U.S. patent application number 15/349423 was filed with the patent office on 2018-02-08 for service provisioning by local operator.
The applicant listed for this patent is NOKIA SOLUTIONS AND NETWORKS OY. Invention is credited to Silke HOLTMANNS, Zexian LI, Athul PRASAD, Mikko Aleksi UUSITALO.
Application Number | 20180041897 15/349423 |
Document ID | / |
Family ID | 56615958 |
Filed Date | 2018-02-08 |
United States Patent
Application |
20180041897 |
Kind Code |
A1 |
PRASAD; Athul ; et
al. |
February 8, 2018 |
SERVICE PROVISIONING BY LOCAL OPERATOR
Abstract
Some embodiments of the present invention relate to an
apparatus, a method, and a computer program product related to
coexistence of two network operators, for example a local operator
and an incumbent operator. In certain embodiments, a method may
include monitoring if network information from a server part of an
application is received by a client part of the application. The
client part is connected to the server part via a first network
that uses a radio access technology. The network information is
related to a second network that uses the radio access technology,
the second network being different from the first network. The
method also includes controlling a cellular radio layer such that
it interworks with the second network based on the received network
and authentication information.
Inventors: |
PRASAD; Athul; (Helsinki,
FI) ; HOLTMANNS; Silke; (Klaukkala, FI) ; LI;
Zexian; (Espoo, FI) ; UUSITALO; Mikko Aleksi;
(Helsinki, FI) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
NOKIA SOLUTIONS AND NETWORKS OY |
Espoo |
|
FI |
|
|
Family ID: |
56615958 |
Appl. No.: |
15/349423 |
Filed: |
November 11, 2016 |
Current U.S.
Class: |
1/1 |
Current CPC
Class: |
H04W 4/50 20180201; H04L
69/14 20130101; H04L 63/0876 20130101; H04W 48/18 20130101; H04W
88/06 20130101; H04W 8/205 20130101; H04W 28/10 20130101; H04W
76/15 20180201; H04W 12/06 20130101; H04W 8/183 20130101; H04W
56/001 20130101; H04L 63/08 20130101; H04W 48/08 20130101; H04W
48/16 20130101; H04L 63/083 20130101; H04W 16/14 20130101 |
International
Class: |
H04W 12/06 20060101
H04W012/06; H04W 12/08 20060101 H04W012/08; H04W 8/18 20060101
H04W008/18; H04W 4/00 20060101 H04W004/00 |
Foreign Application Data
Date |
Code |
Application Number |
Aug 3, 2016 |
EP |
PCT/EP2016/068565 |
Claims
1. An apparatus comprising: at least one processor; and at least
one memory including computer program code, wherein the at least
one processor, with the at least one memory and the computer
program code, are configured to cause the apparatus to at least:
monitor if network information from a server part of an application
is received by a client part of the application, wherein the client
part is connected to the server part via a first network that uses
a radio access technology, wherein the network information is
related to a second network that uses the radio access technology,
the second network being different from the first network; and
control a cellular radio layer such that the cellular radio layer
interworks with the second network based on the received network
information.
2. The apparatus according to claim 1, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least: access the
second network via the cellular radio layer when the network
information comprises a request to connect the client part of an
application to the server part of an application via the second
network; and connect the client part to the server part via the
second network after the accessing of the second network.
3. The apparatus according to claim 1, wherein the at least one
processor, with the at least one memory and the computer program
code, is configured to cause the apparatus to at least access the
second network via the cellular radio layer using an access
parameter of the second network, wherein the network information
comprises the access parameter of the second network.
4. The apparatus according to claim 2, wherein the at least one
processor, with the at least one memory and the computer program
code, is configured to cause the apparatus to at least authenticate
a user of the client part of the application to the second network
using credentials, wherein the client part is authenticated to the
application by credentials, and the user is authenticated to the
first network by user information different from the
credentials.
5. The apparatus according to claim 1, wherein the at least one
processor, with the at least one memory and the computer program
code, is configured to cause the apparatus to at least: provide the
server part of the application credentials from a virtual
subscriber identity module or soft subscriber identity module,
wherein the credentials are used to authenticate the client part of
the application.
6. The apparatus according to claim 1, wherein an internet protocol
address of the client part of the application is authenticated
using network access credentials or provisioning network access
credentials received from a secure credential storage.
7. The apparatus according to claim 1, wherein the client part of
the application is authenticated on an application layer using
network access credentials from an embedded universal integrated
circuit card.
8. The apparatus according to claim 7, wherein application layer of
the client part provides network information to a lower layer of a
user equipment in which the client part of the application is
located.
9. The apparatus according to claim 1, wherein the received network
information originates at a spectrum access server.
10. The apparatus according to claim 1, wherein the at least one
processor, with the at least one memory and the computer program
code, is configured to cause the apparatus to at least: determine
at the client part of the application whether to access the second
network based on cell selection criteria, wherein the cell
selection criteria comprises at least one of an identification of
the second network, location history of a user equipment in which
the client part of the application is located, a type of the user
equipment, or a subscription of a user of the client part of the
application.
11. The apparatus according to claim 1, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least: download
the network information at a user equipment to a virtual subscriber
identity module or a soft subscriber identity module.
12. An apparatus comprising: at least one processor; and at least
one memory including computer program code, wherein the at least
one processor, with the at least one memory and the computer
program code, are configured to cause the apparatus to at least:
provide, by a server part of an application, network information to
a client part of the application via a first network using a radio
access technology, wherein the network information is related to a
predetermined second network that uses the radio access technology,
the second network being different from the first network.
13. The apparatus according to claim 12, wherein the network
information comprises at least one of an access parameter of the
second network or a request to connect the client part to the
server part via the second network.
14. The apparatus according to claim 12, wherein the network
information is provided to a virtual subscriber identity module or
a soft subscriber identity module of the user equipment.
15. The apparatus according to claim 12, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least:
authenticate the client part of the application server using
credentials from a virtual or soft subscriber identity module.
16. The apparatus according to claim 12, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least: receive
network information at the server part of the application server
from a spectrum access server.
17. The apparatus according to claim 12, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least:
authenticate an internet protocol address of the client part of the
application before providing the client part of the application the
network information, wherein the authentication depends in part on
credentials received from the client part of the application.
18. The apparatus according to claim 17, wherein the credentials
are network access credentials or provisioning network access
credentials received from a secure credential storage
19. The apparatus according to claim 17, wherein the authentication
of the internet protocol address occurs in an application
layer.
20. An apparatus comprising: at least one processor; and at least
one memory including computer program code, wherein the at least
one processor, with the at least one memory and the computer
program code, are configured to cause the apparatus to at least:
receive at a base station user credentials from a client part of an
application via a first network using a radio access technology;
forward the user credentials to a server part of the application;
receive network information from the server part of the application
based on the forwarded user credentials; and transmit the network
information from the base station to the client part of an
application, wherein the network information is related to a
predetermined second network that uses the radio access technology,
the second network being different from the first network.
21. The apparatus according to claim 20, wherein the at least one
processor, with the at least one memory and the computer program
code, are configured to cause the apparatus to at least further
comprising: authenticate an internet protocol address of the client
part of the application using network access credentials or
provisioning network access credentials received from a secure
credential storage at a user equipment, and wherein the network
information is transmitted to the client part of the application
after authentication of the internet protocol address.
Description
CROSS-REFERENCE TO RELATED APPLICATION
[0001] The present application claims priority to PCT International
Application No. PCT/EP2016/068565, filed on Aug. 3, 2016. The
entire content of the priority application is hereby incorporated
by reference.
BACKGROUND
Field
[0002] Some networks may benefit from the coexistence of two
different network operators. More particularly, a network may
benefit from service provisioning by a local operator in the
presence of an incumbent operator.
Description of the Related Art
[0003] Local operators (LOs), also known as micro operators, are
used for deployment and specialized service provisioning in the
fifth generation (5G) networks. LOs are particularly helpful in
ultra-dense networks having high capacity demands. LOs are
experiencing increasing opportunities for growth in shared
spectrums, such as Citizens Broadband Radio Service (CBRS)
providing a 3.5 gigahertz (GHz) band.
[0004] For example, a LO is an operator who leases a certain
portion of a spectrum, and provides certain services in a given
limited area. An incumbent operator (IO), on the other hand,
provides services over a larger area, such as an entire country, or
substantially an entire country.
[0005] Incumbent operators, or service providers that act in place
of the incumbent operator, issue subscriber identity module (SIM)
cards or universal integrated circuit cards (UICCs) comprising a
universal subscriber identity module (USIM) application.
Alternatively, they may provision data to an embedded UICC (eUICC)
or an integrated UICC. SIM cards and UICCs are used to identify
users and their associated network, and to allow users to roam to
other incumbent networks if a roaming agreement is in place. An LO
typically does not issue physical SIM cards or UICCs. The LO may
deploy any radio access technology suitable for the LO spectrum,
while the IO deploys a Third Generation Partnership Project (3GPP)
network, such as Long Term Evolution (LTE), LTE-Advanced (LTE-A),
or a 5th generation (5G) network.
[0006] There are various modes of operation currently being studied
for local operators. Two common approaches are that the LOs and IOs
operate jointly with bilateral revenue sharing agreements, or that
LOs and IOs operate independently with limited interaction. The
first approach has various benefits, such as better inter-working
between IO and LO with better mobility support, as well as an
optimized network deployment density, especially when multiple IOs
cooperate with a single LO. A joint operation, however, would mean
that the LOs would need to have bilateral agreements with all the
IOs for deploying the network.
