WIRELESS COMMUNICATION SERVICE OVER AN EDGE DATA NETWORK (EDN) BETWEEN A USER EQUIPMENT (UE) AND AN APPLICATION SERVER (AS)
20230026264 · 2023-01-26
Inventors
Cpc classification
H04L67/34
ELECTRICITY
H04L67/51
ELECTRICITY
International classification
Abstract
In a wireless communication network, an Edge Enablement Client (EEC) in a UE Gateway (GW) exchanges EDGE-5 signaling with a user app and exchanges EDGE-1 signaling with a Gateway Enablement Server (GES) in the GW. The GES exchanges EDGE-9 signaling with an Edge Enablement Server (EES) in an Edge Data Network (EDN) and exchanges EDGE-3 signaling with a Gateway Application Server (GAS) in the GW. The GAS exchanges user data between the user app and an Edge Application Server (EAS) in the EDN responsive to the EDGE-3 signaling. The EES exchanges additional EDGE-3 signaling with the EAS. The EAS exchanges the user data between the GAS and a network core responsive to the additional EDGE-3 signaling. The core exchanges the user with the AS and transfers network information for the exchange to a Digital Ledger (DL) node. The DL node determines trust based on the network information.
Claims
1. A method of operating a wireless communication network to connect a User Application (APP) in a User Equipment (UE) to an Application Server (AS), the method comprising: an Edge Enablement Client (EEC) in a UE Gateway (GW) exchanging EDGE-5 signaling with the APP in the UE and exchanging EDGE-1 signaling with a Gateway Enablement Server (GES) in the GW; the GES exchanging the EDGE-1 signaling with the EEC, exchanging EDGE-9 signaling with an Edge Enablement Server (EES) in an Edge Data Network (EDN), and exchanging EDGE-3 signaling with a Gateway Application Server (GAS) in the GW; the GAS exchanging the EDGE-3 signaling with the GES and exchanging user data between the APP and an Edge Application Server (EAS) in the EDN responsive to the EDGE-3 signaling wherein the APP exchanges the user data responsive to the EDGE-5 signaling; the EES exchanging the EDGE-9 signaling with the GES and exchanging additional EDGE-3 signaling with the EAS; the EAS exchanging the additional EDGE-3 signaling with the EES and exchanging the user data between the GAS and the CN responsive to the additional EDGE-3 signaling; the CN exchanging the user data with the EAS, exchanging the user data with the AS, and transferring network information that characterizes the exchange of the user data to a Digital Ledger (DL) node; and the DL node receiving the network information from the CN and determining trust for the APP, the GW, the EDN, and the CN based on the network information.
2. The method of claim 1 further comprising: the EES exchanging EDGE-2 signaling with the CN; the CN exchanging the EDGE-2 signaling with the EES; the EAS exchanging EDGE-7 signaling with the CN; and the CN exchanging the EDGE-7 signaling with the EAS;
3. The method of claim 2 further comprising: an Edge Configuration Server (ECS) exchanging EDGE-4 signaling with the EEC, exchanging EDGE-6 signaling with the GES, exchanging additional EDGE-6 signaling with the EES, and exchanging EDGE-8 signaling with the CN; the EEC exchanging the EDGE-4 signaling with the ECS; the GES exchanging the EDGE-6 signaling with the ECS; the EES exchanging the additional EDGE-6 signaling with the ECS; and the CN exchanging the EDGE-8 signaling with the ECS.
4. The method of claim 1 wherein: the CN transferring the network information comprises transferring a UE identifier, application identifier, and a network address that characterizes the exchange of the user data for the APP; the DL node receiving the network information and determining the trust comprises receiving the UE identifier, the application identifier, and the network address and determining the trust for the APP, the GW, the EDN, and the CN based on the UE identifier, the application identifier, and the network address.
5. The method of claim 1 wherein the CN exchanging the user data between the EAS and the AS comprises a wireless network slice comprising a User Plane Function (UPF) exchanging the user data between the EAS and the AS.
6. The method of claim 1 wherein the CN transferring the network information to the DL node comprises a Network Exposure Function (NEF) transferring the network information to a Security Control Function (SCF) and the SCF transferring the network information to the DL node.
7. The method of claim 1 wherein: the EES exchanging the EDGE-2 signaling with the CN comprises exchanging the EDGE-2 signaling with the NEF; and the EAS exchanging the user data and the EDGE-7 signaling with the CN comprises exchanging the user data with a User Plane Function (UPF) and exchanging the EDGE-7 signaling with the NEF.
