Method and apparatus for providing information for vehicle communication services

ABSTRACT

A method, performed by an access and mobility management function (AMF), of providing information for a vehicle-to-everything (V2X) service is provided. The method includes receiving, from a user equipment (UE), a registration request message including information indicating that the UE is a V2X terminal, selecting, based on the registration request message, a policy control function (PCF) supporting the V2X service, receiving V2X policy information from the selected PCF, and providing the V2X policy information to a base station.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation application of prior application Ser.No. 16/587,448, filed on Sep. 30, 2019, which application is based onand claims priority under 35 U.S.C. § 119(a) of a Korean patentapplication number 10-2018-0119316, filed on Oct. 5, 2018, in the KoreanIntellectual Property Office, the disclosure of which is incorporated byreference herein in its entirety.

BACKGROUND 1. Field

The disclosure relates to methods and apparatuses for providingvehicle-to-everything (V2X) services in a 5th generation (5G) mobilecommunication system.

2. Description of Related Art

Efforts have been made to develop an improved 5th generation (5G)communication system or pre-5G communication system to keep up withgrowing wireless data traffic demands after commercialization of 4thgeneration (4G) communication systems. For this reason, the 5G or pre-5Gcommunication system is called a beyond 4G network communication systemor post long-term evolution (LTE) system.

Implementation of 5G communication systems in an ultra-high frequency(millimeter wave (mmW)) band, such as a 60-GHz band, is underconsideration to achieve high data rates. To mitigate path loss andincrease transmission distance during radio wave propagation in anultra-high frequency band for 5G communication systems, varioustechnologies such as beamforming, massive multiple-input multiple-output(MIMO), full dimensional MIMO (FD-MIMO), array antennas, analogbeamforming, and large-scale antennas are being studied.

Furthermore, to improve system networks for 5G communication systems,various technologies including evolved small cells, advanced smallcells, cloud radio access network (Cloud-RAN), ultra-dense networks,device to device (D2D) communication, wireless backhaul, movingnetworks, cooperative communication, coordinated multi-points (CoMP),and interference cancellation are currently being developed.Furthermore, for 5G systems, advanced coding modulation (ACM) schemessuch as Hybrid Frequency-Shift Keying (FSK) and Quadrature AmplitudeModulation (QAM) Modulation (FQAM) and Sliding Window SuperpositionCoding (SWSC) and advanced access techniques such as Filter BankMulticarrier (FBMC), non-orthogonal multiple access (NOMA), sparse codemultiple access (SDMA), etc. are being developed.

In a 5G system, compared to an existing 4G system, support for variousservices is considered. For example, the most representative services ofthe 5G system may include an enhanced mobile broadband (eMBB) service,an ultra-reliable and low latency communication (URLLC) service, amassive machine type communication (mMTC) service, a next-generationbroadcasting service such as evolved multimedia broadcast/multicastservice (eMBMS), etc. A system for providing the URLLC service and asystem for providing the eMBB service may be respectively referred to asa URLLC system and an eMBB system. The terms “service” and “system” maybe used interchangeably.

The URLLC service is considered to be newly used in the 5G system,unlike in the existing 4G system, and needs to fulfill ultra-highreliability (with a packet error rate of about 10⁻⁵) and low latency(e.g., about 0.5 msec) requirements, compared to other services. To meetthese strict requirements, the URLLC service may require application ofa transmission time interval (TTI) shorter than that of the eMBBservice, and various operation methods using the URLLC service are beingconsidered.

The Internet has evolved from a human-centered connection network, inwhich humans create and consume information, to the Internet of things(IoT) network in which dispersed components such as objects exchangeinformation with one another to process the information. The Internet ofEverything (TOE) technology has emerged, in which the IoT technology iscombined with, for example, technology for processing big data throughconnection with a cloud server. To implement the IoT, technologies suchas a sensing technique, a wired/wireless communication and networkinfrastructure, a service interface technology, and a securitytechnology are required. Research has recently been conducted intotechnologies such as sensor networks for interconnecting objects,machine to machine (M2M) communication, and machine type communication(MTC). In the IoT environment, intelligent Internet technology servicesmay be provided to create new values for a human life by collecting andanalyzing data obtained from interconnected objects. The IoT can beapplied to various fields such as smart home, smart building, smartcity, smart car or connected car, smart grid, health care, smart homeappliance, advanced medical service through convergence and integrationbetween existing information technology (IT) and various industries.

Various attempts are being made to apply a 5G communication system tothe IoT network. For example, sensor networks, M2M communication, andMTC technologies are implemented using 5G communication technologiesincluding beamforming, MIMO, and array antennas. The application of theabove-described Cloud RAN as a big data processing technique is anexample of convergence between the 5G and IoT technologies.

Because various services may be provided due to the aforementionedtechnical features and the development of mobile communication systems,there is a need for a method of effectively performing vehiclecommunication.

The above information is presented as background information only toassist with an understanding of the disclosure. No determination hasbeen made, and no assertion is made, as to whether any of the abovemight be applicable as prior art with regard to the disclosure.

SUMMARY

Aspects of the disclosure are to address at least the above-mentionedproblems and/or disadvantages and to provide at least the advantagesdescribed below. Accordingly, an aspect of the disclosure is to providea method of effectively providing a vehicle-to-everything (V2X) serviceto a terminal in a V2X system.

Additional aspects will be set forth in part in the description whichfollows and, in part, will be apparent from the description, or may belearned by practice of the presented embodiments.

In accordance with an aspect of the disclosure, a method, performed byan access and mobility management function (AMF), of providinginformation for a vehicle-to-everything (V2X) service is provided. Themethod includes receiving, from a user equipment (UE), a registrationrequest message including information indicating that the UE is a V2Xterminal, selecting, based on the registration request message, a policycontrol function (PCF) supporting the V2X service, receiving V2X policyinformation from the selected PCF, and providing the V2X policyinformation to a base station.

The method may further include establishing a policy association withthe selected PCF.

The method may further include determining, based on subscriptioninformation received from user data management (UDM), whether the UE isallowed to receive the V2X service, wherein the subscription informationmay include authorization information indicating whether the UE isauthorized to use the V2X service.

The providing of the V2X policy information to the base station mayinclude providing the V2X policy information to the base station byusing a next-generation application protocol (NGAP).

The selecting of the PCF may include transmitting a message requesting anetwork repository function (NRF) to discover a PCF supporting the V2Xservice, receiving information about the PCF from the NRF, and selectingthe PCF discovered by the NRF, and the message requesting the discoveryof the PCF may include an indication of support of the V2X service.

The method may further include receiving updated V2X policy informationfrom the PCF, storing the updated V2X policy information as part ofcontext information of the UE, and providing the updated V2X policyinformation to the base station.

The V2X policy information provided to the base station may include atleast one of quality of service (QoS) parameter information or V2Xauthorization information, and the QoS parameter information may includeat least one of identification information of the V2X service or a PC5QoS parameter.

In accordance with another aspect of the disclosure, a method, performedby a PCF, of providing information for a V2X service is provided. Themethod includes generating V2X policy information, establishing policyassociation with an AMF, and providing the generated V2X policyinformation to the AMF.

The V2X policy information may include at least one of QoS parameterinformation or V2X authorization information, and the QoS parameterinformation may include at least one of identification information ofthe V2X service or a PC5 QoS parameter.

The method may further include updating the V2X policy information, andproviding the updated V2X policy information to the AMF.

In accordance with another aspect of the disclosure, an AMF forproviding information for a V2X service is provided. The AMF includes atransceiver and a processor combined with the transceiver and configuredto receive, from a UE, a registration request message includinginformation indicating that the UE is a V2X terminal, select, based onthe registration request message, a PCF supporting the V2X service,receive V2X policy information from the selected PCF, and provide theV2X policy information to a base station.

The processor may be further configured to establish policy associationwith the selected PCF.

The processor may be further configured to determine, based onsubscription information received from UDM, whether the UE is allowed toreceive the V2X service, wherein the subscription information includesauthorization information indicating whether the UE is authorized to usethe V2X service.

The processor may be further configured to provide the V2X policyinformation to the base station by using a NGAP.

The processor may be further configured to transmit a message requestinga NRF to discover a PCF supporting the V2X service, receive informationabout the PCF from the NRF, and select the PCF discovered by the NRF,and the message requesting the discovery of the PCF may include anindication of support of the V2X service.

The processor may be further configured to receive updated V2X policyinformation from the PCF, store the updated V2X policy information aspart of context information of the UE, and provide the updated V2Xpolicy information to the base station.

The V2X policy information provided to the base station may include atleast one of QoS parameter information or V2X authorization information,and the QoS parameter information may include at least one ofidentification information of the V2X service or a PC5 QoS parameter.

In accordance with another aspect of the disclosure, a PCF for providinginformation for a V2X service is provided. The PCF includes atransceiver and a processor electrically connected to the transceiverand configured to generate V2X policy information, establish policyassociation with an AMF, and provide the generated V2X policyinformation to the AMF.

The processor may be further configured to update the V2X policyinformation and provide the updated V2X policy information to the AMF.

Other aspects, advantages, and salient features of the disclosure willbecome apparent to those skilled in the art from the following detaileddescription, which, taken in conjunction with the annexed drawings,discloses various embodiments of the disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the disclosure will be more apparent from the followingdescription taken in conjunction with the accompanying drawings, inwhich:

FIG. 1 illustrates a method, performed by an access and mobilitymanagement function (AMF), of obtaining a policy for avehicle-to-everything (V2X) service including authorization informationand quality-of-service (QoS) information and transmitting the obtainedpolicy to a base station (BS) and a user equipment (UE) when the UEperforms registration with a 5th generation (5G) system, according to anembodiment of the disclosure;

FIG. 2 illustrates a process whereby a terminal obtains a V2X serviceparameter from a network, according to an embodiment of the disclosure;

FIG. 3 illustrates a communication protocol stack supported by aterminal, according to an embodiment of the disclosure;

FIG. 4 illustrates a configuration of a terminal according to anembodiment of the disclosure; and

FIG. 5 illustrates a configuration of a network function (NF) accordingto an embodiment of the disclosure.

Throughout the drawings, like reference numerals will be understood torefer to like parts, components, and structures.

DETAILED DESCRIPTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of variousembodiments of the disclosure as defined by the claims and theirequivalents. It includes various specific details to assist in thatunderstanding, but these are to be regarded as merely exemplary.Accordingly, those of ordinary skill in the art will recognize thatvarious changes and modifications of the various embodiments describedherein can be made without departing from the scope and spirit of thedisclosure. In addition, descriptions of well-known functions andconstructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are notlimited to the bibliographical meanings, but are merely used by theinventor to enable a clear and consistent understanding of thedisclosure. Accordingly, it should be apparent to those skilled in theart that the following description of various embodiments of thedisclosure is provided for illustration purposes only and not for thepurpose of limiting the disclosure as defined by the appended claims andtheir equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

Throughout the disclosure, the expression “at least one of a, b or c”indicates only a, only b, only c, both a and b, both a and c, both b andc, all of a, b, and c, or variations thereof.

In the disclosure, a controller may also be referred to as a processor.

Throughout the specification, a layer (or a layer apparatus) may also bereferred to as an entity.

Hereinafter, operation principles of the disclosure will be described indetail with reference to the accompanying drawings. In the followingdescription of the disclosure, known functions or configurations are notdescribed in detail because they would obscure the essence of thedisclosure with unnecessary detail. Furthermore, the terms used hereinare defined by taking functions described in the disclosure into accountand may be changed according to a user's or operator's intent or custom.Therefore, definition of the terms should be made based on the overalldescription of the disclosure.

Similarly, in the accompanying drawings, some components areexaggerated, omitted, or schematically illustrated. Furthermore, thesize of each element does not entirely reflect an actual size thereof.In the drawings, like reference numerals refer to the same orcorresponding elements throughout.

The disclosure will be more readily appreciated by referring to thefollowing description of embodiments of the disclosure and theaccompanying drawings. However, the disclosure may be embodied in manydifferent forms and should not be construed as being limited to theembodiments of the disclosure set forth herein. Rather, the embodimentsof the disclosure are provided so that the disclosure will be thoroughand complete and will fully convey the concept of the disclosure tothose of ordinary skill in the art, and the disclosure will only bedefined by the appended claims. Throughout the specification, likereference numerals refer to like elements.

It will be understood that each block of the flowchart in the drawingsand combinations of blocks of the flowchart may be performed by computerprogram instructions. These computer program instructions may be loadedinto a processor of a general-purpose computer, special-purposecomputer, or other programmable data processing equipment, and thus, theinstructions performed via the processor of the computer or otherprogrammable data processing equipment create a means for performingfunctions specified in the flowchart block(s). The computer programinstructions may also be stored in a computer-usable orcomputer-readable memory capable of directing a computer or anotherprogrammable data processing apparatus to implement functions in aspecific manner, and thus, the instructions stored in thecomputer-usable or computer-readable memory may produce an article ofmanufacture including the instruction means for performing the functionsdescribed in the flowchart block(s). The computer program instructionsmay also be loaded into a computer or another programmable dataprocessing apparatus, and thus, instructions for operating the computeror the other programmable data processing apparatus by generating acomputer-executed process when a series of operations are performed inthe computer or the other programmable data processing apparatus mayprovide operations for performing the functions described in theflowchart block(s).

In addition, each block may represent a portion of a module, segment, orcode that includes one or more executable instructions for executingspecified logical function(s). It is also noted that, in somealternative implementations, functions mentioned in blocks may occur outof order. For example, two consecutive blocks may also be executedsimultaneously or in reverse order depending on functions correspondingthereto.

As used herein, the term “unit” denotes a software element or a hardwareelement such as a field-programmable gate array (FPGA) or anapplication-specific integrated circuit (ASIC), and performs a certainfunction. However, the term “unit” is not limited to software orhardware. The “unit” may be formed so as to be in an addressable storagemedium, or may be formed so as to operate one or more processors. Thus,for example, the term “unit” may include elements (e.g., softwareelements, object-oriented software elements, class elements, and taskelements), processes, functions, attributes, procedures, subroutines,segments of program code, drivers, firmware, micro-codes, circuits,data, a database, data structures, tables, arrays, or variables.Functions provided by the elements and “units” may be combined into thesmaller number of elements and “units”, or may be divided intoadditional elements and “units”. Furthermore, the elements and “units”may be embodied to reproduce one or more central processing units (CPUs)in a device or security multimedia card. In addition, according to anembodiment of the disclosure, the “unit” may include one or moreprocessors.

In the following descriptions of the disclosure, well-known functions orconfigurations are not described in detail because they would obscurethe disclosure with unnecessary details. Embodiments of the disclosurewill be described in detail below with reference to the accompanyingdrawings.

As used in the following description, terms identifying access nodes,terms indicating network entities, terms indicating messages, termsindicating interfaces between network entities, terms indicating varioustypes of identification information, etc. are exemplified forconvenience of explanation. Accordingly, the disclosure is not limitedto terms to be described later, and other terms representing objectshaving the equivalent technical meaning may be used.

Hereinafter, for convenience of description, the disclosure uses termsand names defined in the 3^(rd) Generation Partnership Project Long TermEvolution (3GPP LTE) specifications. However, the disclosure is notlimited to the terms and names but may also be identically applied tosystems that comply with other standards. In the disclosure, evolvedNodeB (eNB) may be used interchangeably with next-generation NodeB (gNB)for convenience. For example, a base station (BS) described as eNB mayrepresent a gNB.

Hereinafter, a BS is an entity that allocates resources to a terminal,and may be at least one of a gNode B, an eNode B, a Node B, a BS, awireless access unit, a BS controller, or a network node. A terminal mayinclude a user equipment (UE), a mobile station (MS), a cellular phone,a smart phone, a computer, or a multimedia system capable of performinga communication function, but is not limited thereto.

In particular, the disclosure may be applied to the 3GPP New Radio (NR)(the 5th mobile communications standard). Furthermore, the disclosuremay be applied to intelligent services (e.g., smart home, smartbuilding, smart city, smart car or connected car, health care, digitaleducation, retail business, security and safety related service, etc.)based on the 5G communication technology and the Internet of Things(IoT) related technology. In the disclosure, eNB may be usedinterchangeably with gNB for convenience. For example, a BS described aseNB may represent a gNB. Furthermore, the term ‘terminal’ may refer to amobile phone, NB-IoT devices, sensors, and other wireless communicationdevices.

Although embodiments of the disclosure are hereinafter described withrespect to an LTE, LTE-Advanced (LTE-A), LTE Pro, or 5G (or NR asnext-generation mobile communication) system, the embodiments of thedisclosure may be applied to other communication systems having similartechnical backgrounds and channel configurations. Furthermore, it shouldbe understood by those skilled in the art that the embodiments of thedisclosure are applicable to other communication systems thoughmodifications not departing from the scope of the disclosure.

Efforts have been made towards developing an improved 5G communicationsystem (NR) to meet increasing demands for wireless data traffic aftercommercialization of 4th Generation (4G) communication systems. Toachieve high data rates, 5G communication systems have been designed touse a resource in an ultra-high frequency (millimeter wave (mmW)) band(such as a 28 GHz band). To mitigate path loss and increase transmissiondistance during radio wave propagation in the ultra-high frequency bandfor 5G communication systems, technologies including beamforming,massive multiple-input multiple-output (MIMO), full dimensional MIMO(FD-MIMO), array antennas, analog beamforming, and large-scale antennasare being studied. Furthermore, unlike LTE systems, 5G communicationsystems support various subcarrier spacings of 15 kHz, 30 kHz, 60 kHz,and 120 kHz, and a physical control channel and a physical data channelfor a 5G communication system respectively utilize polar coding and lowdensity parity check (LDPC). In addition, discrete Fourier transformspread orthogonal frequency-division multiplexing (DFT-S-OFDM) as wellas cyclic prefix OFDM (CP-OFDM) is used as a waveform for uplinktransmission. LTE may support hybrid automatic repeat request (hybridARG or HARQ) retransmission based on a transport block (TB), while 5Gmay support code block group (CBG)-based HARQ retransmission in additionto the HARG retransmission based on the transport block.

Furthermore, to improve system networks for 5G communication systems,various technologies including evolved small cells, advanced smallcells, cloud radio access network (Cloud-RAN), ultra-dense networks,device to device (D2D) communication, wireless backhaul, movingnetworks, cooperative communication, coordinated multi-points (CoMP),and interference cancellation are currently being developed.

As described above, a 5G communication system may provide a plurality ofservices to a user, and a method capable of providing each servicewithin the same time period according to desired characteristics and anapparatus employing the method are required to provide the plurality ofservices to the user. Various services provided by the 5G communicationsystem have been studied and one of the services is a service that meetslow latency and high reliability requirements.

Vehicle-to-everything (V2X) is a general term referring to all types ofcommunication schemes applicable to vehicles on the road, and enablevarious supplementary services in addition to initial safety-related usecases in line with advancement in wireless communication technologies.

A wireless access in vehicular environments (WAVE) standard based onInstitute of Electrical and Electronics Engineers (IEEE) 802.11p andIEEE P1609 has been standardized as a technology for providing V2Xservices. However, a WAVE technology that is a type of dedicated shortrange communication (DSRC) technology has a limitation in terms of amessage delivery distance between vehicles.

To overcome the limitation, discussions on a cellular based V2X standardare ongoing at 3GPP. A LTE-based 4G V2X standard is completed in Release14, and discussions on a 5G V2X standard based on NR (hereinafter,referred to as “NR” or “5G”) are ongoing in Release 16.

According to an embodiment of the disclosure, in a 3GPP-based V2Xsystem, a BS needs to know authorization information (or authenticationinformation) indicating whether a terminal is authorized to use a V2Xservice. When the terminal requests V2X communication requiring anetwork assistance, the BS may determine whether to provide radioresources to the terminal based on the authorization information.Furthermore, in the 3GPP-based V2X system, quality-of-service (QoS)information needed for the terminal to use the V2X service needs to betransmitted to the BS. The BS may compare, based on the received QoSinformation, QoS required by the terminal with QoS set by the network todetermine an appropriate QoS value and then provide radio resources tothe terminal.

According to an embodiment of the disclosure, in the 3GPP-based V2Xsystem, the terminal needs to be aware of the QoS information that isusable when using the V2X service. The terminal may transmit data bysetting, based on the QoS information, one of QoS values that isavailable according to the type of data requested by a V2X application.

According to an embodiment of the disclosure, an access and mobilitymanagement function (AMF) may receive policy information for V2Xcommunication from a network entity for providing a policy for V2Xcommunication (i.e., authorization information and QoS information). TheAMF may also determine at least one parameter value for a vehiclecommunication service based on a message related to the policyinformation.

According to an embodiment of the disclosure, the BS may receive via theAMF the message related to the policy information from a network entityfor providing the policy for V2X communication. The BS may determine atleast one parameter value for a vehicle communication service based on apolicy-related message.

According to an embodiment of the disclosure, the terminal may receivepolicy information for a terminal related to a vehicle communicationservice. The terminal may use or perform the vehicle communicationservice based on the at least one parameter value.

According to an embodiment of the disclosure, when a policy for avehicle communication service is changed, the BS or terminal may receivean update about policy information from a network entity providing thepolicy for the vehicle communication service.

Technical problems to be solved in the disclosure are not limited toabove-described technical problems. And, other technical problems thatare not described herein can be clearly understood from the followingdescription by those of ordinary skill in the art.

FIG. 1 illustrates a method, performed by an AMF, of obtaining a policyfor a V2X service including authorization information and QoSinformation and transmitting the obtained policy to a BS and a UE whenthe UE performs registration with a 5G system, according to anembodiment of the disclosure.

Entities specified in the disclosure will now be described withreference to FIGS. 1 and 2 .

Referring to FIG. 1 , a UE (or terminal) is connected to a NG-RAN toaccess a device that performs a mobility management function of a 5Gcore network device. In the disclosure, the device will be referred toas an AMF. The AMF may refer to a function, an entity, or a device thatis in charge of both access to the RAN and mobility management of theUE.

A Policy Control Function or Policy & Charging Function (PCF) maycontrol policy and charging related information for a session, which isused by the UE. A Network Repository Function (NRF) stores informationabout network functions (NFs) installed in a mobile operator's networkand provides the information about NFs installed therein. The NRF may beconnected to all NFs, and when each NF starts running on an operator'snetwork, the NF performs registration with the NRF such that the NRFdiscovers that the NF is running on the operator's network.

A V2X Control Function (V2X CF) manages and controls a policy andauthentication/authorization information for a V2X service. The V2X CFhas overall control information for a V2X service used by a network orUE and may serve to provide the overall control information to eachentity in the network. V2X service parameters may include authenticationinformation or authorization information, radio parameter informationnecessary for receiving a V2X service when a UE is located out ofnetwork coverage, and policy parameter information necessary forproviding a V2X service. However, the V2X service parameters are notlimited thereto.

According to an embodiment of the disclosure, a V2X application server(AS) may provide the policy and authentication/authorization informationto the V2X CF. Furthermore, the V2X CF may directly generate policy andauthentication/authorization information and acquire the same from NFs.

The authentication/authorization information managed by the V2X AS mayinclude information about whether the UE is a terminal that is able touse a service provided by the V2X AS, information indicating whichservice is to be used among the services provided by the V2X AS when theUE is able to use a service provided by the V2X AS, information aboutwhether the UE is able to use a V2X service based on D2D communication,information about whether the UE is able to use a V2X service based onmulticast/broadcast communication (such as multimediabroadcast/multicast service (MBMS)), information about whether the UE isable to use the V2X service based on the D2D communication in areasoutside network coverage, a list of mobile operators (such as publicland mobile network (PLMN), etc. However, theauthentication/authorization information is not limited thereto.

According to an embodiment of the disclosure, the information indicatingwhich service is to be used among the services provided by the V2X ASmay include whether the UE is able to use a vehicle-to-pedestrian (V2P)service, whether the UE is able to use a vehicle-to-infrastructure (V21)service, and whether the UE is able to use all V2X services provided bythe V2X AS. Furthermore, the information indicating which service is tobe used among the services provided by the V2X AS may include identifier(ID) information of a service that is accessible from the UE based on aservice ID (e.g., provider service ID (PSID) or intelligent transportsystem (ITS); application object ID (ITS-AID)) mapped to each V2Xservice. However, such information is not limited thereto.

According to an embodiment of the disclosure, radio parameterinformation necessary for receiving a V2X service when a UE managed bythe V2X AS is located outside network coverage may include radiofrequency information and information about an area that a radiofrequency is available to be used. When the UE is located outsidenetwork coverage, the UE may receive a V2X service by using prestoredradio parameter information. However, embodiments of the disclosure arenot limited thereto.

According to an embodiment of the disclosure, policy parameterinformation necessary for providing a V2X service managed by the V2X ASmay be a service ID (e.g., PSID or ITS-AID) indicating a V2X service andits corresponding destination layer-2 ID, packet priority information(e.g., ProSe Per-Packet Priority (PPPP), etc.) and a correspondingpacket delay budget information, a list of V2X services requiringprivacy, a V2X service type (e.g., vehicle-to-vehicle (V2V), V2P, V21,or vehicle-to-nomadic (V2N)), or an ID of a V2X service (e.g., PSID orITS-AID) and information about a V2X frequency that can be supported bythe V2X service. However, the policy parameter information is notlimited thereto.

User Data Management, or Unified Data Management (UDM) performs the samefunction as a home subscriber server (HSS) in a 4G network. The UDM maystore subscription information of a UE or a context used by the UEwithin a network. The UDM, PCF, AMF, and NRF are interconnected via aservice based interface, and UDM, PCF, AMF, and NRF exchange controlmessages with one another such that a service (or applicationprogramming interface (API) provided by each NF is used by other NFs.NFs define their supportable services which are respectively indicatedby Nudm, Npcf, Namf, Nnrf, etc. in the standard.

For convenience, the disclosure uses terms and names defined in the 3GPPspecification document. However, the disclosure is not limited to theterms and names but may also be identically applied to systems thatcomply with other specifications.

Although the embodiments of the disclosure are mainly described withrespect to communication specifications defined in the 3GPP, it will beunderstood by those skilled in the art that a main feature of thedisclosure may be applied to other communication systems having similartechnical backgrounds through a slight modification without greatlydeparting the scope of the disclosure.

Embodiment 1

FIG. 1 illustrates a method, performed by an AMF, of obtaining a policyfor a V2X service including authorization information and QoSinformation and transmitting the obtained policy to a BS and a UE whenthe UE performs registration with a 5G system, according to anembodiment of the disclosure.

FIG. 1 illustrates a method of transmitting, when a UE capable of usinga V2X service performs registration with a 5G system, information forthe V2X service of the UE received from a PCF to a BS and the UE.

Operation 1: The UE performs a registration procedure to access the 5Gsystem. After establishing a radio resource control (RRC) connectionwith the BS, the UE transmits an RRC message including a registrationrequest message that is a non-access stratum (NAS) message to be sent toan AMF. The UE may transmit the registration request message thatincludes identification information indicating that the UE itself is aV2X UE. Alternatively, the UE may transmit the registration requestmessage that includes identification information indicating its use of anetwork slice capable of supporting a V2X service. The identificationinformation indicating use of a network slice may follow the format ofnetwork slice selection assistance information (NSSAI).

Operation 2: The BS selects an AMF based on an ID of the UE, a currentlocation of the UE, or identification information of a network slice tobe used by the UE. The BS delivers to the selected AMF the registrationrequest message that is an NAS message sent by the UE in operation 1.

Operation 3: The AMF may infer an AMF that previously served the UEbased on the ID of the UE included in the registration request messagesent by the UE. The AMF may determine that there is an AMF previouslyserving the UE and request a context of the UE from the serving AMF.After receiving the context of the UE, the AMF stores the receivedcontext for use in management of the UE. The AMF determines that the UEinitially accesses the 5G system and creates a context for managing theUE.

Operation 4: The AMF performs a registration procedure to register itsmanagement of the UE with UDM. Furthermore, the AMF transmits a requestfor subscription data of the UE to the UDM and receives the subscriptiondata of the UE from the UDM. Data related to access and mobility of theUE may be included in the subscription data. For example, thesubscription data may include information about a service or networkslice available from the UE, information about whether the UE is able touse a V2X service, information indicating that the UE is a V2X UE,information about an area where the UE is able to use a V2X service,etc. Furthermore, the subscription data of the UE may includeauthentication/authorization information indicating whether the UE isauthorized to use a V2X service or information (e.g., NSSAI) about anetwork slice for V2X that is usable by the UE, and authorizationinformation about communication modes (e.g., PC5 multicast, PC5 unicast,etc.) available when the UE performs direct communication for a V2Xservice.

Operation 5: The AMF may check authentication/authorization informationindicating whether the UE is authorized to use a V2X service in thesubscription data of the UE received from the UDM and determine to allowthe UE to use the V2X service. When the registration request messagesent by the UE in operation 1 includes an ID indicating a UE's requestto use a V2X service or information about a network slice for the V2Xservice, the AMF may compare the ID or information with the subscriptiondata received in operation 4 to determine whether to provide the V2Xservice or network slice to the UE.

Operation 6: The AMF may select a PCF to receive a policy for providinga 5G service to the UE. When the AMF has not yet obtained the policy forthe UE or when the policy is no longer valid in the context of the UEheld by the AMF, the AMF may select a PCF and then perform a policyassociation establishment procedure with the selected PCF. The AMFperforms the policy association establishment procedure with the PCF andacquires related policy information.

According to an embodiment of the disclosure, when the acquired policyinformation does not include V2X-related policy information, the AMF maydetermine that a separate PCF for V2X is to be selected.

Even without the above-described determination procedure, according toan embodiment of the disclosure, because the AMF has determined that theUE is allowed to access the V2X service in operation 5, the AMF mayselect a PCF supporting the V2X service in order to obtain a policy forthe V2X service to be used by the UE. The AMF may perform the followingoperations in order to select a PCF supporting the V2X service, i.e., aPCF capable of delivering a V2X policy. First, the subscription data ofthe UE acquired from the UDM in Operation 4 may include addressinformation of a PCF for V2X. The AMF may select the PCF based on theaddress information. Second, address information of a PCF for V2Xsupporting a V2X service may be preset in the AMF. This may beinformation preset with respect to a network slice for V2X. Thus, theAMF may acquire an address of a PCF based on the preset informationabout which PCF is to be selected for a network slice for V2X to be usedby the UE. Third, the AMF may transmit, based on information about anetwork slice for V2X, a request for discovery of a proper PCFsupporting the network slice to NRF. The AMF may transmit a requestmessage for discovery of a proper PCF to the NRF by including NSSAI forV2X in the request message. After receiving the request from the AMF,the NRF returns to the AMF address information of a PCF for a networkslice identified by the NSSAI, and the AMF selects the PCF. Fourth, theAMF may transmit a request for discovery of a PCF supporting V2X to theNRF. The AMF may transmit a request message for discovery of a properPCF to the NRF by including an indication of support of V2X in therequest message. After receiving the request from the AMF, the NRFreturns to the AMF address information of a PCF supporting V2X, and theAMF selects the PCF.

In addition to the operation of selecting the PCF for V2X andestablishing policy association with the selected PCF, the AMF may alsoperform a procedure for obtaining an access and mobility policy for theUE with another PCF. When a policy is no longer valid in the context ofthe UE held by the AMF, the AMF may select a PCF and then perform apolicy association establishment procedure with the selected PCF. ThePCF may be the same as or different from the PCF for V2X selected inoperation 6. When the PCF for V2X is the same as the PCF for obtainingan access and mobility policy, the AMF may perform a policy associationestablishment procedure with the PCF to obtain both V2X policy andaccess and mobility related policy for the UE.

When the PCF for V2X is different from the PCF for obtaining an accessand mobility policy, the AMF may respectively perform policy associationestablishment procedures with the two PCFs and obtain related policiesfrom the PCFs. The AMF may determine that the PCF for V2X is differentfrom the PCF for obtaining an access and mobility policy as follows. Toobtain a policy, the AMF selects a PCF to perform a policy associationestablishment procedure with the PCF. When information about theobtained policy includes only information about a V2X policy, the AMFmay determine that the AMF needs to negotiate with another PCF forobtaining an access and mobility policy. Similarly, when the informationabout the obtained policy includes only information about an access andmobility policy, the AMF may determine that the AMF needs to negotiatewith another PCF for obtaining a V2X policy.

