, and the Data Network (DN) [130] connects to external internet resources; collectively, these components are designed to enhance mobile broadband, ensure low-latency communication, and support massive machine-type communication, solidifying the 5GC as the infrastructure for next-generation
25 mobile networks.
[0049] Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects user equipment (UE) [102] to the core network (CN) and provides access to different types of networks (e.g., 5G network).
14
It consists of radio base stations and the radio access technologies that enable wireless communication.
[0050] Access and Mobility Management Function (AMF) [106] is a 5G core
5 network function responsible for managing access and mobility aspects, such as UE
registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0051] Session Management Function (SMF) [108] is a 5G core network function
10 responsible for managing session-related aspects, such as establishing, modifying,
and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
[0052] Service Communication Proxy (SCP) [110] is a network function in the
15 5G core network that facilitates communication between other network functions
by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
[0053] Authentication Server Function (AUSF) [112] is a network function in
20 the 5G core responsible for authenticating UEs during registration and providing
security services. It generates and verifies authentication vectors and tokens.
[0054] Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114] is a network function that provides authentication and
25 authorization services specific to network slices. It ensures that UEs can access only
the slices for which they are authorized.
[0055] Network Slice Selection Function (NSSF) [116] is a network function
responsible for selecting the appropriate network slice for a UE based on factors
30 such as subscription, requested services, and network policies.
15
[0056] Network Exposure Function (NEF) [118] is a network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications. 5
[0057] Network Repository Function (NRF) [120] is a network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
10 [0058] Policy Control Function (PCF) [122] is a network function responsible for
policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0059] Unified Data Management (UDM) [124] is a network function that
15 centralizes the management of subscriber data, including authentication,
authorization, and subscription information.
[0060] Application Function (AF) [126] is a network function that represents
external applications interfacing with the 5G core network to access network
20 capabilities and services.
[0061] User Plane Function (UPF) [128] is a network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement. 25
[0062] Data Network (DN) [130] refers to a network that provides data services to user equipment (UE) in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
16
[0063] Referring to FIG. 2, an exemplary block diagram of a system [200] for
transmitting a user location information (ULI) during a handover, in accordance
with exemplary embodiments of the present disclosure is shown. In an exemplary
aspect, the system [200] is implemented with the system [100]. The system [200]
5 comprises at least one handover initiating unit [202], at least one handover
execution unit [204], at least one processing unit [206], at least one policy formation unit [208] and at least one storage unit [210]. Also, all the components/ units of the system [200] are assumed to be connected to each other unless otherwise indicated below. Also, in FIG. 2 only a few units are shown, however, the system [200] may
10 comprise multiple such units or the system [200] may comprise any such numbers
of said units, as required to implement the features of the present disclosure. In another implementation, the system [200] may reside in a server or a network entity. In yet another implementation, the system [200] may reside partly in the server/ network entity.
15
[0064] Further, the handover initiating unit [202] is configured to initiate a request for the handover of User Equipment (UE) [102] from a first network to a second network. In an implementation of the present disclosure, the first network may be a fifth generation (5G) network, and the second network may be a non-Third
20 Generation Partnership Project (3GPP) network such as a Wireless Fidelity (Wi-
Fi), a Worldwide Inter-operability for Microwave Access (WiMAX) and a fixed network. However, it is to be noted that the first network is not limited to the firth generation (5G) network, and the second network is not limited to the non-Third Generation Partnership Project (3GPP) network, it may be implemented in any
25 manner to implement solution as disclosed by the present disclosure. In another
exemplary embodiment of the present invention, the first network is such as, but not limited to, higher or lower than 5G network, 3G, 4G, 6G network and the second network is such as, but not limited to, the non-3GPP network, Wi-Fi and the like. In an implementation, the handover initiation unit [202] initiates the request for the
17
handover in an event the request for the handover is received at an Evolved Packet Data Gateway (ePDG) (not shown in the figure) from the UE [102].
