WO2021063051A1 - Terminal device, application server, network exposure function node and methods therein - Google Patents

Terminal device, application server, network exposure function node and methods therein Download PDF

Info

Publication number
WO2021063051A1
WO2021063051A1 PCT/CN2020/098776 CN2020098776W WO2021063051A1 WO 2021063051 A1 WO2021063051 A1 WO 2021063051A1 CN 2020098776 W CN2020098776 W CN 2020098776W WO 2021063051 A1 WO2021063051 A1 WO 2021063051A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
node
identifier
nef
qos
Prior art date
Application number
PCT/CN2020/098776
Other languages
French (fr)
Inventor
He Zhou
Jingrui TAO
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
He Zhou
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ), He Zhou filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to EP20871987.2A priority Critical patent/EP4038939A4/en
Priority to US17/763,791 priority patent/US20220408303A1/en
Publication of WO2021063051A1 publication Critical patent/WO2021063051A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0268Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Definitions

  • the present disclosure relates to communication technology, and more particularly, to a terminal device, an application server, a Network Exposure Function (NEF) node and methods therein, e.g., for facilitating application driven Quality of Service (QoS) .
  • NEF Network Exposure Function
  • Application Driven QoS is a feature defined in the 3 rd Generation Partnership Project (3GPP) Technical Specification (TS) 23.682 (Release 15/16) and TS 23.502 (Release 15/16) that enables a third party application server (e.g., Service Capability Server /Application Server (SCS/AS) ) to request a data session (referred to as AS session) to a terminal device (e.g., a User Equipment, or UE) served by the SCS/AS to be set up with a specific QoS (e.g., low latency or jitter) .
  • 3GPP 3rd Generation Partnership Project
  • TS Technical Specification
  • TS Technical Specification
  • AS session e.g., a data session
  • UE User Equipment
  • NEF Network Exposure Function
  • SCEF Service Capability Exposure Function
  • LTE Long Term Evolution
  • the SCS/AS can request the QoS for the AS session based on application and service requirements with a QoS reference parameter which refers to pre-defined QoS information.
  • the pre-defined QoS information is a part of a Service Level Agreement (SLA) between a network operator and the SCS/AS.
  • SLA Service Level Agreement
  • the NEF node When the NEF node receives the request from the SCS/AS to provide the QoS for the AS session, the NEF node acts as an Application Function (AF) according to 3GPP TS 23.203 (Release 15/16) and TS 23.503 (Release 15/16) and transfers the request to a Policy Control Function (PCF) node (or Policy and Charging Rules Function (PCRF) node in LTE) .
  • PCF Policy Control Function
  • PCF Policy and Charging Rules Function
  • a UE attaches or registers to a network, or when the UE establishes a new Packet Data Network (PDN) connection, a User Plane Function (UPF) node (or PDN Gateway (GW) in LTE) obtains the UE's Mobile Station Integrated Services Digital Network Number (MSISDN) and Internet Protocol (IP) address.
  • PDN Packet Data Network
  • UPF User Plane Function
  • GW PDN Gateway
  • IP Internet Protocol
  • the UPF node (or Policy and Charging Enforcement Function (PCEF) node in LTE, which is a functional entity located at the PDN GW) determines that a Policy and Charging Control (PCC) authorization is required and requests authorization of allowed services and PCC rules from a PCF node.
  • PCC Policy and Charging Control
  • the UPF node includes, among others, the UE's MSISDN and IP address in the request. This is known as “IP Connectivity Access Network (CAN) session establishment” .
  • CAN IP Connectivity Access Network
  • the SCS/AS In order to set up a connection between the SCS/AS and the UE with a required QoS, the SCS/AS sends an On-demand QoS request (including AF session information, such as the UE's IP address, an SCS/AS Identifier, a description of application flows and a QoS reference) to the NEF node.
  • the NEF node sends the UE's IP address, the SCS/AS Identifier, the Description of the application flows and the QoS reference to the PCF node and triggers a PCF initiated IP-CAN Session Modification, e.g., for QoS change.
  • the PCF node makes the authorization and policy decision and sends a PCC Provision (including PCC Rules, Event Trigger and Event Report) to the UPF node.
  • PCC Provision including PCC Rules, Event Trigger and Event Report
  • the PCF node performs a process known as “Session Binding” , where the AF session information is associated with one and only one IP CAN session by taking the UE's IP version 4 (IPv4) address or IP version 6 (IPv6) prefix, and possibly a UE identity (e.g., MSISDN) , into account.
  • IPv4 IP version 4
  • IPv6 IP version 6
  • UE identity e.g., MSISDN
  • a UPF node can allocate IP addresses from a private address range in each IP address domain to UEs. One IP address can thus be allocated to different UEs served by UPF nodes in different address domains, especially when IPv4 addresses are used. If one PCF node controls a number of UPF nodes in different IP address domains, it may not be able to uniquely identify a UE based on its IP address during a session binding process.
  • an AF node e.g., an NEF node
  • NAT Network Address Translation
  • the AF node obtains the IP address allocated to the UE via application level signaling and provides it as Framed-IP-Address to the PCF node for session binding.
  • the NAT is used, in addition to the Framed-IP-Address, additional information would be required for the PCF node to uniquely identify the UE in the session binding process.
  • a QoS Application Programing Interface is defined to allow the SCS/AS to change a QoS for a UE.
  • the API requires the SCS/AS to provide the UE's IP address (i.e., Framed-IP-Address) to the NEF node, but does not require the SCS/AS to provide any additional information that can be used to identify an associated IP domain.
  • the NEF node cannot provide such additional information to the PCF node for the QoS change, and accordingly, the PCF node may not be able to uniquely identify the UE in a session binding process.
  • the NEF node can expose directly to a UE a capability to change a QoS for the UE.
  • the NEF node would also need such additional information to be provided to the PCF node, such that the PCF node can uniquely identify the UE in a session binding process.
  • the NEF node can authenticate the SCS/AS by means of e.g., Hyper Text Transfer Protocol (HTTP) Basic Authentication
  • HTTP Hyper Text Transfer Protocol
  • a method in a terminal device includes: transmitting to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • the method can further include: transmitting to the NEF node an authentication request including data from which the identifier is derivable; and receiving from the NEF node an authentication response including the information.
  • the identifier can be derivable from the data based on Generic Bootstrapping Architecture (GBA) or Extensible Authentication Protocol and Key Agreement (EAP-AKA) .
  • GBA Generic Bootstrapping Architecture
  • EAP-AKA Extensible Authentication Protocol and Key Agreement
  • the identifier can be an International Mobile Station Identity (IMSI) .
  • IMSI International Mobile Station Identity
  • the information can be a security token.
  • a method in an NEF node includes: receiving from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device; determining the identifier based on the information; and transmitting to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the method can further include: receiving from the terminal device an authentication request including data from which the identifier is derivable; deriving the identifier from the data; generating the information in association with the identifier; and transmitting to the terminal device an authentication response including the information.
  • the identifier can be derived from the data based on GBA or EAP-AKA.
  • the identifier can be an IMSI.
  • the information can be a security token.
  • a method in an application server includes: transmitting to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
  • the method can further include: transmitting to the NEF node authentication information to enable the NEF node to authenticate the application server.
  • the identifier can be a Mobile Station Integrated Services Digital Network Number (MSISDN) .
  • MSISDN Mobile Station Integrated Services Digital Network Number
  • a method in an NEF node includes: receiving from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device; and transmitting to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the method can further include: receiving authentication information from the application server; and authenticating the application server based on the authentication information.
  • the identifier can be an MSISDN.
  • a terminal device includes a communication interface, a processor and a memory.
  • the memory contains instructions executable by the processor whereby the terminal device is operative to perform the method according to the above first aspect.
  • a computer readable storage medium has computer program instructions stored thereon.
  • the computer program instructions when executed by a processor in a terminal device, cause the terminal device to perform the method according to the above first aspect.
  • an application server includes a communication interface, a processor and a memory.
  • the memory contains instructions executable by the processor whereby the application server is operative to perform the method according to the above third aspect.
  • a computer readable storage medium has computer program instructions stored thereon.
  • the computer program instructions when executed by a processor in an application server, cause the application server to perform the method according to the above third aspect.
  • an NEF node includes a communication interface, a processor and a memory.
  • the memory contains instructions executable by the processor whereby the NEF node is operative to perform the method according to the above second or fourth aspect.
  • a computer readable storage medium has computer program instructions stored thereon.
  • the computer program instructions when executed by a processor in an NEF node, cause the NEF node to perform the method according to the above second or fourth aspect.
  • a terminal device or an application server can transmit to an NEF node a QoS request including an identifier of the terminal device, or information enabling the NEF node to determine the identifier. Accordingly, the NEF node can obtain the identifier and thus provide the identifier to a PCF node, such that the PCF node can uniquely identify the terminal device in e.g., a session binding process.
  • Fig. 1 is a flowchart illustrating a method in a terminal device according to an embodiment of the present disclosure
