| CPC H04W 74/04 (2013.01) [H04M 3/38 (2013.01); H04W 4/50 (2018.02); H04W 4/70 (2018.02); H04W 28/0247 (2013.01); H04W 48/08 (2013.01); H04W 74/002 (2013.01); H04W 76/11 (2018.02); H04W 8/26 (2013.01); H04W 12/06 (2013.01); H04W 12/61 (2021.01); H04W 12/72 (2021.01); H04W 60/00 (2013.01); H04W 74/00 (2013.01)] |

| AS A RESULT OF REEXAMINATION, IT HAS BEEN DETERMINED THAT: |
| Claims 1 and 7 are cancelled. |
| Claims 3 and 5 are determined to be patentable as amended. |
| Claims 4 and 6, dependent on an amended claim, are determined to be patentable. |
| New claims 9-24 are added and determined to be patentable. |
| Claims 2 and 8 were not reexamined. |
|
3. A terminal configured for use in a telecommunications network, wherein the telecommunications network is configured for providing access to a plurality of terminals that each have a unique identifier for accessing the telecommunications network, wherein access to the telecommunications network for the terminal involves two or more access phases for establishing access, each phase involving one or more steps, [ the two or more access phases comprising a first access phase being for network attach and a second access phase being for establishing a PDP context, ] and
wherein the terminal comprises:
a message receiver configured for receiving a message from the telecommunications network, the message including access denial information indicative of at least one deny access time interval for the terminal, wherein the at least one deny access time interval specifies a time interval within which requesting network resources associated with at least one access phase of the two or more access phases for the terminal is not permitted, and wherein the at least one deny access time interval for the terminal is stored in a register of the telecommunications network in combination with the unique identifier of the terminal; and
one or more processors and
memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
[ a first access request operation for transmitting a request for network attach;
a request response operation for receiving a request response to the first access request operation request for network attach, the request response denying network attach based on telecommunications network load, the request response including the at least one deny access time interval;]
one or more applications of a class of applications that do not require immediate transfer of data,
wherein the deny access time interval for a terminal executing the one or more applications is a variable time interval x-y that is scheduled depending on network load experienced by, or expected for, the telecommunications network, and the terminal executing the one or more applications transmits an access request for accessing the resources associated with the at least one of the two or more access phases to the telecommunications network in accordance with the variable time interval x-y specified in the access denial information received from the telecommunications network, [ and]
wherein the terminal executing the one or more applications that do not require immediate transfer of data is not permitted to request access to the resources associated with the at least one of the two or more [ access ] phases
|
|
5. A terminal configured for use in a telecommunications network, wherein the telecommunications network is configured for providing access to a plurality of terminals that each have a unique identifier for accessing the telecommunications network, wherein access to the telecommunications network for the terminal involves two or more access phases for establishing access, each phase involving one or more steps, [ the two or more access phases comprising a first access phase being for network attach and a second access phase being for establishing a PDP context, ] and
wherein the terminal comprises:
a message receiver configured for receiving a message from the telecommunications network, the message including access grant information indicative of at least one grant access time interval for the terminal, wherein the at least one grant access time interval specifies a time interval outside of which requesting network resources associated with at least one access phase of the two or more access phases for the terminal is not permitted, and wherein the at least one grant access time interval for the terminal is stored in a register of the telecommunications network in combination with the unique identifier of the terminal;
one or more processors; and
memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
[ a first access request operation for transmitting a request for network attach;
a request response operation for receiving a request response to the first access request operation request for network attach, the request response denying network attach based on telecommunications network load, the request response including the at least one grant access time interval;]
one or more machine-to-machine applications,
wherein the grant access time interval for a terminal executing the machine-to-machine applications is a variable time interval x-y that is scheduled depending on network load experienced by, or expected for, the telecommunications network, and the terminal executing the one or more machine-to-machine applications transmits an access request for accessing the resources associated with the at least one of the two or more access phases to the telecommunications network in accordance with the variable time interval x-y specified in the access grant information received from the telecommunications network, [ and]
wherein the terminal executing the one or more machine-to-machine applications is not permitted to request access to the resources associated with the at least one of the two or more access phases during peak load time intervals by having grant access time intervals that are outside the peak load time intervals.
|
|
[ 9. The terminal as recited in claim 1, wherein the two or more access phases comprise a first access phase being for network attach and a second access phase being for establishing a PDP context, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
an additional access request operation for transmitting a request for network attach; and
a request response operation for receiving a request response to the additional access request operation request for network attach, the request response denying network attach based on telecommunications network load, the request response including the at least one grant access time interval.]
|
|
[ 10. The terminal as recited in claim 9, wherein a request for access to resources associated with the at least one access phase of the two or more access phases is granted if the network load is below, or is expected to be below, a particular threshold.]
|
|
[ 11. The terminal as recited in claim 9, wherein the at least one grant access time interval specifies a time interval outside of which requesting a network attach is not permitted.]
|
|
[ 12. The terminal as recited in claim 9, wherein the at least one grant access time interval specifies a time interval outside of which requesting a PDP context is not permitted.]
|
|
[ 13. The terminal as recited in claim 9, wherein the first access phase includes steps of requesting network attachment, authentication and request response, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
a second additional access request operation for transmitting a request for network attach, the second additional access request operation occurring after the additional access request operation and after the request response operation receiving the request response denying network attach based on telecommunications network load; and
a second request response operation for receiving a second request response to the second additional access request operation request for network attach, the second request response denying network attach based on telecommunications network load, the second request response occurring without the terminal performing the authentication step for the second additional access request operation.]
|
|
[ 14. The terminal as recited in claim 3, wherein the at least one deny access time interval specifies a time interval within which requesting a network attach is not permitted.]
|
|
[ 15. The terminal as recited in claim 3, wherein the at least one deny access time interval specifies a time interval within which requesting a PDP context is not permitted.]
|
|
[ 16. The terminal as recited in claim 3, wherein the first access phase includes steps of requesting network attachment, authentication and request response, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
a third access request operation for transmitting a request for network attach, the third access request operation occurring after the first access request operation and after the request response operation receiving the request response denying network attach based on telecommunications network load; and
a second request response operation for receiving a second request response to the third access request operation request for network attach, the second request response denying network attach based on telecommunications network load, the second request response occurring without the terminal performing the authentication step for the third access request operation.]
|
|
[ 17. The terminal as recited in claim 5, wherein the at least one grant access time interval specifies a time interval outside of which requesting a network attach is not permitted.]
|
|
[ 18. The terminal as recited in claim 5, wherein the at least one grant access time interval specifies a time interval outside of which requesting a PDP context is not permitted.]
|
|
[ 19. The terminal as recited in claim 5, wherein the first access phase includes steps of requesting network attachment, authentication and request response, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
a third access request operation for transmitting a request for network attach, the third access request operation occurring after the first access request operation and after the request response operation receiving the request response denying network attach based on telecommunications network load; and
a second request response operation for receiving a second request response to the third access request operation request for network attach, the second request response denying network attach based on telecommunications network load, the second request response occurring without the terminal performing the authentication step for the third access request operation.]
|
|
[ 20. The terminal as recited in claim 7, wherein the two or more access phases comprising a first access phase being for network attach and a second access phase being for establishing a PDP context, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
an additional access request operation for transmitting a request for network attach; and
a request response operation for receiving a request response to the additional access request operation request for network attach, the request response denying network attach based on telecommunications network load, the request response including the at least one deny access time interval.]
|
|
[ 21. The terminal as recited in claim 20, wherein a request for access to resources associated with the at least one access phase of the two or more access phases is denied if the network load is above, or is expected to be above, a particular threshold.]
|
|
[ 22. The terminal as recited in claim 20, wherein the at least one deny access time interval specifies a time interval within which requesting a network attach is not permitted.]
|
|
[ 23. The terminal as recited in claim 20, wherein the at least one deny access time interval specifies a time interval within which requesting a PDP context is not permitted.]
|
|
[ 24. The terminal as recited in claim 20, wherein the first access phase includes steps of requesting network attachment, authentication and request response, and
wherein the memory storing processor instructions that, when executed by the one or more processors, cause the one or more processors to carry out operations including:
a second additional access request operation for transmitting a request for network attach, the second additional access request operation occurring after the additional access request operation and after the request response operation receiving the request response denying network attach based on telecommunications network load; and
a second request response operation for receiving a second request response to the second additional access request operation request for network attach, the second request response denying network attach based on telecommunications network load, the second request response occurring without the terminal performing the authentication step for the second additional access request operation.]
|