Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR ACCESS OR RAT RESTRICTION
Document Type and Number:
WIPO Patent Application WO/2021/058697
Kind Code:
A1
Abstract:
Embodiments of the present disclosure provide method and apparatus for access or RAT restriction. A method at a first access management entity of a network comprises determining that a user equipment (UE) is using LTE-M radio access technology (RAT). The method further comprises obtaining access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted. The method further comprises determining whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

Inventors:
ZHU JINYIN (CN)
LI XIAOMING (CN)
DE-GREGORIO-RODRIGUEZ JESUS-ANGEL (ES)
Application Number:
PCT/EP2020/076816
Publication Date:
April 01, 2021
Filing Date:
September 24, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
International Classes:
H04W8/16; H04W60/00; H04W8/04; H04W8/22; H04W92/24
Foreign References:
US20180103426A12018-04-12
Other References:
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 16)", vol. SA WG2, no. V16.4.0, 24 September 2019 (2019-09-24), pages 1 - 424, XP051784666, Retrieved from the Internet [retrieved on 20190924]
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Procedures for the 5G System; Stage 2 (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 23.502, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. V16.1.1, 11 June 2019 (2019-06-11), pages 1 - 495, XP051753974
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System Architecture for the 5G System (5GS); Stage 2 (Release 16)", vol. SA WG2, no. V16.2.0, 24 September 2019 (2019-09-24), pages 1 - 391, XP051784669, Retrieved from the Internet [retrieved on 20190924]
CT4: "Reply LS on Differentiation of LTE-M (eMTC) traffic from other LTE data traffic", vol. RAN WG3, no. Busan, South Korea; 20180521 - 20180525, 20 May 2018 (2018-05-20), XP051445054, Retrieved from the Internet [retrieved on 20180520]
QUALCOMM INCORPORATED: "LTE-M identification in 5GC", vol. SA WG2, no. Reno, NV, USA; 20190513 - 20190517, 7 May 2019 (2019-05-07), XP051735495, Retrieved from the Internet [retrieved on 20190507]
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Procedures for the 5G System (5GS); Stage 2 (Release 16)", vol. SA WG2, no. V16.5.1, 6 August 2020 (2020-08-06), pages 1 - 594, XP051925869, Retrieved from the Internet [retrieved on 20200806]
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System architecture for the 5G System (5GS); Stage 2 (Release 16)", 21 September 2020 (2020-09-21), XP051935302, Retrieved from the Internet [retrieved on 20200921]
Attorney, Agent or Firm:
HASELTINE LAKE KEMPNER LLP (GB)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1. A method (300’) at a first access management entity of a network, comprising: determining (302’) that a user equipment (UE) is using LTE-M radio access technology

(RAT) ; obtaining (304’) access restriction or RAT restriction data associated with the EE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted; and determining (306’) whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

2. The method according to claim 1, wherein when the LTE-M RAT type is indicated as restriction, the UE using LTE-M is not allowed to attach or register to the network.

3. The method according to claim 1 or 2, wherein when the UE is not allowed to attach or register to the network, the method further comprises: sending (408) a deregistration request or a detach request to the UE when UE has registered or attached to the network; or sending (508) a registration reject or an attach reject or a tracking area update (TAU) reject to the UE during a registration procedure or an attach procedure or a TAU procedure.

4. The method according to any of claims 1-3, wherein the access restriction or RAT restriction data is obtained from at least one of a subscription data entity of the network; a second access management entity of the network; or a second access management entity of another network.

5. The method according to any of claims 1-4, wherein the first access management entity is a mobility management entity (MME), the method further comprising: receiving (602) an attach request or a tracking area update (TAU) request from a UE; sending (604) an update location request to a home subscriber server (HSS); and receiving (606) an update location answer from the HSS, wherein the update location answer includes the access restriction or RAT restriction data associated with the UE.

6. The method according to claim 5, wherein the update location request includes information indicating that the MME supports restriction related to the LTE-M RAT type and the update location answer includes information indicating that the HSS supports restriction related to the LTE-M RAT type.

7. The method according to any of claims 1-4, wherein the first access management entity is a mobility management entity (MME), the method further comprising: receiving (704) an insert subscriber data request from a home subscriber server (HSS); and sending (706) an insert subscriber data answer to the HSS, wherein the insert subscriber data request includes the access restriction or RAT restriction data associated with the UE.

8. The method according to claim 7, wherein the insert subscriber data request includes information indicating that the HSS supports restriction related to the LTE-M RAT type and the insert subscriber data answer includes information indicating that the MME supports restriction related to the LTE-M RAT type.

9. The method according to any of claims 1-4, wherein the first access management entity is an access and mobility function (AMF), the method further comprising: receiving (802) a registration request from the UE; sending (808a) a Nudm SDM get request to a unified data management (UDM); and receiving (808b) a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE from the UDM.

10. The method according to any of claims 1-4, wherein the first access management entity is an access and mobility function (AMF), the method further comprising: receiving (904) an Nudm SDM Notification including the access restriction or RAT restriction data associated with the UE from a unified data management (UDM).

11. The method according to any of claims 1-4, wherein the first access management entity is a new mobility management entity (MME), the method further comprising: receiving (1002) a tracking area update (TAU) request from the UE; sending (1004) a context request for getting the UE’ context to an old MME or an old access and mobility function (AMF); and receiving (1006) a context response including the access restriction or RAT restriction data associated with the UE from the old MME or the old AMF.

12. The method according to any of claims 1-4, wherein the first access management entity is a new access and mobility function (AMF), the method further comprising: receiving (1102) a registration request from the UE; sending (1104) an Namf Communication UEContextTransfer request for getting the UE’ context to an old AMF; and receiving (1106) an Namf Communication UEContextTransfer response including the access restriction or RAT restriction data associated with the UE from the old AMF.

13. The method according to any of claims 1-4, wherein the first access management entity is a new access and mobility function (AMF), the method further comprising: receiving (1202) a registration request from the UE; sending (1204) a context request for getting the UE’ context to an old MME; receiving (1206) a context response including the access restriction or RAT restriction data associated with the UE from the old MME.

14. The method according to any of claims 1-13, wherein the access restriction or RAT restriction data further indicates that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

15. The method according to claim 13, wherein the access restriction or RAT restriction data indicating that LTE-M RAT type is restricted is a bit and the access restriction or RAT restriction data indicating that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted is a bit.

16. A method (1300’) at a subscription data entity, comprising: obtaining (1302’) access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE), wherein the access restriction or RAT restriction data indicates that LTE-M is restricted for the UE; and sending (1304’) the access restriction or RAT restriction data associated with the UE to a first access management entity of a network.

17. The method according to claim 16, wherein when the LTE-M RAT type is indicated as restriction, the UE using LTE-M is not allowed to attach or register to the network.

18. The method according to any of claims 16-17, wherein the first access management entity is a mobility management entity (MME) and the subscription data entity is a home subscriber server (HSS), the method further comprising: receiving (604) an update location request from the MME; and sending (606) an update location answer including the access restriction or RAT restriction data associated with the UE to the MME.

19. The method according to claim 18, wherein the update location request includes information indicating that the MME supports restriction related to the LTE-M RAT type and the update location answer includes information indicating that the HSS supports restriction related to the LTE-M RAT type.

20. The method according to any of claims 16-17, wherein the first access management entity is a mobility management entity (MME) and the subscription data entity is a home subscriber server (HSS), the method further comprising: determining (702) a change of the restriction related to the LTE-M RAT type; and sending (704) an insert subscriber data request including the access restriction or RAT restriction data associated with the UE to the MME.

21. The method according to claim 20, wherein the insert subscriber data request includes information indicating that the HSS supports restriction related to the LTE-M RAT type and the insert subscriber data answer includes information indicating that the MME supports restriction related to the LTE-M RAT type.

22. The method according to any of claims 16-17, wherein the first access management entity is an access and mobility function (AMF) and the subscription data entity is a unified data management (UDM), the method further comprising: receiving (808a) a Nudm_SDM_get request from AMF; and sending (808b) a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE to the AMF.

23. The method according to any of claims 16-17, wherein the first access management entity is an access and mobility function (AMF) and the subscription data entity is a unified data management (UDM), the method further comprising: determining (902) a change of the restriction related to the LTE-M RAT type; and sending (904) an Nudm SDM Notifi cation including the access restriction or RAT restriction data associated with the UE to the AMF.

24. The method according to any of claims 16-23, wherein the access restriction or RAT restriction data further indicates that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

25. The method according to claim 24, wherein the access restriction or RAT restriction data indicating that LTE-M RAT type is restricted is a bit and the access restriction or RAT restriction data indicating that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted is a bit.

26. A method (1400’) at a second access management entity, comprising: receiving (1402’) a request for getting a context of a user equipment (UE) from a first access management entity of a network; and sending (1404’) a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

27. The method according to claim 26, wherein when the LTE-M RAT type is indicated as restriction, the UE using LTE-M is not allowed to attach or register to the network.

28. The method according to any of claims 26-27, wherein the first access management entity is a new mobility management entity (MME) and the second access management entity is an old MME or an old access and mobility function (AMF), the request is a context request and the response is a context response.

29. The method according to any of claims 26-27, wherein the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old access and mobility function (AMF), the request is an Namf Communication UEContextTransfer request and the response is an Namf Communication UEContextTransfer response.

30. The method according to any of claims 26-27, wherein the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old mobility management entity (MME), the request is a context request and the response is a context response.

31. The method according to any of claims 26-30, wherein the access restriction or RAT restriction data further indicates that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

32. The method according to claim 31, wherein the access restriction or RAT restriction data indicating that LTE-M RAT type is restricted is a bit and the access restriction or RAT restriction data indicating that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted is a bit.

33. An apparatus (1500) at a first access management entity of a network, comprising: a processor (1521); and a memory (1522) coupled to the processor (1521), said memory (1522) containing instructions executable by said processor (1521), whereby said apparatus (1500) is operative to: determine that a user equipment (UE) is using LTE-M radio access technology (RAT) ; obtain access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted; and determine whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

34. The apparatus according to claim 33, wherein the apparatus is further operative to perform the method of any one of claims 2 to 15.

35. An apparatus (1500) at a subscription data entity, comprising: a processor (1521); and a memory (1522) coupled to the processor (1521), said memory (1522) containing instructions executable by said processor (1521), whereby said apparatus (1500) is operative to: obtain access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE), wherein the access restriction or RAT restriction data indicates that LTE-M is restricted for the EE; and send the access restriction or RAT restriction data associated with the EE to a first access management entity of a network.

36. The apparatus according to claim 35, wherein the apparatus is further operative to perform the method of any one of claims 17 to 25.

37. An apparatus (1500) at a second access management entity, comprising: a processor (1521); and a memory (1522) coupled to the processor (1521), said memory (1522) containing instructions executable by said processor (1521), whereby said apparatus (1500) is operative to: receive a request for getting a context of a user equipment (EE) from a first access management entity of a network; and send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

38. The apparatus according to claim 37, wherein the apparatus is further operative to perform the method of any one of claims 27 to 32.

39. A computer-readable storage medium storing instructions which when executed by at least one processor, cause the at least one processor to perform the method according to any one of claims 1 to 32.

40. A computer program product comprising instructions which when executed by at least one processor, cause the at least one processor to perform the method according to any of claims 1 to 32.

Description:
METHOD AND APPARATUS FOR ACCESS OR RAT RESTRICTION

TECHNICAL FIELD

[0001] The non-limiting and exemplary embodiments of the present disclosure generally relate to the technical field of communications, and specifically to methods and apparatuses for access or radio access technology (RAT) restriction.

BACKGROUND

[0002] This section introduces aspects that may facilitate a better understanding of the disclosure. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.

[0003] A wireless network may define one or more radio access technology (RAT) types. For example, 3rd Generation Partnership Project (3GPP) TS 23.401 V16.3.0, the disclosure of which is incorporated by reference herein in its entirety, has defined the RAT types as below:

Cellular IoT (Internet of Things): Cellular network supporting low complexity and low throughput devices for a network of Things. Cellular IoT supports IP (Internet protocol), Ethernet and Non-IP traffic.

Narrowband-IoT (NB-IoT): a 3GPP Radio Access Technology that forms part of Cellular IoT. It allows access to network services via E-UTRA (Evolved Universal Terrestrial Radio Access) with a channel bandwidth limited to 180 kHz (corresponding to one PRB (physical resource block)). Unless otherwise indicated in a clause, Narrowband-IoT is a subset of E-UTRAN (Evolved Universal Terrestrial Radio Access Network).

LTE-M: a 3GPP RAT type Identifier used in the Core Network only, which is a sub-type E-UTRAN RAT type, and defined to identify in the Core Network the E-UTRAN when used by a UE (user equipment) indicating Category M in its UE radio capability.

WB-E-UTRAN: in the RAN (Radio Access Network), WB-E-UTRAN is the part of E-UTRAN that excludes NB-IoT. In the Core Network, the WB-E-UTRAN also excludes LTE-M.

[0004] LTE-M RAT type may be used by the Core Network (CN) to distinguish a Category M device from a normal MBB (Mobile Broadband) device which uses the WB-E-UTRAN RAT type and thereby is used for charging and policy control purpose.

[0005] 3GPP TS29.272 V15.8.0, the disclosure of which is incorporated by reference herein in its entirety, has defined the Access-Restriction-Data as below: [0006] The Access-Restriction-Data AVP (Attribute Value Pair) is of type Unsigned32 and it shall contain a bit mask where each bit when set to 1 indicates a restriction. The meaning of the bits is the following:

[0007] 3GPP TS29.503 V16.0.0, the disclosure of which is incorporated by reference herein in its entirety, has defined the RAT type related restriction data in AccessAndMobilitySubscriptionData as below:

[0008] 3GPP TS29.571 V16.0.0, the disclosure of which is incorporated by reference herein in its entirety, has defined the RAT type as below: SUMMARY

[0009] This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.

[0010] With the introduction of LTE-M RAT type, the charging and policy control for the CAT-M devices can be distinguished from the normal MBB devices using WB-E-UTRAN RAT type. An operator may have different billing policy for CAT-M subscription and MBB subscription.

[0011] However, there are some issues for access or RAT restriction in the wireless network. For example, although the LTE-M RAT type can be used to identify a CAT-M device and thereby to enforce specific policy and charging control for the CAT-M device, in some cases, an operator may want to directly restrict the usage of WB-E-UTRAN for the CAT-M subscription or CAT-M for the WB-E-UTRAN subscription. For example, the operator may provide a data plan per month with a fixed low price for the CAT-M subscription assuming that there will not be big consumption of data using CAT-M device.

[0012] According to 3 GPP TS29.272 V15.8.0, 3 GPP TS29.503 V16.0.0 and 3 GPP TS29.571 V16.0.0, there is no way to do access or RAT restriction for LTE-M and WB-E-UTRAN RAT type separately, thus there is no mechanism to limit the CAT-M subscription to be associated with the CAT-M device only, for example, restricting the usage of WB-E-UTRAN but allow the usage of LTE-M or the usage of LTE-M but allow the usage of WB-E-UTRAN. Therefore, for example, when a USIM (Universal Subscriber Identity Module) card associated with the CAT-M subscription is inserted into a normal MBB device, the user cannot be billed properly or when a USIM card associated with the WB-E-UTRAN subscription is inserted into a CAT-M device, the user cannot be billed properly.

[0013] To overcome or mitigate at least one above mentioned problems or other problems or provide a useful solution, an improved access restriction or RAT restriction solution may be desirable.

[0014] In a first aspect of the disclosure, there is provided a method at a first access management entity of a network. The method comprises determining that a user equipment (UE) is using LTE-M radio access technology (RAT). The method further comprises obtaining access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted. The method further comprises determining whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE. [0015] In an embodiment, when the LTE-M RAT type is indicated as restriction, the UE using LTE-M may be not allowed to attach or register to the network.

[0016] In an embodiment, when the UE is not allowed to attach or register to the network, the method may further comprise sending a deregistration request or a detach request to the UE when UE has registered or attached to the network; or sending a registration reject or an attach reject or a TAU reject to the UE during a registration procedure or an attach procedure or a TAU procedure.

[0017] In an embodiment, the access restriction or RAT restriction data may be obtained from at least one of a subscription data entity of the network; a second access management entity of the network; or a second access management entity of another network.

[0018] In an embodiment, the first access management entity is a mobility management entity (MME), the method may further comprise receiving an attach request or a tracking area update (TAU) request from a UE. The method may further comprise sending an update location request to a home subscriber server (HSS). The method may further comprise receiving an update location answer from the HSS. The update location answer may include the access restriction or RAT restriction data associated with the UE.

[0019] In an embodiment, the update location request may include information indicating that the MME supports restriction related to the LTE-M RAT type and the update location answer may include information indicating that the HSS supports restriction related to the LTE-M RAT type. [0020] In an embodiment, the first access management entity is a mobility management entity (MME), the method may further comprise receiving an insert subscriber data request from a home subscriber server (HSS). The method may further comprise sending an insert subscriber data answer to the HSS. The insert subscriber data request may include the access restriction or RAT restriction data associated with the UE.

[0021] In an embodiment, the insert subscriber data request may include information indicating that the HSS supports restriction related to the LTE-M RAT type and the insert subscriber data answer may include information indicating that the MME supports restriction related to the LTE-M RAT type.

[0022] In an embodiment, the first access management entity is an access and mobility function (AMF), the method may further comprise receiving a registration request from the UE. The method may further comprise sending a Nudm SDM get request to a unified data management (UDM). The method may further comprise receiving a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE from the UDM.

[0023] In an embodiment, the first access management entity is an access and mobility function (AMF), the method may further comprise receiving an Nudm SDM Notification including the access restriction or RAT restriction data associated with the UE from a unified data management (UDM).

