hash stringlengths 32 32 | doc_id stringlengths 5 12 | section stringlengths 5 1.47k | content stringlengths 0 6.67M |
|---|---|---|---|
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.1 Description | The network operators offer the digital asset management services for the users, with which some information (e.g. IDs) can be certified by the operator. The digital asset management services can also include
- The management of the digital asset container is performed according to the applicable regulations.
- The dig... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.2 Pre-conditions | Alice has a service subscription with the operator. As part of the service, the network operator provides
- The digital asset container management according to the future applicable regulations;
- Security protection options of the digital asset container (e.g. cannot be spoofed, access control with a policy determined... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.3 Service Flows | 1. Alice accesses the digital asset container data services. The digital asset container is initiated with Alice information (digital representation (e.g. avatar) profile, IDs ...). The digital assets are completed and modified over time. The service (allowing to store and update information) can be provided by the net... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.4 Post-conditions | Alice is authorized to access and use the dump. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.5 Existing features partly or fully covering the use case functionality | This feature is currently not documented in the 3GPP specifications.
Concerning the user identity related aspects, the features described in the document TR 22.904 [X] can be applied. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.13.6 Potential New Requirements needed to support the use case | [PR 5.13.6-1] The 5G system shall support allow a user to securely manage a digital asset container (e.g. store and update the information associated with this user).
[PR 5.13.6-2] The 5G system shall support mechanisms to retrieve the information of a digital asset container associated with a user by an authorized thi... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14 Use Case on interconnection of mobile metaverse services | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.1 Description | The concept "mobile metaverse" and "metaverse" became popular during the coronavirus pandemic as lockdown measures and work-from-home policies pushed more people online for both business and pleasure, increasing demand for ways to make online interaction more lifelike. The term covers a wide variety of location agnosti... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.2 Pre-conditions | Alice has a service subscription with the network operator M4Mobile, which is for communication services. When visiting immersive mobile metaverse service Alice uses digital representation which contains her avatars and other information like her electronic money and associated financial services, IDs, purchased items ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.3 Service Flows | 1. Alice would like to buy a travel using mobile metaverse service.
2. Alice connects to the immersive mobile metaverse service A of a travel company with the information she authorises to share for the successful provision of the service (the purchase of the travel).
3. During her session Alice is interested in buying... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.4 Post-conditions | Alice appears in the universe with the digital information chosen in her wallet (with some certified via the network operator). She keeps that information as she travels from universe to universe. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.5 Existing features partly or fully covering the use case functionality | This feature is currently not documented in the 3GPP specifications.
Concerning the user identity related aspects, the features described in the document TR 22.904 [X] can be applied. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.14.6 Potential New Requirements needed to support the use case | [PR 5.14.6-1] The 5G system shall support suitable APIs to securely provide information of a user to an immersive mobile metaverse service when the user accesses the service.
[PR 5.14.6-2] The 5G system shall support mechanisms to adapt the user assets and information stored by one immersive mobile metaverse service wi... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15 Use Case on Access to avatars | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.1 Description | Mobile metaverse services often involve the use of digital representation (e.g. avatars, which are discussed throughout this use case.) Given different use cases, the data associated with the avatars of a user are generated and stored in different mobile metaverse servers. For example, a user uses life-like avatars for... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.2 Pre-conditions | ClothingA and ClothingB are two small clothing companies that both have virtual stores and provide avatar-based shopping services. Online shoppers can use immersive real-time technology to virtually try-on apparel, accessories, or full looks on the digital representation of themselves, i.e. avatars. Their avatars are s... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.3 Service Flows | 1. ClothingA and ClothingB register with the operator T. Shaun registers with T by a UE that has a subscription with T.
2. Shaun visits the ClothingA virtual store using his avatar stored in the ClothingA database. He is authenticated by T and ClothingA, and a multimedia communication session is established between Sha... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.4 Post-conditions | Shaun tries on products in the ClothingB virtual store with his avatar.
Shaun’s user profile on T’s system is updated to record the use of his avatar in the ClothingB virtual store.
T charges ClothingA, ClothingB, and Shaun for supporting virtual shopping sessions. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.5 Existing features partly or fully covering the use case functionality | The functional requirements for user identity are captured in TS 22.101 clause 26a [4]. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.15.6 Potential New Requirements needed to support the use case | [PR 5.15.6-1] Subject to user consent, operator policy, and regulatory requirements, the 5G system shall be able to store and update the information related to digital representations for a user (e.g. last access time and address).
