Apparatus and method for providing operator specific service

ABSTRACT

Convergence of a 5 th -Generation communication system supporting higher data rates beyond 4 th -Generation system(s) with a technology for Internet of Things (IoT) may be applied to intelligent services. Operator specific services are permitted and provided by allowing an unauthorized terminal to search for and access the such services, and includes notifying a terminal of information corresponding to “operator specific services” by allowing a base station to broadcast predetermined information, displaying information acquired by a terminal, matching information acquired by the terminal with information broadcast from a base station to arrange services, requesting access and notifying a terminal performs an access for “operator specific services” upon accessing a network, providing a menu for determining whether neighboring base stations are capable of “operator specific services” to a user of a terminal, and allowing the terminal to determine whether there is the base station broadcasting the information.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/687,463 filed on Nov. 18, 2019, which is continuation of U.S. patentapplication Ser. No. 15/969,669 filed on May 2, 2018, now U.S. Pat. No.10,484,928 issued on Nov. 19, 2019, which is based on and claimspriority to Korean Patent Application No. 10-2017-0056484 filed on May2, 2017 in the Korean Intellectual Property Office, the disclosures ofwhich are incorporated herein by reference in their entirety.

TECHNICAL FIELD

Various embodiments of the present disclosure relate to a method forpermitting and providing operator specific services by allowing aterminal to search for and access the operator specific services in awireless communication system.

BACKGROUND

To meet the demand for wireless data traffic having increased sincedeployment of 4G communication systems, efforts have been made todevelop an improved 5G or pre-5G communication system. Therefore, the 5Gor pre-5G communication system is also called a “Beyond 4G Network” or a“Post LTE System.” The 5G communication system is considered to beimplemented in higher frequency (“millimeter Wave” or “mmWave”) bands,e.g., 60 GHz bands, so as to accomplish higher data rates. To decreasepropagation loss of the radio waves and increase the transmissiondistance, the beamforming, massive multiple-input multiple-output(MIMO), Full Dimensional MIMO (FD-MIMO), array antenna, an analog beamforming, large scale antenna techniques are discussed in 5Gcommunication systems. In addition, in 5G communication systems,development for system network improvement is under way based onadvanced small cells, cloud Radio Access Networks (RANs), ultra-densenetworks, device-to-device (D2D) communication, wireless backhaul,moving network, cooperative communication, Coordinated Multi-Point(CoMP), reception-end interference cancellation and the like. In the 5Gsystem, Hybrid FSK and QAM Modulation (FQAM) and sliding windowsuperposition coding (SWSC) as an advanced coding modulation (ACM), andfilter bank multi carrier (FBMC), non-orthogonal multiple access (NOMA),and sparse code multiple access (SCMA) as an advanced access technologyhave been developed.

The Internet, which is a human centered connectivity network wherehumans generate and consume information, is now evolving to the Internetof Things (IoT) where distributed entities, such as things, exchange andprocess information without human intervention. The Internet ofEverything (IoE), which is a combination of the IoT technology and theBig Data processing technology through connection with a cloud server,has emerged. As technology elements, such as “sensing technology”,“wired/wireless communication and network infrastructure”, “serviceinterface technology”, and “Security technology” have been demanded forIoT implementation, a sensor network, a Machine-to-Machine (M2M)communication, Machine Type Communication (MTC), and so forth have beenrecently researched. Such an IoT environment may provide intelligentInternet technology services that create a new value to human life bycollecting and analyzing data generated among connected things. IoT maybe applied to a variety of fields including smart home, smart building,smart city, smart car or connected cars, smart grid, health care, smartappliances and advanced medical services through convergence andcombination between existing Information Technology (IT) and variousindustrial applications.

In line with this, various attempts have been made to apply 5Gcommunication systems to IoT networks. For example, technologies such asa sensor network, Machine Type Communication (MTC), andMachine-to-Machine (M2M) communication may be implemented bybeamforming, MIMO, and array antennas. Application of a cloud RadioAccess Network (RAN) as the above-described Big Data processingtechnology may also be considered to be as an example of convergencebetween the 5G technology and the IoT technology.

In a wireless communication system, a universal integrated circuit card(UICC) is a smart card inserted into a mobile communication terminal orthe like. In general, the UICC includes an access control module foraccessing a network of a mobile operator. Examples of the access controlmodule may include a universal subscriber identity module (USIM), asubscriber identity module (SIM), an IP multimedia service identitymodule (ISIM), etc. The UICC is also called a UICC card or a USIM cardor a SIM card, and is commonly called a SIM card. The UICC may storepersonal information on a mobile communication subscriber and performsubscriber authentication and a generation of a traffic security keyupon an access to a mobile communication network, thereby implementingthe use of the safe mobile communication. With the proliferation of IoTfields, an embedded UICC (eUICC) is being applied to terminals such aswearable, automobile, and a smart meter. The UICC card, which candownload and select the SIM module, is collectively called a eUICC. Thatis, the UICC card, which is fixed or not fixed in the terminal, amongthe UICC cards which may download and select the SIM modules remotely,and the term “eUICC profile” is collectively called the downloaded SIMmodule information.

SUMMARY

When the network cannot recognize the corresponding terminal due todamage to the SIM card, the eUICC, or the eUICC profile of the terminal,or when a user wants to subscribe and open a service directly from aterminal with no contract or an eUICC applied terminal, the user needsto access the terminal in order to receive operator specific servicesvia a customer center or a specific website. However, since thecorresponding terminal is in an unauthenticated state which cannot beauthenticated in the network, the access to the network cannot be made,so the corresponding terminal may not receive services via the networkaccess and a telephone, which results in inconvenience to the user.Accordingly, embodiments of the present disclosure are directed to theprovision of a method for permitting operator specific services so thata terminal can search for and access the operator specific services.

Objects of the present disclosure are not limited to the above-mentionedobjects. That is, other objects that are not mentioned may be understoodby those skilled in the art to which the present disclosure pertainsfrom the following description.

Various embodiments of the present disclosure are directed to theprovision of a method for operating a terminal, including: determiningwhether an operator restricted service is required; acquiring operatorservice information if the operator restricted service is required; andperforming the operator restricted service if an access to an operatornetwork selected based on the operator service information succeeds.

Various embodiments of the present disclosure are directed to theprovision of a terminal, including; a transceiver configured to transmitand receive a signal; and a controller configured to perform a controlto determine whether an operator restricted service is required, acquireoperator service information if the operator restricted service isrequired, and perform the operator restricted service if an access tothe operator network selected based on the operator service informationsucceeds.

According to embodiments of the present disclosure, it is possible toprovide the method and apparatus for providing operator specificservices.

In addition, according to embodiments of the present disclosure, whenthe subscriber information cannot be recognized due to the damage to theSIM card, the eUICC, or the eUICC profile of the terminal, the problemscan be solved by allowing the terminal with the above problems to accessthe call center or the website of the service center of thecorresponding operator.

In addition, according to embodiments of the present disclosure, whenthe subscriber wants to receive the opening of the terminal with nocontract or the eUICC profile download services, the terminal candirectly receive the opening and download service by accessing the callcenter or the website of the service center.

The effects that may be achieved by the embodiments of the presentdisclosure are not limited to the above-mentioned objects. That is,other effects that are not mentioned may be understood by those skilledin the art to which the present disclosure pertains from the followingdescription.

Before undertaking the DETAILED DESCRIPTION below, it may beadvantageous to set forth definitions of certain words and phrases usedthroughout this patent document: the terms “include” and “comprise,” aswell as derivatives thereof, mean inclusion without limitation; the term“or,” is inclusive, meaning and/or; the phrases “associated with” and“associated therewith,” as well as derivatives thereof, may mean toinclude, be included within, interconnect with, contain, be containedwithin, connect to or with, couple to or with, be communicable with,cooperate with, interleave, juxtapose, be proximate to, be bound to orwith, have, have a property of, or the like; and the term “controller”means any device, system or part thereof that controls at least oneoperation, such a device may be implemented in hardware, firmware orsoftware, or some combination of at least two of the same. It should benoted that the functionality associated with any particular controllermay be centralized or distributed, whether locally or remotely.

Moreover, various functions described below can be implemented orsupported by one or more computer programs, each of which is formed fromcomputer readable program code and embodied in a computer readablemedium. The terms “application” and “program” refer to one or morecomputer programs, software components, sets of instructions,procedures, functions, objects, classes, instances, related data, or aportion thereof adapted for implementation in a suitable computerreadable program code. The phrase “computer readable program code”includes any type of computer code, including source code, object code,and executable code. The phrase “computer readable medium” includes anytype of medium capable of being accessed by a computer, such as readonly memory (ROM), random access memory (RAM), a hard disk drive, acompact disc (CD), a digital video disc (DVD), or any other type ofmemory. A “non-transitory” computer readable medium excludes wired,wireless, optical, or other communication links that transporttransitory electrical or other signals. A non-transitory computerreadable medium includes media where data can be permanently stored andmedia where data can be stored and later overwritten, such as arewritable optical disc or an erasable memory device.

Definitions for certain words and phrases are provided throughout thispatent document, those of ordinary skill in the art should understandthat in many, if not most instances, such definitions apply to prior, aswell as future uses of such defined words and phrases.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present disclosure and itsadvantages, reference is now made to the following description taken inconjunction with the accompanying drawings, in which like referencenumerals represent like parts:

FIG. 1 illustrates a diagram of an example of a network structure of awireless communication system according to embodiments of the presentdisclosure;

FIG. 2 illustrates a diagram of a radio protocol structure in the LTEsystem according to embodiments of the present disclosure;

FIG. 3 illustrates a diagram of an aspect in which embodiments of thepresent disclosure is implemented in a terminal;

FIG. 4 illustrates a diagram of an operation of each node in thecommunication system according to embodiments of the present disclosure;

FIG. 5 illustrates a diagram of an operation of a terminal according toembodiments of the present disclosure;

FIG. 6 illustrates a diagram of an aspect in which “operator specificservices” information is pre-installed in the terminal according toembodiments of the present disclosure;

FIG. 7 illustrates a diagram of an operation of a terminal when the“operator specific services” information is pre-installed in theterminal according to embodiments of the present disclosure; and

FIG. 8 illustrates a block configuration diagram of the terminal in thewireless communications system according to embodiments of the presentdisclosure.

DETAILED DESCRIPTION

FIGS. 1 through 8, discussed below, and the various embodiments used todescribe the principles of the present disclosure in this patentdocument are by way of illustration only and should not be construed inany way to limit the scope of the disclosure. Those skilled in the artwill understand that the principles of the present disclosure may beimplemented in any suitably arranged system or device.

Hereinafter, an operation principle of the present disclosure will bedescribed in detail with reference to the accompanying drawings.Hereinafter, when it is determined that the detailed description of theknown art related to the present disclosure may obscure the gist of thepresent disclosure, the detailed description thereof will be omitted.Further, the following terminologies are defined in consideration of thefunctions in the present disclosure and may be construed in differentways by the intention of users and operators. Therefore, the definitionsthereof should be construed based on the contents throughout thespecification.

A term used to identify a connection node, a term indicating networkentities, a term indicating messages, a term indicating an interfacebetween the network entities, a term indicating various identificationinformation, etc., that are used in the following description areillustrated for convenience of explanation. Accordingly, the presentdisclosure is not limited to terms to be described below and other termsindicating objects having the equivalent technical meaning may be used.

Hereafter, for convenience of explanation, the present disclosure usesterms and names defined in the 3rd generation partnership project longterm evolution (3GPP LTE) standard. However, the present disclosure isnot limited to the terms and names but may also be identically appliedto the systems according to other standards.

As described above, a universal integrated circuit card (UICC) is asmart card inserted into a mobile communication terminal, etc., and iscalled a UICC card. The UICC may include an access control module foraccessing a network of a mobile operator. An example of the accesscontrol module may include a universal subscriber identity module(USIM), a subscriber identity module (SIM), an IP multimedia serviceidentity module (ISIM), etc. The UICC including the USIM is generallycalled an USIM card. Similarly, the UICC including a SIM module isgenerally a SIM card. In the following description of the presentdisclosure, the SIM card is used as a general meaning including theUICC, etc., in which the UICC card, the USIM card, and the ISIM areincluded. That is, the technology of the SIM card may be identicallyapplied to the USIM card, the ISIM card, or even the general UICC card.

The SIM card may store personal information on a mobile communicationsubscriber and perform subscriber authentication and a generation of atraffic security key upon an access to a mobile communication network,thereby implementing the use of the safe mobile communication.

The SIM card is generally manufactured as a dedicated card for thecorresponding mobile operator by a request of a specific mobile operatorupon manufacturing of a card. A card in which authentication informationfor accessing a network, for example, universal subscriber identitymodule (USIM) application and international mobile subscriber identity(IMSI), a K value, an OPc value, etc., is mounted in advance isreleased. Therefore, the corresponding mobile operator receives themanufactured SIM card and delivers the UICC card to a subscriber.Thereafter, if necessary, technologies of over the air (OTA) or the likemay be applied to perform managements of installation, modification,deletion, or the like of applications within the UICC. A subscriberinserts the UICC card into his/her own mobile communication terminal touse a network of the corresponding mobile operator and applicationservices. In addition, when replacing a terminal, a subscriber takes outthe UICC card from the terminal and inserts the UICC card into a newterminal, such that the new terminal may use authentication information,a mobile communication telephone number, a personal telephone directory,or the like, which are stored in the UICC card, as they are.

However, the SIM card is inconvenient for a mobile communicationterminal user in receiving services of other mobile operators. There isinconvenience that the mobile communication terminal user needs tophysically get the SIM card to receive services from mobile operators.For example, there is inconvenience that when a mobile communicationterminal user travels to other countries, he and she needs to get anon-site SIM card to receive on-site mobile communication services. Aroaming service may somewhat solve the foregoing inconveniences butthere is a problem in that the mobile communication terminal user maynot receive the roaming services due to an expensive fee and when acontract between mobile operators are not established.

Meanwhile, a significant portion of the foregoing inconveniences may besolved by downloading and installing the SIM module to and in the UICCcard. That is, the SIM module of the mobile communication servicerequired may be downloaded to the UICC card at the user's desired time.The UICC card may also download and install a plurality of SIM modulesand may select and use only one of the plurality of SIM modules. TheUICC card may be fixed in a terminal or may not be fixed in theterminal. In particular, a UICC, which is fixedly used in a terminal, iscalled an embedded UICC (eUICC). In the present disclosure, a UICC card,which is fixed or not fixed in the terminal, among UICC cards which maydownload and select SIM modules remotely, is collectively called aeUICC. Further, downloaded SIM module information is collectively usedas the term eUICC profile.

When the SIM card and the eUICC or the eUICC profile is damaged, theterminal may not perform subscriber authentication and traffic securitykey generation upon accessing a mobile communication network. Therefore,the terminal may not be provided with a communication service forsolving a problem because the terminal cannot access an operator networkfor purposes other than an emergency call. In this case, the user of theterminal needs to access a service center via a terminal connected tothe Internet such as a home telephone and a PC or a telephone capableterminal. However, since it may not be assumed that the user has a PC, ahome telephone, a public telephone or other access means upon theoccurrence of the problem, and the number of households having the hometelephone has been reduced slowly, a portable terminal with the problemsmay be only a terminal capable of making the telephone connection to thecustomer center. If all these means cannot be used, the user can solvethe problem only by directly visiting agencies, but there is aninconvenience that he/she takes time to visit agencies.

In addition, in order to download the eUICC profile to the eUICC, anetwork for accessing a server for downloading profile is used. TheeUICC profile may be downloaded when a network access for openingcommunication services of the corresponding operator for the first timeis used or the eUICC profile is to be re-downloaded due to the damage tothe eUICC profile. When a subscriber purchases the eUICC appliedterminal at the time of inventing the patent and wants to directly openthe terminal or tries to access the network due to the problem with theeUICC profile downloaded to the eUICC, the network cannot successfullyauthenticate the corresponding subscriber, thus the network access isnot permitted.

The Global system for Mobile Communication Association (GSM), which isthe standardization group for downloading the eUICC profile to the eUICCcard as a method for solving the problem, is a method for acquiring anetwork for downloading an eUICC profile to an eUICC in a terminal, andproposes ProvisioningProfile (hereinafter, marked by Provisioningprofile) which is profile which is the same as Wi-Fi or eUICC profilebut restricts its own purpose only for providing connectivity.

However, the Wi-Fi is available only in limited areas. In particular, insome areas and countries where public Wi-Fi infrastructure is short, theterminal is hard to access the network over the Wi-Fi. In addition, theprovisioning profile may be provided in such a manner that a terminalmanufacturer purchases the provisioning profile in a large amount undera contract with a mobile operator and then pre-installs the purchasedprovisioning profile in the terminal. However, the terminal manufacturershould bear the expense which is caused by the purchase of thecorresponding profile and data. Also, if the term of the contractedprofile between terminal manufacturers and mobile operators expires or adata usage amount contracted with the corresponding profile exceeds,there is a limitation in that a user cannot open communication servicesand access the network for downloading the eUICC profile any more withthe corresponding provisioning profile.

On the other hand, in recent years, there have been increasing cases ofsubscription services by purchasing terminals with no contract. The userjoins services through a website or offline agencies of a desired mobileoperator with a used terminal whose contract has already expired or aterminal with no contract. Major mobile operators in the United Stateshave sold mobile phones with no contact, and in Korea, as a subsidy fora mobile phone subsidy decreases, there is a case in which a userpurchases a terminal with no contract and gets a discount on selectioncontracts. Since the terminal with no contract does not have the SIMcard or the opening information of the operator, the terminal cannotperform successful authentication in the network of the operator whowants to receive the services. Accordingly, the customer cannot access awebsite of the mobile communication operator or cannot call the mobilecommunication operator for opening services. In such a case, a userneeds to join a website of the corresponding service operator throughthe PC, apply for opening services through the PC, apply for aconnection to a customer center through a telephone, or open services byvisiting mobile communication companies.

Finally, there is a need for standardization for an access ofunauthenticated terminals to a network in the working group of SA1(Service and System Aspects Working Group 1—Services) of 3GPP which isin charge of the requirements for telecommunication services. Accordingto manual roaming regulations of the Federal Communications Commission(FCC), which is the US telecommunications regulator, consumers should beable to receive services even if they want to receive telecommunicationservices in areas where there are no home operators and roaming partnersfor the home operator.

In the embodiments of the present disclosure, operator specific servicesmay be called a mobile operator specific service, an operator restrictedservice, a restricted operator service, a restricted service, or thelike.

In the embodiments of the present disclosure, at least one of a case inwhich a mode or a state in which an operator specific service (oroperator restricted service) is used for a terminal does not havecredential for 3GPP network connection authentication, a case in whichthere is SIM but an error in an SIM connection, a case in which there isa need to join or open communication services by accessing a terminalwith no contract to a mobile operator may be provided.

In the embodiments of the present disclosure, when a terminal performsan access through operator specific services, it is possible to performlimited services supported by the corresponding operator, such asdownloading the profile, receiving the credential for the network accessauthentication, and subscription service for the mobile operator.

FIG. 1 illustrates a diagram of a structure of the LTE system accordingto embodiments of the present disclosure.

Referring to FIG. 1, the wireless communication system includes aplurality of base stations (BSs) 105, 110, 115 and 120, a mobilitymanagement entity (MME) 125, and a serving-gateway (S-GW) 130. Userequipment (hereinafter, UE or terminal) 135 is connected to an externalnetwork through the BSs 105, 110, 115, and 120 and the S-GW 130.

The base stations 105, 110, 115, and 120 are access nodes of thecellular network and provide a wireless access to terminals that areconnected to the network. That is, in order to serve traffic of users,the base stations 105, 110, 115, and 120 collect and schedule stateinformation such as a buffer state, an available transmission powerstate, and a channel state of the UEs to support a connection betweenthe UEs and a core network (CN). The MME 120 is an apparatus forperforming various control functions as well as a mobility managementfunction for the terminal and is connected to a plurality of basestations, and the S-GW 1 a 130 is an apparatus for providing a databearer. The data bearer refers to a logical (or virtual) channel onwhich data may be transmitted. In this case, only when the bearer onwhich data may be transmitted before the transmission of the data shouldbe generated, the data can be transmitted. Further, the MME 120 and theS-GW 130 may further perform authentication, bearer management, etc., onthe UE connected to the network and may process packets that are to bereceived from the base stations 105, 110, 115, and 120 and are to betransmitted to the base stations 105, 110, 115, and 120.

FIG. 2 illustrates a diagram of a radio protocol structure in the LTEsystem according to embodiments of the present disclosure.

Referring to FIG. 2, the radio protocol of the LTE system consists ofpacket data convergence protocols (PDCPs) 205 and 240, radio linkcontrols (RLCs) 210 and 235, and medium access controls (MACs) 215 and230 in the terminal and the ENB, respectively. The packet dataconvergence protocols (PDCPs) 205 and 240 serve operations of serve toperform operations such as compression/recovery of an IP header andradio link controls (hereinafter, referred to as RLC) 210 and 235reconfigures a PDCP packet data unit (PDU) at an appropriate size. TheMACs 215 and 230 are connected to several RLC layer apparatusesconfigured in one terminal and perform an operation of multiplexing RLCPDUs in a MAC PDU and demultiplexing the RLC PDUs. Physical layers 220and 225 perform an operation of channel-coding and modulating higherlayer data, making them as an OFDM symbol, and transmitting them to theradio channel or an operation of demodulating the OFDM symbol receivedthrough the radio channel, channel-decoding it, and transmitting it to ahigher layer. Further, the physical layer uses an HARQ (Hybrid ARQ) foradditional error correction and the receiving end transmits whether toreceive the packet transmitted from the transmitting end as 1 bit. Thisis called HARQ ACK/NACK information. Downlink HARQ ACK/NACK informationfor uplink transmission may be transmitted through a physical hybrid-ARQindicator channel (PHICH) physical channel and uplink HARQ ACK/NACKinformation for downlink transmission may be transmitted through aphysical uplink control channel (PUCCH) or physical uplink sharedchannel (PUSCH) physical channel.

Although not illustrated in the present drawings, radio resource control(hereinafter, referred to as RRC) layers exist at a higher part of thePDCP layer of the terminal and the base station, and the RRC layer mayreceive/transmit access and various configuration control messages for aradio resource control. A message of the RRC layer includes a unicastmessage to be transmitted to a specific terminal and a broadcast messageto be broadcast to all terminals in a cell. For example, the message ofthe RRC layer may be used to broadcast information commonly applied tothe terminals to all the terminals in the cell, or the unicast messagemay be transmitted to the specific terminal to instruct a specificconfiguration.

Examples of the broadcast message may include a system information block(SIB) for transmitting system information of a cell. Meanwhile, the LTEsystem provides a support for broadcasting messages in the base stationusing the SIB message among the RRC messages.

As described above, the technical problem of the present disclosure isto provide a method and an apparatus for a communication connection byallowing an unauthenticated terminal to select operator or communicationservices which the unauthenticated terminal wants to receive in acommunication system. Another technical problem of the presentdisclosure is to provide a method and an apparatus for downloading aprofile in real time to allow an unauthenticated terminal to downloadprofile for a communication connection online in a communication system.

Particularly, the present disclosure includes the following for theabove purposes.

-   -   A method for informing a terminal of information corresponding        to “operator specific services” by allowing a base station to        broadcast predetermined information    -   A method for collecting and displaying information that can        additionally help a user select services in a terminal, and        arranging a list of operators according to specific criteria    -   A method for requesting an access by including information        informing that terminal is accessing for “operator specific        services” when accessing a network    -   A method for determining, by a terminal, whether or not there is        a base station broadcasting information by providing a menu for        determining whether or not there are a neighboring base stations        capable of “operator specific services”

FIG. 3 illustrates a diagram of an aspect in which the embodiments ofthe present disclosure is implemented in a terminal.

Reference numeral 301 denotes a direction in which an operation isperformed in the terminal. Reference numeral 302 denotes a method forconfirming operator specific services menu in a terminal. When theterminal is operated for the first time, an additional menu 304 that auser can recognize may be generated in the terminal.

When the corresponding menu is clicked, as indicated by referencenumeral 303, the terminal can generate and display a message window forrequesting a description of the operator specific services (mobileoperator specific services) and a consent to the search of the mobileoperator providing the corresponding service.

As another method, if the mobile data menu activation is clicked in astate in which when the mobile data menu is inactivated in the terminalhaving no SIM information, as indicated by reference numeral 305, theterminal may generate and display the message window requesting a guidefor providing the operator specific services and the consent to thesearch of the provided mobile operator.

If the terminal receives a consent message to receive the correspondingmessage, as indicated by reference numeral 306, the terminal starts tosearch for a wireless channel, and receives information broadcast in theoperator network to detect whether to provide the operator specificservices and whether is the related message in the correspondinginformation.

Searched lists 307 and 309 are displayed on the screen of the terminal,and the terminal may display predetermined information, such as networksignal strength and support communication technologies, which can beacquired by the terminal, in order to help user's judgment. Thecorresponding information may include the signal strength per theoperator network and the provided communication technologies. Theterminal may combine the broadcast information with the predeterminedinformation acquired by the terminal to change an arrangement order ofservice lists and display the service lists. When a service menu(connection to opened site) including web uniform resource locator (URL)information is selected from the list displayed as indicated byreference numeral 307, like reference numeral 308, the terminal may beconnected to an operator specific service portal which is connected toan internet protocol (IP) address mapped to the corresponding URL.Alternatively, as indicated by reference numeral 309, if a service menumapped to Tel URL or session initiation protocol uniform resourceidentifier (SIP URI) information is selected, like reference numeral310, a connection is made by a telephone number associated with thecorresponding Tel URL or SIP URI. In states 308 or 310, the access forother data communication services is blocked, and services may beprovided only to an operator specific service web portal or a telephonenumber.

FIG. 4 illustrates a diagram of an operation of each node in thecommunication system according to the embodiments of the presentdisclosure.

The UE, the eNB, the mobility management entity (MME), and the servingGateway (S-GW) shown in FIG. 4 have already been described withreference to FIG. 1. The packet data network gateway (P-GW) serves tointerwork with an external network, manage data call setting, providecall charge information according to data usage, and assign an IPaddress. A policy and charging rule function (PCRF) is a device thatperforms charging and policy functions, and serves to control access byproviding the charging and policy to the P-GW. A home subscriber server(HSS) serves as a subscriber database (DB) having key information andsubscriber profile for each terminal.

Operations 401 and 403 are processes in which the terminal finds outwhether there are specific services provided by an operator through thechannel search and/or receives predetermined information on the specificservices. For example, if a user's consent to the search of servicesdisplayed on the terminal as indicated by reference numerals 303 or 305in FIG. 3, operations corresponding to operations 401 and 403 may beexecuted. In addition, depending on the implementation, the operations401 and the 403 may be performed in the terminal irrespective of theuser's consent.

While the corresponding operation (channel search of the terminal) isbeing executed, a message may be displayed on the terminal as indicatedby reference numeral 306 in FIG. 3. This information may be broadcast bythe SIB message described above. The information may be referred to asoperator service information, operator restricted service information orthe like. The service information to be broadcast may include at leastone of an identifier corresponding to the operator specific services,the presence or absence of the support for the corresponding service ofthe operator and the essential support, the type of detailed supportservices, a service name or a service number, a combination of theservice number and the service name, a web URL or a Tel URL mapped tothe services, or a description of an SIP URI and services, but is notlimited thereto. An example of a message format therefor is as follows:

OperatorService ::== SEQUENCE { operatorServiceSupport ENUMERATED {true}OPTIONAL, -- Need OR operatorServiceName OCTET STRNG OPTIONAL, -- NeedOR operatorServiceNumber OCTET STRNG OPTIONAL, -- Need ORoperatorServiceURL OCTET STRNG OPTIONAL, -- Need ORoperatorServiceDescription OCTET STRNG OPTIONAL, -- Need OR }The information (information element) may be transmitted by beingadditionally included in the existing SIB message such asSystemInformationBlockType1 (SIB1) and SystemInformationBlockType2(SIB2), or a new SIB message may be defined and transmitted. Inaddition, for example, in a system of transmitting the SIB in anon-demand type, when the information is defined as a new SIB message andtransmitted, the information on whether the new SIB message exists inthe minimum SIB including the minimum system information may beprovided. In this case, the terminal can perform a random access or thelike to the base station to request (on-demand) the SIB information tothe base station, thereby receiving the new SIB to acquire theinformation.

The terminal performs the SIB reception operation on all frequenciessupported by the terminal or the predetermined frequencies according topre-stored information to receive the information from a base station,which is operated at the corresponding frequency, among the basestations around the terminal.

If the channel search is completed in the terminal, the name of theoperator providing the corresponding service to the terminal and theinformation on the predetermined service may be displayed as indicatedby reference numerals 307 or 309 in FIG. 3. The terminal may display thepredetermined information, such as the network signal strength, thesupport communication technologies, which can be acquired by theterminal, in order to help the user's judgment. The correspondinginformation may include the signal strength per the operator network andthe provided communication technologies. The terminal may combine thebroadcast information with the predetermined information acquired by theterminal to change an arrangement order of service lists and display theservice lists.

If a user selects operator 1, the terminal transmits a connectionrequest message to a base station of the operator 1. The terminal mayuse an RRCConnectionRequest of the RRC layer to transmit the connectionrequest message to the base station, and the RRCConnectionRequestmessage may include information on an establishment cause(establishmentCause). In the embodiments of the present disclosure, theterminal defines a new establishment cause to notify the base stationthat the access to the base station is performed for the “operatorspecific services” for the establishment cause.

The base station receiving the connection request message transmits aconnection setup message to the terminal, and the RRConnectionSetupmessage of the RRC layer may be used (operation 407). The terminalreceiving the same may transmit a connection setup completion message(for example, using the RRConnectionSetupComplete message of the RRClayer) to the base station, and additionally transmits the connectionsetup completion message including an attach request message foraccessing a core network of the corresponding operator (operation 409).The attach request message is transmitted, including a UE requested PDNConnectivity Request, an Attach Type, and a Request Type. In theembodiments of the present disclosure, the terminal may configure andtransmit the Attach Type and the Request Type in order to access anetwork for the operator specific services as follows.

-   -   Values transmitted in Attach Type and Request Type are set to be        newly defined values like operator specific services (Operator        Service)    -   Attach Type is set as the existing emergency, and Request Type        are set to be newly defined values like operator specific        services (Operator Service).    -   Request Type is set as the existing emergency, and Attach Type        are set to be newly defined values like operator specific        services (Operator Service).    -   Values transmitted in Attach Type and Attach Request are set as        the existing emergency, and additionally, a new field related to        the “operator specific services” is additionally set in an        Attach Request message.

The MME receiving the information may figure out the access to thenetwork for the operator specific services (operation 411), performs aprocedure of confirming the identifier of the terminal to confirmwhether the terminal is stolen, (operation 413), and establishes asession connection to connect to a core network (gateway) capable ofproviding operator specific services.

The terminal accessing to the network for the operator specific servicesaccording to the embodiments of the present disclosure tries to accessthe network, with the information on the international mobile equipmentidentity (IMEI), which is the terminal identifier, not the informationembedded in the SIM information, so the authentication step in the stepof performing the general network access may be omitted. The terminalperforms the security procedure corresponding to the emergency call, andthe message transmission to the HSS server for the location registrationof the terminal may be omitted (operation 415).

In operation 417, the MME may transmit a session connection requestmessage to the S-GW. For example, the MME may transmit a Create sessionrequest message to the S-GW. If the S-GW receives the session connectionrequest, the S-GW again transmits the received session connectionrequest to the P-GW (operation 419). The P-GW applies the operatorpolicy, which is applied to the corresponding service request such as anIP filtering rule, to the P-GW through the message exchange with thePCRF, and sets an IP address for Redirect when receiving the URL in theP-GW (Operation 421). In the P-GW, a session response message includinga default EPS Bearer is transmitted to the S-GW (operation 423), and thecorresponding message is finally transmitted to the MME again (operation425). Therefore, a bearer is generated between the P-GW and the S-GW.Thereafter, the MME transmits an Attach Accept message to the basestation (Operation 427). Therefore, the base station uses theRRConnectionReconfiguration message of the RRC layer to generate a radiobearer between the terminal and the base station (Operation 429). If theradio bearer setup successfully ends, the base station transmits anAttach Complete message notifying that Attach is successfully performed(operation 431), so the MME transmits a bearer change message to theS-GW to generate a bearer between the S-GW and the base station(operation 433) and receives a response message from the S-GW (operation435). Accordingly, all bearer connection setups from the terminal to theP-GW are completed, so the terminal may receive data for the operatorspecific services (operation 441). The terminal may be connected to theoperator specific services portal connected to the IP address mapped tothe URL to receive data. Alternatively, the terminal may be connected tothe corresponding Tel URL or the telephone number connected to the SIPURI to use the telephone service. In this case, the access for the datacommunication services other than the operator specific services isblocked, and the services may be provided only to the operator specificservice web portal or the telephone number.

FIG. 5 illustrates a diagram of an operation of a terminal according toembodiments of the present disclosure.

The operation starts at block 501. After a power supply of the terminalis turned on (operation 502), in operation 503, the terminal determineswhether the operator restricted service is used. The case in which theoperator restricted service is used may include a case in which there isno credential for accessing the network, a case in which there is theSIM card or the SIM information but there is the error in the SIMconnection, the case in which the terminal with no contract needs tojoin a mobile operator, and the like. Hereinafter, for convenience ofexplanation, the presence or absence of the SIM information will bedescribed below by way of example. However, the following operations maybe identically or similarly applied to whether there is the credentialfor the access authentication, whether there is the error in the SIMconnection, and whether to join the mobile operator of the terminal. Ifit is determined that there is the SIM information of the terminal(operation 503), the terminal accesses the opening mobile operatornetwork belonging to the SIM (operation 504). On the other hand, if itis determined that there is no SIM information of the terminal(operation 503), an additional menu that the user can recognize isdisplayed. If the user clicks the corresponding menu or clicks mobiledata on the menu (operation 505), a message window requesting theconsent to the search of the mobile operator providing the descriptionand the corresponding service may be generated and displayed (operation506). Operations 505 and 506 can be omitted.

Thereafter, if the consent message to the reception of the correspondingmessage is received from the user, the terminal starts searching for awireless channel and receives information broadcasted in the operatornetwork (operation 507). The terminal may receive information from aplurality of base stations. The terminal detects whether to provide theoperator specific services and whether there is the related message fromthe information (508). Accordingly, if there is no mobile operatorproviding services, the fact that there no mobile operator providingservices is displayed, and the operation ends (509).

On the other hand, if there is a list of the searched operators, thelist is displayed on the screen of the terminal (510). At this time, thepredetermined information acquired to help select the services may bedisplayed on the terminal. The corresponding information may include thesignal strength per the operator network and the provided communicationtechnologies. The list may be displayed differently on the screen of theterminal according to the network signal strength, the communicationtechnologies provided, or other users or terminal designation criteria.If the specific operator and service are selected from the user 511, theterminal requests an access to the corresponding operator networkaccording to the procedure in FIG. 4 (512). If the access request issuccessfully completed, the terminal is connected to the correspondingIP (515). If the access request is successfully completed, when theservice menu including the web URL information is selected according tothe service selected by the user, the terminal is connected to theoperator specific service portal connected to the IP address mapped tothe corresponding URL. Alternatively, if the service menu mapped to theTel URL or the SIP URI information is selected, the connection to thetelephone number connected to the corresponding Tel URL or SIP URI ismade. In this state, the access for other data communication services isblocked, and services may be provided only to the operator specificservice web portal or the telephone number. The operation ends at block516.

FIG. 6 illustrates a diagram of an aspect in which “operator specificservices” information is pre-installed in the terminal according toembodiments of the present disclosure.

Reference numeral 601 denotes a direction in which an operation isperformed in the terminal. Reference numeral 603 denotes a method forconfirming operator specific services menu in a terminal. When theterminal is operated for the first time, for example, a “mobile operatorconnection” button which is an additional menu that a user can recognizemay be generated in the terminal. When there is an “operator specificservices” pre-stored in the terminal when the corresponding button isclicked, the terminal displays the corresponding list on the screen(operator 1 in 605). If there is a desired service operator and servicein the corresponding list, the user selects the corresponding operatorand service information. The subsequent procedure follows the procedureof the reference number 405 in FIG. 4 as described above.

If there is no desired service operator and service, the user may selectthe “additional search” button or the corresponding menu displayed onthe terminal, as indicated by reference numeral 605. When the additionalsearch button is clicked, the terminal may generate and display amessage window requesting a description of the operator specificservices and a consent to the search of a mobile operator providing theservices (reference numeral 607). If the terminal receives a consentmessage to receive the corresponding message, as indicated by referencenumeral 306, the terminal starts to search for a wireless channel, andreceives information broadcast in the operator network to detect whetherto provide the operator specific services and whether is the relatedadditional message in the corresponding information (reference numeral609). Thereafter, the terminal displays the detected service operatorand service list (reference numerals 611 and 613) on the screen, and thesubsequent operation follows procedures after reference numeral 605 inFIG. 4 described above.

FIG. 7 illustrates a diagram of an operation of a terminal when the“operator specific services” information is pre-installed in theterminal according to embodiments of the present disclosure.

After the power supply of the terminal is turned on (operation 703), inoperation 705, the terminal determines whether the operator restrictedservice is used. Hereinafter, for convenience of explanation, thepresence or absence of the SIM information will be described below byway of example. However, the following operations may be identically orsimilarly applied to whether there is the credential for the networkaccess authentication, whether there is the error in the SIM connection,and whether to join the mobile operator of the terminal. If it isdetermined that there is the SIM information of the terminal (operation705), the terminal accesses the mobile communication network belongingto the SIM (operation 707). On the other hand, if it is determined thatthere is no SIM information of the terminal (operation 705), when thereis the “operator specific services” pre-stored in the terminal(operation 709), the terminal displays the corresponding list on thescreen (operation 711). The terminal displays the predeterminedinformation to be acquired to help select the services. Thecorresponding information may include the signal strength per theoperator network and the provided communication technologies. The listmay be displayed differently on the screen of the terminal according tothe network signal strength, the communication technologies provided, orother users or terminal designation criteria. If the user of theterminal selects the corresponding operator and service informationsince the desired user and service are present in the list (operation713), the terminal requests an access to the operator network accordingto the procedure in FIG. 4 (operation 715) as described above, and ifthe access request is successfully completed, connection is made to thecorresponding IP (operation 723). If the access request is successfullycompleted, when the service menu including the web URL information isselected according to the service selected by the user, the terminal isconnected to the operator specific service portal connected to the IPaddress mapped to the corresponding URL. Alternatively, if the servicemenu mapped to the Tel URL or the SIP URI information is selected, theconnection to the telephone number connected to the corresponding TelURL or SIP URI is made. In this state, the access for other datacommunication services is blocked, and services may be provided only tothe operator specific service web portal or the telephone number.

If there is no desired service operator and service (operation 713),when the user clicks the “additional search” button displayed on theterminal as shown by reference numeral 605 in FIG. 6 (operation 717),the terminal may generate and display the message window requesting theconsent to the search of the mobile operator providing the descriptionof the operator specific services and the corresponding services(operation 719). If the terminal receives a consent message to receivethe corresponding message, as indicated by reference numeral 306, asdescribed with reference to FIG. 4, the terminal starts to search for awireless channel, and receives information broadcast in the operatornetwork to detect whether to provide the operator specific services andwhether is the related additional message in the correspondinginformation, and the terminal displays the corresponding list on thescreen (operation 711). In this case, the terminal displays thepredetermined information to be acquired to help select the services.The corresponding information may include the signal strength per theoperator network and the provided communication technologies. The listmay be displayed differently on the screen of the terminal according tothe network signal strength, the communication technologies provided, orother users or terminal designation criteria. If the user of theterminal selects the corresponding operator and service informationsince the desired user and service are present in the list (operation713), the terminal requests an access to the operator network accordingto the procedure in FIG. 4 (operation 715) as described above, and ifthe access request is successfully completed, connection is made to thecorresponding IP (operation 723). If the access request is successfullycompleted, when the service menu including the web URL information isselected according to the service selected by the user, the terminal isconnected to the operator specific service portal connected to the IPaddress mapped to the corresponding URL. Alternatively, if the servicemenu mapped to the Tel URL or the SIP URI information is selected, theconnection to the telephone number connected to the corresponding TelURL or SIP URI is made. In this state, the access for other datacommunication services is blocked, and services may be provided only tothe operator specific service web portal or the telephone number.

FIG. 8 illustrates a block configuration diagram of the terminal in thewireless communications system according to embodiments of the presentdisclosure.

Referring to FIG. 8, the terminal includes a transceiver 810, a messageprocessor 820, a controller 830, a memory 840, and a screen display 860.At least one of the above components may be omitted. When the terminalis simply configured, it may be configured to include the transceiver810 and the controller 830.

The message transceiver 810 serves to transmit/receive a signal througha radio channel, such as band conversion and amplification of a signal.That is, the message transceiver 810 includes an RF processor forup-converting a baseband signal into an RF band signal, transmitting theup-converted signal through an antenna, and down-converting the RF bandsignal received through the antenna into the baseband signal, and mayinclude a transmit filter, a receive filter, an amplifier, a mixer, anoscillator, a digital to analog converter (DAC), an analog to digitalconverter (ADC), or the like. FIG. 8 illustrates only one antenna butthe terminal may include a plurality of antennas. Further, the messagetransceiver 810 may include the plurality of RF chains. Further, themessage transceiver may perform beamforming. For the beamforming, themessage transceiver may adjust a phase and a size of each of the signalstransmitted/received through a plurality of antennas or antennaelements. The baseband processor in the message transceiver 810 performsa conversion function between the baseband signal and a bit stringaccording to a physical layer standard of the system. For example, whendata are transmitted, the baseband processor generates complex symbolsby coding and modulating a transmitting bit string. Further, when dataare received, the baseband processor recovers the receiving bit stringby demodulating and decoding the baseband signal provided from the RFprocessor. For example, according to the orthogonal frequency divisionmultiplexing (OFDM) scheme, when data are transmitted, the basebandprocessor generates the complex symbols by coding and modulating thetransmitting bit string, maps the complex symbols to sub-operators, andthen performs an inverse fast Fourier transform (IFFT) operation and acyclic prefix (CP) insertion to configure the OFDM symbols. Further,when data are received, the baseband processor divides the basebandsignal provided from the RF processor in an OFDM symbol unit andrecovers the signals mapped to the sub-operators by a fast Fouriertransform (FFT) operation and then recovers the receiving bit string bythe modulation and decoding. The message transceiver 810 may be definedas a transceiver.

The message processor 820 performs an operation of determining whetherthe data transmitted or received through the message transceiver 810 isany message. For example, the message processor may determine whetherthe received message is the control message of the RRC layer (includingthe SIB) or the data message of the user. The message processor may beincluded in the controller 830.

The controller 830 controls the general operations of the terminal. Forexample, the controller 830 transmits and receives signals through themessage processor 820. Further, the controller 830 records and readsdata in and from the memory 840. For this purpose, the controller 830may include at least one processor. For example, the controller 830 mayinclude a communication processor (CP) performing a control forcommunication and an application processor (AP) controlling an upperlayer such as the application programs. According to the embodiments ofthe present disclosure, if there is the operator specific service listpre-stored in the memory 840, the screen display 860 displays the list,and if there is no list or an if the additional search is requested fromthe user, neighboring cells are searched by the controller 830, themessage processor 820, and the message transceiver 810, and a controlmay be made to perform the access to the operator network selected bythe user among the searched cells. Also, according to embodiments of thepresent disclosure, the controller 830 may perform a process ofrecording data read through the memory 840, matching informationcollected through the sensor 850 or information on neighboring cellscollected through the controller 830 and the message processor 820 toallow the terminal to infer and process the information which may bereferenced to select the services.

The controller 830 may perform a control to determine whether theoperator restricted service is used, acquire the operator serviceinformation if the operator restricted service is used, and perform theoperator restricted service if the access to the operator networkselected based on the operator service information succeeds. Thecontroller 830 may determine that the operator restricted service isused in at least one of if there is no credential for the network accessauthentication in the terminal, if there is the error in the acquisitionof the SIM information, or if subscription is required for a terminalwithout contract to the mobile operator. The operator restricted servicemay include at least one of the profile download, the credentialdownload, the acquisition of the SIM information, and the mobileoperator subscription service. In addition, the operator serviceinformation may include at least one of the operator specific serviceidentification information, the operator specific service supportinformation, the detailed service support type, the uniform resourcelocator information or the uniform resource identifier information (URI)corresponding to the service. Also, the operator service information maybe broadcast through the system information. In addition, the operatorinformation may be loaded from the information pre-stored in theterminal.

The controller 830 may perform a control to be connect to the operatorservice portal corresponding to the URL included in the operator serviceinformation or to the telephone number corresponding to the Tel URL orthe SIP URI included in the operator service information. Also, thecontroller 830 may perform a control to transmit an attach requestmessage, the attach request message may include the request type and theattach type, and at least one of the request type and the attach typemay indicate that the terminal transmits is connected for the operatorrestricted service.

The controller 830 may perform a control to transmit the connectionrequest message for the selected service provider and receive theconnection response message. The connection request message may includethe connection cause information indicating the connection request forthe operator restricted service. In addition, the controller 830 maydisplay the operator service information and may perform a control toselect one operator based on the displayed operator service information.

The memory 840 stores data such as basic programs, application programs,and configuration information for the operation of the terminal. Thememory 840 provides the stored data according to the request of thecontroller 830.

The sensor 850 may be configured to include sensors included in theterminal for the terminal to collect information that may be referencedto select services, and may include a GP sensor, for example. All orsome of the sensors are activated to perform the above operationaccording to the request from the controller 830 to detect the statearound the terminal and immediately provide the detected state to thecontroller 830 or store the detected state in the memory 840.

The screen display 860 may display information processed by thecontroller 830 on the display of the terminal screen or display aconsent to an event that the terminal automatically performs or an eventto be performed by a user through the processing of the controller 830.

The methods according to the embodiments described in claims orspecification of the present disclosure may be implemented in hardware,software, or a combination of hardware and software.

When the methods are implemented in the software, a computer readablestorage medium storing at least one program (software module) may beprovided. At least one programs stored in the computer readable storagemedium is configured to be executed by at least one processor within anelectronic device. At least one program includes instructions that allowthe electronic device to execute the methods according to theembodiments described in the claims or specification of the presentdisclosure.

Such programs (software module, software) may be stored in anon-volatile memory including a random access memory and a flash memory,a read only memory (ROM), an electrically erasable programmable ROM(EEPROM), a magnetic disc storage device, a compact disc-ROM (CD-ROM),digital versatile discs (DVDs) or other types of optical storagedevices, and a magnetic cassette. Alternatively, the programs may bestored in the memory that is configured of combinations of some or allof the memories. Further, each configuration memory may also be includedin plural.

Further, the program may be stored in an attachable storage device thatmay be accessed through communication networks such as Internet, anintranet, a local area network (LAN), a wide LAN (WLAN), and a storagearea network (SAN) or a communication network configured in acombination thereof. The storage device may access an apparatusperforming the embodiments of the present disclosure through an externalport. Further, a separate storage device on the communication networkmay also access the apparatus performing the embodiments of the presentdisclosure.

Although the present disclosure has been described with variousembodiments, various changes and modifications may be suggested to oneskilled in the art. It is intended that the present disclosure encompasssuch changes and modifications as fall within the scope of the appendedclaims.

What is claimed is:
 1. A method performed by a terminal in acommunication system, the method comprising: receiving, from a basestation, system information including information indicating that anaccess to a restricted operator service is allowed; in case that theinformation is included in the system information and the restrictedoperator service is required, transmitting, to the base station, a firstradio resource control (RRC) message including an attach request messageand request type information indicating that the terminal is initiatingthe restricted operator service, wherein the attach request messageincludes attach type information associated with the restricted operatorservice; and receiving, from the base station, a second RRC messageincluding information for a bearer associated with the restrictedoperator service in case that the terminal is allowed for the restrictedoperator service.
 2. The method of claim 1, wherein an authenticationprocedure is not performed in case that the attach request messageincludes the attach type information associated with the restrictedoperator service, wherein the attach request message includes aninternational mobile station equipment identity (IMEI) of the terminal,and wherein the second RRC message includes an attach accept message. 3.The method of claim 1, further comprising: indicating no service to auser in case that the information is not received and the restrictedoperator service is required.
 4. The method of claim 1, furthercomprising: receiving at least one of a profile, a credential, orsubscriber identity module (SIM) information based on the restrictedoperator service in response to accessing an operator network thatoffers the restricted operator service.
 5. The method of claim 1,further comprising: determining the restricted operator service isrequired based on one of an identification that there is no credentialfor network access authentication in the terminal, an identificationthat there is an error in an acquisition of SIM information in theterminal, or an identification that a subscription is required for theterminal without contract to a mobile operator, wherein the terminal isan unauthenticated terminal without a profile.
 6. The method of claim 1,further comprising: displaying at least one operator network that offersthe restricted operator service; and indicating one operator network incase that the one network operator is chosen based on the displayed atleast one operator network.
 7. A method performed by a mobilitymanagement entity in a communication system, the method comprising:receiving, from a base station, an attach request message includingattach type information associated with a restricted operator service incase that system information including information indicating that anaccess to the restricted operator service is received and the restrictedoperator service is required by a terminal, wherein the attach requestmessage is included in a first radio resource control (RRC) message,being transmitted from the terminal to the base station, includingrequest type information indicating that the terminal is initiating therestricted operator service; identifying whether the terminal is allowedfor the restricted operator service based on the attach typeinformation; transmitting, to a serving gateway, a create sessionrequest message for a session configuration associated with therestricted operator service; receiving, from the serving gateway, acreate session response message including information for a bearerassociated with the restricted operator service; and transmitting, tothe base station, an attach accept message including the information forthe bearer associated with the restricted operator service in case thatthe terminal is allowed for the restricted operator service.
 8. Themethod of claim 7, wherein an authentication procedure is not performedwith the terminal in case that the attach request message includes theattach type information associated with the restricted operator service,wherein the attach request message includes an international mobilestation equipment identity (IMEI) of the terminal, and wherein a secondRRC message includes an attach accept message.
 9. A method performed bya base station in a communication system, the method comprising:transmitting system information including information indicating that anaccess to a restricted operator service is allowed; in case that theinformation is included in the system information and the restrictedoperator service is required, receiving, from a terminal, a first radioresource control (RRC) message including an attach request message andrequest type information indicating that the terminal is initiating therestricted operator service, wherein the attach request message includesattach type information associated with the restricted operator service;transmitting, to a mobility management entity, the attach requestmessage; receiving, from the mobility management entity, an attachaccept message including information for a bearer associated with therestricted operator service in case that the terminal is allowed for therestricted operator service; and transmitting, to the terminal, a secondRRC message including information for a bearer associated with therestricted operator service.
 10. The method of claim 9, wherein anauthentication procedure is not performed with the terminal in case thatthe attach request message includes the attach type informationassociated with the restricted operator service, wherein the attachrequest message includes an international mobile station equipmentidentity (IMEI) of the terminal, and wherein the second RRC messageincludes an attach accept message.
 11. A terminal in a communicationsystem, the terminal comprising: a transceiver; and a controllerconfigured to receive, from a base station via the transceiver, systeminformation including information indicating that an access to arestricted operator service is allowed, in case that the information isincluded in the system information and the restricted operator serviceis required, transmit, to the base station via the transceiver, a firstradio resource control (RRC) message including an attach request messageand request type information indicating that the terminal is initiatingthe restricted operator service, wherein the attach request messageincludes attach type information associated with the restricted operatorservice, and receive, from the base station via the transceiver, asecond RRC message including information for a bearer associated withthe restricted operator service in case that the terminal is allowed forthe restricted operator service.
 12. The terminal of claim 11, whereinan authentication procedure is not performed in case that the attachrequest message includes the attach type information associated with therestricted operator service, wherein the attach request message includesan international mobile station equipment identity (IMEI) of theterminal, and wherein the second RRC message includes an attach acceptmessage.
 13. The terminal of claim 11, further comprising: indicating noservice to a user in case that the information is not received and therestricted operator service is required.
 14. The terminal of claim 11,wherein the controller is further configured to receive, via thetransceiver, at least one of a profile, a credential, or subscriberidentity module (SIM) information based on the restricted operatorservice in response to accessing an operator network that offers therestricted operator service.
 15. The terminal of claim 11, wherein thecontroller is further configured to determine the restricted operatorservice is required based on one of an identification that there is nocredential for network access authentication in the terminal, anidentification that there is an error in an acquisition of SIMinformation in the terminal, or an identification that a subscription isrequired for the terminal without contract to a mobile operator, whereinthe terminal is an unauthenticated terminal without a profile.
 16. Theterminal of claim 11, wherein the controller is further configured to:display at least one operator network that offers the restrictedoperator service, and indicate one operator network in case that the onenetwork operator is chosen based on the displayed at least one operatornetwork.
 17. A mobility management entity in a communication system, themobility management entity comprising: a transceiver; and a controllerconfigured to: receive, from a base station via the transceiver, anattach request message including attach type information associated witha restricted operator service in case that system information includinginformation indicating that an access to the restricted operator serviceis received and the restricted operator service is required by aterminal, wherein the attach request message is included in a firstradio resource control (RRC) message, being transmitted from theterminal to the base station, including request type informationindicating that the terminal is initiating the restricted operatorservice, identify whether the terminal is allowed for the restrictedoperator service based on the attach type information, transmit, to aserving gateway via the transceiver, a create session request messagefor a session configuration associated with the restricted operatorservice, receive, from the serving gateway via the transceiver, a createsession response message including information for a bearer associatedwith the restricted operator service, and transmit, to the base stationvia the transceiver, an attach accept message including the informationfor the bearer associated with the restricted operator service in casethat the terminal is allowed for the restricted operator service. 18.The mobility management entity of claim 17, wherein an authenticationprocedure is not performed with the terminal in case that the attachrequest message includes the attach type information associated with therestricted operator service, wherein the attach request message includesan international mobile station equipment identity (IMEI) of theterminal, and wherein a second RRC message includes an attach acceptmessage.
 19. A base station in a communication system, the base stationcomprising: a transceiver; and a controller configured to: transmit, viathe transceiver, system information including information indicatingthat an access to a restricted operator service is allowed, in case thatthe information is included in the system information and the restrictedoperator service is required, receive, from a terminal via thetransceiver, a first radio resource control (RRC) message including anattach request message and request type information indicating that theterminal is initiating the restricted operator service, wherein theattach request message includes attach type information associated withthe restricted operator service, transmit, to a mobility managemententity via the transceiver, the attach request message, receive, fromthe mobility management entity via the transceiver, an attach acceptmessage including information for a bearer associated with therestricted operator service in case that the terminal is allowed for therestricted operator service, and transmit, to the terminal via thetransceiver, a second RRC message including information for a bearerassociated with the restricted operator service.
 20. The base station ofclaim 19, wherein an authentication procedure is not performed with theterminal in case that the attach request message includes the attachtype information associated with the restricted operator service,wherein the attach request message includes an international mobilestation equipment identity (IMEI) of the terminal, and wherein thesecond RRC message includes an attach accept message.