[0024] In an embodiment, the first access management entity is a new mobility management entity (MME), the method may further comprise receiving a tracking area update (TAU) request from the UE. The method may further comprise sending a context request for getting the UE’ context to an old MME or an old access and mobility function (AMF). The method may further comprise receiving a context response including the access restriction or RAT restriction data associated with the UE from the old MME or the old AMF.

[0025] In an embodiment, the first access management entity is a new access and mobility function (AMF), the method may further comprise receiving a registration request from the UE. The method may further comprise sending an Namf Communication UEContextTransfer request for getting the UE’ context to an old AMF. The method may further comprise receiving an Namf Communication UEContextTransfer response including the access restriction or RAT restriction data associated with the UE from the old AMF.

[0026] In an embodiment, the first access management entity is a new access and mobility function (AMF), the method may further comprise receiving a registration request from the UE. The method may further comprise sending a context request for getting the UE’ context to an old MME. The method may further comprise receiving a context response including the access restriction or RAT restriction data associated with the UE from the old MME.

[0027] In an embodiment, the access restriction or RAT restriction data may further indicate that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

[0028] In an embodiment, the access restriction or RAT restriction data indicating that LTE-M RAT type is restricted may be a bit and the access restriction or RAT restriction data indicating that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted may be a bit.

[0029] In a second aspect of the disclosure, there is provided a method at a subscription data entity. The method comprises obtaining access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE). The access restriction or RAT restriction data indicates that LTE-M is restricted for the UE. The method further comprises sending the access restriction or RAT restriction data associated with the UE to a first access management entity of a network.

[0030] In an embodiment, the first access management entity is a mobility management entity (MME) and the subscription data entity is a home subscriber server (HSS), the method may further comprise receiving an update location request from the MME. The method may further comprise sending an update location answer including the access restriction or RAT restriction data associated with the UE to the MME. [0031] In an embodiment, the first access management entity is a mobility management entity (MME) and the subscription data entity is a home subscriber server (HSS), the method further comprises determining a change of the restriction related to the LTE-M RAT type. The method may further comprise sending an insert subscriber data request including the access restriction or RAT restriction data associated with the UE to the MME.

[0032] In an embodiment, the first access management entity is an access and mobility function (AMF) and the subscription data entity is a unified data management (UDM), the method may further comprise receiving a Nudm SDM get request from AMF. The method may further comprise sending a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE to the AMF.

[0033] In an embodiment, the first access management entity is an access and mobility function (AMF) and the subscription data entity is a unified data management (UDM), the method may further comprise determining a change of the restriction related to the LTE-M RAT type. The method may further comprise sending an Nudm SDM Notification including the access restriction or RAT restriction data associated with the UE to the AMF.

[0034] In a third aspect of the disclosure, there is provided a method at a second access management entity. The method comprises receiving a request for getting a context of a user equipment (UE) from a first access management entity of a network. The method further comprises sending a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. The access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

[0035] In an embodiment, the first access management entity is a new mobility management entity (MME) and the second access management entity is an old MME or an old access and mobility function (AMF), the request may be a context request and the response may be a context response.

[0036] In an embodiment, the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old access and mobility function (AMF), the request may be an Namf Communication UEContextTransfer request and the response may be an Namf Communication UEContextTransfer response.

[0037] In an embodiment, the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old mobility management entity (MME), the request may be a context request and the response may be a context response.

[0038] In another aspect of the disclosure, there is provided an apparatus at a first access management entity of a network. The apparatus comprises a processor; and a memory coupled to the processor, said memory containing instructions executable by said processor, whereby said apparatus is operative to determine that a user equipment (UE) is using LTE-M radio access technology (RAT). Said apparatus is further operative to obtain access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted. Said apparatus is further operative to determine whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

[0039] In another aspect of the disclosure, there is provided an apparatus at a subscription data storage entity. The apparatus comprises a processor; and a memory coupled to the processor, said memory containing instructions executable by said processor, whereby said apparatus is operative to obtain access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE), wherein the access restriction or RAT restriction data indicates that LTE-M is restricted for the UE. Said apparatus is further operative to send the access restriction or RAT restriction data associated with the UE to a first access management entity of a network.

[0040] In another aspect of the disclosure, there is provided an apparatus at a second access management entity. The apparatus comprises a processor; and a memory coupled to the processor, said memory containing instructions executable by said processor, whereby said apparatus is operative to receive a request for getting a context of a user equipment (UE) from a first access management entity of a network. Said apparatus is further operative to send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. The access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

[0041] In another aspect of the disclosure, there is provided a first access management entity of a network. The network node comprises a determining module, an obtaining module and a deciding module. The determining module may be configured to determine that a user equipment (UE) is using LTE-M radio access technology (RAT). The obtaining module may be configured to obtain access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted. The determining module may be configured to determine whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

[0042] In another aspect of the disclosure, there is provided a subscription data storage entity. The subscription data storage entity comprises an obtaining module and a sending module. The obtaining module may be configured to obtain access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE). The access restriction or RAT restriction data indicates that LTE-M is restricted for the UE. The sending module may be configured to send the access restriction or RAT restriction data associated with the UE to a first access management entity of a network.

[0043] In another aspect of the disclosure, there is provided a second access management entity. The second access management entity comprises a receiving module and a sending module. The receiving module may be configured to receive a request for getting a context of a user equipment (UE) from a first access management entity of a network. The sending module may be configured to send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. The access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

[0044] In another aspect of the disclosure, there is provided a computer program product comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the first aspect of the disclosure.

[0045] In another aspect of the disclosure, there is provided a computer program product comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the second aspect of the disclosure.

[0046] In another aspect of the disclosure, there is provided a computer program product comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the third aspect of the disclosure.

[0047] In another aspect of the disclosure, there is provided a computer-readable storage medium storing instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the first aspect of the disclosure.

[0048] In another aspect of the disclosure, there is provided a computer-readable storage medium storing instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the second aspect of the disclosure.

[0049] In another aspect of the disclosure, there is provided a computer-readable storage medium storing instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to the third aspect of the disclosure.

[0050] Embodiments herein afford many advantages, of which a non-exhaustive list of examples follows. Some embodiments herein may provide the flexibility for operator to define its access restriction rule more accurately, especially for LTE-M, which can enable the operator to exactly control the usage of LTE-M and to provide a simple billing policy (e.g., a data plan per month with fixed price) for CAT-M subscription without complicating the charging logic. The embodiments herein are not limited to the features and advantages mentioned above. A person skilled in the art will recognize additional features and advantages upon reading the following detailed description. BRIEF DESCRIPTION OF THE DRAWINGS

[0051] The above and other aspects, features, and benefits of various embodiments of the present disclosure will become more fully apparent, by way of example, from the following detailed description with reference to the accompanying drawings, in which like reference numerals or letters are used to designate like or equivalent elements. The drawings are illustrated for facilitating better understanding of the embodiments of the disclosure and not necessarily drawn to scale, in which:

[0052] FIG. 1 schematically shows a high level architecture in a 4G network;

[0053] FIG. 2 schematically shows a high level architecture in a 5G network;

[0054] FIG. 3 a shows a flowchart of a method according to an embodiment of the present disclosure;

[0055] FIG. 3b shows a flowchart of a method according to another embodiment of the present disclosure;

[0056] FIG. 4 shows a flowchart of a method according to another embodiment of the present disclosure;

[0057] FIG. 5 shows a flowchart of a method according to another embodiment of the present disclosure;

[0058] FIG. 6 shows a flowchart of LTE-M access restriction data handling by HSS and MME during an attach or TAU procedure according to an embodiment of the present disclosure;

[0059] FIG. 7 shows a flowchart of LTE-M access restriction data update procedure according to an embodiment of the present disclosure;

[0060] FIG. 8 shows a flowchart of LTE-M restriction data handling by EIDM and AMF during a registration procedure according to an embodiment of the present disclosure;

[0061] FIG. 9 shows a flowchart of LTE-M RAT restriction data update procedure in 5GC according to an embodiment of the present disclosure;

[0062] FIG. 10 shows a flowchart of a mobility procedure with LTE-M access restriction data transfer according to an embodiment of the present disclosure;

[0063] FIG. 11 shows a flowchart of Mobility Registration Update procedure with LTE-M access restriction data transfer according to an embodiment of the present disclosure;

[0064] FIG. 12 shows a flowchart of Inter system Mobility Registration Update procedure from MME to AMF with LTE-M access restriction data transfer according to an embodiment of the present disclosure; [0065] FIG. 13a shows a flowchart of a method according to another embodiment of the present disclosure;

[0066] FIG. 13b shows a flowchart of a method according to another embodiment of the present disclosure;

[0067] FIG. 14a shows a flowchart of a method according to another embodiment of the present disclosure;

[0068] FIG. 14b shows a flowchart of a method according to another embodiment of the present disclosure;

[0069] FIG. 15 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure;

[0070] FIG. 16a is a block diagram showing a first access management entity of a network according to an embodiment of the disclosure;

[0071] FIG. 16b is a block diagram showing a first access management entity of a network according to another embodiment of the disclosure;

[0072] FIG. 17 is a block diagram showing a subscription data storage entity according to an embodiment of the disclosure; and

[0073] FIG. 18 is a block diagram showing a second access management entity according to an embodiment of the disclosure.

