This application is based on and hereby claims priority to German Application No. 10 2004 025 734.5 filed on May 26, 2004, the contents of which are hereby incorporated by reference.
A method is disclosed for optimizing reconfiguration processes in mobile radio networks with reconfigurable terminals, within the framework of which technical equipment of the mobile radio operator obtains measurement data regarding the behavior of the mobile terminal, summarizes it and makes it available to third parties for evaluation, with reconfigurable terminals referring to those mobile radio devices in which in particular a new radio technology not previously supported by the device is utilized by exchanging software which configures the transceiver of the terminal.
Future mobile radio networks will integrate different radio technologies and thus offer users the option of selecting the technology best suited for use with the specific application context in each case. This requires a far greater outlay on the part of the mobile radio terminal, also referred to below as the terminal, by comparison with known technology in respect of the capabilities or number of built-in radio transceivers. To keep power consumption, weight, size and manufacturing costs of terminals within sensible limits the use of a single universally-reconfigurable transceiver is preferred, for which different radio technologies can be implemented in software. The technology underlying this concept is called Software Defined Radio (SDR).
Characteristics of SDR terminals will not be completely standardized, since the manufacturers do not wish to divulge specific know-how and, for an SDR terminal to function correctly, it is only necessary to adhere to the radio standard as well as the communication protocol, but not to know about internal characteristics. These types of characteristics, such as the energy consumption of specific radio modes for example, the time required for reconfiguration or the size of the software needed for a new mode which must be loaded under some circumstances by a server into the terminal before it can be reconfigured, are however not to be accessible to all partners involved in the operation of the mobile radio network as well as the application services provided. In particular inspection of such information by competing manufacturers is to be prevented. However specific parties involved are to be given controlled access to selected states and characteristics of the terminal.
Although data encryption can be employed to guarantee more secure communication between the relevant terminal and the person with authorized access, this communication connection is however undertaken via the radio interface and thus reduces the bandwidth available for applications.
An aspect lies in specifying a method of optimizing reconfiguration processes in mobile radio networks with reconfigurable terminals and of specifying a corresponding system in which data which relates to reconfigurable terminals is made available by the network operator or by the relevant device manufacturer in a way in which the load on the radio interface can be relieved and also as regards the signaling in a way in which the load on the network infrastructure can be relieved.
A particular aspect is access-protected memory areas on network elements localized in the network of an operator supporting the reconfiguration of SDR terminals in combination with methods for protected data transmission which preferably relate to mechanisms for authentication and authorization of the communication partners as well as for protected communication, especially the protection of integrity and confidentiality. This type of access-protected data originates either from the terminal and is transmitted as part of the negotiations to the Radio Access Network (RAN) and is buffered there, or it is generated within the context of processes related to the terminal directly in the RAN. A further important aspect lies in the generation and administration of access-protected memory areas in the network. This advantageously leads to a reduction in the load on the radio interface and also, in respect of the signaling, to a reduction in the load on the network infrastructure.
These and other objects and advantages will become more apparent and more readily appreciated from the following description of exemplary embodiments, taken in conjunction with the accompanying drawings of which:
Reference will now be made in detail to the preferred embodiments, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
The access-protected memory areas for the authorized access parties X, Y and Z are also set up in each case on the RNCs in the Radio Access Network (RAN). Each RNC stores data relating to terminals registered with it locally. The access control AC is responsible for the registration of parties with authorized access and also for accepting access requests and executes the required authentication methods and, if these are successful, forwards access requests to the RNCs, which are responsible for data encryption and sending the data to the parties with authorized access.
This first embodiment provides especially good scalability since access-protected memory areas are set up distributed and, when the mobile radio network is expanded, the number of units which can accommodate access-protected memory areas grows along with the expansion.
A significant part of the data of interest is not stored in the terminal but occurs in the Radio Access Network (RAN), such as measurement data for example which has been obtained by measuring the quality of the radio bearer or the timing sequence of vertical handovers between two radio technologies. In addition data of the terminal generated in the terminal may possibly be needed in the RAN in any event.
To implement the required controlled access to the data technical precautions on the network unit are especially required which grant authorized access parties direct access to data stored there but deny access to unauthorized parties.
Scenarios which advantageously illustrate a protected access to data stored in a network of the operator include:
An important factor is the use of access-protected memory areas on a network elements localized in the network of the operator supporting the reconfiguration of SDR terminals in combination with methods for protected data transmission. These preferably include methods for authentication and authorization checking or authorization of the communication partners as well as for protected communication, especially the protection of integrity and confidentiality. This type of access-protected data originates either from the terminal and is transmitted as part of the negotiations to the Radio Access Network (RAN) and is buffered there, or it is generated within the context of processes related to the terminal directly in the RAN.
These memory areas can be physically different, i.e. the assigned address ranges are different or differ logically. It is especially possible for a number of logical memory areas or for parts thereof to be mapped to the same physical memory area. In other words a logical memory area in this case represents a specific view of one or more physical memory areas.
A further aspect lies in the generation and administration of access-protected memory areas by the network operator. The network operator generates one of these access-protected memory areas for each authorized access party. Authorized access parties are assigned to each memory area. An authorized access party is assigned credentials which are needed for the method of protected data transmission used. Credentials are especially needed for the authentication of the authorized access party as well as for safeguarding data communication. Since data which occurs and which the authorized access party would like to retrieve always originates from specific data sources, e.g. from terminals or applications services or a least is related to these, an additional authentication feature is required which makes possible the assignment of the relevant source to the access-protected memory area. This feature is agreed between network operator and authorized access party and is specified by each data source within the context of registration in the RAN together with an identity characteristic specific to the source. On the one hand this method makes possible the assignment of data sources to a specific authorized access party and thereby to their access-protected memory area, on the other hand it allows the storage of data separately for each data source.
Access to protected memory areas is undertaken in the following manner:
The authorized access party contacts a server of the network operator with which the necessary authentication, e.g. with the aid of the authentication features described above, will be executed. After the authentication is completed the authorized access party sends a request which specifies the type of desired access, i.e. which data is to be transferred, the frequency with which the data transmissions are to be undertaken and whether a one-off or periodic transmission is to be undertaken. The network operator then, in accordance with a request, sends the encrypted data to the server of the authorized access party. In a similar manner the authorized access party can optionally also write data into the access-protected memory which is included by the network operator for the reconfiguration or if necessary is transferred to the terminal, e.g. software downloads.
The primary advantage of the described method, compared to solutions in which the data is transmitted via the radio interface from terminal to a server, lies in alleviating the load on the radio interface. This relates especially to data generated by measurements in the RAN. This data which also occurs in large volumes, would, within the framework of a known method, initially have to be transferred over the radio interface to the terminal, in order to be subsequently transported over the radio interface to the server. This duplication of the load on the radio interface does not occur with the method described herein.
A further advantage lies in the fact that data to be transmitted is encrypted in the network and the terminal is thereby relieved of this task. Data from which conclusions can be drawn about internal characteristics of the terminal is particularly sensitive and may not therefore be transmitted unencrypted in the network in order to prevent unauthorized access to it. This group of data includes for example measurement data, but also terminal profiles which describe the characteristics of the terminal hardware.
Access-protected memory areas can allow write access as well as read access. This makes it possible to load data from a server into the radio access network. In such cases updates of profiles or software can be involved for which data can be loaded onto the terminal at a suitable (under some circumstances later) point in time. The storage in access-protected memory areas in the RAN permits the decoupling of data transport in the network from transport over the radio interface. Mechanism and time of the latter can be suitably selected by the network operator depending on the utilization of the RAN or of the terminal. In addition the network operator can also access the stored information himself and can use this for optimizing reconfiguration processes.
By combining data which originates from many different data sources in the one memory area assigned to authorized access parties it is also possible to request the transmission of the totality of this data or of a selected cross section within the context of a single request from the server side. With a method based on known mechanisms on the other hand. many individual interactions between the server and the different terminals are required. The method described thus also results in a significant reduction of the load on the network infrastructure in respect of signaling as well.
A description has been provided with particular reference to preferred embodiments thereof and examples, but it will be understood that variations and modifications can be effected within the spirit and scope of the claims which may include the phrase “at least one of A, B and C” as an alternative expression that means one or more of A, B and C may be used, contrary to the holding in Superguide v. DIRECTV, 358 F3d 870, 69 USPQ2d 1865 (Fed. Cir. 2004).
Number | Date | Country | Kind |
---|---|---|---|
102 004 025 734.5 | May 2004 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP05/52344 | 5/23/2005 | WO | 00 | 11/27/2006 |