EP4298816A1 - Gestion de module d'identification d'abonné (sim) pour des réseaux mobiles privés en nuage - Google Patents
Gestion de module d'identification d'abonné (sim) pour des réseaux mobiles privés en nuageInfo
- Publication number
- EP4298816A1 EP4298816A1 EP22708672.5A EP22708672A EP4298816A1 EP 4298816 A1 EP4298816 A1 EP 4298816A1 EP 22708672 A EP22708672 A EP 22708672A EP 4298816 A1 EP4298816 A1 EP 4298816A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- sim
- mobile network
- private mobile
- partner
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 63
- 238000004891 communication Methods 0.000 claims abstract description 24
- 238000004519 manufacturing process Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000007726 management method Methods 0.000 description 35
- 230000009471 action Effects 0.000 description 8
- 230000001010 compromised effect Effects 0.000 description 7
- 230000009849 deactivation Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000013523 data management Methods 0.000 description 4
- 230000003213 activating effect Effects 0.000 description 3
- 201000002266 mite infestation Diseases 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000003362 replicative effect Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005401 electroluminescence Methods 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000013403 standard screening design Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
Definitions
- SIM Subscriber identification module
- SIM providers typically issue SIMs in batches (e.g., one thousand SIMs or two thousand SIMs in one batch) for use with a network.
- the SIMs are used by devices for accessing the network.
- the network may identify the devices using the SIMs and may ensure that the correct devices are accessing the network. Every SIM in the batch is typically programmed with secrets directly or derived from the same operator key from the network providers.
- a SIM ceremony occurs where the SIM provider and the network provider exchange the keys for the SIMs and other secure information so that the SIM cards may access the network provided by the network provider.
- Thousands of SIM cards may be authenticated at one time for use with the network.
- a network provider is generally managing one global network and the SIM ceremony ensures the exchange of the correct keys so that the sender and the receiver may encrypt and/or decrypt SIMs in the future.
- the SIM secrets are typically derived from global keys at the network provider.
- the number of SIMs requested for the private mobile network may be fewer than a typical batch of SIMs.
- a method for subscriber identification module (SIM) management for a private mobile network using a private mobile network service on a cloud computing system.
- the method includes generating Ki and operator code (OPc) values in the private mobile network service substituting subscriber identification module (SIM) ceremonies for each private mobile network.
- the method also includes exchanging the Ki and OPc values with SIM partners through application programming interface (APIs).
- APIs application programming interface
- the Ki and OPc values are programmed during manufacturing SIM cards.
- the method also includes exchanging a transport key to securely exchange SIM secrets with a SIM partner that provides SIM cards.
- the method also includes receiving a request from a user to establish a private mobile network provided by the cloud computing system.
- the request identifies the SIM partner for providing the SIM cards for devices to use on the private mobile network.
- the method also includes receiving, from the SIM partner, encrypted SIM operations details for each SIM profile of the SIM cards for use with the private mobile network.
- the method also includes decrypting the encrypted SIM operations details using the transport key.
- the method also includes securely storing the SIM operations details for each SIM profile for use with the private mobile network.
- the method may also include securely transmitting the SIM operations details to a packet core partner for use with the private mobile network.
- the packet core partner may store the SIM operations details for the private mobile network and may perform an authentication of devices trying to access the private mobile network using the SIM operation details.
- the SIM operations details may include an international mobile subscriber identity (IMSI) values and integrated circuit card identifier (ICCID) values for the SIM cards.
- IMSI international mobile subscriber identity
- ICCID integrated circuit card identifier
- the SIM operations details may further include for each SIM profile of the SIM cards, the Ki value and the OPc value.
- the request may further include an identification of one or more of international mobile subscriber identity (IMSI) values for the SIM cards, a public land mobile network (PLMN) for the private mobile network, one or more locations for the private mobile network, or a network name for the private mobile network.
- IMSI international mobile subscriber identity
- PLMN public land mobile network
- the method may further include performing one or more conflict checks to verify that the IMSI values or the PLMN are not already in use by other networks in the cloud computing system.
- the SIM provider may be one of a plurality of SIM partners associated with the cloud computing system.
- the method may further include providing a service key for the private mobile network.
- the service key may identify the private mobile network and the service key may be provided to the SIM provider when purchasing the SIM cards.
- the SIM secrets may include a combination of the OPc values and the Ki values.
- a device in accordance with another aspect of the present disclosure, includes one or more processors, memory in electronic communication with the one or more processors, and instructions stored in the memory. The instructions are executable by the one or more processors to generate Ki and operator code (OPc) values in a private mobile network service substituting subscriber identification module (SIM) ceremonies for each private mobile network. The instructions are further executable by the one or more processors to exchange the Ki and OPc values with a SIM partner through application programming interfaces (APIs). The Ki and OPc values are programmed during manufacturing subscriber identification module (SIM) cards.
- SIM subscriber identification module
- the instructions are also executable by the one or more processors to exchange a transport key to securely exchange SIM secrets with the subscriber SIM partner that provides SIM cards.
- the instructions are also executable by the one or more processors to receive a request from a user to establish a private mobile network provided by a cloud computing system. The request identifies the SIM partner for providing the SIM cards for devices to use on the private mobile network.
- the instructions are also executable by the one or more processors to receive, from the SIM partner, encrypted SIM operations details for each SIM profile of the SIM cards for use with the private mobile network.
- the instructions are also executable by the one or more processors to decrypt the encrypted SIM operations details using the transport key.
- the instructions are also executable by the one or more processors to securely store the SIM operations details for each SIM profile for use with the private mobile network.
- the device may further include securely transmitting the SIM operations details to a packet core partner for use with the private mobile network.
- the packet core partner may store the SIM operations details for the private mobile network and may perform an authentication of devices trying to access the private mobile network using the SIM operation details.
- the SIM operations details may include an international mobile subscriber identity (IMSI) values and integrated circuit card identifier (ICCID) values for the SIM cards.
- IMSI international mobile subscriber identity
- ICCID integrated circuit card identifier
- the SIM operations details may further include, for each SIM profile of the SIM cards, the Ki value and the operator code (OPc) value.
- the request may further include an identification of one or more of international mobile subscriber identity (IMSI) values for the SIM cards, a public land mobile network (PLMN) for the private mobile network, one or more locations for the private mobile network, or a network name for the private mobile network.
- IMSI international mobile subscriber identity
- PLMN public land mobile network
- the instructions may be further executable by the one or more processors to perform one or more conflict checks to verify that the IMSI values or the PLMN are not already in use by other networks in the cloud computing system.
- the SIM provider may be one of a plurality of SIM partners associated with the cloud computing system.
- the instructions may be further executable by the one or more processors to provide a service key for the private mobile network.
- the service key may identify the private mobile network and the service key may be provided to the SIM provider when purchasing the SIM cards.
- a method for integrating SIM partners for private mobile networks to use with a cloud computing system.
- the method includes establishing an interface for communicating with a plurality of SIM partners using a private mobile network service.
- the method also includes exchanging with each SIM partner of the plurality of SIM partners Ki values, operator code (OPc) values, and a transport key unique to the SIM partner.
- the transport key is used to encrypt communications between the private mobile network service and the SIM partners.
- the method also includes receiving a request from a user to establish a private mobile network provided by the cloud computing system. The request identifies a SIM partner of the plurality of SIM partners for providing SIM cards for use with the private mobile network.
- the method also includes providing to the user a service key for the private mobile network to use when purchasing the SIM cards from the SIM partner.
- the service key uniquely identifies the private mobile network.
- the method also includes receiving, from the SIM partner in response to the purchase of the SIM cards, encrypted SIM operations details for each SIM profile of the SIM cards for use with the private mobile network.
- the method also includes decrypting the encrypted SIM operations details using the transport key.
- the method also includes securely storing the SIM operations details for each SIM profile for use with the private mobile network.
- the interface may be a SIM partner application programming interface.
- Figure 1 illustrates an example system for creating a private mobile network using a cloud mobile network service in accordance with implementations of the present disclosure.
- Figure 2 illustrates an example method for SIM management for a private mobile network in accordance with implementations of the present disclosure.
- Figure 3 illustrates an example method for configuring SIM policies in accordance with implementations of the present disclosure.
- Figure 4 illustrates an example system for providing a private mobile network using a cloud computing system in accordance with implementations of the present disclosure.
- Figure 5 illustrates an example system for providing a private mobile network using a cloud computing system with the cloud control plane and the packet control plane on the edge devices in accordance with implementations of the present disclosure.
- Figure 6 illustrates an example system for providing a private mobile network using a cloud computing system with the cloud control plane in the cloud and the packet control plane on the edge devices in accordance with implementations of the present disclosure.
- Figure 7 illustrates an example environment for an edge device switching between a private mobile network and a public network in accordance with implementations of the present disclosure.