[0007] A manual public land mobile network (PLMN) scan to allow a
user to select an appropriate PLMN based on the scanning of all
PLMNs is available. The PLMN identity is always pre-configured in
the UE or included in SIM card. But for the randomly deployed LOs,
mechanisms for PLMN selection, authentication and charging are
currently not available.
SUMMARY
[0008] A method, in certain embodiments, may include monitoring if
network information from a server part of an application is
received by a client part of the application. The client part is
connected to the server part via a first network that uses a radio
access technology. In addition, the network information is related
to a second network that uses the radio access technology, the
second network being different from the first network. The method
may also include controlling a cellular radio layer such that the
cellular radio layer interworks with the second network based on
the received network information.
[0009] According to certain embodiments, an apparatus may include
at least one processor and at least one memory including computer
program code. The at least one processor, with the at least one
memory and the computer program code, may be configured to cause
the apparatus at least to monitor if network information from a
server part of an application is received by a client part of the
application. The client part is connected to the server part via a
first network that uses a radio access technology, and the network
information is related to a second network that uses the radio
access technology, the second network being different from the
first network. The at least one processor, with the at least one
memory and the computer program code, may be configured to also
cause the apparatus at least to control a cellular radio layer such
that the cellular radio layer interworks with the second network
based on the received network information.
[0010] An apparatus, in certain embodiments, may include means for
monitoring if network information from a server part of an
application is received by a client part of the application. The
client part may connect to the server part via a first network that
uses a radio access technology. In addition, the network
information may relate to a second network that uses the radio
access technology, the second network being different from the
first network. The apparatus may also include means for controlling
a cellular radio layer such that the cellular radio layer
interworks with the second network based on the received network
information.
[0011] According to certain embodiments, a non-transitory
computer-readable medium encoding instructions that, when executed
in hardware, perform a process. The process may include monitoring
if network information from a server part of an application is
received by a client part of the application. The client part may
connect to the server part via a first network that uses a radio
access technology. In addition, the network information may relate
to a second network that uses the radio access technology, the
second network being different from the first network. The process
may also include controlling a cellular radio layer such that the
cellular radio layer interworks with the second network based on
the received network information.
[0012] According to certain embodiments, a computer program product
encoding instructions for monitoring if network information from a
server part of an application is received by a client part of the
application. The client part may connect to the server part via a
first network that uses a radio access technology. In addition, the
network information may relate to a second network that uses the
radio access technology, the second network being different from
the first network. The method may also include controlling a
cellular radio layer such that the cellular radio layer interworks
with the second network based on the received network
information.
[0013] A method, in certain embodiments, may include providing, by
a server part of an application, network information to a client
part of the application via a first network using a radio access
technology. The network information may be related to a
predetermined second network that uses the radio access technology,
the second network being different from the first network.
[0014] According to certain embodiments, an apparatus may include
at least one processor and at least one memory including computer
program code. The at least one processor, with the at least one
memory and the computer program code, may be configured to cause
the apparatus at least to provide, by a server part of an
application, network information to a client part of the
application via a first network using a radio access technology.
The network information is related to a predetermined second
network that uses the radio access technology, the second network
being different from the first network.
[0015] An apparatus, in certain embodiments, may include means for
providing, by a server part of an application, network information
to a client part of the application via a first network using a
radio access technology. The network information is related to a
predetermined second network that uses the radio access technology,
the second network being different from the first network.
[0016] According to certain embodiments, a non-transitory
computer-readable medium encoding instructions that, when executed
in hardware, perform a process. The process may include providing,
by a server part of an application, network information to a client
part of the application via a first network using a radio access
technology. The network information is related to a predetermined
second network that uses the radio access technology, the second
network being different from the first network.
[0017] According to certain embodiments, a computer program product
encoding instructions for performing a process according to a
method including providing, by a server part of an application,
network information to a client part of the application via a first
network using a radio access technology. The network information is
related to a predetermined second network that uses the radio
access technology, the second network being different from the
first network.
[0018] A method, in certain embodiments, may include checking if a
client part of an application is connected to a server part of the
application via a first network using radio access technology. The
method may also include monitoring if the client part of the
application becomes connected to the server part of the application
via a predetermined second network of the radio access technology.
The second network is different from the first network. In
addition, the method may include providing, by the server part of
the application to a charging device, an information on a usage of
the second network for the communication between the server part of
the application and the client part of the application if the
client part of the application becomes connected to the server part
of the application via the second network.
[0019] According to certain embodiments, an apparatus may include
at least one processor and at least one memory including computer
program code. The at least one processor, with the at least one
memory and the computer program code, may be configured to cause
the apparatus at least to check if a client part of an application
is connected to a server part of the application via a first
network using radio access technology. The at least one processor,
with the at least one memory and the computer program code, may
also be configured to cause the apparatus at least to monitor if
the client part of the application becomes connected to the server
part of the application via a predetermined second network of the
radio access technology. The second network is different from the
first network. In addition, the at least one processor, with the at
least one memory and the computer program code, may be configured
to cause the apparatus at least to provide, by the server part of
the application to a charging device, an information on a usage of
the second network for the communication between the server part of
the application and the client part of the application if the
client part of the application becomes connected to the server part
of the application via the second network.
[0020] An apparatus, in certain embodiments, may include means for
checking if a client part of an application is connected to a
server part of the application via a first network using radio
access technology. The apparatus may also include means for
monitoring if the client part of the application becomes connected
to the server part of the application via a predetermined second
network of the radio access technology. The second network is
different from the first network. In addition, the apparatus may
include means for providing, by the server part of the application
to a charging device, an information on a usage of the second
network for the communication between the server part of the
application and the client part of the application if the client
part of the application becomes connected to the server part of the
application via the second network.
[0021] According to certain embodiments, a non-transitory
computer-readable medium encoding instructions that, when executed
in hardware, perform a process. The process may include checking if
a client part of an application is connected to a server part of
the application via a first network using radio access technology.
The process may also include monitoring if the client part of the
application becomes connected to the server part of the application
via a predetermined second network of the radio access technology.
The second network is different from the first network. In
addition, the process may include providing, by the server part of
the application to a charging device, an information on a usage of
the second network for the communication between the server part of
the application and the client part of the application if the
client part of the application becomes connected to the server part
of the application via the second network.
[0022] According to certain embodiments, a computer program product
encoding instructions for performing a process according to a
method including checking if a client part of an application is
connected to a server part of the application via a first network
using radio access technology. The method may also include
monitoring if the client part of the application becomes connected
to the server part of the application via a predetermined second
network of the radio access technology. The second network is
different from the first network. In addition, the method may
include providing, by the server part of the application to a
charging device, an information on a usage of the second network
for the communication between the server part of the application
and the client part of the application if the client part of the
application becomes connected to the server part of the application
via the second network.
[0023] A method, in certain embodiments, may include monitoring if
a user authenticates to a radio network by credentials in order to
access the radio network. The method may also include checking if
the user is authenticated to a predetermined application by the
credentials when the user authenticates to the radio network by the
credentials. In addition, the method may include granting access to
the radio network for the user when the user is authenticated to
the predetermined application by the credentials.
[0024] According to certain embodiments, an apparatus may include
at least one processor and at least one memory including computer
program code. The at least one processor, with the at least one
memory and the computer program code, may be configured to cause
the apparatus at least to monitor if a user authenticates to a
radio network by credentials in order to access the radio network.
The at least one processor, with the at least one memory and the
computer program code, may also be configured to cause the
apparatus at least to checking if the user is authenticated to a
predetermined application by the credentials when the user
authenticates to the radio network by the credentials. In addition,
the at least one processor, with the at least one memory and the
computer program code, may be configured to cause the apparatus at
least to granting access to the radio network for the user when the
user is authenticated to the predetermined application by the
credentials.
[0025] An apparatus, in certain embodiments, may include means for
monitoring if a user authenticates to a radio network by
credentials in order to access the radio network. The apparatus may
also include means for checking if the user is authenticated to a
predetermined application by the credentials when the user
authenticates to the radio network by the credentials. In addition,
the apparatus may include means for granting access to the radio
network for the user when the user is authenticated to the
predetermined application by the credentials.
[0026] According to certain embodiments, a non-transitory
computer-readable medium encoding instructions that, when executed
in hardware, perform a process. The process may include monitoring
if a user authenticates to a radio network by credentials in order
to access the radio network. The process may also include checking
if the user is authenticated to a predetermined application by the
credentials when the user authenticates to the radio network by the
credentials. In addition, the process may include granting access
to the radio network for the user when the user is authenticated to
the predetermined application by the credentials.
[0027] According to certain embodiments, a computer program product
encoding instructions for performing a process according to a
method including monitoring if a user authenticates to a radio
network by credentials in order to access the radio network. The
method may also include checking if the user is authenticated to a
predetermined application by the credentials when the user
authenticates to the radio network by the credentials. In addition,
the method may include granting access to the radio network for the
user when the user is authenticated to the predetermined
application by the credentials.
[0028] A method, in certain embodiments, may include receiving at a
base station user credentials from a client part of an application
via a first network using a radio access technology. The method may
also include forwarding the user credentials to a server part of
the application. In addition, the method may include receiving
network information from the server part of the application based
on the forwarded user credentials. Further, the method may include
transmitting the network information from the base station to the
client part of an application. The network information is related
to a predetermined second network that uses the radio access
technology, the second network being different from the first
network
[0029] According to certain embodiments, an apparatus may include
at least one processor and at least one memory including computer
program code. The at least one processor, with the at least one
memory and the computer program code, may be configured to cause
the apparatus at least to receive at a base station user
credentials from a client part of an application via a first
network using a radio access technology. The at least one
processor, with the at least one memory and the computer program
code, may also be configured to forward the user credentials to a
server part of the application. In addition, the at least one
processor, with the at least one memory and the computer program
code, may be configured to cause the apparatus at least to receive
network information from the server part of the application based
on the forwarded user credentials. Further, the at least one
processor, with the at least one memory and the computer program
code, may be configured to transmit the network information from
the base station to the client part of an application. The network
information is related to a predetermined second network that uses
the radio access technology, the second network being different
from the first network
[0030] An apparatus, in certain embodiments, may include means for
receiving at a base station user credentials from a client part of
an application via a first network using a radio access technology.
The apparatus may also include means for forwarding the user
credentials to a server part of the application. In addition, the
apparatus may include means for receiving network information from
the server part of the application based on the forwarded user
credentials. Further, the apparatus may include means for
transmitting the network information from the base station to the
client part of an application. The network information is related
to a predetermined second network that uses the radio access
technology, the second network being different from the first
network.
[0031] According to certain embodiments, a non-transitory
computer-readable medium encoding instructions that, when executed
in hardware, perform a process. The process may include receiving
at a base station user credentials from a client part of an
application via a first network using a radio access technology.
The process may also include forwarding the user credentials to a
server part of the application. In addition, the process may
include receiving network information from the server part of the
application based on the forwarded user credentials. Further the
process may include transmitting the network information from the
base station to the client part of an application. The network
information is related to a predetermined second network that uses
the radio access technology, the second network being different
from the first network.
[0032] According to certain embodiments, a computer program product
encoding instructions for performing a process according to a
method including receiving at a base station user credentials from
a client part of an application via a first network using a radio
access technology. The method may also include forwarding the user
credentials to a server part of the application. In addition, the
method may include receiving network information from the server
part of the application based on the forwarded user credentials.
Further, the method may include transmitting the network
information from the base station to the client part of an
application. The network information is related to a predetermined
second network that uses the radio access technology, the second
network being different from the first network.
BRIEF DESCRIPTION OF THE DRAWINGS
[0033] Further details, features, objects, and advantages are
apparent from the following detailed description of certain
embodiments of the present invention which is to be taken in
conjunction with the appended drawings:
[0034] FIG. 1 illustrates a system according to certain
embodiments.
[0035] FIG. 2 illustrates an overview of the multi-operator
multi-connectivity concept according to certain embodiments.
[0036] FIG. 3 illustrates a signaling diagram for cell detection,
selection, and access according to certain embodiments.
[0037] FIG. 4 illustrates a cell search procedure according to
certain embodiments.
[0038] FIG. 5 illustrates a cell search procedure with beam
discovery according to certain embodiments.
[0039] FIG. 6 illustrates traffic steering according to certain
embodiments.
[0040] FIG. 7 illustrates a flow diagram according to certain
embodiments.
[0041] FIG. 8 illustrates an apparatus according to certain
embodiments.
[0042] FIG. 9 illustrates a flow diagram according to certain
embodiments.
[0043] FIG. 10 illustrates an apparatus according to certain
embodiments.
[0044] FIG. 11 illustrates a flow diagram according to certain
embodiments.
[0045] FIG. 12 illustrates an apparatus according to certain
embodiments.
[0046] FIG. 13 illustrates a flow diagram according to certain
embodiments.
[0047] FIG. 14 illustrates an apparatus according to certain
embodiments.
[0048] FIG. 15 illustrates a flow diagram according certain
embodiments.
[0049] FIG. 16 illustrates an apparatus according to certain
embodiments.
[0050] FIG. 17 illustrates a protocol stack with interfaces
according to certain embodiments.
[0051] FIG. 18 illustrates an overview of the multi-operator
multi-connectivity according to certain embodiments.
[0052] FIG. 19 illustrates a signal flow diagram according to
certain embodiments.
[0053] FIG. 20 illustrates a signal flow diagram according to
certain embodiments.
[0054] FIG. 21 illustrates a signal flow diagram according to
certain embodiments.
[0055] FIG. 22 illustrates a flow diagram according to certain
embodiments.
[0056] FIG. 23 illustrates a flow diagram according to certain
embodiments.
[0057] FIG. 24 illustrates a flow diagram according to certain
embodiments.
[0058] FIG. 25 illustrates a flow diagram according to certain
embodiments.
DETAILED DESCRIPTION
[0059] Certain embodiments discussed below, may relate to the
second approach, in which the IOs and LOs are uncoordinated. LOs
may lease a network spectrum from regulatory authorities, within
finite geographic area. This allows certain embodiments to provide
for an easy deployment and service provisioning by the LOs, without
depending on cooperation or coordination with the IOs. The LO may
provide specialized services such as high-performance gaming or
virtual reality arenas, ultra-low latency robotics arena, network
for an industrial plant. The services may be provisioned using a 5G
user equipment (5G UE), along with 5G-radio access points (5G-RAP),
also referred to as 5G NodeB (5G NB).
[0060] The services provided by the LOs may allow the UE access to
a wide variety of features such as extreme mobile broadband with
significantly high capacity, and ultra-low latency with very high
levels of reliability. There are various cost benefits of using
widely available 5G-RAPs, as compared to other using proprietary
base stations, with access to the 5G UEs. For example, by removing
the SIM cards or UICC with USIM applications, in 5G UE, the LOs
have more flexibility in having access to a wide variety of users
with different charging functionalities.
[0061] By using 5G NB, LO can achieve economy of scale, while also
maintaining network and service deployment flexibility. There may
also be reduced administrative overhead for both LOs and IOs, as
compared to an embodiment in which the LO and IO and coordinated.
Some of the embodiments may also provide for a less error prone
network configuration that can employ standardized access to LO
networks, while also increasing user satisfaction and quality of
experience for specialized service. Certain embodiments may also
prevent the network of IO from being challenged by specialized
services, and allow for easy, even seamless, accessibility of LO
networks by users.
[0062] Certain embodiments of the invention are described in detail
with reference to the accompanying drawings, wherein the features
of the embodiments can be freely combined with each other unless
otherwise described. The description of certain embodiments is
given by way of example only, and is in no way intended as limiting
the invention to the disclosed embodiments. Moreover, it is to be
understood that an apparatus including at least one processor and
at least one memory comprising computer program code is configured
to perform the corresponding methods, although in some cases only
the apparatus or only the method is described.
[0063] In certain embodiments, LO may use 5G instead of other radio
access technologies (RATs), such as wireless land access network
(WLAN), because 5G provides features such as ultra-reliability and
low-latency communications, along with extreme mobile broadband
data rates. In embodiments in which the LO seeks to deploy a
high-performance gaming arena and/or a virtual reality center
utilizing a 5G network may be helpful. In other examples, the LO
may seek to employ potentially new business cases where the LO can
make use of the 5G features to create new business opportunities.
The one or more virtual reality centers may provide the end users
with access to live football games, concerts, or any other form of
entertainment, which users may access through a user equipment,
such as a smartphone.
[0064] If user access to the LO network can be made easier, as
provided for in some of the embodiments described below, users
irrespective of the IO may be able to access the services provided
by the LO. Such networks could be provided by any provider, such as
an industrial provider of Internet of Things (IoT) services, which
may have an explicit focus on providing users with varying
services.
[0065] Users of the IO may roam into the LO network based on the
user identity provided in the SIM card of the user equipment. The
user identity stored in the SIM card, which may take the form of a
USIM, may be an example of "user information". However, according
to some embodiments, roaming may be replaced by using application
level details for authentication, instead of the SIM card. The
application level details may be an example of credentials.
Alternatively, some embodiments may utilize a soft SIM or a virtual
SIM, as shown in FIGS. 18-22.
[0066] FIG. 1 illustrates a system according to certain
embodiments. In particular, FIG. 1 illustrates a 5G UE 11 having
multi-operator multi-connectivity with the LO and IO. Both the LO
and the IO may carry traffic from and to the UE simultaneously.
That is, the 5G UE can be connected simultaneously to both 5G-RAP
or 5G-NB 12 of the IO and 5G-RAP or 5G-NB 13 of the LO, and traffic
can be carried on both of these connections. The base stations or
RAPs are connected to respective core networks (CN) 14, 15. In one
example, the IO core network provides connectivity to basic
services such as voice calls and internet. The LO core network, on
the other hand, provides connectivity for special services and use
cases.
[0067] In certain embodiments, there may not be a separate SIM at
the UE for the LO, but there may be a logical link 16 between the
policy, charging, and/or user information functions between the LO
CN to the IO CN. The logical link may be over the Internet, or may
use any other network form. In other words, there may be a logical
link via the application layer between the LO CN user-specific
functions and the 5G UE application layer. As such, in some
embodiments new users can be created, and prepaid or post-paid
charging functions may be configured for the LO using the IO-CN.
The 5G UE may have multiple transmit-receive chains and related
functionalities that help support multi-operator
multi-connectivity. In other embodiments, UEs may have a single
transmit-receive chain that can operate with a lower performance
level.
[0068] LOs may include a local home network, in certain
embodiments, that may be rented to consumers. When consumers are
located at an area in which the local home network is employed,
such as the home or office of the consumer, the consumers may have
access to the local network. Upon leaving their homes or offices,
consumers may exit the home network and return to using the IO
network.
[0069] In some embodiments, one network may be different from
another network if the respective core networks are different from
each other. In other words, different may indicate independent
operation of the one network as compared to another network using
dedicated infrastructure and/or spectral resources. In some other
embodiments, the another network may share or lease spectral
resources and/or infrastructure from the one network, yet still be
considered different because the respective core networks are
different. Although LO and IO may be different networks, they may
utilize the same radio access technology (RAT). For example IO and
LO may both use a 5G network. In some other embodiments, however,
the IO and LO may use two different RATs.
[0070] Certain embodiments may provide the 5G UE multi-operator
multi-connectivity in a standardized manner, so that the LO
operators can deploy their network using 5G-RAPs, and provide
ultra-reliability, low latency, high capacity and other 5G
features. With the developing localized spectrum licensing and/or
sublicensing agreements, the LOs may have access to large amounts
of spectrum due to local usage only, without depending on the
IOs.
[0071] In one embodiment, the LO may cooperate with one or more IO
in order to provide support for system access and charging
functionalities. Such an embodiments, however, may limit the
flexibility of the LO from having fast, and possibly random,
deployment of networks that may allow for the creation of new
revenue models. A standardized procedure for LO deployment using 5G
technology can reduce deployment costs. Some of the embodiments,
therefore, provide easy LO deployment with a focus on tailored
service provisioning. Cell selection and/or authentication using a
LO that may be accessed through SIM-less access or via frequent
exchanges of a physical SIM card may also be provided in some
embodiments. Some embodiments may also provide for cell selection
and/or cell access using a virtual or soft SIM
[0072] In certain embodiments, operators may deploy networks in
unlicensed band which can tightly interwork with the LTE network,
using an application layer. These embodiments may also provide for
multi-operator multi-connectivity operation with normal cell
selection, related procedures for the IOs, and the use of
application specific criteria for the LOs. For example, the UE
application layer may provide assistance and/or act as a trigger in
cell search, cell selection, and/or traffic steering between IO and
LO, as well as for charging the user for the services provided by
the LO.
[0073] Cell search may include the UE application layer initiating
and providing frequency bands and center frequencies for cell
searching at the appropriate conditions. Cell selection may involve
the use of cell selection criteria with appropriate identifications
(IDs), such as PLMN IDs, or any other application related IDs,
and/or Random Access Channel preamble. These criteria may be
provided by the UE application layer, based on the dynamic
information available from the application server. In some
embodiments, the application server may be a cloud based server, as
shown in FIGS. 4 and 5.
[0074] The UE application server may also help in traffic steering
between IO and LO. In particular, the application layer may provide
an indication to UE buffers about routing certain traffic types
over the LO network and the IO network, respectively. In certain
embodiments, a user may be charged for use of the LO network based
on the application layer user information and/or authentication
information provided to the UE during cell selection and connection
establishment. The charging of the usage of the LO network may be
done by the LO through the application itself For example, if a
user is using a gaming application that utilizes a LO, the charge,
such as a monetary fee, may be assessed to the user through the
gaming application.
[0075] FIG. 2 gives an overview of the multi-operator
multi-connectivity concept according to some embodiments. As shown
in the bottom part of FIG. 2, a 5G UE 21 may be connected to 5G NBs
of the IO (IO-5G NB 22) and the LO (LO-5G NB 23), respectively, via
multi-connectivity links. The 5G UE itself may have a layered
software structure comprising an application layer 24 and a lower
layer, such as a cellular radio layer 25. The software structure
may be located in at least one processor and at least one memory
comprising computer program code. Each of these layers may comprise
one or more sub-layers. For example, the cellular radio layer 25
may comprise a physical layer, a radio resource control (RRC)
layer, and/or a radio link control layer. The application layer 24
typically comprises a client part of one or more applications.
[0076] A protocol architecture according to certain embodiments is
illustrated in FIG. 17. The LO Application 177 may provide the cell
search and/or selection parameters, as well as other parameters
included in initiating the process, to physical layer (PHY) 171 of
the UE protocol stack. For example, LO application 177 may use
interface 1711 to communication with PHY layer 171, which may be
implementation specific and/or developed as an Application
Programming Interface (API). For traffic steering, LO Application
177 could route either Internet Protocol (IP) layer 175 packets
meant for the LO network to the appropriate radio interfaces, or
provide one or more rules to the Packet Data Convergence Protocol
(PDCP) layer 174 of the protocol stack. Interface 1712 may be used
for the routing of IP layer 175 packets or PDCP layer 174
packets.
[0077] Interface 1713, in certain embodiments, may be used towards
charging function 178, in order to allow for the charging of users
for services used in the LO network and/or the usage of the LO
network for the services. Medium Access Control (MAC) 172, Radio
Link Control (RLC) 173, and Transmission Control Protocol (TCP) 176
layers may also be included. FIG. 17 is merely given as one example
that utilizes IP packets, but the described method and/or protocol
can be extended to any other packet embodiment, such as Ethernet
packets.
[0078] In the top part of FIG. 2, an embodiment is shown in which
the 5G UE 21 selects the IO-5G NB 22 based on 3GPP procedures. On
the other hand, the LO-5G NB 23 may be selected by a selection
procedure in which the UE, and the application layer thereof, may
be involved. This selection procedure of LO-5G NB may be referred
to as a "UE defined cell selection procedure" and is discussed
below.
[0079] FIG. 3 shows a signal flow diagram according to certain
embodiments. In step 31, an application may be running on the UE.
This side of the application may be referred to as the client part
of the application. The application may trigger a search for a LO
network. Since the UE may currently be served by the IO network,
the UE may connect to the server part of the application running on
an application server via an IO network, as shown in step 32. In
step 33, the application server may provide to the UE access
information, such as carrier frequency. The application server may
in some embodiments provide this information on its own volition,
while in other embodiments the application server provides the
information in response to a request from the client part of the
application.
[0080] The UE, using the cellular radio layer, may search for a LO
network (NW), as shown in step 34, based on the access information
received from the application server in step 33. For example, the
application layer may provide the received access information to
the cellular radio layer, or the application layer may generate
some control commands in order to control the cellular radio layer
based on the received access information. In some embodiments, the
application server can trigger LO NW cell search. For example, when
the application server is aware of both the geographical coverage
information of LO NW and the location information of 5G UE, cell
search may be triggered. If a LO NW grants access to the UE, the UE
may steer some traffic, such as traffic related to the application
in step 31, to the application server via the LO NW, as shown in
step 35.
[0081] The UE may in some embodiments be connected to both IO
network and LO network simultaneously. In certain embodiments, if a
given service is not requested by the UE, the UE may disconnect
from the IO network.
[0082] FIG. 4 illustrates a cell search procedure according to
certain embodiments. In particular, as shown in FIG. 4, UE
application layer 24, also referred to as the client part, may
interact with application server 46, also referred to as the server
part, to provide access parameters to cellular radio layer 25 of
the UE 21. For example, search parameters 44 may be exchanged.
Search parameters 44 may be used for cell searching according to a
search function 45. The search parameters may include, in some
embodiments, one or more of the frequency bands, and/or a center
frequency in order to listen to a discovery signal and/or a
synchronization signal, as well as to determine when and/or where
to initiate cell search. Search parameters 44 allow for a dynamic
provisioning of information to the UE, where the frequency bands
and other related radio parameters may be configurable.
[0083] Application server 46 may also provide radio fingerprint
information to help optimize the cell search procedure. The UE may
use the fingerprint information, for example, to search only when
required, thereby saving UE battery power. For the radio
fingerprint information, the application server may utilize
crowdsourcing, to collect information from all of the UEs
subscribing to a particular application for accessing LO networks,
based at least in part on the cell search information provided by
all the UEs subscribed to that application.
[0084] In certain embodiments, the application may serve as an
aggregation point where multiple local operators collaborate to
provision service to the end users. This service provisioning may
include the establishment of a security association by providing
credentials to the user or UE. One example may be to use popular
social media sites to provide authentication and cell search
information, where multiple LOs can collaborate and reuse the
available information. Thus, a generic application such as an
application store from the UE's operating system provider may
provide access to the charging and/or authentication functions in
order to allow the LOs to connect to the UE. In some embodiments,
the application may provide the charging and/or authentication
function to the LO network, if the application already has the
credentials of the user, such as credit card information to allow a
user to make a payment.
[0085] In 5G, cell search and discovery may be based on
beam-specific system design. In certain embodiments, a discovery
signal and/or system information may be broadcast over specific
beams in the LO network that may be aware of the application
context. The LO application, also referred to as the server part,
may determine the application context, such as UE proximity to the
LO network and/or possible location information. In a 5G network,
the LO 5G NB 23 may not send the system access and discovery signal
information at all times. In other words, the LO may utilize
selective signalling. The selective sending of the information may
optimize energy savings and avoid unnecessary information
broadcasting, which may help to maximize spectral efficiency and
capacity of the network.
[0086] According to some embodiments, the LO application may
configure one or more beams 51, 52, as shown in FIG. 5, in LO-5G NB
23 to send discovery and synchronization information, along with
the system information to the 5G UE. The beams may be based on the
beam ID, and may allow the 5G UE 21 to discover the LO network. The
beams may also provide the same information to the client part of
application 24 in UE 21, which may then inform cellular radio layer
25. An overview of this procedure is shown in FIG. 5, where LO
application, which may be the server part on cloud application
server 46, can send the LO-5G NB discovery information. The
discovery information may inform the 5G NB 21 to configure
discovery and system information broadcast through first Beam 51
and second Beam 52. In certain embodiments, the two beams may have
distinct or separate functions. For example, the discovery signal
information may be different in the two beams. The application
server may be a separate application server or may be installed on
a cloud or a cloud application server.
[0087] The application layer, in certain embodiments, may provide
the cell selection parameters, such as the PLMN selection criteria,
and/or radio parameter information, such as signal strength and
quality criteria, provided by the application layer. The cellular
radio layer in the UE may use selection criteria or radio parameter
information, and compares the information with other information,
available in for example in a first system information block (SIB)
cellAccessRelatedInfo parameter to decide whether or not to select
the detected cell. Other information related to the random access
procedure, especially using application layer random access
preambles may be provided to a lower layer. In some embodiments,
the application layer in the UE may provide the cellular radio
layer in the UE with possible random access preambles that may be
used for cell initial access.
[0088] Certain embodiments may use multi-operator
multi-connectivity, and efficiently steer traffic between the LO
and IO. Traffic meant for IO, for example, may be prioritized and
routed to the IO using legacy traffic flow templates (TFT). For the
LO, on the other hand, the TFT may be provided by the application
server directly to the client part of the application on the UE.
The client part of the application may then use the received
traffic flow template to influence the UE application scheduler.
The application scheduler may decide, for example, to which network
the traffic should be routed, and then routes the traffic according
to the available rules. Such traffic steering can be particularly
useful, since the LO network may be tailored for provisioning very
specialized services, such as high-performance gaming or virtual
reality arenas, which can impose strict limitations on the
throughput and latency requirements of the traffic. A traffic flow
template may be an example of a traffic flow parameter.
[0089] The LO network may also, in certain embodiments, utilize
mobile edge computing, whereby the core network may be collocated
with the radio access network, to minimize the end-to-end latency
for the services provided over the LO network. Since the IO can be
deployed for all services, such tailored service provisioning may
in some embodiments not be used in the IO network. The LO providing
access to a limited set of services can provide the UE with the
application ID parameters to allow the UE to manage traffic
steering.
[0090] FIG. 6 illustrates traffic steering according to certain
embodiments. In particular, FIG. 6 illustrates that the application
server 46, such as a cloud application server can provide a traffic
flow template 68 to a client part or application layer 24 of UE 21.
Based on the traffic flow template, UE application scheduler 67 may
control the cellular radio layer 25 to route certain traffic, for
example LO traffic, to the LO-5G NB 23, and certain other traffic,
for example IO traffic, to the IO-5G NB 22. The traffic may then be
forwarded to the respective core networks 14, 15. An LO traffic
buffer 61 and an IO traffic buffer 62 are also provided. One or
more multiconnectivity (MC) links are provided between 5G UE 21 and
IO-5G NB 22 and between 5G UE 21 and LO-5G NB 23.
[0091] A charging function may be based on UE application
subscription information that may be provided during service flow
establishment. In such an embodiment, the LO network may be
simplified by removing roaming based on information derived from a
SIM card, as discussed above, although roaming may still be allowed
in the network. In certain embodiments, end users subscribing to a
particular service can access the LO network. The charging policies
may depend, at least in part, on the traffic volume and/or service
type used by the end user. The LO Packet Data Network (PDN), such
as a PDN Gateway (P-GW) may enforce the bearer level quality of
service (QoS) class identifier values (QCI) based on the UE
application (UE App) subscription type. The LO radio access network
may enforce QCI values, similar to processes outlined in the LTE
evolved packet core (EPC).
[0092] The application layer, in certain embodiments, may know the
user identity, such as a Mobile Station International Subscriber
Directory Number (MSISDN), from when the user or client part
accessed the application or server part via the IO network. The LO
may therefore still apply the same charging, whether the charge is
prepaid or postpaid, even if the client part gains access the
server part via the LO network. In other words, the application may
charge the user for usage of the LO network using similar charging
to the IO network.
[0093] FIG. 7 illustrates a flow diagram according to certain
embodiments. The UE may first connect to the IO network, as shown
in step 71. The UE may then send a measurement report of the IO
network and/or GPS information to the application server via the
client part of the application on the UE, as shown in step 72,
using the IO network. Instead of, or in addition to, using GPS
information, data of any other positioning system or any other
location information may be transmitted.
[0094] Based on the provided measurement report and/or location
information, the LO application located in the UE may detect that
the UE is in the proximity of the LO network. For example, the LO
application server may have the radio fingerprint information in
the vicinity of the areas where the LO 5G NBs are deployed. The
radio fingerprint information may include information about the IO
network in the vicinity of the LO network. The IO network
measurements that the UE conducts, especially those used for
providing mobility and service continuity, may comprise
corresponding information. For example, the radio fingerprint
information may contain the IO network cell IDs and corresponding
signal strengths, which may be measured by the UE.
[0095] The UE may therefore conduct IO network measurements and
convey this information to the client side of the LO application in
the UE, which may transmit this information to the application
server, via the IO network. The application server, based on
matching the radio fingerprint information with the IO measurements
taken by the UE, may estimate the proximity of the UE to the LO
network. When the server estimates that the UE is in the proximity
of LO network, the application server may configure the LO
application in the UE to configure the UE radio layer to initiate
cell search and selection procedure. Accordingly, the application
configures the UE, and the cellular radio layer therein, to perform
measurements to detect the LO network, as shown in step 73.
[0096] When the UE detects the LO network based on the
measurements, the UE may initiate a cell selection procedure, as
shown in step S74. The cell selection procedure may be based on
parameters provided by the application, as shown in step 75.
[0097] In step 76, if the UE has accessed the LO network and is
still served by the IO network, traffic steering may be performed
in order to route the traffic to the appropriate network. The
traffic steering may be based on parameters, such as traffic flow
template. Traffic flow template may be a template provided to the
UE by the core network for informing the UE about the relative
priorities of the applications requesting resources for uplink
transmissions. The information contained within the traffic flow
template may be enhanced to inform the UE as to which traffic
should be routed to the LO or IO network, respectively, and may
also be provided to the cellular radio layer.
[0098] Charging of the traffic in the LO network may be done on the
application server, based on the information or credentials
provided by the UE, as shown in step 77. The information may
include any information that the charging functions may deem
helpful in charging the user, via the client part of the
application.
[0099] FIG. 8 shows an apparatus according to certain embodiments.
The apparatus may be a terminal such as a UE, or an element
thereof. FIG. 9 shows a flow diagram according to an example
embodiment of the invention. The apparatus according to FIG. 8 may
perform the steps described in FIG. 9, but is not limited to those
steps. The steps of FIG. 9 may also be performed by another
apparatus that is not illustrated in FIG. 8.
[0100] The apparatus comprises a processor, a memory comprising
computer program code, and/or a transceiver used to send and/or
receive information or data. The processor along with the memory
may be used as monitoring means 110 and controlling means 120. The
monitoring means 110 and controlling means 120 may be a monitoring
circuitry and controlling circuitry, respectively.
[0101] The monitoring means 110 monitors if network information
from a server part of an application is received by a client part
of the application, as shown in step 110 in FIG. 9. The network
parameter is related to a second network, for example the LO
network. The client part, which may be located on a processor
and/or memory at the UE, may be connected to the server part via a
first network, such as an IO network. The first network and the
second network are different from each other but may be of a same
radio access technology, such as 5G, LTE, or LTE-A.
[0102] If the network information is received, as shown in FIG. 9,
the controlling means 120 may control a cellular radio layer. The
cellular layer may be a layer of the UE on which the client part is
installed. The cellular layer may interwork with the second network
based on the received network information, as shown in step
120.
[0103] FIG. 10 illustrates an apparatus according to certain
embodiments. The apparatus may be an application, an application
server, or an element thereof, such as a server part of the
application. FIG. 11 shows a flow diagram according to certain
embodiments. The apparatus according to FIG. 10 may perform the
steps of FIG. 11 but is not limited to those steps. The steps of
FIG. 11 may be performed by the apparatus of FIG. 10, but may also
be performed by another apparatus.
[0104] The apparatus comprises a processor, a memory comprising
computer program code, and/or a transceiver used to send and/or
receive information or data. The processor along with the memory
may be used as providing means 210. The providing means 210 may be
a providing circuitry.
[0105] The providing means 210 provides, by a server part of an
application, network information to a client part of the
application via a first network using a fist access technology, as
shown in step 210. The network information may be related to a
predetermined second network, such as a LO network. The client part
may be connected to the server part via a first network, for
example a IO network, and the first network and the second network
may be different from each other. In some embodiments, however, the
first network and the second network may use the same radio access
technology, such as 5G, LTE, or LTE-A.
[0106] FIG. 12 illustrates an apparatus according to certain
embodiments. The apparatus may be an application, application
server, or an element thereof such as a server part of the
application. FIG. 13 illustrates method flow diagram according to
certain embodiments. The apparatus according to FIG. 12 may perform
the steps of FIG. 13, but is not limited to those steps. The method
of FIG. 13 may be performed by the apparatus of FIG. 12, but may
also be performed by another apparatus.
[0107] The apparatus according to FIG. 12 comprises a processor, a
memory comprising computer program code, and/or a transceiver used
to send and/or receive information or data. The processor along
with the memory may be used as checking means 310, monitoring means
320, and providing means 330. The checking means 310, monitoring
means 320, and providing means 330 may be a checking circuitry,
monitoring circuitry, and providing circuitry, respectively. The
apparatus of FIG. 12 may comprise the features of the apparatus of
FIG. 10, as well.
[0108] The checking means 310 may check in step 310 whether a
client part of an application is connected to a server part of the
application via a first network, such as an IO network, using radio
access technology, such as 5G, LTE, or LTE-A.
[0109] If the client part is connected to the server part via the
first network, as shown in step 310, the monitoring means 320
monitors if the client part becomes connected to the server part
via a predetermined second network, for example a LO network,
different from the first network but of the same radio access
technology, as shown in step 320.
[0110] If the client part becomes connected to the second network,
the providing means 330 provides to a charging device an
information on a usage of the second network for the communication
between the server part and the client part, as shown in step 330.
The providing means 330 may be a portion of (integrated with) the
server part of the application. The providing means 330 keeps
informing on the usage of the second network, while the client part
may be connected to the server part via the second network.
[0111] FIG. 14 shows an apparatus according to certain embodiments.
The apparatus may be a radio network, or an element thereof, such
as a base station. The base station may be a NodeB or a 5G NB. FIG.
15 shows a flow diagram according to certain embodiments. The
apparatus according to FIG. 14 may perform the steps of FIG. 15,
but is not limited to those steps. The steps of FIG. 15 may be
performed by the apparatus of FIG. 14, or any other apparatus.
[0112] The apparatus according to FIG. 14 comprises a processor, a
memory comprising computer program code, and/or a transceiver used
to send and/or receive information or data. The processor along
with the memory may be used as monitoring means 410, checking means
420, and granting means 430. The monitoring means 410, checking
means 420, and granting means 430 may be a monitoring circuitry,
checking circuitry, and granting circuitry, respectively. The
monitoring means 410 may monitor whether a user authenticates to a
radio network by credentials in order to access the radio network,
as shown in step 410. For example, the credentials may be used to
authenticate to an application.
[0113] If the user is authenticated to the radio network by the
credentials, as shown in step 410, the checking means 420 may
check, in step 420, if the user is authenticated to a predetermined
application by the credentials. If the user is authenticated to the
predetermined application by the credentials, the granting means
430 grants access to the radio network for the user, as shown in
step 430.
[0114] FIG. 16 shows an apparatus according to an example
embodiment of the invention. The apparatus comprises at least one
processor 610, at least one memory 620 including computer program
code, and the at least one processor 610, with the at least one
memory 620 and the computer program code, being arranged to cause
the apparatus to perform at least one of the methods or processes
illustrated in FIGS. 9, 11, 13, and 15.
[0115] It should be understood that each signal or block in FIGS.
1-15 and 17 may be implemented by various means or their
combinations, such as hardware, software, firmware, one or more
processors and/or circuitry. In one embodiment, a system may
include several devices, such as, for example, a base station, a
UE, an application server, and/or additional servers or hosts upon
which the IO and the LO operate. The system may include more than
one UE, bases station, or application server. The base station may
be a network node, a server, a host, and/or any other access or
network node.
[0116] Each of these devices may include at least one processor 610
or control unit or module, and at least one memory 620 may be
provided in each device. The memory 620 may include computer
program instructions or computer code contained therein. One or
more transceiver may also be provided, and each device may also
include an antenna. Certain embodiments may include one antenna per
device, while other embodiment may include many antennas and
multiple antenna elements that may be provided to each of the
devices. Other configurations of these devices, for example, may be
provided. For example, the devices network may be additionally
configured for wired communication, in addition to wireless
communication using any form of communication hardware.
[0117] Transceivers may, independently, be a transmitter, a
receiver, or both a transmitter and a receiver, or a unit or device
that may be configured both for transmission and reception. The
transmitter and/or receiver (as far as radio parts are concerned)
may also be implemented as a remote radio head which is not located
in the device itself, but in a mast, for example. The operations
and functionalities may be performed in different entities, such as
nodes, hosts or servers, in a flexible manner In other words,
division of labor may vary case by case. One possible use is to
make a network node deliver local content. One or more
functionalities may also be implemented as virtual application(s)
in software that can run on a server.
[0118] A user device or user equipment may be a mobile station (MS)
such as a mobile phone or smart phone or multimedia device, a
computer, such as a tablet, provided with wireless communication
capabilities, personal data or digital assistant (PDA) provided
with wireless communication capabilities, portable media player,
digital camera, pocket video camera, navigation unit provided with
wireless communication capabilities or any combinations thereof.
The LO application may operate on hardware of the UE.
[0119] In some embodiments, an apparatus, such as a server or a
base station, may include means for carrying out embodiments
described above in relation to FIGS. 1-15 and 17. In certain
embodiments, at least one memory including computer program code
can be configured to, with the at least one processor, cause the
apparatus at least to perform any of the processes described
herein.
[0120] A processor 610 may be embodied by any computational or data
processing device, such as a central processing unit (CPU), digital
signal processor (DSP), application specific integrated circuit
(ASIC), programmable logic devices (PLDs), field programmable gate
arrays (FPGAs), digitally enhanced circuits, or comparable device
or a combination thereof. The processors may be implemented as a
single controller, or a plurality of controllers or processors.
[0121] For firmware or software, the implementation may include
modules or unit of at least one chip set (for example, procedures,
functions, and so on). A memory 620 may independently be any
suitable storage device, such as a non-transitory computer-readable
medium. A hard disk drive (HDD), random access memory (RAM), flash
memory, or other suitable memory may be used. The memories may be
combined on a single integrated circuit as the processor, or may be
separate therefrom. Furthermore, the computer program instructions
may be stored in the memory and which may be processed by the
processors can be any suitable form of computer program code, for
example, a compiled or interpreted computer program written in any
suitable programming language. The memory or data storage entity is
typically internal but may also be external or a combination
thereof, such as in the case when additional memory capacity is
obtained from a service provider. The memory may be fixed or
removable.
[0122] The memory and the computer program instructions may be
configured, with the processor for the particular device, to cause
a hardware apparatus such as a base station, a server, or a UE, to
perform any of the processes described above (see, for example,
FIGS. 1-15 and 17). Therefore, in certain embodiments, a
non-transitory computer-readable medium may be encoded with
computer instructions or one or more computer program (such as
added or updated software routine, applet or macro) that, when
executed in hardware, may perform a process such as one of the
processes described herein. Computer programs may be coded by a
programming language, which may be a high-level programming
language, such as objective-C, C, C++, C#, Java, etc., or a
low-level programming language, such as a machine language, or
assembler. Alternatively, certain embodiments may be performed
entirely in hardware.
[0123] Furthermore, certain embodiments may be provided with a
variety of configurations for communication. For example, the UE
may be configured for device-to-device, machine-to-machine, or
vehicle-to-vehicle communication.
[0124] FIG. 18 illustrates an overview of the multi-operator
multi-connectivity according to certain embodiments. In certain
embodiments, 5G UE 1810 may download LO network access information
in order to gain access to the LO network. For example, the
application layer of the UE may receive the LO network access
information, and provide assistance for secure cell selection
and/or access. In some embodiments, the existing IO SIM may be used
for downloading the access information.
[0125] In order to download the network information, an IP
connection may be established between 5G UE 1810 and IO-5G NB 1820.
Before an IP connection may be established, however, an IP address
may be exchanged between the 5G UE 1810 and IO-Core network through
the IO-5G NB 1820. The IP address may be exchanged upon the
authentication of 5G UE 1810 by IO-5G NB 1820. In some embodiments,
credentials within the existing IO network access credentials 1860,
or alternatively a provisioning network access credentials, for
example virtual SIM 1870, may be used for authentication, at which
point the 5G UE 1810 may be directed to the LO Application Server,
which may be located in LO-5G NB 1830. As can be seen in FIG. 18,
IO-5G NB 1820 may use credentials received from IO Network access
credentials 1860 to communicate with IO core network 1840 to
authenticate 5G UE 1810. Alternatively, or in addition to, IO-5G NB
1820 may use credentials received from IO Network access
credentials 1860 to communicate with provisioning server 1850 via
IO core network 1840 to authenticate 5G UE 1810. In other words,
provisioning server 1850 may send 5G UE 1810 LO access related
information based on credentials presented in IO network access
credentials 1860.
[0126] Once the redirection to the LO Application Server occurs, an
application layer authentication may occur, and access credentials
may be provided to 5G UE 1810. For example, the access credentials
may be in accordance with embedded universal integrated circuit
card (eUICC) or integrated UICC (iUICC) provisioning. Because the
download may be authorized by the application layer, the redirect
to the provisioning server may authenticate the user by its
application layer login information.
[0127] Cell selection criteria may include various identifications
that can be used by 5G UE 1810 to determine whether to select
and/or access LO-5G NB 1830. The criteria may include, for example,
PLMN IDs or other application related IDs or random access channel
preambles. The IDs may be provided by the LO application layer,
based on the dynamic information available from the LO cloud
application server, as described above. Cell selection may account
for location and/or previous history information of the UE, which
may be stored in the UE application. The location history may allow
the UE to better select a cell with which to connect. In one
example, the UE may be able to use the location history information
to recognize a home network. For example, if a UE is at the same
location every night, the application may deem this location to be
a home network.