  • Fig. 2 is a flowchart illustrating a method in an NEF node according to an embodiment of the present disclosure
  • Fig. 3 is a sequence chart explaining the methods shown in Figs. 1 and 2;
  • Fig. 4 is a flowchart illustrating a method in an application server according to an embodiment of the present disclosure
  • Fig. 5 is a flowchart illustrating a method in an NEF node according to another embodiment of the present disclosure
  • Fig. 6 is a sequence chart explaining the methods shown in Figs. 4 and 5;
  • Fig. 7 is a block diagram of a terminal device according to an embodiment of the present disclosure.
  • Fig. 8 is a block diagram of a terminal device according to another embodiment of the present disclosure.
  • Fig. 9 is a block diagram of an application server according to an embodiment of the present disclosure.
  • Fig. 10 is a block diagram of an application server according to another embodiment of the present disclosure.
  • Fig. 11 is a block diagram of an NEF node according to an embodiment of the present disclosure.
  • Fig. 12 is a block diagram of an NEF node according to another embodiment of the present disclosure.
  • Fig. 13 is a block diagram of an NEF node according to yet another embodiment of the present disclosure.
  • terminal device refers to any end device that can access a wireless communication network and receive services therefrom.
  • the terminal device refers to a mobile terminal, user equipment (UE) , or other suitable devices.
  • the UE may be, for example, a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) .
  • SS Subscriber Station
  • MS Mobile Station
  • AT Access Terminal
  • the terminal device may include, but not limited to, portable computers, desktop computers, image capture terminal devices such as digital cameras, gaming terminal devices, music storage and playback appliances, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable device, a personal digital assistant (PDA) , wearable terminal devices, vehicle-mounted wireless terminal devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , USB dongles, smart devices, wireless customer-premises equipment (CPE) and the like.
  • the terms “terminal device” , “terminal” , “user equipment” and “UE” may be used interchangeably.
  • a terminal device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3rd Generation Partnership Project (3GPP) , such as 3GPP′s Global System for Mobile Communications (GSM) , Universal Mobile Telecommunications System (UMTS) , Long Term Evolution (LTE) , and/or 5G (the fifth generation) standards.
  • 3GPP 3rd Generation Partnership Project
  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications System
  • LTE Long Term Evolution
  • 5G the fifth generation
  • a terminal device may be configured to transmit and/or receive information without direct human interaction.
  • a terminal device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the wireless communication network.
  • a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a specific human user.
  • the terminal device may support device-to-device (D2D) communication, for example by implementing a 3GPP standard for sidelink communication, and may in this case be referred to as a D2D communication device.
  • D2D device-to-device
  • a terminal device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device and/or network equipment.
  • the terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device.
  • M2M machine-to-machine
  • MTC machine-type communication
  • the terminal device may be a UE implementing the 3GPP narrow band internet of things (NB-IoT) standard.
  • NB-IoT narrow band internet of things
  • NB-IoT narrow band internet of things
  • a terminal device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation.
  • references in the specification to "one embodiment” , “an embodiment” , “an example embodiment” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
  • first and second etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments.
  • the term “and/or” includes any and all combinations of one or more of the associated listed terms. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a” , “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise.
  • Fig. 1 is a flowchart illustrating a method 100 according to an embodiment of the present disclosure.
  • the method 100 can be performed at a terminal device, e.g., a UE.
  • a QoS request is transmitted to an NEF (or SCEF) node.
  • the QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • the QoS request can be e.g., an On-demand QoS Request.
  • the identifier can be e.g., an International Mobile Station Identity (IMSI) .
  • the terminal device can transmit to the NEF node an authentication request including data from which the identifier is derivable.
  • the identifier e.g., IMSI
  • the terminal device can receive from the NEF node an authentication response including the information. This authentication response allows the NEF node to authenticate the terminal device, such that it can obtain the identifier from a trusted terminal device in a secure manner.
  • the information can be a security token.
  • the security token may be generated by the NEF node in association with the identifier.
  • Fig. 2 is a flowchart illustrating a method 200 according to an embodiment of the present disclosure.
  • the method 200 can be performed at an NEF (or SCEF) node.
  • NEF or SCEF
  • a QoS request is received from a terminal device.
  • the QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • the QoS request can be e.g., an On-demand QoS Request.
  • the identifier can be e.g., an IMSI, and the information can be e.g., a security token.
  • the identifier is determined based on the information, and the terminal device is authenticated.
  • a request to initiate a QoS modification is transmitted to a PCF node.
  • the request includes the IP address and the identifier.
  • the NEF node can receive from the terminal device an authentication request including data from which the identifier is derivable, and derive the identifier from the data, e.g., based on GBA or EAP-AKA. Then, the NEF node can generate the information (e.g., security token) in association with the identifier, and transmit to the terminal device an authentication response including the information.
  • the information e.g., security token
  • a UPF (or PCEF) node and a PCF (or PCRF) node interact to perform an IP-CAN session establishment for a UE.
  • the UPF assigns an IP address to the UE and configures a default QoS (e.g., a default bandwidth) for a service between the UE and an application server.
  • the PCF node obtains the UE's IP address from the UPF node.
  • the UE sends an authentication request to an NEF (or SCEF) node, the authentication request including (encrypted) data enabling the NEF node to determine an IMSI of the UE.
  • the NEF node Upon receiving the authentication request, the NEF node derives the IMSI of the UE from the data and authenticates the UE based on e.g., GBA or EAP-AKA. The NEF node generates a security token in association with the IMSI. At 3.2, the NEF node sends an authentication response to the UE, including the security token and indicating that the UE has been authenticated.
  • the UE in order to achieve a requested QoS for the service (e.g., to change the default QoS to the requested QoS) , the UE sends an On-demand QoS Request to the NEF node, including the UE's IP address, an SCS/AS identifier, a description of application flows, a QoS reference associated with the requested QoS and the security token.
  • the NEF node authenticates the On-demand QoS Request by verifying the security token and determines the IMSI from the security token (as the security token is associated with the IMSI) .
  • the NEF node sends an Npcf_PolicyAuthorization_Create Request (or Authenticate-Authorize Request (AAR) ) , including the UE's IP address, IMSI, SCS/AS identifier, description of application flows and QoS reference, to the PCF node to trigger a PCF initiated IP-CAN session modification as defined in Clause 7.4.2 of 3GPP TS 23.203.
  • the PCF node performs a session binding process based on the UE'IP address and IMSI.
  • the PCF node can uniquely identify the UE and its associated IP-CAN session.
  • the PCF node derives the requested QoS from the information provided by the NEF node, determines whether the QoS is to be allowed and notifies the result to the NEF node via an Npcf_PolicyAuthorization_Create Response (or an Authenticate-Authorize Answer (AAA) ) at 3.6.
  • the PCF node notifies the UPF node to perform the IP-CAN session modification to enforce the requested QoS (if the requested QoS is allowed) .
  • the NEF node sends an On-demand QoS Response to the UE, indicating whether the requested QoS is allowed or not.
  • Fig. 4 is a flowchart illustrating a method 400 according to an embodiment of the present disclosure.
  • the method 400 can be performed at an application server, e.g., an SCS/AS.
  • a QoS request associated with a terminal device is transmitted to an NEF (or SCEF) node.
  • the QoS request includes an IP address of the terminal device and an identifier of the terminal device.
  • the QoS request can be e.g., an On-demand QoS Request.
  • the identifier can be an MSISDN.
  • the application server can transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
  • the authentication information can be information for HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with Transport Layer Security (TLS) .
  • Fig. 5 is a flowchart illustrating a method 500 according to an embodiment of the present disclosure.
  • the method 500 can be performed at an NEF (or SCEF) node.
  • NEF or SCEF
  • a QoS request associated with a terminal device is received from an application server (e.g., SCS/AS) .
  • the QoS request includes an IP address of the terminal device and an identifier of the terminal device.
  • the QoS request can be e.g., an On-demand QoS Request.
  • the identifier can be an MSISDN.
  • the NEF node can receive authentication information from the application server and authenticate the application server based on the authentication information, e.g., using HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with TLS.
  • a request to initiate a QoS modification is transmitted to a PCF node.
  • the request includes the IP address and the identifier.
  • a UPF (or PCEF) node and a PCF (or PCRF) node interact to perform an IP-CAN session establishment for a UE.
  • the UPF assigns an IP address to the UE and configures a default QoS (e.g., a default bandwidth) for a service between the UE and an application server (e.g., SCS/AS) .
  • the PCF node obtains the UE's IP address from the UPF node.
  • an NEF (or SCEF) node receives authentication information from the application server and authenticates the application server based on the authentication information.
  • the application server sends an On-demand QoS Request to the NEF node, including the UE's IP address, an SCS/AS identifier, a description of application flows, a QoS reference associated with the requested QoS and an MSISDN of the UE.
