Systems and methods for reducing slice access failures

ABSTRACT

Systems, devices, and automated processes are provided with selective access to multiple available slices of a network from at least one cell by a user equipment (UE) to enable reductions in slice failure access to the network. The method includes: accessing at a first cell, by the UE, slice A of the network wherein slice A provides higher bandwidth and lower latency access than slice B; and accessing at a second cell, by the UE, both slice A and slice B of the network wherein slice B have greater access availability than slice A wherein if the UE attempts to access the first or second cell then via cell reselection of the UE making a determination to select the second cell if the user is authorized for use of a premium service for the higher bandwidth and lower latency access of slice A else selecting by the UE the first cell for network access of slice B.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of the parent U.S. patent applicationSer. No. 16/825,321 filed Mar. 20^(th), 2020 entitled SYSTEMS ANDMETHODS FOR REDUCING SLICE ACCESS FAILURES, and claims priority torelated U.S. Provisional Application No. 62/969,006 filed Jan. 31^(st),2020. The contents of both of the above applications are incorporated byreference in their entirety.

TECHNICAL FIELD

The following discussion generally relates to reducing slice accessfailures in wireless communications systems. More particularly, thefollowing discussion relates to systems, devices, and automatedprocesses that reduce slice access failures in 5G data networks or thelike by broadcasting slice identification and offset information thatuser equipment can process to identify and connect to appropriate slicesof the network.

BACKGROUND

Newer 5G data and telephone networks are being developed to providegreatly improved bandwidth and quality of service to mobile telephones,computers, internet-of-things (IoT) devices, and the like. As thesenewer high-bandwidth networks evolve, however, additional challenges arebeing recognized. The virtualization of the radio access network (RAN)of next-generation (5G) wireless systems enables applications andservices are physically decoupled from devices and networkinfrastructure. This enables the dynamic deployment of heterogeneousservices by different network operators over the same physicalinfrastructure. RAN slicing utilizes virtualization allows the operatorto provide dedicated logical networks with customer specificfunctionality, without losing the economies of scale of a commoninfrastructure. When implementing these virtual networks, mobile devicesand other user equipment can experience challenges in properlyconnecting and operating in environments where each network providesdifferent “slices” of bandwidth for different quality of service (QoS).In particular, many user equipment devices are unaware of which “slices”of the network are available from different access cells, therebyleading to difficulties in establishing appropriate connections, andeven undesired access failures as certain devices search for networkslices that may be unavailable from certain cells of the network.

It is therefore desirable to create systems, devices, and automatedprocesses that can reduce slice access failures and allow mobile devicesto operate the desired network slices. It also desirable to improveconnectivity for user equipment devices operating within 5G or similarnetworks.

Furthermore, other desirable features and characteristics of the presentinvention will become apparent from the subsequent detailed descriptionand the appended claims, taken in conjunction with the accompanyingdrawings and the foregoing technical field and background.

DESCRIPTION OF THE DRAWINGS

The exemplary embodiments will hereinafter be described in conjunctionwith the following drawing figures, wherein like numerals denote likeelements, and wherein:

FIG. 1 is a diagram showing a wireless data networking environment inaccordance with an embodiment;

FIG. 2 is a flowchart of an example automated selection process forreducing slice access failures in accordance with an embodiment;

FIG. 3 is a flowchart of an example of the failure case selectionprocess for reducing slice access failures in accordance with anembodiment;

FIG. 4 is a diagram of an example automated registration process of userequipment (UE) to a network for slice access authentication inaccordance with an embodiment; and

FIG. 5 is a diagram of an example UE and network architecture for anexample automated process for reducing slice access failure inaccordance with an embodiment.

BRIEF SUMMARY

Systems, devices, and automated processes are provided to reduce sliceaccess failures and allow mobile devices to operate the desired networkslices.

In an embodiment, a method of selective access to multiple availableslices of a network from at least one cell by user equipment (UE) toenable reductions in slice failure accesses to the network is provided.The method includes: accessing at a first cell, by the UE, slice A ofthe network wherein slice A provides higher bandwidth and lower latencyaccess than slice B; and accessing at a second cell, by the UE, bothslice A and slice B of the network wherein slice B has greater accessavailability than slice A; wherein if the UE attempts to access thefirst or second cell then via cell reselection of the UE making adetermination to select the second cell if the user is authorized foruse of a premium service for the higher bandwidth and lower latencyaccess of slice A else selecting by the UE the first cell for networkaccess of slice B.

In various exemplary embodiments, the method further includes in an idlemode, camping by the UE at a first cell for reading broadcasted systeminformation for network access at the first cell and for receiving sliceIDs which are supported and a slice offset value for availableneighboring (n) cells. The method further includes performingmeasurements by the UE on neighboring cells and calculating cellre-selection criterion using broadcasted slice offsets supported in theNetwork that corresponds to the slice IDs. The method further includestriggering a re-select of a top-ranking neighboring cell by the UEwherein the UE reselects a new slice B. The method of claim 4, furtherincludes: initiating, by the UE, a protocol data unit (PDU) session withslice A, wherein the PDU session is accepted by the network as the cellB supports slice A and if the UE is camped in an idle mode and in aslice failure, the UE initiating a PDU session with slice A. The methodfurther includes receiving by the UE a rejection of slice access since agnB or cell fails to support slice A; and triggering a re-selection bythe UE of measurements of neighboring cells. The method furtherincludes: performing, by the UE cell ranking for re-selection bydetermining if a re-selected cell supports slice A and if determined tosupport slice A then initiating by the UE the PDU session with slice A,if determined not to support slice A then re-select by the UE anothercell based on a cell re-select criteria via the reselection of the UE.

In another exemplary embodiment, a computer program product tangiblyembodied in a computer-readable storage device and including a set ofinstructions that when executed by a processor perform a method forselective access to multiple available slices of a network from at leastone cell by user equipment (UE) to enable reductions in slice failureaccesses to the network is provided. The method includes: accessing at afirst cell, by a programmed processor by the set of instructionscontained within the UE, slice A of the network wherein slice A provideshigher bandwidth and lower latency access than slice B; and accessing ata second cell, by the programmed processor, both slice A and slice B ofthe network wherein slice B has greater access availability than sliceA; wherein if the programmed processor attempts to access the first orsecond cell then via cell selection instructions of the programmedprocessor making a determination to select the second cell if the useris authorized for use of a premium service for the higher bandwidth andlower latency access of slice A else selecting by the programmedprocessor the first cell for network access of slice B.

In various exemplary embodiments, the method further includes in an idlemode, camping as instructed by the programmed processor of the UE at afirst cell for reading broadcasted system information for network accessat the first cell and for receiving slice IDs which are supported and aslice offset value for available neighboring (n) cells. The methodfurther includes performing measurements as instructed by the programmedprocessor of the UE on neighboring cells and calculating cellre-selection using broadcasted slice offsets which are supported thatcorrespond to the slice IDs. The method further includes triggering are-select of a top-ranking neighboring cell by the programmed processorof the UE wherein the programmed processor of the UE reselects a newslice B. The method further includes initiating, as instructed by theprogrammed processor of the UE, a protocol data unit (PDU) session withslice A, wherein the PDU session is accepted by the network as the cellB supports slice A. The method further includes if the UE is camped inan idle mode and a slice failure, as instructed by the programmedprocessor of the UE, initiating the PDU session with slice A. The methodfurther including receiving by the programmed processor of the UE arejection of slice access since a gnB or cell fails to support slice A;and triggering a re-selection as instructed by the programmed processorof the UE of measurements of neighboring (n) cells. The method furtherincluding: performing, as instructed by the programmed processor of theUE, a cell ranking of neighboring (n) cells for re-selection bydetermining if a re-selected cell supports slice A and if determined tosupport slice A then initiating by the programmed processor of the UEthe PDU session with slice A, and if determined not to support slice Athen re-selecting by the programmed processor of the UE another cellbased on a cell re-select criteria via programmed selection instructionsof the programmed processor of the UE.

In yet another exemplary embodiment, a method executed by a userequipment (UE) having a processor, memory, and input/output interfaces,wherein the processor is configured to execute instructions stored inthe memory to reduce slice access failures by considering sliceidentification and slice offset information received from a network nodeis provided. The method includes accessing multiple available slices ofa network from at least one cell by the user equipment (UE) by:accessing at a first cell, by the configured processor contained withinthe UE that executes the instructions, slice A of the network whereinslice A provides higher bandwidth and lower latency access than slice B;and accessing at a second cell, by the configured processor, both sliceA and slice B of the network wherein slice B has greater accessavailability than slice A; wherein if the configured processor attemptsto access the first or second cell via cell selection instructions thenmaking a determination to reselect the second cell if the UE isauthorized for use of a premium service for the higher bandwidth andlower latency access of slice A else selecting by the programmedprocessor the first cell for network access of slice B. The methodfurther including in an idle mode, camping as instructed by theconfigured processor of the UE at a first cell for reading broadcastedsystem information for network access at the first cell and forreceiving slice IDs which are supported and a slice offset value foravailable neighboring (n) cells.

In various exemplary embodiments, the method further includingperforming measurements as instructed by the configured processor of theUE on neighboring cells and calculating cell re-selection usingbroadcasted slice offsets which are supported that correspond to theslice IDs. The method further including: triggering a re-select of atop-ranking neighboring cell by the configured processor of the UEwherein the configured processor of the UE reselects a new slice B; andinitiating, as instructed by the configured processor of the UE, aprotocol data unit (PDU) session with slice A, wherein the PDU sessionis accepted by the network as the cell B supports slice A.

DETAILED DESCRIPTION

The following detailed description is intended to provide severalexamples that will illustrate the broader concepts that are set forthherein, but it is not intended to limit the invention or the applicationand uses of the invention. Furthermore, there is no intention to bebound by any theory presented in the preceding background or thefollowing detailed description.

Various embodiments are able to improve connectivity within a 5G networkor the like by broadcasting, from each cell, identification informationabout the various slices of bandwidth that are available from that cell.When user equipment devices are made aware of available slices, moreeffective and efficient connections can be made.

The Access and Mobility Management Function (AMF) instance that isserving the UE is common (or logically belongs) to all the Network Sliceinstances that are serving the UE. Other network functions, such as theSession Management Function (SMF) or the User Plan Function (UPF), maybe specific to each Network Slice. The Network Slice instance selectionfor a UE is normally triggered as part of the registration procedure bythe first AMF that receives the registration request from the UE. TheAMF retrieves the slices that are allowed by the user subscription andinteracts with the Network Slice Selection Function (NSSF) to select theappropriate Network Slice instance (e.g., based on allowed S-NSSAIs,PLMN ID, etc.).

A Protocol Data Unit (PDU) Session is associated with one S-NSSAI andone DNN (Data Network Name). The establishment of a PDU session withinthe selected instances-NSSAI is triggered when the AMF receives aSession Management message from UE. The AMF discovers candidate SessionManagement Functions (SMF) using multiple parameters including theS-NSSAI provided in the UE request and selects the appropriate SMF. Theselection of the User Plane Function (UPF) is performed by the SMF anduses the S-NSSAI. The Network Repository Function (NRF) is used for thediscovery of the required Network Functions using the selected NetworkSlice instance—the detailed procedures are specified in 3GPP TS 23.502.The data transmission can take place after a PDU session to a DataNetwork is established in a Network Slice.

A physical or network node either represents an access node (e.g. RadioDistributed Units) or a non-access node (e.g. servers and routers) whilea physical link represents an optical fiber link between two physicalnodes. Every physical node is characterized by a set of availableresources, namely computation (CPU), memory (RAM), and storage. Eachphysical link is characterized by a bandwidth capacity and a latencyvalue which is the time needed by a flow to traverse that link. Finally,both physical nodes and links have associated utilization costs for eachtype of available resource.

In addition, we consider a set of network slice requests that correspondto customer demands to implement specific Communication Services. Anetwork slice is a virtual network composed of a set of virtual nodesinterconnected by a set of virtual links.

Network Slicing

A network slice, namely “5G slice”, supports the communication serviceof a connection type with a specific way of handling the C- and U-planefor this service. To this end, a 5G slice is composed of a collection of5G network functions and specific RAT settings that are combined for thespecific use case or business model. Thus, a 5G slice can span alldomains of the network: software modules running on cloud nodes,specific configurations of the transport network supporting the flexiblelocation of functions, a dedicated radio configuration, or even aspecific RAT, as well as the configuration of the 5G device. Third-partyentities can be given permission to control certain aspects of slicingvia a suitable API, in order to provide tailored services.

In an example scenario, a slice (“Slice A”) is instantiated with adistributed centralized unit (CU), multi-access edge computing (MEC),and user plane function (UPF) for low latency and content caching. Inthis example, Slice A is dedicated to enterprise users, commercialusers, and/or the like who have paid for a premium service. That is,users of Slice A can expect better bandwidth, lower latency, betteraccess to edge computing resources, and/or other benefits thannon-preferred users. A more general slice (“Slice B” in this example)will typically provide better geographic coverage than the premium sliceA, but without the performance benefits of Slice A. Generally, Slice Bwill be made available to all users of the system, includingnon-preferred users. Ideally, Slice B would also be available for use bypremium users when no Slice A is available. That is, premium users willoften have access to Slice B (albeit without the performance benefitsprovided by Slice A) when Slice A is not available. This providespremium users with access to the same geographic coverage as non-premiumusers while retaining the premium services where Slice A is available.From a network standpoint, then, the network will generally have mixeddeployments where i) some cells supporting slice A are on differentfrequencies than Slice B macro/public cells and ii) some cells will besupporting both slice A and B. User devices operated by those users thathave paid for a premium service would ideally prioritize cells thatsupport the higher priority slice, but fall back to other cells when thehigher priority slice is not available.

Presently, user equipment (UE) does not typically select and accesscells based upon the slices that are supported by the Network. That is,even if the premium users have access to both normal neighboring (n) ormacrocells and low latency cells, their UEs will not generallydistinguish between these cells and will reselect based on other cellranking criterion (e.g., received signal strength (RSSI) or otherparameters related to the strength of the signal received from thecell). If a premium user is camped on a macro cell that does not offerslice A, for example, that user's UE will frequently reject the UE'sattempt to access Slice A, even if the slice is available on anothercell. Generally speaking, network providers rely upon the UEimplementation to reselect to another cell and to initiate an attempt toaccess slice B. The subsequent reselections will not typically takeslicing into account, and as a result, the UE may reselect cells that donot offer slice A, even if other cells offering the premium slice areavailable (albeit potentially at a less optimal cell according to othercriteria).

To overcome this problem, each network node (e.g., gNB) shouldperiodically or otherwise broadcast slice IDs that are supported by thatnode, along with a slice offset value for each slice ID that the UE cantake into account while performing the cell ranking criterion forre-selection. Additionally, if a UE that is camped on a cell receives arejection to access a slice not supported by the Network, that UE cantrigger reselection using the slice IDs and slice offset value.

In various exemplary embodiments, the present disclosure describesmethods and systems enabling enterprise and public users access to cellsbased on the slices supported by the network (i.e. 5G network). So ifthe premium users have access to normal neighboring (n) cells and lowlatency cells, the UEs will not distinguish between these cells and willreselect based on the cell ranking criterion.

In various exemplary embodiments, the present disclosure describesmethods and systems for providing premium users when camped on a macrocell that does not offer slice A will reject the UE's attempt to accessSlice A. It would be then based on UE implementation to reselect toanother cell and initiate attempts to access slice B. The subsequentreselections will also not take slicing into account and UE may reselectcells that do not offer slice A.

FIG. 1 shows a graphical representation of a 5G or other data network100 that includes multiple cells 121, 122, 123 that provide access to anetwork 105 for any number of UE devices 110. Although FIG. 1 shows onlyone UE device 110 for simplicity, in practice the concepts describedherein may be scaled to support environments 100 that include any numberof devices 110 and/or cells 121-123, as well as any sort of networkarchitecture for assigning bandwidth to the different slices andperforming other tasks, as desired.

In the example of FIG. 1, a mobile telephone or other user equipment(UE) device 110 suitably attempts to connect to network 105 via anappropriate access cell 121, 122, 123. In the illustrated example, eachcell 121, 122, 123 maintains identification information 131, 132, 133(respectively) that identifies the various slices of bandwidth (Slice A,Slice B) that are available from that cell. In various embodiments,information 131-133 additionally includes offset values or otherinformation that can be used in selecting and connecting to anappropriate cell 131-133, as desired.

As illustrated in FIG. 1, cell 121 provides access to slice B, cell 122provides access to slices A and B, and cell 123 provides access to sliceB. As user device 110 attempts to select a cell 121-123 to connect to,cell selection logic 115 executed by the device is able to consider thedifferent slices that are available from the different cells, asdescribed more fully below. In an example embodiment, cell selectionlogic 115 is implemented with computer-executable instructions stored ina memory, hard drive, or other non-transitory storage of device 110 forexecution by a processor of device 110.

If a user of device 110 is authorized to use preferred slice A as in theexample above, device 110 should ideally select cell 122 of theavailable cells 121-123 since this is the only cell that provides thepremier service. As noted above, more conventional currentimplementations simply consider received signal strength and/or the likein selecting between available cells. By broadcasting the sliceavailability data 131-133, the cell selection logic 115 of user device110 can make a more informed selection that is more likely to providebetter service when it is available.

FIG. 2 is an exemplary flowchart 200 of cell reselection for sliceaccess performed by the UE in accordance with an embodiment. In FIG. 2,the UE is camped in an idle mode on cell A at 210. Next, at 220, the UEreads a broadcasted system information from cell A (i.e. the currentcell in which the UE is located) and receives slice IDs supported bycell A and slice offset values for neighboring (n) cells. At 230, the UEperforms measurements on neighboring cells and calculates cellreselection equations using slice offsets of the supported slices. Thatis, the UE creates a measurement report of slices A, B, etc. . . .provided to the UE. At 240, a reselection is triggered on thetop-ranking n cells. At 250, the UE reselects the new cell B based onthe ranking of the n cells. The UE, at 260 initiates the PDU sessionwith slice A. At 270, the session is accepted as call B supports sliceA. At 280, the PDU session is active.

FIG. 3 is an exemplary flowchart 300 of failure cases for slice accessperformed by the UE in accordance with an embodiment. In FIG. 3, the UEis camped in an idle mode at 310. At 320, the UE initiates a PDU sessionwith slice A. At 330, the UE receives a reject (slice access) since thegnB/cell does not support slice A. At 340, the UE triggers a reselectionmeasurement of neighboring cells. At 350, UE performs a cell rankingbased on the measurements of the neighboring cells. At 360, the UEreselects a cell that supports slice A, if confirmed then at 370, the UEinitiates a PDU session with slice A. If not, then at 380, the UEreselects another cell based on the cell reselection criteria. Thiscontinues until a cell is found that supports slice A or all the cellsin the cell list are exhausted.

FIG. 4 is a registration process for a slice at a cell by the UE inaccordance with an embodiment. At Step 1, the UE 410 sends aRegistration Request to the network. The UE 410 will include the list ofneighboring cells corresponding to the network slices for authenticationaccess. At step 2, the UE 410 and network 420 complete theauthentication of the UE 410, using a particular authenticationprocedure. After receiving the authentication, the access and mobilitymanagement function (AMF) 430 will have a list of allowed slice IDs forthe UE 410 in the AMF form based on the subscription informationavailable. At step 3: At the end of the authentication procedure, theAMF 430 sends a Registration Accept message to the UE 410. Based on thesubscription information received, the message will contain all theallowed slice access except the ones which require Slice-specificauthentication 440. At step 4: the UE 410 sends a Registration Acceptmessage, indicating the successful completion of the authentication. Ifthe UE 410 had indicated its support for Network Slice-SpecificAuthentication and Authorization Procedure 440 in the RegistrationRequest, based on the subscription information, the AMF 430 initiatesslice-specific authentication, for all the slices which require slicespecific authentication 440. At step 6, multiple exchanges for sliceauthorization where the AMF 430 records the success of theauthentication requests for the Slice represented and forwards thesuccess to the UE 410. The AMF 440 completes the Slice-specificauthentication for all network slices for which there is a subscriptionindication that a slice-specific authentication is required for the UEto access these slices. Additionally, various implementation can befurther included such as once the Slice-Specific Authentication iscompleted for available slices, depending on the result ofSlice-Specific Authentication, the AMF 430 may trigger a UEConfiguration Update procedure to deliver a new list of Allowed slices.

FIG. 5 is an exemplary illustration of a UE and network configuration500 in accordance with an embodiment. The UE 510 includes a processor515 for performing various logic solution functions for registering andreceiving broadcast system information, initiating PDU sessionsperforming cell selections and reselections, ranking neighboring cells,configuring different modes of operation of the UE, etc. . . . The UE510 may include cell reselection module 525, input/output interfaces505, memory 530 for storing measurement reports, rankings data ofneighboring cells, and a measurement module 535 (within the cellreselection module 525) for calculating by various solutions distancesand other criteria for neighboring cells, etc. . . . The network 540 mayinclude a base station 575, processor 545 for registering UE for sliceaccess, cell ID modules 555, broadcast module 560 for broadcasting sliceID, slice offset values for neighboring cells and other systeminformation, authentication module 550 for authenticating a UE, networkslices 570, etc. . . . The UE 510 communicates with the network andreads broadcasted system information at a cell in which the UE is campedin an idle mode. For example, if the UE is camped at a cell A, then theUE would receive slice IDs and slice offset values for neighboring cellsof cell A via the transceiver 520 and process the information via theprocessor 515 to perform measurements and calculate using cellreselection equations of the cell reselection module 525 (e.g. using acell reselection logic or process) to select a next cell where the cellreselection process is based on a ranking of the neighboring cells.

As described, a data networking system includes several data processingcomponents, each of which is patentable, and/or have patentable aspects,and/or having processing hardware capable of performing automatedprocesses that are patentable. This document is not intended to limitthe scope of any claims or inventions in any way, and the variouscomponents and aspects of the system described herein may be separatelyimplemented apart from the other aspects.

1. A registration process for a slice at a cell by user equipment in anetwork, the registration process comprising: sending by the UE aregistration request to the network wherein the registration requestcomprises a list of neighboring cells corresponding to a set of networkslices for authentication access; in response to sending theregistration request, initiating an authentication procedure forauthenticating the access between the UE and the network; allowing,after receiving approval of completion of the authentication procedure,the access and making available to the UE a list of allowed sliceidentifications (IDs) generated by the access and mobility managementfunction (AMF) wherein the list of the allowed slice IDs comprises theallowed slice IDs with the access based on subscription information; andat the end of the authentication procedure, sending by the AMF aregistration accept message to the UE.
 2. The registration process ofclaim 1, wherein the registration accept message is based on thesubscription information and comprises the set of slice accesses allowedwherein the slice accesses allowed excludes the slice accesses thatrequire slice specific authentication.
 3. The registration process ofclaim 2, further comprising: sending, by the UE, the registration acceptmessage upon the completion a notice that comprises the completion ofthe authentication procedure associated with one or more slices of theset of slice accesses allowed.
 4. The registration process of claim 3,further comprising: in response to the UE requesting both slice-specificauthentication and initiating of an authorization procedure in theregistration request based on subscription information, initiating bythe AMF the slice-specific authentication for at least one slice thatrequires the slice-specific authentication for the slice access.
 5. Theregistration process of claim 4, further comprising: recording a setcomprising at least one authentication request of multiple exchanges ofauthentication requests between the UE and the network for sliceauthorization; and determining a success of the at least oneauthentication request of a set of multiple exchanges of authenticationrequests for each slice represented and forwarding the notice of thesuccess to the UE.
 6. The registration process of claim 5, furthercomprising: upon the completion by the AMF of the slice-specificauthentication for each slice represented of a set of slices in thenetwork slices that have a subscription indication that theslice-specific authentication is required, allowing the slice access tothe set of slices with the subscription indication by the UE.
 7. Theregistration process of claim 6, further comprising: upon the completionof the slice-specific authentication a set of available slices,triggering by the AMF, an update of a UE configuration update procedureto deliver a new list of slices that the slice access is allowed whereinthe slice access is dependent on a result of the slice-specificauthentication.
 8. A computer program product tangibly embodied in acomputer-readable storage device and comprising a set of instructionsthat when executed by a processor perform a method for selective accessto multiple available slices of a network from at least one cell by userequipment (UE), the method comprising: sending by a programmed processorby the set of instructions contained within the UE a registrationrequest to the network wherein the registration request comprises a listof neighboring cells corresponding to a set of network slices forauthentication access; in response to sending the registration request,initiating as instructed by the programmed processor an authenticationprocedure for authenticating the access between the UE and the network;allowing, after receiving approval of completion of the authenticationprocedure, the access and making available to the UE as instructed bythe programmed processor, a list of allowed slice identifications (IDs)generated by the access and mobility management function (AMF) whereinthe list of allowed slice IDs comprises the allowed slice IDs with theaccess based on subscription information; and at the end of theauthentication procedure, sending by the AMF as instructed by theprogrammed processor, a registration accept message to the UE.
 9. Themethod of claim 8, wherein the registration accept message is based onthe subscription information and comprises the set of slice accessesallowed wherein the slice accesses allowed excludes the slice accessesthat require slice specific authentication.
 10. The method of claim 9,further comprising: sending, by the UE as instructed by the programmedprocessor, the registration accept message upon the completion a noticethat comprises the completion of the authentication procedure associatedwith one or more slices of the set of slice accesses allowed.
 11. Themethod of claim 10, further comprising: in response to the UE requestingboth slice-specific authentication and initiating of an authorizationprocedure in the registration request based on subscription information,initiating, by the AMF as instructed by the programmed processor, theslice-specific authentication for at least one slice that requires theslice specific authentication for the slice access.
 12. The method ofclaim 11, further comprising: recording, as instructed by the programmedprocessor of the UE, a set comprising at least one authenticationrequest of multiple exchanges of authentication requests between the UEand the network for slice authorization; and determining, as instructedby the programmed processor of the UE, a success of the at least oneauthentication request of a set of multiple exchanges of authenticationrequests for each slice represented and forwarding the notice of thesuccess to the UE.
 13. The method of claim 12, further comprising: uponthe completion by the AMF of the slice-specific authentication for eachslice represented of a set of slices in the network slices that have asubscription indication that the slice-specific authentication isrequired, allowing as instructed by the processor of the UE, the sliceaccess to the set of slices with the subscription indication.
 14. Themethod of claim 13, further comprising: upon the completion of theslice-specific authentication a set of available slices, triggering bythe AMF as instructed by the processor of the UE, an update of a UEconfiguration update procedure to deliver a new list of slices that theslice access is allowed wherein the slice access is dependent on aresult of the slice-specific authentication.
 15. A method executed byuser equipment (UE) having a processor, memory, and input/outputinterfaces, wherein the processor is configured to execute instructionsstored in the memory to initiate a registration process for a slice at acell by the UE in a network, the method comprising: accessing multipleavailable slices of the network from at least one cell by the userequipment (UE) by: sending, by a configured processor contained withinthe UE that executes the instructions, a registration request to thenetwork wherein the registration request comprises a list of neighboringcells corresponding to a set of network slices for authenticationaccess; in response to sending the registration request, initiating bythe configured processor an authentication procedure for authenticatingthe access between the UE and the network; allowing, after receivingapproval of completion of the authentication procedure, the access andmaking available to the UE by the configured processor, a list ofallowed slice identifications (IDs) generated by the access and mobilitymanagement function (AMF) wherein the list of allowed slice IDscomprises the allowed slice IDs with the access based on subscriptioninformation; and at the end of the authentication procedure, sending bythe AMF by the configured processor, a registration accept message tothe UE.
 16. The method of claim 15, wherein the registration acceptmessage is based on the subscription information and comprises the setof slice accesses allowed wherein the slice accesses allowed excludesthe slice accesses that require slice specific authentication.
 17. Themethod of claim 16, further comprising: sending, by the UE by theconfigured processor, the registration accept message upon thecompletion of a notice that comprises the completion of theauthentication procedure associated with one or more slices of the setof slice accesses allowed.
 18. The method of claim 17, furthercomprising: in response to the UE requesting both slice-specificauthentication and initiating of an authorization procedure in theregistration request based on subscription information, initiating bythe AMF by the configured processor the slice-specific authenticationfor at least one slice that requires the slice-specific authenticationfor the slice access.
 19. The method of claim 18, further comprising:recording, by the configured processor of the UE, a set comprising atleast one authentication request of multiple exchanges of authenticationrequests between the UE and the network for slice authorization; anddetermining, by the configured processor of the UE, a success of the atleast one authentication request of a set of multiple exchanges ofauthentication requests for each slice represented and forwarding thenotice of the success to the UE.
 20. The method of claim 19, furthercomprising: upon the completion by the AMF of the slice-specificauthentication for each slice represented of a set of slices in thenetwork slices that have a subscription indication that a slice-specificauthentication is required, allowing by the configured processor of theUE, the slice access to the set of slices with the subscriptionindication.