Terminal Device, Application Server, Network Exposure Function Node and Methods Therein
20220408303 · 2022-12-22
Inventors
Cpc classification
International classification
Abstract
The present disclosure provides a method (100) in a terminal device. The method (100) includes: transmitting (110) to a Network Exposure Function, NEF, node a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
Claims
1. A method in a terminal device, comprising: transmitting to a Network Exposure Function, NEF, node a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
2. The method of claim 1, further comprising: transmitting to the NEF node an authentication request including data from which the identifier is derivable; and receiving from the NEF node an authentication response including the information.
3. The method of claim 2, wherein the identifier is derivable from the data based on Generic Bootstrapping Architecture, GBA, or Extensible Authentication Protocol and Key Agreement, EAP-AKA.
4. The method of claim 1, wherein the identifier is an International Mobile Station Identity, IMSI.
5. The method of claim 1, wherein the information is a security token.
6. A method in a Network Exposure Function, NEF, node, comprising: receiving from a terminal device a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device; determining the identifier based on the information; and transmitting to a Policy Control Function, PCF, node a request to initiate a QoS modification, the request including the IP address and the identifier.
7. The method of claim 6, further comprising: receiving from the terminal device an authentication request including data from which the identifier is derivable; deriving the identifier from the data; generating the information in association with the identifier; and transmitting to the terminal device an authentication response including the information.
8. The method of claim 7, wherein the identifier is derived from the data based on Generic Bootstrapping Architecture, GBA, or Extensible Authentication Protocol and Key Agreement, EAP-AKA.
9. The method of claim 6, wherein the identifier is an International Mobile Station Identity, IMSI.
10. The method of claim 6, wherein the information is a security token.
11. A method in an application server, comprising: transmitting to a Network Exposure Function, NEF, node a Quality of Service, QoS, request associated with a terminal device, the QoS request including an Internet Protocol, IP, address of the terminal device and an identifier of the terminal device.
12. The method of claim 11, further comprising: transmitting to the NEF node authentication information to enable the NEF node to authenticate the application server.
13. The method of claim 11, wherein the identifier is a Mobile Station Integrated Services Digital Network Number, MSISDN.
14. A method in a Network Exposure Function, NEF, node, comprising: receiving from an application server a Quality of Service, QoS, request associated with a terminal device, the QoS request including an Internet Protocol, IP, address of the terminal device and an identifier of the terminal device; and transmitting to a Policy Control Function, PCF, node a request to initiate a QoS modification, the request including the IP address and the identifier.
15. The method of claim 14, further comprising: receiving authentication information from the application server; and authenticating the application server based on the authentication information.
16. The method of claim 14, wherein the identifier is a Mobile Station Integrated Services Digital Network Number, MSISDN.
17. A terminal device, comprising a communication interface, a processor and a memory, the memory comprising instructions executable by the processor whereby the terminal device is operative to perform the method according to claim 1.
18. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in a terminal device, causing the terminal device to perform the method according to claim 1.
19. An application server, comprising a communication interface, a processor and a memory, the memory comprising instructions executable by the processor whereby the application server is operative to perform the method according to claim 11.
20. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in an application server, causing the application server to perform the method according to claim 11.
21. A Network Exposure Function, NEF, node, comprising a communication interface, a processor and a memory, the memory comprising instructions executable by the processor whereby the NEF node is operative to perform the method according to claim 6.
22. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in a Network Exposure Function, NEF, node, causing the NEF node to perform the method according to claim 6.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0031] The above and other objects, features and advantages will be more apparent from the following description of embodiments with reference to the figures, in which:
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
DETAILED DESCRIPTION
[0045] As used herein, the term “terminal device” refers to any end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the terminal device refers to a mobile terminal, user equipment (UE), or other suitable devices. The UE may be, for example, a Subscriber Station (SS), a Portable Subscriber Station, a Mobile Station (MS), or an Access Terminal (AT). The terminal device may include, but not limited to, portable computers, desktop computers, image capture terminal devices such as digital cameras, gaming terminal devices, music storage and playback appliances, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable device, a personal digital assistant (PDA), wearable terminal devices, vehicle-mounted wireless terminal devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE), laptop-mounted equipment (LME), USB dongles, smart devices, wireless customer-premises equipment (CPE) and the like. In the following description, the terms “terminal device”, “terminal”, “user equipment” and “UE” may be used interchangeably. As one example, a terminal device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3rd Generation Partnership Project (3GPP), such as 3GPP's Global System for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE), and/or 5G (the fifth generation) standards. As used herein, a “user equipment” or “UE” may not necessarily have a “user” in the sense of a human user who owns and/or operates the relevant device. In some embodiments, a terminal device may be configured to transmit and/or receive information without direct human interaction. For instance, a terminal device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the wireless communication network. Instead, a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a specific human user.
[0046] The terminal device may support device-to-device (D2D) communication, for example by implementing a 3GPP standard for sidelink communication, and may in this case be referred to as a D2D communication device.
[0047] As yet another example, in an Internet of Things (IOT) scenario, a terminal device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device and/or network equipment. The terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device. As one particular example, the terminal device may be a UE implementing the 3GPP narrow band internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances, for example refrigerators, televisions, personal wearables such as watches etc. In other scenarios, a terminal device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation.
[0048] In the following, references in the specification to “one embodiment”, “an embodiment”, “an example embodiment” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
[0049] It shall be understood that although the terms “first” and “second” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed terms. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising”, “has”, “having”, “includes” and/or “including”, when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof.
[0050] In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
[0051] Unless indicated otherwise, all features described in connection with 5G network nodes or functional entities also apply to their LTE equivalents, or vice versa.
[0052]
[0053] At block 110, a QoS request is transmitted to an NEF (or SCEF) node. The QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be e.g., an International Mobile Station Identity (IMSI).
[0054] In an example, e.g., prior to the block 110, the terminal device can transmit to the NEF node an authentication request including data from which the identifier is derivable. For example, the identifier (e.g., IMSI) can be derivable from the data based on Generic Bootstrapping Architecture (GBA) or Extensible Authentication Protocol and Key Agreement (EAP-AKA). Then, the terminal device can receive from the NEF node an authentication response including the information. This authentication response allows the NEF node to authenticate the terminal device, such that it can obtain the identifier from a trusted terminal device in a secure manner.
[0055] In an example, the information can be a security token. The security token may be generated by the NEF node in association with the identifier.
[0056]
[0057] At block 210, a QoS request is received from a terminal device. The QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be e.g., an IMSI, and the information can be e.g., a security token.
[0058] At block 220, the identifier is determined based on the information, and the terminal device is authenticated.
[0059] At block 230, a request to initiate a QoS modification is transmitted to a PCF node. The request includes the IP address and the identifier.
[0060] In an example, e.g., prior to the block 210, the NEF node can receive from the terminal device an authentication request including data from which the identifier is derivable, and derive the identifier from the data, e.g., based on GBA or EAP-AKA. Then, the NEF node can generate the information (e.g., security token) in association with the identifier, and transmit to the terminal device an authentication response including the information.
[0061] The methods 100 and 200 will be further explained below with reference to a sequence chart of
[0062] As shown in
[0063] For further details of the sequence shown in
[0064]
[0065] At block 410, a QoS request associated with a terminal device is transmitted to an NEF (or SCEF) node. The QoS request includes an IP address of the terminal device and an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be an MSISDN.
[0066] In an example, e.g., prior to the block 410, the application server can transmit to the NEF node authentication information to enable the NEF node to authenticate the application server. Here, for example, the authentication information can be information for HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with Transport Layer Security (TLS).
[0067]
[0068] At block 510, a QoS request associated with a terminal device is received from an application server (e.g., SCS/AS). The QoS request includes an IP address of the terminal device and an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be an MSISDN.
[0069] In an example, e.g., prior to the block 510, the NEF node can receive authentication information from the application server and authenticate the application server based on the authentication information, e.g., using HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with TLS.
[0070] At block 520, a request to initiate a QoS modification is transmitted to a PCF node. The request includes the IP address and the identifier.
[0071] The methods 400 and 500 will be further explained below with reference to a sequence chart of
[0072] As shown in
[0073] For further details of the sequence shown in
[0074] Correspondingly to the method 100 as described above, a terminal device is provided.
[0075] As shown in
[0076] In an embodiment, the unit 710 can be further configured to transmit to the NEF node an authentication request including data from which the identifier is derivable. The terminal device 700 can further include a receiving unit configured to receive from the NEF node an authentication response including the information.
[0077] In an embodiment, the identifier can be derivable from the data based on GBA or EAP-AKA.
[0078] In an embodiment, the identifier can be an IMSI.
[0079] In an embodiment, the information can be a security token.
[0080] The unit 710 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component(s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in
[0081]
[0082] The terminal device 800 includes a communication interface 810, a processor 820 and a memory 830. The memory 830 contains instructions executable by the processor 820 whereby the terminal device 800 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with
[0083] In an embodiment, the memory 830 can further contain instructions executable by the processor 820 whereby the terminal device 800 is operative to: transmit to the NEF node an authentication request including data from which the identifier is derivable; and receive from the NEF node an authentication response including the information.
[0084] In an embodiment, the identifier can be derivable from the data based on GBA or EAP-AKA.
[0085] In an embodiment, the identifier can be an IMSI.
[0086] In an embodiment, the information can be a security token.
[0087] Correspondingly to the method 400 as described above, an application server is provided.
[0088] As shown in
[0089] In an embodiment, the unit 910 can be further configured to transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
[0090] In an embodiment, the identifier can be an MSISDN.
[0091] The unit 910 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component(s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in
[0092]
[0093] The application server 1000 includes a communication interface 1010, a processor 1020 and a memory 1030. The memory 1030 contains instructions executable by the processor 1020 whereby the application server 1000 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with
[0094] In an embodiment, the memory 1030 can further contain instructions executable by the processor 1020 whereby the application server 1000 is operative to: transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
[0095] In an embodiment, the identifier can be an MSISDN.
[0096] Correspondingly to the method 200 as described above, an NEF node is provided.
[0097] As shown in
[0098] In an embodiment, the receiving unit 1110 can be further configured to receive from the terminal device an authentication request including data from which the identifier is derivable. The NEF node 1100 can further include a deriving unit configured to derive the identifier from the data and a generating unit configured to generate the information in association with the identifier. The transmitting unit 1130 can be further configured to transmit to the terminal device an authentication response including the information.
[0099] In an embodiment, the identifier can be derived from the data based on GBA or EAP-AKA.
[0100] In an embodiment, the identifier can be an IMSI.
[0101] In an embodiment, the information can be a security token.
[0102] The units 1110-1130 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component(s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in
[0103] Correspondingly to the method 500 as described above, an NEF node is provided.
[0104] As shown in
[0105] In an embodiment, the receiving unit 1210 can be further configured to receive authentication information from the application server. The NEF node 1200 can further include an authenticating unit configured to authenticate the application server based on the authentication information.
[0106] In an embodiment, the identifier can be an MSISDN.
[0107] The units 1210-1220 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component(s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in
[0108]
[0109] The NEF node 1300 includes a communication interface 1310, a processor 1320 and a memory 1330. For example, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with
[0110] In an embodiment, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from the terminal device an authentication request including data from which the identifier is derivable; derive the identifier from the data; generate the information in association with the identifier; and transmit to the terminal device an authentication response including the information.
[0111] In an embodiment, the identifier can be derived from the data based on GBA or EAP-AKA.
[0112] In an embodiment, the identifier can be an IMSI.
[0113] In an embodiment, the information can be a security token.
[0114] Alternatively, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with
[0115] In an embodiment, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive authentication information from the application server; and authenticate the application server based on the authentication information.
[0116] In an embodiment, the identifier can be an MSISDN.
[0117] The present disclosure also provides at least one computer program product in the form of a non-volatile or volatile memory, e.g., a non-transitory computer readable storage medium, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a flash memory and a hard drive. The computer program product includes a computer program. The computer program includes: code/computer readable instructions, which when executed by the processor 820 causes the terminal device 800 to perform the actions, e.g., of the procedure described earlier in conjunction with
[0118] The computer program product may be configured as a computer program code structured in computer program modules. The computer program modules could essentially perform the actions of the flow illustrated in
[0119] The processor may be a single CPU (Central Processing Unit), but could also comprise two or more processing units. For example, the processor may include general purpose microprocessors; instruction set processors and/or related chips sets and/or special purpose microprocessors such as Application Specific Integrated Circuits (ASICs). The processor may also comprise board memory for caching purposes. The computer program may be carried by a computer program product connected to the processor. The computer program product may comprise a non-transitory computer readable storage medium on which the computer program is stored. For example, the computer program product may be a flash memory, a Random Access Memory (RAM), a Read-Only Memory (ROM), or an EEPROM, and the computer program modules described above could in alternative embodiments be distributed on different computer program products in the form of memories.
[0120] The disclosure has been described above with reference to embodiments thereof. It should be understood that various modifications, alternations and additions can be made by those skilled in the art without departing from the spirits and scope of the disclosure. Therefore, the scope of the disclosure is not limited to the above particular embodiments but only defined by the claims as attached.