DETAILED DESCRIPTION

[0074] The embodiments of the present disclosure are described in detail with reference to the accompanying drawings. It should be understood that these embodiments are discussed only for the purpose of enabling those skilled persons in the art to better understand and thus implement the present disclosure, rather than suggesting any limitations on the scope of the present disclosure. Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present disclosure should be or are in any single embodiment of the disclosure. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present disclosure. Furthermore, the described features, advantages, and characteristics of the disclosure may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the disclosure may be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the disclosure. [0075] As used herein, the term “network” refers to a network following any suitable wireless communication standards such as new radio (NR), long term evolution (LTE), LTE-Advanced, wideband code division multiple access (WCDMA), high-speed packet access (HSPA), Code Division Multiple Access (CDMA), Time Division Multiple Address (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency-Division Multiple Access (OFDMA), Single carrier frequency division multiple access (SC-FDMA) and other wireless networks. A CDMA network may implement a radio technology such as Universal Terrestrial Radio Access (UTRA), etc. UTRA includes WCDMA and other variants of CDMA. A TDMA network may implement a radio technology such as Global System for Mobile Communications (GSM). An OFDMA network may implement a radio technology such as Evolved UTRA (E-UTRA), Ultra Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20, Flash-OFDMA, Ad-hoc network, wireless sensor network, etc. In the following description, the terms “network” and “system” can be used interchangeably. Furthermore, the communications between two devices in the network may be performed according to any suitable communication protocols, including, but not limited to, the communication protocols as defined by a standard organization such as 3GPP. For example, the communication protocols as may comprise the first generation (1G), 2G, 3G, 4G, 4.5G, 5G communication protocols, and/or any other protocols either currently known or to be developed in the future.

[0076] The term “network entity” or “network node” as used herein refers to a network device (physical or virtual) in a communication network. In CUPS (Control User Plane Split) architecture, the network node may comprise a control plane function and a user plane function. The network device may offer numerous services to customers who are interconnected by an access network device. Each access network device is connectable to a core network device over a wired or wireless connection.

[0077] The term “network function (NF)” refers to any suitable function which can be implemented in a network node (physical or virtual) of a communication network. For example, the 5G system (5GS) may comprise a plurality of NFs such as AMF (Access and mobility Function), SMF (Session Management Function), AUSF (Authentication Service Function), UDM (Unified Data Management), PCF (Policy Control Function), AF (Application Function), NEF (Network Exposure Function), UPF (User plane Function) and NRF (NF Repository Function), (R)AN ((radio) access network), SCP (service communication proxy), etc. In other embodiments, the network function may comprise different types of NFs for example depending on a specific type of network.

[0078] The term “terminal device” refers to any end device that can access a communication network and receive services therefrom. By way of example and not limitation, the terminal device refers to a mobile terminal, user equipment (UE), or other suitable devices. The UE may be, for example, a Subscriber Station (SS), a Portable Subscriber Station, a Mobile Station (MS), or an Access Terminal (AT). The terminal device may include, but not limited to, a portable computer, an image capture terminal device such as a digital camera, a gaming terminal device, a music storage and a playback appliance, a mobile phone, a cellular phone, a smart phone, a voice over IP (VoIP) phone, a wireless local loop phone, a tablet, a wearable device, a personal digital assistant (PDA), a portable computer, a desktop computer, a wearable terminal device, a vehicle-mounted wireless terminal device, a wireless endpoint, a mobile station, a laptop-embedded equipment (LEE), a laptop-mounted equipment (LME), a USB dongle, a smart device, a wireless customer-premises equipment (CPE) and the like. In the following description, the terms “terminal device”, “terminal”, “user equipment” and “UE” may be used interchangeably. As one example, a terminal device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3GPP, such as 3GPP’ LTE standard or NR standard. As used herein, a “user equipment” or “UE” may not necessarily have a “user” in the sense of a human user who owns and/or operates the relevant device. In some embodiments, a terminal device may be configured to transmit and/or receive information without direct human interaction. For instance, a terminal device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the communication network. Instead, a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a specific human user.

[0079] As yet another example, in an Internet of Things (IOT) scenario, a terminal device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device and/or network equipment. The terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device. As one particular example, the terminal device may be a UE implementing the 3 GPP narrow band internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances, for example refrigerators, televisions, personal wearables such as watches etc. In other scenarios, a terminal device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation.

[0080] References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.

[0081] It shall be understood that although the terms “first” and “second” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms.

[0082] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/ or combinations thereof.

[0083] It is noted that these terms as used in this document are used only for ease of description and differentiation among nodes, devices or networks etc. With the development of the technology, other terms with the similar/same meanings may also be used.

[0084] In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.

[0085] Although the subject matter described herein may be implemented in any appropriate type of system using any suitable components, the embodiments disclosed herein are described in relation to a communication system complied with the exemplary system architecture as illustrated in clause 4.2 of 3 GPP TS23.501 V16.1.0 and clause 4.2 of 3 GPP TS 23.401 V16.3.0, the disclosure of which is incorporated by reference herein in its entirety. For simplicity, the system architectures of FIGs.1-2 only depict some exemplary elements of exemplary system architectures. In practice, a communication system may further include any additional elements suitable to support communication between terminal devices or between a wireless device and another communication device, such as a landline telephone, a service provider, or any other network node or terminal device. The communication system may provide communication and various types of services to one or more terminal devices to facilitate the terminal devices’ access to and/or use of the services provided by, or via, the communication system.

[0086] FIG.l schematically shows a high level architecture in a 4G network. The functional description of the entities and the description of reference points as shown in FIG.1 are specified in 3GPP TS 23.401 V16.3.0. FIG.l only depicts some exemplary elements such as universal terrestrial radio access network (UTRAN), Global System for Mobile

Communications(GSM)/Enhanced Data for GSM Evolution (EDGE) Radio Access

Network(GERAN), serving general packet radio service support node (SGSN), mobility management entity (MME), Policy and Charging Rules Function (PCRF), home subscriber server (HSS), UE, evolved universal terrestrial radio access network (E-UTRAN), Serving gateway (SGW), PDN gateway (PGW), etc. In practice, a communication system may further include any additional elements suitable to support communication between terminal devices or between a wireless device and another communication device, such as a landline telephone, a service provider, or any other network node or terminal device. The communication system may provide communication and various types of services to one or more terminal devices to facilitate the terminal devices’ access to and/or use of the services provided by, or via, the communication system.

[0087] MME functions may include:

NAS (Non-access stratum) signalling;

NAS signalling security;

Inter CN (core network) node signalling for mobility between 3 GPP access networks (terminating S3);

Tracking Area list management;

MME selection for handovers with MME change;

SGSN selection for handovers to 2G or 3G 3 GPP access networks;

Roaming (S6a towards home HSS); etc.

[0088] HSS may store various data. HSS may store access restriction data which may indicate the access restriction subscription information. It may include different values for HPLMN (home public land mobile network) and roaming case. According to an embodiment of the present disclosure, HSS may include access restriction or RAT restriction data associated with a UE. For example, the access restriction or RAT restriction data may include first information indicating whether a LTE-M RAT type is restricted. [0089] FIG.2 schematically shows a high level architecture in a 5G network. The system architecture of FIG.2 may comprise some exemplary elements such as AUSF, AMF, DN, NEF, NRF, NSSF, PCF, SMF, UDM, UPF, SCP, AF, UE, (R)AN.

[0090] In accordance with an exemplary embodiment, the UE can establish a signaling connection with the AMF over the reference point Nl, as illustrated in FIG.2. This signaling connection may enable NAS (Non-access stratum) signaling exchange between the UE and the core network, comprising a signaling connection between the UE and the (R)AN and the N2 connection for this UE between the (R)AN and the AMF. The (R)AN can communicate with the UPF over the reference point N3. The UE can establish a packet data unit (PDU) session to the DN (data network, e.g. an operator network or Internet) through the UPF over the reference point N6.

[0091] As further illustrated in FIG.2, the exemplary system architecture also contains the service-based interfaces such as Nnrf, Nnef, Nausf, Nudm, Npcf, Namf and Nsmf exhibited by NFs such as the NRF, the NEF, the AUSF, the UDM, the PCF, the AMF and the SMF. In addition, FIG.2 also shows some reference points such as Nl, N2, N3, N4, N6 and N9, which can support the interactions between NF services in the NFs. For example, these reference points may be realized through corresponding NF service-based interfaces and by specifying some NF service consumers and providers as well as their interactions in order to perform a particular system procedure.

[0092] Various NFs shown in FIG.2 may be responsible for functions such as session management, mobility management, authentication, and security. These may be critical for delivering a service in the network. The AUSF, AMF, DN, NEF, NRF, NSSF, PCF, SMF, UDM, UPF, AF, UE, SCP, (R)AN may include the functionality for example as defined in clause 6.2 of 3 GPP TS23.501 V16.1.0.

[0093] The AMF may include the following functionality:

Registration management.

Connection management.

Mobility Management.

Access Authentication.

Access Authorization etc.

[0094] The UDM may support for the following functionality:

Access authorization based on subscription data (e.g. roaming restrictions).

UE's Serving NF Registration Management (e.g. storing serving AMF for UE, storing serving SMF for UE's PDU Session). Subscription management etc.

[0095] The subscription data (including authentication data) may be stored in UDR (Unified Data Repository), in which case a UDM implements the application logic and does not require an internal user data storage and then several different UDMs may serve the same user in different transactions.

[0096] FIG. 3a shows a flowchart of a method according to an embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a first access management entity of a network. As such, the apparatus may provide means or modules for accomplishing various parts of the method 300 as well as means or modules for accomplishing other processes in conjunction with other components. The first access management entity can be any suitable access management entity such as MME or AMF as shown in FIGs.1-2. In other embodiment, the first access management entity may be any other network node or function capable of providing access management function in other wireless network. Optionally, the access management entity may provide mobility management function.

[0097] At block 302, the first access management entity determines a RAT type currently used by a UE. The first access management entity may determine the RAT type currently used by the UE in various ways. For example, the first access management entity may derive the RAT type currently used by the UE based on the UE’s radio capability and/or an explicit indication from a RAN currently serving the UE and/or RAN (radio access network) identifier (ID), etc. The RAT type may be any suitable RAT type defined or supported by the network. For example, the RAT type may be similar to the RAT types as defined by various 3 GPP specifications, such as LTE-M, UTRAN, GERAN, Generic Access Network(GAN), HSPA(High Speed Packet Access)-Evolution, WB-E-UTRAN, , NB-IoT, NR, etc. The first access management entity may determine the RAT type currently used by the UE during various communication procedures such as during a registration procedure or an attach procedure or a tracking area update (TAU) procedure or an access restriction or RAT restriction data change notification procedure, etc.

[0098] At block 304, the first access management entity obtains access restriction or RAT restriction data associated with the UE. The first access management entity may obtain the access restriction or RAT restriction data associated with the UE in various ways. For example, when the first access management entity has stored the access restriction or RAT restriction data associated with the UE in its local storage or memory, it can obtain this data from its local storage or memory. Alternatively, the first access management entity may obtain this data from another network node which has stored this data or can retrieve this data. For example, the first access management entity may obtain the access restriction or RAT restriction data from at least one of a subscription data entity (e.g., subscription data storage entity) of the network; a second access management entity of the network; or a second access management entity of another network. The subscription data storage entity may be any suitable information storage device such as HSS or UDM, etc. The second access management entity of the network may be an old access management entity of the network which previously severed the UE. For example, in an inter-access management entity mobility procedure or a mobility registration update procedure, the first access management entity of the network may be a new access management entity of the network, and the second access management entity of the network may be an old access management entity of the network which previously severed the UE. The second access management entity of another network may be an old access management entity which previously severed the UE. For example, in an inter system mobility procedure, the first access management entity of the network may be a new access management entity of the network, and the second access management entity of the network may be an old access management entity of another network which previously severed the UE.

[0099] In an embodiment, the access restriction or RAT restriction data includes first information indicating whether an LTE-M RAT type is restricted. In an embodiment, the first information can explicitly indicate whether the LTE-M RAT type is restricted. In addition, the access restriction or RAT restriction data may further include any other access restriction or RAT restriction information. In an embodiment, the access restriction or RAT restriction data may further include second information indicating whether a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted. The first information and the second information may be expressed in various ways such as an indicator, a bit, a bit in a bitmap, etc.

[00100] At block 306, the first access management entity decides whether the UE is allowed to attach or register to the network based on the RAT type currently used by the UE and the access restriction or RAT restriction data associated with the UE. For example, when LTE-M is indicated as restriction in subscription data while LTE-M RAT type is being used by UE, the UE is not allowed to attach or register to the network. When the access restriction or RAT restriction data associated with the UE further include other access restriction or RAT restriction information, the first access management entity may perform a similar decision as the LTE-M RAT type. For example, when WB-E-UTRAN except LTE-M is indicated as restriction while WB-E-UTRAN RAT type is being used by UE, the UE is not allowed to attach or register to the network. When the UE is allowed to attach or register to the network, the first access management entity may serve the UE, such as allowing the UE to attach or register to the network or processing the message to/from the UE, etc.

[00101] FIG. 3b shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a first access management entity of a network. As such, the apparatus may provide means or modules for accomplishing various parts of the method 300’ as well as means or modules for accomplishing other processes in conjunction with other components. The first access management entity can be any suitable access management entity such as MME or AMF as shown in FIGs.1-2. In other embodiment, the first access management entity may be any other network node or function capable of providing access management function in other wireless network. Optionally, the access management entity may provide mobility management function. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00102] At block 302’, the first access management entity may determine that a user equipment (UE) is using LTE-M radio access technology (RAT) .

[00103] In an embodiment, when the LTE-M RAT type is indicated as restriction, the UE using LTE-M is not allowed to attach or register to the network.

[00104] In an embodiment, the access restriction or RAT restriction data further indicates that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

[00105] In an embodiment, the access restriction or RAT restriction data indicating that LTE-M RAT type is restricted is a bit and the access restriction or RAT restriction data indicating that a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted is a bit.

[00106] At block 304’, the first access management entity may obtain access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted.

[00107] At block 306’, the first access management entity may determine whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

[00108] Comparing with the prior art such as 3GPP TS V15.8.0, 3GPP TS29.503 V16.0.0 and 3GPP TS29.571 V16.0.0, this embodiment provides a mechanism to limit the CAT-M subscription to be associated with the CAT-M device only, for example, restricting the usage of WB-E-UTRAN but allow the usage of LTE-M. Therefore, for example, when a USIM (Universal Subscriber Identity Module) card associated with the CAT-M subscription is inserted into a normal MBB device, the UE can not access or register to the network.

[00109] In an embodiment, for EPS(evolved packet system), it can extend the access restriction data as defined in 3GPP TS29.272 V15.8.0 to indicate whether LTE-M RAT type is restricted and/or whether WB-E-UTRAN RAT type except LTE-M RAT type is restricted (i.e., whether only LTE-M RAT type of WB-E-UTRAN RAT type is allowed). [00110] In an embodiment, for EPS, it can extend the MM (Mobility Management) context (EPS Security Context and Quadruplets) as defined in 3GPP TS 29.274 V16.0.0, the disclosure of which is incorporated by reference herein in its entirety, to indicate whether LTE-M RAT type is restricted and/or whether WB-E-UTRAN RAT type except LTE-M RAT type is restricted (i.e., whether only LTE-M RAT type of WB-E-UTRAN RAT type is allowed).

[00111] In an embodiment, for 5GS, it can extend the RAT type as defined in 3GPP TS29.571 VI 6.0.0 to include LTE-M RAT type so that (1) when UDM sends AccessAndMobilitySubscriptionData to AMF, ratRestrictions can indicate whether LTE-M RAT type or WB-E-UTRAN RAT type except LTE-M RAT type is restricted respectively; (2) when a source AMF sends UE context to a target AMF, restrictedRatList can indicate whether LTE-M RAT type or WB-E-UTRAN RAT type except LTE-M RAT type is restricted respectively.

[00112] In an embodiment, the first access management entity such as MME or AMF may derive whether LTE-M RAT type or WB-U-TRAN RAT type is being used, e.g., according to UE radio capability information or an explicit indication from RAN, and decides whether the UE is allowed to attach or register to the network based on both the RAT type currently used by the UE and the LTE-M related restriction data received from HSS or UDM.

[00113] In an embodiment, when LTE-M RAT type is indicated as restriction in subscription data while LTE-M RAT type is being used by UE, the UE is not allowed to attach or register to the network.

[00114] In an embodiment, when WB-E-UTRAN RAT type except LTE-M RAT type is indicated as restriction while WB-E-UTRAN RAT type is being used by UE, the UE is not allowed to attach/register to network.

[00115] In an embodiment, Table 7.3.31/1 of 3GPP TS29.272 V15.8.0 may be amended as below:

Access-Restriction-Data

[00116] In an embodiment, Table 7.3.31/1 of 3GPP TS29.272 V15.8.0 may be amended as below:

Access-Restriction-Data

[00117] The Access-Restriction-Data AVP is of type Unsigned32 and it shall contain a bit mask where each bit when set to 1 indicates a restriction.

[00118] In an embodiment, the subscription data storage entity such as HSS and the first access management entity such as MME may negotiate the feature of support of LTE-M restriction data.

[00119] In an embodiment, for MM context, EPS Security Context and Quadruplets as defined in 3GPP TS 29.274 V16.0.0 may be amended as below:

Where WBENA denotes a bit when set to 1 indicates WB-E-UTRAN except LTE-M not allowed. LTEMNA denotes a bit when set to 1 denotes LTE-M not allowed.