[0065] Further, the handover execution unit [204] of the system [200] is configured
5 to receive from the handover initiation unit [202] a request for handover of the UE
[102] from the first network to the second network. Then, the handover execution unit [204] is configured to execute the request to perform the handover of the UE [102] from the first network to the second network. For example, the handover execution unit [204] executes the request to perform the handover of the UE [102]
10 from the 5G network i.e., the first network to a non-3GPP network i.e., the second
network. In an exemplary aspect, the handover execution unit [204] is further configured to transmit via the ePDG [304], the request for the handover to the SMF [108] without adding the ULI. Further, the handover execution unit [204] based on the request transmitted via the ePDG [304] to the SMF [108] without adding the
15 ULI may be further configured to receive via the ePDG [304] a response to the
request from the SMF [108] for the handover. In an exemplary aspect, the response may be state of corresponding handover request, such as, a successful response, an unsuccessful response, an in-progress response, on a hold response and the like.
20 [0066] Further, the processing unit [206] of the system [200] as disclosed herein, is
configured to transmit via a Session Management Function (SMF) [108], the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312] during the handover, wherein transmission of ULI to the at least one of the PCF [122] and the CHF [312] is performed due to failure
25 of reception of ULI at an interface from the Evolved Packet Data Gateway (ePDG)
[304]. In an exemplary aspect, the interface is S2b interface.
[0067] The Session Management Function (SMF) [108] is responsible for establishing, maintaining, and terminating user sessions in the 5G core network.
18
The SMF manages user plane resources and interacts with the UPF to ensure that data packets are correctly routed and forwarded.
[0068] The Policy Control Function (PCF) [122] is a network function for policy
5 control decision and flows-based charging control functionalities. The PCF [122]
provides the following functions: policy rules for application and service data flow detection, gating, QoS, and flow-based charging to the SMF [108].
[0069] The charging function (CHF) provides online and offline charging. The
10 CHF enables operators to charge for different types of services and usages such as
Quality of Service (QoS), service availability, Service Level Agreements (SLAs), location based, data volume, throughput, and the like.
[0070] The Evolved Packet Data Gateway (ePDG) provides the interaction between
15 the Evolved packet core (EPC) and untrusted non-3GPP networks that require
secure access, such as a Wi-Fi access networks, and the like.
[0071] Further, the processing unit [206] is configured to transmit the User
Location Information (ULI) of a user associated with the 5G network during the
20 handover via the SMF [108] to at least one of the PCF [122] and the CHF from the
5G to the Wi-Fi access networks [also referred as Wi-Fi].
[0072] Further, the processing unit [206] is configured to recognize that the
handover from the 5G to the Wi-Fi is not received at the S2b interface from the
25 Evolved Packet Data Gateway (ePDG).
[0073] Furthermore, the processing unit [206] is configured to retrieve, by the SMF
[108] from a stored Protocol Data Unit (PDU) context of an IP Multimedia
Subsystem (IMS). Further, the policy formation unit [208] of the at least one of the
30 PCF [122] and the CHF [312] is configured to for policy-based decisions for the
19
UE [102] based on ULI. Next, the processing unit [206] is configured to transmit
the extracted 5G ULI towards at least one of the PCF and the CHF, thereby allowing
the PCF to make policy-based decisions based on the received 5G ULI, even when
the user has moved to the non-3GPP access network. The policy applied by the PCF
5 [122] based on the transmitted 5G ULI is related to the user’s location. Also, the
processing unit [206] is configured to send, via the SMF [108] a release session request to an Access and Mobility Management Function (AMF) [106] for the handover of the UE [102] from the first network (such as 5G) to the second network (such as non-3GPP network).
10
[0074] In an implementation, the handover initiation unit [202] is configured to initiate a handover request, when a user equipment (UE) [102] moves from a first network such as 5G network to the second network such as Wi-Fi network (non-3GPP network). Next, the handover execution unit [204] is connected to the
15 handover initiation unit [202], which is configured to execute the received request
from the handover initiation unit [202] to perform the handover of the UE [102] from the 5G network to the Wi-Fi network. The processing unit [206] of the system [200] is configured to transmit the 5G user location information (ULI) of the user via the SMF [108] towards at least one of the PCF [122] and the CHF during the
20 execution of 5G to the Wi-Fi handover. Next, the processing unit [206] is
configured to retrieve the ULI by the SMF [108] from a stored Protocol Data Unit (PDU) context of an IP Multimedia Subsystem (IMS).