  • an On-demand QoS Request to the NEF node, including the UE's IP address, an SCS/AS identifier, a description of application flows, a QoS reference associated with the requested QoS and an MSISDN of the UE.
  • a new attribute name ‘MSISDN' of type AsSessionWithQoSSubscription can be added in AsSessionWithQoS APl
  • a new attribute name ‘MSISDN' of type ChargeableParty can be added in ChargeableParty API.
  • the NEF node authorizes the On-demand QoS Request, and sends, at 6.3, an Npcf_PolicyAuthorization_Create Request (or AAR) , including the UE's IP address, SCS/AS identifier, description of application flows, QoS reference and MSISDN, to the PCF node to trigger a PCF initiated IP-CAN session modification as defined in Clause 7.4.2 of 3GPP TS 23.203.
  • the PCF node performs a session binding process based on the UE' IP address and IMSI.
  • the PCF node can uniquely identify the UE and its associated IP-CAN session.
  • the PCF node derives the requested QoS from the information provided by the NEF node, determines whether the QoS is to be allowed and notifies the result to the NEF node via an Npcf_PolicyAuthorization_Create Response (or AAA) at 6.5.
  • the PCF node notifies the UPF node to perform the IP-CAN session modification to enforce the requested QoS (if the requested QoS is allowed) .
  • the NEF node sends an On-demand QoS Response to the application server, indicating whether the requested QoS is allowed or not.
  • Fig. 7 is a block diagram of a terminal device 700 according to an embodiment of the present disclosure.
  • the terminal device 700 includes a unit 710 (e.g., a transmitting unit) configured to transmit to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • a unit 710 e.g., a transmitting unit
  • the unit 710 can be further configured to transmit to the NEF node an authentication request including data from which the identifier is derivable.
  • the terminal device 700 can further include a receiving unit configured to receive from the NEF node an authentication response including the information.
  • the identifier can be derivable from the data based on GBA or EAP-AKA.
  • the identifier can be an IMSI.
  • the information can be a security token.
  • the unit 710 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 1.
  • a processor or a micro-processor and adequate software and memory for storing of the software e.g., a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 1.
  • PLD Programmable Logic Device
  • Fig. 8 is a block diagram of a terminal device 800 according to another embodiment of the present disclosure.
  • the terminal device 800 includes a communication interface 810, a processor 820 and a memory 830.
  • the memory 830 contains instructions executable by the processor 820 whereby the terminal device 800 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 1.
  • the memory 830 contains instructions executable by the processor 820 whereby the terminal device 800 is operative to: transmit to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • the memory 830 can further contain instructions executable by the processor 820 whereby the terminal device 800 is operative to: transmit to the NEF node an authentication request including data from which the identifier is derivable; and receive from the NEF node an authentication response including the information.
  • the identifier can be derivable from the data based on GBA or EAP-AKA.
  • the identifier can be an IMSI.
  • the information can be a security token.
  • FIG. 9 is a block diagram of an application server 900 according to an embodiment of the present disclosure.
  • the application server 900 includes a unit 910 (e.g., a transmitting unit) configured to transmit to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
  • a unit 910 e.g., a transmitting unit
  • the unit 910 can be further configured to transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
  • the identifier can be an MSISDN.
  • the unit 910 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 4.
  • a processor or a micro-processor and adequate software and memory for storing of the software e.g., a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 4.
  • PLD Programmable Logic Device
  • Fig. 10 is a block diagram of an application server 1000 according to another embodiment of the present disclosure.
  • the application server 1000 includes a communication interface 1010, a processor 1020 and a memory 1030.
  • the memory 1030 contains instructions executable by the processor 1020 whereby the application server 1000 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 4.
  • the memory 1030 contains instructions executable by the processor 1020 whereby the application server 1000 is operative to: transmit to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
  • the memory 1030 can further contain instructions executable by the processor 1020 whereby the application server 1000 is operative to: transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
  • the identifier can be an MSISDN.
  • FIG. 11 is a block diagram of an NEF node 1100 according to an embodiment of the present disclosure.
  • the NEF node 1100 includes a receiving unit 1110 configured to receive from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  • the NEF node 1100 further includes a determining unit 1120 configured to determine the identifier based on the information.
  • the NEF node 1100 further includes a transmitting unit 1130 configured to transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the receiving unit 1110 can be further configured to receive from the terminal device an authentication request including data from which the identifier is derivable.
  • the NEF node 1100 can further include a deriving unit configured to derive the identifier from the data and a generating unit configured to generate the information in association with the identifier.
  • the transmitting unit 1130 can be further configured to transmit to the terminal device an authentication response including the information.
  • the identifier can be derived from the data based on GBA or EAP-AKA.
  • the identifier can be an IMSI.
  • the information can be a security token.
  • the units 1110 ⁇ 1130 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 2.
  • a processor or a micro-processor and adequate software and memory for storing of the software e.g., a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 2.
  • PLD Programmable Logic Device
  • FIG. 12 is a block diagram of an NEF node 1200 according to another embodiment of the present disclosure.
  • the NEF node 1200 can include a receiving unit 1210 configured to receive from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
  • the NEF node 1200 further includes a transmitting unit 1220 configured to transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the receiving unit 1210 can be further configured to receive authentication information from the application server.
  • the NEF node 1200 can further include an authenticating unit configured to authenticate the application server based on the authentication information.
  • the identifier can be an MSISDN.
  • the units 1210 ⁇ 1220 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 5.
  • a processor or a micro-processor and adequate software and memory for storing of the software e.g., a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 5.
  • PLD Programmable Logic Device
  • Fig. 13 is a block diagram of an NEF node 1300 according to yet another embodiment of the present disclosure.
  • the NEF node 1300 includes a communication interface 1310, a processor 1320 and a memory 1330.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 2.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device; determine the identifier based on the information; and transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from the terminal device an authentication request including data from which the identifier is derivable; derive the identifier from the data; generate the information in association with the identifier; and transmit to the terminal device an authentication response including the information.
  • the identifier can be derived from the data based on GBA or EAP-AKA.
  • the identifier can be an IMSI.
  • the information can be a security token.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 5.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device; and transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
  • the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive authentication information from the application server; and authenticate the application server based on the authentication information.
  • the identifier can be an MSISDN.
  • the present disclosure also provides at least one computer program product in the form of a non-volatile or volatile memory, e.g., a non-transitory computer readable storage medium, an Electrically Erasable Programmable Read-Only Memory (EEPROM) , a flash memory and a hard drive.
  • the computer program product includes a computer program.
  • the computer program includes: code/computer readable instructions, which when executed by the processor 820 causes the terminal device 800 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 1, and/or code/computer readable instructions, which when executed by the processor 1020 causes the application server 1000 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 4, and/or code/computer readable instructions, which when executed by the processor 1320 causes the NEF node 1300 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 2 or 5.
  • the computer program product may be configured as a computer program code structured in computer program modules.
  • the computer program modules could essentially perform the actions of the flow illustrated in Fig. 1, 2, 4 or 5.
  • the processor may be a single CPU (Central Processing Unit) , but could also comprise two or more processing units.
  • the processor may include general purpose microprocessors; instruction set processors and/or related chips sets and/or special purpose microprocessors such as Application Specific Integrated Circuits (ASICs) .
  • the processor may also comprise board memory for caching purposes.
  • the computer program may be carried by a computer program product connected to the processor.
  • the computer program product may comprise a non-transitory computer readable storage medium on which the computer program is stored.
  • the computer program product may be a flash memory, a Random Access Memory (RAM) , a Read-Only Memory (ROM) , or an EEPROM, and the computer program modules described above could in alternative embodiments be distributed on different computer program products in the form of memories.
  • RAM Random Access Memory
  • ROM Read-Only Memory
  • EEPROM Electrically Erasable programmable read-only memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides a method (100) in a terminal device. The method (100) includes: transmitting (110) to a Network Exposure Function, NEF, node a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.

Description

TERMINAL DEVICE, APPLICATION SERVER, NETWORK EXPOSURE FUNCTION NODE AND METHODS THEREIN TECHNICAL FIELD
The present disclosure relates to communication technology, and more particularly, to a terminal device, an application server, a Network Exposure Function (NEF) node and methods therein, e.g., for facilitating application driven Quality of Service (QoS) .
BACKGROUND
Application Driven QoS, or ADQ, is a feature defined in the 3 rd Generation Partnership Project (3GPP) Technical Specification (TS) 23.682 (Release 15/16) and TS 23.502 (Release 15/16) that enables a third party application server (e.g., Service Capability Server /Application Server (SCS/AS) ) to request a data session (referred to as AS session) to a terminal device (e.g., a User Equipment, or UE) served by the SCS/AS to be set up with a specific QoS (e.g., low latency or jitter) . This functionality is exposed via a Network Exposure Function (NEF) node (or Service Capability Exposure Function (SCEF) node in Long Term Evolution (LTE) ) towards the SCS/AS With this functionality, the SCS/AS can request the QoS for the AS session based on application and service requirements with a QoS reference parameter which refers to pre-defined QoS information. Here, the pre-defined QoS information is a part of a Service Level Agreement (SLA) between a network operator and the SCS/AS. When the NEF node receives the request from the SCS/AS to provide the QoS for the AS session, the NEF node acts as an Application Function (AF) according to 3GPP TS 23.203 (Release 15/16) and TS 23.503 (Release 15/16) and transfers the request to a Policy Control Function (PCF) node (or Policy and Charging Rules Function (PCRF) node in LTE) .
According to 3GPP TS 23.682 (Release 15/16) and TS 23.502 (Release 15/16) an end-to-end flow for the ADQ functionality is described as follows. When a UE attaches or registers to a network, or when the UE establishes a new Packet Data Network (PDN) connection, a User Plane Function (UPF) node (or PDN Gateway (GW) in LTE) obtains the UE's Mobile Station Integrated Services Digital Network Number (MSISDN) and Internet Protocol (IP) address. The UPF node (or Policy and Charging Enforcement Function (PCEF) node in LTE, which is a functional  entity located at the PDN GW) determines that a Policy and Charging Control (PCC) authorization is required and requests authorization of allowed services and PCC rules from a PCF node. The UPF node includes, among others, the UE's MSISDN and IP address in the request. This is known as “IP Connectivity Access Network (CAN) session establishment” . In order to set up a connection between the SCS/AS and the UE with a required QoS, the SCS/AS sends an On-demand QoS request (including AF session information, such as the UE's IP address, an SCS/AS Identifier, a description of application flows and a QoS reference) to the NEF node. The NEF node sends the UE's IP address, the SCS/AS Identifier, the Description of the application flows and the QoS reference to the PCF node and triggers a PCF initiated IP-CAN Session Modification, e.g., for QoS change. The PCF node makes the authorization and policy decision and sends a PCC Provision (including PCC Rules, Event Trigger and Event Report) to the UPF node. Here, the PCF node performs a process known as “Session Binding” , where the AF session information is associated with one and only one IP CAN session by taking the UE's IP version 4 (IPv4) address or IP version 6 (IPv6) prefix, and possibly a UE identity (e.g., MSISDN) , into account. Finally, the UPF node enforces the decision.
SUMMARY
Within a Public Land Mobile Network (PLMN) , there may be several separate IP address domains. A UPF node can allocate IP addresses from a private address range in each IP address domain to UEs. One IP address can thus be allocated to different UEs served by UPF nodes in different address domains, especially when IPv4 addresses are used. If one PCF node controls a number of UPF nodes in different IP address domains, it may not be able to uniquely identify a UE based on its IP address during a session binding process. For example, an AF node, e.g., an NEF node, can serve UEs in different IP address domains, either by having direct IP interfaces to those domains, or by having interconnections via Network Address Translation (NAT) in a user plane between the UPF node and the AF node. If the NAT is not used, the AF node obtains the IP address allocated to the UE via application level signaling and provides it as Framed-IP-Address to the PCF node for session binding. If the NAT is used, in addition to the Framed-IP-Address, additional information would be required for the PCF node to uniquely identify the UE in the session binding process.
According to 3GPP TS 29. 122 (Release 15/16) (T8 specification) , a QoS Application Programing Interface (API) is defined to allow the SCS/AS to change a QoS for a UE. However, the API requires the SCS/AS to provide the UE's IP address (i.e., Framed-IP-Address) to the NEF node, but does not require the SCS/AS to provide any additional information that can be used to identify an associated IP domain. As a result, the NEF node cannot provide such additional information to the PCF node for the QoS change, and accordingly, the PCF node may not be able to uniquely identify the UE in a session binding process.
On the other hand, it may be desired that the NEF node can expose directly to a UE a capability to change a QoS for the UE. In this case, the NEF node would also need such additional information to be provided to the PCF node, such that the PCF node can uniquely identify the UE in a session binding process.
Furthermore, unlike the SCS/AS-NEF communication where the NEF node can authenticate the SCS/AS by means of e.g., Hyper Text Transfer Protocol (HTTP) Basic Authentication, it would be particularly advantageous if the NEF node can authenticate the UE and thus obtain the additional information in a secure and trusted manner.
It is an object of the present disclosure to provide a terminal device, an application server, an NEF node and methods therein, capable of enabling the NEF node to obtain such additional information, thereby e.g., facilitating ADQ.
According to a first aspect of the present disclosure, a method in a terminal device is provided. The method includes: transmitting to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
In an embodiment, the method can further include: transmitting to the NEF node an authentication request including data from which the identifier is derivable; and receiving from the NEF node an authentication response including the information.
In an embodiment, the identifier can be derivable from the data based on Generic Bootstrapping Architecture (GBA) or Extensible Authentication Protocol and Key Agreement (EAP-AKA) .
In an embodiment, the identifier can be an International Mobile Station Identity (IMSI) .
In an embodiment, the information can be a security token.
According to a second aspect of the present disclosure, a method in an NEF node is provided. The method includes: receiving from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device; determining the identifier based on the information; and transmitting to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the method can further include: receiving from the terminal device an authentication request including data from which the identifier is derivable; deriving the identifier from the data; generating the information in association with the identifier; and transmitting to the terminal device an authentication response including the information.
In an embodiment, the identifier can be derived from the data based on GBA or EAP-AKA.
In an embodiment, the identifier can be an IMSI.
In an embodiment the information can be a security token.
According to a third aspect of the present disclosure, a method in an application server is provided. The method includes: transmitting to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
In an embodiment, the method can further include: transmitting to the NEF node authentication information to enable the NEF node to authenticate the application server.
In an embodiment, the identifier can be a Mobile Station Integrated Services Digital Network Number (MSISDN) .
According to a fourth aspect of the present disclosure, a method in an NEF node is provided. The method includes: receiving from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device; and transmitting to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the method can further include: receiving authentication information from the application server; and authenticating the application server based on the authentication information.
In an embodiment, the identifier can be an MSISDN.
According to a fifth aspect of the present disclosure, a terminal device is provided. The terminal device includes a communication interface, a processor and a memory. The memory contains instructions executable by the processor whereby the terminal device is operative to perform the method according to the above first aspect.
According to a sixth aspect of the present disclosure, a computer readable storage medium is provided. The computer readable storage medium has computer program instructions stored thereon. The computer program instructions, when executed by a processor in a terminal device, cause the terminal device to perform the method according to the above first aspect.
According to a seventh aspect of the present disclosure, an application server is provided. The application server includes a communication interface, a processor and a memory. The memory contains instructions executable by the processor whereby the application server is operative to perform the method according to the above third aspect.
According to an eighth aspect of the present disclosure, a computer readable storage medium is provided. The computer readable storage medium has  computer program instructions stored thereon. The computer program instructions, when executed by a processor in an application server, cause the application server to perform the method according to the above third aspect.
According to a ninth aspect of the present disclosure, an NEF node is provided. The NEF node includes a communication interface, a processor and a memory. The memory contains instructions executable by the processor whereby the NEF node is operative to perform the method according to the above second or fourth aspect.
According to a tenth aspect of the present disclosure, a computer readable storage medium is provided. The computer readable storage medium has computer program instructions stored thereon. The computer program instructions, when executed by a processor in an NEF node, cause the NEF node to perform the method according to the above second or fourth aspect.
With the embodiments of the present disclosure, a terminal device or an application server can transmit to an NEF node a QoS request including an identifier of the terminal device, or information enabling the NEF node to determine the identifier. Accordingly, the NEF node can obtain the identifier and thus provide the identifier to a PCF node, such that the PCF node can uniquely identify the terminal device in e.g., a session binding process.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other objects, features and advantages will be more apparent from the following description of embodiments with reference to the figures, in which:
Fig. 1 is a flowchart illustrating a method in a terminal device according to an embodiment of the present disclosure;
Fig. 2 is a flowchart illustrating a method in an NEF node according to an embodiment of the present disclosure;
Fig. 3 is a sequence chart explaining the methods shown in Figs. 1 and 2;
Fig. 4 is a flowchart illustrating a method in an application server according to an embodiment of the present disclosure;
Fig. 5 is a flowchart illustrating a method in an NEF node according to another embodiment of the present disclosure;
Fig. 6 is a sequence chart explaining the methods shown in Figs. 4 and 5;
Fig. 7 is a block diagram of a terminal device according to an embodiment of the present disclosure;
Fig. 8 is a block diagram of a terminal device according to another embodiment of the present disclosure;
Fig. 9 is a block diagram of an application server according to an embodiment of the present disclosure;
Fig. 10 is a block diagram of an application server according to another embodiment of the present disclosure;
Fig. 11 is a block diagram of an NEF node according to an embodiment of the present disclosure;
Fig. 12 is a block diagram of an NEF node according to another embodiment of the present disclosure; and
Fig. 13 is a block diagram of an NEF node according to yet another embodiment of the present disclosure.
DETAILED DESCRIPTION
As used herein, the term "terminal device" refers to any end device that can access a wireless communication network and receive services therefrom. By way of example and not limitation, the terminal device refers to a mobile terminal, user equipment (UE) , or other suitable devices. The UE may be, for example, a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) . The terminal device may include, but not limited to, portable computers, desktop computers, image capture terminal devices such as digital cameras, gaming terminal devices, music storage and playback appliances, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable device, a personal digital assistant (PDA) , wearable terminal devices, vehicle-mounted wireless terminal devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , USB dongles, smart devices, wireless customer-premises equipment (CPE) and the like. In the following description, the terms "terminal device" , "terminal" , "user equipment" and "UE" may be used interchangeably. As one example, a terminal device may represent a UE configured for communication in accordance with one or more communication standards promulgated by the 3rd Generation Partnership Project (3GPP) , such as 3GPP′s Global System for Mobile Communications (GSM) , Universal Mobile  Telecommunications System (UMTS) , Long Term Evolution (LTE) , and/or 5G (the fifth generation) standards. As used herein, a "user equipment" or "UE" may not necessarily have a "user" in the sense of a human user who owns and/or operates the relevant device. In some embodiments, a terminal device may be configured to transmit and/or receive information without direct human interaction. For instance, a terminal device may be designed to transmit information to a network on a predetermined schedule, when triggered by an internal or external event, or in response to requests from the wireless communication network. Instead, a UE may represent a device that is intended for sale to, or operation by, a human user but that may not initially be associated with a specific human user.
The terminal device may support device-to-device (D2D) communication, for example by implementing a 3GPP standard for sidelink communication, and may in this case be referred to as a D2D communication device.
As yet another example, in an Internet of Things (IOT) scenario, a terminal device may represent a machine or other device that performs monitoring and/or measurements, and transmits the results of such monitoring and/or measurements to another terminal device and/or network equipment. The terminal device may in this case be a machine-to-machine (M2M) device, which may in a 3GPP context be referred to as a machine-type communication (MTC) device. As one particular example, the terminal device may be a UE implementing the 3GPP narrow band internet of things (NB-IoT) standard. Particular examples of such machines or devices are sensors, metering devices such as power meters, industrial machinery, or home or personal appliances, for example refrigerators, televisions, personal wearables such as watches etc. In other scenarios, a terminal device may represent a vehicle or other equipment that is capable of monitoring and/or reporting on its operational status or other functions associated with its operation.
In the following, references in the specification to "one embodiment" , "an embodiment" , "an example embodiment" and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature,  structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It shall be understood that although the terms "first" and "second" etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed terms. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a" , "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" , "comprising" , "has" , "having" , "includes" and/or "including" , when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
Unless indicated otherwise, all features described in connection with 5G network nodes or functional entities also apply to their LTE equivalents, or vice versa.
Fig. 1 is a flowchart illustrating a method 100 according to an embodiment of the present disclosure. The method 100 can be performed at a terminal device, e.g., a UE.
At block 110, a QoS request is transmitted to an NEF (or SCEF) node. The QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device. Here, the QoS  request can be e.g., an On-demand QoS Request. The identifier can be e.g., an International Mobile Station Identity (IMSI) .
In an example, e.g., prior to the block 110, the terminal device can transmit to the NEF node an authentication request including data from which the identifier is derivable. For example, the identifier (e.g., IMSI) can be derivable from the data based on Generic Bootstrapping Architecture (GBA) or Extensible Authentication Protocol and Key Agreement (EAP-AKA) . Then, the terminal device can receive from the NEF node an authentication response including the information. This authentication response allows the NEF node to authenticate the terminal device, such that it can obtain the identifier from a trusted terminal device in a secure manner.
In an example, the information can be a security token. The security token may be generated by the NEF node in association with the identifier.
Fig. 2 is a flowchart illustrating a method 200 according to an embodiment of the present disclosure. The method 200 can be performed at an NEF (or SCEF) node.
At block 210, a QoS request is received from a terminal device. The QoS request includes an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be e.g., an IMSI, and the information can be e.g., a security token.
At block 220, the identifier is determined based on the information, and the terminal device is authenticated.
At block 230, a request to initiate a QoS modification is transmitted to a PCF node. The request includes the IP address and the identifier.
In an example, e.g., prior to the block 210, the NEF node can receive from the terminal device an authentication request including data from which the identifier is derivable, and derive the identifier from the data, e.g., based on GBA or EAP-AKA. Then, the NEF node can generate the information (e.g., security token) in  association with the identifier, and transmit to the terminal device an authentication response including the information.
The  methods  100 and 200 will be further explained below with reference to a sequence chart of Fig. 3.
As shown in Fig. 3, initially a UPF (or PCEF) node and a PCF (or PCRF) node interact to perform an IP-CAN session establishment for a UE. The UPF assigns an IP address to the UE and configures a default QoS (e.g., a default bandwidth) for a service between the UE and an application server. The PCF node obtains the UE's IP address from the UPF node. At 3.1, the UE sends an authentication request to an NEF (or SCEF) node, the authentication request including (encrypted) data enabling the NEF node to determine an IMSI of the UE. Upon receiving the authentication request, the NEF node derives the IMSI of the UE from the data and authenticates the UE based on e.g., GBA or EAP-AKA. The NEF node generates a security token in association with the IMSI. At 3.2, the NEF node sends an authentication response to the UE, including the security token and indicating that the UE has been authenticated. At 3.3, in order to achieve a requested QoS for the service (e.g., to change the default QoS to the requested QoS) , the UE sends an On-demand QoS Request to the NEF node, including the UE's IP address, an SCS/AS identifier, a description of application flows, a QoS reference associated with the requested QoS and the security token. The NEF node authenticates the On-demand QoS Request by verifying the security token and determines the IMSI from the security token (as the security token is associated with the IMSI) . At 3.4, the NEF node sends an Npcf_PolicyAuthorization_Create Request (or Authenticate-Authorize Request (AAR) ) , including the UE's IP address, IMSI, SCS/AS identifier, description of application flows and QoS reference, to the PCF node to trigger a PCF initiated IP-CAN session modification as defined in Clause 7.4.2 of 3GPP TS 23.203. At 3.5, the PCF node performs a session binding process based on the UE'IP address and IMSI. Here, with the IMSI, the PCF node can uniquely identify the UE and its associated IP-CAN session. The PCF node derives the requested QoS from the information provided by the NEF node, determines whether the QoS is to be allowed and notifies the result to the NEF node via an Npcf_PolicyAuthorization_Create Response (or an Authenticate-Authorize Answer (AAA) ) at 3.6. At 3.7, the PCF node notifies the UPF node to perform the  IP-CAN session modification to enforce the requested QoS (if the requested QoS is allowed) . At 3.8, the NEF node sends an On-demand QoS Response to the UE, indicating whether the requested QoS is allowed or not.
For further details of the sequence shown in Fig. 3, reference can be made to 3GPP TS 23.682 (Release 15/16) , TS 23.502 (Release 15/16) and TS 29. 122 (Release 15/16) .
Fig. 4 is a flowchart illustrating a method 400 according to an embodiment of the present disclosure. The method 400 can be performed at an application server, e.g., an SCS/AS.
At block 410, a QoS request associated with a terminal device is transmitted to an NEF (or SCEF) node. The QoS request includes an IP address of the terminal device and an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be an MSISDN.
In an example, e.g., prior to the block 410, the application server can transmit to the NEF node authentication information to enable the NEF node to authenticate the application server. Here, for example, the authentication information can be information for HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with Transport Layer Security (TLS) .
Fig. 5 is a flowchart illustrating a method 500 according to an embodiment of the present disclosure. The method 500 can be performed at an NEF (or SCEF) node.
At block 510, a QoS request associated with a terminal device is received from an application server (e.g., SCS/AS) . The QoS request includes an IP address of the terminal device and an identifier of the terminal device. Here, the QoS request can be e.g., an On-demand QoS Request. The identifier can be an MSISDN.
In an example, e.g., prior to the block 510, the NEF node can receive authentication information from the application server and authenticate the application server based on the authentication information, e.g., using HTTP Basic Authentication, Oauth 2.0, or Mutual Authentication with TLS.
At block 520, a request to initiate a QoS modification is transmitted to a PCF node. The request includes the IP address and the identifier.
The  methods  400 and 500 will be further explained below with reference to a sequence chart of Fig. 6.
As shown in Fig. 6, initially a UPF (or PCEF) node and a PCF (or PCRF) node interact to perform an IP-CAN session establishment for a UE. The UPF assigns an IP address to the UE and configures a default QoS (e.g., a default bandwidth) for a service between the UE and an application server (e.g., SCS/AS) . The PCF node obtains the UE's IP address from the UPF node. At 6.1, an NEF (or SCEF) node receives authentication information from the application server and authenticates the application server based on the authentication information. At 6.2, in order to achieve a requested QoS for the service (e.g., to change the default QoS to the requested QoS) , the application server sends an On-demand QoS Request to the NEF node, including the UE's IP address, an SCS/AS identifier, a description of application flows, a QoS reference associated with the requested QoS and an MSISDN of the UE. For this purpose, a new attribute name ‘MSISDN' of type AsSessionWithQoSSubscription can be added in AsSessionWithQoS APl, and a new attribute name ‘MSISDN' of type ChargeableParty can be added in ChargeableParty API. The NEF node authorizes the On-demand QoS Request, and sends, at 6.3, an Npcf_PolicyAuthorization_Create Request (or AAR) , including the UE's IP address, SCS/AS identifier, description of application flows, QoS reference and MSISDN, to the PCF node to trigger a PCF initiated IP-CAN session modification as defined in Clause 7.4.2 of 3GPP TS 23.203. At 6.4, the PCF node performs a session binding process based on the UE' IP address and IMSI. Here, with the IMSI, the PCF node can uniquely identify the UE and its associated IP-CAN session. The PCF node derives the requested QoS from the information provided by the NEF node, determines whether the QoS is to be allowed and notifies the result to the NEF node via an Npcf_PolicyAuthorization_Create Response (or AAA) at 6.5. At 6.6, the PCF node notifies the UPF node to perform the IP-CAN session modification to enforce the requested QoS (if the requested QoS is allowed) . At 6.7, the NEF node sends an On-demand QoS Response to the application server, indicating whether the requested QoS is allowed or not.
For further details of the sequence shown in Fig. 6, reference can be made to 3GPP TS 23.682 (Release 15/16) , TS 23.502 (Release 15/16) and TS 29.122 (Release 15/16) .
Correspondingly to the method 100 as described above, a terminal device is provided. Fig. 7 is a block diagram of a terminal device 700 according to an embodiment of the present disclosure.
As shown in Fig. 7, the terminal device 700 includes a unit 710 (e.g., a transmitting unit) configured to transmit to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
In an embodiment, the unit 710 can be further configured to transmit to the NEF node an authentication request including data from which the identifier is derivable. The terminal device 700 can further include a receiving unit configured to receive from the NEF node an authentication response including the information.
In an embodiment, the identifier can be derivable from the data based on GBA or EAP-AKA.
In an embodiment, the identifier can be an IMSI.
In an embodiment, the information can be a security token.
The unit 710 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 1.
Fig. 8 is a block diagram of a terminal device 800 according to another embodiment of the present disclosure.
The terminal device 800 includes a communication interface 810, a processor 820 and a memory 830. The memory 830 contains instructions executable by the processor 820 whereby the terminal device 800 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 1. Particularly, the memory 830 contains instructions executable by the processor 820 whereby the terminal device 800 is operative to: transmit to an NEF node a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
In an embodiment, the memory 830 can further contain instructions executable by the processor 820 whereby the terminal device 800 is operative to: transmit to the NEF node an authentication request including data from which the identifier is derivable; and receive from the NEF node an authentication response including the information.
In an embodiment, the identifier can be derivable from the data based on GBA or EAP-AKA.
In an embodiment, the identifier can be an IMSI.
In an embodiment, the information can be a security token.
Correspondingly to the method 400 as described above, an application server is provided. Fig. 9 is a block diagram of an application server 900 according to an embodiment of the present disclosure.
As shown in Fig. 9, the application server 900 includes a unit 910 (e.g., a transmitting unit) configured to transmit to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
In an embodiment, the unit 910 can be further configured to transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
In an embodiment, the identifier can be an MSISDN.
The unit 910 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 4.
Fig. 10 is a block diagram of an application server 1000 according to another embodiment of the present disclosure.
The application server 1000 includes a communication interface 1010, a processor 1020 and a memory 1030. The memory 1030 contains instructions executable by the processor 1020 whereby the application server 1000 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 4. Particularly, the memory 1030 contains instructions executable by the processor 1020 whereby the application server 1000 is operative to: transmit to an NEF node a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device.
In an embodiment, the memory 1030 can further contain instructions executable by the processor 1020 whereby the application server 1000 is operative to: transmit to the NEF node authentication information to enable the NEF node to authenticate the application server.
In an embodiment, the identifier can be an MSISDN.
Correspondingly to the method 200 as described above, an NEF node is provided. Fig. 11 is a block diagram of an NEF node 1100 according to an embodiment of the present disclosure.
As shown in Fig. 11, the NEF node 1100 includes a receiving unit 1110 configured to receive from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier  of the terminal device. The NEF node 1100 further includes a determining unit 1120 configured to determine the identifier based on the information. The NEF node 1100 further includes a transmitting unit 1130 configured to transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the receiving unit 1110 can be further configured to receive from the terminal device an authentication request including data from which the identifier is derivable. The NEF node 1100 can further include a deriving unit configured to derive the identifier from the data and a generating unit configured to generate the information in association with the identifier. The transmitting unit 1130 can be further configured to transmit to the terminal device an authentication response including the information.
In an embodiment, the identifier can be derived from the data based on GBA or EAP-AKA.
In an embodiment, the identifier can be an IMSI.
In an embodiment, the information can be a security token.
The units 1110~1130 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 2.
Correspondingly to the method 500 as described above, an NEF node is provided. Fig. 12 is a block diagram of an NEF node 1200 according to another embodiment of the present disclosure.
As shown in Fig. 12, the NEF node 1200 can include a receiving unit 1210 configured to receive from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device. The NEF node 1200 further includes a  transmitting unit 1220 configured to transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the receiving unit 1210 can be further configured to receive authentication information from the application server. The NEF node 1200 can further include an authenticating unit configured to authenticate the application server based on the authentication information.
In an embodiment, the identifier can be an MSISDN.
The units 1210~1220 can be implemented as a pure hardware solution or as a combination of software and hardware, e.g., by one or more of: a processor or a micro-processor and adequate software and memory for storing of the software, a Programmable Logic Device (PLD) or other electronic component (s) or processing circuitry configured to perform the actions described above, and illustrated, e.g., in Fig. 5.
Fig. 13 is a block diagram of an NEF node 1300 according to yet another embodiment of the present disclosure.
The NEF node 1300 includes a communication interface 1310, a processor 1320 and a memory 1330. For example, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 2. Particularly, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from a terminal device a QoS request including an IP address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device; determine the identifier based on the information; and transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from the terminal device an authentication request including data from which the identifier is derivable; derive the identifier from the data; generate the information in  association with the identifier; and transmit to the terminal device an authentication response including the information.
In an embodiment, the identifier can be derived from the data based on GBA or EAP-AKA.
In an embodiment, the identifier can be an IMSI.
In an embodiment, the information can be a security token.
Alternatively, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 5. Particularly, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive from an application server a QoS request associated with a terminal device, the QoS request including an IP address of the terminal device and an identifier of the terminal device; and transmit to a PCF node a request to initiate a QoS modification, the request including the IP address and the identifier.
In an embodiment, the memory 1330 can contain instructions executable by the processor 1320 whereby the NEF node 1300 is operative to: receive authentication information from the application server; and authenticate the application server based on the authentication information.
In an embodiment, the identifier can be an MSISDN.
The present disclosure also provides at least one computer program product in the form of a non-volatile or volatile memory, e.g., a non-transitory computer readable storage medium, an Electrically Erasable Programmable Read-Only Memory (EEPROM) , a flash memory and a hard drive. The computer program product includes a computer program. The computer program includes: code/computer readable instructions, which when executed by the processor 820 causes the terminal device 800 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 1, and/or code/computer readable instructions, which when executed by the processor 1020 causes the application  server 1000 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 4, and/or code/computer readable instructions, which when executed by the processor 1320 causes the NEF node 1300 to perform the actions, e.g., of the procedure described earlier in conjunction with Fig. 2 or 5.
The computer program product may be configured as a computer program code structured in computer program modules. The computer program modules could essentially perform the actions of the flow illustrated in Fig. 1, 2, 4 or 5.
The processor may be a single CPU (Central Processing Unit) , but could also comprise two or more processing units. For example, the processor may include general purpose microprocessors; instruction set processors and/or related chips sets and/or special purpose microprocessors such as Application Specific Integrated Circuits (ASICs) . The processor may also comprise board memory for caching purposes. The computer program may be carried by a computer program product connected to the processor. The computer program product may comprise a non-transitory computer readable storage medium on which the computer program is stored. For example, the computer program product may be a flash memory, a Random Access Memory (RAM) , a Read-Only Memory (ROM) , or an EEPROM, and the computer program modules described above could in alternative embodiments be distributed on different computer program products in the form of memories.
The disclosure has been described above with reference to embodiments thereof. It should be understood that various modifications, alternations and additions can be made by those skilled in the art without departing from the spirits and scope of the disclosure. Therefore, the scope of the disclosure is not limited to the above particular embodiments but only defined by the claims as attached.

Claims (22)

  1. A method (100) in a terminal device, comprising:
    transmitting (110) to a Network Exposure Function, NEF, node a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device.
  2. The method (100) of claim 1, further comprising:
    transmitting to the NEF node an authentication request including data from which the identifier is derivable; and
    receiving from the NEF node an authentication response including the information.
  3. The method (100) of claim 2, wherein the identifier is derivable from the data based on Generic Bootstrapping Architecture, GBA, or Extensible Authentication Protocol and Key Agreement, EAP-AKA.
  4. The method (100) of any of claims 1-3, wherein the identifier is an International Mobile Station Identity, IMSI.
  5. The method (100) of any of claims 1-4, wherein the information is a security token.
  6. A method (200) in a Network Exposure Function, NEF, node, comprising:
    receiving (210) from a terminal device a Quality of Service, QoS, request including an Internet Protocol, IP, address of the terminal device and information enabling the NEF node to determine an identifier of the terminal device;
    determining (220) the identifier based on the information; and
    transmitting (230) to a Policy Control Function, PCF, node a request to initiate a QoS modification, the request including the IP address and the identifier.
  7. The method (200) of claim 6, further comprising:
    receiving from the terminal device an authentication request including data from which the identifier is derivable;
    deriving the identifier from the data;
    generating the information in association with the identifier; and
    transmitting to the terminal device an authentication response including the information.
  8. The method (200) of claim 7, wherein the identifier is derived from the data based on Generic Bootstrapping Architecture, GBA, or Extensible Authentication Protocol and Key Agreement, EAP-AKA.
  9. The method (200) of any of claims 6-8, wherein the identifier is an International Mobile Station Identity, IMSI.
  10. The method (200) of any of claims 6-9, wherein the information is a security token.
  11. A method (400) in an application server, comprising:
    transmitting (410) to a Network Exposure Function, NEF, node a Quality of Service, QoS, request associated with a terminal device, the QoS request including an Internet Protocol, IP, address of the terminal device and an identifier of the terminal device.
  12. The method (400) of claim 11, further comprising:
    transmitting to the NEF node authentication information to enable the NEF node to authenticate the application server.
  13. The method (400) of claim 11 or 12, wherein the identifier is a Mobile Station Integrated Services Digital Network Number, MSISDN.
  14. A method (500) in a Network Exposure Function, NEF, node, comprising:
    receiving (510) from an application server a Quality of Service, QoS, request associated with a terminal device, the QoS request including an Internet Protocol, IP, address of the terminal device and an identifier of the terminal device; and
    transmitting (520) to a Policy Control Function, PCF, node a request to initiate a QoS modification, the request including the IP address and the identifier.
  15. The method (500) of claim 14, further comprising:
    receiving authentication information from the application server; and
    authenticating the application server based on the authentication information.
  16. The method (500) of claim 14 or 15, wherein the identifier is a Mobile Station Integrated Services Digital Network Number, MSISDN.
  17. A terminal device (800) , comprising a communication interface (810) , a processor (820) and a memory (830) , the memory (830) comprising instructions executable by the processor (820) whereby the terminal device (800) is operative to perform the method according to any of claims 1-5.
  18. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in a terminal device, causing the terminal device to perform the method according to any of claims 1-5.
  19. An application server (1000) , comprising a communication interface (1010) , a processor (1020) and a memory (1030) , the memory (1030) comprising instructions executable by the processor (1020) whereby the application server (1000) is operative to perform the method according to any of claims 11-13.
  20. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in an application server, causing the application server to perform the method according to any of claims 11-13.
  21. A Network Exposure Function, NEF, node (1300) , comprising a communication interface (1310) , a processor (1320) and a memory (1330) , the memory (1330) comprising instructions executable by the processor (1320) whereby the NEF node (1300) is operative to perform the method according to any of claims 6-10 or 14-16.
  22. A computer readable storage medium having computer program instructions stored thereon, the computer program instructions, when executed by a processor in a Network Exposure Function, NEF, node, causing the NEF node to perform the method according to any of claims 6-10 or 14-16.
PCT/CN2020/098776 2019-09-30 2020-06-29 Terminal device, application server, network exposure function node and methods therein WO2021063051A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20871987.2A EP4038939A4 (en) 2019-09-30 2020-06-29 Terminal device, application server, network exposure function node and methods therein
US17/763,791 US20220408303A1 (en) 2019-09-30 2020-06-29 Terminal Device, Application Server, Network Exposure Function Node and Methods Therein

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019109408 2019-09-30
CNPCT/CN2019/109408 2019-09-30

Publications (1)

Publication Number Publication Date
WO2021063051A1 true WO2021063051A1 (en) 2021-04-08

Family

ID=75336790

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/098776 WO2021063051A1 (en) 2019-09-30 2020-06-29 Terminal device, application server, network exposure function node and methods therein

Country Status (3)

Country Link
US (1) US20220408303A1 (en)
EP (1) EP4038939A4 (en)
WO (1) WO2021063051A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114423029A (en) * 2022-02-08 2022-04-29 深圳艾灵网络有限公司 Method, device and storage medium for adjusting service quality parameters
WO2023040528A1 (en) * 2021-09-15 2023-03-23 Telefonaktiebolaget Lm Ericsson (Publ) METHOD, APPARATUS FOR DYNAMIC QoS CHARACTERISTICS QUERY IN MOBILE NETWORK

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220255996A1 (en) * 2021-02-11 2022-08-11 Verizon Patent And Licensing Inc. Systems and methods for exposing user equipment identities to applications

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170317894A1 (en) * 2016-05-02 2017-11-02 Huawei Technologies Co., Ltd. Method and apparatus for communication network quality of service capability exposure
US10285155B1 (en) * 2018-09-24 2019-05-07 Cisco Technology, Inc. Providing user equipment location information indication on user plane
CN110169089A (en) * 2017-01-05 2019-08-23 华为技术有限公司 System and method for application friendly protocol Data Unit session management

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11184830B2 (en) * 2016-06-21 2021-11-23 Huawei Technologies Co., Ltd. Systems and methods for user plane path selection, reselection, and notification of user plane changes
CN110291803B (en) * 2017-05-09 2024-01-05 英特尔公司 Privacy protection and extensible authentication protocol authentication and authorization in cellular networks
US10805178B2 (en) * 2017-11-27 2020-10-13 Cisco Technology, Inc. Subscription-based event notification techniques for reducing data buffering in mobile networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170317894A1 (en) * 2016-05-02 2017-11-02 Huawei Technologies Co., Ltd. Method and apparatus for communication network quality of service capability exposure
CN110169089A (en) * 2017-01-05 2019-08-23 华为技术有限公司 System and method for application friendly protocol Data Unit session management
US10285155B1 (en) * 2018-09-24 2019-05-07 Cisco Technology, Inc. Providing user equipment location information indication on user plane

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; T8 reference point for Northbound APIs; (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 29.122, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG3, no. V16.2.0, 18 June 2019 (2019-06-18), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 309, XP051754234 *
HUAWEI TECHNOLOGIES: "pCR TR 32.899 Update of Network Capability Exposure", 3GPP DRAFT; S5-175314 REL-15 PCR 32.899 UPDATE OF NETWORK CAPABILITY EXPOSURE, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG5, no. Busan, Korea; 20171016 - 20171020, 19 October 2017 (2017-10-19), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051349105 *
ORANGE: "Missing NEF services", 3GPP DRAFT; S2-187587
See also references of EP4038939A4

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023040528A1 (en) * 2021-09-15 2023-03-23 Telefonaktiebolaget Lm Ericsson (Publ) METHOD, APPARATUS FOR DYNAMIC QoS CHARACTERISTICS QUERY IN MOBILE NETWORK
CN114423029A (en) * 2022-02-08 2022-04-29 深圳艾灵网络有限公司 Method, device and storage medium for adjusting service quality parameters
CN114423029B (en) * 2022-02-08 2023-12-19 深圳艾灵网络有限公司 Quality of service parameter adjustment method, equipment and storage medium

Also Published As

Publication number Publication date
EP4038939A1 (en) 2022-08-10
EP4038939A4 (en) 2023-10-04
US20220408303A1 (en) 2022-12-22

Similar Documents

Publication Publication Date Title
JP6759232B2 (en) Authentication and key sharing with complete forward secrecy
US9992625B2 (en) System and method for location reporting in an untrusted network environment
WO2021063051A1 (en) Terminal device, application server, network exposure function node and methods therein
US10193702B2 (en) Method and apparatus for providing sponsoring service between user equipments
US10064058B2 (en) Node selection using a combination of subscription entitlement and nodal characteristics
TWI543564B (en) Internet protocol mapping resolution in fixed mobile convergence networks
JP2018508146A (en) Efficient policy enforcement using network tokens for service-user plane approach
US20170289883A1 (en) Emergency services handover between untrusted wlan access and cellular access
TWI757595B (en) Interception aware access node selection
US11777994B2 (en) Dynamic per subscriber policy enablement for security platforms within service provider network environments
US20190037339A1 (en) Method and apparatus for facilitating location based services and/or location based policy control
US11882234B2 (en) Method and apparatus for granting or not granting a chargeable party at a session management with required quality of service utilizing a MAC address
US10637937B2 (en) Method for service chain policy formulation and device
US20230070426A1 (en) Security platform for service provider network environments
CN111436057B (en) Session management method and device
WO2016180113A1 (en) Method for initiating wi-fi voice service, lte communication device, terminal, and communication system
US20200275304A1 (en) UE Assistance Application Detection and Policy Control in QoS Deployment
WO2017107623A1 (en) User registration information processing method and apparatus, and evolved packet data gateway (epdg) device
WO2023046457A1 (en) Restricting onboard traffic
WO2019096279A1 (en) Secure communication method and device
US10547651B2 (en) System and method for providing telephony services over WiFi for non-cellular devices
US10470158B2 (en) Communication device, communication system, and communication method
JP2017534225A (en) Location information for unreliable access
CA2968439A1 (en) Charging control apparatus, method, and system
CN108377493B (en) Connection establishment method, device and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20871987

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020871987

Country of ref document: EP

Effective date: 20220502