WO2014074380A1 - Network monitoring of user equipment events - Google Patents
Network monitoring of user equipment events Download PDFInfo
- Publication number
- WO2014074380A1 WO2014074380A1 PCT/US2013/067676 US2013067676W WO2014074380A1 WO 2014074380 A1 WO2014074380 A1 WO 2014074380A1 US 2013067676 W US2013067676 W US 2013067676W WO 2014074380 A1 WO2014074380 A1 WO 2014074380A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- request
- user equipment
- monitor
- event
- user
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/18—Network planning tools
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/04—Registration at HLR or HSS [Home Subscriber Server]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- This application relates generally to communication systems, and, more particularly, to wireless communication systems.
- Wireless communication systems typically include a network of base stations that provide wireless connectivity to user equipment.
- User equipment may include devices such as cellular phones, smart phones, tablets, ultrabooks, laptops, wireless-enabled desktop computers, and the like.
- User equipment may also include machine type communication (MTC) devices.
- MTC device is defined by the 3GPP TS 22.368 as user equipment equipped for Machine Type Communication.
- An MTC device can be one of the types of devices listed above ⁇ e.g., a smart phone) with an MTC application installed on it or the MTC device can be a device that is specific for an MTC purpose and communicates wirelessly to an MTC server, such as a water meter or health monitoring device.
- the MTC device communicates through a public land mobile network (PLMN) with MTC server(s) and/or other MTC device(s).
- PLMN public land mobile network
- Machine type communication is a form of data communication that involves one or more entities that do not necessarily need human interaction.
- a service optimised for machine type communications differs from a service optimised for human-to-human communications.
- machine type communications differs from current mobile network communication services because machine type communication may involve different market scenarios, data communications, lower costs and effort, a potentially very large number of communicating terminals, and to a large extent, relatively little traffic per terminal.
- 3GPP systems can trace the activities of a device in response to a triggering event such as activating a packet data protocol (PDP) context. Gathering trace events may be particularly important for devices that implement machine type communication, since machine type communication does not necessarily need human intervention. However, tracing events gathers information related to all the activities related to the trace event of the device, which can cause a large amount of information to be collected (such as all the signaling messages related to the event) even though much of this information may not be of interest. Tracing does not provide the ability to limit monitoring to a particular event related to user equipment and reporting that the event occurred.
- PDP packet data protocol
- Nodes that carry out tracing requests are not configured to take any action in response to detecting events during the tracing.
- trace functionality is implemented internally to the public land mobile network (PLMN) and therefore does not support third-party requests for monitoring of devices within the network.
- PLMN public land mobile network
- Other proposals for techniques for monitoring devices also have a number of drawbacks.
- the Rx and Gx interfaces may be used to configure monitoring requirements in the packet Gateway (PGW) and to allow the PGW to send the monitoring events/notifications.
- PGW packet Gateway
- associations between a user equipment's international mobile subscriber identity (IMSI) and its international mobile equipment identity (IMEI, IMEI-SV) may be checked at the home subscriber server (HSS) and reported to a monitoring entity with the aim of detecting new combination of IMEI-SV and IMSI, which may indicate the insertion of a universal subscriber identity module (USIM) in a different, potentially unauthorized or fraudulent device.
- a new T5 interface may be defined between the nodes serving the UE (such as the mobility management entity/ serving GPRS support node (MME/SGSN)) in the visited PLMN (VPLMN) and the machine type communication interworking function (MTC-IWF) in the home PLMN (HPLMN).
- MME/SGSN mobility management entity/ serving GPRS support node
- MTC-IWF machine type communication interworking function
- the T5 interface may be used to support monitoring in conjunction with the Tsp interface.
- this approach does not support the case of a serving node failure that would induce the loss of a monitoring request and furthermore requires the definition of a new inter-PLMN interface (T5) inducing new inter operator testing and operation costs.
- T5 inter-PLMN interface
- a method for supporting network monitoring of user equipment events. Some embodiments of the method include receiving, at a home subscriber server (HSS) in a public land mobile network (PLMN), a request to monitor one or more events associated with one or more users. The request is used to configure, activate, or deactivate delivery of reports from one or more entities in the PLMN to a monitor collection entity in response to the event(s). Some embodiments of the method also include configuring one or more profiles in the HSS associated with the user(s) based on the request and providing the request to monitor the event(s) associated with the user(s) to one or more serving nodes for user equipment associated with the user(s)..
- HSS home subscriber server
- PLMN public land mobile network
- a method for supporting network monitoring of events. Some embodiments of the method include receiving, at a network entity in a public land mobile network (PLMN) and from a home subscriber server (HSS), a request to monitor one or more events associated with one or more users. Some embodiments of the method also include configuring delivery of reports from the network entity to a monitor collection entity in response to the event(s). The request is received by the HSS in response to a request provided by an element management system (EMS) or a service capability server (SCS).
- EMS element management system
- SCS service capability server
- a method for supporting network monitoring of events. Some embodiments of the method include receiving, at a first node in a public land mobile network (PLMN) that serves user equipment associated with one or more users and from a home subscriber server (HSS), a request to monitor one or more events associated with one or more subscriptions associated with the user(s). Some embodiments of the method also include propagating the request towards one or more second nodes participating in PLMN service delivery to the user(s). The second node(s) are configurable to monitor one or more events associated with the subscription(s) on the basis of the request received from the first node.
- PLMN public land mobile network
- HSS home subscriber server
- a method for supporting network monitoring of events. Some embodiments of the method include receiving, at a network entity in a public land mobile network (PLMN) that serves user equipment and from a home subscriber server (HSS), a request to monitor one or more events associated with a subscription associated with the user equipment. The request includes an address associated with a monitor collection entity. Some embodiments of the method also include detecting occurrence of one of the events and reporting the detected event to the monitor collection entity using the received address.
- PLMN public land mobile network
- HSS home subscriber server
- Figure 1 conceptually illustrates one exemplary embodiment of a wireless communication system
- Figure 2 conceptually illustrates one exemplary embodiment of a user equipment monitoring profile that may be created, configured, modified, or stored by a home subscription server (HSS);
- HSS home subscription server
- Figure 3 conceptually illustrates a first exemplary embodiment of a method for configuring event monitoring in a wireless communication system
- FIG. 4 conceptually illustrates a second exemplary embodiment of a method for configuring event monitoring in a wireless communication system for embodiments in which the user equipment is served by a non-3GPP access network such as a wireless local area network (WLAN) or as a cdma2000 network; and
- a non-3GPP access network such as a wireless local area network (WLAN) or as a cdma2000 network
- Figure 5 conceptually illustrates a third exemplary embodiment of a method for configuring event monitoring in a wireless communication system in which event monitoring information is provided by an element management server.
- embodiments of the techniques described herein allow service capability servers (SCS) to request monitoring of selected events for user equipment via the Tsp reference point between the SCS and an interworking function such as a machine type communication interworking function (MTC-IWF).
- SCS can be internal or external to the PLMN.
- Some embodiments may store the monitoring configuration information provided by the SCS as part of the user equipment subscription information in the home subscriber server (HSS).
- HSS home subscriber server
- Monitoring configuration information may also be dynamically provided by the SCS to configure, activate, or deactivate report delivery for monitoring events and user equipment.
- the monitoring configuration information may also be downloaded to other network entities (such as an SGSN or MME) together with the subscription information.
- the monitoring configuration may be transferred to the other nodes via new information added to existing protocols ⁇ e.g., S1 or S4/S1 1 and S5/S8 as defined in 3GPP specifications such as TS 23.401 ).
- Monitoring information collected in response to an event indicated in a monitoring request can be transmitted to a monitoring collection entity (MCE) via a monitoring collection interface and then stored in the monitoring collection entity.
- MCE monitoring collection entity
- the SCS can be accessed by third-party content providers using application programming interfaces (APIs) and so third-party content providers may be able to request monitoring of scheduled events for user equipment via the SCS.
- the network provider may therefore support authentication and authorization of the monitoring requests as well as charging functionality to charge for the requested monitoring.
- FIG 1 conceptually illustrates one exemplary embodiment of a wireless communication system 100.
- the wireless communication system 100 implements a public land mobile network (PLMN) although other networks may be implemented instead of or in addition to this type of network.
- PLMN public land mobile network
- Dotted line connections in Figure 1 indicate control plane pathways and solid line connections indicate user plane pathways.
- the portions of the PLMN depicted in Figure 1 include a home PLMN 105 for user equipment 1 10 and a visited PLMN 1 15.
- User equipment 1 10 is depicted in the visited PLMN 1 15.
- persons of ordinary skill in the art having benefit of the present disclosure should appreciate that user equipment 1 10 may be free to roam between the home PLMN 105, the visited PLMN 1 15, or other network areas that are not depicted in Figure 1 .
- Some embodiments of user equipment 1 10 may implement one or more MTC applications 120.
- the MTC application 120 performs machine type communication, which is a form of data communication that involves one or more entities that do not necessarily need human interaction.
- MTC applications 120 performs machine type communication, which is a form of data communication that involves one or more entities that do not necessarily need human interaction.
- MTC applications 120 performs machine type communication, which is a form of data communication that involves one or more entities that do not necessarily need human interaction.
- MTC applications 120 may include user equipment 1 10 that do not implement MTC applications 120.
- Persons of ordinary skill in the art having benefit of the present disclosure also appreciate that some embodiments of the techniques described herein may be used for monitoring devices that are not Machine Type devices. For example, some embodiments of the techniques described herein may be used to configure monitoring of events associated with smartphones.
- Some embodiments of the user equipment 1 10 may implement a smartcard such as a universal integrated circuit card (UICC) 122 that may be used in mobile terminals in GSM and UMTS networks.
- the UICC 122 may be used to ensure the integrity and security of personal data and it typically holds a few hundred kilobytes. Specifications for the UICC 122 are found in ETSI TR 102 216.
- the UICC 122 contains a subscriber identity module (SIM) application and in a UMTS network it is the USIM application.
- SIM subscriber identity module
- Some embodiments of the UICC 122 may contain several applications so that the UICC 122 can support access to both GSM and UMTS networks and provide storage of a phone book and other applications.
- the home PLMN 105 shown in Figure 1 includes a home subscriber server (HSS) 125.
- HSS home subscriber server
- the HSS 125 which may also be referred to as a User Profile Server Function (UPSF), is a master user database that supports network entities that handle calls or data transmissions to or from user equipment 1 10.
- Some embodiments of the HSS 125 contain subscription-related information such as subscriber profiles associated with the user equipment 1 10.
- the HSS 125 may also perform authentication and authorization of the user and can provide information about the subscriber's location and IP information.
- Techniques for implementing or operating the HSS 125 are known in the art and only those aspects of implementing or operating the HSS 125 that are relevant to the claimed subject matter are discussed herein.
- the HSS 125 is physically, electromagnetically, or communicatively coupled to an authentication, authorization, and accounting server (AAA) 130.
- AAA authentication, authorization, and accounting server
- Authentication refers to the process of authenticating user equipment 1 10 or other entities, typically on the basis of a specific digital identity such as an identifier and the corresponding credentials. Examples of types of credentials are passwords, one-time tokens (such as used as part of the EAP-AKA type of authentication using the Authentication and Key Agreement type of algorithm defined by 3GPP), or digital certificates.