[0075] The system [200] further comprises a storage unit [210]. The storage unit
25 [210] may store user location information (ULI), and information of connected
network. The storage unit [210] is further configured to store data associated with implementation of the features of the present invention.
[0076] Referring to FIG. 3, an exemplary sequence flow diagram [300] for
30 transmitting a user location information (ULI) during a handover, in accordance
20
with exemplary embodiments of the present disclosure is shown. The exemplary flow diagram [300] may implanted by system [100] and/or in conjunction with the system [200].
5 [0077] At step S1, a user equipment (UE) and/or a radio access network (RAN)
[102] initiates a handover request to an Evolved Packet Data Gateway (ePDG) [304].
[0078] Next, at step S2, the handover request, without any 5G ULI, may be received
10 by a Session Management Function (SMF) [108] from the ePDG [304]. As used
herein, handover request without any 5G ULI, refers to, a scenario when user moves
to non-3GPP access network, then network function such as, not limited to, PCF
[122] of the system [200] may not have 5G user location information (ULI). This
is because, there is no direct interface connectivity between the PCF [122] and the
15 radio network, and therefore ULI information is communicated to the PCF [122]
via the SMF [108] only. The PCF [122] overwrites an existing location information with the one which is received from the SMF [108].
[0079] Next, at step S3, a response may be received from the SMF [108] at the
20 ePDG [304] corresponding to the handover request.
[0080] Further, at step S4, a release session may be initiated from the SMF [108] to an Access and Mobility Management Function (AMF) [106].
25 [0081] Furthermore, at step S5, a nPCF/ update (the 5G ULI) may be initiated from
the SMF [108] to a Policy Control Function (PCF) [122]. As used herein, ‘nPCF’ may represent service of the network function, such as PCF [122]. The update request from the SMF [108] may comprise, for example, npcf-smpolicycontrol towards the PCF [122]. This is used to communicate with the PCF [122]. Through
30 this, user authentication and required policy is installed by the PCF [122]. Further,
21
in response to this, the PCF [122] may send a response comprising npcf-smpolicycontrol towards the SMF [108].
[0082] Thereafter at step S6, a nCHF/ update (the 5G ULI) sends from the SMF
5 [108] to the Charging Function (CHF) [312]. As used herein, ‘nCHF’ may represent
service of network function, such as CHF [312]. The update request from the SMF
[108] may comprise, for example, nchf-smchargingcontrol towards the CHF [312].
This is used to communicate with CHF [312]. Through this, user authentication and
usages monitoring can be done for the user. Further, in response to this, the CHF
10 [312] may send a response comprising nchf-smpolicycontrol towards the SMF
[108].
[0083] FIG. 4 illustrates an exemplary method [400] flow diagram for transmitting
a user location information (ULI) during a handover, in accordance with exemplary
15 embodiments of the present disclosure. In an exemplary aspect, the method [400]
may be performed by the system [100] and/or the system [200] and/or the system [300]. The method [400] begins at step [402] and proceeds to step [404].
[0084] At step [404], the method [400] as disclosed by the present disclosure
20 comprises initiating, by a handover initiating unit [202], a request for the handover
of User Equipment (UE) [102] from a first network to a second network. The
method [400] as disclosed by the present disclosure may comprises the handover
initiating unit [202], that is configured to initiate the request for the handover of UE
[102] from the first network to the second network in an event the UE moves from
25 first network to the second network. In an implementation of the present disclosure,
the first network may be a firth generation (5G) network, and the second network
may be a non-Third Generation Partnership Project (3GPP) network such as a
Wireless Fidelity (Wi-Fi), a Worldwide Inter-operability for Microwave Access
(WiMAX), and a fixed network. However, it is to be noted that the first network
30 not limited to the firth generation (5G) network, and the second network is not
22
limited to the non-Third Generation Partnership Project (3GPP) network, it may be
implemented in any manner to implement solution as disclosed by the present
disclosure. In another exemplary aspect, the first network is such as, but not limited
to, higher or lower than 5G network, 4G, 6G and the second network is such as, but
5 not limited to, non-3GPP network or Wi-Fi network.