8. The method of claim 1 further comprising: a Mobile Edge Compute (MEC) platform in the EDN supporting the EES; a MEC application in the EDN supporting the EAS; another MEC platform in the GW supporting the GES; and another MEC application in the GW supporting the GAS.
9. The method of claim 1 wherein the user application comprises a computer interface application and the EAS comprises a computer server that interacts with the computer interface application.
10. The method of claim 1 wherein the user application comprises an augmented-reality application the EAS comprises an augmented-reality server that interacts with the augmented reality application.
11. A wireless communication network to connect a User Application (APP) in a User Equipment (UE) to an Application Server (AS), the wireless communication network comprising: an Edge Enablement Client (EEC) in a UE Gateway (GW) configured to exchange EDGE-5 signaling with the APP in the UE and exchange EDGE-1 signaling with a Gateway Enablement Server (GES) in the GW; the GES configured to exchange the EDGE-1 signaling with the EEC, exchange EDGE-9 signaling with an Edge Enablement Server (EES) in an Edge Data Network (EDN), and exchange EDGE-3 signaling with a Gateway Application Server (GAS) in the GW; the GAS configured to exchange the EDGE-3 signaling with the GES and exchange user data between the APP and an Edge Application Server (EAS) in the EDN responsive to the EDGE-3 signaling wherein the APP exchanges the user data responsive to the EDGE-5 signaling; the EES configured to exchange the EDGE-9 signaling with the GES and exchange additional EDGE-3 signaling with the EAS; the EAS configured to exchange the additional EDGE-3 signaling with the EES and exchange the user data between the GAS and the CN responsive to the additional EDGE-3 signaling; the CN configured to exchange the user data with the EAS, exchanging the user data with the AS, and transfer network information that characterizes the exchange of the user data to a Digital Ledger (DL) node; and the DL node configured to receive the network information from the CN and determine trust for the APP, the GW, the EDN, and the CN based on the network information.
12. The wireless communication network 11 further comprising: the EES configured to exchange EDGE-2 signaling with the CN; the CN configured to exchange the EDGE-2 signaling with the EES; the EAS configured to exchange EDGE-7 signaling with the CN; and the CN configured to exchange the EDGE-7 signaling with the EAS;
13. The wireless communication network 12 further comprising: an Edge Configuration Server (ECS) configured to exchange EDGE-4 signaling with the EEC, exchange EDGE-6 signaling with the GES, exchange additional EDGE-6 signaling with the EES, and exchange EDGE-8 signaling with the CN; the EEC configured to exchange the EDGE-4 signaling with the ECS; the GES configured to exchange the EDGE-6 signaling with the ECS; the EES configured to exchange the additional EDGE-6 signaling with the ECS; and the CN configured to exchange the EDGE-8 signaling with the ECS.
14. The wireless communication network 11 wherein: the CN is configured to transfer a UE identifier, application identifier, and a network address that characterizes the exchange of the user data for the APP; the DL node is configured to receive the UE identifier, the application identifier, and the network address and determine the trust for the APP, the GW, the EDN, and the CN based on the UE identifier, the application identifier, and the network address.
15. The wireless communication network 11 wherein the CN comprises a wireless network slice comprising a User Plane Function (UPF) configured to exchange the user data between the EAS and the AS.
16. The wireless communication network 11 wherein the CN comprises a Network Exposure Function (NEF) configured to transfer the network information to a Security Control Function (SCF) and the SCF is configured to transfer the network information to the DL node.
17. The wireless communication network 11 wherein: the EES is configured to exchange the EDGE-2 signaling with NEF; and the EAS is configured to exchange the user data with a User Plane Function (UPF) and exchange the EDGE-7 signaling with the NEF.
18. The wireless communication network 11 further comprising: a Mobile Edge Compute (MEC) platform in the EDN configured to support the EES; a MEC application in the EDN configured to support the EAS; another MEC platform in the GW configured to support the GES; and another MEC application in the GW configured to support the GAS.
19. The wireless communication network 11 wherein the user application comprises a computer interface application and the EAS comprises a computer server configured to interact with the computer interface application.
20. The wireless communication network 11 wherein the user application comprises an augmented-reality application the EAS comprises an augmented-reality server configured to support interact with the augmented reality application.