- the authorization function determines whether a particular entity is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service.
- Authorization may be determined based on a range of restrictions such as time- of-day restrictions, or physical location restrictions, or restrictions against multiple accesses by the same entity or user. Accounting refers to the tracking of network resource consumption by user equipment 1 10 or other entities for the purpose of capacity and trend analysis, cost allocation, or billing.
- the AAA server 130 may include functionality for performing authentication, authorization, or accounting for user equipment 1 10 or MTC applications 120.
- the home PLMN 105 may also include a charging data function (CDF) 135 that stores call detail records (CDR).
- CDF charging data function
- the (CDF) addresses may be used for offline billing or online billing.
- the CDRs may be used to collect usage or billing information, which may then be sent to the billing system of the domain.
- Billing systems in different domains may exchange information so that roaming charges can be applied.
- Some embodiments of the CDF 135 may be used to track resource usage associated with monitoring events so that requested event monitoring can be billed to third parties.
- a gateway general packet radio service (GPRS) support node (GGSN) 140 may be implemented in the home PLMN 105.
- the GGSN 140 supports a Gn interface and supports the GPRS tunneling protocol.
- the GGSN 140 is responsible for the interworking between the GPRS network and external packet switched networks, like the Internet.
- the GGSN 140 may also support a packet data network (PDN) gateway (PGW) function such as the PGW function defined in 3GPP TS 23.401 that supports a S5/S8 interface and supports the GPRS tunneling protocol.
- PGW/GGSN 140 provides connectivity from user equipment 1 10 to external packet data networks by being the point of exit and entry of traffic for user equipment 1 10.
- the PGW 140 performs policy enforcement, packet filtering for each user, charging support, lawful interception, and packet screening.
- the PGW 140 may also act as the anchor for mobility between 3GPP and non-3GPP technologies such as WLAN (Wi-Fi) and 3GPP2 ⁇ e.g., code division multiple access (CDMA) 1 X and evolution data optimized (EvDO)).
- WLAN Wi-Fi
- 3GPP2 e.g., code division multiple access (CDMA) 1 X and evolution data optimized (EvDO)
- a serving GPRS support node (SGSN) 145 may be implemented in the visited PLMN 1 15.
- the SGSN 145 is responsible for the delivery of data packets from and to the mobile stations within its geographical service area, such as user equipment 1 10. Tasks supported by the SGSN 145 include packet routing and transfer, mobility management (attach/detach and location management), logical link management, and authentication and charging functions.
- the visited PLMN 1 15 also includes a serving gateway (SGW) 150.
- SGW 150 routes and forwards user data packets, while also acting as the mobility anchor for the user plane during inter-eNodeB handovers. For idle state user equipment 1 10, the SGW 150 terminates the downlink data path and triggers paging when downlink data arrives for user equipment 1 10.
- the SGW 150 may also manage or store user equipment contexts, e.g. parameters of the IP bearer service, network internal routing information, and perform replication of the user traffic in case of lawful interception.
- the visited PLMN 1 15 shown in Figure 1 includes a mobility management entity (MME) 155.
- the MME 155 may be a control-node for the LTE access network and may be responsible for idle mode tracking and paging of the user equipment 1 10.
- the MME 155 may also be involved in the bearer activation/deactivation process and may be responsible for choosing the SGW 150 for user equipment 1 10 at the initial attach and at time of intra-LTE handover involving Core Network (CN) node relocation.
- the MME 155 may also be responsible for authenticating user equipment 1 10 by interacting with the HSS 125.
- a mobile switching center (MSC) 160 processes requests for service connections from user equipment 1 10.
- the visited PLMN 1 15 shown in Figure 1 also includes a radio access network (RAN) 165 that implements the radio access technology used to provide wireless connectivity to user equipment 1 10.
- RAN radio access network
- Some embodiments of the radio access network 165 may include base stations, e-nodeBs (ENBs), base station routers, access points, femtocells, and the like.
- the wireless communication system 100 supports control plane interfaces between the HSS 125 in the home PLMN 105 and the MSC 160, MME 155, and SGSN 145 in the visited PLMN 1 15.
- Application servers 170 may interact with the wireless communication system 100 via service capability servers (SCS) 175.
- SCS service capability servers
- third-party content providers may use one or more application servers 170 to access the capabilities of the wireless communication system 100 through Application Programming Interfaces (APIs) supported by the application servers 170.
- APIs Application Programming Interfaces
- Some embodiments of the SCS 175 may be implemented externally to the PLMN, while other embodiments of the SCS 175 may be implemented internal to the PLMN.
- the SCS 175 may then communicate with other entities in the home PLMN 105 or the visited PLMN 1 15 via an interface (such as a Tsp interface) to the interworking function (IWF) 180 or an interface (such as a Gi/SGi) interface to the GGSN/PGW 140.
- IWF interworking function
- Gi/SGi Gi/SGi
- the IWF 180 may support machine type communication.
- the IWF may also support or control interfaces between the home PLMN 105 and the visited PLMN 1 15.
- the wireless communication system 100 depicted in Figure 1 also includes an element management system (EMS) 190 that is physically, electromagnetically, or communicatively coupled to the HSS 125.
- EMS element management system
- the EMS 190 provides a package of end-user functions for management of a set of closely related types of network elements, as specified in 3GPP TS 21 .905.
- Some embodiments of the EMS 190 or the application server 170 may provide requests to monitor events associated with user equipment 1 10 or the MTC application 120.
- Some embodiments of the requests may be used to configure, activate, or deactivate delivery of event reports from entities in the home PLMN 105 or visited PLMN 1 15 to a monitor collection entity (MCE) 185.
- MCE monitor collection entity
- the EMS 190 may provide a request to the HSS 125 to monitor events associated with the MTC application 120.
- the request may be determined based on a service provider agreement with the application provider for the SCS 175 or MTC application 120.
- the application server 170 may provide a request to monitor events associated with the MTC application 120 to the SCS 175, which may forward the request to the MTC-IWF 180.
- the MTC-IWF 180 may then forward the information in the request to the HSS 125.
- the HSS 125 may use information in the request to configure a user profile or user subscription associated with user equipment 1 10 or the MTC application 120.
- the user profile may include information identifying the events to be monitored, as well as potentially indicating actions to be taken in response to detecting the event.
- the events may be associated with a user or a user's subscription instead of (or in addition to) being associated with user equipment 1 10 or MTC application 120. This information may then be distributed to network entities, e.g. as part of a subscription download procedure.
- the monitoring configuration information may be statically stored in the HSS 125 as part of the subscription for user equipment 1 10 or the MTC application 120. This may apply to HPLMN based monitoring features.
- the monitoring configuration information may also be dynamically provided by the SCS 175.
- the SCS 175 may send requests to the MTC-IWF 180 to configure, activate, or deactivate report delivery for a particular monitoring event and a particular user equipment 1 10, MTC application 120, or group of user equipment/applications. After the MTC-IWF 180 has validated the request, the MTC-IWF 180 may provide updated subscription data to the HSS 125.
- the monitoring configuration information may also be downloaded by the HSS 125 to network entities serving the user equipment 1 10 such as the SGSN 145 or the MME 155 during a location update or Insert Subscriber data procedure.
- the monitoring request may be provided using connection related signaling such as GTP-c ⁇ e.g. 3GPP TS 29.274) or signaling associated with an UE ⁇ e.g. over the S1 or IU interfaces) from the Serving Node (MME or SGSN) to the Radio Access Network (e.g.
- Monitoring requirements may also be sent to the PGW 140 from AAA server 130 over the S6b interface to support cases where such information cannot be transferred over user connection related signaling ⁇ e.g. in case proxy mobile IPv6 (PMIP) is used to contact the PGW) as in some cases of non-3GPP access to the evolved packet core (EPC).
- PMIP proxy mobile IPv6
- Some embodiments of the monitoring configuration information may contain the Internet Protocol (IP) address of the MCE 185 so that network entities can report the events by addressing them to the MCE 185.
- Some embodiments may also support the event monitoring feature in the roaming scenario, in which case a Monitoring Collection Interface may be deployed to support roaming, e.g. by providing an interface for carrying reports between the MCE 180 in the home network and the roaming network.
- the configured network entities may then monitor activities of user equipment 1 10 or the MTC application 120 to detect the events indicated in the user profile.
- the configured network entities may generate reports in response to detecting one or more of the events indicated in the request and the reports may be delivered to the monitor collection entity 185.
- Configuring the event-specific monitoring of events associated with users, user subscriptions, user equipment 1 10, or the MTC application 120 may allow network operators or third party application providers to monitor specific events related to users, user subscriptions, user equipment 1 10, or MTC application 120.
- the monitoring and reporting of event-specific information may aid in early detection of problems with user equipment 1 10 or MTC application 120. Some events can also aid in determining whether user equipment 1 10 or MTC application 120 is being vandalized or stolen.
- embodiments of the techniques described herein do not require creation of new inter-PLMN interfaces to configure the monitoring or report the monitoring events. Some embodiments of the event monitoring may be implemented without loading the signaling interfaces with monitoring events.
- Some embodiments of the wireless communication system 100 may also support charging of third parties for monitoring services. For example, information indicating that user equipment 1 10 or MTC application 120 is associated with one or more event monitoring services may be provided to the CDF 135 and stored in an associated CDR. Resource usage associated with the event monitoring may be recorded by the CDF 135 using information provided by other network entities and the resource usage may be used for billing purposes.
- Figure 2 conceptually illustrates one exemplary embodiment of a user equipment monitoring profile 200 that may be created, configured, modified, or stored by a home subscription server (HSS).
- HSS home subscription server
- Some embodiments of the profile 200 may be created in response to the application server 170 shown in Figure 1 transmitting a monitoring request to the SCS 175, which may provide information in the request to the HSS 125 via the MTC-IWF 180, as discussed herein. Some embodiments of the profile 200 may be created in response to the EMS 190 shown in Figure 1 transmitting a monitoring request to the HSS 125.
- the profile 200 includes the IMSI and IMEI-SV that are used to identify the user equipment associated with the profile. However, some embodiments of the profile 200 may not include both the IMSI and the IMEI-SV and may instead use either the IMSI or the IMEI-SV or some other identifier to identify the user equipment.
- the profile 200 also includes information indicating one or more events associated with the user, the user's subscription, the user equipment, or an MTC application that may be monitored.
- the monitoring profile 200 includes information indicating that network entities may monitor activities associated with the user equipment to detect events indicating behavior that is not aligned with activated MTC feature(s), events indicating a change of the association between user equipment and the UlCC installed in the user equipment, or loss of connectivity between the user equipment and the network. Loss of connectivity means it is no longer possible to establish signaling between the user equipment (or associated MTC application) and the network, e.g., when the user equipment is detached from the network.
- the maximum time between the time at which the actual loss of connectivity occurred and the time at which the network entity identifies an event indicating the loss of connectivity may be configurable per subscription. For example, the maximum detection time that elapses before the network entity concludes that loss of connectivity has occurred may be configured to be on the order of 1 minute to 1 hour.