[0128] In addition, the cell selection and/or access may depend on
the device used. A user may have multiple devices that may be
activated at different times and/or locations. For example, the
user may have a home subscription, a work place subscription, and a
normal operator subscription, which may simply involve the use of a
5G network. The subscription may indicate the relationship that the
user has with the IO or LO, which may be location dependent, such
as home or office, or quality of service dependent, for example,
gold, silver or bronze. The connectivity to a cell and/or the
selection of a cell may depend on available network bandwidth. In
some embodiments, the user may have a guaranteed bandwidth rate
(GBR) that may be taken into consideration when selecting and/or
accessing a LO network.
[0129] In certain embodiments, the LO may be a combination of
multiple service providers, with cell selection and access
provisioned by a single access provider. The LO network may be
chosen based on the radio access information, such as load
conditions, user contact information, regulatory constraints,
and/or subscriber status. The load conditions may provide access
information to the LO network having the lowest load and/or
providing for load conditions that support the best QoS. User
contact information, for example, may be a certain level of
subscription of the UE that may determine how much access the UE
may be granted by the LO. A different charge may be assessed for
each level of subscription.
[0130] Some embodiments allow for fast, easy service provisioning
to an end user by a LO, without cumbersome dealings with an IO. The
LOs may in certain embodiments merely have to obtain access to the
spectrum before deploying their services, which may make it easier
to deploy localized networks in a cost efficient manner The
services provided by the LO, for example, may include virtual
reality centers, high-performance gaming arenas, football arenas
where the fans can view the games wearing augmented reality
devices, or any other form of entertainment. Such services may be
aided by deploying networks that are tailored to specific services
being offered, which could even operate independently from the IO
network.
[0131] Fast deployment and easy access to the end users,
potentially without geographic limitations of their home IO
network, may achieve significant improvements to the functioning of
both the UE and the network itself LO networks may also for
high-speed mobile internet access for roaming users. The charging
and/or authentication may be provided by a provisioning server
maintained by a third-party access provider, in the form of an
application installed in the UE.
[0132] In certain embodiments, the UE may have a soft SIM or
virtual SIM (V-SIM) that may be downloadable and/or installable
within the UE. A soft or V-SIM may be employed on at least one
processor and/or at least one memory located in the UE, and may
provide similar functionality as an IO SIM. Similar to the IO SIM,
the V-SIM may be used to authenticate the UE to a given LO network.
Alternatively, the UE may be pre-provisioned with USIM applications
for the area in which the UE may be located. Some embodiments may
include one or more virtual SIMs, which may share a common baseband
and may work in virtual shifts. Multiple virtual SIMs may be used
to provide the best service for the UE depending on the needs of
the application layer, such as SMS, data amount, and/or round trip
times.
[0133] FIG. 19 illustrates a signal flow diagram according to
certain embodiments. Similar to FIG. 18, 5G UE 1910 may have a
secure credential storage that holds IO network access credentials
1930, for example an IO SIM, that may include credentials that are
used by the IO core network 1940 to authenticate 5G UE 1910. IO-5G
NB may use credentials received from the secure credential storage
1930 to communicate with IO core network 1940 to authenticate 5G UE
1910. In some embodiment, IO network 1940 may communicate with
provisioning server 1950 to aid in the authentication of 5G UE
1910.
[0134] In other embodiments, 5G UE 1910 may have provisioning
network access credentials that may take the form of a soft-SIM or
V-SIM 1920. As opposed to having to go through IO core network
1940, V-SIM 1920 may directly communicate with provisioning server
1950 for authentication. The provisioning server may be collocated
with a cloud application server, or may be any other server, that
includes the LO user subscription information to which the V-SIM
could communicate for authentication. In other words, the LO
application may provide the soft or virtual SIM with the
information needed to access the LO. Credentials located within
V-SIM 1920 may then be used by 5G UE 1910 access and exchange
authentication information with a virtual reality network 1960, a
home network 1970, and/or a residential network 1980. In other
words, provisioning server 1950 may send UE 1910 LO access related
information based on provisioning network access credentials
presented in V-SIM 1920. Networks 1960, 1970, and/or 1980 may be
special use LOs. In some embodiments, therefore, V-SIM 1920 may
provide for the benefits of other secure credential storage,
without having to coordinate between the LOs and IOs. 5G UE 1910
may therefore connect to a multitude of networks, not limited to
the IO network alone.
[0135] The UE, in certain embodiments, may decide when to apply the
information to connect to the network. This decision by the UE may
be based on assistance information provided to the UE by the LO
application. In other embodiments, the decision of whether to apply
the information to connect to the network may be based on
implementation specific measurements conducted by the UE. For
example, the UE may use historical location information or
fingerprint information. Fingerprint information may, for example,
include reference signal received power (RSRP). Historical location
information may indicate where the user has been, and can be used
to determine where the user may likely go. Other embodiments may
utilize WLAN service set identifiers (SSID), global positioning
system (GPS) information, or any other information.
[0136] The decision of when to apply the cell access information
using the virtual or soft SIM may also be used to fetch the cell
access information needed in order to enable the access to the LO
network. In certain embodiments, there may be different access
credentials required for different LO network operators. FIG. 20
illustrates a signal flow diagram according to certain embodiments.
In step 2010, UE 2001 may connect to LO application server 2004
through IO network 2002 and the secure credential storage that
holds IO network access credentials, such as IO SIM. In other
embodiments, UE 2001 may connect to LO application server 2004
using provisioning network access credentials that may be stored in
a soft or virtual SIM. UE 2001 may then receive LO access
credentials and connectivity assistance information, as shown in
step 2020. UE 2001 may search for LO network 2003 based on the
received assistance information, as shown in step 2030, and detect
LO network 2003, as shown in step 2040. As discussed above, before
UE 2001 connects to the LO network 2003, UE 2001 may decide whether
or not to connect to the LO network.
[0137] The decision on whether or not to connect to LO network
2003, as well as when to connect to the LO network, may be based on
specific measurements conducted by UE 2001, such as historical
location information, fingerprint information, WLAN SSIDs and
signal strength information, LO network load information and/or GPS
location information. The decision by UE 2001 may also be based on
the QoS factors, such as the ability of the LO to provide the user
with a minimum or guaranteed bandwidth rate. In step 2050, UE 2001
may connect to the LO network 2003 using operator-specific access
credentials. Once connected, UE 2001 may engage in data
communication with both the LO network 2003 and the IO network
2002.
[0138] In some other embodiments, the UE may consider spectral
resources of the LO network when accessing the network. The
spectral resources, for example, may depend on the location
dependent and/or time-varying, which depends on the regulatory
constraints applicable in the area where the network is deployed.
FIG. 21 illustrates a signal flow diagram according to certain
embodiments. In step 2110, there may be a tight interworking
between spectrum access server (SAS) 2105, which provides spectral
resource information and LO application server 2104. SAS may be
used to provide dynamic updates related to the access credentials
and other information, while connecting to the LO network 2103. For
example, the updates may relate to time-dependent spectral
information. In some embodiments, therefore, the network
information received by the client part of the application located
at the UE may originate at the SAS.
[0139] In step 2120, UE 2101 may connect LO application server 2105
through the IO network 2102 or through secure credential storage,
such as SIM. In other embodiments, UE 2101 may connect to LO
application server 2104 using provisioning network access
credentials presented in via a soft or virtual SIM. UE 2101 may
then receive access credentials and connectivity assistance
information, as shown in step 2130. The connectivity assistance
information may include information received at LO application
server 2104 from the spectrum access server 2105. For example, the
connectivity assistance information may include time-dependent
spectrum information from SAS. The remaining steps 2140, 2150,
2160, and 2170, may be similar to steps 2030, 2040, 2050, and 2060,
respectively, in FIG. 20.
[0140] Certain embodiments may account for event specific access.
For example, a conference or event organizer may provide registered
attendees with the option to download the LO application to the UE,
while registering for a conference or an event. This may, in some
embodiment, be similar to a conference or event organizer providing
WLAN login credentials to registered attendees of the event. The
connectivity at the event may be provided using the LO network, to
which access may be dynamically provisioned through the
application.
[0141] In certain embodiments, various access differentiation based
on different classes to the LO network may be provided to the
attendees based on their registration type. For example, gold,
silver, and bronze patrons, which may represent different level of
registration for the event, may receive different access
credentials. In addition, the organizer of the event may receive
separate access credentials as well. The differing access
credentials may be provided through the LO application, and may
provide the UE with different QoS levels depending on the
registration type.
[0142] In some embodiments, a third party access provider may want
to offer users their own local LTE network, as a replacement for
the personalized WLAN that many users own. The LO application may
use the access credentials provided by the third party access
provider. In other words, the UE would have a soft or virtual SIM,
as shown in FIG. 19, which may redirect the UE to the server of the
third party access provide for authentication and/or authorization
of the UE. The server of the third party access provider may then
verify the access credentials for the operator, and grant access
and/or assign security credentials that allow the UE to connect to
the network.
[0143] In certain embodiments, air interface security may have
limited impact on the third party being used to facilitate the UE
connection to the network. In order for the third party server to
be able to communicate with the network, the third party server may
be authenticated. The third party server may obtain an IP address
from the network, undergo a successful authentication, and then
facilitate the user gaining authorization to the LO network as
well. The authentication method described above include the server
of the third party access provider verifying the access credentials
for the operator, and granting access and/or assigning security
credentials that allow the UE to connect to the network.
[0144] If not available, network access information may be
downloaded using the existing secure credential storage, such as an
IO SIM. In other embodiments, the network access information may be
received, for example when scanning a code from a screen of a user
equipment where a user has logged in. In order to properly download
network access information, an IP connection may be used. Before
the IP connection may be established, however, an IP address
authentication may occur. The authentication may be done via the
existing secure credential storage, such as IO SIM or provisioning
SIM. In other words, an IP address of the client part of the
application may be authenticated using network access credentials
or provisioning network access credentials received from a secure
credential storage.