[00120] In an embodiment, Table 5.4.3.2-1 of 3GPP TS29.571 V16.0.0 may be amended as below:

[00121] FIG. 4 shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a first access management entity of a network. As such, the apparatus may provide means or modules for accomplishing various parts of the method 400 as well as means or modules for accomplishing other processes in conjunction with other components. The first access management entity can be any suitable access management entity such as MME or AMF as shown in FIGs.1-2. In other embodiment, the first access management entity may be any other network node or function capable of providing access management function in other wireless network. Optionally, the first access management entity may provide mobility management function. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00122] Blocks 402, 404 and 406 are similar to blocks 302, 304 and 306 of FIG.3a and blocks 302’, 304’ and 306’ of FIG.3b, the description thereof is omitted here for brevity. In this embodiment, the first access management entity decides that the UE is not allowed to attach or register to the network at block 406.

[00123] At block 408, the first access management entity sends a deregistration request or a detach request to the UE when UE has registered or attached to the network. For example, when UE has registered or attached to the network, the first access management entity may trigger a deregistration procedure or a detach procedure by sending a deregistration or a detach request to the UE. In an embodiment, the deregistration procedure or a detach procedure may be similar to the deregistration procedure or the detach procedure as defined in various communication protocol specifications such as 3GPP TS 29.502 V16.0.0 or 3GPP TS 23.402 V16.0.0, the disclosure of which is incorporated by reference herein in its entirety.

[00124] FIG. 5 shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a first access management entity of a network. As such, the apparatus may provide means or modules for accomplishing various parts of the method 500 as well as means or modules for accomplishing other processes in conjunction with other components. The first access management entity can be any suitable access management entity such as MME or AMF as shown in FIGs.1-2. In other embodiment, the first access management entity may be any other network node or function capable of providing access management function in other wireless network. Optionally, the first access management entity may provide mobility management function. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00125] Blocks 502, 504 and 506 are similar to blocks 302, 304 and 306 of FIG.3a and blocks 302’, 304’ and 306’ of FIG.3b, the description thereof is omitted here for brevity. In this embodiment, the first access management entity decides that the UE is not allowed to attach or register to the network at block 506.

[00126] At block 508, the first access management entity sends a registration reject or an attach reject or a TAU reject to the UE during a registration procedure or an attach procedure or a TAU procedure. In an embodiment, the registration procedure or the attach procedure or the TAU procedure may be similar to the registration procedure or the attach procedure or the TAU procedure as defined in various communication protocol specifications such as 3GPP TS 29.502 V16.0.0 or 3 GPP TS 23.402 V16.0.0.

[00127] FIG. 6 shows a flowchart of LTE-M access restriction data handling by HSS and MME during an attach or TAU procedure according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00128] At step 602, UE may initiate an attach procedure or a TAU procedure by sending an attach request or a TAU request to MME. The MME may receive the attach request or the TAU request from the UE.

[00129] At step 604, MME may send a Update Location Request to HSS and HSS receives the Update Location Request. In the Feature-List AVP in the Update Location Request, LTE-M bit may be set which indicates MME supports LTE-M related restriction.

[00130] At step 606, HSS may send a Update Location Answer to MME and MME receives the Update Location Answer from HSS. The update location answer may include the access restriction or RAT restriction data associated with the UE. For example, in the Feature-List AVP of the Update Location Answer, LTE-M bit may be set which indicates HSS supports LTE-M related restriction. HSS may also set the “LTE-M Not Allowed” and/or “WB-E-UTRAN except LTE-M Not Allowed” bits of Access-Restriction-Data AVP accordingly.

[00131] At step 608, MME may send a Attach Accept or TAU Accept to UE before step 610 is performed. This step may happen when MME derive the RAT type currently used by the UE in a later phase, e.g., when UE radio capability information is received in a later phase. [00132] At step 610, MME may derive the RAT type currently used by the UE, e.g., based on UE radio capability or an explicit indication from RAN, and decides whether the UE is allowed to attach to the network based on the RAT type currently used by the UE and the Access-Restriction-Data. If LTE-M is indicated as restriction in the Access-Restriction-Data while the RAT type currently used by the UE is LTE-M, then the UE is not allowed to attach to the network. If WB-E-UTRAN except LTE-M is indicated as restriction in the Access-Restriction-Data while the RAT type is WB-E-UTRAN, the UE is not allowed to attach to network. Otherwise, the UE is not restricted to attach to network by the LTE-M related access restriction data.

[00133] At step 612, if the UE is not allowed to attach to network, then when step 608 is already performed, MME may trigger a detach procedure by sending a Detach Request to the UE.

[00134] At step 614, if the UE is not allowed to attach to network, then when step 608 is not performed, MME may reject the Attach Request or TAU Request by sending an Attach Reject or TAU Reject to UE.

[00135] FIG. 7 shows a flowchart of LTE-M access restriction data update procedure according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00136] At step 702, HSS may know that MME supports LTE-M (e.g., from the Update Location Request) and LTE-M related access restriction data is changed.

[00137] At step 704, HSS may send Insert Subscriber Data Request to MME and MME receives the Insert Subscriber Data Request from HSS. The insert subscriber data request may include the access restriction or RAT restriction data associated with the UE. For example, in the Insert Subscriber Data Request, LTE-M bit may be set in the Feature-List AVP, which indicates HSS supports LTE-M related restriction. HSS may set the “LTE-M Not Allowed” and/or “WB-E-UTRAN except LTE-M Not Allowed” bits of Access-Restriction-Data AVP accordingly. [00138] At step 706, MME may send Insert Subscriber Data Answer to HSS and HSS may receive Insert Subscriber Data Answer. In the Insert Subscriber Data Answer, LTE-M bit may be set in the Feature-List AVP, which indicates MME supports LTE-M related restriction.

[00139] At step 708, MME may decide whether the UE is allowed to attach to the network based on the RAT type currently used by the UE and the LTE-M related access restriction data. Step 708 is same as step 610 of FIG.6.

[00140] At step 710, when MME may decide that the UE is not allowed to attach to the network, MME initiates a detach procedure by sending a Detach Request to UE.

[00141] FIG. 8 shows a flowchart of LTE-M restriction data handling by UDM and AMF during a registration procedure according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00142] At step 802, UE may initiate a registration procedure by sending a Registration Request to AMF and AMF may receive the Registration Request from the UE.

[00143] At step 804, AMF may discover the UDM by using a NF Discovery service operation. [00144] At step 806, AMF may trigger Nudm_UECM_Regi strati on service operation and UDM may store related UE Context Management information in UDM.

[00145] At step 808a, AMF may send Nudm_SDM_Get request to the UDM and UDM may send a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE to the AMF at step 808b. Then AMF may retrieve the UE’s subscription data from UDM including a Restricted RAT list. The Restricted RAT list may include LTE-M related access restriction data.

[00146] At step 810, AMF may send a request to UDM to subscribe to a notification of the UE’s individual data change such as LTE-M related access restriction data change.

[00147] At step 812, AMF may send Registration Accept to UE before step 814 is performed. Step 812 may happen when AMF can derive the RAT type currently used by the UE in a later phase, e.g., when UE radio capability information is received in a later phase.

[00148] At step 814, AMF may derive the RAT type currently used by the UE, e.g., based on UE radio capability or an explicit indication from RAN, and decides whether the UE is allowed to register to the network based on the RAT type currently used by the UE and the LTE-M related restriction data. If LTE-M is indicated as restriction in the LTE-M related restriction data while the RAT type is LTE-M, the UE is not allowed to attach to the network. Otherwise, the UE is not restricted to attach to the network by the LTE-M related access restriction data.

[00149] At step 816, if the UE is not allowed to attach to network, then if step 812 is already performed, AMF may trigger a deregistration procedure by sending a Deregistration Request to the UE.

[00150] At step 818, if the UE is not allowed to attach to network, then if step 812 is not performed, AMF may reject the Registration Request by sending a Registration Reject to the UE. [00151] FIG. 9 shows a flowchart of LTE-M RAT restriction data update procedure in 5GC (5G Core Network) according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity. [00152] At step 902, UDM determines that LTE-M related RAT restriction data is changed in UDM.

[00153] At step 904, UDM may notify AMF the changed LTE-M RAT restriction data by sending an Nudm SDM Notification including the access restriction or RAT restriction data associated with the UE to the AMF. Then AMF may receive an Nudm_SDM_Notifi cation including the access restriction or RAT restriction data associated with the UE from the UDM. [00154] At step 906, AMF may decide whether the UE is allowed to register to the network based on the RAT type currently used by the UE and LTE-M restriction data from UDM.

[00155] At step 908, when AMF decides that the UE is not allowed to register to the network, AMF may initiate a deregistration procedure by sending a Deregistration Request to the UE. [00156] FIG. 10 shows a flowchart of a mobility procedure with LTE-M access restriction data transfer according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00157] At step 1002, a new MME receives a TAU Request from the UE. The TAU Request together with LTE-M indication may be included in an Initial UE message sent from a RAN node. [00158] At step 1004, the new MME may send a Context Request an old MME or AMF to get the UE Context.

[00159] At step 1006, the new MME may receive a Context Response including the access restriction or RAT restriction data associated with the UE from the old MME or the old AMF. For example, extended Access Restriction data in MM Context may be set to “LTEMA” or “WBENA” based on the subscription data related to the UE.

[00160] At step 1008, security related function can be done if necessary.

[00161] At step 1010, the new MME may send Context Acknowledge with cause “Denied in RAT” to the old MME/ AMF, if LTEMNA is set in Extended Access Restriction Data and the RAT type currently used by the UE is LTE-M or if WBENA is set in Extended Access Restriction Data and the RAT type currently used by the UE is WB-E-UTRAN.

[00162] At step 1012, the new MME may send TAU reject to the UE via RAN, if the access restriction takes effect in step 1010.

[00163] FIG. 11 shows a flowchart of Mobility Registration Update procedure with LTE-M access restriction data transfer according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00164] At step 1102, a new AMF receives a Registration Request from the UE. The Registration Request (such as Mobility Registration Update) together with LTE-M indication may be included in an Initial UE message sent from a RAN node.

[00165] At step 1104, the new AMF may send an Namf Communication UEContextTransfer request to an old AMF to get the UE Context.

[00166] At step 1106, the new AMF may receive an Namf Communication UEContextTransfer Response including the access restriction or RAT restriction data associated with the UE from the old AMF. For example, Restricted RAT list included in the Namf Communication UEContextTransfer Response may include LTE-M related RAT restriction data.

[00167] At step 1108, security related function can be done if necessary.

[00168] At step 1110, the new AMF may sends a Namf Communication RegistrationCompleteNotify to the old AMF with problem details “403 Forbidden”, if LTE-M is indicated as restriction in the Restricted RAT list and the RAT type currently used by the UE is LTE-M or if EUTRA is indicated as restriction in the Restricted RAT list and the RAT type currently used by the UE is EUTRA.

[00169] At step 1112, Registration reject may be sent to the UE, if access restriction takes effect in step 1110.

[00170] FIG. 12 shows a flowchart of Inter system Mobility Registration Update procedure from MME to AMF with LTE-M access restriction data transfer according to an embodiment of the present disclosure. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00171] At step 1202, a new AMF receives a Registration Request from the UE. For example, the Registration Request together with LTE-M indication may be included in an Initial UE message sent from a RAN node.

[00172] At step 1204, the new AMF may send a Context Request to an old MME to get the UE Context.

[00173] At step 1206, the new AMF may receive a Context Response including the access restriction or RAT restriction data associated with the UE from old MME. For example, Extended Access Restriction data in MM Context could be set to “LTEMA” or “WBENA” based on subscription data related to the UE.

[00174] At step 1208, security related function can be done if necessary.

[00175] At step 1210, the new AMF may send a Context Acknowledge with cause “Denied in RAT” to the old MME, if LTEMNA is set in Extended Access Restriction Data and the RAT type currently used by the UE is LTE-M or if WBENA is set in Extended Access Restriction Data and the RAT type currently used by the UE is EUTRA.

[00176] At step 1212, the new AMF may send Registration reject to the UE via the RAN node, if access restriction takes effect in step 1210.

[00177] Some messages and procedures as shown in FIGs. 6-12 are similar to the corresponding messages and corresponding procedures as described in 3GPP TS 23.401 vl6.3.0, 3GPP TS 23.502 V16.1.1, 3 GPP TS23.501 V16.1.0, 3 GPP TS 23.402 V16.0.0 or other 3GPP specifications, the disclosure of which is incorporated by reference herein in its entirety. [00178] FIG. 13a shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a subscription data storage entity. As such, the apparatus may provide means or modules for accomplishing various parts of the method 1300 as well as means or modules for accomplishing other processes in conjunction with other components. The subscription data storage entity can be any suitable information storage device such as HSS or UDM as shown in FIGs.1-2. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00179] At block 1302, the subscription data storage entity obtains access restriction or RAT restriction data associated with a UE. The subscription data storage entity may obtain the access restriction or RAT restriction data associated with the UE in various ways. For example, the subscription data storage entity may obtain this data during various subscriber profile management procedures for example as defined in 3GPP TS 23.502 V16.1.1 and 3GPP TS 23.402 V16.0.0. The access restriction or RAT restriction data may include first information indicating whether an LTE-M RAT type is restricted as described above.

[00180] At block 1304, the subscription data storage entity sends the access restriction or RAT restriction data associated with the UE to a first access management entity of a network. The subscription data storage entity may send the access restriction or RAT restriction data associated with the UE to the first access management entity of the network in various ways, for example, in response to a restriction data request or a subscription request from the first access management entity or a change of the restriction data.

[00181] FIG. 13b shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a subscription data entity. As such, the apparatus may provide means or modules for accomplishing various parts of the method 1300’ as well as means or modules for accomplishing other processes in conjunction with other components. The subscription data entity can be any suitable information storage device such as HSS or UDM as shown in FIGs.1-2. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00182] At block 1302’, the subscription data entity obtains access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE). The access restriction or RAT restriction data indicates that LTE-M is restricted for the UE.

[00183] At block 1304’, the subscription data entity sends the access restriction or RAT restriction data associated with the UE to a first access management entity of a network. [00184] In an embodiment, when the LTE-M RAT type is indicated as restriction and the RAT type currently used by the UE is the LTE-M RAT type, the UE is not allowed to attach or register to the network.

[00185] In an embodiment, the first access management entity is a mobility management entity (MME) and the subscription data storage entity is a home subscriber server (HSS), the HSS may receive an update location request from the MME as shown in step 604 of FIG.6 and sending an update location answer including the access restriction or RAT restriction data associated with the UE to the MME as shown in step 606 of FIG.6.

[00186] In an embodiment, the update location request may include information indicating that the MME supports restriction related to the LTE-M RAT type and the update location answer may include information indicating that the HSS supports restriction related to the LTE-M RAT type. [00187] In an embodiment, the first access management entity is a mobility management entity (MME) and the subscription data storage entity is a home subscriber server (HSS), the HSS may determine a change of the restriction related to the LTE-M RAT type as shown in step 702 of FIG.7; and send an insert subscriber data request including the access restriction or RAT restriction data associated with the UE to the MME as shown in step 704 of FIG.7.

[00188] In an embodiment, the insert subscriber data request may include information indicating that the HSS supports restriction related to the LTE-M RAT type and the insert subscriber data answer may include information indicating that the MME supports restriction related to the LTE-M RAT type.

[00189] In an embodiment, the first access management entity is an access and mobility function (AMF) and the subscription data storage entity is a unified data management (UDM), the UDM may receive a Nudm SDM get request from AMF as shown in step 808a of FIG.8; and send a Nudm SDM get response including the access restriction or RAT restriction data associated with the UE to the AMF as shown in step 808b of FIG.8.

[00190] In an embodiment, the first access management entity is an access and mobility function (AMF) and the subscription data storage entity is a unified data management (UDM), the UDM may determine a change of the restriction related to the LTE-M RAT type as shown in step 902 of FIG.9; and send an Nudm SDM Notifi cation including the access restriction or RAT restriction data associated with the UE to the AMF as shown in step 904 of FIG.9.

[00191] In an embodiment, the access restriction or RAT restriction data may further include second information indicating whether a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted.

[00192] In an embodiment, the first information may be a bit and the second information may be a bit. [00193] FIG. 14a shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a second access management entity. As such, the apparatus may provide means or modules for accomplishing various parts of the method 1400 as well as means or modules for accomplishing other processes in conjunction with other components. The subscription data storage entity can be any suitable access management entity such as AMF or MME as shown in FIGs.1-2. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00194] At block 1402, the second access management entity may receive a request for getting a context of a UE from a first access management entity of a network. For example, the old MME or AMF may receive the request for getting the context of the UE from the first access management entity of the network such as new MME or AMF as shows in FIGs. 10-12.

[00195] At block 1404, the second access management entity may send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. For example, the old MME or AMF may send the response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity such as new MME or AMF as shows in FIGs. 10-12. In an embodiment, the access restriction or RAT restriction data may include first information indicating whether a LTE-M RAT type is restricted.

[00196] FIG. 14b shows a flowchart of a method according to another embodiment of the present disclosure, which may be performed by an apparatus implemented in/at or communicatively coupled to a second access management entity. As such, the apparatus may provide means or modules for accomplishing various parts of the method 1400’ as well as means or modules for accomplishing other processes in conjunction with other components. The subscription data storage entity can be any suitable access management entity such as AMF or MME as shown in FIGs.1-2. For some parts which have been described in the above embodiments, the description thereof is omitted here for brevity.

[00197] At block 1402’, the second access management entity may receive a request for getting a context of a UE from a first access management entity of a network.

[00198] At block 1404’, the second access management entity may send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. The access restriction or RAT restriction data may indicate that LTE-M RAT type is restricted. [00199] In an embodiment, the first access management entity is a new mobility management entity (MME) and the second access management entity is an old MME or an old access and mobility function (AMF), the request is a context request and the response is a context response. [00200] In an embodiment, the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old access and mobility function (AMF), the request is an Namf Communication UEContextTransfer request and the response is an Namf Communication UEContextTransfer response.

[00201] In an embodiment, the first access management entity is a new access and mobility function (AMF) and the second access management entity is an old mobility management entity (MME), the request is a context request and the response is a context response.

[00202] In an embodiment, the access restriction or RAT restriction data may further include second information indicating whether a WB-E-UTRAN RAT type excludes the LTE-M RAT is restricted. In an embodiment, the first information may be a bit and the second information may be a bit.

[00203] FIG. 15 is a block diagram showing an apparatus suitable for use in practicing some embodiments of the disclosure. For example, any one of the first access management entity (such as AMF or MME) or the second access management entity (such as AMF or MME) or the subscription data entity (such as HSS or UDM) as described above may be implemented through the apparatus 1500.

[00204] The apparatus 1500 comprises at least one processor 1521, such as a DP, and at least one MEM 1522 coupled to the processor 1521. The apparatus 1520 may further comprise a transmitter TX and receiver RX 1523 coupled to the processor 1521. The MEM 1522 stores a PROG 1524. The PROG 1524 may include instructions that, when executed on the associated processor 1521, enable the apparatus 1520 to operate in accordance with the embodiments of the present disclosure. A combination of the at least one processor 1521 and the at least one MEM 1522 may form processing means 1525 adapted to implement various embodiments of the present disclosure.

[00205] Various embodiments of the present disclosure may be implemented by computer program executable by one or more of the processor 1521, software, firmware, hardware or in a combination thereof.

[00206] The MEM 1522 may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as semiconductor based memory devices, magnetic memory devices and systems, optical memory devices and systems, fixed memories and removable memories, as non-limiting examples. [00207] The processor 1521 may be of any type suitable to the local technical environment, and may include one or more of general purpose computers, special purpose computers, microprocessors, digital signal processors DSPs and processors based on multicore processor architecture, as non-limiting examples.

[0001] In an embodiment where the apparatus is implemented as or at the first access management entity (such as AMF or MME), the memory 1522 contains instructions executable by the processor 1521, whereby the first access management entity operates according to any of the methods related to the first access management entity as described above.

[0002] In an embodiment where the apparatus is implemented as or at the second access management entity (such as AMF or MME), the memory 1522 contains instructions executable by the processor 1521, whereby the second access management entity operates according to any of the methods related to the second access management entity as described above.

[0003] In an embodiment where the apparatus is implemented as or at the subscription data entity, the memory 1522 contains instructions executable by the processor 1521, whereby the subscription data entity operates according to any of the methods related to the subscription data entity as described above.

[0004] FIG. 16a is a block diagram showing a first access management entity of a network according to an embodiment of the disclosure. As shown, the first access management entity 1600 comprises a determining module 1602, an obtaining module 1604 and a deciding module 1606. The determining module 1602 may be configured to determine a radio access technology (RAT) type currently used by a user equipment (UE). The obtaining module 1604 may be configured to obtain access restriction or RAT restriction data associated with the UE. The access restriction or RAT restriction data may include first information indicating whether an LTE-M RAT type is restricted. The deciding module 1606 may be configured to decide whether the UE is allowed to attach or register to the network based on the RAT type currently used by the UE and the access restriction or RAT restriction data associated with the UE.

[0005] FIG. 16b is a block diagram showing a first access management entity of a network according to another embodiment of the disclosure. As shown, the first access management entity 1600’ comprises a first determining module 1602’, an obtaining module 1604’ and a second determining module 1606’. The first determining module 1602’ may be configured to determine that a user equipment (UE) is using LTE-M radio access technology (RAT). The obtaining module 1604’ may be configured to obtain access restriction or RAT restriction data associated with the UE, wherein the access restriction or RAT restriction data indicates that LTE-M RAT type is restricted. The second determining module 1606’ may be configured to determine whether the UE using LTE-M is allowed to attach or register to the network based on the obtained access restriction or RAT restriction data associated with the UE.

[0006] FIG. 17a is a block diagram showing a subscription data storage entity according to an embodiment of the disclosure. As shown, the subscription data storage entity 1700 comprises an obtaining module 1702 and a sending module 1704. In another embodiment, the obtaining module 1702 may be configured to obtain access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE). The sending module 1704 may be configured to send the access restriction or RAT restriction data associated with the UE to a first access management entity of a network. The access restriction or RAT restriction data may include first information indicating whether an LTE-M RAT type is restricted.

[0007] In another embodiment, the obtaining module 1702 may be configured to obtain access restriction or radio access technology (RAT) restriction data associated with a user equipment (UE), wherein the access restriction or RAT restriction data indicates that LTE-M is restricted for the UE. The sending module 1704 may be configured to send the access restriction or RAT restriction data associated with the UE to a first access management entity of a network.

[0008] FIG. 18 is a block diagram showing a second access management entity according to an embodiment of the disclosure. As shown, the second access management entity 1800 comprises a receiving module 1802 and a sending module 1804. The receiving module 1802 may be configured to receive a request for getting a context of a user equipment (UE) from a first access management entity of a network. The sending module 1804 may be configured to send a response including access restriction or radio access technology (RAT) restriction data associated with the UE to the first access management entity. In an embodiment, the access restriction or RAT restriction data may include first information indicating whether an LTE-M RAT type is restricted. In another embodiment, the access restriction or RAT restriction data may include first information indicating whether an LTE-M RAT type is restricted.

[0009] According to an aspect of the disclosure it is provided a computer program product being tangibly stored on a computer readable storage medium and including instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods related to the first access management entity as described above.

[0010] According to an aspect of the disclosure it is provided a computer program product being tangibly stored on a computer readable storage medium and including instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods related to the second access management entity as described above.

[0011] According to an aspect of the disclosure it is provided a computer program product being tangibly stored on a computer readable storage medium and including instructions which, when executed on at least one processor, cause the at least one processor to carry out any of the methods related to the subscription data storage entity or the subscription data entity as described above. [0012] According to an aspect of the disclosure it is provided a computer-readable storage medium storing instructions which when executed by at least one processor, cause the at least one processor to carry out any of the methods related to the first access management entity as described above.

[0013] According to an aspect of the disclosure it is provided a computer-readable storage medium storing instructions which when executed by at least one processor, cause the at least one processor to carry out any of the methods related to the second access management entity as described above.

[0014] According to an aspect of the disclosure it is provided a computer-readable storage medium storing instructions which when executed by at least one processor, cause the at least one processor to carry out any of the methods related to the subscription data storage entity or the subscription data entity as described above.

[0015] Embodiments herein afford many advantages, of which a non-exhaustive list of examples follows. Some embodiments herein may provide the flexibility for operator to define its access restriction rule more accurately, especially for LTE-M, which can enable the operator to exactly control the usage of LTE-M and to provide a simple billing policy (e.g., a data plan per month with fixed price) for CAT-M subscription without complicating the charging logic. The embodiments herein are not limited to the features and advantages mentioned above. A person skilled in the art will recognize additional features and advantages upon reading the following detailed description.

[0016] In addition, the present disclosure may also provide a carrier containing the computer program as mentioned above, wherein the carrier is one of an electronic signal, optical signal, radio signal, or computer readable storage medium. The computer readable storage medium can be, for example, an optical compact disk or an electronic memory device like a RAM (random access memory), a ROM (read only memory), Flash memory, magnetic tape, CD-ROM, DVD, Blue-ray disc and the like.

[0017] The techniques described herein may be implemented by various means so that an apparatus implementing one or more functions of a corresponding apparatus described with an embodiment comprises not only prior art means, but also means for implementing the one or more functions of the corresponding apparatus described with the embodiment and it may comprise separate means for each separate function, or means that may be configured to perform two or more functions. For example, these techniques may be implemented in hardware (one or more apparatuses), firmware (one or more apparatuses), software (one or more modules), or combinations thereof. For a firmware or software, implementation may be made through modules (e.g., procedures, functions, and so on) that perform the functions described herein.

[0018] Exemplary embodiments herein have been described above with reference to block diagrams and flowchart illustrations of methods and apparatuses. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.

[0019] Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are contained in the above discussions, these should not be construed as limitations on the scope of the subject matter described herein, but rather as descriptions of features that may be specific to particular embodiments. Certain features that are described in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment may also be implemented in multiple embodiments separately or in any suitable sub-combination.

[0020] While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any implementation or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular implementations. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.

[0021] It will be obvious to a person skilled in the art that, as the technology advances, the inventive concept can be implemented in various ways. The above described embodiments are given for describing rather than limiting the disclosure, and it is to be understood that modifications and variations may be resorted to without departing from the spirit and scope of the disclosure as those skilled in the art readily understand. Such modifications and variations are considered to be within the scope of the disclosure and the appended claims. The protection scope of the disclosure is defined by the accompanying claims.