- Some embodiments of the monitoring profile 200 may also include information indicating that network entities should monitor activities associated with the user equipment to detect communication failure events and reasons for the failure events ⁇ e.g., connection error codes for troubleshooting), change of the location of the user equipment, change of the geographical position of the user equipment, or change of the point of attachment in the network of the user equipment. Persons of ordinary skill in the art having benefit of the present disclosure should appreciate that this exemplary list of monitoring events is not intended to be exhaustive and some embodiments may define or monitor other events that are not listed herein.
- Some embodiments of the profile 200 may also include information indicating whether monitoring of a particular event has been activated.
- the profile 200 depicted in Figure 2 indicates that monitoring of events indicating misaligned behavior and changes in the UE-UICC association have been activated. Monitoring of events indicating loss of connectivity or a change in the point-of-attachment of the user equipment have not been activated in the embodi ment of the profile 200 depicted in Figure 2.
- Monitoring of user equipment events may be activated or deactivated using information provided by application servers.
- the application server 1 70 shown in Figure 1 may provide a monitoring request to activate monitoring of events related to loss of connectivity in the user equipment associated with the profile 200. Monitoring of user equipment events may also be activated or deactivated using information provided by EMS 1 90.
- the request may be forwarded to the HSS 1 25, which may then modify the profile 200 to activate monitoring of events associated with loss of connectivity.
- a subscriber may be able to define which of the above events should be monitored and detected. For example, upon detecting one of the active events indicated in the profile 200, an MTC subscriber may indicate that the network should provide a warning notification to an associated MTC server.
- Some embodiments of the profile 200 may also include information that indicates actions that may be taken in response to detecting the events listed in the profile 200.
- the network may be configured to limit the services provided to the MTC device, e.g. by reducing the resources allocated to the user equipment in response to detecting certain events.
- the subscriber or user may also be able to define what actions may be taken when an event is detected.
- Some embodiments of the MTC device may be able to transfer other event notifications to the MTC server when the event detection is out of 3GPP scope, for example, notifications that indicate that the MTC device power level is lower than a threshold or the loss of signal reception.
- Loss of signal reception refers to a situation when a MTC device can no longer receive the network which could be due to interference (e.g. from a jammer or other source) or other reasons.
- the profile 200 may include information indicating one or more actions that may be undertaken by the monitoring entity in response to detecting the event.
- the profile 200 shown in Figure 2 includes information indicating whether the service provided to the user should be stopped in response to detecting the event.
- the profile 200 indicates that the server should be stopped in response to detecting misaligned behavior or a change in the UE-UICC association.
- the profile 200 also indicates that the server should not take any action in response to detecting loss of connectivity or a change point for the user equipment.
- the actions depicted in Figure 2 are exemplary and some embodiments may include information indicating different actions or combinations of actions that are to be performed in response to detecting the different events.
- FIG 3 conceptually illustrates a first exemplary embodiment of a method 300 for configuring event monitoring in a wireless communication system.
- Some embodiments of the method 300 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, SGSN 145, MME 155, SGW 150, PGW 140, HSS 125, MTC-IWF 180, and SCS 175.
- the SCS sends (at 305) a Monitoring Action Request message over the Tsp interface to the MTC-IWF with the Action Type field in the message set to a value that indicates whether report delivery for a particular monitoring event is to be configured, activated, or deactivated.
- the SCS may also provide (at 305) information in the monitoring request message such as the identity of the device to monitor or of a group of devices to monitor.
- the identifying information may correspond to external identities that may be translated to PLMN identities ⁇ e.g. IMSI).
- the SCS may also provide (at 305) information indicating a monitoring reference, the IP address of a monitoring collection entity (such as the MCE 185 shown in Figure 1 ), a list of events to monitor (which may be indicated by one or more Monitoring Event IDs), and optionally an associated action to carry out in response to the event.
- information may indicate that a network entity should report a detected event, cancel the service in response to detecting the event, disable the device in response to detecting the event, or some other action.
- the MTC-IWF determines (at 310) whether the SCS is authorized to send monitoring requests and determines (at 310) whether the SCS has exceeded its quota or rate of submitting monitoring requests over Tsp, e.g., the MTC-IWF performs (at 310) load control for the SCS. If either determination fails (at 310), the MTC-IWF sends (at 315) a Monitoring Action Answer message with a cause value indicating the reason for the failure condition and the flow stops at step 315. Otherwise, the flow continues with step 320.
- the MTC-IWF sends (at 320) a Subscriber Information Request message to the HSS/ home location register (HLR) to authorize (at 325) the monitoring configuration details.
- HLR home location register
- the HSS may authorize (at 325) the monitoring event ID provided in the subscriber information request message. If the HSS authorizes (at 325) the monitoring configuration details, the HSS may then configure (at 325) event monitoring for the user equipment.
- Some embodiments of the HSS may translate the external identifier into an internal identifier (IMSI), if necessary, and then the monitoring events may be configured (at 325) in the HSS as part of the user equipment subscription data.
- the HSS may create, configure, modify, or remove the user profile that includes the event reporting information, as discussed herein.
- the HSS may also verify (at 325) the monitoring event information and authorize (at 330) the MTC- IWF to configure the network element for monitoring. If this check fails, the MTC- IWF may receive (at 330) a negative feedback from the HSS and send (at 335) a Monitoring Action Answer message with a cause value indicating the reason for the failure condition. In this case the flow stops at step 335. Otherwise, the flow continues at step 340.
- the HSS may download (at 340) monitoring configuration information to the SGSN/MME.
- the HSS may download (at 340) MTC Monitoring configuration information to the SGSN/MME as part of a user equipment subscription download procedure, e.g. during an Attach/routing area update (RAliytracking area update (TAU) procedure or as part of an Insert Subscriber Data procedure initiated by the HSS towards the nodes serving user equipment that are subject to monitoring.
- the monitoring event information may be propagated (at 340) from the HSS to the MME by including the information in enhanced trace configuration parameters of the S6a-lnsert subscriber data message or the S6a-Update Location Answer message.
- the monitoring event information may be propagated (at 340) from the HSS to the SGSN by including the information into enhanced trace configuration parameters of the MAP-ACTIVATE_TRACE_MODE message.
- Some embodiments of the SGSN may further propagate monitoring event information to other nodes such as the GGSN by sending a GTP- C R EAT E_P D P_CO NT EXT_R EQ U EST message or an
- UPDATE_PDP_CONTEXT_REQU EST for events that are activated while the PDP context is active.
- Some embodiments of the MME and SGSN may further propagate monitoring event information to other nodes such as SGW or/and PGW by sending a GTPv2-C CREATE SESSION REQU EST message or an enhanced TRACE SESSION ACTIVATION message (for events activated while the PDN connection is established) over the S1 1 /S4 and S5/S8 interfaces.
- Some embodiments of the monitoring configuration may include information identifying the device to monitor (e.g., an IMSI), an I P address of the MCE, or a monitoring reference and information allowing the MCE to associate the monitoring reference with the (MTC) service being monitored.
- the HSS may also download (at 340), for each of the nodes that are required to monitor events, a list of events to monitor and optionally information indicating one or more actions to carry out in response to detecting one or more events in the list. For example, the HSS may download (at 340) information indicating that the network entity should report the event, cancel the service in response to detecting the event, or take some other action.
- the SGSN/MME may then be configured (at 345) using the information downloaded (at 340) from the HSS.
- the configured SGSN/MME may then be able to monitor activities associated with the user equipment to detect one or more of the events indicated in the monitoring configuration information.
- the target SGSN/MME may receive MTC Monitoring configuration when the serving SGSN/MME changes, e.g., during handover of user equipment.
- the MTC monitoring configuration may be stored in the user equipment context and exchanged between source and target SGSNs/MMEs or the target SGSN/MME may fetch the MTC monitoring configuration information from the HSS as part of subscriber data.
- Some embodiments may support monitoring events that involve monitoring at nodes in addition to or instead of the SGSN/MME.
- the monitoring configuration information may therefore be propagated (at 350) towards other nodes ⁇ e.g. the ENB/RAN 165, SGW 150, or PGW/GGSN 140 shown in Figure 1 ).
- the serving node may transmit (at 350) a request to monitor events associated with the user equipment to one or more additional serving nodes.
- the request may ask the additional serving node to monitor the same events that are being monitored by the serving node (SGSN/MME) or the request may be to monitor a subset of the events that are being monitored by the serving node (SGSN/MME).
- Embodiments of the request may include information identifying the events, an address of the monitoring collection entity for transmitting/collecting event reports, or possible actions to be taken in response to the event.
- the additional nodes ⁇ e.g. the ENB/RAN 165, SGW 150, or PGW/GGSN 140 shown in Figure 1 ) may then be configured (at 355) using the information in the request.
- the additional nodes may also further propagate the requests to other nodes in the same manner.
- FIG 4 conceptually illustrates a second exemplary embodiment of a method 400 for configuring event monitoring in a wireless communication system.
- Some embodiments of the method 400 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, PGW 140, AAA 130, HSS 125, MTC-IWF 180, and SCS 175.
- the second exemplary embodiment differs from the first exemplary embodiment shown in Figure 3 because the user equipment is accessing the wireless communication system via non-3GPP network elements.
- an event monitoring request is provided by the SCS, e.g., in response to a request from a third party application server.
- the event monitoring requests may be authorized (at 405) and used to configure (at 405) the user profile in the HSS, as discussed herein.
- Some embodiments of the authorization/configuration process (at 405) may proceed in a manner analogous to steps 305, 310, 315, 320, 325, 330, 335 shown in Figure 3.
- the HSS updates (at 410) the 3GPP AAA server by providing the monitoring configuration data over an interface such as the SWx interface.
- the HSS may provide (at 410) the monitoring configuration data to the 3GPP AAA server in response to the HSS receiving a request to register the 3GPP AAA Server serving this user equipment for a trusted or un-trusted non-3GPP access.
- the 3GPP AAA server may then provide (at 415) monitoring configuration data to a Non-3GPP Access Gateway such as a high rate packet date (HRPD) serving gateway (HSGW) or cdma2000, a TWAN for Trusted WLAN, an ePDG for non-trusted access to 3GPP, and the like.
- a Non-3GPP Access Gateway such as a high rate packet date (HRPD) serving gateway (HSGW) or cdma2000, a TWAN for Trusted WLAN, an ePDG for non-trusted access to 3GPP, and the like.
- HRPD high rate packet date
- HSGW high rate packet date
- cdma2000 a high rate packet date (HRPD) serving gateway
- HSGW high rate packet date
- TWAN for Trusted WLAN
- ePDG for non-trusted access to 3GPP
- the 3GPP AAA server may provide (at 415) the monitoring configuration data as part of user equipment subscription download procedure ⁇ e.g. during the Authentic
- the non-3GPP Access Gateway may propagate (at 425) the monitoring configuration data propagated towards these nodes over an interface such as the S2a/S2b interface.
- the 3GPP AAA server may provide (at 430) the monitoring configuration data over an interface such as the S6b interface.
- FIG. 5 conceptually illustrates a third exemplary embodiment of a method 500 for configuring event monitoring in a wireless communication system.
- Some embodiments of the method 500 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, SGSN 145, MME 155, SGW 150, PGW 140, HSS 125, and EMS 190.
- the EMS sends (at 505) a request message to the HSS/HLR to authorize (at 510) the monitoring configuration details.
- the HSS may authorize (at 510) the monitoring event ID provided in the request message.
- the HSS may then configure (at 51 0) event monitoring for the user equipment.
- the HSS may create, configure, modify, or remove a user profile that includes the event reporting information, as discussed herein.
- the HSS may download (at 515) monitoring configuration information to the SGSN/MME.
- the HSS may download (at 51 5) MTC Monitoring configuration information to the SGSN/MME as part of a user equipment subscription download procedure or other process, as discussed herein.
- Some embodi ments of the monitoring configuration may include information identifying the device to monitor (e.g., an IMSI), an I P address of the MCE, or a monitoring reference and information allowing the MCE to associate the monitoring reference with the (MTC) service being monitored.
- the HSS may also download (at 51 5), for each of the nodes that are required to monitor events, a list of events to monitor and optionally information indicating one or more actions to carry out in response to detecting one or more events in the list.
- the HSS may download (at 51 5) information indicating that the network entity should report the event, stop the service in response to detecting the event, or take some other action.
- the SGSN/MME may then be configured (at 520) using the information downloaded (at 515) from the HSS.
- the configured SGSN/MME may then be able to monitor activities associated with the user equipment to detect one or more of the events indicated in the monitoring configuration information, as discussed herein.
- Some embodiments may support monitoring events that involve monitoring at nodes in addition to or instead of the SGSN/MME.
- the monitoring configuration information may therefore be propagated (at 525) towards other nodes, as discussed herein.
- the additional nodes may then be configured (at 530) using the information in the request.
- the additional nodes may also further propagate the requests to other nodes in the same manner.
- the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium.
- the program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access.
- the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments of the claimed subject matter provide a method for supporting network monitoring of user equipment events. Some embodiments of the method include receiving, at a home subscriber server (HSS) in a public land mobile network (PLMN), a request to monitor one or more events associated with one or more users. The request is used to configure, activate, or deactivate delivery of reports from one or more entities in the PLMN to a monitor collection entity in response to the event(s). Some embodiments of the method also include configuring one or more profiles in the HSS associated with the user(s) based on the request and providing the request to monitor the event(s) associated with the user(s) to one or more serving nodes for user equipment associated with the user(s).
Description
NETWORK MONITORING OF USER EQUIPMENT EVENTS
CROSS REFERENCE TO RELATED APPLICATIONS
This application claims priority to U.S. Patent Application No. 13/673,413, filed on November 9, 2012.
BACKGROUND
This application relates generally to communication systems, and, more particularly, to wireless communication systems.
Wireless communication systems typically include a network of base stations that provide wireless connectivity to user equipment. User equipment may include devices such as cellular phones, smart phones, tablets, ultrabooks, laptops, wireless-enabled desktop computers, and the like. User equipment may also include machine type communication (MTC) devices. An MTC device is defined by the 3GPP TS 22.368 as user equipment equipped for Machine Type Communication. An MTC device can be one of the types of devices listed above {e.g., a smart phone) with an MTC application installed on it or the MTC device can be a device that is specific for an MTC purpose and communicates wirelessly to an MTC server, such as a water meter or health monitoring device. The MTC device communicates through a public land mobile network (PLMN) with MTC server(s) and/or other MTC device(s). Machine type communication is a form of data communication that involves one or more entities that do not necessarily need human interaction. A service optimised for machine type communications differs from a service optimised for human-to-human communications. For example, machine type communications differs from current mobile network communication services because machine type communication may involve different market scenarios, data communications, lower costs and effort, a potentially very large number of communicating terminals, and to a large extent, relatively little traffic per terminal.
SUMMARY OF EMBODIMENTS
The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
Conventional wireless communication systems support functionality to trace events related to user equipment in the system. For example, 3GPP systems can trace the activities of a device in response to a triggering event such as activating a packet data protocol (PDP) context. Gathering trace events may be particularly important for devices that implement machine type communication, since machine type communication does not necessarily need human intervention. However, tracing events gathers information related to all the activities related to the trace event of the device, which can cause a large amount of information to be collected (such as all the signaling messages related to the event) even though much of this information may not be of interest. Tracing does not provide the ability to limit monitoring to a particular event related to user equipment and reporting that the event occurred. Nodes that carry out tracing requests are not configured to take any action in response to detecting events during the tracing. Furthermore, trace functionality is implemented internally to the public land mobile network (PLMN) and therefore does not support third-party requests for monitoring of devices within the network. Other proposals for techniques for monitoring devices also have a number of drawbacks. For example, the Rx and Gx interfaces may be used to configure monitoring requirements in the packet Gateway (PGW) and to allow the PGW to send the monitoring events/notifications. However, transmitting the configuration information or the monitoring events/notifications over the control plane interfaces (Gx and Rx) and the the policy charging and rules function (PCRF)induces load on the Gx/Rx/PCRF control plane capabilities, which may potentially cause starvation of control plane resources (and a corresponding service delivery
degradation) when there are many monitoring events to report. For another example, associations between a user equipment's international mobile subscriber identity (IMSI) and its international mobile equipment identity (IMEI, IMEI-SV) may be checked at the home subscriber server (HSS) and reported to a monitoring entity with the aim of detecting new combination of IMEI-SV and IMSI, which may indicate the insertion of a universal subscriber identity module (USIM) in a different, potentially unauthorized or fraudulent device. For yet another example, a new T5 interface may be defined between the nodes serving the UE (such as the mobility management entity/ serving GPRS support node (MME/SGSN)) in the visited PLMN (VPLMN) and the machine type communication interworking function (MTC-IWF) in the home PLMN (HPLMN). The T5 interface may be used to support monitoring in conjunction with the Tsp interface. However, this approach does not support the case of a serving node failure that would induce the loss of a monitoring request and furthermore requires the definition of a new inter-PLMN interface (T5) inducing new inter operator testing and operation costs. The disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above.
In one embodiment, a method is provided for supporting network monitoring of user equipment events. Some embodiments of the method include receiving, at a home subscriber server (HSS) in a public land mobile network (PLMN), a request to monitor one or more events associated with one or more users. The request is used to configure, activate, or deactivate delivery of reports from one or more entities in the PLMN to a monitor collection entity in response to the event(s). Some embodiments of the method also include configuring one or more profiles in the HSS associated with the user(s) based on the request and providing the request to monitor the event(s) associated with the user(s) to one or more serving nodes for user equipment associated with the user(s)..
In another embodiment, a method is provided for supporting network monitoring of events. Some embodiments of the method include receiving, at a network entity in a public land mobile network (PLMN) and from a home subscriber server (HSS), a request to monitor one or more events associated with one or more users. Some embodiments of the method also include
configuring delivery of reports from the network entity to a monitor collection entity in response to the event(s). The request is received by the HSS in response to a request provided by an element management system (EMS) or a service capability server (SCS).
In yet another embodiment, a method is provided for supporting network monitoring of events. Some embodiments of the method include receiving, at a first node in a public land mobile network (PLMN) that serves user equipment associated with one or more users and from a home subscriber server (HSS), a request to monitor one or more events associated with one or more subscriptions associated with the user(s). Some embodiments of the method also include propagating the request towards one or more second nodes participating in PLMN service delivery to the user(s). The second node(s) are configurable to monitor one or more events associated with the subscription(s) on the basis of the request received from the first node.
In a further embodiment, a method is provided for supporting network monitoring of events. Some embodiments of the method include receiving, at a network entity in a public land mobile network (PLMN) that serves user equipment and from a home subscriber server (HSS), a request to monitor one or more events associated with a subscription associated with the user equipment. The request includes an address associated with a monitor collection entity. Some embodiments of the method also include detecting occurrence of one of the events and reporting the detected event to the monitor collection entity using the received address.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosed subject matter may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figure 1 conceptually illustrates one exemplary embodiment of a wireless communication system;
Figure 2 conceptually illustrates one exemplary embodiment of a user equipment monitoring profile that may be created, configured, modified, or stored by a home subscription server (HSS);
Figure 3 conceptually illustrates a first exemplary embodiment of a method for configuring event monitoring in a wireless communication system;
Figure 4 conceptually illustrates a second exemplary embodiment of a method for configuring event monitoring in a wireless communication system for embodiments in which the user equipment is served by a non-3GPP access network such as a wireless local area network (WLAN) or as a cdma2000 network; and
Figure 5 conceptually illustrates a third exemplary embodiment of a method for configuring event monitoring in a wireless communication system in which event monitoring information is provided by an element management server.
While the disclosed subject matter is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosed subject matter to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the appended claims.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Illustrative embodiments are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions should be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which will vary from one implementation to another.
Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure. The description and drawings merely illustrate the principles of the claimed subject matter. It should thus be appreciated that those skilled in the art may be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles described herein and may be included within the scope of the claimed subject matter. Furthermore, all examples recited herein are principally intended to be for pedagogical purposes to aid the reader in understanding the principles of the claimed subject matter and the concepts contributed by the inventor(s) to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions.
The disclosed subject matter is described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the description with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed subject matter. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e., a meaning other than that understood by skilled artisans, such a special definition is expressly set forth in the specification in a definitional manner that directly and unequivocally provides the special definition for the term or phrase. Additionally, the term, "or," as used herein, refers to a non-exclusive "or," unless otherwise indicated (e.g., "or else" or "or in the alternative"). Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to form new embodiments.
As discussed herein, conventional trace functionality and other proposals for monitoring devices in a wireless communication network have a number of significant drawbacks. At least in part to address or mitigate these drawbacks, embodiments of the techniques described herein allow service capability servers (SCS) to request monitoring of selected events for user equipment via the Tsp reference point between the SCS and an interworking function such as a machine type communication interworking function (MTC-IWF). The SCS can be internal or external to the PLMN. Some embodiments may store the monitoring configuration information provided by the SCS as part of the user equipment subscription information in the home subscriber server (HSS). Monitoring configuration information may also be dynamically provided by the SCS to configure, activate, or deactivate report delivery for monitoring events and user equipment. The monitoring configuration information may also be downloaded to other network entities (such as an SGSN or MME) together with the subscription information. When the monitoring configuration indicates that monitoring involves other nodes {e.g., Radio Access Nodes, serving gateway (SGW), packet gateway/gateway GPRS support node (PGW/GGSN)), the monitoring configuration may be transferred to the other nodes via new information added to existing protocols {e.g., S1 or S4/S1 1 and S5/S8 as defined in 3GPP specifications such as TS 23.401 ). Monitoring information collected in response to an event indicated in a monitoring request can be transmitted to a monitoring collection entity (MCE) via a monitoring collection interface and then stored in the monitoring collection entity. The SCS can be accessed by third-party content providers using application programming interfaces (APIs) and so third-party content providers may be able to request monitoring of scheduled events for user equipment via the SCS. The network provider may therefore support authentication and authorization of the monitoring requests as well as charging functionality to charge for the requested monitoring.