- Figure 8 illustrates an example environment accessing a private mobile network from multiple locations in accordance with implementations of the present disclosure.
- Figure 9 illustrates an example method for SIM management for a private mobile network using a private mobile network service on a cloud computing system in accordance with implementations of the present disclosure.
- Figure 10 illustrates certain components that can be included within a computing device.
- a private mobile network may be operated for a single entity.
- a company could have a private mobile network called “Company Name Network” that can be accessed only by devices that are configured for the private network. Access to this private mobile network can be restricted to individuals who are associated with the company (e.g., employees, customers).
- a private mobile network may use a combination of various technologies, including core aspects such as cellular frequency, identity, radio access network, and packet core, as well as supplementary aspects such as VNF infrastructure, routing, hybrid connectivity, and monitoring.
- SIM Subscriber identification module
- SIM providers typically issue SIMs in batches (e.g., one thousand SIMs or two thousand SIMs in one batch) for use with a network.
- the SIMs are used by devices for accessing the network.
- the network may identify the devices using the SIMs and may ensure that the correct devices are accessing the network.
- Every SIM in the batch is typically programmed with secrets directly or derived from the same operator key from the network providers.
- a SIM ceremony occurs where the SIM provider and the network provider exchange the keys for the SIMs and other secure information so that the SIM cards may access the network provided by the network provider.
- a network provider is generally managing one global network and the SIM ceremony ensures the exchange of the correct keys so that the sender and the receiver may encrypt and/or decrypt SIMs in the future.
- the SIM secrets are typically derived from global keys at the network provider.
- the number of SIMs requested for the private mobile network may be fewer than a typical batch of SIMs.
- a SIM ceremony needs to occur for the new private mobile network to authenticate the requested number of SIMs with the private mobile network.
- the present disclosure allows users of the cloud computing system to create private mobile networks using a mobile network service on the cloud computing system.
- the users may purchase SIMs for devices to use on the private mobile network from a trusted SIM partner (e.g., a SIM vendor) associated with the cloud computing system.
- the mobile network service Users receive, from the mobile network service, a service key identifier for the private mobile network to share with the SIM partners. After the SIM purchase is complete, the SIM vendor securely transmits relevant SIM information to the mobile network service without requiring further action from the user.
- the mobile network service saves this information in a secure manner and populates the relevant SIM information for the private mobile network to a home subscriber server (HSS) datastore for future activation.
- HSS home subscriber server
- the user may use the mobile network service to assign one or more SIMs for the private mobile network to specific edge devices of the cloud computing system.
- the user may use the mobile network service to activate and/or deactivate the SIMs or a subset of the SIMs on the edge devices.
- the mobile network service may provide users a complete managed experience for deploying a private mobile network and activating or deactivating one or more device on the private mobile network.
- the mobile network service establishes secure interfaces for communicating with the customers, the SIM partners, and/or the packet core partners.
- the mobile network service may use one or more APIs and/or portals for communicating with the different parties (e.g., the customers, the SIM partners, and/or the packet core partners).
- the mobile network service may also generate a plurality of keys and/or unique identifiers for providing secure transmissions between the parties.
- the mobile network service manages the SIM profiles of the purchased SIM cards for the private mobile networks without providing the users access to the secure SIM profile information.
- the mobile network service securely receives the information from the SIM partners and securely transmits the information to the packet core partners (e.g., a packet core vendor) to implement the private mobile network using the information received from the SIM partners.
- the cloud computing system can implement aspects of the private mobile networks that are created for the users. As such, the mobile network service simplifies the management and creation of private mobile networks.
- One example use case may include a user using the mobile network service to create a private mobile network for different factories locations across the United States.
- the user may have factories in Chicago, Houston, and Los Angeles.
- the user may want to have three robots in each of the factories connected to the private mobile network.
- the user may use the mobile network service to create the new private mobile network for the three factories and purchase nine SIM cards for the private mobile network.
- the SIM cards may be used to establish the identity of each robot in the different factories.
- One example may include the user using the mobile network service to activate all the robots at the factory locations.
- Another example may include the user using the mobile network service to only activate the robots at the Chicago factory location.
- Another example may include the user using the mobile network service to activate a subset of the robots at each factory location (e.g., one robot at the Chicago factory location, one robot at the Houston factory location, and one robot at the Los Angeles factory location).
- the mobile network service may simplify the setup and management of mobile networks by providing the users an end- to-end management and monitoring experience.
- One technical advantage of the present disclosure is the flexibility to onboard a plurality of SIM partners to the cloud computing system and establish a trusted relationship with the plurality of SIM partners to securely communicate user information and SIM information for the private mobile networks.
- Another technical advantage of the present disclosure includes the ability the scale trusted relationships among a plurality of SIM partners and/or packet core partners so that SIM partners and/or packet core partners may easily integrate with the cloud computing system for providing services for the private mobile networks.
- Another technical advantage of the present disclosure is improving security for the integration of the SIM partners and/or the packet core partners by providing secure interfaces for communicating with the SIM partners and/or the packet core partners.
- the present disclosure manages keys used for the secure transmissions between the parties and stores the keys in a secure fashion.
- the present disclosure ensures that the keys remain partitioned between the users, the SIM partners, and the packet core partners so that each party only has access to the appropriate key.
- the present disclosure also facilitates the exchange of the keys between the SIM partners, the mobile network service, and the packet core partners.
- Another technical advantage of the present disclosure is improving security by reducing a blast radius of secrets being compromised for the private mobile network.
- the present disclosure performs the SIM ceremony on demand for every private mobile network requested. Instead of having a single global key for the entire batch of SIMs for the network, the present disclosure provides each SIM for the private mobile network with a unique key and operator codes. By having different values stored on each SIM card used with the private mobile network, if one SIM card is compromised, only that batch of SIM cards in that order are compromised, reducing the impact to the private mobile network.
- FIG. 1 illustrated is an example system 100 for providing private mobile networks 10 implemented through a cloud computing system 102 (which may be a public cloud computing system) on one or more edge devices 112, 116.
- the edge devices 112, 116 may be at different mobile network sites.
- a user 106 may want to create a private mobile network 10 using the cloud computing system 102 for different restaurant locations throughout the world.
- Cloud computing system 102 may facilitate the creation and deployment of the private mobile networks 10.
- cloud computing system 102 may provide first party network functions services to run on the edge device 112, 116.
- the cloud computing system 102 can implement aspects of the private mobile networks 10 that are created for the users 106. For example, some or all of a packet core of a private mobile network can be implemented in the cloud computing system 102. Different types of deployment models can be made available for creating a private mobile network 10. The different types of deployment models can vary based on the location of components of the packet core technology. In some implementations, at least three different deployment models can be made available: a cloud deployment model, a user-selected location deployment model, and a hybrid deployment model. In the cloud deployment model, the entire packet core (including the user plane and the control plane) can be hosted on the cloud computing system that provides the mobile connectivity service.
- the entire packet core can be deployed at one or more locations that are selected by the user.
- the user-selected locations can be, for example, an on-premises network, a colocation center, a peering location, an edge location of a public cloud provider (e.g., where content delivery network and other caching services are provided), an edge location of a telecommunication company, and combinations thereof.
- some aspects of the packet core can be hosted on a cloud computing system that provides the mobile connectivity service, while other aspects of the packet core can be deployed at one or more user-selected locations.
- the techniques disclosed herein are applicable to any type of private mobile network, including (but not limited to) mobile networks based on mobile cores, Long-Term Evolution (LTE) wireless communication standards, and/or other types of wireless communications standards, such as 5G standards, Universal Mobile Telecommunications System (UMTS) standards, and/or Global System for Mobile Communications (GSM) standards.
- LTE Long-Term Evolution
- UMTS Universal Mobile Telecommunications System
- GSM Global System for Mobile Communications
- the techniques disclosed herein are not limited to cellular networks but are also applicable to wireless networks that operate in accordance with other access technologies, such as wireless local area network (WLAN) technologies that operate in accordance with an IEEE 802.11 standard (e.g., 802.1 lax, also known as “WiFi 6”).
- WLAN wireless local area network
- IEEE 802.11 e.g. 802.1 lax, also known as “WiFi 6”.
- the cloud computing system 102 may include a mobile network service 104 that facilitates the creation and management of the private mobile networks 10.
- One or more users 106 also referred to as customers, may use the mobile network service 104 to create a new private mobile network 10 and/or manage an existing private mobile network 10.
- one or more SIM partners 108 may communicate with the mobile network service 104 to provide the SIM operation details 24 for SIM cards 20 of the devices that may access the private mobile networks 10.
- One or more packet core partners 110 may communicate with the mobile network service 104 to receive private network information 12 and the SIM operations details 24. As such, the mobile network service 104 may securely communicate with each of the users 106, the SIM partners 108, and/or the packet core partners 110 to facilitate the creation and deployment of private mobile networks 10.
- the mobile network service 104 may establish an interface for securely communicating with the users 106.
- the mobile network service 104 may provide a mobile network portal 12 (e.g., a website) through which the users 106 may create and manage one or more private mobile networks 10.
- the users 106 may select to create a new private mobile network 10 or manage an existing private mobile network 10.
- the users may select a SIM partner 108 from the plurality of SIM partners 108 associated with the cloud computing system 102 to provide SIMs cards 20 for use with the private mobile network 10.
- the users 106 may send a private network request 14 for the private mobile network 10 with the selected SIM partner 108.
- the private network request 14 may include a request to create a new private mobile network 10.
- the private network request 14 may also include a request to manage an existing private mobile network 10 and/or a request to modify an existing private mobile network 10.
- the private network request 14 may include private network information 12 for the private mobile network 10.
- the private network information 12 may include, but is not limited to, the selected SIM partner 108, a selected packet core partner 110, a number of SIM cards 20 for use with the private mobile network 10, a network name, a public land mobile network (PLMN) to use (e.g., a PLMN of the user’s choice or the PLMN provided by the SIM partner), one or more locations for the private mobile network 10, and/or user information (e.g., company name, representative name, contact information, address).
- PLMN public land mobile network
- the mobile network service 104 may provide the users 106 flexibility in selecting a SIM partner 108 to supply the SIM cards 20 for use with the private mobile network 10 and to specifying a PLMN for use with the private mobile network 10.
- the mobile network service 104 may provide a PLMN IMSI Block Number (IBN) for citizens Broadband Radio Service (CBRS) for those users 106 who do not have a PLMN.
- IBN PLMN IMSI Block Number
- CBRS citizens Broadband Radio Service
- the mobile network service 104 may perform one or more conflict checks to ensure that the users 106 are not using PLMNs that belong to other users.
- the mobile network service 104 may receive the private network request 14 and may generate a SIM service key 32 for the private mobile network 10.
- the SIM service key 32 may identify each private mobile network 10 in cloud computing system 102.
- the SIM service key 32 is a global unique identifier (GUTD) that creates a unique identifier of the private mobile network 10. If the user 106 is creating a new private mobile network 10, a new SIM service key 32 is generated and provided to the user 106 for the private mobile network 10. If a customer is adding SIM cards 20 to an existing private mobile network 10 and/or removing SIM cards 20 from an existing private mobile network 10, the existing SIM service key 32 for the private mobile network 10 is provided to the user 106.
- GUITD global unique identifier
- the user 106 may provide the SIM service key 32 to the selected SIM partner 108 when purchasing the requested number of SIM cards 20 from the SIM partner 108.
- the user 106 may complete the purchase of the SIM cards 20 with the SIM partner 108.
- the mobile network service 104 may supply SIM cards 20 to the users 106.
- the users 106 may directly purchase the SIM cards 20 from the mobile network service 104 for use with the private mobile network 10 instead of using a SIM partner 108.
- the mobile network service 104 may have a SIM partner application programming interface (API) 16 that facilitates communications between a plurality of SIM partners 108 and the mobile network service 104.
- the SIM partner API 16 may include onboarding tools that enable onboarding the plurality of SIM partners 108 to the cloud computing system 102 for use with the private mobile networks 10.
- the SIM partners 108 may use the SIM partner API 16 to partner with the cloud computing system 102 to provide SIM cards 20 for use with the private mobile networks 10.
- the SIM partner API 16 may also be used to establish secure communications between the SIM partners 108 and the mobile network service 104.
- Each SIM partner 108 may exchange a transport key 18 with the mobile network service 104 using the SIM partner API 16.
- the transport key 18 may be an encryption key that is used to encrypt data in transit over the SIM partner API 16.
- Each SIM partner 108 has a unique transport key 18. In an implementation, the transport key 18 may rotate or change periodically (e.g., every ninety days).
- the mobile network service 104 may securely store the transport keys 18 for each SIM partner 108 in a key vault 40 in a secure datastore 120.
- the SIM partner 108 and the mobile network service 104 may exchange the transport key 18 one time during the onboarding or initiation of the SIM partner 108 with the cloud computing system 102.
- the SIM partner 108 may query the mobile network service 104 using the SIM partner API 16 for the private network information 12 for the private mobile network 10 associated with the SIM service key 32 provided by the user 106.
- the mobile network service 104 may send the private network information 12 to the SIM partner 108 using the SIM partner API 16.
- the mobile network service 104 provides a subset of the private network information 12 to the SIM partner 108 to ensure that the SIM partner 108 only has the relevant information for the private mobile network 10 while preventing the SIM partner 108 from accessing other confidential or private information of the user 106.
- Each SIM card 20 may have a corresponding SIM profile 26.
- the SIM partner 108 generates the Ki values 28 for each private mobile network 10 of the purchased SIM cards 20.
- the SIM partner 108 generates the derived operator code (OPc) value 30 for each for each private mobile network 10 of the purchase SIM cards 20.
- the OPc value 30 is derived from the Ki values 28 and the operator code (OP) allocated to an operator and.
- an encryption algorithm generates the OPc value 30 using the operator code (OP) and the Ki values 28.
- the operator code (OP) remains fixed for all SIM cards 20 of the operator.
- the SIM secrets for the SIM card 20 may include the operator code (OP), the OPc value 30, and the Ki values 28.
- Each SIM card 20 has a unique OPc value 30 to identify the SIM card 20.
- the SIM partners 108 may burn or otherwise identify each SIM card 20 with the corresponding OPc value 30 and Ki value 28.
- OPc value 30 and Ki value 28 for the private mobile network 10 (which is associated with the specific order of SIMs for the private mobile network 10)
- each SIM card 20 may have multiple SIM profiles 26, allowing the SIM card 20 to move between a private mobile network 10 and a public network.
- the multiple SIM profiles 26 may allow the SIM card 20 to move between different private mobile networks 10.
- the users 106 may move the SIM cards 20 from the private mobile network 10 to another private mobile network or move the SIM cards 20 from the private mobile network 10 to a public network.
- the SIM partner 108 may transmit SIM operations details 24 for the purchased SIM cards 20 to the mobile network service 104 using the SIM partner API 16.
- the SIM operations details 24 may include, but are not limited to, the international mobile subscriber identity (IMSI) values for the SIM cards 20, the integrated circuit card identifier (ICCID) values for the SIM cards 20, the Ki values 28 for each SIM profile 26, and/or the OPc value 30 for each SIM profile 26.
- the SIM partner 108 may encrypt the SIM operations details 24 using the transport key 18 to securely transmit the SIM operations details 24 to the mobile network service 104.
- the mobile network service 104 decrypts the received SIM operations details 24 using the transport key 18.
- the mobile network service 104 may securely store the SIM operations details 24 for the private mobile network 10 in a secure datastore 120.
- the secure datastore 120 may include a key vault 40 for securely storing the transport keys 18, the SIM service keys 32, and/or the operator keys.
- the mobile network service 104 may perform one or more conflict checks for the SIM operations details 24. For example, if the mobile network service 104 determines that the IMSI values for the SIM cards 20 overlap with other values already stored in the secure datastore 120, the mobile network service 104 sends a notification to the SIM partner 108 alerting the SIM partner 108 that those IMSI values are already in use. The mobile network service 104 may ensure that the IMSI range for the SIM cards 20 for the private mobile network 10 is not already used by a different private mobile network 10, and thus, overlapping of the IMSI ranges may be prevented.
- the secure datastore 120 may include a user subscription 44 for each user 106 of the cloud computing system 102.
- the user subscription 44 may include one or more private mobile networks 10 associated with the user 106.
- the user subscription 44 may include the SIM profiles 26 for the SIM cards 20 of devices that may use the private mobile network 10 and the SIM operations details 24 associated with each of the SIM profiles 26.
- the user subscription 44 may also include the mobile core information 42 with details about the mobile cores 114, 118 for each of the private mobile networks 10.
- the mobile network service 104 may store the information in the secure datastore 120 in a segmented fashion to prevent unauthorized access to the information.
- the users 106 may only have access to information relating to their own private mobile networks 10 without having access to key information that is exchanged between the SIM partners 108 and the mobile network service 104. Moreover, the users 106 may be unable to access information about other users’ private mobile networks.
- the mobile network service 104 may have a packet core partner API 34 for communicating with one or more packet core partners 110.
- the packet core partner 110 may provide the access points for the private mobile network 10.
- the packet core partner 110 may provide one or more Radio Access Network (RAN) base stations for accessing the private mobile network 10.
- RAN Radio Access Network
- a base station is referred to as an Evolved Node B (which can be abbreviated as eNodeB or eNB).
- eNodeB Evolved Node B
- gNodeB or 5G NB gNodeB
- the mobile network service 104 may communicate the SIM operations details 24 for the SIM profiles 26 of the SIM cards 20 of devices that may use the private mobile network 10 to the packet core partner 110.
- the mobile network service 104 may communicate the private network information 12 for the private mobile network 10 to the packet core partner 110.
- the packet core partner 110 may store the SIM operations details 24 in a corresponding HSS pool 36 (for 4G LTE private networks) or store the SIM operations details 24 in a corresponding UDM pool 38 (for 5G private networks).
- system 100 may be mobile network generation agnostic and compatible across different mobile network generations.
- the packet core partner 110 may communicate with a number of edge devices 112, 116 for the private mobile network 10 based on the private network information 12 received from the mobile network service 104.
- the edge devices 112, 116 may be located at different geographic locations or mobile network sites. While two edge devices 112, 116 are depicted in the example, a private mobile network 10 in accordance with implementations may include any number of edge devices located at any number of geographic locations or mobile network sites.
- the packet core partner may communicate with a mobile core 114, 118 at each edge device 112, 116 for running the private mobile network 10.
- the packet core partner may identify the SIM profiles 26 of the SIM cards 20 that may be used for the private mobile network 10 at the edge devices 112, 116.
- the SIM cards 20 may move between the different edge devices 112, 116 and may access the private mobile network 10 from any of the edge devices 112, 116.
- Another example may include identifying specific SIM cards 20 for use at specific edge devices 112, 116 (e.g., a subset of the SIM cards 20 may only be used at the edge device 112, while a different subset of the SIM cards 20 may be used at the edge device 116).
- the packet core partner 110 may perform a verification or authentication of the devices by comparing the SIM profile 26 of each device trying to access the private mobile network 10 with the SIM operations details 24 stored in the HSS pool 36 or the UDM pool 38 for the private mobile network 10. By validating the information of the devices with the HSS pool 36 or the UDM pool 38, the packet core partner 110 may ensure that the devices belong to the private mobile network 10 and may prevent unauthorized devices from using the private mobile network 10.
- the mobile network service 104 provides a secure infrastructure using the SIM partner API 16 and the packet core API 34 for performing a SIM ceremony on demand for the purchased SIM cards 20.
- the mobile network service 104 securely communicates the relevant SIM information for the private mobile networks 10 among the SIM partners 108 and the packet core partners 110.
- system 100 may simplify the creation and management of private mobile networks 10.
- System 100 may easily scale to support additional SIM partners 108 and/or additional packet core partners 110 by providing a platform where SIM partners 108 and/or packet core partners 110 may easily integrate with cloud computing system 102 to provide services for private mobile networks 10.
- System 100 also provides users 106 with a complete managed experience for selecting and deploying a new private mobile network 10.
- the mobile network service 104 may simplify the setup and management of mobile networks by providing the users 106 an end-to-end management and monitoring experience.
- Method 200 for SIM management for a private mobile network 10 (Fig. 1) implemented through a cloud computing system 102 (Fig. 1).
- Method 200 is used to have a SIM ceremony on demand so SIM cards 20 may be selected and authenticated for a private mobile network 10 upon receiving a request to create the private mobile network 10 and/or a request to add more SIM cards 20 to an existing private mobile network 10.
- Method 200 enables the SIM ceremony to occur in a trustworthy manner. The actions of method 200 may be discussed below with reference to the architecture of Figure 1.
- the mobile network service 104 and the SIM partner 108 exchange a transport key 18.
- the transport key 18 is used to encrypt data in transit between the mobile network service 104 and the SIM partner 108.
- the transport key 18 may be exchanged one time and may be used to establish trust between the mobile network service 104 and the SIM partner 108.
- a user 106 selects an option to use a SIM partner 108 for providing SIMs for a private mobile network 10.
- the SIM partner 108 may include a SIM provider, a SIM vendor, a telecom company, and/or a general system integrator (SI).
- the SIM partner 108 may provide new SIMs to the user 106 for the private mobile network 10.
- the SIM partner 108 may provide SIMs previously procured by the SIM partner 108 (e.g., for use by the user 106 or for other uses).
- the user 106 may create a new private mobile network 10 and select the SIM partner 108 to provide the SIM cards 20 for the new private mobile network 10.
- the user 106 may add SIM cards 20 to an existing private mobile network and select the SIM partner 108 for providing the additional SIM cards 20 for the private mobile network 10.
- the user may want to add additional devices to one or more locations of the private mobile network 10.
- Another example may include the user adding a new location of the private mobile network 10 and adding additional devices to the new location.
- the user may provide additional information to the SIM partner 108 for the new private mobile network 10. Additional information may include, but is not limited to, a quantity of SIM cards 20 for use with the private mobile network 10, the IMSI range for the SIM cards 20, a public landline mobile network (PLMN) ID, a network name for the private mobile network, and/or other customer information. As such, the user may select a variety of different information for the private mobile network 10 to provide to the SIM partner 108.
- PLMN public landline mobile network
- the mobile network service 104 provides the user 106 with a SIM service key 32 for the private mobile network 10. If the user 106 is creating a new private mobile network 10, a new SIM service key 32 may be generated by the mobile network service 104 and provided to the user 106. If a user 106 is adding the SIM cards 20 to an existing private mobile network 10, the existing SIM service key 32 may be provided to the user 106. In addition, if the user 106 is adding the SIM cards 20 to an existing private mobile network 10, a new SIM service key 32 may be generated and the mobile network service 104 may associate the new SIM service key 32 with the existing private mobile network 10.
- the user 106 completes the purchase of the SIM cards 20 with the SIM partner 108.
- the user 106 provides the SIM service key 32 to the SIM partner 108 and coordinates with the SIM partner 108 the purchase of the SIM cards 20 for the private mobile network 10.
- the SIM cards 20 may include, dual SIMs, uSIMs, and/or eSIMs.
- the SIM partner 108 sends a request to the mobile network service 104 for the private network information 12 associated with the SIM service key 32, and at 212, the mobile network service 104 provides the private network information 12 to the SIM partner 108.
- the private network information 12 may include the number of SIM cards 20 for the private mobile network 10, a selected PLMN, an IMSI range for the SIM cards 20, and a network name for the private mobile network 10.
- the SIM partner 108 encrypts the SIM operation details 24 and sends the SIM operation details 24 to the mobile network service 104.
- the SIM partner 108 generates the Ki values 28 for each SIM profile 26 of the plurality of SIM cards 20 purchased by the user 106.
- the SIM partner 108 uses the Ki values 28 and the operator code (Op) to generate the unique OPc values 30 for each SIM profile 26.
- the SIM operation details 24 include the IMSI values, the ICCID values, the Ki values 28, and the OPc values 30 for the SIM cards 20 purchased by the user 106 for the private mobile network 10.
- the SIM partner 108 encrypts the SIM operation details 24 using the SIM service key 32 and sends the SIM operation details 24 to the mobile network service 104 using the SIM partner API 16.
- the mobile network service 104 decrypts the SIM operation details 24 and stores the SIM operation details 24.
- the mobile network service 104 decrypts the SIM operation details 24 using the transport key 18.
- the SIM operations details 24 may include, but are not limited to, the IMSI values for the SIM cards 20, the ICCID values for the SIM cards 20, the Ki values 28 for each SIM profile 26, and/or the OPc value 30 for each SIM profile 26.
- the mobile network service 104 may re-encrypt the SIM operation details 24 prior to storing the SIM operation details 24, and thus, ensures that the SIM operation details 24 is encrypted data-at-rest. As such, the SIM operation details 24 are securely stored in a secure datastore 120.
- the mobile network service 104 sends the SIM operation details 24 to the packet core partner 110.
- the packet core partner 110 is an internal service provided by the mobile network service 104. As such, the mobile network service 104 and the packet core partner 110 may be the same entity.
- the packet core partner 110 is an external partner with the mobile network service 104.
- the packet core partner 110 is an Evolved Packet Core (EPC) partner.
- EPC Evolved Packet Core
- the mobile network service 104 may populate the HSS pool 36 or the UDM pool 38 at the packet core partner 110 with the SIM operation details 24 for further use.
- the packet core partner 110 may verify the SIM cards 20 of the devices trying to access the private mobile network 10, with the information stored in the HSS pool 36 or the UDM pool 38.
- method 200 may be used to integrate a plurality of SIM partners 108 with the cloud computing system 102 and manage the SIM information for one or more private networks 10.
- FIG. 3 illustrated is an example method 300 for configuring SIM policies for a private mobile network 10 (Fig. 1) implemented through a cloud computing system 102 (Fig. 1).
- the SIM polices may indicate when to activate a SIM card 20 (Fig. 1) or a SIM profile 26 (Fig. 1) associated with the SIM card 20 on an edge device (e.g., edge device 112, 116) of the private mobile network 10.
- the SIM policies may indicate when to deactivate the SIM card 20 or the SIM profile 26 on the private mobile network 10.
- the SIM policies may also indicate when to prevent the SIM card 20 or the SIM profile 26 from accessing the private mobile network 10.
- the SIM polices may be part of the SIM operation details 24 (Fig. 1).
- Each SIM card 20 and/or SIM profile 26 may have a SIM policy. Different SIM profiles 26 may have the same SIM policy. In addition, different SIM profiles 26 may have different SIM policies.
- the SIM policy may describe the performance characteristics that a SIM card 20 or the SIM profile 26 may have on the private mobile network 10.
- the user 106 may manage a lifecycle of the SIM card 20 or SIM profile 26 by configuring the SIM policies assigned to the SIM card 20 or SIM profile 26.
- the SIM policies may add sophistication to the SIM cards 20 or SIM profiles 26 by configuring the activation and/or deactivation of the SIM cards 20 or SIM profiles 26 on the private mobile network 10.
- An example SIM policy includes timebound access to the private mobile network 10.
- the SIM profiles 26 associated with the timebound SIM policy may only access the private mobile network 10 during the morning hours. As such, the SIM profiles 26 are part of the private mobile network 10 but the SIM policies limit the access the SIM profiles 26 have to the private mobile network 10.
- Another example SIM policy includes all SIM profiles 26 that belong to IP cameras are provided with a specified bandwidth on the private mobile network 10.
- Another example SIM policy includes SIM profiles 26 with a high quality of service requirement may bump SIM profiles 26 from the private mobile network 10 with a lower quality of service requirement as compared to the high quality of service requirement.
- the actions of method 300 may be discussed below with reference to the architecture of Figure 1 for activating and/or deactivating SIM cards 20 from having access to the private mobile network 10 through the edge devices on the private mobile network 10.
- the user 106 sends a create and/or delete SIM message to the mobile network service 104, and at 306, the mobile network service 104 sends the create and/or delete SIM message to the SIM provider 108.
- the message may create one or more SIMs for use with one or more edge devices on the private mobile network 10 (as in Fig. 1) or may delete one or more SIMs from using one or more edge devices on the private mobile network 10.
- the SIM provider 108 sends a SIM state activating and/or deactivating message to the mobile network service 104.
- the SIM provider 108 may activate the SIM state if the message sent is for creating SIMs and the SIM provider 108 may deactivate the SIM state if the message sent is for deleting SIMs.
- the mobile network service 104 sends an acknowledgement message to the SIM partner 108.
- the SIM partner 108 sends a notification to the packet core partner 110 to provision the SIMs and/or deprovision the SIMs based on the SIM state.
- the packet core partner 110 may be an internal service to the cloud service provider or may be a third party packet core partner 110.
- the notification to the packet core partner 110 may be a batch notification for a plurality of SIMs. The notification may identify which SIM cards 20 to provision or deprovision from the edge devices on the private mobile network.
- the packet core partner 110 may provision and/or deprovision the SIM cards 20 identified in the notification.
- the packet core partner 100 may send a notification response to the SIM partner 108 indicating that the SIM cards 20 are provisioned and/or deprovisioned.
- the packet core partner 110 may send a message to the mobile network service 108 identifying the SIM cards 20 in an active state at the packet core partner 110.
- the mobile network service 108 may send an acknowledgement message to the packet core partner 110 acknowledging receipt of the active state information.
- a loop may be performed for each SIM card 20 with an active state.
- the packet core partner 110 may send the SIM policy to the mobile network service 104.
- the mobile network service 104 may send an acknowledgement to the packet core partner 110 acknowledging the receipt of the SIM policies for the SIM card 20.
- a loop may be performed for each packet core of the edge devices (e.g., edge devices 112, 116) of the private mobile network 10.
- the packet core partner 110 provisions the SIM card 20 in the packet core 302. As such, the SIM card 20 may access the private mobile network 10 at the edge device.
- the packet core partner 110 deprovisions the SIM card 20 from the packet core. As such, the SIM card 20 may be unable to access the private mobile network 10 at the edge device.
- the loop 328 continues for all packet cores on the edge devices.
- the packet core 302 may send a SIM state activation message to the mobile network service 104 indicating whether the SIM card 20 is active on the packet core 302 or deactivated on the packet core 302, and at 338, the mobile network service 104 may send an acknowledgement message to the packet core 302.
- the loop 322 may continue for each SIM card 20 in the active state.
- the packet core partner 110 may send a message to the mobile network service 108 identifying the SIM cards 20 in a deactivated state at the packet core partner 110.
- the mobile network service 108 may send an acknowledgement message to the packet core partner 110 acknowledging receipt of the deactivation information.
- a loop may be performed for each SIM card 20 with a de-active state.
- a loop may be performed by the packet core partner 110 for each packet core of the edge devices of the private mobile network 10.
- the packet core partner 110 sends a deprovisioning message that deprovisions the SIM card 20 from the packet core 302 for the edge device. The loop may continue for all edge devices on the private mobile network 10.
- the packet core 302 may send a SIM state deactivation message to the mobile network service 104 for the deactivated SIM card 20.
- the mobile network service 104 may send an acknowledgement message to the packet core 302 indicating receipt of the SIM state deactivation information.
- the loop may continue for each SIM card in a de-active state at the packet core partner 110.
- the method 300 may be used to configure the capabilities of the SIM profiles 26 on the private mobile network 10 using different SIM policies.
- FIG. 4 illustrated is an example system 400 for providing private mobile networks 10 (Fig. 1) implemented through a cloud computing system 102 (which may be a public cloud computing system) on one or more edge devices 408, 414, 418.
- the edge devices 408, 414, 418 may be at different mobile network sites.
- System 400 may include one or more users 106 and one or more SIM partners 108 in communication with the mobile network service 104, as discussed above in Figure 1.
- System 400 may also include one or more mobile core partners 402 (e.g., a mobile core vendor) in communication with the mobile network service 104.
- the mobile core partner 402 is an internal service or a first party service provided by the cloud computing system 102.
- the mobile network service 104 may communicate with the mobile core partners 402 through a secure interface, such as, a mobile core partner API.
- the mobile network service 104 may mange the SIM cards 20 (Fig. 1) and the SIM profile 26 (Fig. 1) information for the private mobile network 10 as discussed above in Figures 1 and 2
- the mobile network service 104 may transmit the SIM operation details 24 to the mobile core partner 402 using the mobile core partner API.
- the mobile core partner 402 may transmit the SIM operation details 24 for the SIM cards 20 of devices accessing the private mobile network 10 to a cloud control plane 404.
- the cloud control plane 404 may include a packet core control plane 406 for the private mobile network 10.
- the packet core control plane 406 may allocate computing resources within the cloud computing system 102 for running the private mobile network 10.
- the cloud control plane 404 may communicate with one or more edge devices 408, 414, 418 for use with the private mobile network 10.
- Each edge device 408, 414, 418 may have a respective packet core user plane 410, 416, 420.
- the packet core user planes 410, 416, 420 may take a reference of the subscriber management network functions in the packet core control plane 406 in the cloud so that each edge device 408, 414, 418 maintains an updated view of the SIM profiles 26 able to access the private mobile network 10 using the edge devices 408, 414, 418.
- the packet core user plane 410, 416, 420 is implemented in the cloud control plane 404 separate from the edge devices 408, 414, 418.
- the edge devices 408, 414, 418 may be located at different geographic locations or mobile network sites.
- the edge devices 408, 414, 418 may also be located at the same geographic location or mobile network site. While three edge devices 408, 414, 418 are depicted in the example, a private mobile network 10 in accordance with implementations may include any different number of edge devices located at any number of geographic locations or mobile network sites.
- the cloud control plane 404 may provide the control plane operations 412 to each of the edge devices 408, 414, 418 for the private mobile network 10.
- system 400 may be used to provide private mobile networks 10 implemented through a cloud computing system 102 where both the cloud control plane 404 and the packet core control plane 406 are implemented in the cloud.
- System 500 for providing a private mobile network 10 (Fig. 1) implemented through a cloud computing system 102 on one or more edge devices 508, 512.
- the edge devices 508, 512 may be at the same geographic location. In addition, the edge devices 508, 512 may be at different geographic locations.
- System 500 may include one or more users 106 and one or more SIM partners 108 in communication with the mobile network service 104, as discussed above in Figure 1.
- System 500 may also include one or more mobile core partners 502 (e.g., a mobile core vendor) in communication with the mobile network service 104.
- the mobile core partner 502 is an internal service provided by the cloud computing system 102.
- the mobile network service 104 and the mobile core partner 502 may be the same entity.
- the mobile network service 104 may communicate with the mobile core partners 502 through a secure interface, such as, a mobile core partner API.
- the mobile network service 104 may mange the SIM cards 20 (Fig. 1) and the SIM profile 26 (Fig. 1) information for the private mobile network 10 as discussed above in Figures 1 and 2.
- the cloud control plane 504 may include a packet core control plane 506 for the private mobile network 10.
- the packet core control plane 506 may allocate computing resources within the cloud computing system 102 for running the private mobile network 10.
- the cloud control plane 504 and the packet control plane 506 are implemented on each of the edge devices 508, 512.
- the cloud computing system 102 may include one or more subscriber data management datastores 516.
- the subscriber data management datastores 516 may be a central datastore that stores the SIM profiles 26 and the SIM operation details 24 for each of the different private mobile networks 10.
- the packet core control plane 506 includes a subscriber management component 510 that includes the SIM profiles 26 and the SIM operation details 24 of the SIM cards 20 provisioned to operate on the private mobile network 10.
- Each of the subscriber management components 510 may receive the SIM profiles 26 and the SIM operation details 24 for the SIM cards 20 of devices accessing the private mobile network 10 from the subscriber data management datastore 516.
- each of the subscriber management components 510 receive the same copy of the SIM profiles 26 and the SIM operation details 24 from the subscriber data management datastore 516.
- each of the subscriber management components 510 in the different edge devices 508, 512 maintains the same view of the SIM cards 20 that may access the private mobile network 10 using the edge devices 508, 512.
- the edge device 508 may use the subscriber management components 510 to move between different factories that use the same private mobile network 10.
- the subscriber management component 510 may identify the SIM profile 26 for the edge device 508 with the private mobile network 10 and may automatically access the private mobile network 10 at each factory location using the subscriber management component 510.
- the edge devices 508, 512 may use the subscriber management component 510 to identify the SIM profiles 26 of the edge devices 508, 512 with the private mobile network 10 at a first location (e.g., a warehouse).
- a first location e.g., a warehouse
- the edge devices 508, 512 may handover to a public network if the private mobile network 10 is no longer available (e.g., the edge devices 508, 512 are outside the range of the private mobile network 10).
- the edge devices 508, 512 may use the subscriber management component 510 to identify the SIM profiles 26 of the edge devices 508, 512 with the private mobile network 10 and may automatically connect to the private mobile network 10.
- a private mobile network 10 in accordance with implementations may include any different number of edge devices located at any number of geographic locations or mobile network sites.
- the system 500 may be used to provide flexibility in managing the edge devices 508, 512 to ensure that the edge devices 508, 512 have access to the private mobile network 10 when the edge devices 508, 512 are within the vicinity of the private mobile network 10.
- FIG. 6 illustrated is an example system 600 for providing private mobile networks 10 (Fig. 1) implemented through a cloud computing system 102 (which may be a public cloud computing system) on one or more edge devices 608, 614.
- the edge devices 608, 614 may be at different geographic locations or mobile network sites.
- the edge devices 608, 614 may be at the same geographic locations or mobile network sites. While two edge devices 608, 614 are illustrated in the system 600, any number of edge devices 608, 614 may be implemented in the system 600.
- the system 600 may include one or more users 106 and one or more SIM partners 108 in communication with the mobile network service 104, as discussed above in Figure 1.
- the system 600 may also include one or more mobile core partners 602 (e.g., a mobile core vendor) in communication with the mobile network service 104.
- the mobile core partner 602 is an internal or a first party service provided by the cloud computing system 102.
- the mobile network service 104 may communicate with the mobile core partners 602 through a secure interface, such as, a mobile core partner API.
- the mobile network service 104 may mange the SIM cards 20 (Fig. 1) and the SIM profile 26 (Fig. 1) information for the private mobile network 10 as discussed above in Figures 1 and 2.
- the mobile network service 104 may transmit the SIM operation details 24 to the mobile core partner 602 using the mobile core partner API.
- the mobile core partner 602 may transmit the SIM operation details 24 for the SIM cards 20 of devices accessing the private mobile network 10 to a cloud control plane 604.
- the packet core control plane 606 may allocate computing resources within the cloud computing system 102 for running the private mobile network 10.
- the cloud control plane 604 may communicate with one or more edge devices 608, 614 for use with the private mobile network 10 using control plane operations 612.
- Each edge device 608, 614 may have a packet core control plane 606.
- the packet core control plane 606 includes a subscriber management component 610 that includes the SIM profiles 26 and the SIM operation details 24 of the SIM cards 20 provisioned to operate on the private mobile network 10.
- Each of the subscriber management components 610 may receive the SIM profiles 26 and the SIM operation details 24 for the SIM cards 20 of devices allowed to access the private mobile network 10 from the cloud control plane 604.
- Each of the subscriber management components 610 receive the same copy of the SIM profiles 26 and the SIM operation details 24 from the cloud control plane 604 using the control plane operations 612. As such, each of the subscriber management components 610 in the different edge devices 608, 614 maintains the same reference of the SIM cards 20 that may access the private mobile network 10.
- the environment 700 may include two locations (e.g., building 702 and building 714) where the private mobile network 10 is deployed.
- the buildings 702 and 714 may be warehouses for a company and both warehouses use the same private mobile network 10.
- the buildings 702 and 714 are different stores for an organization and the different stores use the same private mobile network 10.
- the buildings 702 and 714 may be located at different locations in different geographic areas.
- the building 702 is located at a first geographic area and the building 714 is located at a second geographic area.
- the edge device 704 is located at the building 702.
- the edge device 704 may be connected to a vehicle 706.
- the edge device 704 may be a temperature sensor tracking a temperature of food transported by the vehicle 706 from the building 702 to the building 714.
- the edge device 704 may be within the area covered by the private mobile network 10 and may identify with the private mobile network 10 and may connect to the private mobile network 10.
- the edge device 704 uses a subscriber management component (e.g., subscriber management component 510, 610) on the edge device 704 for identifying the edge device 704 with the private mobile network 10 and connecting to the private mobile network 10.
- the edge device 704 uses a view of the SIM profile 26 information and SIM operation details 24 on the edge device 704 from the cloud (e.g., packet core plane 410) for identifying with the private mobile network 10 and connecting to the private mobile network 10.
- the edge device 704 may be located outside of the range of the private mobile network 10. For example, the vehicle 706 is no longer nearby the building 702 and is moving towards the building 714. At the second time, the edge device 704 may handover to the public network 712.
- the public network 712 may be any network that the edge device 704 may be able to access.
- the edge device 704 may be located nearby the range of the private mobile network 10 at the building 714.
- the edge device 704 may automatically identify with the private mobile network 10 inside the range of the private mobile network 10 and may handover from the public network 712 to the private mobile network 10.
- the edge device 704 may move seamlessly between the private mobile network 10 and the public networks 712 as the edge device 704 changes locations. Moreover, the edge device 704 may connect to the same private mobile network 10 at another distinct location in a different geographic area. As such, the edge device 704 may connect to the same private mobile network 10 through multiple locations.
- FIG. 8 illustrated is an example environment 800 for accessing a private mobile network 10 from multiple locations (e.g., Factory 802, Factory 812).
- the factories 802, 812 may be located at different locations in different geographic areas. For example, the factory 802 is in Seattle and the factory 812 is in Chicago.
- IoT devices 806, 808, 810 are located at the factory 802.
- the IoT devices 806, 808, 810 may be sensors used in the factory 802.
- the IoT devices 806, 808, 810 may be connected to the private mobile network 10 that is deployed within the factory 802.
- a second time e.g., Time2
- the IoT device 806 moves to the factory 812.
- the sensor may be repurposed for work in the factory 812.
- the IoT device 806 may identify with the same private mobile network 10 used at the factory 1 802 and connect with the private mobile network 10 at the factory 812.
- the IoT device 806 uses a subscriber management component (e.g., subscriber management component 510, 610) on the IoT device 806 for identifying the IoT device 806 with the private mobile network 10 and connecting to the private mobile network 10.
- the IoT device 806 uses a replica of the SIM profile 26 information and SIM operation details 24 on the IoT device 806 from the cloud for identifying with the private mobile network 10 and connecting to the private mobile network 10.
- the IoT device 806 connects to the same private mobile network 10 as the IoT device 806 moves between different locations (e.g., the factory 802, the factory 812).
- FIG. 9 illustrated is an example method 900 for SIM management for a private mobile network 10 (Fig. 1) using a private mobile network service 104 (Fig. 1) on a cloud computing system 102 (Fig. 1). The actions of method 900 may be discussed below with reference to the architecture of Figure 1.
- Method 900 may include generating Ki and OPc values in the private mobile network service substituting the SIM ceremonies for each users’ private mobile networks.
- the SIM partner 108 may generate the Ki values 28 for each private mobile network 10 of the purchased SIM cards 20.
- the SIM partner 108 may also generate the operator code (OPc) value 30 using the Ki values 28 and the operator code (OP) for each private mobile network 10 of the purchase SIM cards 20.
- the operator code (OP) is allocated to an operator and the value remains fixed for all SIM cards 20 of the operator.
- the OPc value 30 is derived using a combination of the operator code (OP) and the Ki values 28. As such, each SIM card 20 has a unique OPc value 30 to identify the SIM card 20.
- the SIM partners 108 may burn or otherwise identify each SIM card 20 with the corresponding OPc value 30 and Ki value 28. By having a different OPc value 31 and Ki value 28 for the private mobile network 10, if one SIM card 20 is compromised, only that batch of SIM cards 20 in that order are compromised, reducing the impact to the private mobile network 10.
- Method 900 may also include exchanging the Ki and OPc values with a SIM partner through APIs, where the Ki and OPc values may be programmed during manufacturing SIM cards.
- method 900 may include exchanging a transport key with a SIM partner.
- the mobile network service 104 may exchange a transport key 18 with each SIM partner 108 associated with the cloud computing system 102 using a SIM partner API 16.
- the transport key 18 may be an encryption key that is used to encrypt data in transit over the SIM partner API 16.
- the transport key 18 may be used to securely exchange the SIM secret values with the SIM partner 108.
- Each SIM partner 108 has a unique transport key 18.
- the transport key 18 may rotate or change periodically (e.g., every ninety days).
- the mobile network service 104 may securely store the transport keys 18 for each SIM partner 108, for example, in a key vault 40 in a secure datastore 120.
- the SIM partner 108 and the mobile network service 104 may exchange the transport key 18 one time during the onboarding or initiation of the SIM partner 108 with the cloud computing system 102.
- method 900 may include receiving a request from a user to establish a private mobile network provided by the cloud computing system.
- the mobile network service 104 may receive a private network request 14 from a user 106 to develop a private mobile network 10.
- the mobile network service 104 may provide a mobile network portal 12 (e.g., a website) through which the users 106 may create and manage one or more private mobile networks 10.
- One or more graphical user interfaces on the mobile network portal 12 may provide different options for the user 106 to choose from when building the private mobile network 10.
- the one or more graphical user interfaces may allow the user 106 to input different selections for the private mobile network 10.
- the graphical user interfaces may provide the users 106 with a list of SIM partners associated with the cloud computing system 102 that the user 106 may select from when choosing a SIM partner 108 for use with the private mobile network 10.
- the user 106 may select a SIM partner 108 from the list of SIM partners for providing the SIM cards 20 for the private mobile network.
- the user 106 may also provide inputs or selections for a number of SIM cards 20 for use with the private mobile network, a network name, a PLMN to use for the private mobile network, one or more locations or regions for the private mobile network, and/or a selected packet core partner 110 to use with the private mobile network.
- a private network request 14 may be generated based on the different selections and/or inputs provided by the user 106 for the private mobile network 10.
- the private network request 14 may include a request to create a new private mobile network 10.
- the private network request 14 may also include request to manage an existing private mobile network 10 and/or a request to modify an existing private mobile network 10.
- the private network request 14 may also include private network information 12 for the private mobile network 10 (e.g., the information provided by the user 106 using the graphical user interfaces of the mobile network portal 12).
- the private network information 12 may include, but is not limited to, the selected SIM partner 108, a selected packet core partner 110, a number of SIM cards 20 for use with the private mobile network 10, a network name, a PLMN to use (e.g., a PLMN of the user’s choice or the PLMN provided by the SIM partner), one or more locations for the private mobile network 10, and/or user information (e.g., company name, representative name, contact information, address).
- method 900 may include providing a service key for the private mobile network.
- the mobile network service 104 may receive the private network request 14 and may generate a SIM service key 32 for the private mobile network 10.
- the SIM service key 32 may identify each private mobile network 10 in cloud computing system 102.
- the SIM service key 32 is a GUID that creates a unique identifier of the private mobile network 10. If the user 106 is creating a new private mobile network 10, a new SIM service key 32 is generated and provided to the user 106 for the private mobile network 10. If a customer is adding SIM cards 20 to an existing private mobile network 10 and/or removing SIM cards 20 from an existing private mobile network 10, the existing SIM service key 32 for the private mobile network 10 is provided to the user 106.
- the mobile network service 104 may provide the SIM service key 32 to the user 106.
- the user 106 may provide the SIM service key 32 to the selected SIM partner 108 during the purchase of the SIM cards 20 from the SIM partner 108.
- method 900 may include receiving encrypted SIM operation details for the SIM cards for use with the private mobile network.
- the mobile network service 104 may receive the SIM operations details 24 for the purchased SIM cards 20 from the SIM partner 108 via the SIM partner API 16.
- the SIM operations details 24 may include, but are not limited to, the international mobile subscriber identity (IMSI) values for the SIM cards 20, the integrated circuit card identifier (ICCID) values for the SIM cards 20, the Ki values 28 and OPc values 30 for each SIM profile 26, and/or the SIM secret value 30 for each SIM profile 26.
- the SIM partner 108 may encrypt the SIM operations details 24 using the transport key 18 to securely transmit the SIM operations details 24 to the mobile network service 104.
- method 900 may include decrypting the encrypted SIM operation details using the transport key.
- the mobile network service 104 decrypts the received SIM operations details 24 using the transport key 18.
- the mobile network service 104 may perform one or more conflict checks for the SIM operations details 24 to ensure that other networks are not using the same SIM operations details 24. For example, if the mobile network service 104 determines that the IMSI values for the SIM cards 20 overlap with other values already stored in the secure datastore 120, the mobile network service 104 sends a notification to the SIM partner 108 alerting the SIM partner 108 that those IMSI values are already in use. As such, the mobile network service 104 may ensure that the IMSI ranges for the SIM cards 20 using the private mobile network 10 are not already assigned to a different private mobile network 10, and thus, overlapping of the IMSI ranges may be prevented.
- method 900 may include storing the SIM operation details.
- the mobile network service 104 may securely store the SIM operations details 24 for the private mobile network 10 in a secure datastore 120.
- the secure datastore 120 may include a user subscription 44 for each user 106 of the cloud computing system 102.
- the user subscription 44 may include one or more private mobile networks 10 associated with the user 106.
- the user subscription 44 may include the SIM profiles 26 of the SIM cards 20 that may use the private mobile network 10 and the SIM operations details 24 associated with each of the SIM profiles 26.
- the user subscription 44 may also include the mobile core information 42 with details about the mobile cores 114, 118 for each of the private mobile networks 10.
- method 900 may include transmitting the SIM operation details to a packet core partner for use with the private mobile network.
- the mobile network service 104 may communicate the SIM operations details 24 and the private network information 12 to the packet core partner 110.
- the packet core partner 110 is an Evolved Packet Core (EPC) partner.
- EPC Evolved Packet Core
- the mobile network service 104 may populate the HSS pool 36 or the UDM pool 38 at the packet core partner 110 with the SIM operation details 24 for the SIM cards 20 of the devices that may access the private mobile network 10.
- the packet core partner 110 may verify the SIM cards 20 of the devices trying to access the private mobile network 10, with the information stored in the HSS pool 36 or the UDM pool 38.
- method 900 may be used by a private mobile network service 104 on a cloud computing system 102 to manage the SIM information for a private mobile network 10 upon receiving a request to create a private mobile network 10 and/or receiving a request to add more SIM cards 20 to an existing private mobile network 10.
- Figure 10 illustrates certain components that may be included within a computer system 1000.
- One or more computer systems 1000 may be used to implement the various devices, components, and systems described herein.
- the computer system 1000 includes a processor 1001.
- the processor 1001 may be a general-purpose single or multi-chip microprocessor (e.g., an Advanced RISC (Reduced Instruction Set Computer) Machine (ARM)), a special purpose microprocessor (e.g., a digital signal processor (DSP)), a microcontroller, a programmable gate array, etc.
- the processor 1001 may be referred to as a central processing unit (CPU). Although just a single processor 1001 is shown in the computer system 1000 of Figure 10, in an alternative configuration, a combination of processors (e.g., an ARM and DSP) could be used.
- the computer system 1000 also includes memory 1003 in electronic communication with the processor 1001.
- the memory 1003 may be any electronic component capable of storing electronic information.
- the memory 1003 may be embodied as random access memory (RAM), read-only memory (ROM), magnetic disk storage mediums, optical storage mediums, flash memory devices in RAM, on-board memory included with the processor, erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM) memory, registers, and so forth, including combinations thereof.
- Instructions 1005 and data 1007 may be stored in the memory 1003.
- the instructions 1005 may be executable by the processor 1001 to implement some or all of the functionality disclosed herein. Executing the instructions 1005 may involve the use of the data 1007 that is stored in the memory 1003. Any of the various examples of modules and components described herein may be implemented, partially or wholly, as instructions 1005 stored in memory 1003 and executed by the processor 1001. Any of the various examples of data described herein may be among the data 1007 that is stored in memory 1003 and used during execution of the instructions 1005 by the processor 1001.
- a computer system 1000 may also include one or more communication interfaces 1009 for communicating with other electronic devices.
- the communication interface(s) 1009 may be based on wired communication technology, wireless communication technology, or both.
- Some examples of communication interfaces 1009 include a Universal Serial Bus (USB), an Ethernet adapter, a wireless adapter that operates in accordance with an Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless communication protocol, a Bluetooth ® wireless communication adapter, and an infrared (IR) communication port.
- USB Universal Serial Bus
- IEEE Institute of Electrical and Electronics Engineers
- IR infrared
- a computer system 1000 may also include one or more input devices 1011 and one or more output devices 1013.
- input devices 1011 include a keyboard, mouse, microphone, remote control device, button, joystick, trackball, touchpad, and lightpen.
- output devices 1013 include a speaker and a printer.
- One specific type of output device that is typically included in a computer system 1000 is a display device 1015.
- Display devices 1015 used with embodiments disclosed herein may utilize any suitable image projection technology, such as liquid crystal display (LCD), light- emitting diode (LED), gas plasma, electroluminescence, or the like.
- a display controller 1017 may also be provided, for converting data 1007 stored in the memory 1003 into text, graphics, and/or moving images (as appropriate) shown on the display device 1015.
- the various components of the computer system 1000 may be coupled together by one or more buses, which may include a power bus, a control signal bus, a status signal bus, a data bus, etc.
- buses may include a power bus, a control signal bus, a status signal bus, a data bus, etc.
- the various buses are illustrated in Figure 10 as a bus system 1019.
- the techniques described herein may be implemented in hardware, software, firmware, or any combination thereof, unless specifically described as being implemented in a specific manner. Any features described as modules, components, or the like may also be implemented together in an integrated logic device or separately as discrete but interoperable logic devices. If implemented in software, the techniques may be realized at least in part by a non-transitory processor-readable storage medium comprising instructions that, when executed by at least one processor, perform one or more of the methods described herein. The instructions may be organized into routines, programs, objects, components, data structures, etc., which may perform particular tasks and/or implement particular data types, and which may be combined or distributed as desired in various embodiments.
- Computer-readable mediums may be any available media that can be accessed by a general purpose or special purpose computer system.
- Computer-readable mediums that store computer-executable instructions are non-transitory computer-readable storage media (devices).
- Computer-readable mediums that carry computer-executable instructions are transmission media.
- embodiments of the disclosure can comprise at least two distinctly different kinds of computer-readable mediums: non-transitory computer-readable storage media (devices) and transmission media.
- non-transitory computer-readable storage mediums may include RAM, ROM, EEPROM, CD-ROM, solid state drives (“SSDs”) (e.g., based on RAM), Flash memory, phase-change memory (“PCM”), other types of memory, other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer- executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
- SSDs solid state drives
- PCM phase-change memory
- determining encompasses a wide variety of actions and, therefore, “determining” can include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like. Also, “determining” can include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like. Also, “determining” can include resolving, selecting, choosing, establishing and the like.
- Numbers, percentages, ratios, or other values stated herein are intended to include that value, and also other values that are “about” or “approximately” the stated value, as would be appreciated by one of ordinary skill in the art encompassed by implementations of the present disclosure.
- a stated value should therefore be interpreted broadly enough to encompass values that are at least close enough to the stated value to perform a desired function or achieve a desired result.
- the stated values include at least the variation to be expected in a suitable manufacturing or production process, and may include values that are within 5%, within 1%, within 0.1%, or within 0.01% of a stated value.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente divulgation concerne des dispositifs, des procédés, et des systèmes de gestion de module d'identification d'abonné (SIM) pour un réseau mobile privé. Les procédés et les systèmes peuvent comprendre un service de réseau mobile privé sur un système informatique en nuage. Les utilisateurs du système informatique en nuage peuvent utiliser le service de réseau mobile privé pour créer un réseau mobile privé. Le service de réseau mobile privé peut faciliter la création du réseau mobile privé en fournissant des interfaces pour des communications sécurisées avec les utilisateurs du système informatique en nuage, les partenaires de service SIM, et les partenaires centraux de paquets. Le service de réseau mobile peut également gérer les cartes SIM pour les réseaux mobiles privés en coordonnant la transmission des détails d'opération SIM pour les cartes SIM.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163154648P | 2021-02-26 | 2021-02-26 | |
US17/357,772 US11785468B2 (en) | 2021-02-26 | 2021-06-24 | Subscriber identification module (SIM) management for cloud-based private mobile networks |
PCT/US2022/016896 WO2022182577A1 (fr) | 2021-02-26 | 2022-02-18 | Gestion de module d'identification d'abonné (sim) pour des réseaux mobiles privés en nuage |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4298816A1 true EP4298816A1 (fr) | 2024-01-03 |
Family
ID=80682944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP22708672.5A Pending EP4298816A1 (fr) | 2021-02-26 | 2022-02-18 | Gestion de module d'identification d'abonné (sim) pour des réseaux mobiles privés en nuage |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP4298816A1 (fr) |
WO (1) | WO2022182577A1 (fr) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2486461B (en) * | 2010-12-15 | 2015-07-29 | Vodafone Ip Licensing Ltd | Key derivation |
WO2019179925A1 (fr) * | 2018-03-22 | 2019-09-26 | British Telecommunications Public Limited Company | Authentification de réseau de communication sans fil |
US11166163B2 (en) * | 2018-06-08 | 2021-11-02 | Evolving Systems, Inc. | Secure re-use of SIM security parameters |
US20210058784A1 (en) * | 2019-11-08 | 2021-02-25 | Intel Corporation | User equipment onboarding based on default manufacturer credentials unlicensed |
-
2022
- 2022-02-18 WO PCT/US2022/016896 patent/WO2022182577A1/fr active Application Filing
- 2022-02-18 EP EP22708672.5A patent/EP4298816A1/fr active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2022182577A1 (fr) | 2022-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11451950B2 (en) | Indirect registration method and apparatus | |
US10516540B2 (en) | Management of profiles in an embedded universal integrated circuit card (eUICC) | |
US11546755B2 (en) | Centralized configurator server for DPP provisioning of enrollees in a network | |
US10142917B2 (en) | Electronic subscriber identity module (eSIM) assignment for carrier channel devices | |
CN102342140B (zh) | 安全远程订制管理 | |
US10826945B1 (en) | Apparatuses, methods and systems of network connectivity management for secure access | |
US9253636B2 (en) | Wireless roaming and authentication | |
EP2487863B1 (fr) | Activation d'accès sécurisé à une infrastructure de réseau de capteur à l'aide de plusieurs interfaces et sélection clé de groupe basée sur l'application | |
JP2023513501A (ja) | 鍵取得方法および装置 | |
US11777935B2 (en) | Extending secondary authentication for fast roaming between service provider and enterprise network | |
CN104041098A (zh) | 用于ieee 802.11网络的sta和接入点之间的加速的链路设置的方法和装置 | |
US20230370841A1 (en) | Delivering standalone non-public network (snpn) credentials from an enterprise authentication server to a user equipment over extensible authentication protocol (eap) | |
US11785468B2 (en) | Subscriber identification module (SIM) management for cloud-based private mobile networks | |
CN111182546B (zh) | 接入无线网络的方法、设备及系统 | |
US20230354013A1 (en) | Secure communication method and device | |
US11337075B2 (en) | Providing multiple server security certificates on SIMs of electronic devices | |
WO2021227866A1 (fr) | Procédé et appareil d'authentification de réseau, et système | |
WO2021063298A1 (fr) | Procédé de mise en œuvre d'authentification, dispositif de communication, et système de communication | |
WO2022222745A1 (fr) | Procédé et appareil de communication | |
US11343244B2 (en) | Method and apparatus for multi-factor verification of a computing device location within a preset geographic area | |
US20120210399A1 (en) | Location-enabled access control lists for real-world devices | |
WO2017101211A1 (fr) | Procédé et appareil pour accéder à un système de communication sans fil, et terminal | |
CN115412911A (zh) | 一种鉴权方法、通信装置和系统 | |
US20230300716A1 (en) | Communication method and communication apparatus | |
EP4298816A1 (fr) | Gestion de module d'identification d'abonné (sim) pour des réseaux mobiles privés en nuage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230725 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |