WIRELESS COMMUNICATION SERVICE OVER AN EDGE DATA NETWORK (EDN) BETWEEN A USER EQUIPMENT (UE) AND AN APPLICATION SERVER (AS)
20240147578 ยท 2024-05-02
Inventors
Cpc classification
H04W84/02
ELECTRICITY
International classification
Abstract
A data communication network connects a user application in a wireless User Equipment (UE) to a user application server. An edge application server exchanges user data between the user application in a wireless UE and a wireless network slice. The wireless network slice exchanges the user data between the edge application server and the user application server. The data communication network determines a trust level for the exchange of the user data between the user application in the wireless UE and the user application server. In some examples, a distributed ledger in the data communication network determines the trust level for the exchange of the user data between the user application in the wireless UE and the user application server.
Claims
1. A method to connect a user application in a wireless User Equipment (UE) to a user application server, the method comprising: exchanging user data between the user application in the wireless UE and a wireless network slice over an edge application server; exchanging the user data between the edge application server and the user application server over the wireless network slice; and determining a trust level for the exchange of the user data between the user application in the wireless UE and the user application server.
2. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice identifier for the wireless network slice and an edge identifier for the edge application server.
3. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice identifier for the wireless network slice, an edge identifier for the edge application server, and at least one of an application identifier for the user application and a UE identifier for the wireless UE.
4. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a server identifier for the user application server, a slice identifier for the wireless network slice, an edge identifier for the edge application server, and at least one of an application identifier for the user application and a UE identifier for the wireless UE.
5. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice network address for the wireless network slice and an edge network address for the edge application server.
6. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice network address for the wireless network slice, an edge network address for the edge application server, and a UE network address for the wireless UE.
7. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a server network address for the user application server, a slice network address for the wireless network slice, an edge network address for the edge application server, and a UE network address for the wireless UE.
8. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice digital certificate from the wireless network slice and an edge digital certificate from the edge application server.
9. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a slice digital certificate from the wireless network slice, an edge digital certificate from the edge application server, and at least one of an application digital certificate from the user application and a UE digital certificate from the wireless UE.
10. The method of claim 1 wherein determining the trust level for the exchange of the user data comprises determining the trust level based on a server digital certificate from the user application server, a slice digital certificate from the wireless network slice, an edge digital certificate from the edge application server, and at least one of an application digital certificate from the user application and a UE digital certificate from the wireless UE.
11. A method to connect a user application in a wireless User Equipment (UE) to a user application server, the method comprising: a user data gateway exchanging user data between the user application in the wireless UE and an edge data network; the edge data network exchanging the user data between the user data gateway and a core data network; the core data network exchanging the user data between the edge data network and the user application server; and a distributed ledger determining a trust level for the exchange of the user data between the user application in the wireless UE and the user application server.
12. The method of claim 11 wherein the distributed ledger determining the trust level for the exchange of the user data comprises using Minimum Viable Consensus (MVC) to determine the trust level for the exchange of the user data.
13. The method of claim 11 wherein the user application comprises a low-latency data application.
14. The method of claim 11 wherein the distributed ledger determining the trust level for the exchange of the user data comprises determining the trust level based on server information for the user application server, network information for the core data network, edge information for the edge data network, gateway information for the user data gateway, and at least one of application information for the user application and UE information for the wireless UE.
15. A data communication network to connect a user application in a wireless User Equipment (UE) to a user application server, the data communication network comprising: an edge application server to exchange user data between the user application in the wireless UE and a wireless network slice; the wireless network slice to exchange the user data between the edge application server and the user application server; and a distributed ledger to determine a trust level for the exchange of the user data between the user application in the wireless UE and the user application server.
16. The data communication network of claim 15 wherein the distributed ledger is to determine the trust level for the exchange of the user data based on server information for the user application server, slice information for the wireless network slice, edge information for the edge application server, and at least one of application information for the user application and UE information for the wireless UE.
17. The data communication network of claim 15 wherein the distributed ledger is to use Minimum Viable Consensus (MVC) to determine the trust level for the exchange of the user data.
18. The data communication network of claim 15 wherein the user application comprises a low-latency data application.
19. The data communication network of claim 15 wherein the user application comprises an augmented-reality application.
20. The data communication network of claim 15 wherein the user application comprises a hosted-computing application.
Description
DESCRIPTION OF THE DRAWINGS
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DETAILED DESCRIPTION
[0023]
[0024] Various examples of network operation and configuration are described herein. In some examples, wireless communication network 100 connects APP 102 to AS 140 to deliver a service to UE 101 like hosted-computing or augmented reality. CN 130 exchanges EDGE-8 signaling with ECS 121 to expose network capabilities. CN 130 exchanges EDGE-2 signaling with GES 112 and EES 122 to expose network capabilities. CN 130 exchanges EDGE-7 signaling with GAS 112 and EAS 122 to configure GAS 112 and EAS 122. EEC 111 in GW 110 and ECS 121 in EDN 120 exchange EDGE-4 signaling to provision EEC 111 with network information like EES, data network name, and slice identifier. GES 112 in GW 110 and ECS 121 in EDN 120 exchange EDGE-6 signaling to configure GES 111 and convey GES information to ECS 121. EES 122 and ECS 121 in EDN 120 exchange EDGE-6 signaling to configure EES 122 and convey EES information to ECS 121.
[0025] UE 101 executes APP 102. APP 102 and EEC 111 in GW 110 exchange EDGE-5 signaling to initiate service for APP 102 over GES 112 and EES 122. EEC 111 and GES 112 in GW 110 exchange EDGE-1 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. In addition, GES 112 and EES 122 exchange EDGE-9 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. GES 112 and GAS 113 exchange EDGE-3 signaling to set-up a user data session through GAS 113. EES 122 and EAS 123 exchange EDGE-3 signaling to set-up the user data session through EAS 123. APP 102 and GAS 113 exchange user data responsive to the EDGE-3 signaling from GES 112 and the EDGE-5 signaling from EEC 111. GAS 113 and EAS 123 exchange the user data responsive to the EDGE-3 signaling from GES 112 and EES 122. EAS 123 and CN 130 exchange the user data responsive to the EDGE-3 signaling from EES 122. CN 130 and AS 140 exchange the user data. Typically, GAS 113 performs the lowest-latency tasks to deliver service to APP 102 in UE 101. EAS 123 performs additional low-latency tasks to deliver the service to APP 102 in UE 101. AS 113 tasks that do not require low-latency to deliver service to APP 102 in UE 101.
[0026] EES 122 and CN 130 exchange EDGE-2 signaling to determine network information like identifiers and addresses that characterizes the data exchange between APP 102 to AS 140. CN 130 transfers the network information to Digital Ledger (DL) 150. DL 150 determines trust for the APP 102, GW 110, RAN 114, EDN 120, and CN 130 based on the network information. For example, DL 150 may match the UE Identifier (ID), GW ID, EDN ID, CN ID, and AS ID and their corresponding network addresses against authorized combinations of the IDs and addresses to determine trust. DL 150 may use Minimum Viable Consensus (MVC) to determine trust based on the network information. EAS 123 may exchange the user data with a wireless network slice in CN 130 that comprises a User Plane Function (UPF). EAS 123, GAS 113, and AS 140 may also be part of the same network slice. The slice identifier may be part of the network information that is used to determine trust.
[0027] CN 130 may transfer the network information to DL 150 over a Network Exposure Function (NEF) and a Security Control Function (SCF). A Network Exposure Function (NEF) in CN 130 may exchange the EDGE-8 signaling, EDGE-2 signaling, and EDGE-7 signaling with EDN 120. EDN 120 and GW 110 may comprise Mobile Edge Compute (MEC) platforms and applications that support GES 112, GAS 113, EES 122, and EAS 123.
[0028] CN 130 comprises network elements like Access and Mobility Management Function (AMF), Session Management Function (SMF), Network Exposure Function (NEF), Network Slice Selection Function (NSSF), User-Plane Function (UPF), and Application Function (AF). GW 110 communicates with RAN 114 over technologies like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), Bluetooth, or some other wireless communication protocol. The various communication links in wireless communication network 100 are represented by dotted lines on
[0029] UE 101, GW 110, RAN 114, EDN 120, CN 130, AS 140, and DL 150 comprise microprocessors, software, memories, transceivers, bus circuitry, and the like. GW 110, RAN 114, and typically UE 101 also comprise radios. The microprocessors comprise Digital Signal Processors (DSP), Central Processing Units (CPU), Graphical Processing Units (GPU), Application-Specific Integrated Circuits (ASIC), and/or the like. The memories comprise Random Access Memory (RAM), flash circuitry, disk drives, and/or the like. The memories store software like operating systems, user applications, radio applications, and network functions. The microprocessors retrieve the software from the memories and execute the software to drive the operation of wireless communication network 100 as described herein.
[0030]
[0031]
[0032] UE 101 executes APP 102. APP 102 and EEC 111 in GW 110 exchange EDGE-5 signaling to initiate service for APP 102 over GES 112 in GW 110. EEC 111 and GES 112 exchange EDGE-1 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. In addition, GES 112 and EES 122 exchange EDGE-9 signaling to register UE 101 and discover GAS 113, EAS 123, and AS 140. GES 112 and GAS 113 exchange EDGE-3 signaling to set-up a user data session through GAS 113. EES 122 and EAS 123 exchange EDGE-3 signaling to set-up the user data session through EAS 123. APP 102 and GAS 113 exchange user data responsive to the EDGE-3 signaling from GES 112 and the EDGE-5 signaling from EEC 111. GAS 113 and EAS 123 exchange the user data responsive to the EDGE-3 signaling from GES 112 and EES 122. EAS 123 and CN 130 exchange the user data responsive to the EDGE-3 signaling from EES 122. CN 130 and AS 140 exchange the user data. GAS 113, EAS 123, and AS 140 deliver a low-latency service to APP 102.
[0033] EES 122 and CN 130 exchange EDGE-2 signaling to determine network information that characterizes the data exchange between APP 102 to AS 140. CN 130 transfers the network information to Distributed Ledger (DL) 150. DL 150 starts in a zero trust state and transitions to an alpha trust state for APP 102, GW 110, RAN 114, EDN 120, and CN 130 based on the network information. For example, DL 150 may check a UE ID, GW ID, EDN ID, CN ID, and AS ID, and their corresponding network addresses against authorized combinations of the IDs and network addresses for the UE location and the network slices in use. DL 150 uses MVC across the DL nodes to transition from zero trust to alpha trust.
[0034]
[0035] UE 401 uses GW 410, RAN 414, EDN 420, and core 430 to communicate with AS 441-443. Security controller 433 receives related network data for UE 401, UE GW 410, RU 415, DU 416, CU 417, EDN 420, control plane 431, user plane 432, and AS 441-443. The network data comprises hardware IDs and network addresses that are typically hashed for security. In some examples, security controller 433 receives digital trust certificates from the elements that were obtained from a different security system. Security controller 433 transfers the network data to DL node 434 for trust determination. DL node 434 interacts with DL 444 to determine trust through Minimum Viable Consensus (MVC). DL node 434 and the other nodes in DL 444 match the hardware identifiers, network addresses, and/or digital trust certificates to expected values (or value prefixes) given the UE location and slice to establish trust using MVC. If any UE of slice fails hardware trust, then DL node 434 indicates the failing UE or slice to security controller 433. Security controller 433 drives core 430, EDN 420, RAN 414, GW 410, and UE 401 to isolate the failed UE or slice. DL node 434 and DL 444 maintain a blockchain record of the network information and the trust status for slices 450 and 460.
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044] APP 507 102 and EEC 609 exchange EDGE-5 signaling to initiate service for APP 507 over GES 608. EEC 609 and GES 608 exchange EDGE-1 signaling to register UE 401 and discover GAS 607, EAS VNF 806, and AS 441. In addition, GES 608 and EES VNF 807 exchange EDGE-9 signaling to register UE 401 and discover GAS 607, EAS VNF 806, and AS 441. GES 608 and GAS 607 exchange EDGE-3 signaling to set-up a user data session through GAS 607. EES VNF 807 and EAS VNF 806 exchange EDGE-3 signaling to set-up the user data session through EAS VNF 806. EES VNF 807 and NEF VNF 910 exchange EDGE-2 signaling to transfer the network information and possibly digital certificates that characterize the data exchange.
[0045] Referring back to
[0046]
[0047] The wireless data network circuitry described above comprises computer hardware and software that form special-purpose networking circuitry to connect user applications in UEs to AS. The computer hardware comprises processing circuitry like CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory. To form these computer hardware structures, semiconductors like silicon or germanium are positively and negatively doped to form transistors. The doping comprises ions like boron or phosphorus that are embedded within the semiconductor material. The transistors and other electronic structures like capacitors and resistors are arranged and metallically connected within the semiconductor to form devices like logic circuitry and storage registers. The logic circuitry and storage registers are arranged to form larger structures like control units, logic units, and Random-Access Memory (RAM). In turn, the control units, logic units, and RAM are metallically connected to form CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory.
[0048] In the computer hardware, the control units drive data between the RAM and the logic units, and the logic units operate on the data. The control units also drive interactions with external memory like flash drives, disk drives, and the like. The computer hardware executes machine-level software to control and move data by driving machine-level inputs like voltages and currents to the control units, logic units, and RAM. The machine-level software is typically compiled from higher-level software programs. The higher-level software programs comprise operating systems, utilities, user applications, and the like. Both the higher-level software programs and their compiled machine-level software are stored in memory and retrieved for compilation and execution. On power-up, the computer hardware automatically executes physically-embedded machine-level software that drives the compilation and execution of the other computer software components which then assert control. Due to this automated execution, the presence of the higher-level software in memory physically changes the structure of the computer hardware machines into special-purpose networking circuitry to connect user applications in UEs to AS.
[0049] The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. Thus, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.