Figure 1 conceptually illustrates one exemplary embodiment of a wireless communication system 100. In the illustrated embodiment, the wireless communication system 100 implements a public land mobile network (PLMN) although other networks may be implemented instead of or in addition to this type
of network. Dotted line connections in Figure 1 indicate control plane pathways and solid line connections indicate user plane pathways. The portions of the PLMN depicted in Figure 1 include a home PLMN 105 for user equipment 1 10 and a visited PLMN 1 15. User equipment 1 10 is depicted in the visited PLMN 1 15. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that user equipment 1 10 may be free to roam between the home PLMN 105, the visited PLMN 1 15, or other network areas that are not depicted in Figure 1 . Some embodiments of user equipment 1 10 may implement one or more MTC applications 120. As discussed herein, the MTC application 120 performs machine type communication, which is a form of data communication that involves one or more entities that do not necessarily need human interaction. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that other embodiments of the wireless communication system 100 may include user equipment 1 10 that do not implement MTC applications 120. Persons of ordinary skill in the art having benefit of the present disclosure also appreciate that some embodiments of the techniques described herein may be used for monitoring devices that are not Machine Type devices. For example, some embodiments of the techniques described herein may be used to configure monitoring of events associated with smartphones.
Some embodiments of the user equipment 1 10 may implement a smartcard such as a universal integrated circuit card (UICC) 122 that may be used in mobile terminals in GSM and UMTS networks. The UICC 122 may be used to ensure the integrity and security of personal data and it typically holds a few hundred kilobytes. Specifications for the UICC 122 are found in ETSI TR 102 216. In a GSM network, the UICC 122 contains a subscriber identity module (SIM) application and in a UMTS network it is the USIM application. Some embodiments of the UICC 122 may contain several applications so that the UICC 122 can support access to both GSM and UMTS networks and provide storage of a phone book and other applications.
The home PLMN 105 shown in Figure 1 includes a home subscriber server (HSS) 125. The HSS 125, which may also be referred to as a User Profile
Server Function (UPSF), is a master user database that supports network entities that handle calls or data transmissions to or from user equipment 1 10. Some embodiments of the HSS 125 contain subscription-related information such as subscriber profiles associated with the user equipment 1 10. The HSS 125 may also perform authentication and authorization of the user and can provide information about the subscriber's location and IP information. Techniques for implementing or operating the HSS 125 are known in the art and only those aspects of implementing or operating the HSS 125 that are relevant to the claimed subject matter are discussed herein. The HSS 125 is physically, electromagnetically, or communicatively coupled to an authentication, authorization, and accounting server (AAA) 130. Authentication refers to the process of authenticating user equipment 1 10 or other entities, typically on the basis of a specific digital identity such as an identifier and the corresponding credentials. Examples of types of credentials are passwords, one-time tokens (such as used as part of the EAP-AKA type of authentication using the Authentication and Key Agreement type of algorithm defined by 3GPP), or digital certificates. The authorization function determines whether a particular entity is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service. Authorization may be determined based on a range of restrictions such as time- of-day restrictions, or physical location restrictions, or restrictions against multiple accesses by the same entity or user. Accounting refers to the tracking of network resource consumption by user equipment 1 10 or other entities for the purpose of capacity and trend analysis, cost allocation, or billing. In the illustrated embodiment, the AAA server 130 may include functionality for performing authentication, authorization, or accounting for user equipment 1 10 or MTC applications 120.
The home PLMN 105 may also include a charging data function (CDF) 135 that stores call detail records (CDR). The (CDF) addresses may be used for offline billing or online billing. The CDRs may be used to collect usage or billing information, which may then be sent to the billing system of the domain. Billing systems in different domains may exchange information so that roaming charges
can be applied. Some embodiments of the CDF 135 may be used to track resource usage associated with monitoring events so that requested event monitoring can be billed to third parties.
A gateway general packet radio service (GPRS) support node (GGSN) 140 may be implemented in the home PLMN 105. The GGSN 140 supports a Gn interface and supports the GPRS tunneling protocol. The GGSN 140 is responsible for the interworking between the GPRS network and external packet switched networks, like the Internet. The GGSN 140 may also support a packet data network (PDN) gateway (PGW) function such as the PGW function defined in 3GPP TS 23.401 that supports a S5/S8 interface and supports the GPRS tunneling protocol. The PGW/GGSN 140 provides connectivity from user equipment 1 10 to external packet data networks by being the point of exit and entry of traffic for user equipment 1 10. The PGW 140 performs policy enforcement, packet filtering for each user, charging support, lawful interception, and packet screening. The PGW 140 may also act as the anchor for mobility between 3GPP and non-3GPP technologies such as WLAN (Wi-Fi) and 3GPP2 {e.g., code division multiple access (CDMA) 1 X and evolution data optimized (EvDO)).
A serving GPRS support node (SGSN) 145 may be implemented in the visited PLMN 1 15. The SGSN 145 is responsible for the delivery of data packets from and to the mobile stations within its geographical service area, such as user equipment 1 10. Tasks supported by the SGSN 145 include packet routing and transfer, mobility management (attach/detach and location management), logical link management, and authentication and charging functions. The visited PLMN 1 15 also includes a serving gateway (SGW) 150. The SGW 150 routes and forwards user data packets, while also acting as the mobility anchor for the user plane during inter-eNodeB handovers. For idle state user equipment 1 10, the SGW 150 terminates the downlink data path and triggers paging when downlink data arrives for user equipment 1 10. The SGW 150 may also manage or store user equipment contexts, e.g. parameters of the IP bearer service, network internal routing information, and perform replication of the user traffic in case of lawful interception.
The visited PLMN 1 15 shown in Figure 1 includes a mobility management entity (MME) 155. The MME 155 may be a control-node for the LTE access network and may be responsible for idle mode tracking and paging of the user equipment 1 10. The MME 155 may also be involved in the bearer activation/deactivation process and may be responsible for choosing the SGW 150 for user equipment 1 10 at the initial attach and at time of intra-LTE handover involving Core Network (CN) node relocation. The MME 155 may also be responsible for authenticating user equipment 1 10 by interacting with the HSS 125. A mobile switching center (MSC) 160 processes requests for service connections from user equipment 1 10.
The visited PLMN 1 15 shown in Figure 1 also includes a radio access network (RAN) 165 that implements the radio access technology used to provide wireless connectivity to user equipment 1 10. Some embodiments of the radio access network 165 may include base stations, e-nodeBs (ENBs), base station routers, access points, femtocells, and the like. In the illustrated embodiment, the wireless communication system 100 supports control plane interfaces between the HSS 125 in the home PLMN 105 and the MSC 160, MME 155, and SGSN 145 in the visited PLMN 1 15.
Application servers 170 may interact with the wireless communication system 100 via service capability servers (SCS) 175. For example, third-party content providers may use one or more application servers 170 to access the capabilities of the wireless communication system 100 through Application Programming Interfaces (APIs) supported by the application servers 170. Some embodiments of the SCS 175 may be implemented externally to the PLMN, while other embodiments of the SCS 175 may be implemented internal to the PLMN. The SCS 175 may then communicate with other entities in the home PLMN 105 or the visited PLMN 1 15 via an interface (such as a Tsp interface) to the interworking function (IWF) 180 or an interface (such as a Gi/SGi) interface to the GGSN/PGW 140. In the illustrated embodiment, the IWF 180 may support machine type communication. The IWF may also support or control interfaces between the home PLMN 105 and the visited PLMN 1 15.
The wireless communication system 100 depicted in Figure 1 also includes an element management system (EMS) 190 that is physically, electromagnetically, or communicatively coupled to the HSS 125. The EMS 190 provides a package of end-user functions for management of a set of closely related types of network elements, as specified in 3GPP TS 21 .905. Some embodiments of the EMS 190 or the application server 170 may provide requests to monitor events associated with user equipment 1 10 or the MTC application 120. Some embodiments of the requests may be used to configure, activate, or deactivate delivery of event reports from entities in the home PLMN 105 or visited PLMN 1 15 to a monitor collection entity (MCE) 185. For example, the EMS 190 may provide a request to the HSS 125 to monitor events associated with the MTC application 120. The request may be determined based on a service provider agreement with the application provider for the SCS 175 or MTC application 120. For another example, the application server 170 may provide a request to monitor events associated with the MTC application 120 to the SCS 175, which may forward the request to the MTC-IWF 180. If the MTC-IWF 180 authorizes the request, the MTC-IWF 180 may then forward the information in the request to the HSS 125. In either case, the HSS 125 may use information in the request to configure a user profile or user subscription associated with user equipment 1 10 or the MTC application 120. The user profile may include information identifying the events to be monitored, as well as potentially indicating actions to be taken in response to detecting the event. Thus, in some embodiments, the events may be associated with a user or a user's subscription instead of (or in addition to) being associated with user equipment 1 10 or MTC application 120. This information may then be distributed to network entities, e.g. as part of a subscription download procedure.
In one embodiment, the monitoring configuration information may be statically stored in the HSS 125 as part of the subscription for user equipment 1 10 or the MTC application 120. This may apply to HPLMN based monitoring features. The monitoring configuration information may also be dynamically provided by the SCS 175. For example, the SCS 175 may send requests to the MTC-IWF 180 to configure, activate, or deactivate report delivery for a particular
monitoring event and a particular user equipment 1 10, MTC application 120, or group of user equipment/applications. After the MTC-IWF 180 has validated the request, the MTC-IWF 180 may provide updated subscription data to the HSS 125. The monitoring configuration information may also be downloaded by the HSS 125 to network entities serving the user equipment 1 10 such as the SGSN 145 or the MME 155 during a location update or Insert Subscriber data procedure. When the monitoring request requires the involvement of other nodes {e.g. ENB/RAN 165, SGW 150, or PGW/GGSN 140), the SGSN 145 or the MME 155 may propagate the monitoring request information towards these nodes. For example, the monitoring request information may be provided using connection related signaling such as GTP-c {e.g. 3GPP TS 29.274) or signaling associated with an UE {e.g. over the S1 or IU interfaces) from the Serving Node (MME or SGSN) to the Radio Access Network (e.g. eNB, RNC, ...). Even if the serving SGSN 145 or MME 155 node fails or is changed due to mobility, the delivery of subscriber data may ensure that the new serving node receives the monitoring requirements. Monitoring requirements may also be sent to the PGW 140 from AAA server 130 over the S6b interface to support cases where such information cannot be transferred over user connection related signaling {e.g. in case proxy mobile IPv6 (PMIP) is used to contact the PGW) as in some cases of non-3GPP access to the evolved packet core (EPC).
Some embodiments of the monitoring configuration information may contain the Internet Protocol (IP) address of the MCE 185 so that network entities can report the events by addressing them to the MCE 185. Some embodiments may also support the event monitoring feature in the roaming scenario, in which case a Monitoring Collection Interface may be deployed to support roaming, e.g. by providing an interface for carrying reports between the MCE 180 in the home network and the roaming network. The configured network entities may then monitor activities of user equipment 1 10 or the MTC application 120 to detect the events indicated in the user profile. The configured network entities may generate reports in response to detecting one or more of the events indicated in the request and the reports may be delivered to the monitor collection entity 185.
Configuring the event-specific monitoring of events associated with users, user subscriptions, user equipment 1 10, or the MTC application 120 may allow network operators or third party application providers to monitor specific events related to users, user subscriptions, user equipment 1 10, or MTC application 120. The monitoring and reporting of event-specific information may aid in early detection of problems with user equipment 1 10 or MTC application 120. Some events can also aid in determining whether user equipment 1 10 or MTC application 120 is being vandalized or stolen. Furthermore, embodiments of the techniques described herein do not require creation of new inter-PLMN interfaces to configure the monitoring or report the monitoring events. Some embodiments of the event monitoring may be implemented without loading the signaling interfaces with monitoring events.
Some embodiments of the wireless communication system 100 may also support charging of third parties for monitoring services. For example, information indicating that user equipment 1 10 or MTC application 120 is associated with one or more event monitoring services may be provided to the CDF 135 and stored in an associated CDR. Resource usage associated with the event monitoring may be recorded by the CDF 135 using information provided by other network entities and the resource usage may be used for billing purposes. Figure 2 conceptually illustrates one exemplary embodiment of a user equipment monitoring profile 200 that may be created, configured, modified, or stored by a home subscription server (HSS). Some embodiments of the profile 200 may be created in response to the application server 170 shown in Figure 1 transmitting a monitoring request to the SCS 175, which may provide information in the request to the HSS 125 via the MTC-IWF 180, as discussed herein. Some embodiments of the profile 200 may be created in response to the EMS 190 shown in Figure 1 transmitting a monitoring request to the HSS 125. The profile 200 includes the IMSI and IMEI-SV that are used to identify the user equipment associated with the profile. However, some embodiments of the profile 200 may not include both the IMSI and the IMEI-SV and may instead use either the IMSI or the IMEI-SV or some other identifier to identify the user equipment.
The profile 200 also includes information indicating one or more events associated with the user, the user's subscription, the user equipment, or an MTC application that may be monitored. In the illustrated embodiment, the monitoring profile 200 includes information indicating that network entities may monitor activities associated with the user equipment to detect events indicating behavior that is not aligned with activated MTC feature(s), events indicating a change of the association between user equipment and the UlCC installed in the user equipment, or loss of connectivity between the user equipment and the network. Loss of connectivity means it is no longer possible to establish signaling between the user equipment (or associated MTC application) and the network, e.g., when the user equipment is detached from the network. In one embodiment, the maximum time between the time at which the actual loss of connectivity occurred and the time at which the network entity identifies an event indicating the loss of connectivity may be configurable per subscription. For example, the maximum detection time that elapses before the network entity concludes that loss of connectivity has occurred may be configured to be on the order of 1 minute to 1 hour. Some embodiments of the monitoring profile 200 may also include information indicating that network entities should monitor activities associated with the user equipment to detect communication failure events and reasons for the failure events {e.g., connection error codes for troubleshooting), change of the location of the user equipment, change of the geographical position of the user equipment, or change of the point of attachment in the network of the user equipment. Persons of ordinary skill in the art having benefit of the present disclosure should appreciate that this exemplary list of monitoring events is not intended to be exhaustive and some embodiments may define or monitor other events that are not listed herein.
Some embodiments of the profile 200 may also include information indicating whether monitoring of a particular event has been activated. For example, the profile 200 depicted in Figure 2 indicates that monitoring of events indicating misaligned behavior and changes in the UE-UICC association have been activated. Monitoring of events indicating loss of connectivity or a change in the point-of-attachment of the user equipment have not been activated in the
embodi ment of the profile 200 depicted in Figure 2. Monitoring of user equipment events may be activated or deactivated using information provided by application servers. For example, the application server 1 70 shown in Figure 1 may provide a monitoring request to activate monitoring of events related to loss of connectivity in the user equipment associated with the profile 200. Monitoring of user equipment events may also be activated or deactivated using information provided by EMS 1 90. The request may be forwarded to the HSS 1 25, which may then modify the profile 200 to activate monitoring of events associated with loss of connectivity. In the illustrated embodiment, a subscriber may be able to define which of the above events should be monitored and detected. For example, upon detecting one of the active events indicated in the profile 200, an MTC subscriber may indicate that the network should provide a warning notification to an associated MTC server. Some embodiments of the profile 200 may also include information that indicates actions that may be taken in response to detecting the events listed in the profile 200. For example, the network may be configured to limit the services provided to the MTC device, e.g. by reducing the resources allocated to the user equipment in response to detecting certain events. The subscriber or user may also be able to define what actions may be taken when an event is detected. Some embodiments of the MTC device may be able to transfer other event notifications to the MTC server when the event detection is out of 3GPP scope, for example, notifications that indicate that the MTC device power level is lower than a threshold or the loss of signal reception. Loss of signal reception refers to a situation when a MTC device can no longer receive the network which could be due to interference (e.g. from a jammer or other source) or other reasons.
The profile 200 may include information indicating one or more actions that may be undertaken by the monitoring entity in response to detecting the event. For example, the profile 200 shown in Figure 2 includes information indicating whether the service provided to the user should be stopped in response to detecting the event. The profile 200 indicates that the server should be stopped in response to detecting misaligned behavior or a change in the UE-UICC
association. The profile 200 also indicates that the server should not take any action in response to detecting loss of connectivity or a change point for the user equipment. However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that the actions depicted in Figure 2 are exemplary and some embodiments may include information indicating different actions or combinations of actions that are to be performed in response to detecting the different events.
Figure 3 conceptually illustrates a first exemplary embodiment of a method 300 for configuring event monitoring in a wireless communication system. Some embodiments of the method 300 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, SGSN 145, MME 155, SGW 150, PGW 140, HSS 125, MTC-IWF 180, and SCS 175. In the illustrated embodiment, the SCS sends (at 305) a Monitoring Action Request message over the Tsp interface to the MTC-IWF with the Action Type field in the message set to a value that indicates whether report delivery for a particular monitoring event is to be configured, activated, or deactivated. The SCS may also provide (at 305) information in the monitoring request message such as the identity of the device to monitor or of a group of devices to monitor. For example, the identifying information may correspond to external identities that may be translated to PLMN identities {e.g. IMSI). The SCS may also provide (at 305) information indicating a monitoring reference, the IP address of a monitoring collection entity (such as the MCE 185 shown in Figure 1 ), a list of events to monitor (which may be indicated by one or more Monitoring Event IDs), and optionally an associated action to carry out in response to the event. For example, information may indicate that a network entity should report a detected event, cancel the service in response to detecting the event, disable the device in response to detecting the event, or some other action.
The MTC-IWF determines (at 310) whether the SCS is authorized to send monitoring requests and determines (at 310) whether the SCS has exceeded its quota or rate of submitting monitoring requests over Tsp, e.g., the MTC-IWF performs (at 310) load control for the SCS. If either determination fails (at 310), the MTC-IWF sends (at 315) a Monitoring Action Answer message with a cause
value indicating the reason for the failure condition and the flow stops at step 315. Otherwise, the flow continues with step 320.
The MTC-IWF sends (at 320) a Subscriber Information Request message to the HSS/ home location register (HLR) to authorize (at 325) the monitoring configuration details. For example, the HSS may authorize (at 325) the monitoring event ID provided in the subscriber information request message. If the HSS authorizes (at 325) the monitoring configuration details, the HSS may then configure (at 325) event monitoring for the user equipment. Some embodiments of the HSS may translate the external identifier into an internal identifier (IMSI), if necessary, and then the monitoring events may be configured (at 325) in the HSS as part of the user equipment subscription data. For example, the HSS may create, configure, modify, or remove the user profile that includes the event reporting information, as discussed herein. The HSS may also verify (at 325) the monitoring event information and authorize (at 330) the MTC- IWF to configure the network element for monitoring. If this check fails, the MTC- IWF may receive (at 330) a negative feedback from the HSS and send (at 335) a Monitoring Action Answer message with a cause value indicating the reason for the failure condition. In this case the flow stops at step 335. Otherwise, the flow continues at step 340.
The HSS may download (at 340) monitoring configuration information to the SGSN/MME. For example, the HSS may download (at 340) MTC Monitoring configuration information to the SGSN/MME as part of a user equipment subscription download procedure, e.g. during an Attach/routing area update (RAliytracking area update (TAU) procedure or as part of an Insert Subscriber Data procedure initiated by the HSS towards the nodes serving user equipment that are subject to monitoring. For example, the monitoring event information may be propagated (at 340) from the HSS to the MME by including the information in enhanced trace configuration parameters of the S6a-lnsert subscriber data message or the S6a-Update Location Answer message. For another example, the monitoring event information may be propagated (at 340) from the HSS to the SGSN by including the information into enhanced trace configuration parameters of the MAP-ACTIVATE_TRACE_MODE message.
Some embodiments of the SGSN may further propagate monitoring event information to other nodes such as the GGSN by sending a GTP- C R EAT E_P D P_CO NT EXT_R EQ U EST message or an
UPDATE_PDP_CONTEXT_REQU EST for events that are activated while the PDP context is active. Some embodiments of the MME and SGSN may further propagate monitoring event information to other nodes such as SGW or/and PGW by sending a GTPv2-C CREATE SESSION REQU EST message or an enhanced TRACE SESSION ACTIVATION message (for events activated while the PDN connection is established) over the S1 1 /S4 and S5/S8 interfaces. Some embodiments of the monitoring configuration may include information identifying the device to monitor (e.g., an IMSI), an I P address of the MCE, or a monitoring reference and information allowing the MCE to associate the monitoring reference with the (MTC) service being monitored. This information may be opaque to the PLMN nodes reporting monitoring events but may be provided when sending notifications to the MCE. The HSS may also download (at 340), for each of the nodes that are required to monitor events, a list of events to monitor and optionally information indicating one or more actions to carry out in response to detecting one or more events in the list. For example, the HSS may download (at 340) information indicating that the network entity should report the event, cancel the service in response to detecting the event, or take some other action.
The SGSN/MME may then be configured (at 345) using the information downloaded (at 340) from the HSS. The configured SGSN/MME may then be able to monitor activities associated with the user equipment to detect one or more of the events indicated in the monitoring configuration information. In some embodi ments, the target SGSN/MME may receive MTC Monitoring configuration when the serving SGSN/MME changes, e.g., during handover of user equipment. The MTC monitoring configuration may be stored in the user equipment context and exchanged between source and target SGSNs/MMEs or the target SGSN/MME may fetch the MTC monitoring configuration information from the HSS as part of subscriber data.
Some embodiments may support monitoring events that involve monitoring at nodes in addition to or instead of the SGSN/MME. The monitoring configuration information may therefore be propagated (at 350) towards other nodes {e.g. the ENB/RAN 165, SGW 150, or PGW/GGSN 140 shown in Figure 1 ). For example, the serving node (SGSN/MME) may transmit (at 350) a request to monitor events associated with the user equipment to one or more additional serving nodes. The request may ask the additional serving node to monitor the same events that are being monitored by the serving node (SGSN/MME) or the request may be to monitor a subset of the events that are being monitored by the serving node (SGSN/MME). Embodiments of the request may include information identifying the events, an address of the monitoring collection entity for transmitting/collecting event reports, or possible actions to be taken in response to the event. The additional nodes {e.g. the ENB/RAN 165, SGW 150, or PGW/GGSN 140 shown in Figure 1 ) may then be configured (at 355) using the information in the request. The additional nodes may also further propagate the requests to other nodes in the same manner.
Figure 4 conceptually illustrates a second exemplary embodiment of a method 400 for configuring event monitoring in a wireless communication system. Some embodiments of the method 400 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, PGW 140, AAA 130, HSS 125, MTC-IWF 180, and SCS 175. However, the second exemplary embodiment differs from the first exemplary embodiment shown in Figure 3 because the user equipment is accessing the wireless communication system via non-3GPP network elements. In the illustrated embodiment, an event monitoring request is provided by the SCS, e.g., in response to a request from a third party application server. The event monitoring requests may be authorized (at 405) and used to configure (at 405) the user profile in the HSS, as discussed herein. Some embodiments of the authorization/configuration process (at 405) may proceed in a manner analogous to steps 305, 310, 315, 320, 325, 330, 335 shown in Figure 3.
Once the HSS has been updated (at 405) with the configuration data for user equipment, as indicated in the monitoring request message received
from the SCS, and the 3GPP AAA server has registered in the HSS as serving the user equipment for either a trusted or un-trusted non-3GPP access, the HSS updates (at 410) the 3GPP AAA server by providing the monitoring configuration data over an interface such as the SWx interface. Alternatively, the HSS may provide (at 410) the monitoring configuration data to the 3GPP AAA server in response to the HSS receiving a request to register the 3GPP AAA Server serving this user equipment for a trusted or un-trusted non-3GPP access.
The 3GPP AAA server may then provide (at 415) monitoring configuration data to a Non-3GPP Access Gateway such as a high rate packet date (HRPD) serving gateway (HSGW) or cdma2000, a TWAN for Trusted WLAN, an ePDG for non-trusted access to 3GPP, and the like. For example, the 3GPP AAA server may provide (at 415) the monitoring configuration data as part of user equipment subscription download procedure {e.g. during the Authentication and Authorization procedure) or as part of a Re-Authorization procedure initiated by the 3GPP AAA server {e.g., when the 3GPP AAA server receives the monitoring configuration data during an on-going non-3GPP Access session). If the monitoring requires the involvement of a PGW and a GTP based interface to the PGW is supported, the non-3GPP Access Gateway may propagate (at 425) the monitoring configuration data propagated towards these nodes over an interface such as the S2a/S2b interface. When the monitoring requires the involvement of the PGW and a PMIP based interface to the PGW is supported, the 3GPP AAA server may provide (at 430) the monitoring configuration data over an interface such as the S6b interface.
Figure 5 conceptually illustrates a third exemplary embodiment of a method 500 for configuring event monitoring in a wireless communication system. Some embodiments of the method 500 may be implemented in entities deployed in the wireless communication system 100 shown in Figure 1 such as user equipment 1 10, SGSN 145, MME 155, SGW 150, PGW 140, HSS 125, and EMS 190. In the illustrated embodiment, the EMS sends (at 505) a request message to the HSS/HLR to authorize (at 510) the monitoring configuration details. For example, the HSS may authorize (at 510) the monitoring event ID provided in the request message. If the HSS authorizes (at 510) the monitoring configuration
details, the HSS may then configure (at 51 0) event monitoring for the user equipment. For example, the HSS may create, configure, modify, or remove a user profile that includes the event reporting information, as discussed herein.
The HSS may download (at 515) monitoring configuration information to the SGSN/MME. For example, the HSS may download (at 51 5) MTC Monitoring configuration information to the SGSN/MME as part of a user equipment subscription download procedure or other process, as discussed herein. Some embodi ments of the monitoring configuration may include information identifying the device to monitor (e.g., an IMSI), an I P address of the MCE, or a monitoring reference and information allowing the MCE to associate the monitoring reference with the (MTC) service being monitored. The HSS may also download (at 51 5), for each of the nodes that are required to monitor events, a list of events to monitor and optionally information indicating one or more actions to carry out in response to detecting one or more events in the list. For example, the HSS may download (at 51 5) information indicating that the network entity should report the event, stop the service in response to detecting the event, or take some other action.
The SGSN/MME may then be configured (at 520) using the information downloaded (at 515) from the HSS. The configured SGSN/MME may then be able to monitor activities associated with the user equipment to detect one or more of the events indicated in the monitoring configuration information, as discussed herein. Some embodiments may support monitoring events that involve monitoring at nodes in addition to or instead of the SGSN/MME. The monitoring configuration information may therefore be propagated (at 525) towards other nodes, as discussed herein. The additional nodes may then be configured (at 530) using the information in the request. The additional nodes may also further propagate the requests to other nodes in the same manner.
Portions of the disclosed subject matter and corresponding detailed description are presented in terms of software, or algorithms and symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in
the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, or as is apparent from the discussion, terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical, electronic quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices. Note also that the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium. The program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access. Similarly, the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings
herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.
Claims
1 . A method, comprising:
receiving, at a home subscriber server (HSS) in a public land mobile network (PLMN), a request to monitor at least one event associated with at least one user, wherein the request is used to configure, activate, or deactivate delivery of reports from at least one entity in the PLMN to a monitor collection entity in response to said at least one event; and
configuring at least one profile in the HSS associated with said at least one user based on the request; and
providing the request to monitor said at least one event associated with said at least one user to at least one serving node associated with said at least one user.
2. The method of claim 1 , wherein the request to monitor said at least one event associated with said at least one user is provided by an element management system (EMS) within the PLMN or an external entity and has been validated by an interworking function that supports and controls an interface between the PLMN and non PLMN entities.
3. The method of claim 1 , wherein said at least one user is associated with user equipment that supports at least one machine type communication (MTC) application, and wherein receiving the request comprises receiving a request to monitor at least one event associated with the MTC application, and wherein receiving the request comprises receiving a request to monitor an event indicating at least one of behavior that is not aligned with an activated MTC feature associated with the MTC application, a change in an association between the user equipment and a smart card, loss of connectivity, a communication failure, a change in geographical position of the user equipment, or a change in a point of attachment of the user equipment.
4. A method, comprising:
receiving, at a network entity in a public land mobile network (PLMN) and from a home subscriber server (HSS), a request to monitor at least one event associated with at least one user; and
configuring delivery of reports from the network entity to a monitor collection entity in response to said at least one event, wherein the request is received by the HSS in response to a request provided by at least one of an element management system (EMS) or a service capability server (SCS).
5. The method of claim 4, wherein said at least one user is associated with user equipment that supports at least one machine type communication (MTC) application, and wherein receiving the request comprises receiving a request to monitor at least one event associated with the MTC application, and wherein receiving the request comprises receiving a request to monitor an event indicating at least one of behavior that is not aligned with an activated MTC feature associated with the MTC application, a change in an association between the user equipment and a smart card, loss of connectivity, a communication failure, a change in geographical position of the user equipment, or a change in a point of attachment of the user equipment.
6. The method of claim 4, wherein receiving the request comprises receiving a request indicating at least one action to be taken by the network entity in response to said at least one event, and further comprising taking said at least one action in response to detecting said at least one event associated with user equipment.
7. A method, comprising:
receiving, at a first node in a public land mobile network (PLMN) that serves user equipment associated with at least one user and from a home subscriber server (HSS), a request to monitor one or more events associated with at least one subscription associated with said at least one user;
propagating the request towards at least one second node participating in PLMN service delivery to said at least one user, wherein said at least one second
node is configurable to monitor one or more events associated with said at least one subscription on the basis of the request received from the first node.
8. The method of claim 7, wherein the request comprises an address indicating a monitor collection entity that can be used to configure delivery of reports to the monitor collection entity in response to said at least one event.
9. The method of claim 7, wherein said at least one user is associated with user equipment that supports at least one machine type communication (MTC) application, and wherein receiving the request comprises receiving a request to monitor at least one event associated with the MTC application, and wherein receiving the request comprises receiving a request to monitor an event indicating at least one of behavior that is not aligned with an activated MTC feature associated with the MTC application, a change in an association between the user equipment and a smart card, loss of connectivity, a communication failure, a change in geographical position of the user equipment, or a change in a point of attachment of the user equipment.
10. A method, comprising:
receiving, at a network entity in a public land mobile network (PLMN) that serves user equipment and from a home subscriber server (HSS), a request to monitor one or more events associated with a subscription associated with said user equipment, wherein the request comprises an address associated with a monitor collection entity;
detecting occurrence of at least one first event of the one or more events; and
reporting said at least one first event to the monitor collection entity using the received address.
1 1 . The method of claim 10, wherein the user equipment supports at least one machine type communication (MTC) application, and wherein receiving the request comprises receiving a request to monitor at least one event associated with the MTC application, and wherein receiving the request comprises receiving
a request to monitor an event indicating at least one of behavior that is not aligned with an activated MTC feature associated with the MTC application, a change in an association between the user equipment and a smart card, loss of connectivity, a communication failure, a change in geographical position of the user equipment, or a change in a point of attachment of the user equipment.