[0145] Once authentication occurs, the client part may be
redirected and connected to the LO Application server. An
application layer authentication may take place at the LO
Application server, and network access credentials may be provided
to the client part of the application. In some embodiments, the
received network access credentials may be received at the user
equipment via eUICC provisioning.
[0146] In some embodiments, the download of network access
information may be authorized on the application layer. In other
words, the client part is redirected to the provisioning server,
and the user is then authenticated by its application layer log-in.
Communication is therefore facilitated at the user equipment in
which the client part of the application resides using the upper
application layer and the lower layer, for example a baseband and a
secure credential storage.
[0147] FIG. 22 illustrates a flow diagram according to certain
embodiments. In particular, FIG. 22 illustrates UE operations in a
multi-operator, multi-connectivity environment. The multi-operator,
multi-connectivity environment may include the incumbent/main
operator and/or the local/micro operators. In step 2210, the user
equipment may move around within a network. The UE may then check a
LO application for location and/or presence of the LO network, as
shown in step 2220. If an LO network is detected, the UE may
determine whether or not the UE has connectivity access information
for the LO network, as shown in step 2230. If no connectivity
access information is detected, as shown in step 2240, the UE may
download secure access information from the LO server.
[0148] When the UE does have connectivity access information, the
UE may search for and detect LO network, as shown in step 2250. If
no LO network is detected, the UE may continue to search for the LO
network. However, if the network is detected, the UE LO application
may check the suitable or available LO network connectivity, as
shown in step 2260, using event specific access and/or specific
measurements conducted by the UE. In other embodiments, the user of
the UE LO application may check and/or choose an available LO
network. In step 2270, the UE may connect to the LO network in a
secure manner The UE may engage in multi-operator,
multi-connectivity with both the IO and the LO, as shown in step
2280, as well as in FIGS. 2 and 18.
[0149] FIG. 23 illustrates a flow diagram according to certain
embodiments. In particular, FIG. 23 may illustrate a client part of
the application located, for example, in a UE. In step 2310, the
client part of the application located in the user equipment may
monitor whether the network information has been received from the
server part of the application. In step 2320, the client part of
the application may provide the server part of the application
credentials from a secure credential storage, such as a
provisioning subscriber identity module, virtual subscriber
identity module, or a soft subscriber identity module. The
credentials provided by the client part may be used to authenticate
the client part of the application. In some embodiments, an IP
address of the client part of the application may be authenticated
using network access credentials or provisioning network access
credentials received from a secure credential storage.
[0150] In certain embodiments, the client part of the application
may be authenticated on an application layer using network access
credentials from an embedded universal integrated circuit card. The
application layer of the client part provides network information
to a lower layer of a user equipment in which the client part of
the application is located. In step 2330, the client part of the
application may control a lower layer, for example a cellular radio
layer, such that the cellular radio layer interworks with the
second network based on the received network information. The
client part and the server part of the application may then connect
via the second network.
[0151] FIG. 24 illustrates a flow diagram according to certain
embodiments. In particular, FIG. 24 may illustrate a server part of
the application located in an LO application server. In step 2410,
the server part of the application may receive network access
information from the SAS. In step 2420, the server part of the
application may authenticate an IP address of the client part of
the application before providing the client part of the application
the network information. In some embodiments, the client part of
the application may be authenticated using credentials from a
virtual or soft subscriber identity module. In other words,
authentication may in part depend on network access credentials or
provisioning network access credentials received from a secure
credential storage at the user equipment. Once authenticated, the
server part of the application may provide the client part of the
application network information, as shown in step 2430. The network
information may then be used to connect the client part and the
server part of the application.
[0152] FIG. 25 illustrates a flow diagram according to certain
embodiments. In particular, FIG. 25 may illustrate an IO 5G-NB or
any other IO network node. In step 2510, the IO network node or
base station may receive credentials from a client part of the
application, and forward credentials to a server part of the
application, as shown in step 2520. In step 2530, the IO network
node or base station may authenticate a IP address of the client
part of the application. The authentication may occur either before
or after the IO network node or base station receives network
information from the server part of the application, as shown in
step 2540. Authentication of the client part of the application may
occur on an application layer. While in some embodiments the
authentication may occur in the IO network node or base station, in
other embodiments the authentication may occur in the server part
of the application.
[0153] Once the client part of the application has been
authenticated, and once the network information has been received
by the IO network node or base station, the network information may
be transmitted to the client part of the application, as shown in
step 2550. The network information may be related to a
predetermined second network that uses the radio access technology,
the second network being different from the first network.
[0154] Some of above embodiments describe that the LO network may
be used for some dedicated, specialized services, while the IO
network may be a more general purpose network. However, the
services which may be offered via each of these networks are not
limited in any way. For example, LO network may offer telephone
services, or IO network may offer real-time gaming Embodiments of
the invention may be employed not only in 3GPP networks, such as
LTE, LTE-A, 5G, but also in other radio networks where the
terminals may access one or more networks simultaneously.
[0155] One piece of information may be transmitted in one or plural
messages from one entity to another entity. Each of these messages
may comprise additional or different pieces of information. Names
of network elements, protocols, and methods are based on current
standards. In other embodiment utilizing other technologies, the
names of these network elements and/or protocols and/or methods may
be different, as long as they provide a corresponding
functionality. A terminal may be any device which may connect to
the respective network. For example, a terminal may be a UE, a
mobile phone, a laptop, a smartphone, and/or a machine-type
communication device.
[0156] If not otherwise stated or otherwise made clear from the
context, the statement that two entities are different may means
that they perform different functions. It does not necessarily mean
that they are based on different hardware. That is, each of the
entities described in the present description may be based on a
different hardware, or some or all of the entities may be based on
the same hardware. It does not necessarily mean that they are based
on different software. That is, each of the entities described in
the present description may be based on different software, or some
or all of the entities may be based on the same software.
Embodiments of the invention may be employed fully or partly in the
cloud, wherein a resource (e.g. processor, software, memory,
network) for the respective task may be shared with other
applications.
[0157] According to the above description, it should thus be
apparent that example embodiments of the present invention provide,
for example a base station such as a NodeB, a eNodeB, or a 5G NB,
or a component thereof, an apparatus embodying the same, a method
for controlling and/or operating the same, and computer program(s)
controlling and/or operating the same as well as mediums carrying
such computer program(s) and forming computer program product(s).
According to the above description, it should thus be apparent that
example embodiments of the present invention provide, for example a
terminal such as a UE, or a component thereof, an apparatus
embodying the same, a method for controlling and/or operating the
same, and computer program(s) controlling and/or operating the same
as well as mediums carrying such computer program(s) and forming
computer program product(s). According to the above description, it
should thus be apparent that example embodiments of the present
invention provide, for example an application server or a server
part of an application, or a component thereof, an apparatus
embodying the same, a method for controlling and/or operating the
same, and computer program(s) controlling and/or operating the same
as well as mediums carrying such computer program(s) and forming
computer program product(s).
[0158] Implementations of any of the above described blocks,
apparatuses, systems, techniques, means, entities, units, devices,
or methods include, as non-limiting examples, implementations as
hardware, software, firmware, special purpose circuits or logic,
general purpose hardware or controller or other computing devices,
a virtual machine, or some combination thereof. It should be noted
that the description of the embodiments is given by way of example
only and that various modifications may be made without departing
from the scope of the invention as defined by the appended
claims.
[0159] The features, structures, or characteristics of certain
embodiments described throughout this specification may be combined
in any suitable manner in one or more embodiments. For example, the
usage of the phrases "certain embodiments," "some embodiments,"
"other embodiments," or other similar language, throughout this
specification refers to the fact that a particular feature,
structure, or characteristic described in connection with the
embodiment may be included in at least one embodiment of the
present invention. Thus, appearance of the phrases "in certain
embodiments," "in some embodiments," "in other embodiments," or
other similar language, throughout this specification does not
necessarily refer to the same group of embodiments, and the
described features, structures, or characteristics may be combined
in any suitable manner in one or more embodiments.
[0160] One having ordinary skill in the art will readily understand
that the invention as discussed above may be practiced with steps
in a different order, and/or with hardware elements in
configurations which are different than those which are disclosed.
Therefore, although the invention has been described based upon
these preferred embodiments, it would be apparent to those of skill
in the art that certain modifications, variations, and alternative
constructions would be apparent, while remaining within the spirit
and scope of the invention.
TABLE-US-00001 Partial Glossary 3GPP 3.sup.rd Generation
Partnership Project 5G 5.sup.th Generation 5G NB NodeB of 5.sup.th
Generation App Application CN Core Network EPC Evolved Packet Core
GPS Global Positioning System ID Identification IO Incumbent
Operator IoT Internet of Things LO Local Operator LTE Long Term
Evolution LTE-A LTE Advanced MC Multi-Connectivity NW Network OS
Operating System P-GW Packet Data Network Gateway PLMN Public Land
Mobile Network QCI QoS Class Identifier QoS Quality of Service RAP
Radio Access Point RAT Radio Access Technology SIB System
Information Block SIM Subscriber Identity Module TFT Traffic Flow
Templates UE User Equipment UICC Universal Integrated Circuit Card
USIM Universal Subscriber Identity Module WLAN Wireless Local Area
Network
* * * * *