US20180212962A1 - Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network - Google Patents
Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network Download PDFInfo
- Publication number
- US20180212962A1 US20180212962A1 US15/747,558 US201615747558A US2018212962A1 US 20180212962 A1 US20180212962 A1 US 20180212962A1 US 201615747558 A US201615747558 A US 201615747558A US 2018212962 A1 US2018212962 A1 US 2018212962A1
- Authority
- US
- United States
- Prior art keywords
- wtru
- token
- network
- application
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 54
- 238000004891 communication Methods 0.000 claims description 51
- 238000012545 processing Methods 0.000 claims description 16
- 238000013459 approach Methods 0.000 abstract description 12
- 238000013507 mapping Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 16
- 238000005516 engineering process Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 9
- 238000009795 derivation Methods 0.000 description 7
- 230000027455 binding Effects 0.000 description 6
- 238000009739 binding Methods 0.000 description 6
- 230000003068 static effect Effects 0.000 description 5
- 241000760358 Enodes Species 0.000 description 4
- 238000001914 filtration Methods 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 3
- 239000003795 chemical substances by application Substances 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 229910001416 lithium ion Inorganic materials 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- QELJHCBNGDEXLD-UHFFFAOYSA-N nickel zinc Chemical compound [Ni].[Zn] QELJHCBNGDEXLD-UHFFFAOYSA-N 0.000 description 2
- HBBGRARXTFLTSG-UHFFFAOYSA-N Lithium ion Chemical compound [Li+] HBBGRARXTFLTSG-UHFFFAOYSA-N 0.000 description 1
- 241000700159 Rattus Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000004873 anchoring Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- OJIJEKBXJYRIBZ-UHFFFAOYSA-N cadmium nickel Chemical compound [Ni].[Cd] OJIJEKBXJYRIBZ-UHFFFAOYSA-N 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 229910052987 metal hydride Inorganic materials 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- -1 nickel metal hydride Chemical class 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
Definitions
- a token may be generated in an operator-managed MEP, such that the token may support association of a mobile network identity of a wireless transmit/receive unit (WTRU) and an external network identity of an external network.
- the MEP may support setting packet filters based on the token for the purpose of routing traffic associated with an external network user, such as an enterprise user, to the external network.
- the token may be negotiated on a per-session basis or on a per-WTRU-identity (WTRU-ID) basis.
- an enterprise bring your own device (BYOD) client (EBC) application may establish a secure link with an enterprise BYOD agent (EBA) application running on the MEP in the small cell network using an initial connection procedure.
- the EBC application may initiate an application-level authentication procedure with an evolved packet core (EPC) network.
- the EBC application may generate and provide a token to the EBA application via the established secure link.
- FIG. 1A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented
- FIG. 1B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated in FIG. 1A ;
- WTRU wireless transmit/receive unit
- FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1A ;
- FIG. 2 shows a system diagram of an example system architecture including a mobile edge platform (MEP) and an external network (e.g., an enterprise network);
- MEP mobile edge platform
- external network e.g., an enterprise network
- FIG. 3 shows a mapping diagram of an example ideal token mapping
- FIG. 4 shows a mapping diagram of an example token mapping
- FIG. 5 shows a flow diagram of an example token generation and assignment procedure
- FIG. 6 shows a flow diagram of another example token generation and assignment procedure.
- FIG. 1A is a diagram of an example communications system 100 in which one or more disclosed embodiments may be implemented.
- the communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users.
- the communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth.
- the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single-carrier FDMA
- the communications system 100 may include wireless transmit/receive units (WTRUs) 102 a, 102 b, 102 c, 102 d, a radio access network (RAN) 104 , a core network 106 , a public switched telephone network (PSTN) 108 , the Internet 110 , and other networks 112 , though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements.
- Each of the WTRUs 102 a, 102 b, 102 c, 102 d may be any type of device configured to operate and/or communicate in a wireless environment.
- the WTRUs 102 a, 102 b, 102 c, 102 d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a tablet, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.
- UE user equipment
- PDA personal digital assistant
- the communications systems 100 may also include a base station 114 a and a base station 114 b.
- Each of the base stations 114 a, 114 b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102 a, 102 b, 102 c, 102 d to facilitate access to one or more communication networks, such as the core network 106 , the Internet 110 , and/or the other networks 112 .
- the base stations 114 a , 114 b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a small cell, a wireless router, and the like. While the base stations 114 a, 114 b are each depicted as a single element, it will be appreciated that the base stations 114 a , 114 b may include any number of interconnected base stations and/or network elements.
- BTS base transceiver station
- AP access point
- the base station 114 a may be part of the RAN 104 , which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc.
- BSC base station controller
- RNC radio network controller
- the base station 114 a and/or the base station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown).
- the cell may be further divided into cell sectors.
- the cell associated with the base station 114 a may be divided into three sectors.
- the base station 114 a may include three transceivers, i.e., one for each sector of the cell.
- the base station 114 a may employ multiple-input multiple-output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
- MIMO multiple-input multiple-output
- the base stations 114 a, 114 b may communicate with one or more of the WTRUs 102 a, 102 b, 102 c, 102 d over an air interface 116 , which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.).
- the air interface 116 may be established using any suitable radio access technology (RAT).
- RAT radio access technology
- the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like.
- the base station 114 a in the RAN 104 and the WTRUs 102 a, 102 b, 102 c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 116 using wideband CDMA (WCDMA).
- WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+).
- HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
- the base station 114 a and the WTRUs 102 a, 102 b, 102 c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 116 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A).
- E-UTRA Evolved UMTS Terrestrial Radio Access
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- the base station 114 a and the WTRUs 102 a, 102 b, 102 c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1X, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
- IEEE 802.16 i.e., Worldwide Interoperability for Microwave Access (WiMAX)
- CDMA2000, CDMA2000 1X, CDMA2000 EV-DO Code Division Multiple Access 2000
- IS-95 Interim Standard 95
- IS-856 Interim Standard 856
- GSM Global System for Mobile communications
- GSM Global System for Mobile communications
- EDGE Enhanced Data rates for GSM Evolution
- GERAN GSM EDGERAN
- the base station 114 b in FIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like.
- the base station 114 b and the WTRUs 102 c, 102 d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN).
- the base station 114 b and the WTRUs 102 c, 102 d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN).
- WPAN wireless personal area network
- the base station 114 b and the WTRUs 102 c, 102 d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell.
- a cellular-based RAT e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.
- the base station 114 b may have a direct connection to the Internet 110 .
- the base station 114 b may not be required to access the Internet 110 via the core network 106 .
- the RAN 104 may be in communication with the core network 106 , which may be any type of network configured to provide voice, data, applications, and/or voice over Internet protocol (VoIP) services to one or more of the WTRUs 102 a, 102 b, 102 c, 102 d.
- the core network 106 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication.
- the RAN 104 and/or the core network 106 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 104 or a different RAT.
- the core network 106 may also be in communication with another RAN (not shown) employing a GSM radio technology.
- the core network 106 may also serve as a gateway for the WTRUs 102 a, 102 b, 102 c, 102 d to access the PSTN 108 , the Internet 110 , and/or other networks 112 .
- the PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS).
- POTS plain old telephone service
- the Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the Internet protocol (IP) in the TCP/IP Internet protocol suite.
- the networks 112 may include wired or wireless communications networks owned and/or operated by other service providers.
- the networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 104 or a different RAT.
- the WTRUs 102 a, 102 b, 102 c, 102 d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102 a, 102 b, 102 c, 102 d may include multiple transceivers for communicating with different wireless networks over different wireless links.
- the WTRU 102 c shown in FIG. 1A may be configured to communicate with the base station 114 a, which may employ a cellular-based radio technology, and with the base station 114 b, which may employ an IEEE 802 radio technology.
- FIG. 1B is a system diagram of an example WTRU 102 .
- the WTRU 102 may include a processor 118 , a transceiver 120 , a transmit/receive element 122 , a speaker/microphone 124 , a keypad 126 , a display/touchpad 128 , non-removable memory 130 , removable memory 132 , a power source 134 , a global positioning system (GPS) chipset 136 , and other peripherals 138 .
- GPS global positioning system
- the processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like.
- the processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment.
- the processor 118 may be coupled to the transceiver 120 , which may be coupled to the transmit/receive element 122 . While FIG. 1B depicts the processor 118 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.
- the transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114 a ) over the air interface 116 .
- a base station e.g., the base station 114 a
- the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals.
- the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example.
- the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
- the WTRU 102 may include any number of transmit/receive elements 122 . More specifically, the WTRU 102 may employ MIMO technology. Thus, in one embodiment, the WTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 116 .
- the transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122 .
- the WTRU 102 may have multi-mode capabilities.
- the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
- the processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit).
- the processor 118 may also output user data to the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 .
- the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132 .
- the non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device.
- the removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like.
- SIM subscriber identity module
- SD secure digital
- the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102 , such as on a server or a home computer (not shown).
- the processor 118 may receive power from the power source 134 , and may be configured to distribute and/or control the power to the other components in the WTRU 102 .
- the power source 134 may be any suitable device for powering the WTRU 102 .
- the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
- the processor 118 may also be coupled to the GPS chipset 136 , which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102 .
- location information e.g., longitude and latitude
- the WTRU 102 may receive location information over the air interface 116 from a base station (e.g., base stations 114 a, 114 b ) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
- the processor 118 may further be coupled to other peripherals 138 , which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity.
- the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
- the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game
- FIG. 1C is a system diagram of the RAN 104 and the core network 106 according to an embodiment.
- the RAN 104 may employ an E-UTRA radio technology to communicate with the WTRUs 102 a , 102 b, 102 c over the air interface 116 .
- the RAN 104 may also be in communication with the core network 106 .
- the RAN 104 may include eNode-Bs 140 a, 140 b, 140 c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment.
- the eNode-Bs 140 a, 140 b , 140 c may each include one or more transceivers for communicating with the WTRUs 102 a, 102 b, 102 c over the air interface 116 .
- the eNode-Bs 140 a, 140 b, 140 c may implement MIMO technology.
- the eNode-B 140 a for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102 a.
- Each of the eNode-Bs 140 a, 140 b, 140 c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. 1C , the eNode-Bs 140 a, 140 b , 140 c may communicate with one another over an X 2 interface.
- the core network 106 shown in FIG. 1C may include a mobility management entity gateway (MME) 142 , a serving gateway 144 , and a packet data network (PDN) gateway 146 . While each of the foregoing elements are depicted as part of the core network 106 , it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
- MME mobility management entity gateway
- PDN packet data network
- the MME 142 may be connected to each of the eNode-Bs 140 a , 140 b, 140 c in the RAN 104 via an S 1 interface and may serve as a control node.
- the MME 142 may be responsible for authenticating users of the WTRUs 102 a, 102 b, 102 c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102 a, 102 b , 102 c, and the like.
- an HSS 150 may be used to authenticate a user subscription. Once a user subscription is authenticated, the MME 142 may continue to provide for security functions, for example during a session.
- a user may be authenticated by a higher layer function such as an Authentication, Authorization and Accounting (AAA) server (not shown), which may communicate with the HSS 150 .
- AAA Authentication, Authorization and Accounting
- the MME 142 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
- the serving gateway 144 may be connected to each of the eNode Bs 140 a, 140 b, 140 c in the RAN 104 via the S 1 interface.
- the serving gateway 144 may generally route and forward user data packets to/from the WTRUs 102 a, 102 b, 102 c.
- the serving gateway 144 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102 a, 102 b, 102 c , managing and storing contexts of the WTRUs 102 a, 102 b, 102 c, and the like.
- the serving gateway 144 may also be connected to the PDN gateway 146 , which may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a, 102 b, 102 c and IP-enabled devices.
- the PDN gateway 146 may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a, 102 b, 102 c and IP-enabled devices.
- the core network 106 may facilitate communications with other networks.
- the core network 106 may provide the WTRUs 102 a , 102 b, 102 c with access to circuit-switched networks, such as the PSTN 108 , to facilitate communications between the WTRUs 102 a, 102 b, 102 c and traditional land-line communications devices.
- the core network 106 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 106 and the PSTN 108 .
- the core network 106 may provide the WTRUs 102 a, 102 b, 102 c with access to the networks 112 , which may include other wired or wireless networks that are owned and/or operated by other service providers.
- IMS IP multimedia subsystem
- a token may be generated in an operator-managed MEP, such that the token may support association of a mobile network identity and an external network identity.
- the MEP may support setting packet filters based on the token for the purpose of routing traffic associated with an external network user, such as an enterprise user, to/from the external network.
- the token may be negotiated on a per-session basis or on a per-WTRU identity (WTRU-ID) basis.
- a mobile edge platform such as the MEC platform, may support the use of a token through which an external application may register with the MEC platform.
- the token may be designed such that the MEC platform is able to associate a set of Internet Protocol (IP) flows (e.g., IP five-tuples) with the token.
- IP Internet Protocol
- the application running on the MEC platform may be able to set filters in the MEC platform to route traffic associated with the token directly to/from an external network.
- a mobile edge platform and/or MEC platform may be used interchangeably, where the MEC platform may be an example of a mobile edge platform.
- the examples described herein may apply to any mobile edge platform, and is not limited to a MEC platform.
- a token may be used to support unified communications.
- an individual may walk into his office (e.g., within an enterprise/business/company setting) with a mobile device (e.g., an Android smartphone).
- the office may have deployed a small cell network (including one or more small cells) with a mobile edge MEC platform located in an enterprise small cell concentrator.
- On the MEC platform there may be an enterprise bring your own device (BYOD) agent (EBA) MEC application.
- BYOD agent (EBA) MEC application On the MEC platform, there may be an enterprise bring your own device (BYOD) agent (EBA) MEC application.
- BYOD enterprise bring your own device
- the individual's mobile device may camp on one of the small cells deployed in the office.
- An enterprise BYOD client (EBC) on the individual's mobile device may detect that it is camped on the enterprise (small cell) network.
- the EBA application may be referred to interchangeably as a client agent application
- the EBC may be referred
- the EBC on the mobile device may initiate discovery and may connect to the EBA on the MEC platform.
- a token e.g., a master connectivity token
- the master connectivity token may be used to generate a per-session (or session) token to be used to facilitate traffic filtering as application level sessions are established on the individual's device.
- the EBA may set a filter in the mobile edge (MEC) platform to forward some or all traffic associated with the master connectivity token to the EBA and/or to the enterprise network based on the policy criteria associated with the application-derived session token.
- the EBA and/or the enterprise network may have the capability to distinguish between enterprise and external traffic and route that traffic accordingly.
- forwarded traffic may go to an enterprise-internal traffic forwarding unit, which may have the ability to distinguish between enterprise communications and external (to the enterprise) network traffic.
- the enterprise communications may be passed on to a firewall and external communications may be forwarded out to the Internet, for example.
- EBA enterprise network
- EBC enterprise network
- the example procedures and/or approaches described herein may be directed to several aspects of the interfacing of mobile edge (MEC) platform(s) and external network(s) using a token.
- MEC mobile edge
- methods and systems may be used for establishing, by the EBA and/or EBC, an initial connection, and/or negotiating and agreeing on the token.
- the token may be associated with a user identity and/or with each specific application session associated with the user. The case where the token association is with each specific application, the session may be more fine-grained and/or dynamic than association with only a user identity.
- systems and methods may address how the enterprise network deals with the received traffic that is forwarded from the MEC platform. Example aspects of the EBA and EBC are described further below.
- FIG. 2 shows a system diagram of an example system architecture 200 including a mobile edge platform (MEP) 204 and an external network 216 (e.g., an enterprise network).
- the example system architecture 200 may include, but is not limited to include, any of the following devices, entities and/or components: a public Internet 202 , which may be IP-based; at least one small cell network 224 , which may include a MEP 204 , and/or an EBA 208 ; a WTRU 212 , which may include an EBC 214 ; an external network 216 , which may include a traffic filter 218 , a firewall 220 , and/or a directory service 222 ; and/or an enhanced evolved packet core (EPC) network 210 (e.g., the mobile operator's EPC network).
- the mobile edge platform 204 may include, but is not limited to include, a traffic offload function (TOF) 206 .
- TOF traffic offload function
- a user device may include a mobile WTRU 212 and an EBC 214 .
- the EBC 214 may run on the WTRU 212 as an application in the application layer and/or in an operating system, for example.
- a small cell network 224 may include the MEP 204 and the EBA 208 .
- the EBA 208 may be an application running in the small cell network 224 , and the EBA 208 may take advantage of some services that are offered by the MEP 204 , such as the TOF 206 .
- the MEP 204 may provide many other services to applications running on user devices in addition to those shown in FIG. 2 .
- an external (enterprise) network 216 may include, but is not limited to include, any of the following entities and/or services: a user identity management system such as the directory service 222 ; a firewall 220 ; and/or a pre-firewall traffic filter 218 . Other entities, not shown, may be part of the external network 216 .
- the EPC 210 may be a standard EPC and may support some enhanced interfaces, as described herein.
- the public IP-based Internet 202 may enable the traffic source and/or destination and/or may provide a route-through path for traffic.
- Interfaces in system architecture 200 may include, but are not limited to include, any of the following interfaces: a secure interface 230 between the EBA 208 and the directory service 222 ; traffic interface 232 between the MEP 204 and the external network 216 ; token mapping interface 234 between the EPC 210 and the MEP 204 ; and/or an application programming interface (API) 236 (e.g., ETSI MEC-defined API) between EBA 208 and MEP 204 .
- API application programming interface
- the EBC 214 running in the WTRU 212 may need to establish the initial connection 240 with the EBA 208 .
- the WTRU 212 may be in the vicinity of one or more small cell networks and/or external networks.
- the EBC 214 may use approaches to recognize if it is camped on a small cell network 224 associated with a specific (e.g., desired) external network 216 . This may be accomplished by providing the EBC 214 with a list of evolved Node B (eNB) identifiers (IDs) associated with the small cell network 224 . The provisioning of the list of eNB IDs may be done, for example, using a policy exchange (not shown) run by the external network 216 .
- eNB evolved Node B
- the EBC 214 may subscribe to notifications of eNB ID(s) with the WTRU 212 so that the EBC 214 may be informed of the eNB ID(s) whenever the WTRU 212 camps on a small cell network (e.g., small cell network 224 ).
- the EBC 214 may check the eNB ID(s) against an existing list of eNB IDs, where the existing list of eNB IDs may be pre-programmed in the EBC 214 , for example.
- the EBC 214 may provide the WTRU 212 with a list of eNB IDs of interest so that the EBC 214 is only notified when the WTRU 212 is camped on one of the eNBs in the list of eNBs IDs of interest.
- the EBC 214 may use intermittent polling in addition to or instead of a notification service. If the small cell network 224 and/or the operator (not shown) offers a zonal presence service, the EBC 214 may subscribe to the zonal presence service.
- the EBC 214 may establish an initial communication session with the EBA 208 .
- the EBA 208 may provide one or more known static IP addresses, which may be known by the EBC 214 , to the MEP 204 .
- these known static IP addresses may be pre-programmed in the EBA 208 and/or EBC 214 by the external network 216 via a policy and configuration mechanism.
- the EBC 214 may select one of the known static IP addresses and use it to initiate an authentication session with the EBA 208 .
- the authentication process may employ any authentication techniques, such as a variety of extensible authentication protocol (EAP) methods or federated authentication methods such as Open Identity (OpenID) (e.g., OpenID 2.0 or OpenID Connect) or OpenID generic bootstrap architecture (OpenID-GBA).
- EAP extensible authentication protocol
- federated authentication methods such as Open Identity (OpenID) (e.g., OpenID 2.0 or OpenID Connect) or OpenID generic bootstrap architecture (OpenID-GBA).
- OpenID Open Identity
- OpenID-GBA OpenID generic bootstrap architecture
- a set of security credentials may be employed by the EBC 214 and EBA 208 to communicate securely.
- an IP address may be assigned at the EBA 208 , such that the IP address may be known only to the EBC 214 and may be used only by the EBC 214 for secure communications.
- a communication session may be established between the EBC 214 and the EBA 208 via the public Internet 202 .
- the EBA 208 may expose public IP addresses to the Internet 202 , and the EBC 214 may access the exposed public IP addresses to establish the initial communication 240 and authentication between the EBA 208 and the EBC 214 .
- the EBA 208 may continue to use the same public IP address or another IP address (e.g., a static IP address or an IP address established via a Dynamic Host Configuration Protocol (DHCP)) may be used by the EBA 208 .
- DHCP Dynamic Host Configuration Protocol
- Establishing a communication session between the EBC 214 and the EBA 208 via the Internet 202 may create a communication path that is unnecessarily long because the connection between the EBA 208 and EBC 214 may pass through the EPC 210 and the Internet 202 even if the EBA 208 and EBC 214 are relatively close together.
- establishing a communication session between the EBC 214 and the EBA 208 via the Internet 202 may expose an IP address to the Internet 202 , which may expose the EBA 208 to certain security risks including a denial of service (DOS) attack, for example.
- DOS denial of service
- the public Internet 202 may be avoided by leveraging the MEP 204 and/or the TOF 206 service.
- the EBA 208 may provide a set of IP addresses to the MEP 204 . These IP addresses may be static and may be pre-programmed into the EBC 214 or an IP address may be generated dynamically on demand using such protocols as DHCP.
- the IP address(es) may or may not be public (e.g., an IP address may come from a private space and therefore not be public or exposed outside of the EBA 208 ).
- the EBA 208 may configure the TOF 206 to forward traffic for the IP address(es) to the EBA 208 .
- all initial communication 240 between the EBC 214 and the EBA 208 may be configured to go directly through the MEP 204 .
- the EBA 208 may perform, but is not limited to perform, any of the following functions: provision a new, temporary private IP address for the EBC 214 ; communicate the new, temporary private IP address to the EBC 214 ; and/or configure the TOF 206 to route traffic between the EBA 208 and the EBC 214 .
- an IP address may be dynamically assigned during the period when the WTRU 212 attempts to camp on the small cell network 224 (e.g., using DHCP to assign an IP address).
- the entities and/or devices referred to hereinafter in the description of example procedures and approaches may be included in a system architecture such as the example system architecture 200 of FIG. 2 . Moreover, the entities and/or devices referred to hereinafter in the description of example procedures and approaches may communicate (or equivalently pass, provide, send/receive, and/or transmit/receive) over interfaces, such as the interfaces shown in the example system architecture 200 of FIG. 2 .
- FIG. 3 shows a mapping diagram of an example ideal token mapping 300 .
- an enterprise is assumed as an example of an external network.
- the enterprise identity 302 is directly mapped to a mobile IP 5-tuple 304 .
- this ideal token mapping 300 may not be feasible because it may not be possible to associate IP 5-tuples inside a mobile network with an external identity of a user.
- FIG. 4 shows a mapping diagram of an example token mapping 400 , which may be more feasible than the token mapping 300 of FIG. 3 .
- a mobile identity 406 may be used as an intermediary in mapping the enterprise identity 402 to the mobile IP 5-tuple 404 .
- a mobile network and in particular the MEP, may more easily associate mobile IP 5-tuples 404 with a mobile identity 406 .
- the example token mapping 400 may use an interface into the MME.
- Example approaches may be used to associate the mobile identity 406 and the external network (enterprise) identity 402 , as described below.
- a direct association may be made between an external network identity and a mobile identity.
- a Mobile Station International Subscriber Directory Number (MSISDN) (i.e., the mobile phone number)
- the EBA may be pre-programmed with the mapping between the MSISDN/mobile phone number and the mobile user identity.
- the MSISDN/mobile phone number may be used when the external network belongs to an enterprise.
- the MEP may provide a service that allows an application (e.g., the EBA) to be notified of a particular MSISDN/mobile phone number camped on the small cell network, and/or some or all of the MSISDNs/mobile phone numbers camped on the small cell network.
- the EBA may then request that the MEP re-route traffic associated with the MSISDN/mobile phone number.
- the use of the MSISDN/mobile phone number as an identifier may not be sufficient.
- a stronger association such as an International Mobile Subscriber Identity (IMSI)-based or Temporary Mobile Subscriber Identity (TMSI)-based association, may be used or needed.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- a token may be used to provide for the identity binding by enabling a receiving party to present the token to a requesting party to indirectly reference an identity known by the requesting party without revealing the identity to the receiving party.
- the token may be generated in a variety of ways including for example: a randomized string bound to or derived from an identifier, such as an IMSI; and/or the result of an authentication procedure.
- FIG. 5 shows a flow diagram of an example token generation and assignment procedure 500 .
- the EPC 506 may have the capability to generate a token for a WTRU 502 and pass it to both the MEP 508 and the WTRU 502 ; and the WTRU 502 may have the capability to provide the token to an application (e.g., the EBC 504 ).
- an application e.g., the EBC 504
- WTRU 502 may camp on a cell covered by an MEP platform 508 .
- An EBA-EBC connection procedure may be initiated, at 511 , between the EBA 510 and EBC 504 that may trigger the generation of a token.
- the EBA 510 may initiate the trigger for an authentication procedure 503 between the EBC 504 and the EPC 506 (e.g., using OpenID-GBA as defined by the 3GPP).
- the identifier used to initiate the authentication 501 may be based on the IMSI or TMSI of the WTRU 502 or the WTRU ID or an EBC identifier associated with the WTRU 502 , for example.
- the EPC 506 may generate a token.
- the EPC 506 may provide the token, and/or the identity mapping, to the MEP 508 over an EPC-MEP interface.
- an interface may be put in place for the MEP 508 to request the identity mapping once it is provided with a token (e.g., by the EBA 510 ).
- the EPC 506 may provide the token to the WTRU 502 over an EPC-WTRU interface.
- the EBC 504 e.g., an application running on the WTRU 502 or elsewhere
- the EBC 504 may obtain the token from the WTRU 502 via a provided interface.
- the EBC 504 may pass or provide the token to the EBA 510 .
- the EPC 506 may sign the token to protect it from tampering or it may be transported using a secure EBC-EBA channel, which may be established during an initial EBC-EBA connection procedure.
- the EBA 510 may register the token with the MEP 508 .
- the EBA 510 may establish service with the EBC 504 .
- example token generation and assignment procedure 500 may provide a secure means of communicating the token
- the implementation may involve the following interfaces for passing the token: an EPC-MEP interface; an EPC-WTRU interface; and/or a WTRU-local application (e.g., EBC) interface.
- EPC-MEP interface an EPC-MEP interface
- EPC-WTRU interface an EPC-WTRU interface
- WTRU-local application e.g., EBC
- EBC EBC interface
- the Open Identity (OpenID 2.0 or OpenID Connect) protocol with the generic bootstrap architecture (GBA) protocol may be suitable to specify these interfaces.
- FIG. 6 shows a flow diagram of another example token generation and assignment procedure 600 .
- the EPC 606 may have the capability to pass a token to the MEP platform 608 (e.g., a MEC platform); the EPC 606 may support extensible authentication protocol (EAP)—subscriber identity module (SIM) (EAP-SIM) authentication, and/or EAP—authentication and key agreement (AKA) (EPA-AKA) authentication and/or EAP—authentication and key agreement′ (AKA′) (EPA-AKA′) authentication (e.g., EAP-SIM, EAP-AKA and EAP-AKA′ supported in Hotspot (HS) 2.0); and/or the Universal Integrated Circuit Card (UICC) design may support APIs to support the 3GPP defined generic bootstrapping architecture (GBA) architecture.
- GBA generic bootstrapping architecture
- the WTRU 602 may camp on an MEP 608 -covered cell.
- establishment of an EBC-EBA connection link may be initiated.
- the EBA 610 may initiate the trigger for an authentication procedure 615 between the EBC 604 and the EPC 606 (e.g., using OpenID-GBA as defined by the 3GPP).
- the identifier used to initiate the authentication procedure 615 may be based on the IMSI or TMSI of the WTRU 602 or the WTRU ID or an EBC identifier associated with the WTRU 602 , for example.
- the EBC 604 and the EPC 606 may generate a token, which may be independently generated or communicated from one party to the other. This may occur, for example, similar to the way a pairwise master key (PMK) is generated once an EAP-AKA authentication is completed in Wi-Fi networks.
- PMK pairwise master key
- the EPC 606 may pass or provide the token to the EBA 610 , for example via an EPC-EBA interface.
- the EPC 606 may pass or provide the token to the MEP platform 608 , for example via an EPC-MEP interface.
- the EBC 604 may pass or provide the token to the MEP 608 .
- the token provides a means for performing identity binding and subsequent establishment of appropriate traffic filters.
- the EBA 620 may register the token with the MEP 608 .
- the EBA 610 and the EBC 604 may establish a service.
- the EPC 606 may use the interface with the MEP 608 to provide to the MEP 608 the token and/or a WTRU identifier and/or a list of IP addresses associated with the WTRU ID of the WTRU 602 .
- the MEP 608 may use the interface with the EPC 606 to provide the token (e.g., the token received by the MEP 608 from the EBA 610 ) to the EPC 606 and have the EPC 606 return to the MEP 608 a WTRU identifier and/or a list of IP addresses associated with the WTRU ID of the WTRU 602 .
- the call flows described in FIG. 5 and FIG. 6 may be performed with the MEP as an end point instead of the EPC since a binding relationship may exist between the EPC and MEP.
- a bootstrapping procedure may be carried out to derive a token, achieving the same objective.
- the token derivation procedures described above may derive a token that binds a user's mobile device identity and an external device identity whenever a user is present within a coverage zone of a particular MEP. This binding may be associated with all of the user's traffic, whereas the external network traffic may only be associated with some, but not all the application sessions that run on a user's device. Forwarding all the user's traffic to the external network may be inefficient and/or may cause the external network to deploy its own traffic filtering at the network entry point. Thus, an enhanced per-session procedure may be used to dynamically allocate tokens on a per-session basis, while continuing to deliver all the privacy of the per-WTRU token approaches discussed above.
- a trust relationship and a binding may be formed between the EPC and the EBC on the WTRU, using for example the approaches or procedures described herein.
- the resulting token which may be referred to as a Master token, may not need to be passed or provided from the EBC to EBA and/or from the EPC to the MEP.
- the EBC may implement an interface (e.g., an API) that may allow authorized (enterprise) applications to request creation of a session token for the MEP, in order to redirect its session traffic to the external network. How the EBC knows that the application is authorized may depend on how the external entity that owns the external network operates.
- the EBC may allow the authorized application to inform the EBC about the traffic filters (e.g., IP 5-tuples) associated with the EBC's session(s).
- the EBC may use the secure interface it has with the EPC to provide the traffic filters to the EPC and a Session token may be derived from the Master token.
- the Master ⁇ Session token derivation procedure may be known and executed by the EPC and EBC so that a mutual derivation of the Session token may be facilitated.
- the EBC may provide the Session token to the EBA.
- the EBA requests the MEP to filter traffic based on this Session token
- the MEP may be able to associate the Session token to a set of known filters, for example by requesting the information from the EPC or based on the EPC having previously provided the EBA with the mapping information.
- a trust relationship may exist between the WTRU and the EPC, and thus may also exist between the WTRU and the MEP by way of association of the MEP with the EPC.
- a trust relationship may exist between the EBC application on the WTRU and the EBA application on the enterprise small cell network.
- An interface may be implemented between the EBC and WTRU and between the EBA and MEP (e.g. APIs) to facilitate steering of application traffic in the enterprise small cell network by way of traffic filters (e.g. IP 5-tuples).
- traffic filters e.g. IP 5-tuples
- the session token may be generated through an authentication between an enterprise application interfacing to the EBC on the WTRU and the EBA in the enterprise network.
- the EBC may use the interface it has with the EPC to derive a Session token from the Master token.
- the Master ⁇ Session token derivation procedure may be known and executed by the EPC and EBC and thus the EBC and EPC can mutually derive the Session token or derive the Session token on one side (i.e. in the EBC or the EPC) and then exchange the Session token through a secure interface between the EBC and EPC.
- the derived Session token may be bound to the specific application session.
- the enterprise application may inform the MEP about the traffic filters (e.g. IP 5-tuples) associated with the session by way of a reference to the Session token that may bind the traffic filter information with the specific application session on the WTRU.
- the traffic filters e.g. IP 5-tuples
- the Master token may be passed to the MEP by the EPC.
- a Session token may be generated through an authentication procedure between an enterprise application interfacing to the EBC on the WTRU and the EBA in the enterprise network.
- the EBA may use the interface it has with the MEP to derive a Session token from the Master token.
- the Master ⁇ Session token derivation procedure may be known and executed by the EBA and the EBC through a bootstrapping procedure with the MEP, which may result in the Session token at each of the EBA and EBC.
- the derived Session token may be bound to the specific application session.
- the enterprise application may inform the MEP about the traffic filters (e.g. IP 5-tuples) associated with the session by way of a reference to the Session token, which may bind the traffic filter information with the specific application session on the WTRU.
- the traffic filters e.g. IP 5-tuples
- the EBA may be able to direct the TOF in the MEP to forward all traffic associated with an external network (e.g., an enterprise network) user identity directly towards the external network.
- an external network e.g., an enterprise network
- not all such traffic may be destined for the external network.
- much of the traffic may be destined for the Internet.
- it may be detrimental to the external network to allow all such traffic, including Internet traffic, to enter the external network and then forward it back out to the Internet.
- a traffic filtering function for example located at the entry point to the external network and before (or after) the firewall, may be used.
- the traffic filtering function may be configured by the external network to distinguish its own internal traffic from all other Internet traffic. In an example, only the internal traffic is forwarded to the firewall, while the Internet traffic is routed directly to the Internet.
- ROM read only memory
- RAM random access memory
- register cache memory
- semiconductor memory devices magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
- a processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application claims the benefit U.S. Provisional Application No. 62/198,902, filed Jul. 30, 2015, the contents of which are hereby incorporated by reference herein.
- A variety of approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (MEP) and an external network. A token may be generated in an operator-managed MEP, such that the token may support association of a mobile network identity of a wireless transmit/receive unit (WTRU) and an external network identity of an external network. The MEP may support setting packet filters based on the token for the purpose of routing traffic associated with an external network user, such as an enterprise user, to the external network. The token may be negotiated on a per-session basis or on a per-WTRU-identity (WTRU-ID) basis. In an example method performed by a WTRU camped on a small cell network covered by the MEP, an enterprise bring your own device (BYOD) client (EBC) application may establish a secure link with an enterprise BYOD agent (EBA) application running on the MEP in the small cell network using an initial connection procedure. The EBC application may initiate an application-level authentication procedure with an evolved packet core (EPC) network. The EBC application may generate and provide a token to the EBA application via the established secure link.
- A more detailed understanding may be had from the following description, given by way of example in conjunction with the accompanying drawings wherein:
-
FIG. 1A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented; -
FIG. 1B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 2 shows a system diagram of an example system architecture including a mobile edge platform (MEP) and an external network (e.g., an enterprise network); -
FIG. 3 shows a mapping diagram of an example ideal token mapping; -
FIG. 4 shows a mapping diagram of an example token mapping; -
FIG. 5 shows a flow diagram of an example token generation and assignment procedure; and -
FIG. 6 shows a flow diagram of another example token generation and assignment procedure. -
FIG. 1A is a diagram of anexample communications system 100 in which one or more disclosed embodiments may be implemented. Thecommunications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users. Thecommunications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth. For example, thecommunications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like. - As shown in
FIG. 1A , thecommunications system 100 may include wireless transmit/receive units (WTRUs) 102 a, 102 b, 102 c, 102 d, a radio access network (RAN) 104, acore network 106, a public switched telephone network (PSTN) 108, the Internet 110, andother networks 112, though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements. Each of theWTRUs - The
communications systems 100 may also include abase station 114 a and abase station 114 b. Each of thebase stations core network 106, the Internet 110, and/or theother networks 112. By way of example, thebase stations base stations base stations - The
base station 114 a may be part of the RAN 104, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. Thebase station 114 a and/or thebase station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may be further divided into cell sectors. For example, the cell associated with thebase station 114 a may be divided into three sectors. Thus, in one embodiment, thebase station 114 a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, thebase station 114 a may employ multiple-input multiple-output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell. - The
base stations WTRUs air interface 116, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). Theair interface 116 may be established using any suitable radio access technology (RAT). - More specifically, as noted above, the
communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, thebase station 114 a in the RAN 104 and the WTRUs 102 a, 102 b, 102 c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish theair interface 116 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA). - In another embodiment, the
base station 114 a and the WTRUs 102 a, 102 b, 102 c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish theair interface 116 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A). - In other embodiments, the
base station 114 a and the WTRUs 102 a, 102 b, 102 c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1X, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like. - The
base station 114 b inFIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like. In one embodiment, thebase station 114 b and the WTRUs 102 c, 102 d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN). In another embodiment, thebase station 114 b and the WTRUs 102 c, 102 d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN). In yet another embodiment, thebase station 114 b and the WTRUs 102 c, 102 d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell. As shown inFIG. 1A , thebase station 114 b may have a direct connection to the Internet 110. Thus, thebase station 114 b may not be required to access the Internet 110 via thecore network 106. - The RAN 104 may be in communication with the
core network 106, which may be any type of network configured to provide voice, data, applications, and/or voice over Internet protocol (VoIP) services to one or more of the WTRUs 102 a, 102 b, 102 c, 102 d. For example, thecore network 106 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown inFIG. 1A , it will be appreciated that the RAN 104 and/or thecore network 106 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 104 or a different RAT. For example, in addition to being connected to theRAN 104, which may be utilizing an E-UTRA radio technology, thecore network 106 may also be in communication with another RAN (not shown) employing a GSM radio technology. - The
core network 106 may also serve as a gateway for theWTRUs PSTN 108, theInternet 110, and/orother networks 112. ThePSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). TheInternet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the Internet protocol (IP) in the TCP/IP Internet protocol suite. Thenetworks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, thenetworks 112 may include another core network connected to one or more RANs, which may employ the same RAT as theRAN 104 or a different RAT. - Some or all of the
WTRUs communications system 100 may include multi-mode capabilities, i.e., theWTRUs WTRU 102 c shown inFIG. 1A may be configured to communicate with thebase station 114 a, which may employ a cellular-based radio technology, and with thebase station 114 b, which may employ an IEEE 802 radio technology. -
FIG. 1B is a system diagram of anexample WTRU 102. As shown inFIG. 1B , theWTRU 102 may include aprocessor 118, atransceiver 120, a transmit/receiveelement 122, a speaker/microphone 124, akeypad 126, a display/touchpad 128,non-removable memory 130,removable memory 132, a power source 134, a global positioning system (GPS)chipset 136, andother peripherals 138. It will be appreciated that theWTRU 102 may include any sub-combination of the foregoing elements while remaining consistent with an embodiment. - The
processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. Theprocessor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables theWTRU 102 to operate in a wireless environment. Theprocessor 118 may be coupled to thetransceiver 120, which may be coupled to the transmit/receiveelement 122. WhileFIG. 1B depicts theprocessor 118 and thetransceiver 120 as separate components, it will be appreciated that theprocessor 118 and thetransceiver 120 may be integrated together in an electronic package or chip. - The transmit/receive
element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., thebase station 114 a) over theair interface 116. For example, in one embodiment, the transmit/receiveelement 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receiveelement 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit/receiveelement 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receiveelement 122 may be configured to transmit and/or receive any combination of wireless signals. - In addition, although the transmit/receive
element 122 is depicted inFIG. 1B as a single element, theWTRU 102 may include any number of transmit/receiveelements 122. More specifically, theWTRU 102 may employ MIMO technology. Thus, in one embodiment, theWTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over theair interface 116. - The
transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receiveelement 122 and to demodulate the signals that are received by the transmit/receiveelement 122. As noted above, theWTRU 102 may have multi-mode capabilities. Thus, thetransceiver 120 may include multiple transceivers for enabling theWTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example. - The
processor 118 of theWTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). Theprocessor 118 may also output user data to the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128. In addition, theprocessor 118 may access information from, and store data in, any type of suitable memory, such as thenon-removable memory 130 and/or theremovable memory 132. Thenon-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. Theremovable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, theprocessor 118 may access information from, and store data in, memory that is not physically located on theWTRU 102, such as on a server or a home computer (not shown). - The
processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in theWTRU 102. The power source 134 may be any suitable device for powering theWTRU 102. For example, the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like. - The
processor 118 may also be coupled to theGPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of theWTRU 102. In addition to, or in lieu of, the information from theGPS chipset 136, theWTRU 102 may receive location information over theair interface 116 from a base station (e.g.,base stations WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment. - The
processor 118 may further be coupled toother peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, theperipherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like. -
FIG. 1C is a system diagram of theRAN 104 and thecore network 106 according to an embodiment. As noted above, theRAN 104 may employ an E-UTRA radio technology to communicate with theWTRUs air interface 116. TheRAN 104 may also be in communication with thecore network 106. - The
RAN 104 may include eNode-Bs RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode-Bs WTRUs air interface 116. In one embodiment, the eNode-Bs B 140 a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, theWTRU 102 a. - Each of the eNode-
Bs FIG. 1C , the eNode-Bs - The
core network 106 shown inFIG. 1C may include a mobility management entity gateway (MME) 142, a servinggateway 144, and a packet data network (PDN)gateway 146. While each of the foregoing elements are depicted as part of thecore network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. - The
MME 142 may be connected to each of the eNode-Bs RAN 104 via an S1 interface and may serve as a control node. For example, theMME 142 may be responsible for authenticating users of theWTRUs WTRUs HSS 150 may be used to authenticate a user subscription. Once a user subscription is authenticated, theMME 142 may continue to provide for security functions, for example during a session. A user may be authenticated by a higher layer function such as an Authentication, Authorization and Accounting (AAA) server (not shown), which may communicate with theHSS 150. TheMME 142 may also provide a control plane function for switching between theRAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA. - The serving
gateway 144 may be connected to each of theeNode Bs RAN 104 via the S1 interface. The servinggateway 144 may generally route and forward user data packets to/from theWTRUs gateway 144 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for theWTRUs WTRUs - The serving
gateway 144 may also be connected to thePDN gateway 146, which may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between theWTRUs - The
core network 106 may facilitate communications with other networks. For example, thecore network 106 may provide the WTRUs 102 a, 102 b, 102 c with access to circuit-switched networks, such as thePSTN 108, to facilitate communications between theWTRUs core network 106 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between thecore network 106 and thePSTN 108. In addition, thecore network 106 may provide the WTRUs 102 a, 102 b, 102 c with access to thenetworks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers. - Approaches may be used for enabling coordinated identity management between an operator-managed mobile edge platform (MEP) and/or a small cell network and an external network. A token may be generated in an operator-managed MEP, such that the token may support association of a mobile network identity and an external network identity. The MEP may support setting packet filters based on the token for the purpose of routing traffic associated with an external network user, such as an enterprise user, to/from the external network. The token may be negotiated on a per-session basis or on a per-WTRU identity (WTRU-ID) basis.
- According to the European Telecommunications Standards Institute (ETSI) Mobile Edge Computing (MEC) Industry Specification Group (ISG) call for a mobile edge platform, a mobile edge platform, such as the MEC platform, may support the use of a token through which an external application may register with the MEC platform. The token may be designed such that the MEC platform is able to associate a set of Internet Protocol (IP) flows (e.g., IP five-tuples) with the token. In this case, the application running on the MEC platform may be able to set filters in the MEC platform to route traffic associated with the token directly to/from an external network. An application of this capability may be illustrated in an example scenario, where a small cell network may be deployed within an enterprise where unified communication concepts are used to enable features such as four-digit extension dialing directly to a user's mobile device. Herein, a mobile edge platform and/or MEC platform may be used interchangeably, where the MEC platform may be an example of a mobile edge platform. The examples described herein may apply to any mobile edge platform, and is not limited to a MEC platform.
- In the following example use case, a token may be used to support unified communications. In an example, an individual may walk into his office (e.g., within an enterprise/business/company setting) with a mobile device (e.g., an Android smartphone). The office may have deployed a small cell network (including one or more small cells) with a mobile edge MEC platform located in an enterprise small cell concentrator. On the MEC platform, there may be an enterprise bring your own device (BYOD) agent (EBA) MEC application. The individual's mobile device may camp on one of the small cells deployed in the office. An enterprise BYOD client (EBC) on the individual's mobile device may detect that it is camped on the enterprise (small cell) network. Herein, the EBA application may be referred to interchangeably as a client agent application, and the EBC may be referred to interchangeably as a client application.
- The EBC on the mobile device may initiate discovery and may connect to the EBA on the MEC platform. Once the EBC has established the initial connection with the EBA, a token (e.g., a master connectivity token) may be established. Once a master connectivity token is established, the master connectivity token may be used to generate a per-session (or session) token to be used to facilitate traffic filtering as application level sessions are established on the individual's device. The EBA may set a filter in the mobile edge (MEC) platform to forward some or all traffic associated with the master connectivity token to the EBA and/or to the enterprise network based on the policy criteria associated with the application-derived session token. The EBA and/or the enterprise network may have the capability to distinguish between enterprise and external traffic and route that traffic accordingly. In an example, forwarded traffic may go to an enterprise-internal traffic forwarding unit, which may have the ability to distinguish between enterprise communications and external (to the enterprise) network traffic. The enterprise communications may be passed on to a firewall and external communications may be forwarded out to the Internet, for example.
- The examples described herein may use an enterprise network as an example of an external network (e.g., a network that is external to a mobile operator), but may also apply to any type of external network. Similarly, the abbreviations “EBA” and “EBC”, although typically characterized to refer to an enterprise network, may equally apply to any type of external network (e.g., where “E” in EBA and EBC may mean external and/or enterprise).
- The example procedures and/or approaches described herein may be directed to several aspects of the interfacing of mobile edge (MEC) platform(s) and external network(s) using a token. For example, methods and systems may be used for establishing, by the EBA and/or EBC, an initial connection, and/or negotiating and agreeing on the token. For example, the token may be associated with a user identity and/or with each specific application session associated with the user. The case where the token association is with each specific application, the session may be more fine-grained and/or dynamic than association with only a user identity. In another example, systems and methods may address how the enterprise network deals with the received traffic that is forwarded from the MEC platform. Example aspects of the EBA and EBC are described further below.
-
FIG. 2 shows a system diagram of anexample system architecture 200 including a mobile edge platform (MEP) 204 and an external network 216 (e.g., an enterprise network). Theexample system architecture 200 may include, but is not limited to include, any of the following devices, entities and/or components: apublic Internet 202, which may be IP-based; at least onesmall cell network 224, which may include aMEP 204, and/or anEBA 208; aWTRU 212, which may include anEBC 214; anexternal network 216, which may include atraffic filter 218, afirewall 220, and/or adirectory service 222; and/or an enhanced evolved packet core (EPC) network 210 (e.g., the mobile operator's EPC network). Themobile edge platform 204 may include, but is not limited to include, a traffic offload function (TOF) 206. - In an example, a user device may include a
mobile WTRU 212 and anEBC 214. TheEBC 214 may run on theWTRU 212 as an application in the application layer and/or in an operating system, for example. Asmall cell network 224 may include theMEP 204 and theEBA 208. TheEBA 208 may be an application running in thesmall cell network 224, and theEBA 208 may take advantage of some services that are offered by theMEP 204, such as theTOF 206. TheMEP 204 may provide many other services to applications running on user devices in addition to those shown inFIG. 2 . - In an example, an external (enterprise)
network 216 may include, but is not limited to include, any of the following entities and/or services: a user identity management system such as thedirectory service 222; afirewall 220; and/or apre-firewall traffic filter 218. Other entities, not shown, may be part of theexternal network 216. TheEPC 210 may be a standard EPC and may support some enhanced interfaces, as described herein. The public IP-basedInternet 202 may enable the traffic source and/or destination and/or may provide a route-through path for traffic. Interfaces insystem architecture 200 may include, but are not limited to include, any of the following interfaces: asecure interface 230 between theEBA 208 and thedirectory service 222;traffic interface 232 between theMEP 204 and theexternal network 216;token mapping interface 234 between theEPC 210 and theMEP 204; and/or an application programming interface (API) 236 (e.g., ETSI MEC-defined API) betweenEBA 208 andMEP 204. Procedures for establishing aninitial connection 240 between theEBA 208 and theEBC 214 are described below. - In an example, when a
WTRU 212 camps on a cell that is part of asmall network 224 associated with theMEP 204 andEBA 208 running on top ofMEP 204, theEBC 214 running in theWTRU 212 may need to establish theinitial connection 240 with theEBA 208. TheWTRU 212 may be in the vicinity of one or more small cell networks and/or external networks. TheEBC 214 may use approaches to recognize if it is camped on asmall cell network 224 associated with a specific (e.g., desired)external network 216. This may be accomplished by providing theEBC 214 with a list of evolved Node B (eNB) identifiers (IDs) associated with thesmall cell network 224. The provisioning of the list of eNB IDs may be done, for example, using a policy exchange (not shown) run by theexternal network 216. - The
EBC 214 may subscribe to notifications of eNB ID(s) with theWTRU 212 so that theEBC 214 may be informed of the eNB ID(s) whenever theWTRU 212 camps on a small cell network (e.g., small cell network 224). In an example, theEBC 214 may check the eNB ID(s) against an existing list of eNB IDs, where the existing list of eNB IDs may be pre-programmed in theEBC 214, for example. In another example, if supported by theWTRU 212, theEBC 214 may provide theWTRU 212 with a list of eNB IDs of interest so that theEBC 214 is only notified when theWTRU 212 is camped on one of the eNBs in the list of eNBs IDs of interest. In another example, theEBC 214 may use intermittent polling in addition to or instead of a notification service. If thesmall cell network 224 and/or the operator (not shown) offers a zonal presence service, theEBC 214 may subscribe to the zonal presence service. - Once the
EBC 214 has established that theWTRU 212 is camped on thesmall cell network 224, associated with theexternal network 216, theEBC 214 may establish an initial communication session with theEBA 208. To facilitate this, theEBA 208 may provide one or more known static IP addresses, which may be known by theEBC 214, to theMEP 204. For example, these known static IP addresses may be pre-programmed in theEBA 208 and/orEBC 214 by theexternal network 216 via a policy and configuration mechanism. TheEBC 214 may select one of the known static IP addresses and use it to initiate an authentication session with theEBA 208. The authentication process may employ any authentication techniques, such as a variety of extensible authentication protocol (EAP) methods or federated authentication methods such as Open Identity (OpenID) (e.g., OpenID 2.0 or OpenID Connect) or OpenID generic bootstrap architecture (OpenID-GBA). The result of the authentication is as described below. - In an example, a set of security credentials may be employed by the
EBC 214 andEBA 208 to communicate securely. For example, an IP address may be assigned at theEBA 208, such that the IP address may be known only to theEBC 214 and may be used only by theEBC 214 for secure communications. - In an example, a communication session may be established between the
EBC 214 and theEBA 208 via thepublic Internet 202. In this case, theEBA 208 may expose public IP addresses to theInternet 202, and theEBC 214 may access the exposed public IP addresses to establish theinitial communication 240 and authentication between theEBA 208 and theEBC 214. Once authenticated, theEBA 208 may continue to use the same public IP address or another IP address (e.g., a static IP address or an IP address established via a Dynamic Host Configuration Protocol (DHCP)) may be used by theEBA 208. - Establishing a communication session between the
EBC 214 and theEBA 208 via theInternet 202 may create a communication path that is unnecessarily long because the connection between theEBA 208 andEBC 214 may pass through theEPC 210 and theInternet 202 even if theEBA 208 andEBC 214 are relatively close together. Moreover, establishing a communication session between theEBC 214 and theEBA 208 via theInternet 202 may expose an IP address to theInternet 202, which may expose theEBA 208 to certain security risks including a denial of service (DOS) attack, for example. - In an example, the
public Internet 202 may be avoided by leveraging theMEP 204 and/or theTOF 206 service. For example, theEBA 208 may provide a set of IP addresses to theMEP 204. These IP addresses may be static and may be pre-programmed into theEBC 214 or an IP address may be generated dynamically on demand using such protocols as DHCP. The IP address(es) may or may not be public (e.g., an IP address may come from a private space and therefore not be public or exposed outside of the EBA 208). TheEBA 208 may configure theTOF 206 to forward traffic for the IP address(es) to theEBA 208. Thus, allinitial communication 240 between theEBC 214 and theEBA 208 may be configured to go directly through theMEP 204. In an example, once theEBC 214 has authenticated withEBA 208, theEBA 208 may perform, but is not limited to perform, any of the following functions: provision a new, temporary private IP address for theEBC 214; communicate the new, temporary private IP address to theEBC 214; and/or configure theTOF 206 to route traffic between theEBA 208 and theEBC 214. In another example, an IP address may be dynamically assigned during the period when theWTRU 212 attempts to camp on the small cell network 224 (e.g., using DHCP to assign an IP address). - The entities and/or devices referred to hereinafter in the description of example procedures and approaches may be included in a system architecture such as the
example system architecture 200 ofFIG. 2 . Moreover, the entities and/or devices referred to hereinafter in the description of example procedures and approaches may communicate (or equivalently pass, provide, send/receive, and/or transmit/receive) over interfaces, such as the interfaces shown in theexample system architecture 200 ofFIG. 2 . - Example procedures for token derivation are described herein. In an example approach, token-derivation may be done on a per-user basis.
FIG. 3 shows a mapping diagram of an example ideal token mapping 300. In the example token mapping 300, an enterprise is assumed as an example of an external network. Theenterprise identity 302 is directly mapped to a mobile IP 5-tuple 304. However, this ideal token mapping 300 may not be feasible because it may not be possible to associate IP 5-tuples inside a mobile network with an external identity of a user. -
FIG. 4 shows a mapping diagram of an example token mapping 400, which may be more feasible than the token mapping 300 ofFIG. 3 . In the example token mapping 400, amobile identity 406 may be used as an intermediary in mapping theenterprise identity 402 to the mobile IP 5-tuple 404. In this case, a mobile network, and in particular the MEP, may more easily associate mobile IP 5-tuples 404 with amobile identity 406. The example token mapping 400 may use an interface into the MME. Example approaches may be used to associate themobile identity 406 and the external network (enterprise)identity 402, as described below. - In an example, a direct association may be made between an external network identity and a mobile identity. For example, if a Mobile Station International Subscriber Directory Number (MSISDN) (i.e., the mobile phone number) may be used, the EBA may be pre-programmed with the mapping between the MSISDN/mobile phone number and the mobile user identity. For example, the MSISDN/mobile phone number may be used when the external network belongs to an enterprise. In this case, the MEP may provide a service that allows an application (e.g., the EBA) to be notified of a particular MSISDN/mobile phone number camped on the small cell network, and/or some or all of the MSISDNs/mobile phone numbers camped on the small cell network. The EBA may then request that the MEP re-route traffic associated with the MSISDN/mobile phone number.
- In another example, the use of the MSISDN/mobile phone number as an identifier may not be sufficient. In some applications, a stronger association, such as an International Mobile Subscriber Identity (IMSI)-based or Temporary Mobile Subscriber Identity (TMSI)-based association, may be used or needed. In these cases, it may not be possible to provide a direct authentication of an external network identity and mobile identity for various reasons including: it may risk revealing the IMSI or TMSI to the enterprise network, which may not be acceptable to the mobile network operator for security reasons; and/or it may risk revealing the external network identity to the operator, which may not be acceptable in an enterprise setting for security reasons.
- Thus, mechanisms may be developed to provide bindings of the independent mobile and external network identities used by the EPC/MEP and EBA while maintaining the privacy of the identities between the EPC/MEP and EBA. To solve these issues, example approaches for generating a token that provides an association between the external network identity and the mobile identity, while completely hiding these identities between the mobile network operator and external network, are described below. A token may be used to provide for the identity binding by enabling a receiving party to present the token to a requesting party to indirectly reference an identity known by the requesting party without revealing the identity to the receiving party. The token may be generated in a variety of ways including for example: a randomized string bound to or derived from an identifier, such as an IMSI; and/or the result of an authentication procedure.
-
FIG. 5 shows a flow diagram of an example token generation andassignment procedure 500. Inexample procedure 500, the following assumptions may be made: theEPC 506 may have the capability to generate a token for aWTRU 502 and pass it to both theMEP 508 and theWTRU 502; and theWTRU 502 may have the capability to provide the token to an application (e.g., the EBC 504). - At 512,
WTRU 502 may camp on a cell covered by anMEP platform 508. An EBA-EBC connection procedure may be initiated, at 511, between theEBA 510 andEBC 504 that may trigger the generation of a token. At 501, theEBA 510 may initiate the trigger for anauthentication procedure 503 between theEBC 504 and the EPC 506 (e.g., using OpenID-GBA as defined by the 3GPP). The identifier used to initiate theauthentication 501 may be based on the IMSI or TMSI of theWTRU 502 or the WTRU ID or an EBC identifier associated with theWTRU 502, for example. Once theauthentication procedure 503 is complete, at 514, theEPC 506 may generate a token. At 516, theEPC 506 may provide the token, and/or the identity mapping, to theMEP 508 over an EPC-MEP interface. In an example not shown, an interface may be put in place for theMEP 508 to request the identity mapping once it is provided with a token (e.g., by the EBA 510). - At 518, the
EPC 506 may provide the token to theWTRU 502 over an EPC-WTRU interface. At 520, the EBC 504 (e.g., an application running on theWTRU 502 or elsewhere) may obtain the token from theWTRU 502 via a provided interface. At 522, theEBC 504 may pass or provide the token to theEBA 510. In an example, theEPC 506 may sign the token to protect it from tampering or it may be transported using a secure EBC-EBA channel, which may be established during an initial EBC-EBA connection procedure. At 524, theEBA 510 may register the token with theMEP 508. At 526, theEBA 510 may establish service with theEBC 504. - While the example token generation and
assignment procedure 500 may provide a secure means of communicating the token, the implementation may involve the following interfaces for passing the token: an EPC-MEP interface; an EPC-WTRU interface; and/or a WTRU-local application (e.g., EBC) interface. The Open Identity (OpenID 2.0 or OpenID Connect) protocol with the generic bootstrap architecture (GBA) protocol may be suitable to specify these interfaces. -
FIG. 6 shows a flow diagram of another example token generation andassignment procedure 600. Inexample procedure 600, the following assumptions may be made: theEPC 606 may have the capability to pass a token to the MEP platform 608 (e.g., a MEC platform); theEPC 606 may support extensible authentication protocol (EAP)—subscriber identity module (SIM) (EAP-SIM) authentication, and/or EAP—authentication and key agreement (AKA) (EPA-AKA) authentication and/or EAP—authentication and key agreement′ (AKA′) (EPA-AKA′) authentication (e.g., EAP-SIM, EAP-AKA and EAP-AKA′ supported in Hotspot (HS) 2.0); and/or the Universal Integrated Circuit Card (UICC) design may support APIs to support the 3GPP defined generic bootstrapping architecture (GBA) architecture. - In the example token generation and
assignment procedure 600, at 612, theWTRU 602 may camp on an MEP 608-covered cell. At 611, establishment of an EBC-EBA connection link may be initiated. At 618, theEBA 610 may initiate the trigger for anauthentication procedure 615 between theEBC 604 and the EPC 606 (e.g., using OpenID-GBA as defined by the 3GPP). The identifier used to initiate theauthentication procedure 615 may be based on the IMSI or TMSI of theWTRU 602 or the WTRU ID or an EBC identifier associated with theWTRU 602, for example. Once theauthentication procedure 615 is complete, at 614, theEBC 604 and theEPC 606 may generate a token, which may be independently generated or communicated from one party to the other. This may occur, for example, similar to the way a pairwise master key (PMK) is generated once an EAP-AKA authentication is completed in Wi-Fi networks. - At 617, the
EPC 606 may pass or provide the token to theEBA 610, for example via an EPC-EBA interface. At 616, theEPC 606 may pass or provide the token to theMEP platform 608, for example via an EPC-MEP interface. In order to conclude establishment of aservice 622 between theEBC 604 on theWTRU 602 and theEBA 610, theEBC 604 may pass or provide the token to theMEP 608. The token provides a means for performing identity binding and subsequent establishment of appropriate traffic filters. At 619, the EBA 620 may register the token with theMEP 608. At 622, theEBA 610 and theEBC 604 may establish a service. - In another example, the
EPC 606 may use the interface with theMEP 608 to provide to theMEP 608 the token and/or a WTRU identifier and/or a list of IP addresses associated with the WTRU ID of theWTRU 602. In another example, not shown, theMEP 608 may use the interface with theEPC 606 to provide the token (e.g., the token received by theMEP 608 from the EBA 610) to theEPC 606 and have theEPC 606 return to the MEP 608 a WTRU identifier and/or a list of IP addresses associated with the WTRU ID of theWTRU 602. - In other examples, the call flows described in
FIG. 5 andFIG. 6 may be performed with the MEP as an end point instead of the EPC since a binding relationship may exist between the EPC and MEP. Furthermore, in place of an authentication to derive a token, a bootstrapping procedure may be carried out to derive a token, achieving the same objective. - The token derivation procedures described above may derive a token that binds a user's mobile device identity and an external device identity whenever a user is present within a coverage zone of a particular MEP. This binding may be associated with all of the user's traffic, whereas the external network traffic may only be associated with some, but not all the application sessions that run on a user's device. Forwarding all the user's traffic to the external network may be inefficient and/or may cause the external network to deploy its own traffic filtering at the network entry point. Thus, an enhanced per-session procedure may be used to dynamically allocate tokens on a per-session basis, while continuing to deliver all the privacy of the per-WTRU token approaches discussed above.
- According to an example per-session token assignment procedure, a trust relationship and a binding may be formed between the EPC and the EBC on the WTRU, using for example the approaches or procedures described herein. The resulting token, which may be referred to as a Master token, may not need to be passed or provided from the EBC to EBA and/or from the EPC to the MEP.
- The EBC may implement an interface (e.g., an API) that may allow authorized (enterprise) applications to request creation of a session token for the MEP, in order to redirect its session traffic to the external network. How the EBC knows that the application is authorized may depend on how the external entity that owns the external network operates. Once the EBC has received a request to create a session token, the EBC may allow the authorized application to inform the EBC about the traffic filters (e.g., IP 5-tuples) associated with the EBC's session(s). The EBC may use the secure interface it has with the EPC to provide the traffic filters to the EPC and a Session token may be derived from the Master token. The Master→Session token derivation procedure may be known and executed by the EPC and EBC so that a mutual derivation of the Session token may be facilitated.
- The EBC may provide the Session token to the EBA. When the EBA requests the MEP to filter traffic based on this Session token, the MEP may be able to associate the Session token to a set of known filters, for example by requesting the information from the EPC or based on the EPC having previously provided the EBA with the mapping information.
- A trust relationship may exist between the WTRU and the EPC, and thus may also exist between the WTRU and the MEP by way of association of the MEP with the EPC. A trust relationship may exist between the EBC application on the WTRU and the EBA application on the enterprise small cell network. An interface may be implemented between the EBC and WTRU and between the EBA and MEP (e.g. APIs) to facilitate steering of application traffic in the enterprise small cell network by way of traffic filters (e.g. IP 5-tuples). When an enterprise application is activated, the enterprise application may request creation of a session token that may be relayed to the MEP in order to steer the application's session traffic to the external network.
- For example, the session token may be generated through an authentication between an enterprise application interfacing to the EBC on the WTRU and the EBA in the enterprise network. The EBC may use the interface it has with the EPC to derive a Session token from the Master token. The Master→Session token derivation procedure may be known and executed by the EPC and EBC and thus the EBC and EPC can mutually derive the Session token or derive the Session token on one side (i.e. in the EBC or the EPC) and then exchange the Session token through a secure interface between the EBC and EPC. The derived Session token may be bound to the specific application session. Subsequently, the enterprise application may inform the MEP about the traffic filters (e.g. IP 5-tuples) associated with the session by way of a reference to the Session token that may bind the traffic filter information with the specific application session on the WTRU.
- In another example, the Master token may be passed to the MEP by the EPC. A Session token may be generated through an authentication procedure between an enterprise application interfacing to the EBC on the WTRU and the EBA in the enterprise network. The EBA may use the interface it has with the MEP to derive a Session token from the Master token. The Master→Session token derivation procedure may be known and executed by the EBA and the EBC through a bootstrapping procedure with the MEP, which may result in the Session token at each of the EBA and EBC. The derived Session token may be bound to the specific application session. The enterprise application may inform the MEP about the traffic filters (e.g. IP 5-tuples) associated with the session by way of a reference to the Session token, which may bind the traffic filter information with the specific application session on the WTRU.
- In another example, if the per-session functionality for external networks as described above is not used, the EBA may be able to direct the TOF in the MEP to forward all traffic associated with an external network (e.g., an enterprise network) user identity directly towards the external network. However, not all such traffic may be destined for the external network. For example, much of the traffic may be destined for the Internet. In this case, it may be detrimental to the external network to allow all such traffic, including Internet traffic, to enter the external network and then forward it back out to the Internet. Thus, a traffic filtering function, for example located at the entry point to the external network and before (or after) the firewall, may be used. The traffic filtering function may be configured by the external network to distinguish its own internal traffic from all other Internet traffic. In an example, only the internal traffic is forwarded to the firewall, while the Internet traffic is routed directly to the Internet.
- Although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer-readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/747,558 US20180212962A1 (en) | 2015-07-30 | 2016-08-01 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562198902P | 2015-07-30 | 2015-07-30 | |
US15/747,558 US20180212962A1 (en) | 2015-07-30 | 2016-08-01 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
PCT/US2016/044980 WO2017020035A1 (en) | 2015-07-30 | 2016-08-01 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/044980 A-371-Of-International WO2017020035A1 (en) | 2015-07-30 | 2016-08-01 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/585,327 Continuation US20240196212A1 (en) | 2015-07-30 | 2024-02-23 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180212962A1 true US20180212962A1 (en) | 2018-07-26 |
Family
ID=56616096
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/747,558 Abandoned US20180212962A1 (en) | 2015-07-30 | 2016-08-01 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
US18/585,327 Pending US20240196212A1 (en) | 2015-07-30 | 2024-02-23 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/585,327 Pending US20240196212A1 (en) | 2015-07-30 | 2024-02-23 | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network |
Country Status (3)
Country | Link |
---|---|
US (2) | US20180212962A1 (en) |
EP (1) | EP3329707A1 (en) |
WO (1) | WO2017020035A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180159765A1 (en) * | 2015-07-31 | 2018-06-07 | Huawei Technologies Co., Ltd. | Routing rule obtaining method, device, and system |
US20190007306A1 (en) * | 2017-07-03 | 2019-01-03 | Fujitsu Limited | Device and method for controlling route of traffic flow |
US20190230484A1 (en) * | 2016-05-09 | 2019-07-25 | Nokia Solutions And Networks Oy | Policy control with mobile edge computing |
US11089473B2 (en) * | 2016-04-14 | 2021-08-10 | Datang Mobile Communications Equipment Co., Ltd | Service access, and control method and apparatus therefor |
US11425111B2 (en) * | 2018-11-14 | 2022-08-23 | Intel Corporation | Attestation token sharing in edge computing environments |
US20230048092A1 (en) * | 2021-08-16 | 2023-02-16 | Verizon Patent And Licensing Inc. | Systems and methods for device-anonymous performance monitoring in a wireless network |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10064048B1 (en) | 2018-01-05 | 2018-08-28 | Hong Kong Applied Science and Technology Research Institute Company Limited | Acquiring permanent identifier of user equipment by gateway in mobile communication system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130191884A1 (en) * | 2012-01-20 | 2013-07-25 | Interdigital Patent Holdings, Inc. | Identity management with local functionality |
US20150319174A1 (en) * | 2014-04-30 | 2015-11-05 | Citrix Systems, Inc. | Enterprise System Authentication and Authorization via Gateway |
US20160344635A1 (en) * | 2015-05-21 | 2016-11-24 | Qualcomm Incorporated | Efficient policy enforcement for downlink traffic using network access tokens - control-plane approach |
-
2016
- 2016-08-01 EP EP16748465.8A patent/EP3329707A1/en not_active Withdrawn
- 2016-08-01 US US15/747,558 patent/US20180212962A1/en not_active Abandoned
- 2016-08-01 WO PCT/US2016/044980 patent/WO2017020035A1/en active Application Filing
-
2024
- 2024-02-23 US US18/585,327 patent/US20240196212A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130191884A1 (en) * | 2012-01-20 | 2013-07-25 | Interdigital Patent Holdings, Inc. | Identity management with local functionality |
US20150319174A1 (en) * | 2014-04-30 | 2015-11-05 | Citrix Systems, Inc. | Enterprise System Authentication and Authorization via Gateway |
US20160344635A1 (en) * | 2015-05-21 | 2016-11-24 | Qualcomm Incorporated | Efficient policy enforcement for downlink traffic using network access tokens - control-plane approach |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180159765A1 (en) * | 2015-07-31 | 2018-06-07 | Huawei Technologies Co., Ltd. | Routing rule obtaining method, device, and system |
US11089473B2 (en) * | 2016-04-14 | 2021-08-10 | Datang Mobile Communications Equipment Co., Ltd | Service access, and control method and apparatus therefor |
US20190230484A1 (en) * | 2016-05-09 | 2019-07-25 | Nokia Solutions And Networks Oy | Policy control with mobile edge computing |
US20190007306A1 (en) * | 2017-07-03 | 2019-01-03 | Fujitsu Limited | Device and method for controlling route of traffic flow |
US10785147B2 (en) * | 2017-07-03 | 2020-09-22 | Fujitsu Limited | Device and method for controlling route of traffic flow |
US11425111B2 (en) * | 2018-11-14 | 2022-08-23 | Intel Corporation | Attestation token sharing in edge computing environments |
US20230048092A1 (en) * | 2021-08-16 | 2023-02-16 | Verizon Patent And Licensing Inc. | Systems and methods for device-anonymous performance monitoring in a wireless network |
US11711719B2 (en) * | 2021-08-16 | 2023-07-25 | Verizon Patent And Licensing Inc. | Systems and methods for device-anonymous performance monitoring in a wireless network |
Also Published As
Publication number | Publication date |
---|---|
EP3329707A1 (en) | 2018-06-06 |
US20240196212A1 (en) | 2024-06-13 |
WO2017020035A1 (en) | 2017-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240196212A1 (en) | Enabling coordinated identity management between an operator-managed mobile-edge platform and an external network | |
KR102320063B1 (en) | Methods for Service Slice Selection and Separation | |
US9621537B2 (en) | Method and apparatus for enabling access to applications integrated with a visited network | |
US9614831B2 (en) | Authentication and secure channel setup for communication handoff scenarios | |
EP2727295B1 (en) | Managing data mobility policies | |
US9980213B2 (en) | Methods, apparatus and systems for wireless network selection | |
US11265294B2 (en) | Method for secure WiFi calling connectivity over managed public WLAN access | |
US10771438B2 (en) | Context-based protocol stack privacy | |
WO2018013925A1 (en) | Adaptive authorization framework for communication networks | |
WO2013003535A1 (en) | Automated negotiation and selection of authentication protocols | |
US20240305980A1 (en) | Authentication and authorization associated with layer 3 wireless-transmit/receive -unit-to-network | |
JP2023514257A (en) | Unmanned aerial vehicle authentication and authorization with unmanned aerial system traffic management via user plane | |
US20230164641A1 (en) | Extended 5g local area network interworking with a home network and change of access network for 5g lan connected devices | |
JP2024528432A (en) | Internet of Things Network Discovery | |
EP4104477A1 (en) | Security and privacy support for direct wireless communications | |
WO2023158781A1 (en) | Enabling non-access stratum-as-a-service | |
WO2024044186A1 (en) | Roaming wireless transmit/receive unit authorization for edge applications | |
WO2024015403A1 (en) | Authentication methods for sba-enabled devices | |
KR20240034831A (en) | Distributed network edge security architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERDIGITAL PATENT HOLDINGS, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REZNIK, ALEXANDER;SHAH, YOGENDRA C.;REEL/FRAME:044878/0109 Effective date: 20180129 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |