IMEI RETRIEVAL AND IMEI CHANGE NOTIFICATION IN 5GC-EPC INTERWORKING SCENARIOS

20230171587 · 2023-06-01

    Inventors

    Cpc classification

    International classification

    Abstract

    According to an aspect, there is provided a method of operating a first network node (420; 430; 520; 530; 620; 630; 730; 740) in a first core network of a telecommunication network. The first network node (420; 430; 520; 530; 620; 630; 730; 740) is for managing data relating to subscribers of the first core network, and the telecommunication network further comprises a second core network having a second network node (420; 430; 520; 530; 620; 630; 730; 740) that is for managing data relating to subscribers of the second core network. The method comprises, after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier, sending (1101) a first message to the second the second wireless device identifier for the first subscriber.

    Claims

    1. A method of operating a first network node in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the method comprises: after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier, sending a first message to the second network node indicating the second wireless device identifier for the first subscriber.

    2-36. (canceled)

    37. A first network node for use in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the first network node is configured to: after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier, send a first message to the second network node indicating the second wireless device identifier for the first subscriber.

    38. A first network node as defined in claim 37, wherein the first message indicates that (i) a wireless device identifier for the first subscriber has changed to the second wireless device identifier; or (ii) the first wireless device identifier for the first subscriber has changed to the second wireless device identifier.

    39. A first network node as defined in claim 37, wherein the first network node is further configured to: receive a second message from a serving node for the first subscriber, wherein the second message indicates that the wireless device identifier for the first subscriber has changed to the second wireless device identifier.

    40. A first network node as defined in claim 37, wherein the first network node is further configured to: receive an identifier request for the wireless device identifier for the first subscriber from a third network node; and send the second wireless device identifier for the first subscriber to the third network node.

    41. A first network node as defined in claim 40, wherein the third network node is an IP Multimedia Subsystem Application Server, IMS-AS.

    42. A first network node as defined in claim 37, wherein the first network node is further configured to: receive a first subscription request from an exposure function, EF, node in the telecommunication network, wherein the first subscription request requests notification of changes to the wireless device identifier for the first subscriber; and after the change to the second wireless device identifier for the first subscriber, notify the EF node of the second wireless device identifier for the first subscriber.

    43. A first network node as defined in claim 37, wherein the first message is a registration update message that triggers the update of a registration of the wireless device for the first subscriber in a mobility management node in the second core network.

    44. A first network node as defined in claim 43, wherein the registration update message is a Nudm_UECM_Update service operation or a Nhss_UECM_Update service operation.

    45. A first network node as defined in claim 37, wherein the first network node is further configured to: receive a second subscription request from the second network node, wherein the second subscription request requests notification of changes to the wireless device identifier for the first subscriber; wherein the first message is sent to the second network node as a result of the second subscription request and the change of the wireless device identifier for the first subscriber to the second wireless device identifier.

    46. A first network node as defined in claim 37, wherein the first network node is further configured to send a third subscription request to the second network node, wherein the third subscription request requests notification of changes to the wireless device identifier for the first subscriber.

    47. A first network node as defined in claim 37, wherein the first network node is further configured to: receive a third message from the second network node, wherein the third message indicates a third wireless device identifier for the first subscriber; and store the third wireless device identifier for the first subscriber.

    48. (canceled)

    49. A first network node as defined in claim 37, wherein each of the first wireless device identifier and the second wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI.

    50. A first network node as defined in claim 37, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node.

    51. A first network node as defined in claim 37, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS.

    52. A second network node for use in a second core network of a telecommunication network, wherein the second network node is for managing data relating to subscribers of the second core network, wherein the telecommunication network further comprises a first core network having a first network node that is for managing data relating to subscribers of the first core network, wherein the data comprises a first wireless device identifier for a first subscriber, wherein the second network node is configured to: receive a first message from the first network node indicating a second wireless device identifier for the first subscriber; and store the second wireless device identifier for the first subscriber.

    53. A second network node as defined in claim 52, wherein the first message indicates that (i) a wireless device identifier for the first subscriber has changed to the second wireless device identifier; or (ii) the first wireless device identifier for the first subscriber has changed to the second wireless device identifier.

    54. A second network node as defined in claim 52, wherein the second network node is further configured to: receive an identifier request for the wireless device identifier for the first subscriber from a third network node; and send the second wireless device identifier for the first subscriber to the third network node.

    55. A second network node as defined in claim 54, wherein the third network node is an IP Multimedia Subsystem Application Server, IMS-AS.

    56. A second network node as defined in claim 52, wherein the second network node is further configured to: receive a first subscription request from an exposure function, EF, node in the telecommunication network, wherein the first subscription request requests notification of changes to the wireless device identifier for the first subscriber; and after the change to the second wireless device identifier for the first subscriber, notify the EF node of the second wireless device identifier for the first subscriber.

    57-106. (canceled)

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0035] Some of the embodiments contemplated herein will now be described more fully with reference to the accompanying drawings, in which:

    [0036] FIG. 1 is a signalling diagram illustrating conventional signalling between a HSS and UDM;

    [0037] FIG. 2 is another signalling diagram illustrating conventional signalling between a HSS and UDM;

    [0038] FIG. 3 is a diagram showing direct UDM and HSS interworking in a reference point representation;

    [0039] FIG. 4 is a signalling diagram showing embodiments relating to IMEI change notification;

    [0040] FIG. 5 is a signalling diagram showing embodiments relating to IMEI retrieval;

    [0041] FIG. 6 is a signalling diagram showing alternative embodiments relating to IMEI change notification;

    [0042] FIG. 7 is another signalling diagram showing embodiments relating to IMEI change notification;

    [0043] FIG. 8 is a signalling diagram showing further alternative solutions relating to IMEI change notification;

    [0044] FIG. 9 is a schematic block diagram illustrating a virtualization environment in which functions implemented by some embodiments may be virtualized;

    [0045] FIG. 10 is a schematic block diagram of an apparatus in a wireless/telecommunication network;

    [0046] FIG. 11 is a flow chart illustrating an exemplary method of operating a first network node;

    [0047] FIG. 12 is a flow chart illustrating an exemplary method of operating a second network node;

    [0048] FIG. 13 is a flow chart illustrating an exemplary method of operating an exposure function;

    [0049] FIG. 14 is a flow chart illustrating an alternative method of operating a first network node; and

    [0050] FIG. 15 is a flow chart illustrating an alternative method of operating a second network node.

    DETAILED DESCRIPTION

    [0051] Some of the embodiments contemplated herein will now be described more fully with reference to the accompanying drawings. Other embodiments, however, are contained within the scope of the subject matter disclosed herein, the disclosed subject matter should not be construed as limited to only the embodiments set forth herein; rather, these embodiments are provided by way of example to convey the scope of the subject matter to those skilled in the art. Additional information may also be found in the document(s) provided in the Appendix.

    [0052] FIG. 3 is a diagram showing direct UDM and HSS interworking in a reference point representation. This figure is found in 3GPP TS 23.632 v6.0.0, FIG. 4.1-2. The HSS 310 and the UDM 320 are connected via an Nxx interface. The HSS 310 is connected to the EPC 330 via various interfaces (S6a/S6d/SWx/ . . . ), connected to an IMS 340 via various interfaces (Cx/Sh/N70/N71) and connected to an EPS Unified Data Repository (EPS-UDR) 350 via a Ud interface. The EPS-UDR 350 stores user data. The UDM 320 is connected to the 5GC 360 via various interfaces (N8/N10/N13/N21/N52/NL6), and connected to a 5G Unified Data Repository (5GS-UDR) 370 via a N35 interface. The 5GS-UDR 370 stores user data. The 5GC 360 is connected to the EPC 330 via an N26 interface, and connected to the IMS 340. The HSS 310 is also connected to the 5GS-UDR 370 via an Nyy interface.

    [0053] As noted above, in this disclosure the term “wireless device identifier” refers to any type of unique UE identifier, including an IMEI, an IMEI software version (SV), a Permanent Equipment Identifier (PEI). It will be appreciated that although various examples below refer to the wireless device identifier being an IMEI, the examples can also be applied to other types of wireless device identifier.

    [0054] FIG. 4 is a signalling diagram showing embodiments of the provided solutions applied to IMEI change notification. FIG. 5 is a signalling diagram showing embodiments of the provided solutions applied to IMEI retrieval. Both figures show an HSS (420 in FIGS. 4 and 520 in FIG. 5), and a UDM (430 in FIGS. 4 and 530 in FIG. 5). FIG. 4 also shows a combined SCEF and NEF 440.

    [0055] According to embodiments of the solutions, an aim is to keep the IMEIs for a given UE/subscriber stored in the HSS 420/520 and UDM 430/530 synchronized. That is, when the IMEI(s) for a given UE/subscriber stored in one of the HSS 420/520 and UDM 430/530 changes, the IMEI(s) for that UE/subscriber stored in the other one of the HSS 420/520 and UDM 430/530 should be updated or replaced by the new IMEI(s).

    [0056] At step 400/500 the HSS 420/520 has an IMEI associated with a particular subscriber, i.e. IMEI #1 for a subscriber having an IMSI. Also at step 400/500 the UDM 430/530 has the same IMEI (IMEI #1) associated with that subscriber (SUR).

    [0057] In step 401, the combined EF 440 subscribes to changes in the IMEI for the subscriber at UDM 430 (message Nudm_EE_Subs), so that the UDM 430 will inform the combined EF 440 about changes to the IMEI.

    [0058] At step 402/501, the HSS 420/520 is notified of a change in the IMSI for the subscriber from IMEI #1 to IMEI#2. At step 403/502 the HSS 420/520 updates the stored IMEI for the subscriber to IMEI #2. A change in the IMEI can occur when the subscriber registers to the 4G-EPS, via S6a Update Location Request (ULR)/Update Location Answer (ULA) messages.

    [0059] After the HSS 420/520 is informed of the IMEI change, the solutions provide that the HSS 420/520 informs the UDM 430/530 about the IMEI change. This is shown by steps 404 and 503. The UDM 430/530 stores the new IMEI (IMEI #2) for the subscriber SUPI (step 405/504). Thus, the new IMEI is synchronized between the HSS 420/520 and the UDM 430/530.

    [0060] In step 406, the UDM 430 notifies the combined EF 440 of the new IMSI. This can be a Nudm_EE_Notify message, that indicates the old IMEI (IMEI #1), the new IMEI (IMEI #2) and the subscribers identity (SUR). At step 407, the combined EF 230 can now take any appropriate action.

    [0061] Steps 408-411 and 507-510 show the corresponding operations when the HSS 420 is the node that is first notified of an IMEI change (e.g. to IMEI #3). This notification is in step 408/507, and can be via, e.g., a Nudm_UECM_Reg message which can occur when the subscriber registers to the 5GC. The UDM 430/530 informs the HSS 420/520 about the IMEI change (step 410/507) which stores the new IMEI accordingly (step 411/508).

    [0062] These solutions allow for the combined SCEF+NEF 440 to subscribe only to one of the domains in order to receive IMEI change notifications. When the IMEI change event occurs in either of the domains, the combined SCEF+NEF 440 is only notified once from the domain where the subscription was made, regardless of the domain where the IMEI change event took place. Thus, if the combined SCEF+NEF 440 subscribes to receive IMEI change event notifications from e.g. the UDM 430 as in step 401, the corresponding notifications are always sent by the UDM 430 regardless of whether the IMEI change event took place in the EPC (steps 402-406) or in the 5GC (steps 408-409).

    [0063] Additionally, these solutions allow that the retrieval of the IMEI for a given UE requested by an IMS-AS from the HSS 520 via Sh can be executed locally by the HSS 520 without the need for additional interworking between the HSS 520 and the UDM 530. This is shown by steps 409-410, which generally correspond to steps 101 and 103 of FIG. 1. The local execution of the retrieval request is useful as retrieval requests may be made on a per voice call basis (e.g. to include the I MEI in charging data records associated to voice calls) and the frequency for the signalling required for interworking between the HSS and UDM if the IMEI is not synchronized would be much higher than the frequency of IMEI changes.

    [0064] As noted, an aim is to keep the IMEIs for a given UE/subscriber stored in the HSS and the UDM synchronized. This requires interaction between the HSS and the UDM when an IMEI change event is detected in any of the domains as shown in FIGS. 4 and 5. This interaction corresponds to steps 404 and 410 in FIG. 4, and steps 503 and 507 in FIG. 5. Some exemplary services that could be used for this interaction/purpose are set out below: [0065] IMEI change events are normally detected in a HSS and/or a UDM during initial attach/registration procedures. 3GPP TS 23.632 v16.0.0 defines that at initial attach in EPC, the HSS informs the UDM to delete the registration of the UE in the AMF (if any) via a Nudm_UECM_AMFDeregistration service operation. Similarly, the UDM informs the HSS to delete the registration of the UE in the MME (if any) via a Nhss_UECM_MMEDeregistration service operation. In the present solutions, when an IMEI change event is detected during an initial attach/registration procedure, the HSS and UDM can include the new IMEI in the request to remove the UE registration from the other domain. This is the new IMEI, and can be defined as an optional parameter in Nudm_UECM_AMFDeregistration and Nhss_UECM_MMEDeregistration service operations. [0066] It is possible that the IMEI can be changed while the UE is registered in any of the domains. For example, this can occur if the UE is updated with a new software version. Also, Nudm_UECM_AMFDeregistration and Nhss_UECM_MMEDeregistration services are not used when the system works in dual registration mode or without N26. For these cases, the new IMEI can be conveyed as follows: [0067] from the HSS to the UDM using the existing Nudm_UECM_Update service operation; and [0068] from the UDM to the HSS using a new Nhss_UECM_Update service operation.

    [0069] In the embodiments of the solutions shown in FIGS. 4 and 5, the HSS 420/520 and UDM 430/530 are already configured to notify the other in the event of an IMEI change. FIG. 6 shows an alternative embodiment in which one of the HSS and UDM subscribes to changes in IMEI from the other one of the HSS and UDM 430/530, although it will be appreciated that in practice both the HSS and the UDM may need to subscribe to changes in IMEI from the other node. FIG. 6 relates to the IMEI change notification to a combined EF scenario (e.g. as shown in FIG. 4), but it will be appreciated that similar principles can be applied to the IMEI retrieval scenario in FIG. 5.

    [0070] Thus, FIG. 6 shows an HSS 620, a UDM 630 and a combined SCEF and NEF 640. Steps 600 and 601 generally correspond to steps 400 and 401. In step 602, the UDM 630 subscribes to IMEI change notifications from the HSS 620 for the subscriber.

    [0071] The HSS 620 is then informed of an IMEI change (steps 603 and 604, which generally correspond to steps 402 and 403) and the HSS 620 notifies the UDM 630 of the IMEI change in step 605. The UDM 630 stores the updated IMEI (step 606, generally corresponding to step 405) and notifies the combined EF 640 (step 607, generally corresponding to step 406).

    [0072] FIG. 7 is a signalling diagram that can be included in 3GPP TS 23.632 to capture the solutions provided herein. As noted above, it is proposed that the HSS and UDM inform each other about IMEI change events so the latest IMEI used by each UE is always synchronized in both domains. This allows for the retrieval of IMEI by an IMS-AS over Sh to be supported locally within the HSS without the need of additional interworking with the UDM, since both UDM and HSS are fully aware that the information they have stored is up to date (i.e. the IMEI is unique for each user regardless of the domains accessed by each user). This approach is considered to be more effective over other alternatives (e.g. HSS asking UDM for the IMEI stored for the UE in 5GC at every Sh request) since the number of requests from ASs to fetch the IMEI is foreseen to occur very frequently, whereas the users do not change their smart phone (i.e. their IMEI) very often.

    [0073] A pre-requisite for the retrieval of the IMEI when requested by an IMS-AS is that the IMEI for a given UE stored in HSS and UDM is always synchronized. That is, when the HSS detects that the IMEI for a UE changes (e.g. during an Update Location in EPS), the HSS informs the UDM about the IMEI change which stores the new IMEI accordingly. Similarly, when UDM detects that the IMEI changes, the UDM informs the HSS about the IMEI change which stores the new IMEI accordingly. This allows for the retrieval of the IMEI for a given UE requested by an IMS-AS from HSS via Sh to be executed locally by HSS without the need of additional interworking between the HSS and the UDM.

    [0074] FIG. 7 shows signalling between an AMF 720, a UDM 730, a HSS 740, a MME 750 and an IMS-AS 760. FIG. 7 shows the scenario where the HSS 740 receives an IMEI retrieval request from the IMS-AS 760 for a subscriber who has a 5GC subscription. Steps 701 to 704 are executed when the HSS 740 detects a change in the IMEI for a given UE (IMSI).

    [0075] In step 701, the HSS 740 receives a request from the MME 750 including an IMEI for the UE (e.g. Update Location Request or Notify Request).

    [0076] In step 702, the HSS 740 detects that the IMEI received in the request is different from the previously stored in the EPS-UDR. The HSS 740 stores the new IMEI in the EPS-UDR.

    [0077] In step 703, the HSS 740 informs the UDM 730 about the new PEI (IMEI) using the Nudm_UECM_Update service operation.

    [0078] In step 704, the UDM 730 stores the new PEI for the UE.

    [0079] Steps 705 to 708 are executed when the UDM 730 detects a change in the PEI for a given UE (SUR).

    [0080] In step 705, the UDM 730 receives a request from the AMF 720 including a PEI for the UE (e.g. Nudm_UECM_Registration/Update).

    [0081] In step 706, the UDM 730 detects that the PEI received in the request is different from the previously stored in the 5GS-UDR. The UDM 730 stores the new IMEI in the 5GS-UDR.

    [0082] In step 707, the UDM 730 informs the HSS 740 about the new IMEI using the Nhss_UECM_Update service operation.

    [0083] In step 708, the HSS 740 stores the new IMEI for the UE.

    [0084] Steps 709 to 711 are executed when the HSS 740 receives an IMEI retrieval request from the IMS-AS 760 for a subscriber who has a 5GC subscription.

    [0085] In step 709, the HSS 740 receives a request from IMS-AS 760 to retrieve the IMEI for a UE.

    [0086] In step 710, the HSS 740 reads the IMEI stored in the EPS-UDR.

    [0087] In step 711, the HSS 740 replies to the IMS-AS 760 with the users IMEI. Since the IMEI for the UE has been synchronized between HSS 740 and UDM 730 at every IMEI/PEI change event as in steps 701 to 704 or 705 to 708, the HSS 740 can reply to the IMS-AS 760 without any additional interworking with the UDM 730.

    [0088] Table 6.1.1-1 in 3GPP TS 23.632 that indicates NF services provided by the HSS can be modified to include an update service operation in the UECM NF service, and similarly Table 6.2.1-1 in 3GPP TS 23.632 that indicates NF services provided by the UDM can be modified to include the update service operation in the UECM NF service. The Nhss_UECM_Update service can be defined for an NF consumer to inform the HSS about an update in the UE Context (e.g. a change in the IMEI).

    [0089] As an alternative to the solutions provided above in which the IMEIs for a given UE/subscriber stored in the HSS and UDM are kept synchronized, some solutions provide that the HSS/UDM can retrieve the IMEI from the other node when an IMS-AS requests the IMEI for the subscriber. This is illustrated in FIG. 8. FIG. 8 shows the signalling between an HSS 820 and a UDM 830. In this solution, it is not assumed that the HSS 820 and UDM 830 keep the IMEIs for a given UE synchronized (i.e. the HSS 820 and UDM 830 may store different versions of the IMEI for a given UE). Therefore, upon reception of a Sh request from the IMS-AS (shown as step 801), the HSS 820 asks the UDM 830 for the IMEI value kept for the UE (step 802). This could be done e.g. using the existing Nudm_UECM_Get service operation but extended to request the IMEI explicitly.

    [0090] In step 803 the UDM 830 would then retrieve the IMEI stored for the UE together with a timestamp for the IMEI. The timestamp is required to be stored when the IMEI was updated in UDM 830, and indicates the date/time of the update to the IMEI.

    [0091] The UDM 830 provides the IMEI (e.g. IMEI #2) together with the timestamp to the HSS 820 (step 804). In step 805 the HSS 820 compares the IMEI received from the UDM 830 with the one locally stored. If the IMEIs are different, the HSS 820 then compares the received timestamp to a timestamp associated with the IMEI stored by the HSS 820 to determine the most recent IMEI. The IMEI with the most recent timestamp is selected (step 806). The HSS 820 replies to the IMS AS with the IMEI with the latest timestamp (step 807).

    [0092] Therefore, with this solution, each time that an AS tries to fetch the current or last known IMEI, the HSS 820 needs to send a request to the UDM 830 for an IMEI and then compare the timestamps. It will be appreciated that this may not be particularly efficient, since the number of requests from ASs to fetch the IMEI is foreseen to occur very frequently, whereas users do not change their smart phone (i.e. their I MEI) very often.

    [0093] As used herein, wireless device (WD) refers to a device capable, configured, arranged and/or operable to communicate wirelessly with network nodes and/or other wireless devices. Unless otherwise noted, the term WD may be used interchangeably herein with user equipment (UE). Communicating wirelessly may involve transmitting and/or receiving wireless signals using electromagnetic waves, radio waves, infrared waves, and/or other types of signals suitable for conveying information through air. In some embodiments, a WD may be configured to transmit and/or receive information without direct human interaction. For instance, a WD may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the network. Examples of a WD include, but are not limited to, a smart phone, a mobile phone, a cell phone, a voice over IP (VoIP) phone, a wireless local loop phone, a desktop computer, a personal digital assistant (PDA), a wireless cameras, a gaming console or device, a music storage device, a playback appliance, a wearable terminal device, a wireless endpoint, a mobile station, a tablet, a laptop, a laptop-embedded equipment (LEE), a laptop-mounted equipment (LME), a smart device, a wireless customer-premise equipment (CPE). a vehicle-mounted wireless terminal device, etc. A WD may support device-to-device (D2D) communication, for example by implementing a 3GPP standard for sidelink communication, vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V21), vehicle-to-everything (V2X) and may in this case be referred to as a D2D communication device. As yet another specific example, in an Internet of Things (IoT) scenario, a WD may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another WD and/or a network node. The WD may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as an MTC device. As one particular example, the WD may be a UE implementing the 3GPP narrow band internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances (e.g. refrigerators, televisions, etc.) personal wearables (e.g., watches, fitness trackers, etc.). In other scenarios, a WD may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation. A WD as described above may represent the endpoint of a wireless connection, in which case the device may be referred to as a wireless terminal. Furthermore, a WD as described above may be mobile, in which case it may also be referred to as a mobile device or a mobile terminal.

    [0094] FIG. 9 is a schematic block diagram illustrating a virtualization environment 900 in which functions implemented by some embodiments may be virtualized. In the present context, virtualizing means creating virtual versions of apparatuses or devices which may include virtualizing hardware platforms, storage devices and networking resources. As used herein, virtualization can be applied to a node (e.g., a virtualized network node, such as an HSS, a UDM, or combined EF), a virtualized base station or a virtualized radio access node) or to a device (e.g., a UE, a wireless device or any other type of communication device) or components thereof and relates to an implementation in which at least a portion of the functionality is implemented as one or more virtual components (e.g., via one or more applications, components, functions, virtual machines or containers executing on one or more physical processing nodes in one or more networks).

    [0095] In some embodiments, some or all of the functions described herein may be implemented as virtual components executed by one or more virtual machines implemented in one or more virtual environments 900 hosted by one or more of hardware nodes 930. Further, in embodiments in which the virtual node is not a radio access node or does not require radio connectivity (e.g., a core network node), then the network node may be entirely virtualized.

    [0096] The functions may be implemented by one or more applications 920 (which may alternatively be called software instances, virtual appliances, network functions, virtual nodes, virtual network functions, etc.) operative to implement some of the features, functions, and/or benefits of some of the embodiments disclosed herein. Applications 920 are run in virtualization environment 900 which provides hardware 930 comprising processing circuitry 960 and memory 990. Memory 990 contains instructions 995 executable by processing circuitry 960 whereby application 920 is operative to provide one or more of the features, benefits, and/or functions disclosed herein.

    [0097] Virtualization environment 900, comprises general-purpose or special-purpose network hardware devices 930 comprising a set of one or more processors or processing circuitry 960, which may be commercial off-the-shelf (COTS) processors, dedicated Application Specific Integrated Circuits (ASICs), or any other type of processing circuitry including digital or analog hardware components or special purpose processors. Each hardware device may comprise memory 990-1 which may be non-persistent memory for temporarily storing instructions 995 or software executed by processing circuitry 960. Each hardware device may comprise one or more network interface controllers (NICs) 970, also known as network interface cards, which include physical network interface 980. Each hardware device may also include non-transitory, persistent, machine-readable storage media 990-2 having stored therein software 995 and/or instructions executable by processing circuitry 960. Software 995 may include any type of software including software for instantiating one or more virtualization layers 950 (also referred to as hypervisors), software to execute virtual machines 940 as well as software allowing it to execute functions, features and/or benefits described in relation with some embodiments described herein.

    [0098] Virtual machines 940, comprise virtual processing, virtual memory, virtual networking or interface and virtual storage, and may be run by a corresponding virtualization layer 950 or hypervisor. Different embodiments of the instance of virtual appliance 920 may be implemented on one or more of virtual machines 940, and the implementations may be made in different ways.

    [0099] During operation, processing circuitry 960 executes software 995 to instantiate the hypervisor or virtualization layer 950, which may sometimes be referred to as a virtual machine monitor (VMM). Virtualization layer 950 may present a virtual operating platform that appears like networking hardware to virtual machine 940.

    [0100] As shown in FIG. 9, hardware 930 may be a standalone network node with generic or specific components. Hardware 930 may comprise antenna 9225 and may implement some functions via virtualization. Alternatively, hardware 930 may be part of a larger cluster of hardware (e.g. such as in a data center or customer premise equipment (CPE)) where many hardware nodes work together and are managed via management and orchestration (MANO) 9100, which, among others, oversees lifecycle management of applications 920.

    [0101] Virtualization of the hardware is in some contexts referred to as network function virtualization (NFV). NFV may be used to consolidate many network equipment types onto industry standard high volume server hardware, physical switches, and physical storage, which can be located in data centers, and customer premise equipment.

    [0102] In the context of NFV, virtual machine 940 may be a software implementation of a physical machine that runs programs as if they were executing on a physical, non-virtualized machine. Each of virtual machines 940, and that part of hardware 930 that executes that virtual machine, be it hardware dedicated to that virtual machine and/or hardware shared by that virtual machine with others of the virtual machines 940, forms a separate virtual network elements (VNE).

    [0103] Still in the context of NFV, Virtual Network Function (VNF) is responsible for handling specific network functions that run in one or more virtual machines 940 on top of hardware networking infrastructure 930 and corresponds to application 920 in FIG. 9.

    [0104] In some embodiments, one or more radio units 9200 that each include one or more transmitters 9220 and one or more receivers 9210 may be coupled to one or more antennas 9225. Radio units 9200 may communicate directly with hardware nodes 930 via one or more appropriate network interfaces and may be used in combination with the virtual components to provide a virtual node with radio capabilities, such as a radio access node or a base station.

    [0105] In some embodiments, some signalling can be effected with the use of control system 9230 which may alternatively be used for communication between the hardware nodes 930 and radio units 9200.

    [0106] Any appropriate steps, methods, features, functions, or benefits disclosed herein may be performed through one or more functional units or modules of one or more virtual apparatuses. Each virtual apparatus may comprise a number of these functional units. These functional units may be implemented via processing circuitry, which may include one or more microprocessor or microcontrollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. The processing circuitry may be configured to execute program code stored in memory, which may include one or several types of memory such as read-only memory (ROM), random-access memory (RAM), cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory includes program instructions for executing one or more telecommunications and/or data communications protocols as well as instructions for carrying out one or more of the techniques described herein. In some implementations, the processing circuitry may be used to cause the respective functional unit to perform corresponding functions according one or more embodiments of the present disclosure.

    [0107] FIG. 10 illustrates a schematic block diagram of an apparatus 1010 in a wireless/telecommunication network or for use in a wireless/telecommunication network. The apparatus may be implemented in a network node (e.g. an HSS 420, 520, 620, 820, a UDM 430, 530, 630, 830), and/or in a combined EF 440, 640. Alternatively, the apparatus may be a network node (e.g. an HSS 420, 520, 620, 820, a UDM 430, 530, 630, 830) or a combined EF 440, 640. Apparatus 1010 is operable to carry out some or all parts of the exemplary methods and processes described herein, for example the exemplary methods and processes described above with reference to FIG. 4, 5, 6, 7 or 8, and/or the exemplary methods and processes described below with reference to FIG. 11, 12, 13, 14 or 15.

    [0108] Apparatus 1010, which may be a virtual apparatus, may comprise processing circuitry 1020, which may include one or more microprocessor or microcontrollers, as well as other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. The processing circuitry 1020 may be configured to execute program code stored in memory 1030, which may include one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc. Program code stored in memory 1030 includes program instructions for executing one or more telecommunications and/or data communications protocols as well as instructions for carrying out one or more of the techniques described herein, in several embodiments.

    [0109] The term unit may have conventional meaning in the field of electronics, electrical devices and/or electronic devices and may include, for example, electrical and/or electronic circuitry, devices, modules, processors, memories, logic solid state and/or discrete devices, computer programs or instructions for carrying out respective tasks, procedures, computations, outputs, and/or displaying functions, and so on, as such as those that are described herein.

    [0110] FIG. 11 is a flow chart illustrating an exemplary method of operating a first network node. The first network node is in a first core network of a telecommunication network. The first network node is for managing data relating to subscribers of the first core network, and the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network. In some embodiments, the first network node is a HSS 420/520/620/740, and the second network node is a UDM node 430/530/630/730. In alternative embodiments, the first network node is a UDM node 430/530/630/730 and the second network node is a HSS 420/520/620/740.

    [0111] In step 1101, the first network node sends a first message to the second network node. The first message is sent to the second network node after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier. The first message indicates the second wireless device identifier for the first subscriber. In some embodiments, each of the first wireless device identifier and/or the second wireless device identifier are one or more of an IMEI, an IMEI SV, or a PEI.

    [0112] In some embodiments, the first message indicates that a wireless device identifier for the first subscriber has changed to the second wireless device identifier. In alternative embodiments, the first message indicates that the first wireless device identifier for the first subscriber has changed to the second wireless device identifier.

    [0113] In some embodiments, the method further comprises the first network node receiving a message from a serving node for the first subscriber. This message can indicate that the wireless device identifier for the first subscriber has changed to the second wireless device identifier. The receipt of this message can trigger or cause the first network node to send the first message in step 1101.

    [0114] In some embodiments, the method in the first network node can further comprise receiving an identifier request for the wireless device identifier for the first subscriber from a third network node. The first network node can then send the second wireless device identifier for the first subscriber to the third network node. The third network node may be an IMS-AS, for example the IMS-AS 760 shown in FIG. 7.

    [0115] In some embodiments, the method further comprises receiving a subscription request from an EF node in the telecommunication network. This subscription request can request notification of changes to the wireless device identifier for the first subscriber. Thus, after the change to the second wireless device identifier for the first subscriber, the first network node notifies the EF node of the second wireless device identifier for the first subscriber. The EF node may be a combined SCEF+NEF, for example the combined SCEF+NEF 440/640 shown in FIGS. 4 and 6.

    [0116] In some embodiments, the first message is a deregistration message that triggers the deletion of a registration of the wireless device for the first subscriber from a mobility management node in the second core network. The mobility management node may be an MME or AMF, for example the MME 750 and/or AMF 720 shown in FIG. 7. The deregistration message may be a Nudm_UECM_AMFDeregistration service operation or a Nhss_U ECM_M ME Deregistration service operation.

    [0117] Alternatively, the first message can be a registration update message that triggers the update of a registration of the wireless device for the first subscriber in a mobility management node in the second core network. The mobility management node may be an MME or AMF, for example the MME 750 and/or AMF 720 shown in FIG. 7. The registration update message may be a Nudm_UECM_Update service operation or a Nhss_UECM_Update service operation.

    [0118] In alternative embodiments, for example as shown in FIG. 6, the method in the first network node can further comprise receiving a subscription request from the second network node. This subscription request requests notification of changes to the wireless device identifier for the first subscriber. Thus, if a change to the wireless device identifier occurs at the first network node, the first network node notifies the second network node of the change. In these embodiments, the first message is sent in step 1101 as a result of the subscription request and the change of the wireless device identifier for the first subscriber to the second wireless device identifier.

    [0119] In some embodiments, for example as shown in FIG. 6, the method in the first network node can further comprise sending a subscription request to the second network node. This subscription request requests notification of changes to the wireless device identifier for the first subscriber from the second network node. Thus, if a change to the wireless device identifier occurs at the second network node, the second network node notifies the first network node of the change. These embodiments can be used independently of, or in combination with, the above embodiments in which the first network node receives a subscription request from the second network node.

    [0120] In some embodiments, the method in the first network node can further comprise receiving a message from the second network node. This message can indicate a third wireless device identifier for the first subscriber. In that case, the first network node can store the third wireless device identifier for the first subscriber.

    [0121] In embodiments where the first network node sends a subscription request to the second network node, the third message can be received from the second network node as a result of the third subscription request and a change to the wireless device identifier for the first subscriber.

    [0122] FIG. 12 is a flow chart illustrating an exemplary method of operating a second network node. The second network node is in a second core network of a telecommunication network. The second network node is for managing data relating to subscribers of the second core network, and the telecommunication network further comprises a first core network having a first network node that is for managing data relating to subscribers of the first core network. In some embodiments, the second network node is a HSS 420/520/620/740, and the first network node is a UDM node 430/530/630/730. In alternative embodiments, the second network node is a UDM node 430/530/630/730 and the first network node is a HSS 420/520/620/740.

    [0123] In step 1201, the second network node receives a first message from the first network node. The first message indicates a second wireless device identifier for the first subscriber. In some embodiments, the second wireless device identifier is one or more of an IMEI, an IMEI SV, or a PEI.

    [0124] In step 1203, the second network node stores the second wireless device identifier for the first subscriber.

    [0125] In some embodiments, the first message indicates that a wireless device identifier for the first subscriber has changed to the second wireless device identifier. In alternative embodiments, the first message indicates that the first wireless device identifier for the first subscriber has changed to the second wireless device identifier.

    [0126] In some embodiments, the method in the second network node can further comprise receiving an identifier request for the wireless device identifier for the first subscriber from a third network node. The second network node can then send the second wireless device identifier for the first subscriber to the third network node. The third network node may be an IMS-AS, for example the IMS-AS 760 shown in FIG. 7.

    [0127] In some embodiments, the method further comprises receiving a subscription request from an EF node in the telecommunication network. This subscription request can request notification of changes to the wireless device identifier for the first subscriber. Thus, after receiving the first message in step 1201, indicating the second wireless device identifier for the first subscriber, the second network node notifies the EF node of the second wireless device identifier for the first subscriber. The EF node may be a combined SCEF+NEF, for example the combined SCEF+NEF 440/640 shown in FIGS. 4 and 6.

    [0128] In some embodiments, the method in the second network node can further comprise receiving a message from a serving node for the first subscriber. This message can indicate that the wireless device identifier for the first subscriber has changed to a third wireless device identifier. In these embodiments, the method can further comprise sending a third message to the first network node. The third message can indicate the third wireless device identifier for the first subscriber.

    [0129] In some embodiments, the first message is a deregistration message that triggers the deletion of a registration of the wireless device for the first subscriber from a mobility management node in the second core network. The mobility management node may be an MME or AMF, for example the MME 750 and/or AMF 720 shown in FIG. 7. The deregistration message may be a Nudm_UECM_AMFDeregistration service operation or a Nhss_UECM_MMEDeregistration service operation.

    [0130] Alternatively, the first message can be a registration update message that triggers the update of a registration of the wireless device for the first subscriber in a mobility management node in the second core network. The mobility management node may be an MME or AM F, for example the MME 750 and/or AM F 720 shown in FIG. 7. The registration update message may be a Nudm_UECM_Update service operation or a Nhss_UECM_Update service operation.

    [0131] In alternative embodiments, for example as shown in FIG. 6, the method in the second network node can further comprise (prior to receiving the first message in step 1201) sending a subscription request to the first network node. This subscription request requests notification of changes to the wireless device identifier for the first subscriber. Thus, if a change to the wireless device identifier occurs at the first network node, the first network node notifies the second network node of the change. In these embodiments, the first message is received in step 1201 as a result of this subscription request.

    [0132] In some embodiments, for example as shown in FIG. 6, the method in the second network node can further comprise receiving a subscription request from the first network node. This subscription request requests notification of changes to the wireless device identifier for the first subscriber from the second network node. Thus, if a change to the wireless device identifier occurs at the second network node, the second network node notifies the first network node of the change. These embodiments can be used independently of, or in combination with, the above embodiments in which the second network node sends a subscription request to the first network node.

    [0133] FIG. 13 is a flow chart illustrating an exemplary method of operating an exposure function (EF). The EF is in a telecommunication network. The telecommunication network comprises a first core network comprising a first network node that is for managing data relating to subscribers of the first core network, and a second core network having a second network node that is for managing data relating to subscribers of the second core network. The EF may be a combined SCEF and NEF.

    [0134] In some embodiments, the first network node is a HSS 420/520/620/740, and the second network node is a UDM node 430/530/630/730. In alternative embodiments, the first network node is a UDM node 430/530/630/730 and the second network node is a HSS 420/520/620/740.

    [0135] In step 1301, the EF sends a subscription request to only one of the first network node and the second network node. The subscription request requests notification of changes to a wireless device identifier for a first subscriber of the first core network and the second core network. Thus, the EF does not send a subscription request to the other one of the first network node and the second network node.

    [0136] Subsequently, the EF can receive a notification for the first subscriber of a change from a first wireless device identifier to a second wireless device identifier from the one of the first network node and the second network node.

    [0137] In some embodiments, each of the first wireless device identifier and/or the second wireless device identifier are one or more of an IMEI, an IMEI SV, or a PEI.

    [0138] FIG. 14 is a flow chart illustrating an alternative method of operating a first network node. The first network node is in a first core network of a telecommunication network. The first network node is for managing data relating to subscribers of the first core network. In some embodiments, the first network node is a HSS 820, and the second network node is a UDM node 830. In alternative embodiments, the first network node is a UDM node 830 and the second network node is a HSS 820. The method shown in FIG. 14 relates to the technique shown in FIG. 8.

    [0139] Thus, in step 1401, the first network node stores a first wireless device identifier for a first subscriber. The first network node also stores a first timestamp associated with the first wireless device identifier. The first timestamp indicates the date and/or time that the wireless device identifier of the first subscriber was set/updated to the first wireless device identifier. In some embodiments, the first wireless device identifier is one or more of an IMEI, an IMEI SV, or a PEI.

    [0140] In step 1403, the first network node sends a first request to a second network node. The second network node is in a second core network of the telecommunication network. The first request sent in step 1403 requests a wireless device identifier for the first subscriber from the second network node. 46. In embodiments where the first network node is a HSS and the second network node is a UDM node, the first request may be a Nudm_UECM_Get service operation.

    [0141] In step 1405, the first network node receives a first message from the second network node. The first message indicates a second wireless device identifier for the first subscriber and a second timestamp associated with the second wireless device identifier. The second timestamp indicates the date and/or time that the wireless device identifier of the first subscriber was set/updated to the second wireless device identifier. In some embodiments, the second wireless device identifier is one or more of an IMEI, an IMEI SV, or a PEI.

    [0142] In step 1407, the first network node determines which of the first wireless device identifier and the second wireless device identifier has the most recent timestamp. This step can comprise comparing the respective timestamps for the first wireless device identifier and the second wireless device identifier.

    [0143] In step 1409, the first network node selects a wireless device identifier for the first subscriber as the one of the first wireless device identifier and the second wireless device identifier having the most recent timestamp.

    [0144] In some embodiments, the first request is sent to the second network node in step 1403 in response to the first network node receiving a second request from a third network node. The second request requests the wireless device identifier for the first subscriber. The third network node may be an IMS-AS. Thus, in some embodiments, the method by the first network node further comprises receiving the second request for the wireless device identifier for the first subscriber, and sending the selected one of the first wireless device identifier and the second wireless device identifier for the first subscriber to the third network node.

    [0145] FIG. 15 is a flow chart illustrating an alternative method of operating a second network node. The second network node is in a second core network of a telecommunication network. The second network node is for managing data relating to subscribers of the second core network. In some embodiments, the second network node is a HSS 820, and in other embodiments the second network node is a UDM node 830. The method shown in FIG. 15 relates to the technique shown in FIG. 8.

    [0146] In step 1501, the second network node stores a wireless device identifier for a first subscriber. The second network node also stores a timestamp associated with the wireless device identifier. The timestamp indicates the date and/or time that the wireless device identifier of the first subscriber was set/updated to the wireless device identifier. In some embodiments, the wireless device identifier is one or more of an IMEI, an IMEI SV, or a PEI.

    [0147] In step 1503, the second network node receives a first request from a first network node in a first core network of the telecommunication network. The first request requests a wireless device identifier for the first subscriber from the second network node. The first network node may be a HSS 820 or a UDM node 830. In particular embodiments, the first network node is a HSS 820 and the second network node is a UDM node 830. In other particular embodiments, the first network node is a UDM node 830 and the second network node is a HSS 820. In embodiments where the first network node is a HSS 820 and the second network node is a UDM node 830, the first request can be a Nudm_UECM_Get service operation.

    [0148] In step 1505, the second network node sends a first message to the first network node. The first message indicates the stored wireless device identifier for the first subscriber and the timestamp associated with the stored wireless device identifier.

    [0149] Various exemplary techniques, embodiments and/or solutions are set out in the following set of numbered statements: [0150] 1. A method of operating a first network node in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the method comprises: [0151] after a first wireless device identifier for a first subscriber of the first core network and the second core network is changed to a second wireless device identifier, sending a first message to the second network node indicating the second wireless device identifier for the first subscriber. [0152] 2. A method as defined in statement 1, wherein the first message indicates that a wireless device identifier for the first subscriber has changed to the second wireless device identifier. [0153] 3. A method as defined in statement 1, wherein the first message indicates that the first wireless device identifier for the first subscriber has changed to the second wireless device identifier. [0154] 4. A method as defined in any of statements 1-3, wherein the method further comprises: [0155] receiving a second message from a serving node for the first subscriber, wherein the second message indicates that the wireless device identifier for the first subscriber has changed to the second wireless device identifier. [0156] 5. A method as defined in any of statements 1-4, wherein the method further comprises: [0157] receiving an identifier request for the wireless device identifier for the first subscriber from a third network node; and sending the second wireless device identifier for the first subscriber to the third network node. [0158] 6. A method as defined in statement 5, wherein the third network node is an IP Multimedia Subsystem Application Server, IMS-AS. [0159] 7. A method as defined in any of statements 1-6, wherein the method further comprises: [0160] receiving a first subscription request from an exposure function, EF, node in the telecommunication network, wherein the first subscription request requests notification of changes to the wireless device identifier for the first subscriber; and [0161] after the change to the second wireless device identifier for the first subscriber, notifying the EF node of the second wireless device identifier for the first subscriber. [0162] 8. A method as defined in any of statements 1-7, wherein the first message is a deregistration message that triggers the deletion of a registration of the wireless device for the first subscriber from a mobility management node (e.g. an MME or AMF) in the second core network. [0163] 9. A method as defined in statement 8, wherein the deregistration message is a Nudm_UECM_AMFDeregistration service operation or a Nhss_UECM_MMEDeregistration service operation. [0164] 10. A method as defined in any of statements 1-7, wherein the first message is a registration update message that triggers the update of a registration of the wireless device for the first subscriber in a mobility management node in the second core network. [0165] 11. A method as defined in statement 10, wherein the registration update message is a Nudm_UECM_Update service operation or a Nhss_UECM_Update service operation. [0166] 12. A method as defined in any of statements 1-7, wherein the method further comprises: [0167] receiving a second subscription request from the second network node, wherein the second subscription request requests notification of changes to the wireless device identifier for the first subscriber; [0168] wherein the first message is sent to the second network node as a result of the second subscription request and the change of the wireless device identifier for the first subscriber to the second wireless device identifier. [0169] 13. A method as defined in any of statements 1-12, wherein the method further comprises sending a third subscription request to the second network node, wherein the third subscription request requests notification of changes to the wireless device identifier for the first subscriber. [0170] 14. A method as defined in any of statements 1-13, wherein the method further comprises: [0171] receiving a third message from the second network node, wherein the third message indicates a third wireless device identifier for the first subscriber; and [0172] storing the third wireless device identifier for the first subscriber. [0173] 15. A method as defined in statement 14 when dependent on statement 13, wherein the third message is received from the second network node as a result of the third subscription request. [0174] 16. A method as defined in any of statements 1-15, wherein each of the first wireless device identifier and the second wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI. [0175] 17. A method as defined in any of statements 1-16, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node. [0176] 18. A method as defined in any of statements 1-17, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS. [0177] 19. A method of operating a second network node in a second core network of a telecommunication network, wherein the second network node is for managing data relating to subscribers of the second core network, wherein the telecommunication network further comprises a first core network having a first network node that is for managing data relating to subscribers of the first core network, wherein the data comprises a first wireless device identifier for a first subscriber, wherein the method comprises: [0178] receiving a first message from the first network node indicating a second wireless device identifier for the first subscriber; and [0179] storing the second wireless device identifier for the first subscriber. [0180] 20. A method as defined in statement 19, wherein the first message indicates that a wireless device identifier for the first subscriber has changed to the second wireless device identifier. [0181] 21. A method as defined in statement 19, wherein the first message indicates that the first wireless device identifier for the first subscriber has changed to the second wireless device identifier. [0182] 22. A method as defined in any of statements 19-21, wherein the method further comprises: [0183] receiving an identifier request for the wireless device identifier for the first subscriber from a third network node; and [0184] sending the second wireless device identifier for the first subscriber to the third network node. [0185] 23. A method as defined in statement 22, wherein the third network node is an IP Multimedia Subsystem Application Server, IMS-AS. [0186] 24. A method as defined in any of statements 19-23, wherein the method further comprises: [0187] receiving a first subscription request from an exposure function, EF, node in the telecommunication network, wherein the first subscription request requests notification of changes to the wireless device identifier for the first subscriber; and [0188] after the change to the second wireless device identifier for the first subscriber, notifying the EF node of the second wireless device identifier for the first subscriber. [0189] 25. A method as defined in any of statements 19-24, wherein the method further comprises: [0190] receiving a second message from a serving node for the first subscriber, wherein the second message indicates that the wireless device identifier for the first subscriber has changed to a third wireless device identifier. [0191] 26. A method as defined in statement 25, wherein the method further comprises: [0192] sending a third message to the first network node, wherein the third message indicates the third wireless device identifier for the first subscriber. [0193] 27. A method as defined in any of statements 19-26, wherein the first message is a deregistration message that triggers the deletion of a registration of the wireless device for the first subscriber from a mobility management node in the second core network. [0194] 28. A method as defined in statement 27, wherein the deregistration message is a Nudm_UECM_AMFDeregistration service operation or a Nhss_UECM_MMEDeregistration service operation. [0195] 29. A method as defined in any of statements 19-26, wherein the first message is a registration update message that triggers the update of a registration of the wireless device for the first subscriber in a mobility management node in the second core network. [0196] 30. A method as defined in statement 29, wherein the registration update message is a Nudm_UECM_Update service operation or a Nhss_UECM_Update service operation. [0197] 31. A method as defined in any of statements 19-26, wherein the method further comprises: [0198] prior to receiving the first message, sending a second subscription request to the first network node, wherein the second subscription request requests notification of changes to the wireless device identifier for the first subscriber. [0199] 32. A method as defined in any of statements 19-31, wherein the method further comprises receiving a third subscription request from the first network node, wherein the third subscription request requests notification of changes to the wireless device identifier for the first subscriber. [0200] 33. A method as defined in any of statements 19-32, wherein each of the first wireless device identifier and the second wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI. [0201] 34. A method as defined in any of statements 19-33, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node. [0202] 35. A method as defined in any of statements 19-34, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS. [0203] 36. A method of operating an exposure function, EF, node in a telecommunication network, wherein the telecommunication network comprises a first core network comprising a first network node that is for managing data relating to subscribers of the first core network, and a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the method comprises: [0204] sending a subscription request to only one of the first network node and the second network node, wherein the subscription request requests notification of changes to a wireless device identifier for a first subscriber of the first core network and the second core network. [0205] 37. A method as defined in statement 36, wherein the EF node does not send a subscription request to the other one of the first network node and the second network node. [0206] 38. A method as defined in statement 36 or 37, wherein the method further comprises: [0207] receiving, from the one of the first network node and the second network node, a notification for the first subscriber of a change from a first wireless device identifier to a second wireless device identifier. [0208] 39. A method as defined in any of statements 36-38, wherein each of the first wireless device identifier and the second wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI. [0209] 40. A method as defined in any of statements 36-39, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node. [0210] 41. A method as defined in any of statements 36-40, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS. [0211] 42. A method of operating a first network node in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the method comprises: [0212] storing a first wireless device identifier for a first subscriber, and a first timestamp associated with the first wireless device identifier; [0213] sending a first request to a second network node in a second core network of the telecommunication network, wherein the first request requests a wireless device identifier for the first subscriber from the second network node; [0214] receiving a first message from the second network node indicating a second wireless device identifier for the first subscriber and a second timestamp associated with the second wireless device identifier; [0215] determining which of the first wireless device identifier and the second wireless device identifier has the most recent timestamp; and [0216] selecting a wireless device identifier for the first subscriber as the one of the first wireless device identifier and the second wireless device identifier having the most recent timestamp. [0217] 43. A method as defined in statement 42, wherein the first request is sent to the second network node in response to receiving a second request from a third network node for the wireless device identifier for the first subscriber. [0218] 44. A method as defined in statement 43, wherein the method further comprises: [0219] receiving the second request for the wireless device identifier for the first subscriber; and [0220] sending the selected one of the first wireless device identifier and the second wireless device identifier for the first subscriber to the third network node. [0221] 45. A method as defined in statement 43 or 44, wherein the third network node is an IP Multimedia Subsystem Application Server, IMS-AS. [0222] 46. A method as defined in any of statements 42-45, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node. [0223] 47. A method as defined in statement 46, wherein the first request is a Nudm_UECM_Get service operation. [0224] 48. A method as defined in any of statements 42-45, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS. [0225] 49. A method as defined in any of statements 42-48, wherein each of the first wireless device identifier and the second wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI. [0226] 50. A method of operating a second network node in a second core network of a telecommunication network, wherein the second network node is for managing data relating to subscribers of the second core network, wherein the method comprises: [0227] storing a wireless device identifier for a first subscriber, and a timestamp associated with the wireless device identifier; [0228] receiving a first request from a first network node in a first core network of the telecommunication network, wherein the first request requests a wireless device identifier for the first subscriber from the second network node; [0229] sending a first message to the first network node indicating the stored wireless device identifier for the first subscriber and the timestamp associated with the stored wireless device identifier. [0230] 51. A method as defined in statement 50, wherein the first network node is a Home Subscriber Server, HSS, and the second network node is a Unified Data Management, UDM, node. [0231] 52. A method as defined in statement 51, wherein the first request is a Nudm_UECM_Get service operation. [0232] 53. A method as defined in any of statements 50-52, wherein the first network node is a Unified Data Management, UDM, node and the second network node is a Home Subscriber Server, HSS. [0233] 54. A method as defined in any of statements 50-53, wherein the wireless device identifier is an International Mobile Equipment Identifier, IMEI, an IMEI Software Version, SV, or a Permanent Equipment Identifier, PEI. [0234] 55. A computer program product comprising a computer readable medium having computer readable code embodied therein, the computer readable code being configured such that, on execution by a suitable computer or processing unit, the computer or processing unit is caused to perform the method of any of statements 1-54. [0235] 56. A first network node for use in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the first network node is configured to perform the method according to any of statements 1-18 or 42-49. [0236] 57. A first network node for use in a first core network of a telecommunication network, wherein the first network node is for managing data relating to subscribers of the first core network, wherein the telecommunication network further comprises a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the first network node comprises: [0237] processing circuitry configured to perform any of the steps of the method according to any of statements 1-18 or 42-49; and [0238] power supply circuitry configured to supply power to the first network node. [0239] 58. A second network node for use in a second core network of a telecommunication network, wherein the second network node is for managing data relating to subscribers of the second core network, wherein the telecommunication network further comprises a first core network having a first network node that is for managing data relating to subscribers of the first core network, wherein the data comprises a first wireless device identifier for a first subscriber, wherein the second network node is configured to perform the method according to any of statements 19-35 or 50-54. [0240] 59. A second network node for use in a second core network of a telecommunication network, wherein the second network node is for managing data relating to subscribers of the second core network, wherein the telecommunication network further comprises a first core network having a first network node that is for managing data relating to subscribers of the first core network, wherein the data comprises a first wireless device identifier for a first subscriber, wherein the second network node comprises: [0241] processing circuitry configured to perform any of the steps of the method according to any of statements 19-35 or 50-54; and [0242] power supply circuitry configured to supply power to the second network node. [0243] 60. An exposure function, EF, node for use in a telecommunication network, wherein the telecommunication network comprises a first core network comprising a first network node that is for managing data relating to subscribers of the first core network, and a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the EF node is configured to perform the method according to any of statements 36-41. [0244] 61. An exposure function, EF, node for use in a telecommunication network, wherein the telecommunication network comprises a first core network comprising a first network node that is for managing data relating to subscribers of the first core network, and a second core network having a second network node that is for managing data relating to subscribers of the second core network, wherein the EF node comprises: [0245] processing circuitry configured to perform any of the steps of the method according to any of statements 36-41; and [0246] power supply circuitry configured to supply power to the EF node.