[0085] Next, at step [406], the method [400] as disclosed by the present disclosure comprises executing, by a handover execution unit [204], the request to perform the handover of the UE [102] from the first network to the second network. The method
10 [400] as disclosed herein may further comprises the handover execution unit [204],
which is configured to receive from the handover initiation unit [202] the request for handover of UE [102] from the first network to the second network. Further, the handover execution unit [204] is configured to execute the request to perform the handover of the UE [102] from the first network, such as 5G, to the second network,
15 i.e., the non-3GPP network such as the Wi-Fi network. In an implementation, the
method [400] further comprises transmitting, by the handover execution unit [204] via the ePDG [304], the request for the handover to the SMF [108] without adding the ULI. Further, in an event the request for the handover to the SMF [108] without adding the ULI is transmitted by the handover execution unit [204] via the ePDG
20 [304], the method [400] comprises receiving, by the handover execution unit [204]
via the ePDG [304], a response to the request from the SMF [108] for the handover. In an exemplary aspect, the response may be state of corresponding the handover request, such as, a successful response, an unsuccessful response, an in-progress response, an on-hold response and the like.
25
[0086] Next, at step [408], the method [400] as disclosed by the present disclosure comprises transmitting, by a processing unit [206] via a Session Management Function (SMF) [108], the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312] during the handover,
30 wherein transmission of ULI to the at least one of the PCF [122] and the CHF [312]
23
is performed due to failure of reception of ULI at an interface from an Evolved
Packet Data Gateway (ePDG) [304]. In an implementation, the handover initiation
unit [202] initiates the request for the handover when the request for the handover
is received at the Evolved Packet Data Gateway (ePDG) [304] from the UE [102].
5 The method [400] may comprises the processing unit [206] to transmit via the SMF
[108], the ULI of the UE [102] to at least one of the PCF [122] and/or the CHF
[312] during the handover. The processing unit [206] performs transmission of the
ULI to the at least one of the PCF [122] and the CHF [312] due to failure of
reception of the ULI at the interface from the Evolved Packet Data Gateway (ePDG)
10 [304]. In an exemplary aspect, the interface is S2b interface.
[0087] Further, as disclosed by the method [400] the processing unit [206] may
transmit the 5G User Location Information (ULI) of the UE [102] during the first
network (5G) to the second network (Wi-Fi) handover via the SMF [108] to at least
15 one of the PCF [122] and the CHF [312] in order to apply policy on the basis of the
user location information (ULI). Further, the processing unit [206] may recognize that the 5G to the Wi-Fi i.e., the non-3GPP handover is not received at the S2b interface from the Evolved Packet Data Gateway (ePDG) [304].
20 [0088] Furthermore, the method [400] comprises the ULI is retrieved by the SMF
[108] from a stored Protocol Data Unit (PDU) context of an IP Multimedia Subsystem (IMS). The PDU session establishment is the process of establishing a data path between the UE [102] and the 5G network i.e., the 5G core network. A PDU session is a logical connection between the UE [102] and a data network, such
25 as an internet or a private network. Next, as disclosed herein, the processing unit
[206] may transmit the extracted 5G ULI towards at least one of the PCF [122] and the CHF [312], thereby allowing the PCF [122] to make the policy-based decisions based on the received 5G ULI, even when the user has moved to the non-3GPP access network or the Wi-Fi network. The policy applied by the PCF [122] based
30 on the transmitted 5G ULI is related to the user’s location i.e., the location of the
24
UE [102]. Further, the method [400] implemented may further comprise a policy
formation unit [208] of the at least one of the PCF [122] and the CHF [312],
configured for policy-based decisions for the UE [102] based on the ULI. Also, the
method [400] may comprise sending, by the processing unit [206] via the SMF
5 [108], a release session request to an Access and Mobility Management Function
(AMF) [106] for the handover of the UE [102] from the first network (such as 5G) to the second network (such as non-3GPP network, Wi-Fi network).
[0089] In an implementation, the processing unit [206] recognizes that the
10 handover from 5G to the Wi-Fi i.e., the non-3GPP handover is not received at the
S2b interface from the Evolved Packet Data Gateway (ePDG) [304]. The S2b interface may be located between the Packet Network Data Gateway (PGW) (not shown) and the ePDG [304]. It uses the PMIPv6 protocol to establish WLAN sessions between the UE and the PGW. 15
[0090] Thereafter, the method [400] terminates at step [410].
[0091] In an example, the system [200] implemented with a 5G network comprises a user equipment (UE) [102] associated with a user that initiates a handover request.
20 a Session Management Function (SMF) [108] acquires the user location
information using the user device and sends to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312]. Based on the acquired ULI, the handover is initiated from the 5G network to a non-3GPP network such as Wi-Fi network. Now, the PCF [122] makes a policy-based decisions based on the
25 received 5G ULI, even when the user has moved to the non-Third Generation
Partnership Project (3GPP) access. A PDU session is a logical connection between the UE and a data network, such as an internet or a private network that is associated with the ULI. The SMF [108] may send the user location from saved user context derived from the Protocol Data Unit (PDU) session and pass it to the PCF [122].
30 Here, the policy applied by the PCF [122] is based on the transmitted 5G ULI that
25
is related to the user’s location. A success or failure response is generated depending on the handover from 5G to Wi-Fi.
[0092] Referring to FIG. 5, which illustrates an exemplary block diagram of a
5 computing device [500] (also referred herein as a computer system [500]) upon
which an embodiment of the present disclosure may be implemented. In an
implementation, the computing device [500] implements the method for providing
transmitting a user location information (ULI) during a handover using the system
[100], and/or the system [200], and/or the system [300]. In another implementation,
10 the computing device [500] itself implements the method for providing the user
location information (ULI) during the handover using one or more units configured within the computing device [500], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
15 [0093] The computing device [500] may include a bus [502] or other
communication mechanism for communicating information, and a hardware
processor [504] coupled with bus [502] for processing information. The hardware
processor [504] may be, for example, a general-purpose microprocessor. The
computing device [500] may also include a main memory [506], such as a random-
20 access memory (RAM), or other dynamic storage device, coupled to the bus [502]
for storing information and instructions to be executed by the processor [504]. The
main memory [506] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [504]. Such instructions, when stored in non-transitory storage media
25 accessible to the processor [504], render the computing device [500] into a special-
purpose machine that is customized to perform the operations specified in the
instructions. The computing device [500] further includes a read only memory
(ROM) [508] or other static storage device coupled to the bus [502] for storing static
information and instructions for the processor [504].
30
26
[0094] A storage device [510], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [502] for storing information and
instructions. The computing device [500] may be coupled via the bus [502] to a
display [512], such as a cathode ray tube (CRT), for displaying information to a
5 computer user. An input device [514], including alphanumeric and other keys, may
be coupled to the bus [502] for communicating information and command
selections to the processor [504]. Another type of user input device may be a cursor
controller [516], such as a mouse, a trackball, or cursor direction keys, for
communicating direction information and command selections to the processor
10 [504], and for controlling cursor movement on the display [512]. This input device
typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0095] The computing device [500] may implement the techniques described
15 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [500] causes
or programs the computing device [500] to be a special-purpose machine.
According to one embodiment, the techniques herein are performed by the
computing device [500] in response to the processor [504] executing one or more
20 sequences of one or more instructions contained in the main memory [506]. Such
instructions may be read into the main memory [506] from another storage medium,
such as the storage device [510]. Execution of the sequences of instructions
contained in the main memory [506] causes the processor [504] to perform the
process steps described herein. In alternative embodiments, hard-wired circuitry
25 may be used in place of or in combination with software instructions.
[0096] The computing device [500] also may include a communication interface
[518] coupled to the bus [502]. The communication interface [518] provides a two-
way data communication coupling to a network link [520] that is connected to a
30 local network [522]. For example, the communication interface [518] may be an
27
integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [518] may be a
local area network (LAN) card to provide a data communication connection to a
5 compatible LAN. Wireless links may also be implemented. In any such
implementation, the communication interface [518] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
10 [0097] The computing device [500] can send messages and receive data, including
program code, through the network(s), the network link [520] and the communication interface [518]. In the Internet example, a server [530] might transmit a requested code for an application program through the Internet [528], the ISP [526], the local network [522], host [524] and the communication interface
15 [518]. The received code may be executed by the processor [504] as it is received,
and/or stored in the storage device [510], or other non-volatile storage for later execution.
[0098] According to yet another aspect of the present disclosure, a non-transitory
20 computer-readable storage medium storing instructions for transmitting a user
location information (ULI) during a handover is disclosed. The instructions include
executable code which, when executed by one or more unit of a system may cause
a handover initiating unit [202] of the system to initiate a request for the handover
of User Equipment (UE) [102] from a first network to a second network; a handover
25 execution unit [204] of the system execute the request to perform the handover of
the UE [102] from the first network to the second network; and a processing unit
[206] of the system to transmit via a Session Management Function (SMF) [108],
the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122]
and a Charging Function (CHF) [312] during the handover, wherein transmission
30 of ULI to the at least one of the PCF [122] and the CHF [312] is performed due to
28
failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG) [304].
[0099] Further, in accordance with the present disclosure, it is to be acknowledged
5 that the functionality described for the various the components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
10 as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
15 [0100] As is evident from the above, the present disclosure provides a significant
technical advancement in the field of telecommunications, specifically addressing the provision of a Policy Control Function (PCF) in scenarios where users transition to a non-3GPP access. This solution allows for the application of specific policies even in such environments, overcoming previous limitations. Notably, when users
20 move to the non-3GPP access, the PCF may lack essential 5G User Location
Information (ULI). To rectify this, a Session Management Function (SMF) retrieves and forwards the saved 5G ULI to the PCF, even when it's not initially received from an Evolved Packet Data Gateway (ePDG) at a S2b interface. Consequently, with the receipt of the received 5G ULI, the PCF can effectively implement desired
25 policies in the non-3GPP access scenarios, showcasing the technical prowess of this
solution in enhancing policy control mechanisms within evolving network architectures.
[0101] While considerable emphasis has been placed herein on the
30 disclosed embodiments, it will be appreciated that many embodiments can be made
29
and that many changes can be made to the embodiments without departing from the
principles of the present disclosure. These and other changes in the embodiments
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
5 and non-limiting.
30
I/We Claim:
1. A method [400] for transmitting a user location information (ULI) during a
handover, the method [400] comprising:
initiating, by a handover initiating unit [202], a request for the handover of User Equipment (UE) [102] from a first network to a second network;
executing, by a handover execution unit [204], the request to perform the handover of the UE [102] from the first network to the second network; and
transmitting, by a processing unit [206] via a Session Management Function (SMF) [108], the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312] during the handover, wherein transmission of ULI to the at least one of the PCF [122] and the CHF [312] is performed due to failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG) [304].
2. The method [400] as claimed in claim 1, further comprising, a policy formation unit [208] of at least one of the PCF [122] and the CHF [312] for policy-based decisions for the UE [102] , , based on the ULI.
3. The method [400] as claimed in claim 1, wherein the ULI is retrieved by the SMF [108] from a stored Protocol Data Unit (PDU) context of an IP Multimedia Subsystem (IMS).
4. The method [400] as claimed in claim 1, wherein the request for the handover is received at the ePDG [304] from the UE [102].
5. The method [400] as claimed in claim 4, further comprising:
transmitting, by the handover execution unit [204] via the ePDG [304], the request for the handover to the SMF [108] without adding the ULI; and
receiving, by the handover execution unit [204] via the ePDG [304], a response to the request from the SMF [108] for the handover.
6. The method [400] as claimed in claim 5, wherein the method comprises sending, by the processing unit [206] via the SMF [108], a release session request to an Access and Mobility Management Function (AMF) [106] for the handover of the UE [102] from the first network to the second network.
7. The method [400] as claimed in claim 1, wherein the interface is S2b interface.
8. A system [200] for transmitting a user location information (ULI) during a handover, the system [200] comprising:
a handover initiating unit [202], configured to initiate a request for the handover of User Equipment (UE) [102] from a first network to a second network;
a handover execution unit [204] connected to at least the handover initiating unit [202], wherein the handover execution unit [204] is configured to execute the request to perform the handover of the UE [102] from the first network to the second network; and
a processing unit [206] connected to at least the handover execution unit [204], wherein the processing unit [206] is configured to transmit via a Session Management Function (SMF) [108], the ULI of the UE [102] to at least one of a Policy Control Function (PCF) [122] and a Charging Function (CHF) [312] during the handover, wherein transmission of ULI to the at least one of the PCF [122] and the CHF [312] is performed due to failure of reception of ULI at an interface from an Evolved Packet Data Gateway (ePDG) [304].
9. The system [200] as claimed in claim 8, wherein a policy formation unit [208] of at least one of the PCF [122] and the CHF [312] is configured for policy-based decisions for the UE [102] based on the ULI.
10. The system [200] as claimed in claim 8, wherein the ULI is retrieved by the SMF [108] from a stored Protocol Data Unit (PDU) context of an IP Multimedia Subsystem (IMS).
11. The system [200] as claimed in claim 8, wherein the request for the handover is received at the ePDG [304] from the UE [102].
12. The system [200] as claimed in claim 11, wherein the handover execution unit [204] is further configured to:
transmit via the ePDG [304], the request for the handover to the SMF [108] without adding the ULI.
receive, via the ePDG [304], a response to the request from the SMF [108] for the handover.
13. The system [200] as claimed in claim 12, wherein the processing unit [206] is configured to send, via the SMF [108] a release session request to an Access and Mobility Management Function (AMF) [106] for the handover of the UE [102] from the first network to the second network.
14. The system [200] as claimed in claim 8, wherein the interface is S2b interface.
| # | Name | Date |
|---|---|---|
| 1 | 202321046851-STATEMENT OF UNDERTAKING (FORM 3) [12-07-2023(online)].pdf | 2023-07-12 |
| 2 | 202321046851-PROVISIONAL SPECIFICATION [12-07-2023(online)].pdf | 2023-07-12 |
| 3 | 202321046851-FORM 1 [12-07-2023(online)].pdf | 2023-07-12 |
| 4 | 202321046851-FIGURE OF ABSTRACT [12-07-2023(online)].pdf | 2023-07-12 |
| 5 | 202321046851-DRAWINGS [12-07-2023(online)].pdf | 2023-07-12 |
| 6 | 202321046851-FORM-26 [18-09-2023(online)].pdf | 2023-09-18 |
| 7 | 202321046851-Proof of Right [03-10-2023(online)].pdf | 2023-10-03 |
| 8 | 202321046851-ORIGINAL UR 6(1A) FORM 1 & 26)-261023.pdf | 2023-11-04 |
| 9 | 202321046851-ENDORSEMENT BY INVENTORS [07-07-2024(online)].pdf | 2024-07-07 |
| 10 | 202321046851-DRAWING [07-07-2024(online)].pdf | 2024-07-07 |
| 11 | 202321046851-CORRESPONDENCE-OTHERS [07-07-2024(online)].pdf | 2024-07-07 |
| 12 | 202321046851-COMPLETE SPECIFICATION [07-07-2024(online)].pdf | 2024-07-07 |
| 13 | 202321046851-FORM 3 [02-08-2024(online)].pdf | 2024-08-02 |
| 14 | Abstract-1.jpg | 2024-08-09 |
| 15 | 202321046851-Request Letter-Correspondence [14-08-2024(online)].pdf | 2024-08-14 |
| 16 | 202321046851-Power of Attorney [14-08-2024(online)].pdf | 2024-08-14 |
| 17 | 202321046851-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf | 2024-08-14 |
| 18 | 202321046851-Covering Letter [14-08-2024(online)].pdf | 2024-08-14 |
| 19 | 202321046851-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf | 2024-08-14 |
| 20 | 202321046851-FORM 18A [11-03-2025(online)].pdf | 2025-03-11 |
| 21 | 202321046851-FER.pdf | 2025-03-28 |
| 22 | 202321046851-FORM 3 [27-05-2025(online)].pdf | 2025-05-27 |
| 23 | 202321046851-FER_SER_REPLY [03-06-2025(online)].pdf | 2025-06-03 |
| 24 | 202321046851-US(14)-HearingNotice-(HearingDate-08-12-2025).pdf | 2025-11-10 |
| 1 | 202321046851_SearchStrategyNew_E_SearchHistory-6851E_27-03-2025.pdf |