Description
DESCRIPTION OF THE DRAWINGS
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
DETAILED DESCRIPTION
[0021]
[0022] Various examples of network operation and configuration are described herein. In some examples, wireless communication network 100 connects APP 102 to AS 140 to deliver a service to UE 101 like hosted-computing or augmented reality. CN 130 exchanges EDGE-8 signaling with ECS 121 to expose network capabilities. CN 130 exchanges EDGE-2 signaling with GES 112 and EES 122 to expose network capabilities. CN 130 exchanges EDGE-7 signaling with GAS 112 and EAS 122 to configure GAS 112 and EAS 122. EEC 111 in GW 110 and ECS 121 in EDN 120 exchange EDGE-4 signaling to provision EEC 111 with network information like EES, data network name, and slice identifier. GES 112 in GW 110 and ECS 121 in EDN 120 exchange EDGE-6 signaling to configure GES 111 and convey GES information to ECS 121. EES 122 and ECS 121 in EDN 120 exchange EDGE-6 signaling to configure EES 122 and convey EES information to ECS 121.
[0023] UE 101 executes APP 102. APP 102 and EEC 111 in GW 110 exchange EDGE-5 signaling to initiate service for APP 102 over GES 112 and EES 122. EEC 111 and GES 112 in GW 110 exchange EDGE-1 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. In addition, GES 112 and EES 122 exchange EDGE-9 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. GES 112 and GAS 113 exchange EDGE-3 signaling to set-up a user data session through GAS 113. EES 122 and EAS 123 exchange EDGE-3 signaling to set-up the user data session through EAS 123. APP 102 and GAS 113 exchange user data responsive to the EDGE-3 signaling from GES 112 and the EDGE-5 signaling from EEC 111. GAS 113 and EAS 123 exchange the user data responsive to the EDGE-3 signaling from GES 112 and EES 122. EAS 123 and CN 130 exchange the user data responsive to the EDGE-3 signaling from EES 122. CN 130 and AS 140 exchange the user data. Typically, GAS 113 performs the lowest-latency tasks to deliver service to APP 102 in UE 101. EAS 123 performs additional low-latency tasks to deliver the service to APP 102 in UE 101. AS 113 tasks that do not require low-latency to deliver service to APP 102 in UE 101.
[0024] EES 122 and CN 130 exchange EDGE-2 signaling to determine network information like identifiers and addresses that characterizes the data exchange between APP 102 to AS 140. CN 130 transfers the network information to Digital Ledger (DL) 150. DL 150 determines trust for the APP 102, GW 110, RAN 114, EDN 120, and CN 130 based on the network information. For example, DL 150 may match the UE Identifier (ID), GW ID, EDN ID, CN ID, and AS ID and their corresponding network addresses against authorized combinations of the IDs and addresses to determine trust. DL 150 may use Minimum Viable Consensus (MVC) to determine trust based on the network information. EAS 123 may exchange the user data with a wireless network slice in CN 130 that comprises a User Plane Function (UPF). EAS 123, GAS 113, and AS 140 may also be part of the same network slice. The slice identifier may be part of the network information that is used to determine trust.
[0025] CN 130 may transfer the network information to DL 150 over a Network Exposure Function (NEF) and a Security Control Function (SCF). A Network Exposure Function (NEF) in CN 130 may exchange the EDGE-8 signaling, EDGE-2 signaling, and EDGE-7 signaling with EDN 120. EDN 120 and GW 110 may comprise Mobile Edge Compute (MEC) platforms and applications that support GES 112, GAS 113, EES 122, and EAS 123.
[0026] CN 130 comprises network elements like Access and Mobility Management Function (AMF), Session Management Function (SMF), Network Exposure Function (NEF), Network Slice Selection Function (NSSF), User-Plane Function (UPF), and Application Function (AF). GW 110 communicates with RAN 114 over technologies like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), Bluetooth, or some other wireless communication protocol. The various communication links in wireless communication network 100 are represented by dotted lines on
[0027] UE 101, GW 110, RAN 114, EDN 120, CN 130, AS 140, and DL 150 comprise microprocessors, software, memories, transceivers, bus circuitry, and the like. GW 110, RAN 114, and typically UE 101 also comprise radios. The microprocessors comprise Digital Signal Processors (DSP), Central Processing Units (CPU), Graphical Processing Units (GPU), Application-Specific Integrated Circuits (ASIC), and/or the like. The memories comprise Random Access Memory (RAM), flash circuitry, disk drives, and/or the like. The memories store software like operating systems, user applications, radio applications, and network functions. The microprocessors retrieve the software from the memories and execute the software to drive the operation of wireless communication network 100 as described herein.
[0028]
[0029]
[0030] UE 101 executes APP 102. APP 102 and EEC 111 in GW 110 exchange EDGE-5 signaling to initiate service for APP 102 over GES 112 in GW 110. EEC 111 and GES 112 exchange EDGE-1 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. In addition, GES 112 and EES 122 exchange EDGE-9 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. GES 112 and GAS 113 exchange EDGE-3 signaling to set-up a user data session through GAS 113. EES 122 and EAS 123 exchange EDGE-3 signaling to set-up the user data session through EAS 123. APP 102 and GAS 113 exchange user data responsive to the EDGE-3 signaling from GES 112 and the EDGE-5 signaling from EEC 111. GAS 113 and EAS 123 exchange the user data responsive to the EDGE-3 signaling from GES 112 and EES 122. EAS 123 and CN 130 exchange the user data responsive to the EDGE-3 signaling from EES 122. CN 130 and AS 140 exchange the user data. GAS 113, EAS 123, and AS 140 deliver a low-latency service to APP 102.
[0031] EES 122 and CN 130 exchange EDGE-2 signaling to determine network information that characterizes the data exchange between APP 102 to AS 140. CN 130 transfers the network information to Distributed Ledger (DL) 150. DL 150 starts in a zero trust state and transitions to an alpha trust state for APP 102, GW 110, RAN 114, EDN 120, and CN 130 based on the network information. For example, DL 150 may check a UE ID, GW ID, EDN ID, CN ID, and AS ID, and their corresponding network addresses against authorized combinations of the IDs and network addresses for the UE location and the network slices in use. DL 150 uses MVC across the DL nodes to transition from zero trust to alpha trust.
[0032]
[0033] UE 401 uses GW 410, RAN 414, EDN 420, and core 430 to communicate with AS 441-443. Security controller 433 receives related network data for UE 401, UE GW 410, RU 415, DU 416, CU 417, EDN 420, control plane 431, user plane 432, and AS 441-443. The network data comprises hardware IDs and network addresses that are typically hashed for security. In some examples, security controller 433 receives digital trust certificates from the elements that were obtained from a different security system. Security controller 433 transfers the network data to DL node 434 for trust determination. DL node 434 interacts with DL 444 to determine trust through Minimum Viable Consensus (MVC). DL node 434 and the other nodes in DL 444 match the hardware identifiers, network addresses, and/or digital trust certificates to expected values (or value prefixes) given the UE location and slice to establish trust using MVC. If any UE of slice fails hardware trust, then DL node 434 indicates the failing UE or slice to security controller 433. Security controller 433 drives core 430, EDN 420, RAN 414, GW 410, and UE 401 to isolate the failed UE or slice. DL node 434 and DL 444 maintain a blockchain record of the network information and the trust status for slices 450 and 460.
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042] APP 507 102 and EEC 609 exchange EDGE-5 signaling to initiate service for APP 507 over GES 608. EEC 609 and GES 608 exchange EDGE-1 signaling to register UE 401 and discover GAS 607, EAS VNF 806, and AS 441. In addition, GES 608 and EES VNF 807 exchange EDGE-9 signaling to register UE 401 and discover GAS 607, EAS VNF 806, and AS 441. GES 608 and GAS 607 exchange EDGE-3 signaling to set-up a user data session through GAS 607. EES VNF 807 and EAS VNF 806 exchange EDGE-3 signaling to set-up the user data session through EAS VNF 806. EES VNF 807 and NEF VNF 910 exchange EDGE-2 signaling to transfer the network information and possibly digital certificates that characterize the data exchange.
[0043] Referring back to
[0044]
[0045] The wireless data network circuitry described above comprises computer hardware and software that form special-purpose networking circuitry to connect user applications in UEs to AS. The computer hardware comprises processing circuitry like CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory. To form these computer hardware structures, semiconductors like silicon or germanium are positively and negatively doped to form transistors. The doping comprises ions like boron or phosphorus that are embedded within the semiconductor material. The transistors and other electronic structures like capacitors and resistors are arranged and metallically connected within the semiconductor to form devices like logic circuitry and storage registers. The logic circuitry and storage registers are arranged to form larger structures like control units, logic units, and Random-Access Memory (RAM). In turn, the control units, logic units, and RAM are metallically connected to form CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory.
[0046] In the computer hardware, the control units drive data between the RAM and the logic units, and the logic units operate on the data. The control units also drive interactions with external memory like flash drives, disk drives, and the like. The computer hardware executes machine-level software to control and move data by driving machine-level inputs like voltages and currents to the control units, logic units, and RAM. The machine-level software is typically compiled from higher-level software programs. The higher-level software programs comprise operating systems, utilities, user applications, and the like. Both the higher-level software programs and their compiled machine-level software are stored in memory and retrieved for compilation and execution. On power-up, the computer hardware automatically executes physically-embedded machine-level software that drives the compilation and execution of the other computer software components which then assert control. Due to this automated execution, the presence of the higher-level software in memory physically changes the structure of the computer hardware machines into special-purpose networking circuitry to connect user applications in UEs to AS.
[0047] The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. Thus, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.