12. The method of claim 10, comprising propagating the request towards at least one other network entity, wherein the other network entity is configurable to monitor one or more events associated with the subscription on the basis of the request received from the network entity.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201380058641.6A CN104798395B (en) | 2012-11-09 | 2013-10-31 | For the network monitor of user equipment event |
US14/407,669 US20150234680A1 (en) | 2012-11-09 | 2013-10-31 | Task control device |
EP13795039.0A EP2918094B1 (en) | 2012-11-09 | 2013-10-31 | Network monitoring of user equipment events |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/673,413 US8989729B2 (en) | 2012-11-09 | 2012-11-09 | Network monitoring of user equipment events |
US13/673,413 | 2012-11-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014074380A1 true WO2014074380A1 (en) | 2014-05-15 |
Family
ID=49627047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2013/067676 WO2014074380A1 (en) | 2012-11-09 | 2013-10-31 | Network monitoring of user equipment events |
Country Status (4)
Country | Link |
---|---|
US (4) | US8989729B2 (en) |
EP (1) | EP2918094B1 (en) |
CN (1) | CN104798395B (en) |
WO (1) | WO2014074380A1 (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12099752B2 (en) | 2011-07-27 | 2024-09-24 | Pure Storage, Inc. | Error prediction based on correlation using event records |
US11016702B2 (en) * | 2011-07-27 | 2021-05-25 | Pure Storage, Inc. | Hierarchical event tree |
US8913518B2 (en) | 2012-08-03 | 2014-12-16 | Intel Corporation | Enhanced node B, user equipment and methods for discontinuous reception in inter-ENB carrier aggregation |
US9191828B2 (en) | 2012-08-03 | 2015-11-17 | Intel Corporation | High efficiency distributed device-to-device (D2D) channel access |
US9036603B2 (en) | 2012-08-03 | 2015-05-19 | Intel Corporation | Network assistance for device-to-device discovery |
US9554296B2 (en) * | 2012-08-03 | 2017-01-24 | Intel Corporation | Device trigger recall/replace feature for 3GPP/M2M systems |
US9526022B2 (en) | 2012-08-03 | 2016-12-20 | Intel Corporation | Establishing operating system and application-based routing policies in multi-mode user equipment |
US8923880B2 (en) * | 2012-09-28 | 2014-12-30 | Intel Corporation | Selective joinder of user equipment with wireless cell |
CN103781015A (en) * | 2012-10-17 | 2014-05-07 | 中兴通讯股份有限公司 | Method and system for monitoring machine type communication device events, and network side |
US8989729B2 (en) * | 2012-11-09 | 2015-03-24 | Alcatel Lucent | Network monitoring of user equipment events |
WO2014087643A1 (en) | 2012-12-06 | 2014-06-12 | Nec Corporation | Mtc key management for sending key from network to ue |
WO2014097572A1 (en) * | 2012-12-21 | 2014-06-26 | 日本電気株式会社 | Mtc-iwf entity, scs entity, signaling method, and computer-readable medium |
US20140331296A1 (en) * | 2013-05-01 | 2014-11-06 | Qualcomm Incorporated | Mechanism for gateway discovery layer-2 mobility |
EP3024259B1 (en) * | 2013-08-15 | 2018-10-03 | Huawei Technologies Co., Ltd. | Data routing method and device |
JP6394602B2 (en) * | 2013-08-22 | 2018-09-26 | 日本電気株式会社 | MTC-IWF entity, SCS entity, PCRF entity, and communication method |
US9479934B2 (en) * | 2013-12-13 | 2016-10-25 | Parallel Wireless, Inc. | Virtualization of the evolved packet core to create a local EPC |
EP3094157B1 (en) * | 2014-01-09 | 2018-09-19 | Nec Corporation | Mtc-iwf entity, pcrf entity, and control method |
US10904946B2 (en) | 2014-03-31 | 2021-01-26 | Convida Wireless, Llc | Overload control and coordination between M2M service layer and 3GPP networks |
US10136284B2 (en) * | 2014-07-07 | 2018-11-20 | Convida Wireless, Llc | Coordinated grouping for machine type communications group based services |
US9914364B2 (en) * | 2014-12-02 | 2018-03-13 | Aerovironment, Inc. | System for charging an electric vehicle (EV) |
CN105991363B (en) | 2015-02-12 | 2020-11-03 | 中兴通讯股份有限公司 | Monitoring processing method and device |
CN107258095B (en) * | 2015-03-27 | 2021-10-15 | 英特尔公司 | Location information for WLAN voice emergency calls |
US10021623B2 (en) * | 2015-04-21 | 2018-07-10 | Parallel Wireless, Inc. | SIM whitelisting and multi-operator core networks |
CN107637101B (en) * | 2015-05-14 | 2021-07-06 | 瑞典爱立信有限公司 | System and method for providing monitoring service |
US9930516B2 (en) * | 2015-05-15 | 2018-03-27 | Samsung Electronics Co., Ltd. | UE monitoring configuration method and apparatus |
WO2017041306A1 (en) * | 2015-09-11 | 2017-03-16 | 华为技术有限公司 | Profile processing method, profile processing apparatus, user terminal and euicc |
EP3351028A1 (en) | 2015-09-18 | 2018-07-25 | Telefonaktiebolaget LM Ericsson (PUBL) | Network nodes and methods therein for enabling events triggered by a wireless device to be reported in a wireless communications network |
US9609613B1 (en) | 2015-09-25 | 2017-03-28 | At&T Intellectual Property I, L.P. | Method and apparatus for managing communication services using multiple subscription agreements |
US10129689B2 (en) | 2015-11-02 | 2018-11-13 | Definition Networks, Inc. | Systems and methods for machine-type communication |
US10320791B2 (en) * | 2015-12-29 | 2019-06-11 | Nokia Of America Corporation | Method and apparatus for facilitating access to a communication network |
US10880710B2 (en) | 2016-01-18 | 2020-12-29 | Samsung Electronics Co., Ltd. | Method and apparatus for communication of terminal in mobile communication system |
US10491502B2 (en) * | 2016-06-29 | 2019-11-26 | Nicira, Inc. | Software tap for traffic monitoring in virtualized environment |
JP6751231B2 (en) * | 2016-07-07 | 2020-09-02 | 富士通株式会社 | Job scheduler test program, job scheduler test method, and parallel processing device |
EP3577939A1 (en) * | 2017-02-06 | 2019-12-11 | Nokia Technologies Oy | Adding scef to mf in nhn access mode |
CN109792612B (en) * | 2017-04-18 | 2021-10-22 | 华为技术有限公司 | Synchronization method, device and system for terminal monitoring information |
US11394701B2 (en) | 2017-11-01 | 2022-07-19 | Hewlett-Packard Development Company, L.P. | Non-compliance event notifications to companion devices |
US10313883B2 (en) * | 2017-11-06 | 2019-06-04 | Oracle International Corporation | Methods, systems, and computer readable media for using authentication validation time periods |
EP3791620B1 (en) * | 2018-05-11 | 2024-08-07 | Telefonaktiebolaget LM Ericsson (publ.) | Methods and apparatuses for capability exposure |
WO2020073577A1 (en) * | 2018-10-09 | 2020-04-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for supporting event monitoring |
US10750358B1 (en) | 2019-02-07 | 2020-08-18 | Hewlett Packard Enterprise Development Lp | Managing clustered subscriptions |
US11109339B2 (en) * | 2019-02-21 | 2021-08-31 | At&T Intellectual Property I, L.P. | Pre-provisioned access management containers for wireless services |
KR20220001295A (en) * | 2020-06-29 | 2022-01-05 | 에스케이텔레콤 주식회사 | Base staion apparatus and control method thereof |
US20230065972A1 (en) * | 2021-08-31 | 2023-03-02 | Rakuten Mobile, Inc. | End-to-end public land mobile network performance analysis |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4414624A (en) * | 1980-11-19 | 1983-11-08 | The United States Of America As Represented By The Secretary Of The Navy | Multiple-microcomputer processing |
US5379432A (en) * | 1993-07-19 | 1995-01-03 | Taligent, Inc. | Object-oriented interface for a procedural operating system |
US6058303A (en) * | 1996-08-30 | 2000-05-02 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for subscriber activity supervision |
US7499425B2 (en) * | 2001-11-09 | 2009-03-03 | Panasonic Corporation | Methods for ensuring medium access in a wireless network |
US7440973B2 (en) * | 2004-07-29 | 2008-10-21 | Oracle International Corporation | Systems, methods and software for automating database tasks |
DE602005000669T2 (en) * | 2004-09-27 | 2007-11-29 | International Business Machines Corp. | System and method for dynamic scheduling of tasks depending on the position of a mobile user |
KR100509794B1 (en) * | 2005-03-09 | 2005-08-23 | 주식회사 퓨전소프트 | Method of scheduling jobs using database management system for real-time processing |
EP1720320B1 (en) * | 2005-05-04 | 2008-11-26 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | A method and arrangement for handling client-related information in an application server |
US8234388B2 (en) * | 2005-07-29 | 2012-07-31 | Verizon Patent And Licensing Inc. | Application service invocation based on filter criteria |
US8032889B2 (en) * | 2006-04-05 | 2011-10-04 | Maxwell Technologies, Inc. | Methods and apparatus for managing and controlling power consumption and heat generation in computer systems |
US8826281B2 (en) * | 2006-11-07 | 2014-09-02 | Microsoft Corporation | Managing document publication using time-driven job scheduling |
US20100115048A1 (en) * | 2007-03-16 | 2010-05-06 | Scahill Francis J | Data transmission scheduler |
US8483701B2 (en) * | 2009-04-28 | 2013-07-09 | Pine Valley Investments, Inc. | System and method for controlling congestion in cells within a cellular communication system |
KR20120070438A (en) * | 2010-12-21 | 2012-06-29 | 한국전자통신연구원 | Control methods for machine type communication devices and wireless communication system using the method |
US8700027B2 (en) * | 2011-02-11 | 2014-04-15 | Alcatel Lucent | Method and apparatus for network analysis |
CN102740400B (en) * | 2011-04-07 | 2016-08-10 | 宏达国际电子股份有限公司 | The method that the device of handling machine kenel communication triggers |
US8886976B2 (en) * | 2011-04-11 | 2014-11-11 | Microsoft Corporation | Management of background tasks |
US8989729B2 (en) * | 2012-11-09 | 2015-03-24 | Alcatel Lucent | Network monitoring of user equipment events |
-
2012
- 2012-11-09 US US13/673,413 patent/US8989729B2/en active Active
-
2013
- 2013-10-31 US US14/407,669 patent/US20150234680A1/en not_active Abandoned
- 2013-10-31 EP EP13795039.0A patent/EP2918094B1/en active Active
- 2013-10-31 WO PCT/US2013/067676 patent/WO2014074380A1/en active Application Filing
- 2013-10-31 CN CN201380058641.6A patent/CN104798395B/en active Active
-
2015
- 2015-03-12 US US14/656,013 patent/US9439058B2/en active Active
-
2016
- 2016-08-03 US US15/227,419 patent/US20160345157A1/en not_active Abandoned
Non-Patent Citations (4)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Subscriber and equipment trace; Trace control and configuration management (Release 11)", 3GPP STANDARD; 3GPP TS 32.422, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG5, no. V11.5.0, 21 September 2012 (2012-09-21), pages 1 - 124, XP050649701 * |
HUAWEI ET AL: "Updates for monitoring via PCC and HSS", vol. SA WG2, no. New Orleans, USA; 20121112 - 20121116, 6 November 2012 (2012-11-06), XP050684095, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_94_New_Orleans/Docs/> [retrieved on 20121106] * |
ZTE ET AL: "Report MTC Monitoring Event using T5 and Tsp", vol. SA WG2, 12 October 2012 (2012-10-12), XP050683710, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_93_Sofia/Docs/> [retrieved on 20121012] * |
ZTE ET AL: "Update T5-Tsp based Monitoring Solution", vol. SA WG2, no. New Orleans, USA; 20121112 - 20121116, 6 November 2012 (2012-11-06), XP050684056, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_94_New_Orleans/Docs/> [retrieved on 20121106] * |
Also Published As
Publication number | Publication date |
---|---|
US8989729B2 (en) | 2015-03-24 |
US20140134996A1 (en) | 2014-05-15 |
CN104798395A (en) | 2015-07-22 |
EP2918094B1 (en) | 2022-01-19 |
US20160345157A1 (en) | 2016-11-24 |
CN104798395B (en) | 2019-08-23 |
US9439058B2 (en) | 2016-09-06 |
US20150234680A1 (en) | 2015-08-20 |
US20150189491A1 (en) | 2015-07-02 |
EP2918094A1 (en) | 2015-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9439058B2 (en) | Home subscriber server | |
AU2022263450B2 (en) | Internet of things services architecture | |
US10694046B2 (en) | Method and system for charging information recording in device to device (D2D) communication | |
US9166950B2 (en) | System and method for responding to aggressive behavior associated with wireless devices | |
US9326173B2 (en) | Methods and apparatus for machine-to-machine based communication service classes | |
JP5544428B2 (en) | Access control according to policies defined for associated electronic device groups including cellular modems | |
US20110217979A1 (en) | Methods, systems, and computer readable media for managing the roaming preferences of mobile subscribers | |
US9591560B2 (en) | Temporary credential assignment when connecting to roaming wireless networks | |
EP2939458B1 (en) | A system and method for responding to aggressive behavior associated with wireless devices | |
WO2014117865A1 (en) | Mobile gateway selection using a direct connection between a pcrf node and a mobility management node | |
US20150156093A1 (en) | Information processing method and apparatus | |
WO2012019652A1 (en) | Method and apparatus for restricting collection of minimization of drive -tests data in a roaming network | |
JP2018533303A (en) | How to detect billing fraud | |
EP3085047B1 (en) | Method of improving security in a communication network and authentication entity | |
JP2014195287A (en) | Access control according to policy defined for group of associated electronic devices comprising cellular modem | |
WO2014161104A1 (en) | Method and apparatus for charging device to device traffic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13795039 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14407669 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013795039 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |