摘要 |
Methods of operation of an access point are disclosed. These methods may involve authenticating a user equipment device in the access point. Access points configured for operating in accordance with the methods are also disclosed. Additionally, methods of operation of user equipment devices, and user equipment devices themselves configured for operating, in conjunction with the access points are disclosed. Still further, core network nodes configured to operate with the access points are disclosed. |