[PR 5.15.6-2] Subject to user consent, operator policy, and regulatory requirements, the... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16 Use Case on virtual store in a mobile metaverse marketplace | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.1 Description | 5G technologies especially the XR communication technologies make it possible to run business online (with or without physical offices/stores) to offer various services. Examples include fashion store online, drop-shipping business, virtual real estate agency, virtual assistants, teaching an online course, and online f... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.2 Pre-conditions | Magnificent Muggles, a niche fashion company, has set up virtual stores in a metaverse marketplace (a mobile metaverse service) provided by GreenMobile. The corresponding 5G communication subscriptions provided by GreenMobile include the XR enabled multimedia communication services, including IMS based avatar calls) wh... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.3 Service Flows | 0.1 Magnificent Muggles register with GreenMobile (the provider of 5G communication services and the mobile metaverse service) the digital representation (e.g. avatar) to be used by the virtual shop assistants. Subject to regulatory requirements, the digital representation are then certified to be legally used in a cer... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.4 Post-conditions | The 3GPP system with a combination of various technologies offers the users an immersive shopping experience equivalent to a face-to-face purchase in a crowded market. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.5 Existing features partly or fully covering the use case functionality | The service requirements on IMS Multimedia Telephony Service and supplementary services are well documented in TS 22.173 since Rel-7, many of which have been implemented in stage-2 and stage-3 WGs. The requirements on 3GPP IMS Multimedia Telephony Service are captured in TS 22.261 [5] clause 6.39 as a result of Rel-18 ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.16.6 Potential New Requirements needed to support the use case | [PR 5.16.6-1] Subject to user consent, the 5G system shall support mechanisms to securely register, store and update the digital assets for a user.
NOTE 1: The user could be a human user using a UE with a certain subscription, or an application running on or connecting via a UE, or a device behind a gateway UE. The use... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17 Use Case on Work delegation to autonomous virtual alter ego | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.1 Description | Artificial Intelligence (AI) is becoming more and more popular in many areas where especially humans cannot handle complicated tasks well (e.g., factory, vehicle, robot, mobile). This trend is likely to continue, and AI will be applied to even more areas. In addition to the rapid expansion of AI, the AI technology itse... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.2 Pre-conditions | John has a UE which has connectivity to 5GS based on subscription to MNO and a contract with an autonomous virtual alter ego service provider. The service setting and parameters for this alter ego service are stored in the user’s subscription data.
John’s virtual alter ego has been trained by the autonomous virtual alt... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.3 Service Flows | 1. John has a F2F appointment with his important client at client's office, so he cannot attend an internal web meeting scheduled on the same time. Then, he connects to the alter ego application via his UE and asks his alter ego to show up and participate in the internal web meeting on his behalf.
2. His virtual alter ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.4 Post-conditions | After receiving the feedback from John, the alter ego is retrained. Then, the autonomous virtual alter ego becomes more accurate and finishes the tasks much more immediately. As a result, the time available to him in life is more than doubled. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.5 Existing features partly or fully covering the use case functionality | AIML model transfer frameworks documented in TR 23.700-80 [51] can be applied to this use case.
IMS MMTEL services documented in TS 22.173 [3] can be applied to this use case. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.17.6 Potential New Requirements needed to support the use case | [PR 5.17.6-1] The 5G system shall be able to provide a means for a subscriber to authorize a third party to use a subscriber’s digital representation (e.g., avatar) and to access multimedia communication services on behalf of the subscriber.
[PR 5.17.6-2] The 5G system shall be able to collect charging information asso... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18 Use Case on virtual meeting room in financial services | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.1 Description | Meeting rooms in banks provide a private place for customers and financial manager to communicate, financial manager can provide customized information on the financial products that suitable for the customers. Customers may find a dedicated room for consulting and signing contact safer and the user experiences are bet... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.2 Pre-conditions | Each user has a unique digital representation (e.g. avatar) in the mobile metaverse service. Bank R provides consumers a virtual bank as a mobile metaverse service as a location agnostic service experience. This service requires a high level of security in mobile communication as the content is sensitive. Users have th... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.3 Service Flows | 1. Frank is a very active user of mobile metaverse service X, he does his daily work and entertainment making use of this mobile metaverse service X using his avatar.
2. Bank R has a virtual branch offered as mobile metaverse service X, in which the bank provides financial services and can provides different financial ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.4 Post-conditions | Frank had a safe and realistic experience using his digital representations (e.g. avatar) in the virtual meeting room. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.5 Existing features partly or fully covering the use case functionality | None. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.18.6 Potential New Requirements needed to support the use case | [PR 5.18.6-1] Subject to operator policy and national or regional regulation, the 5G system shall support identification of digital representations (e.g. avatars) associated with users, for mobile metaverse services.
[PR 5.18.6-2] Subject to operator policy and national or regional regulation, the 5G system shall suppo... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19 Use Case on Privacy-Aware Dynamic Network Exposure in Immersive Interactive Experiences | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.1 Description | With the proliferation of APIs in existing mobile applications already creating an extensive market for application exposure, API integration in emerging Metaverse applications and features is likely to emerge as a major functionality for enhancing experiences across extended reality functions that builds upon already-... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.2 Pre-conditions | The following pre-conditions and assumptions apply to this use case:
1. Jenna is developing an application that uses potentially personally identifiable information.
2. Jenna is aware of the existence and relevance of tuneable network characteristics to improve or augment an immersive experience, e.g., sufficient tools... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.3 Service Flows | 1. Jenna develops an application that uses sensitive data, e.g., an application that uses the real-time location and/or environmental features of users’ appearance and surroundings to generate a personal digital representation (e.g. avatar) in a mobile metaverse service activity.
2. Jenna uses an API exposing tuneable ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.4 Post-conditions | 1. Jenna’s digital representations (e.g. avatars) and other personally identifiable information generated through her application are able to safely exchange information through network exposure APIs without compromising the privacy of users or the network.
2. Network providers remain compliant with existing privacy re... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.5 Existing feature partly or fully covering use case functionality | Not applicable. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.19.6 Potential New Requirements needed to support the use case | [PR 5.19.6-1] Subject to national/regional regulations, and user consent, the 5G System shall be able to process and expose information from UEs related to user’s location, user’s body, and user’s environment, e.g., user’s home, user’s immediate vicinity.
NOTE: This requirement does not affect the ability of regulatory... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20 Use Case on Immersive Tele-Operated Driving in Hazardous Environment | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.1 Description | Operating vehicles, lifting devices, or machines in an industrial environment is hazardous when achieved manually and locally by a human. Depending on the environment, operators are exposed to dangerous material, toxic fumes, extreme temperatures, landslide risks, radioactivity, etc.
AGVs already exist, although it is ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.2 Pre-conditions | Bob works in a seaport; he operates a lifting device. The place in which he is operating is surrounded by cranes, machines, containers, pipes, and barrels containing hazardous substances.
A new mobile metaverse service is available: instead of locally controlling the device, Bob is installed in a safe remote location f... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.3 Service Flows | 1. This morning, Bob stayed home as his boss informed him about a potential hazard at the factory that was identified through some sensor on a pipe. Unfortunately, the exact nature and location of the hazard on the pipe are not known. So, Bob decides to remotely inspect the factory before his boss and local public auth... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.4 Post-conditions | Thanks to the 5G mobile metaverse “Tele-operated Driving” service, Bob has been able to drive the vehicle remotely in a reactive way avoiding dangers and finding the leak with the help of the information provided via the digital twins. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.5 Existing feature partly or fully covering use case functionality | The use case related to traffic flow simulation in clause 5.2 already provides requirements and KPIs related to the operation of a moving UE, similar to an AGV. However, that use case does not envision the use of remote control, e.g., using haptic devices and HMD, which trigger new requirements.
The use case related to... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.20.6 Potential New Requirements needed to support the use case | [PR 5.20.6-1] The 5G system shall be able to provide a means to associate data flows related to one or multiple UEs with a single digital twin maintained by the mobile metaverse service.
[PR 5.20.6-2] The 5G system shall be able to provide a means to support data flows from one or multiple UEs to update a digital twin ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21 Use Case on Virtual Emergency Drill over 5G Metaverse | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.1 Description | An Emergency Drill is a crucial activity for governments, local municipalities, and citizens to prepare for potential disasters such as earthquakes, fires, and floods. To make the drills more effective, it is important for a wide range of people, organizations, and government entities to participate and create simulati... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.2 Pre-conditions | City A, known for its beautiful beaches, attracts many visitors each year. However, it is located near the sea and is at risk of suffering significant tsunami damage in the event of a major earthquake. With the challenges of providing rapid evacuation guidance for residents, saving lives, and restoring infrastructure, ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.3 Service Flows | 1. City A is planning a virtual emergency drill that participants can access from any location, such as their office, home, or even the beach.
2. Mobile operator B will provide the 5G system and anticipated operational and maintenance data for the emergency drill in the metaverse environment.
3. In the metaverse enviro... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.4 Post-conditions | By participating in emergency drills, citizens and organizations learn how to respond to disaster scenarios, such as evacuations and rescues, and this information can be incorporated into local government disaster preparedness plans. Additionally, mobile operators can take effective measures to counteract potential net... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.5 Existing features partly or fully covering the use case functionality | No existing features are identified. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.21.6 Potential New Requirements needed to support the use case | No potential new requirements have been identified. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22 Use case of Mobile Metaverse Live Concert | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.1 Description | Mobile metaverse services allow people to enjoy an online digital concert with their avatars beyond the limitation of time and space. In order to provide immersive interactive location agnostic service experience to mobile metaverse service customers, large amount of computing resouces is needed to perform real-time pr... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.2 Pre-conditions | 1) Alex, Bob and Carey are good friends live in different cities, they agree to watch the mobile metaverse live concert together.
2) Alex, Bob and Carey are equipment with XR glasses and tactile, the equipment can capture their voice, facial expression, pose information to generate avatars and interact with the whole l... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.3 Service Flows | 1. Alex, Bob and Carey’s subscribe to the mobile metaverse live concert services and order a “private box” which can only be used by themselves. Alex, Bob and Carey will be represented at the virtual concert event by their avatars.
2. Due to extensive computing resource requirement for image rendering in the interactiv... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.4 Post-conditions | The consumers in the mobile metaverse live concert service enjoy a great immersive experience and socialize with their friends.
The 5G system is capable of supporting the communication required by the immersive mobile metaverse live concert service. Some extra edge computing services are also provided to some consumers... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.5 Existing feature partly or fully covering use case functionality | The functional and performance requirements for AR/VR services have been captured in TS 22.261 clause 7.6. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.22.6 Potential New Requirements needed to support the use case | [PR 5.22.6-1] Subject to operator policy, the 5G system shall be able to support avatar-based multiparty communication in mobile metaverse service. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23 Use Case on cooperation between metaverse and network using interactive XR | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.1 Description | The mobile metaverse allows users to access an endless virtual world at anytime and anywhere through their terminals. The mobile metaverse are expected to behave as the real world, which means in addition to rendering a virtual environment like the physical world, the perceived spatial-temporal consistency is also the ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.2 Pre-conditions | There are about 12,000 players sign up for a popular game and appear simultaneously in a specific setting, such as Eve Online in 2021. Due to the limitations of the existing server processing, it is not possible to support such a large number of high concurrency, so the network and application server need to cooperate ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.3 Service Flows | 1. Bob is a player who attends a popular AR interactive game and gathers with others in a shared environment, they are aware of each other’s action so that they need high synchronization.
2. The service provider will provide deployment information of each server to the 5G network, and request the Bob’s physical locatio... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.4 Post-conditions | Bob will have a good experience in this interactive AR game. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.5 Existing features partly or fully covering the use case functionality | 3GPP started the work of edge computing from R15 to R18. In R15, AF influence mechanism is introduced to inform the 5G network of the application deployment information to assist UPF selection. In R16, 5G system supports QoS monitoring mechanism for end-to-end delay monitoring for URLLC services. In R17, 5GS supports t... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.23.6 Potential New Requirements needed to support the use case | No potential new requirements have been identified. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24 Use Case on Authorization of Avatar Usage rights | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.1 Description | In metaverse, digital humans (avatars) are widely used in business activities, such as advertising, news reporting, live shows. With the maturity of digital human technologies and the continuous growth of market demands, lifelike avatars have become reality in recent years. In the future, more and more people are expec... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.2 Pre-conditions | Singer J has her own lifelike avatar, which is used for her live concerts in metaverse. Her touching voice has won hundreds of millions of fans. Company A is a clothing manufacturer. Seeing the commercial value of Singer J, the company invited her to be the company’s brand ambassador, who helps to increase brand awaren... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.3 Service Flows | 1. Company A registers with the MNO B as an enterprise customer, while Singer J registers as an individual customer of MNO B. MNO B assigns IDs for Company A and Singer J respectively.
2. Singer J registers her personal avatar with MNO B. The avatar is lifelike and mapped to Singer J’s ID in real world. So MNO B identi... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.4 Post-conditions | Upon authorization, Singer J has granted the usage rights of her avatar to Company A for one year to be used in mobile metaverse services. During this year, Company A is authorized to use Singer J’s avatar for business purposes. When Company A wants to use Singer J’s avatar in a mobile metaverse service, the 5GS search... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.5 Existing features partly or fully covering the use case functionality | None. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.24.6 Potential New Requirements needed to support the use case | [PR 5.24.6-1] Subject to regulatory requirements, user consent and operator’s policy, the 5G system shall support mechanisms to identify an avatar and associate the avatar with a subscriber (i.e. the owner of the avatar).
[PR 5.24.6-2] Subject to regulatory requirements, user consent and operator’s policy, the 5G syste... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25 Use Case on Enabling Metaverse services to users via multiple access connections | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.1 Description | The metaverse enables immersive virtual media, 3D avatar and holographic communications for realizing use cases such as interactive gaming, virtualized shared workspaces, and immersive conference rooms for remote collaboration, etc. The goal is to create a virtual world we can work in, interact with, and even escape to... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.2 Pre-conditions | Two friends and neighbors Mark and Bob want to enjoy their weekend using a Metaverse application for immersive gaming. Mark is using his home residential broadband (non-3GPP) while Bob is using the 3GPP access network from the same network operator. Both the 3GPP and non-3GPP access network are connected to the network... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.3 Service Flows | 1. Mark starts the immersive gaming via an authorized 3rd party metaverse application using the network operators broadband access network (non-3GPP access).
2. Bob joins the immersive gaming to play along with Mark via the same authorized 3rd party mobile metaverse services using the same network operator but connecti... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.4 Post-conditions | Both Mark and Bob accessing the same mobile metaverse service across different access networks from the same operator can get the same coordinated user experience even when experiencing different network conditions. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.5 Existing features partly or fully covering the use case functionality | The 5G system supports non-3GPP access concurrent with 3GPP access and traffic steering already. The traffic steering aspects are covered in TS 24.193.
It is already possible to expose QoS monitoring information to third parties, when using 3GPP access.
Dynamic QoS policy updates are also possible in the 5GS in the HPL... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.25.6 Potential New Requirements | [PR 5.25.6-1] Subject to operator policy and user consent, 5G system shall be able to provide means to expose network performance information (e.g., bitrate, latency) to an authorized 3rd party metaverse application.
NOTE: The network performance information can be per UE and take into account all available 5G access n... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26 Use Case on IMS-based 3D Avatar Call Support for Accessibility Use Case | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.1 Description | 3GPP has long standardized functionality to support availability of communication for users with disabilities. Global Text Telephony [56] provides a character-by-character text conversation to enable Global Text for those who rely on it, even for emergency service access. With the advent of speech recognition, it is po... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.2 Pre-conditions | Both communicating parties AeCha, Bharathi and Carlos have a mobile subscription with PLMNs Absolute Telecom (PLMN A) and Benefit Wireless (PLMN B) and Celestial Cellular (PLMN C).
Both Arndt and Berndt have UEs that support sensors capable of capturing their facial expressions and movements as well as gestures suffici... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.3 Service Flows | Scenario 1: IMS 3D Avatar Call between two callers employing accessibility features and translation
AeCha calls Bharati. AeCha and Bharati use IMS 3D Avatar Call to communicate through sign language.
AeCha signs using Korean sign language. Bharathi signs using Hindi sign language. There are many forms of sign language ... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.4 Post-conditions | In each of three scenarios one or both parties are able to sign and see signage in their native sign language in order to communicate with the other party. The possibility to interwork with legacy GTT terminals and legacy audio terminals is also supported. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.5 Existing feature partially or fully covering use case functionality | The 5G system supports IMS which is able to handle diverse media, establish calls and support media codec transcoding services.
The 5G system supports GTT. |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.26.6 Potential New Requirements | [P.R.-5.26.6-1]The 5G system shall support the encoding of sensor data capturing the facial expression and movement and gestures of a person, in a standard form, such that as part of the avatar encoding
[P.R 5.26.6-2] The 5G system shall support a set of transcoders from and to avatar representations e.g. between text,... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.27 Use Case on Localized Mobile Metaverse Overload | |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.27.1 Description | The mobile metaverse offering a location related service experience may reach its limits, as significant resource intensive communication is required to support uplink sensor data and downlink media for each user In a crowded environment, such as an amusement park, users may want to experience augmented reality in thei... |
8fc4e7e237d7663b7a5c6a2b6436bde3 | 22.856 | 5.27.2 Pre-conditions | Ajay and Vijay also have subscriptions with the operator to receive XR multimedia communication service. They both have a mobile subscription to the local operator, Salvo Net.
Ajay has a premium ticket to the amusement park. Vijay has a normal ticket.
Dream Park offers mobile metaverse services to the park visitors by ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.