Operation 7: After selecting the PCF for V2X in operation 6, the AMFperforms a policy association establishment procedure with the selectedPCF. The AMF may transmit to the PCF a request including an ID of theUE, identification information of a network slice for V2X requested bythe UE, or identification information of a V2X service to be used by theUE. After receiving the request from the AMF, the PCF may configure V2Xpolicy information for the terminal, the network slice, or the V2Xservice. The V2X policy information may include, but is not limited to,the following information:

<V2X QoS Profile>

PC5-Aggregated Maximum Bitrate (AMBR) used in PC5 Unicast

5G QoS Identifier (5QI) authorized for use by the UE in PC5 Unicast

V2X service ID that is available in PC5 Unicast and QoS informationmapped to the V2X service ID, such as a 5QI or maximum bitrate

PC5-AMBR used in PC5 Multicast

<V2X Authorization>

V2V Authorization

V2P Authorization

V2N Authorization

V2X Unicast Authorization

V2X Multicast Authorization

Some of the information may be included in the V2X policy informationbefore being delivered to the AMF. The above-described information maybe set for each UE, each network slice for V2X to be used by the UE, oreach V2X service used by the UE. The V2X policy information may beinformation provided by the PCF from a V2X AS or V2X CF. The V2X AS forproviding a 3^(rd) party V2X service may configure policy informationnecessary for the UE to use its service and provide the policyinformation to the PCF. Furthermore, an NF, called a V2X CF, may existin a mobile communication network to perform the overall controloperations for a V2X service. The V2X CF may have stored policyinformation for the UE using the V2X service and provide the storedpolicy information to the PCF in advance.

For the V2X service, the PC5 unicast may receive scheduling of radioresources from a BS and may transmit data. Thus, QoS information that isusable by the UE in the PC5 unicast may be transmitted to the BS.Furthermore, authorization information indicating whether the UE is ableto use PC5 unicast or whether the UE is authorized to use a V2V or V2Pservice over PC5 may be transmitted to the BS. The authorizationinformation is used to check whether a service requested by the UE orPC5 unicast is usable when the UE requests radio resources from the BSto use a V2V service, V2P service, or PC5 unicast.

The UE using the V2X service may check QoS information that is availablein the PC5 unicast. The UE may request a radio resource from the BS touse the PC5 unicast. In this case, the UE may notify the BS of 5QIinformation that the UE attempts to use in the PC5 unicast and thus maybe guaranteed with respect to QoS matching the 5QI. Thus, the QoSinformation that is usable by the UE in the PC5 unicast may betransmitted to the UE. A V2X service ID that is available in the PC5unicast and QoS information mapped to the V2X service ID, such as 5QI ormaximum bitrate, may also be transmitted to the UE. The UE may checkdata requested by a V2X application and a V2X service ID correspondingto the data and thus may determine which QoS to use for transmission ofthe data.

The V2X policy information transmitted by the PCF to the AMF inoperation 7 may be configured by respectively separating a policydelivered to the UE and a policy delivered to the BS into correspondingcontainers. Alternatively, the AMF may configure a container byrespectively determining which information to deliver to the BS andwhich information to deliver to the UE based on the received V2X policy.As described above, the V2X policy may consist of V2X Authorization anda V2X QoS Profile but may also be configured as a list of detailedinformation. Although configurations may vary, when at least one in thelist of detailed information is included therein, the policy may bereferred to as a V2X policy described in the disclosure.

Operation 8: The AMF configures V2X policy information to include a V2Xpolicy to be delivered to the BS and a V2X policy to be delivered to theUE according to operation 7. Each V2X policy may also be configuredseparately to include policy information required for the BS orinformation required for the UE.

The AMF includes in an N2 message to be transmitted to the BS aregistration accept message that is a response NAS message to the NASmessage sent by the UE in operation 1. The AMF may include a V2X policyfor the UE configured in operation 7 in the response NAS message.Furthermore, the AMF transmits to the BS the N2 message including a V2Xpolicy for the BS that is necessary for the BS to manage the UE usingthe V2X service. The V2X policy includes authorization information abouta PC5 transmission mode (multicast or unicast) or V2X service, which isavailable in the UE, or QoS information about the PC5 transmission modeor V2X service.

After receiving the N2 message from the AMF, the BS may determine that aNAS message is to be transmitted to the UE. The BS stores the receivedV2X policy in a UE context. The BS uses the V2X policy information whenthe UE requests radio resources to be used on PC5 from the BS.Furthermore, the BS may include and transmit the V2X policy stored inthe UE context when the UE context is forwarded between BSs. Thus, evenwhen the UE moves to another BS (such as handover), the other BS mayprovide, to the UE, a V2X service by using the V2X policy stored in theUE context.

Operation 9: The BS transmits the NAS message received in operation 8 tothe UE by using RRC signaling.

Operation 10: The UE may determine that the UE has been connected to a5G network based on the received NAS message that is a registrationaccept message. Furthermore, when the NAS message received in operation9 includes a V2X policy, the UE stores the V2X policy in its context.The UE constructs a NAS message ‘Registration Complete’ and transmitsthe NAS message to the AMF via the BS to notify the AMF of completion ofthe registration.

Operation 11: The BS delivers, via the N2 message, the NAS messagereceived from the UE to the AMF.

Operation 12: When the NAS message does not include the V2X policyconfigured to be transmitted by the AMF to the UE in operation 8, theAMF may perform a separate NAS procedure to deliver the V2X policy tothe UE. The NAS procedure in operation 12 is used to deliver policyinformation to the UE. The AMF transmits a NAS message to the UE. Inthis case, the NAS message includes V2X policy information configured bythe AMF to be transmitted to the UE. The BS delivers the NAS messagereceived from the AMF to the UE. After receiving the NAS message fromthe BS, the UE stores the V2X policy in the UE's context. The UE usesV2X policy information when using the V2X service.

Operation 13: The UE constructs a response NAS message indicating thatthe policies (e.g., the V2X policy) have been received and transmits theNAS message to the AMY. The response NAS message is transmitted to theAMF via the BS.

Operation 14: The AMF may transmit to the PCF a response indicating thatthe policies have been successfully delivered to the BS and the UE.Although FIG. 1 shows that the AMF uses a service operation called NpcfPolicyControl Update to transmit the response to the PCF, it is alsoobvious that the service operation for transmitting a responseindicating successful delivery of the policies may be referred to byother names. When the V2X policy in operation 8 is delivered to the UEtogether with the registration accept message, the AMF may performoperation 14 after checking that registration by the UE is completed inoperation 11.

Embodiment 2

FIG. 2 illustrates a process whereby a UE obtains a V2X serviceparameter from a network, according to an embodiment of the disclosure.

Referring to FIG. 2 , a method is illustrated of transmitting, when a UEcapable of using a V2X service performs registration with a 5G system,information for the V2X service of the UE received from a PCF to a BSand the UE.

Operation 1: The UE performs a registration procedure to access the 5Gsystem. After establishing an RRC connection with the BS, the UEtransmits an RRC message including a registration request message thatis the NAS message to be sent to an AMF. The UE may transmit theregistration request message that includes identification informationindicating that the UE itself is a V2X UE. Alternatively, the UE maytransmit the registration request message that carries identificationinformation indicating its use of a network slice capable of supportinga V2X service. The identification information indicating use of anetwork slice may follow the format of NSSAI.

Operation 2: The BS selects an AMF based on an ID of the UE, a currentlocation of the UE, or identification information of a network slice tobe used by the UE. Then, the BS delivers to the selected AMF theregistration request message that is the NAS message sent by the UE inoperation 1.

Operation 3: The AMF may infer an AMF that previously served the UEbased on the ID of the UE included in the registration request messagesent by the UE. The AMF may determine that there is an AMF previouslyserving the UE and request a context of the UE from the serving AMF.After receiving the context of the UE from the serving AMF, the AMFstores the received context for use in management of the UE. The AMFdetermines that the UE initially accesses the 5G system and creates acontext for managing the UE.

Operation 4: The AMF performs a registration procedure to register itsmanagement of the UE with UDM. Furthermore, the AMF transmits a requestfor subscription data of the UE to the UDM and receives the subscriptiondata of the UE from the UDM. Data related to access and mobility of theUE may be included in the subscription data. For example, thesubscription data may include information about a service or networkslice available in the UE, information about whether the UE is able touse a V2X service, information indicating that the UE is a V2X UE,information about an area where the UE is able to use a V2X service,etc. Furthermore, the subscription data of the UE may includeauthentication/authorization information indicating whether the UE isauthorized to use a V2X service or information (e.g., NSSAI) about anetwork slice for V2X that is usable by the UE, and authorizationinformation about communication modes (e.g., PC5 multicast, PC5 unicast,etc.).available when the UE performs direct communication for a V2Xservice.

Operation 5: The AMF may select a PCF to receive a policy for providinga 5G service to the UE. When the AMF has not yet obtained the policy forthe UE or when the policy is no longer valid in a context of the UE heldby the AMF, the AMF may select a PCF and then perform a policyassociation establishment procedure with the selected PCF. The AMFperforms the policy association establishment procedure with the PCF andacquires related policy information.

Operation 6: The AMF may check, from the subscription data of the UEreceived from the UDM, authentication/authorization informationindicating whether the UE is authorized to use a V2X service and maydetermine to allow the UE to access the V2X service. When theregistration request message sent by the UE in operation 1 includes anID indicating a UE's request to use a V2X service or information about anetwork slice for the V2X service, the AMF may compare the ID orinformation with the subscription data received in operation 4 todetermine whether to provide the V2X service or network slice to the UE.

Operation 7: The AMF needs to select a V2X CF to receive a policy forproviding a 5G service to the UE. When the AMF has not yet obtained aV2X policy for the UE or when the V2X policy is no longer valid in thecontext of the UE held by the AMF, the AMF may select a V2X CF and thenperform a policy association establishment procedure with the selectedV2X CF. After establishing policy association with the V2X CF, the AMFmay acquire V2X policy information from the V2X CF. Alternatively, theV2X CF may provide an update on new V2X policy information to the AMF,and the AMF may apply it to management of the UE.

The AMF may perform the following operations in order to select a V2X CFsupporting the V2X service, i.e., capable of delivering a V2X policy.First, the subscription data of the UE acquired from the UDM inOperation 4 may include address information of a V2X CF. The AMF mayselect the V2X CF based on the address information. Second, addressinformation of a V2X CF for V2X service may be preset in the AMF. Thismay be information preset with respect to a network slice for V2X. Thus,the AMF may acquire an address of a V2X CF based on the presetinformation about which V2X CF is to be selected for a network slice forV2X to be used by the UE. Third, the AMF may transmit, based oninformation about a network slice for V2X, a request for discovery of aproper V2X CF supporting the network slice to NRF. The AMF may transmita request message for discovery of a proper V2X CF to the NRF byincluding NSSAI for V2X in the request message. After receiving therequest from the AMF, the NRF returns to the AMF address information ofa V2X CF for a network slice identified by the NSSAI, and the AMFselects the V2X CF. Fourth, the AMF may transmit a request for discoveryof a V2X CF supporting V2X to the NRF. The AMF may transmit a requestmessage for discovery of a proper V2X CF to the NRF by including anindication of support of V2X in the request message. After receiving therequest from the AMF, the NRF returns to the AMF address information ofa V2X CF supporting V2X, and the AMF selects the V2X CF.

Operation 8: After selecting the V2X CF for V2X in operation 7, the AMFperforms a policy association establishment procedure with the selectedV2X CF. The AMF may transmit to the V2X CF a request including an ID ofthe UE, identification information of a network slice for V2X requestedby the UE, or identification information of a V2X service to be used bythe UE. After receiving the request from the AMF, the V2X CF mayconfigure V2X policy information for the UE, the network slice, or theV2X service. The V2X policy information may include, but is not limitedto, the following information:

<V2X QoS Profile>

PC5-Aggregated Maximum Bitrate (AMBR) used in PC5 Unicast

5G QoS Identifier (5QI) authorized for use by the UE in PC5 Unicast

V2X service ID that is available in PC5 Unicast and QoS informationmapped to the V2X service ID, such as a 5QI or maximum bitrate

PC5-AMBR used in PC5 Multicast

<V2X Authorization>

V2V Authorization

V2P Authorization

V2N Authorization

V2X Unicast Authorization

V2X Multicast Authorization

Some of the above-described information may be included in the V2Xpolicy information before being delivered to the AMF. Theabove-described information may be set for each UE, each network slicefor V2X to be used by the UE, or each V2X service used by the UE. TheV2X policy information may be information provided by the V2X CF from aV2X AS. The V2X AS for providing a 3^(rd) party V2X service mayconfigure policy information necessary for the UE to use its service andprovide the policy information to the V2X CF.

For the V2X service, the PC5 unicast may receive scheduling of radioresources from a BS and may transmit data. Thus, QoS information that isusable by the UE in the PC5 unicast may be delivered to the BS.Furthermore, authorization information indicating whether the UE isallowed to use PC5 unicast or whether the UE is authorized to use a V2Vor V2P service over PC5 may be transmitted to the BS. The authorizationinformation is used to check whether a service requested by the UE orPC5 unicast is usable when the UE requests radio resources from the BSto use a V2V service, V2P service, or PC5 unicast.

The UE using the V2X service may check QoS information that is availablein the PC5 unicast. The UE may request a radio resource from the BS touse the PC5 unicast. In this case, the UE may notify the BS of 5QIinformation that the UE attempts to use in the PC5 unicast and thus maybe guaranteed with respect to QoS matching the 5QI. Thus, the QoSinformation that is usable by the UE in the PC5 unicast may betransmitted to the UE. A V2X service ID that is available in the PC5unicast and QoS information mapped to the V2X service ID, such as 5QI ormaximum bitrate, may also be transmitted to the UE. The UE may checkdata requested by a V2X application and a V2X service ID correspondingto the data and determine which QoS to use for transmission of the databased on the data and the V2X service ID.

The V2X policy information transmitted by the V2X CF to the AMF inoperation 8 may be configured by respectively separating a policydelivered to the UE and a policy delivered to the BS into correspondingcontainers. Alternatively, the AMF may configure containers byrespectively determining which information to deliver to the BS andwhich information to deliver to the UE based on the received V2X policy.As described above, the V2X policy may consist of V2X Authorization anda V2X QoS Profile but may also be configured as a list of detailedinformation. When a policy may be configured in different ways thandescribed above but includes at least one among the list of the detailedinformation, the policy may be referred to as a V2X policy described inthe disclosure.

Operation 9: The AMF configures the V2X policy information to include aV2X policy to be delivered to the BS and a V2X policy to be delivered tothe UE according to operation 8. Each V2X policy may also be configuredseparately to include policy information required for the BS orinformation required for the UE.

The AMF includes in an N2 message to be transmitted to the BS aregistration accept message that is a response NAS message to the NASmessage sent by the UE in operation 1. The AMF may include a V2X policyfor the UE configured in operation 8 in the response NAS message.Furthermore, the AMF transmits to the BS the N2 message including a V2Xpolicy for the BS that is necessary for the BS to manage the UE usingthe V2X service. The V2X policy for the BS includes authorizationinformation about a PC5 transmission mode (multicast or unicast) or V2Xservice, which is available from the UE, or QoS information about thePC5 transmission mode or V2X service.

After receiving the N2 message from the AMF, the BS may determine that aNAS message is to be transmitted to the UE. The BS stores the receivedV2X policy in a UE context. The BS uses the V2X policy information whenthe UE requests radio resources to be used on PC5 from the BS.Furthermore, the BS may include the V2X policy stored in the UE contextfor delivery even during movement of the UE context between BSs. Thus,even when the UE moves to another BS, the V2X policy stored in the UEcontext may be used to provide a V2X service to the UE.

Operation 10: The BS delivers the NAS message received in operation 9 tothe UE by using RRC signaling.

Operation 11: The UE may determine that it has been connected to a 5Gnetwork based on the received NAS message that is a registration acceptmessage. Furthermore, when the NAS message received in operation 9includes a V2X policy, the UE stores the V2X policy in its context. TheUE constructs a NAS message ‘Registration Complete’ and transmits theNAS message to the AMF via the BS to inform the AMF about completion ofthe registration.

Operation 12: The BS delivers, via the N2 message, the NAS messagereceived from the UE to the AMF.

Operation 13: When the NAS message does not include the V2X policyconfigured to be transmitted by the AMF to the UE in operation 9, theAMF may perform a separate NAS procedure to deliver the V2X policy tothe UE. The NAS procedure in operation 13 is used to deliver policyinformation to the UE. The AMF transmits a NAS message to the UE. Inthis case, the NAS message includes V2X policy information configured bythe AMF to be transmitted to the UE. The BS delivers the NAS messagereceived from the AMF to the UE. After receiving the NAS message fromthe BS, the UE stores the V2X policy in its context. The UE uses V2Xpolicy information when using the V2X service.

Operation 14: The UE constructs a response NAS message indicating thatpolicies have been well received and transmits the NAS message to theAMF. The response NAS message is transmitted to the AMF via the BS.

Operation 15: The AMF may transmit to the V2X CF a response indicatingthat the policies have been successfully delivered to the BS and the UE.The operation 15 refers to a service operation for transmitting aresponse indicating successful delivery of the policies. When the V2Xpolicy is delivered to the UE together with the registration acceptmessage in operation 8, the AMF may perform operation 14 after checkingthat registration by the UE is completed in operation 12.

Embodiment 3

FIG. 3 illustrates a communication protocol stack supported by a UE,according to an embodiment of the disclosure. In other words, FIG. 3illustrates a method of delivering, when a V2X policy is updated, theresulting V2X policy to a BS and the UE via an AMF.

Referring to FIG. 3 , a PCF may be replaced with a V2X CF.Configurations and operations may vary depending on whether a V2X policyis provided by a PCF or V2X CF, but the embodiment 3 of the disclosureincorporates both the embodiments 1 and 2 of the disclosure.

Operation 1: A V2X policy may be updated in a PCF. The resulting V2Xpolicy may be a new policy provided by the PCF from a 3^(rd) party V2XAS. A policy update may be required when a QoS Profile for a V2X servicethat is available from the UE is changed, i.e., at least one of when a5QI for using the V2X service, which is mapped to a V2X service ID usedby the UE, is changed, when the V2X service capable of using PC5 unicastis added/changed/deleted, or when a PC5-AMBR value applicable when usingPC5 unicast is changed. Furthermore, the policy update may be requiredwhen policies on a V2X service used by the UE are changed such that theUE may not use a PC5 unicast, when the UE is authorized to use the PC5unicast, or when whether the UE is authorized to use a V2V, V2P, or V2Nservice is changed However, embodiments of the disclosure are notlimited thereto.

The PCF checks that a policy for a specific UE has been updated andtransmits the resulting updated policy to an AMF responsible formanaging the UE, i.e., an AMF that establish a policy association forthe UE. The resulting updated policy may include a changed V2X QoSprofile or changed V2X authorization.

The V2X policy transmitted by the PCF to the AMF in operation 1 may beconfigured by respectively separating a policy delivered to the UE and apolicy delivered to the BS into corresponding containers. Alternatively,the AMF may configure a container by respectively determining whichinformation to deliver to the BS and which information to deliver to theUE based on the received V2X policy. As in the above examples, the V2Xpolicy may consist of V2X authorization and a V2X QoS profile but mayalso be configured as a list of detailed information. When a policy maybe configured in different ways than described above but includes atleast one among the list of the detailed information, the policy may bereferred to as a V2X policy specified in the disclosure.

Operation 2: When the UE is not in a connected state, the AMF performs apaging procedure for waking up the UE.

Operation 3: After receiving a paging message from the AMF, the UEtransits to a connected state while transmitting a service requestmessage to the AMF. When the UE determines that a registration procedureis needed, the UE may transmit to the AMF a registration request messageinstead of the service request message after receiving the pagingmessage.

When the UE transits to the connected state, the AMF determines that asignaling connection with the UE has been activated.

Operation 4: The AMF performs an operation of delivering the updated V2Xpolicy received in operation 1 to the BS and the UE. The AMF configuresV2X policy information to include a V2X policy to be delivered to the BSand a V2X policy to be delivered to the UE according to operation 1.Each V2X policy may also be configured separately to include policyinformation required for the BS or information required for the UE. TheAMF delivers the V2X policy to the BS by using a NG application protocol(NGAP) used in an N2 interface with the BS. A NGAP message includes theV2X policy delivered to the BS. After receiving the NGAP message fromthe AMF, the BS may update and store a context of the UE according toinformation included in the V2X policy. The BS uses the V2X policy laterwhen applying a V2X service for the UE. The NGAP message may include theV2X policy delivered to the UE as a NAS message. The V2X policy in theNGAP message is transparent to the BS.

Operation 5: When the NGAP message received in operation 4 includes aNAS message to be delivered to the UE, the BS transmits the NAS messageto the UE. The NAS message includes the V2X policy to be transmitted tothe UE. After receiving the NAS message from the BS, the UE may storevalues contained in the V2X policy in its context and apply the valuesfor using the V2X service.

Operation 6: The UE may transmit a NAS message informing that the V2Xpolicy has been well received. The NAS message is a response message tothe NAS message constructed for delivery to the UE in operation 4. Themessage is delivered to the AMF via the BS.

Operation 7: The AMF may transmit to the PCF a response indicating thatthe V2X policy has been successfully delivered to the BS and the UE.Although the AMF uses a service operation Npcf PolicyControl Update totransmit the response to the PCF, it is also obvious that the serviceoperation for transmitting a response indicating successful delivery ofthe V2X policy may be referred to by other names.

According to embodiments of the disclosure, a BS in a mobilecommunication network for providing V2X services may determine whether aUE is authorized to use a V2X service. Furthermore, according toembodiments of the disclosure, the BS in the mobile communicationnetwork for providing V2X services may provide radio resources to the UEby applying QoS information set with respect to a V2X service that theUE desires to use.

Furthermore, according to embodiments of the disclosure, the UE in themobile communication network for providing V2X services may requestradio resources from the BS based on the QoS information set withrespect to a V2X service that the UE desires to use. In addition, when apolicy for a vehicle communication service is changed, a network entityfor providing a policy (i.e., authorization information and QoSinformation) for V2X communication may provide an updated policy to theUE and BS.

The effects that can be achieved from the disclosure are not limited tothose that have been particularly described hereinabove, and othereffects of the disclosure will be clearly understood by those ofordinary skill in the art from the following detailed description.

FIG. 4 is a block diagram of a configuration of a UE according to anembodiment of the disclosure.

Referring to FIG. 4 , the UE may include a processor 401, a transceiver402, and a memory 403. However, components of the UE are not limitedthereto. For example, the UE may include more or fewer components thanthose shown in FIG. 4 . Furthermore, the processor 401, the transceiver402, and the memory 403 may be implemented as a single chip.

The processor 401 may control a series of processes in which the UE mayoperate according to the embodiments of the disclosure. For example, theprocessor 401 may control the components of the UE to perform a methodof providing information for a V2X service according to an embodiment ofthe disclosure. The processor 401 may be formed as at least oneprocessor and perform operations of providing information for a V2Xservice according to the embodiments of the disclosure by executing aprogram stored in the memory 403.

The transceiver 402 may transmit or receive signals from or to a BS. Thesignals transmitted or received to or from the BS may include controlinformation and data. The transceiver 402 may include a radio frequency(RF) transmitter for up-converting and amplifying a frequency of asignal to be transmitted and an RF receiver for low-noise amplifying areceived signal and down-converting its frequency. However, this ismerely an example of the transceiver 402, and the components of thetransceiver 402 are not limited to the RF transmitter and the RFreceiver. Furthermore, the transceiver 402 may receive a signal via aradio channel and output the signal to the processor 401 and transmitthe signal output from the processor 401 via a radio channel.

The memory 403 may store data and programs necessary for operations ofthe UE. Furthermore, the memory 403 may store control information ordata in a signal transmitted or received by the UE. The memory 403 maybe composed of storage media, such as read-only memory, random accessmemory (RAM), hard disks, compact disc (CD)-read only memory (ROM), anddigital versatile discs (DVDs), or a combination thereof. Furthermore,the memory 403 may be formed as a plurality of memories. The memory 403may store a program for performing operations of providing informationfor a V2X service according to the embodiments of the disclosure.

FIG. 5 illustrates a configuration of an NF according to an embodimentof the disclosure.

Referring to FIG. 5 , the NF may include a processor 501, a transceiver502, and a memory 503. However, components of the NF are not limitedthereto. For example, the NF may include more or fewer components thanthose shown in FIG. 5 . Furthermore, the processor 501, the transceiver502, and the memory 503 may be implemented as a single chip.Furthermore, components of a BS may also be the same or correspond tocomponents of the NF of FIG. 5 .

The processor 501 may control a series of processes in which the NF mayoperate according to the embodiments of the disclosure. For example, theprocessor 501 may control the components of the NF to perform a methodof providing information for a vehicle communication service accordingto an embodiment of the disclosure.

The transceiver 502 may transmit or receive signals from or to a UE orBS. The signals transmitted or received to or from the BS or UE mayinclude control information and data. The transceiver 502 may include anRF transmitter for up-converting a frequency of a signal to betransmitted to a higher frequency and amplifying the resulting signaland an RF receiver for low-noise amplifying a received signal anddown-converting its frequency to a lower frequency. However, this ismerely an example of the transceiver 502, and the components of thetransceiver 502 are not limited to the RF transmitter and the RFreceiver. Furthermore, the transceiver 502 may receive a signal via aradio channel and output the signal to the processor 501 and transmitthe signal output from the processor 501 via a radio channel. Theprocessor 501 may be formed as a plurality of processors and perform amethod of providing information for a vehicle communication serviceaccording to the embodiments of the disclosure by executing a programstored in the memory 503.

The memory 503 may store data and programs necessary for operations ofthe NF. Furthermore, the memory 503 may store control information ordata in a signal transmitted or received by the NF. The memory 503 maybe composed of storage media, such as ROM, RAM, hard disks, CD-ROM, andDVDs, or a combination thereof. Furthermore, the memory 503 may beformed as a plurality of memories. The memory 503 may store a programfor performing a method of providing information for a vehiclecommunication

The methods according to the embodiments of the disclosure described inclaims or specification thereof may be implemented in hardware,software, or a combination of hardware and software.

When the methods are implemented in software, a computer-readablestorage medium storing at least one program (software module) may beprovided. The at least one program stored in the computer-readablestorage medium is configured for execution by at least one processorwithin an electronic device. The at least one program includesinstructions that cause the electronic device to execute the methodsaccording to the embodiments of the disclosure described in the claimsor specification thereof.

The program (software module or software) may be stored in a RAM, anon-volatile memory including a flash memory, ROM, electrically erasableprogrammable ROM (EEPROM), a magnetic disc storage device, CD-ROM, DVDsor other types of optical storage devices, and a magnetic cassette.Alternatively, the program may be stored in a memory that is configuredas a combination of some or all of the memories. A plurality of suchmemories may be included.

Furthermore, the program may be stored in an attachable storage devicethat may be accessed through communication networks such as theInternet, Intranet, a local area network (LAN), a wide LAN (WLAN), and astorage area network (SAN) or a communication network configured in acombination thereof. The storage device may access a device performingmethods according to the embodiments of the disclosure through anexternal port. Further, a separate storage device on the communicationnetwork may also access a device performing methods according to theembodiments of the disclosure.

In the embodiments of the disclosure, a component included in thedisclosure is expressed in a singular or plural form depending on thedescribed embodiments of the disclosure. However, singular or pluralexpressions are selected to be suitable for the presented situations forconvenience, and the disclosure is not limited to the singular or pluralform. An element expressed in a plural form may be configured as asingle element, or an element expressed in a singular form may beconfigured as a plurality of elements.

According to embodiments of the disclosure, a method and apparatus foreffectively providing a V2X service in a mobile communication system areprovided.

While the disclosure has been shown and described with reference tovarious embodiments thereof, it will be understood by those skilled inthe art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the disclosure as definedby the appended claims and their equivalents.

What is claimed is:
 1. A method, performed by an access and mobilitymanagement function (AMF), of providing information for avehicle-to-everything (V2X) service, the method comprising: receiving,from a user equipment (UE), a registration request message includinginformation indicating that the UE is a V2X terminal; receiving, from aunified data management (UDM), subscription information about whetherthe UE is able to use the V2X service; based on the registration requestmessage and the subscription information, selecting a policy controlfunction (PCF) supporting V2X policy provisioning; receiving V2X policyinformation from the selected PCF; and providing the V2X policyinformation to a base station.
 2. The method of claim 1, furthercomprising establishing a policy association with the selected PCF. 3.The method of claim 1, further comprising: based on the subscriptioninformation received from the UDM, determining whether the UE is allowedto receive the V2X service, wherein the subscription informationcomprises authorization information indicating whether the UE isauthorized to use the V2X service.
 4. The method of claim 1, wherein theproviding of the V2X policy information to the base station comprisesproviding the V2X policy information to the base station by using anext-generation application protocol (NGAP).
 5. The method of claim 1,wherein the selecting of the PCF comprises: transmitting a messagerequesting a network repository function (NRF) to discover a PCFsupporting the V2X service; receiving information about the PCF from theNRF; and selecting the PCF discovered by the NRF, and wherein themessage requesting the discovery of the PCF comprises an indication ofsupport of the V2X service.
 6. The method of claim 1, furthercomprising: receiving updated V2X policy information from the PCF;storing the updated V2X policy information as part of contextinformation of the UE; and providing the updated V2X policy informationto the base station.
 7. The method of claim 1, wherein the V2X policyinformation provided to the base station comprises at least one ofquality of service (QoS) parameter information or V2X authorizationinformation, and wherein the QoS parameter information comprises atleast one of identification information of the V2X service or a PC5 QoSparameter.
 8. A method, performed by a policy control function (PCF), ofproviding information for a vehicle-to-everything (V2X) service, themethod comprising: establishing a policy association with an access andmobility management function (AMF); generating V2X policy information;and providing the generated V2X policy information to the AMF, whereinthe PCF is selected as a PCF supporting the V2X service, by the AMF,based on a registration request message of a user equipment (UE) andsubscription information about whether the UE is able to use the V2Xservice, and wherein the registration request message includesinformation indicating that the UE is a V2X terminal.
 9. The method ofclaim 8, wherein the V2X policy information comprises at least one ofquality of service (QoS) parameter information or V2X authorizationinformation, and wherein the QoS parameter information comprises atleast one of identification information of the V2X service or a PC5 QoSparameter.
 10. The method of claim 8, further comprising: updating theV2X policy information; and providing the updated V2X policy informationto the AMF.
 11. An access and mobility management function (AMF) forproviding information for a vehicle-to-everything (V2X) service, the AMFcomprising: a transceiver; and a processor electrically connected to thetransceiver and configured to: receive, from a user equipment (UE), aregistration request message including information indicating that theUE is a V2X terminal, receive, from a unified data management (UDM),subscription information about whether the UE is able to use the V2Xservice, based on the registration request message and the subscriptioninformation, select a policy control function (PCF) supporting V2Xpolicy provisioning, receive V2X policy information from the selectedPCF, and provide the V2X policy information to a base station.
 12. TheAMF of claim 11, wherein the processor is further configured toestablish a policy association with the selected PCF.
 13. The AMF ofclaim 11, wherein the processor is further configured to, based on thesubscription information received from the UDM, determine whether the UEis allowed to receive the V2X service, and wherein the subscriptioninformation comprises authorization information indicating whether theUE is authorized to use the V2X service.
 14. The AMF of claim 11,wherein the processor is further configured to provide the V2X policyinformation to the base station by using a next-generation applicationprotocol (NGAP).
 15. The AMF of claim 11, wherein, as at least part ofthe selecting of the PCF, the processor is further configured to:transmit a message requesting a network repository function (NRF) todiscover a PCF supporting the V2X service, receive information about thePCF from the NRF, and select the PCF discovered by the NRF, and whereinthe message requesting the discovery of the PCF comprises an indicationof support of the V2X service.
 16. The AMF of claim 11, wherein theprocessor is further configured to: receive updated V2X policyinformation from the PCF, store the updated V2X policy information aspart of context information of the UE, and provide the updated V2Xpolicy information to the base station.
 17. The AMF of claim 11, whereinthe V2X policy information provided to the base station comprises atleast one of quality of service (QoS) parameter information or V2Xauthorization information, and wherein the QoS parameter informationcomprises at least one of identification information of the V2X serviceor a PC5 QoS parameter.
 18. A policy control function (PCF) forproviding information for a vehicle-to-everything (V2X) service, the PCFcomprising: a transceiver; and a processor electrically connected to thetransceiver and configured to: establish a policy association with anaccess and mobility management function (AMF), generate V2X policyinformation, and provide the generated V2X policy information to theAMF, wherein the PCF is selected as a PCF supporting the V2X service, bythe AMF, based on a registration request message of a user equipment(UE) and subscription information about whether the UE is able to usethe V2X service, and wherein the registration request message includesinformation indicating that the UE is a V2X terminal.
 19. The PCF ofclaim 18, wherein the V2X policy information comprises at least one ofquality of service (QoS) parameter information or V2X authorizationinformation, and wherein the QoS parameter information comprises atleast one of identification information of the V2X service or a PC5 QoSparameter.
 20. The PCF of claim 18, wherein the processor is furtherconfigured to: update the V2X policy information, and provide theupdated V2X policy information to the AMF.