The present subject matter relates generally to communication networks, and more particularly, to natively integrating blockchain charging for network services in telecommunication networks (e.g., 4G, 5G, etc.)
An ever-increasing consumer demand, improved technological advancements (e.g., hardware/software infrastructure), and industry collaboration has driven significant growth in modern telecommunication networks and continues to drive its evolution. Indeed, each iteration or “next generation” of network capabilities, e.g., represented by standards promulgated by a Third Generation Partnership Project (3GPP), interconnects more devices, improves network bandwidth, increases data-rates, and so on. For example, a transition from 3rd Generation (3G) networks to 4th Generation (4G) networks introduced new network services and connected mobile devices to third party data networks such as the Internet. More recently, a transition is underway from existing 4G networks to new 5G networks, which includes a new service-oriented architecture for provisioning network services/resources in a dynamic, scalable, and customizable fashion (e.g., micro-services, network functions virtualization (NFV), etc.) For example, this service-oriented architecture supports granular network slices, which employ an isolated set of programmable resources that can implement individual network functions/application services/etc. In turn, this granular approach creates new opportunities in the context of provisioning network resources, security, accounting (e.g., charging for network services), authorization, and so on, which can be leveraged to improve overall UE accessibility and mobility.
The embodiments herein may be better understood by referring to the following description in conjunction with the accompanying drawings in which like reference numerals indicate identical or functionally similar elements. Understanding that these drawings depict only exemplary embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Overview
This disclosure describes techniques for charging and accounting records generated by network functions (NF) such as a User Plane Forwarder (UPF) entity and Session management Function (SMF) entity for User Equipment (UE) attached in a telecommunication network (e.g., 4G/5G networks, etc.) using a natively integrated blockchain platform. For example, according to one or more embodiments of this disclosure, a Network Function (NF) entity such as one or more of the core NFs in a Service Based Architecture for 5G networks, receives blockchain credentials associated with User Equipment, and generates an entry in a Charging Data Record (CDR) corresponding to one or more network resources. The NF entity further sends a charging request based on the CDR to a Blockchain Charging Function (BCF) entity over a blockchain network interface. Notably, the charging request can include blockchain credentials associated with the UE as well as a charge transaction (e.g., an amount) for provisioning the one or more network resources. The NF entity further receives a confirmation of the charge transaction from the BCF entity, and provisions the one or more network resources based on the same.
Description
Various embodiments of the disclosure are discussed in detail below. While specific implementations are described in detail, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the spirit and scope of the disclosure.
As provided herein, this disclosure relates to communication networks (e.g., telecommunication networks), which include a number of network devices/modules/entities or “Network Function(s)” (NF(s)), which can be implemented as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, and/or as a virtualized function instantiated on an appropriate platform (e.g. on a cloud infrastructure), as is appreciated by those skilled in the art. For sake of clarity, the NFs described herein are based on NFs specified by existing Technical Specifications such as the 3GPP TS 23.501, TS 23.502, TS 24.501, TS 29.509, TS 29.518, TS 33.301, TS 33.501, each of which is incorporated herein by reference to its entirety. Moreover, while some operations and functionality may be described and/or attributed to a particular NF, it is appreciated that such operations are not intended to be limited to the particular NF, but may be performed by other NFs as appropriate, particularly in view of the ongoing development and evolving nature of telecommunication networks.
A communication network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between end nodes, such as mobile devices, computers, personal computing devices (and so on), and other devices, such as network entities, sensors, etc. Many types of networks are available, ranging from local area networks (LANs) to wide area networks (WANs.) LANs typically connect these nodes over dedicated private communications links located in the same general physical location, such as a building or campus. WANs, on the other hand, typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), synchronous digital hierarchy (SDH) links, etc. Some communication networks can include telecommunication networks, which transport data between end nodes, such as user equipment (UE), which can include mobile devices.
Those skilled in the art will understand that any number of nodes, devices, communication links, and the like may be used, and that the view shown herein is for simplicity. In particular, the representations of telecommunication networks 100, including respective interconnected network entities, are illustrated and described herein for purposes of discussion, not limitation, and it is appreciated that the illustrated networks can support inter-network operability/compatibility, and can include (or exclude) any number of network entities, communication links, and the like.
Access network 150 represents the infrastructure or radio towers, such as a Radio Access Network (RAN), for receiving and transmitting data packets between end user nodes (UE) as well as the various network entities (e.g., core network entities.) Access network 150 includes NodeBs (NBs) for 3G network 110, eNodeBs (eNBs) for 4G network 120, and gNodeBs (gNBs) for 5G network 130. The infrastructure for each network may support different functionality and it is appreciated that infrastructure illustrated within one network can include appropriate hardware/software to support functionality of other telecommunication networks.
Respective network entities that form core network 160 (within the telecommunication networks 100) operatively connect respective RAN infrastructure (NBs, eNBs, gNBs) to third party networks such as a voice network 105 (e.g., a Public Switched Telephone Network (PSTN) network) and/or a data network (DN) 108 to create end-to-end connections. Prior to 3G (e.g., 2G, 2.5G, etc.) the third party network primarily included a voice network/PSTN 105 (e.g., a circuit switched network.) From 3G onward, the third party network transitioned to include a public network (e.g., the Internet), represented by data network 108 (e.g., a packet switched network.) Core network 160 and its respective network entities collectively operate to manage connections, bandwidth, and mobility for respective UE.
Notably, core network 160 evolved along three functional planes, including service management, session management, and mobility management. Service management for 2G and 3G networks includes operations to create an Integrated Services Digital Network (ISDN) over wireless links (e.g., Uu links.) Session management for 3G and 4G networks generally include operations establish, maintain, and release network resources (e.g., data connections.) In particular, in 3G network 110, session management includes a standalone General Packet Radio Service (GPRS) network, while 4G network 120 introduced a fully integrated data only network optimized for mobile broadband (where basic telephone operations are supported as one profile.) Mobility management generally includes operations that support movement of UE in a mobile network, such as system registration, location tracking and handover (e.g., often optimized reduce heavy signaling loads.) For example, in the context of 4G network 120, a Serving Gateway (SGW) and a Packet Data Gateway (PGW) support session management operations while mobility management operations (which maintains data sessions for mobile UE) are centralized within a Mobility Management Entity (MME).
5G network 130, as discussed in greater detail herein, introduces a new service base architecture (SBA) 132, which generally redistributes functionality of 4G network entities into smaller service-based functions/network entities. In addition, packet routing and forwarding functions (which are performed by SGW and PGW in 4G network 120) are realized as services rendered through a new network function/entity called the User Plane Function (UPF) entity. In this fashion, 5G network 130 provides a modular set of services that support dynamic and scalable deployment of resources to satisfy diverse user demands.
The illustrative device/entity 200 comprises one or more network interfaces 210, at least one processor 220, and a memory 240 interconnected by a system bus 250. Network interface(s) 210 contain the mechanical, electrical, and signaling circuitry for communicating data over links (e.g., wires or wireless links) within the telecommunication networks 100 (e.g., ref.
Memory 240 comprises a plurality of storage locations that are addressable by processor 220 for storing software programs and data structures associated with the embodiments described herein. Processor 220 may comprise necessary elements or logic adapted to execute the software programs and manipulate data structures 245. An operating system 242, portions of which are typically resident in memory 240 and executed by processor 220, functionally organizes the device by, inter alia, invoking operations in support of services and/or software processes executing on the device/module. These services and/or software processes may comprise an illustrative “blockchain charging” process/service 244 as well as a “blockchain session management” process/services 246, as described herein. Note that while processes/services 244 and 246 are shown in centralized memory 240, some embodiments provide for these processes/services to be operated in a distributed communication network.
Illustratively, the techniques described herein may be performed by hardware, software, and/or firmware, such as in accordance with the illustrative blockchain charging process 244 and/or the illustrative blockchain session management process 246, which may contain computer executable instructions executed by processor 220 to perform functions relating to UE authentication and/or UE session establishment, as described herein.
It will be apparent to those skilled in the art that other processor and memory types, including various computer-readable media, may be used to store and execute program instructions pertaining to the techniques described herein. Also, while the description illustrates various processes, it is expressly contemplated that various processes may be embodied as modules configured to operate in accordance with the techniques herein (e.g., according to the functionality of a similar process.) Further, while the processes have been shown separately, those skilled in the art will appreciate that processes may be routines or modules within other processes. For example, processor 220 can include one or more programmable processors, e.g., microprocessors or microcontrollers, or fixed-logic processors. In the case of a programmable processor, any associated memory, e.g., memory 240, may be any type of tangible processor readable memory, e.g., random access, read-only, etc., that is encoded with or stores instructions that can implement program modules, e.g., a module having blockchain charging process 244 and/or blockchain session management process 246 encoded thereon. Processor 220 can also include a fixed-logic processing device, such as an application specific integrated circuit (ASIC) or a digital signal processor that is configured with firmware comprised of instructions or logic that can cause the processor to perform the functions described herein. Thus, program modules may be encoded in one or more tangible computer readable storage media for execution, such as with fixed logic or programmable logic, e.g., software/computer instructions executed by a processor, and any processor may be a programmable processor, programmable digital logic, e.g., field programmable gate array, or an ASIC that comprises fixed digital logic, or a combination thereof. In general, any process logic may be embodied in a processor or computer readable medium that is encoded with instructions for execution by the processor that, when executed by the processor, are operable to cause the processor to perform the functions described herein.
As noted above, a transition is currently underway from existing 4G networks to 5G networks, which introduces a new service-oriented architecture (e.g., SBA 132—
In order to provision network resources, whether over existing 3G/4G networks or via the new SBA for 5G networks, the UE typically registers or authenticates with the network and further establishes a data session (which describes charging, billing, QoS, etc.) Sessions are typically managed as part of a connectivity service (e.g., PDU Connectivity Service), which defines rules for exchanging data packets (e.g., Protocol Data Units (PDUs)) between the UE and a data network. In the context of 5G networks, each session is typically associated with a respective network slice (e.g., one session belongs to one slice.) This disclosure provides complimentary and/or alternative mechanisms such as blockchain registration processes as well as blockchain session management processes to enhance dynamic and flexible workload provisioning, session establishment, and improve overall UE mobility with a natively integrated blockchain platform.
With respect to blockchain, blockchain technologies generally facilitate transparent, verifiable, and secure digital asset transactions with proof of rights and ownership. For example, blockchain technologies generally employ distributed ledger technology (DLT) with built-in cryptography to enable open and trusted exchanges over the internet without requiring central servers and/or independent trusted authorities. However, despite its advantages, existing protocols/network architectures in the telecommunications context fail to support native blockchain technologies due, in part, to underlying security requirements for initial registration processes. For example, while some blockchain technologies can be employed within existing telecommunication networks, mobile network operators and/or mobile network entities are often unaware of any blockchain transaction because such blockchain transaction only occurs after a mobile session is established (e.g., using overlay messages).
Accordingly, embodiments of this disclosure provide a native blockchain platform that employs blockchain operations that can serve as additional, alternative, or supplemental registration processes and/or session management processes within a mobile network. Moreover, the disclosed blockchain processes can operate in conjunction with various mobile Network Functions (NFs) or other network entities (including UE) over new blockchain network interfaces, satisfy security requirements for network service providers, and provide access to new types of devices/users. The native blockchain platform and the blockchain processes of this disclosure support device registration and/or session management in the context of local networks (e.g., the UE is connected to its local/home network) as well as roaming networks (e.g., the UE is outside of its local/home network and attempts to connect to a roaming/visiting network).
Referring again to the figures,
The blockchain interfaces represent communication links that facilitate an exchange of messages or data packets between BCF(s) and SBA 132 (e.g., one or more NFs that form SBA 132). In particular, BCx can facilitate exchanging messages related to policy request, authorization, network usage, lawful intercept, accounting, and the like. BCy can facilitate exchanging messages related to secondary authentication, authorization, resource sharing, lawful intercept, network slicing, etc. BCz can facilitate exchanging messages related to standalone Authentication public key pre-set, authorization, Distributed Ledger Technology query/set, etc.
Blockchain network 304 generally facilitates sharing network resources or access to network functions (NFs), such as Access and Mobility Management Function (AMF), Session Management Function (SMF), Network Repository Function (NRF), and so on, with User Equipment (e.g., UE 308), and creates specific trust boundaries across multiple service providers using distributed blockchain ledgers, as discussed in greater detail herein.
With specific reference to
Network entities of SBA 132 include AMF 320, SMF 325, Network Slice Selection Function (NSSF) 330, Network Exposure Function (NEF) 335v|335h, Network Repository Function (NRF) 340v|340h, Policy Control Function (PCF) 345v|345h, and Application Function (AF) 350. These network entities can be implemented either as a network element on a dedicated hardware, as a software instance running on a dedicated hardware, or as a virtualized function instantiated on an appropriate platform, e.g., a cloud infrastructure, as is appreciated by those skilled in the art.
In general, UE 308 connects to RAN/Access Network (AN) 310 as well as AMF 320 over respective network interfaces. Here, the RAN can include a base station while the AN can include a base station supporting non-3GPP access, e.g., Wi-Fi access. AMF 320 provides UE-based authentication, authorization, mobility management, etc. Notably, AMF 320 represents a common entity logically associated with all network slices instances that serve UE 308. As part of a registration procedure for UE 308, AMF 320 typically selects network slice instances for UE 308 by, for example, invoking or interacting with NSSF 330 to retrieve appropriate network slice instances based on UE subscription data.
SMF 325 is responsible for session management, IP address allocation to UE(s), and traffic management/selection of a User Plane Function (UPF) (e.g., UPF 315) for proper routing/data transfer. If UE 308 has multiple sessions, different SMFs may be allocated to each session for individual management and/or different functionality per session. In operation, AMF 320 can discover SMF 325 based on session request data from UE 308, as discussed in greater detail below.
AF 350 generally provides information on packet flows to PCF 345v, which is responsible for policy control in order to support Quality of Service (QoS.) PCF 345v determines policies about mobility and session management for proper AMF/SMF operations based on the information from AF 350.
AUSF 355 stores authentication data for UE 308, and UDM 360 stores subscription data for UE 308. Data network 108 provides Internet access or operator services.
As illustrated, the native blockchain platform includes enterprise blockchain network 304, which interconnects blockchain service providers (SPs), represented as Blockchain Charging Function (BCF) entities 305a-305n (also referred to as BCF 305 herein), with various mobile network entities over respective blockchain network interfaces BCx, BCy, and BCz.
BCx exchanges messages such as policy requests, authorizations, network usage, lawful intercept, accounting, and etc., BCy exchanges messages such as secondary authentication, authorization, resource sharing, lawful intercept, network slicing, and etc., and BCz exchanges messages such as standalone authentication public key present, authorization, blockchain entity queries/set, and etc.
The native blockchain platform operably supports additional and/or alternative blockchain charging procedures for registering UE as well as session management procedures for PDN/PDU sessions. Notably, the blockchain charging procedure/operations may be represented by Blockchain charging process/services 244 and the blockchain session management procedure/operations may be represented by blockchain session management process/services 246 (ref.
The blockchain charging procedure generally includes operations to register and attach UE to the network in order to encrypt and protect traffic between the UE and core network entities (e.g., SBA 132), while the blockchain session management procedure generally includes operations to establish sessions (e.g., PDU sessions/PDN sessions) in order to allocate session resources to relevant network slices, permit data transmission between UE 308 and data network 108, ensure appropriate Quality of Service (QoS) connectivity, satisfy Service Level Agreements (SLA(s)), etc.
As discussed in greater detail below, the blockchain session management processes may include authentication/authorization operations, however it is appreciated such operations relate to session management and may be separate from the Blockchain charging procedure for registering and attaching the UE to the network.
For registration and/or session management, the Blockchain charging/authorization operations generally include authentication messages exchanged between one or more core NFs and a Blockchain Charging Function (BCF) entity, which is exposed to the core NFs over new blockchain network interfaces. The authentication messages provide the BCF with UE credentials and the BCF, in turn, compares the UE credentials against UE credentials stored on a blockchain or distributed ledger. As is appreciated by those skilled in the art, the BCF returns authentication confirmation messages if the UE credentials match the UE credentials stored on the blockchain or distributed ledger.
Collectively referring to
RAN/Access Network (AN) 310 receives the RRC messages from UE 308 and selects an appropriate AMF 320 (which supports the blockchain procedures) and/or redirects the RRC messages to a new AMF as appropriate. Here, RAN/AN 310 can determine the RRC message from UE 308 include an indication for the disclosed blockchain procedures (e.g., in an access category) and selects AMF 320 and/or redirects to a new AMF based on the AMF blockchain capabilities.
With respect to the Blockchain charging procedure (e.g., for attaching UE 308 to the network), AMF 320 exchanges authentication messages with one or more Blockchain Charging Function (BCF) entities (e.g., BCF(s) 305a-n) over blockchain network interfaces BCx and/or BCy. In particular, AMF 320 may send authentication messages to invoke/request that AUSF 355 perform authentication, which causes AUSF 355 to authenticate UE 308 with BCF 305 over blockchain network interface BCx. In other embodiments, AMF 320 can directly authenticate UE 308 with BCF 305 over blockchain network interface BCy, using for example, REST Application Program Interface (API) messages.
Still referring to
While session management is illustrated and described herein in the context of 5G networks (e.g., PDU sessions), it is appreciated such session management and related operations can readily apply to 4G networks (e.g., PDN sessions, etc.) For example, as is appreciated by those skilled in the art, 4G networks create sessions using default data bearers (e.g., 4G networks), while the 5G networks establish a PDU session as-needed or on demand, independent of UE attachment procedures. Further, UE(s) can establish multiple PDU sessions to the same data network (or to different data networks) over a single or multiple access networks (e.g., 3GPP networks, non-3GPP networks, etc.) where each PDU session is associated with network slice—e.g., one S-NSSAI and one Data Network Name (DNN.) Notably, the PDU sessions can include various session types (e.g., IPv4, IPv6, Ethernet, unstructured, etc.)
In operation, UE 308 initiates session establishment by sending a PDU session request data to AMF 320 (e.g., as part of a PDU Session Establishment Request message.) Notably, when UE 308 attaches to the core network (e.g., SBA 132), UE 308 exchanges mobility management messages and session management messages with AMF 320 (e.g., over an NG1 NAS network interface.) Session management messages can be transmitted with the mobility management message supported by the NAS routing capability within AMF 320. Although AMF 320 is involved in sending session management messages, processing mobility messages and session management messages typically occurs in AMF 320 and SMF 325, respectively.
AMF 320 receives the PDU session request and discovers/selects an appropriate SMF (e.g., SMF 325) based on parameters included in the initial PDU session request from UE 308, such as session management service identification data, Single Network Slice Selection Assistance Information (S-NSSAI) data, Data Network Name (DNN) data, UE subscriptions, local operator policies, Blockchain charging data/capabilities, etc.) Although AMF 320 may not understand the full context of the session management messages, but it determines/selects an appropriate SMF for a new PDU session based on the above-mentioned parameters.
Here, AMF 320 selects SMF 325 and establishes a PDU session, which allocates PDU resources for a relevant network slice and permits data transmission/data packet exchanges between UE 308 and data network 108. In addition, AMF 320 also ensures that NAS signaling associated with the PDU session is handled by the same SMF (SMF 325) by assigning a PDU session identifier to the PDU session. UE 308, in turn, uses this PDU session identifier to route messages to the correct SMF.
As mentioned, PDU sessions are typically managed as part of a connectivity service (e.g., PDU Connectivity Service), which defines rules for exchanging data packets (e.g., Protocol Data Units (PDUs)) between the UE (e.g., UE 308) and a data network (e.g., data network 108) based on session-specific Quality of Service (QoS) parameters. Subscription information for each S-NSSAI can include multiple DNNs and one default DNN. When UE 308 does not specify a DNN in a NAS Message containing PDU Session Establishment Request for a given S-NSSAI, the serving AMF determines the DNN for the requested PDU Session by selecting the default DNN for this S-NSSAI if a default DNN is present in the UE's Subscription Information; otherwise the serving AMF selects a locally configured DNN for this S-NSSAI. If the DNN provided by the UE is not supported by the network and AMF can not select an SMF by querying NRF, the AMF may reject the NAS Message containing PDU Session Establishment Request from the UE with a cause indicating that the DNN is not supported.
Each PDU Session typically supports a single PDU Session type, e.g., supports the exchange of a single type of PDU requested by UE 308 at the establishment of the PDU Session. PDU Sessions are generally established upon UE request, modified upon UE 308/SBA 132 request, and released upon UE 308/SBA 132 request using NAS session management signaling exchanged over the N1 network interface between UE 308 and SMF 325. Upon request from an Application Server, SBA 132 is able to trigger a specific application in UE 308. When receiving the trigger message, UE 308 passes it to the identified application (in UE 308.) The identified application in UE 308 may establish a PDU Session to a specific DNN, in accordance with 3GPP TS 32.501, clause 4.4.5.
SMF 325 is responsible of checking whether UE requests are compliant with the user subscription. For this purpose, SMF 325 retrieves and requests to receive update notifications on SMF level subscription data from UDM 360. This subscription data can indicate (e.g., per DNN and per S-NSSAI) allowed PDU Session Types and the default PDU Session Type, allowed SSC modes and the default SSC mode, QoS Information, subscribed Session-AMBR, Default 5QI and Default ARP, static IP address/prefix, subscribed User Plane Security Policy, Charging Characteristics to be associated with the PDU Session, and so on.
In addition, UE 308 may request to move a PDU Session between 3GPP and Non 3GPP accesses. The decision to move PDU Sessions between 3GPP access and Non 3GPP access is made on a per PDU Session basis, e.g., UE 308 may, at a given time, have some PDU Sessions using 3GPP access while other PDU Sessions are using Non 3GPP access. UE 308 typically provides a PDU session ID in a PDU Session Establishment Request message. The PDU session ID is unique per UE and represents a unique identifier assigned to a PDU Session. The PDU session ID can be stored in UDM 360 to support handover between 3GPP and non-3GPP access—e.g., when different PLMNs are used for the two accesses.
While many of the above discussed operations may be performed as part of conventional session management processes, this disclosure further provides blockchain session management processes where one or more network entities/NFs of SBA 132 exchange messages with a Blockchain Charging Function (BCF) (e.g., one of BCF(s) 305a-n over new blockchain interfaces (e.g., BCx, BCy, BCz) in order to establish a session for UE 308. The disclosed blockchain session management processes may complement existing session management processes similar to secondary authentication processes that use an Authentication Authorization, and Accounting (AAA) server in a data network. However, here, the blockchain enterprise platform (e.g., enterprise blockchain network 304 and BCF(s) 305a-n) is natively integrated with and directly exposed to SBA 132. It is also appreciated that the blockchain session management processes, in other embodiments, may replace existing session management processes.
In operation, SMF 325 receives session request data associated with UE 308. This session request data may be included as part of a PDU Session Establishment Request message, which may comprise the above-mentioned parameters such as the Blockchain charging data. SMF 325 selects a Blockchain Charging Function (BCF 305) based on the session request data, and further exchanges at least a portion of the Blockchain charging data (e.g., Blockchain charging credentials associated with UE 308) with BCF 305 over a blockchain network interface (e.g., BCx and/or BCy, where SMF 325 may route messages through AMF 320, etc.)
In some embodiments, SMF 325 may further select an NEF (e.g., NEF 335—shown in a dashed box in
SMF 325 receives authentication confirmation data from BCF 305 over the blockchain network interface and establishes a session associated with the UE based on the authentication data.
These and other blockchain enabled charging and accounting features are described in greater detail with respect to the schematic signalling diagrams shown in
With respect to the illustrated call flow, UE 308 initiates, at step 402, an initial PDU (or PDN) session establishment request and sends session request data (e.g., Non-Access Stratum (NAS) messages) to AMF 320 over network interface N1. The NAS messages can include information such as Single Network Slice Selection Assistance Information (S-NSSAI), Data Network Name (DNN), PDU session IDs, request types, old PDU session IDs, an N1 Service Management (SM) container, indications/requests for blockchain authorization (e.g., as a secondary authorization) and/or access capabilities, and so on.
AMF 320 receives the session establishment request and further discovers/selects an appropriate SMF—here, SMF 325. In particular, AMF 320 discovers and selects SMF 325 based on parameters included in the initial PDU session request (e.g., step 402.) As mentioned, these parameters include S-NSSAI data, DNN data, UE subscriptions, local operator policies, blockchain charging data/blockchain capabilities, and so on.
Here, AMF 320 selects SMF 325 based, at least in part, on its blockchain capabilities and access. If AMF 320 does not have an association with a SMF for the PDU session ID (e.g., when Request Type indicates “initial request”), AMF 320 invokes a PDU session creation request (e.g., Nsmf_PDUSession_CreateSMContext Request), as shown at step 404. However, if AMF 320 already has an association with an SMF for the PDU Session ID (e.g., when Request Type indicates “existing PDU Session”), the AMF invokes the Nsmf_PDUSession_UpdateSMContext Request.
At step 406, SMF 325 and UDM 360 exchange registration/subscription information for UE 308. SMF 325 further sends a corresponding PDU session SM context responses (e.g., an SM context identifier) to AMF 320, again at step 404. In this fashion, SMF 325 registers itself for an initial PDU session with UDM 360, in accordance with UE-requested PDU Session Establishment procedures provided by 3GPP TS 23.502.
Following step 406, NEF 335 may perform authorization/authentication operations as part of the PDN session establishment. These authorization/authentication operations may conform to secondary authentication/authorization operations such as Data Network (DN)-Authentication, Authorization, and Accounting (AAA) server, described by 3GPP TS 23.501, clause 5.6.6. In some examples, authorization/authentication operations may include interfacing with third-party APIs or other interfaces. In some cases, the authorization/authentication operations may include a blockchain based authentication procedure that can be performed over, for example, the BCx network interface, the BCy network interface, or both.
Here, steps 408-416 depict one example of a blockchain based authentication procedure. In particular, at step 408, UE 308 sends a NAS SM DN Request Container message to SMF 325 to request the blockchain authentication procedure as a secondary authorization for the PDN session (e.g., in accordance with secondary authorization request of 3GPP TS 23.501, clause 5.6.6). The NAS SM DN Request Container message includes blockchain information for PDU session authorization by an external Data Network (e.g., slice information (identified by S-NSSAI), PDU session ID, a PDN it would like to connect to (identified by DNN), a blockchain server ID (identifying BCF 305), etc.). This blockchain information may be provided as part of payload data, and/or may be included as part of follow-on request data.
Although the NAS SM DN Request Container message is illustrated as a single signal between UE 308 and SMF 325, it is appreciated this signal may be conveyed to SMF 325 by AMF 320. For example, UE 308 can send the signal to AMF 320 over the N1 network interface, and AMF 320 can send or forward the signal (or appropriate portions of the signal) to SMF 325 over the N11 network interface. In some embodiments, the NAS SM DN Request Container can include the PDU session establishment request message (e.g., step 402) as part of a N1 SM container, as is appreciated by those skilled in the art.
At step 410, UE 308 sends a NAS SM DN Request Container message to SMF 325 to request the blockchain authentication procedure as a secondary authorization for the PDN session (e.g., in accordance with secondary authorization request of 3GPP TS 23.501, clause 5.6.6.) The NAS SM DN Request Container message includes blockchain information for PDU session authorization by an external Data Network (e.g., slice information (identified by S-NSSAI), PDU session ID, a PDN it would like to connect to (identified by DNN), a blockchain server ID (identifying BCF 305), etc.) This blockchain information may be provided as part of payload data, and/or may be included as part of follow-on request data. At step 412, SMF 325 requests a secondary authentication for UE 308 via NEF 335, which serves as a gateway to BCF 305. SMF 325 may send NEF 335 an API blockchain call including credential information for UE 308. In response, at step 414, NEF 335 sends an authentication request to BCF 305 based at least in part on the included credentials and API blockchain call, which provides identification of an appropriate BCF entity. This authentication request is transmitted over the BCx network interface and, at step 416, BCF 305 returns authentication credentials to NEF 335 over the BCx network interface, which is forwarded to SMF 325 to provide complete session authorization and blockchain verification.
After successful authorization, SMF 325 continues with PDU establishment operations and, based on a PDU profile, selects a PCF and performs Session Management Policy Establishment procedure, as shown at step 418. SMF 325 can provide a blockchain flag and associated parameters (such as credential information and the like) to indicate to PCF 345 that charging capabilities can be obtained from BCF 305 (e.g., and/or via NEF 335.) For example, PCF 345 can use a charging data record (CDR) (received from SMF 325 at step 418) to identify NEF 335 and/or BCF 305.
PCF 345 may request, at step 418, service parameters (through NEF 335 for example), which can further obtain the service parameters through third-party APIs or externally facing interfaces (e.g., BCy, BCx, etc.) and the like.) PCF 345 further determines the network services, QoS, and charging plan to be applied to the PDU session associated with UE 308. At step 420, PCF 345 requests a session authorization for SMF 325 from NEF 335. The request includes policy information such as, for example and without imputing limitation, quota limitations, discounts, other relevant policies, and the like. NEF 335 sends a charge request to BCF 305 and receives a respective response back from BCF 305 at step 422. BCF 305 checks an account balance associated with UE 308 (e.g., indicated by the credentials provided above) and provides session authorization with usage information based on the account balance and/or success (or failure) of an attempted debit applied to the account of an amount based on the policy information provided above at step 420. At step 424, NEF 335 forwards authorization for the session to PCF 345, which may in turn forward authorization to SMF 325. Accounting may be started for UE 308 and, further, charging data records (CDRs) can be sent by PCF 345 or SMF 325 to BCF 305 (not shown).
SMF 325 further selects a UPF (e.g., UPF 315) to serve the PDU session and according to policy information provided at step 426. At steps 428-432, SMF 325 performs a.) policy management and/or modification in accordance with received policy information (e.g., reflecting the blockchain charging event) and in accordance with 3GPP TS 23.502 call flow).
The blockchain charging event includes operations for BCF 305 to debit blockchain payment credits (e.g., blockchain tokens) of a particular account (e.g., on an identified blockchain/distributed ledger) in order to pay for one or more network services for UE 308 are recorded and processed by SMF 325 and/or PCF 345. For example, BCF 305 can debit blockchain tokens of a blockchain eWallet associated with UE 308 before services are provided (or, as above, provide services reflecting the debit applied to the account).
In some instances, SMF 325 and PCF 345 can direct a return of tokens by BCF 305 should all the tokens deducted in this step not be consumed. For example, in response to a request by CHF 345, which may be integrated into SMF 325, PCF 345, or distributed between both, BCF 305 can create a smart contract on a particular blockchain. In comparison to other pre-paid services that use quotas from an Online Charging Server (OCS) (not an actual monetary fund), the blockchain charging event represents a flexible transaction that may include a prepayment of actual funds (which the service provider can return if the contract is not completed in an authorized time period) via, for example, a smart contract with an escrow functionality such as a conditional funds transfer or return.
In one or more additional embodiments, enhanced blockchain pre-paid charging operations also accommodate delayed authorization. For example, BCF 305 may require a certain amount of time to conclude a consensus, which may delay its response/fund verifications (e.g., as part of the blockchain charging event.) In these instances, SMF 325 can request PCF 345 to notify it when BCF 305 completes the charge.
As seen in signalling diagram 400, PDU set up may be completed by steps as defined by 3GPP TS 23.502, as is appreciated by those skilled in the art).
Once a policy is established by PCF 345 and provided to SMF 325, a blockchain charging event may occur. The blockchain charging event in signaling diagram 401 is represented by steps 452-456. At step 452 (following step 426), SMF 325 sends a charging request to a Charging Function (CHF) entity 355. CHF 355 in turn forwards the charging request to BCF 305 over BCx network interface because, as per steps 410-416, UE 310 is enabled with appropriate blockchain credentials and already authorized by BCF 305. BCF 305 verifies a balance in an appropriate account (e.g., an eWallet) identified by the blockchain credentials and allows the charging to the account (e.g., debits the account for an amount of tokens associated with the established policy at step 426), which is indicated to CHF 355. CHF 355 then forwards the authorization to PCF 345 at step 456, and PCF 345 informs SMF 325 of the authorization (not depicted.) UPF selection, steps 428-432, and PDU setup then occur as discussed above in reference to pre-paid charging and accounting signalling diagram 400.
In this fashion, procedure 500 can include blockchain charging operations (e.g., blockchain charging process/services 244) represented by signals exchanged between one or more NF entities (e.g., device/entity 200) in a core network such as SBA 132 and a Blockchain Charging Function (BCF) entity (e.g., BCF 305). For example, the NF entities can include, for example, an AMF entity (AMF 320), an SMF entity (SMF 325), a PCF entity (PCF 345), and/or a CHF entity (CHF 355).
Procedure 500 begins at step 505 and continues on to step 510 where, as discussed above, the SMF entity receives blockchain credentials associated with User Equipment ((UE), such as UE 308.) Notably, session request data (including the blockchain credentials) may be sent from an AMF entity to the SMF entity. In addition, the credentials can include blockchain charging data associated with the UE (e.g., blockchain entity identifiers which identify a Blockchain Charging Function (BCF, such as BCF 305), and/or other information to solicit blockchain payment data from the BCF, and the like.)
At step 515, a Charging Data Record (CDR) corresponding to one or more network resources is generated by, for example, a CHF entity (e.g., CHF entity 355). As described above, the CHF entity may be a part of another NF entity such as the SMF entity (e.g., SMF 325) and/or a PCF entity (e.g., PCF 345). In this fashion, the CHF entity may be a functional component (e.g., subservice and the like) of the SMF and/or PCF entities. In operation, the CHF entity generally stores CDRs, and generates charging requests based on CDRs and/or entries in CDRs as well as, in some examples, policy information and the like from the PCF entity.
Next, at step 520, the SMF entity selects the BCF based on the received credentials. As mentioned, the credentials data can include identification information indicating an appropriate blockchain service provider with which to interface (and issue payment tokens) for the UE.
At step 525, a charging request is sent to a Blockchain Charging Function (BCF) entity over a blockchain network interface. For example, the blockchain network interface can include the above discussed BCx, BCy, and/or BCz interfaces, which expose one or more blockchain platforms (e.g., enterprise blockchain network, including blockchain service providers or BCFs) to a core network/core NFs (e.g., SBA 132). The charging request causes the BCF entity to perform transactions on specified UE accounts. For example, the BCF entity may debit an account associated with the UE or transfer tokens from the UE account and to another account (e.g., associated with the one or more network resources.) The UE account and/or network resource account may be public accounts (e.g., publically viewable/auditable), private accounts (e.g., requiring authorization to view or audit), or a combination of the two.
At step 530, confirmation of the charge transaction is received from the BCF entity. Then, at step 535, a difference between an amount of the charge transaction and an amount associated with the one or more network resources is determined. The difference is then sent, as a credit, to the BCF entity (step 540.) In some embodiments, the sent credit causes the BCF entity to adjust and/or credit the UE account. The BCF entity may transfer a respective amount of tokens from the network resource account to the UE account. In some examples, such as where a smart contract is associated with the UE account and network resource account, an escrow account controlled by the smart contract may refund back the difference in tokens to the UE account and provide the remaining escrowed tokens to the network resource (e.g., before terminating the completed smart contract.)
In response, and based on the confirmation of the charge transaction, the one or more network resources/services are provided to the UE at step 545. At step 550, procedure 500 may conclude or, in some instances, return to step 505 to perform a new charging procedure.
It should be noted that certain steps within procedure 500 may be optional, and further, the steps shown in
The techniques described herein, therefore, provide a natively integrated blockchain platform for wireless networks and facilitate provisioning network resources to UE based on distributed blockchain account information. This native blockchain platform supports new use cases that create opportunities to share network resources across multiple provider networks, increase workload mobility security, improve billing/mediation and reconciliation and create mechanisms for roaming authentication/registration using blockchain technology. In addition, the native blockchain platform provides new opportunities for the app economy and creates a new market place for Mobile Virtual Network Operators (MVNO) participation. As discussed above the native blockchain platform facilitates new methods for provisioning network resources to UE based on a blockchain accounting procedure/transaction using a natively integrated blockchain platform that is exposed to one or more core NFs using Application Program Interface (API) messages. In this fashion, the native blockchain platform can be leveraged to natively facilitate payments for network services as part of blockchain charging events.
While there have been shown and described illustrative embodiments of the native blockchain platform and corresponding operations in a specific network context (e.g., a mobile core network for a 5G network), it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the embodiments herein. For example, the embodiments and operations disclosed herein have been described with respect to certain devices, NFs, interfaces, and systems, however it is appreciated that such embodiments are provided for purposes of example, not limitation and that the blockchain charging techniques disclosed herein can be incorporated as part of existing wireless networks.
The foregoing description has been directed to specific embodiments. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. For instance, it is expressly contemplated that the components, elements, and/or operations described herein can be implemented as software being stored on a tangible (non-transitory) computer-readable medium, devices, and memories (e.g., disks/CDs/RAM/EEPROM/etc.) having program instructions executing on a computer, hardware, firmware, or a combination thereof. Further, methods describing the various functions and techniques described herein can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on. In addition, devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example. Instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures. Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the embodiments herein. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the embodiments herein.
The present application is claiming priority to U.S. Provisional Patent Application Ser. No. 62/682,778, filed on Jun. 8, 2018, the contents of which are incorporated herein by reference to its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4236068 | Walton | Nov 1980 | A |
5642303 | Small et al. | Jun 1997 | A |
5751223 | Turner | May 1998 | A |
6812824 | Goldinger et al. | Nov 2004 | B1 |
D552603 | Tierney | Oct 2007 | S |
7573862 | Chambers et al. | Aug 2009 | B2 |
D637569 | Desai et al. | May 2011 | S |
7975262 | Cozmei | Jul 2011 | B2 |
8010079 | Mia et al. | Aug 2011 | B2 |
8102814 | Rahman et al. | Jan 2012 | B2 |
8260320 | Herz | Sep 2012 | B2 |
8284748 | Borghei | Oct 2012 | B2 |
8300594 | Bernier et al. | Oct 2012 | B1 |
8325626 | Tóth et al. | Dec 2012 | B2 |
8396485 | Grainger et al. | Mar 2013 | B2 |
8446899 | Lei et al. | May 2013 | B2 |
8457145 | Zimmerman et al. | Jun 2013 | B2 |
8458184 | Dorogusker et al. | Jun 2013 | B2 |
D691636 | Bunton | Oct 2013 | S |
8549638 | Aziz | Oct 2013 | B2 |
8553634 | Chun et al. | Oct 2013 | B2 |
8644301 | Tamhankar et al. | Feb 2014 | B2 |
8650279 | Mehta et al. | Feb 2014 | B2 |
8669902 | Pandey et al. | Mar 2014 | B2 |
8676182 | Bell et al. | Mar 2014 | B2 |
8682279 | Rudolf et al. | Mar 2014 | B2 |
8693367 | Chowdhury et al. | Apr 2014 | B2 |
8718644 | Thomas et al. | May 2014 | B2 |
8761174 | Jing et al. | Jun 2014 | B2 |
8768389 | Nenner et al. | Jul 2014 | B2 |
8849283 | Rudolf et al. | Sep 2014 | B2 |
8909698 | Parmar et al. | Dec 2014 | B2 |
8958318 | Hastwell et al. | Feb 2015 | B1 |
9060352 | Chan et al. | Jun 2015 | B2 |
9130859 | Knappe | Sep 2015 | B1 |
9173084 | Foskett | Oct 2015 | B1 |
9173158 | Varma | Oct 2015 | B2 |
D744464 | Snyder et al. | Dec 2015 | S |
9270709 | Shatzkamer et al. | Feb 2016 | B2 |
9271216 | Friman et al. | Feb 2016 | B2 |
9281955 | Moreno et al. | Mar 2016 | B2 |
D757424 | Phillips et al. | May 2016 | S |
D759639 | Moon et al. | Jun 2016 | S |
9369387 | Filsfils et al. | Jun 2016 | B2 |
9389992 | Gataullin et al. | Jul 2016 | B2 |
9426305 | De Foy et al. | Aug 2016 | B2 |
D767548 | Snyder et al. | Sep 2016 | S |
9467918 | Kwan | Oct 2016 | B1 |
D776634 | Lee et al. | Jan 2017 | S |
9544337 | Eswara et al. | Jan 2017 | B2 |
9569771 | Lesavich et al. | Feb 2017 | B2 |
9609504 | Karlqvist et al. | Mar 2017 | B2 |
9615268 | Navarro et al. | Apr 2017 | B2 |
9634952 | Gopinathan et al. | Apr 2017 | B2 |
9642167 | Snyder et al. | May 2017 | B1 |
9654344 | Chan et al. | May 2017 | B2 |
9712444 | Bolshinsky et al. | Jul 2017 | B1 |
9713114 | Yu | Jul 2017 | B2 |
9736056 | Vasseur et al. | Aug 2017 | B2 |
9762683 | Karampurwala et al. | Sep 2017 | B2 |
9772927 | Gounares et al. | Sep 2017 | B2 |
9820105 | Snyder et al. | Nov 2017 | B2 |
D804450 | Speil et al. | Dec 2017 | S |
9858559 | Raleigh et al. | Jan 2018 | B2 |
9860151 | Ganichev et al. | Jan 2018 | B2 |
9923780 | Rao et al. | Mar 2018 | B2 |
9933224 | Dumitriu et al. | Apr 2018 | B2 |
9961560 | Farkas et al. | May 2018 | B2 |
9967906 | Verkaik et al. | May 2018 | B2 |
9980220 | Snyder et al. | May 2018 | B2 |
9985837 | Rao et al. | May 2018 | B2 |
9998368 | Chen et al. | Jun 2018 | B2 |
10108954 | Dunlevy et al. | Oct 2018 | B2 |
10123202 | Polehn et al. | Nov 2018 | B1 |
10164779 | Uhr | Dec 2018 | B2 |
10171248 | King | Jan 2019 | B2 |
20030087645 | Kim et al. | May 2003 | A1 |
20030116634 | Tanaka | Jun 2003 | A1 |
20040029576 | Flykt et al. | Feb 2004 | A1 |
20040203572 | Aerrabotu et al. | Oct 2004 | A1 |
20050090225 | Muehleisen et al. | Apr 2005 | A1 |
20050169193 | Black et al. | Aug 2005 | A1 |
20050186904 | Kowalski et al. | Aug 2005 | A1 |
20060022815 | Fischer et al. | Feb 2006 | A1 |
20060030290 | Rudolf et al. | Feb 2006 | A1 |
20060092964 | Park et al. | May 2006 | A1 |
20060126882 | Deng et al. | Jun 2006 | A1 |
20060146803 | Bae et al. | Jul 2006 | A1 |
20060187866 | Werb et al. | Aug 2006 | A1 |
20060245406 | Shim | Nov 2006 | A1 |
20070037605 | Logan | Feb 2007 | A1 |
20070130471 | Walker Pina et al. | Jun 2007 | A1 |
20070239854 | Janakiraman et al. | Oct 2007 | A1 |
20080037715 | Prozeniuk et al. | Feb 2008 | A1 |
20080084888 | Yadav et al. | Apr 2008 | A1 |
20080101381 | Sun et al. | May 2008 | A1 |
20080163207 | Reumann et al. | Jul 2008 | A1 |
20080233969 | Mergen | Sep 2008 | A1 |
20090129389 | Halna DeFretay et al. | May 2009 | A1 |
20090203370 | Giles et al. | Aug 2009 | A1 |
20090282048 | Ransom et al. | Nov 2009 | A1 |
20090298511 | Paulson | Dec 2009 | A1 |
20090307485 | Weniger et al. | Dec 2009 | A1 |
20100039280 | Holm et al. | Feb 2010 | A1 |
20100097969 | De Kimpe et al. | Apr 2010 | A1 |
20110087799 | Padhye et al. | Apr 2011 | A1 |
20110142053 | Van Der Merwe et al. | Jun 2011 | A1 |
20110182295 | Singh et al. | Jul 2011 | A1 |
20110194553 | Sahin et al. | Aug 2011 | A1 |
20110228779 | Goergen | Sep 2011 | A1 |
20120023552 | Brown et al. | Jan 2012 | A1 |
20120054367 | Ramakrishnan et al. | Mar 2012 | A1 |
20120088476 | Greenfield | Apr 2012 | A1 |
20120115512 | Grainger et al. | May 2012 | A1 |
20120157126 | Rekimoto | Jun 2012 | A1 |
20120167207 | Beckley et al. | Jun 2012 | A1 |
20120182147 | Forster | Jul 2012 | A1 |
20120284777 | Eugenio | Nov 2012 | A1 |
20120311127 | Kandula, Sr. et al. | Dec 2012 | A1 |
20120324035 | Cantu et al. | Dec 2012 | A1 |
20130029685 | Moshfeghi | Jan 2013 | A1 |
20130039391 | Skarp | Feb 2013 | A1 |
20130057435 | Kim | Mar 2013 | A1 |
20130077612 | Khorami | Mar 2013 | A1 |
20130088983 | Pragada et al. | Apr 2013 | A1 |
20130107853 | Pettus et al. | May 2013 | A1 |
20130108263 | Srinivas et al. | May 2013 | A1 |
20130115916 | Herz | May 2013 | A1 |
20130145008 | Kannan et al. | Jun 2013 | A1 |
20130155906 | Nachum et al. | Jun 2013 | A1 |
20130191567 | Rofougaran et al. | Jul 2013 | A1 |
20130203445 | Grainger et al. | Aug 2013 | A1 |
20130217332 | Altman et al. | Aug 2013 | A1 |
20130232433 | Krajec et al. | Sep 2013 | A1 |
20130273938 | Ng et al. | Oct 2013 | A1 |
20130317944 | Huang et al. | Nov 2013 | A1 |
20130322438 | Gospodarek et al. | Dec 2013 | A1 |
20130343198 | Chhabra et al. | Dec 2013 | A1 |
20130347103 | Veteikis et al. | Dec 2013 | A1 |
20140007089 | Bosch et al. | Jan 2014 | A1 |
20140016926 | Soto et al. | Jan 2014 | A1 |
20140025770 | Warfield et al. | Jan 2014 | A1 |
20140031031 | Gauvreau et al. | Jan 2014 | A1 |
20140052508 | Pandey et al. | Feb 2014 | A1 |
20140059655 | Beckley et al. | Feb 2014 | A1 |
20140087693 | Walby et al. | Mar 2014 | A1 |
20140105213 | A K et al. | Apr 2014 | A1 |
20140118113 | Kaushik et al. | May 2014 | A1 |
20140148196 | Bassan-Eskenazi et al. | May 2014 | A1 |
20140179352 | V.M. et al. | Jun 2014 | A1 |
20140191868 | Ortiz et al. | Jul 2014 | A1 |
20140198808 | Zhou | Jul 2014 | A1 |
20140222997 | Mermoud et al. | Aug 2014 | A1 |
20140233460 | Pettus et al. | Aug 2014 | A1 |
20140269321 | Kamble et al. | Sep 2014 | A1 |
20140302869 | Rosenbaum et al. | Oct 2014 | A1 |
20140337824 | St. John et al. | Nov 2014 | A1 |
20140341568 | Zhang et al. | Nov 2014 | A1 |
20150016286 | Ganichev et al. | Jan 2015 | A1 |
20150016469 | Ganichev et al. | Jan 2015 | A1 |
20150023176 | Korja et al. | Jan 2015 | A1 |
20150030024 | Venkataswami et al. | Jan 2015 | A1 |
20150043581 | Devireddy et al. | Feb 2015 | A1 |
20150063166 | Sif et al. | Mar 2015 | A1 |
20150065161 | Ganesh et al. | Mar 2015 | A1 |
20150087330 | Prechner et al. | Mar 2015 | A1 |
20150103818 | Kuhn et al. | Apr 2015 | A1 |
20150163192 | Jain et al. | Jun 2015 | A1 |
20150172391 | Kasslin et al. | Jun 2015 | A1 |
20150223337 | Steinmacher-Burow | Aug 2015 | A1 |
20150256972 | Markhovsky et al. | Sep 2015 | A1 |
20150264519 | Mirzaei et al. | Sep 2015 | A1 |
20150280827 | Adiletta et al. | Oct 2015 | A1 |
20150288410 | Adiletta et al. | Oct 2015 | A1 |
20150326704 | Ko et al. | Nov 2015 | A1 |
20150358777 | Gupta | Dec 2015 | A1 |
20150362581 | Friedman et al. | Dec 2015 | A1 |
20150379510 | Smith | Dec 2015 | A1 |
20160007315 | Lundgreen et al. | Jan 2016 | A1 |
20160044627 | Aggarwal et al. | Feb 2016 | A1 |
20160099847 | Melander et al. | Apr 2016 | A1 |
20160100395 | Xu et al. | Apr 2016 | A1 |
20160105408 | Cooper et al. | Apr 2016 | A1 |
20160127875 | Zampini, II | May 2016 | A1 |
20160146495 | Malve et al. | May 2016 | A1 |
20160330045 | Tang et al. | Nov 2016 | A1 |
20160344641 | Javidi et al. | Nov 2016 | A1 |
20170026974 | Dey et al. | Jan 2017 | A1 |
20170116693 | Rae et al. | Apr 2017 | A1 |
20170164212 | Opsenica et al. | Jun 2017 | A1 |
20170177898 | Dillenberger | Jun 2017 | A1 |
20170180134 | King | Jun 2017 | A1 |
20170180999 | Alderfer et al. | Jun 2017 | A1 |
20170181136 | Bharadwaj et al. | Jun 2017 | A1 |
20170195205 | Li et al. | Jul 2017 | A1 |
20170202000 | Fu et al. | Jul 2017 | A1 |
20170214551 | Chan et al. | Jul 2017 | A1 |
20170214675 | Johnsrud et al. | Jul 2017 | A1 |
20170243208 | Kurian et al. | Aug 2017 | A1 |
20170273083 | Chen et al. | Sep 2017 | A1 |
20170302663 | Nainar et al. | Oct 2017 | A1 |
20170317997 | Smith et al. | Nov 2017 | A1 |
20170330179 | Song et al. | Nov 2017 | A1 |
20170330180 | Song et al. | Nov 2017 | A1 |
20170332421 | Sternberg et al. | Nov 2017 | A1 |
20170339706 | Andreoli-Fang et al. | Nov 2017 | A1 |
20170364700 | Goldfarb et al. | Dec 2017 | A1 |
20180060835 | Martin | Mar 2018 | A1 |
20180063018 | Bosch et al. | Mar 2018 | A1 |
20180069311 | Pallas et al. | Mar 2018 | A1 |
20180082076 | Murray | Mar 2018 | A1 |
20180084389 | Snyder et al. | Mar 2018 | A1 |
20180084427 | Huo | Mar 2018 | A1 |
20180136633 | Small et al. | May 2018 | A1 |
20180137512 | Georgiadis et al. | May 2018 | A1 |
20180139056 | Imai et al. | May 2018 | A1 |
20180139107 | Senarath et al. | May 2018 | A1 |
20180197173 | Durvasula et al. | Jul 2018 | A1 |
20180212970 | Chen et al. | Jul 2018 | A1 |
20180253539 | Minter et al. | Sep 2018 | A1 |
20180287806 | Carboni et al. | Oct 2018 | A1 |
20180294966 | Hyun et al. | Oct 2018 | A1 |
20180294977 | Uhr et al. | Oct 2018 | A1 |
20180343128 | Uhr et al. | Nov 2018 | A1 |
20180374094 | Kohli et al. | Dec 2018 | A1 |
20190005470 | Uhr et al. | Jan 2019 | A1 |
20190012695 | Bishnoi | Jan 2019 | A1 |
20190058709 | Kempf et al. | Feb 2019 | A1 |
Number | Date | Country |
---|---|---|
107784748 | Mar 2018 | CN |
WO 2013020126 | Feb 2013 | WO |
WO 2014098556 | Jun 2014 | WO |
WO 2015131920 | Sep 2015 | WO |
WO 2017078657 | May 2017 | WO |
WO 2017080518 | May 2017 | WO |
WO 2017187011 | Nov 2017 | WO |
WO 2017187397 | Nov 2017 | WO |
WO 2018009340 | Jan 2018 | WO |
WO 2018028777 | Feb 2018 | WO |
WO 2018053271 | Mar 2018 | WO |
WO 2018066362 | Apr 2018 | WO |
Entry |
---|
“Cisco ASR 5x00 Mobility Management Entity Administration Guide,” Version 15.0, Cisco Systems, Inc., Last updated Jun. 13, 2014, pp. 1-266. |
“Cisco 10000 Series Router Quality of Service Configuration Guide, Chapter 20: Configuring Quality of Service for MPLS Traffic,” Cisco Systems, Inc., Updated Nov. 17, 2013, pp. 1-34. |
“Enterprise Mobility 7.3 Design Guide, Chapter 11: CISCO Mobility Services Engine,” Cisco Systems, Inc., Updated Apr. 20, 2015, 8 pages. |
“I Love WiFi, The difference between L2 and L3 Roaming Events,” Apr. 1, 2010, 6 pages. |
“Quality of Service Regulation Manual,” ITU 2017, pp. 1-174. |
“Wi-FI Location-Based Services 4.1 Design Guide,” May 20, 2008, 206 pages. |
Afolabi, Ibrahim, et al., “Network Slicing & Softwarization: A Survey on Principles, Enabling Technologies & Solutions,” Mar. 21, 2018, pp. 1-24. |
Ali, Z., et al., “Performance Measurement in Segment Routing Networks with IPv6 Data Plane (SRv6),” Spring Working Group, Feb. 26, 2018, pp. 1-17. |
An, Xueli, et al., “Virtualization of Cellular Network EPC Gateways based on a Scalable SDN Architecture,” IEEE, Feb. 12, 2015, pp. 1-7. |
Antonioli, Roberto, et al., “Dual Connectivity for LTE-NR Cellular Networks,” Research Gate, Sep. 3-6, 2017, pp. 171-175. |
Bekan, Adnan, et al., “D5.1: Machine Learning Algorithms Development and Implementation,” 2016-2018 eWINE Consortium, 23, 2016, pp. 1-72. |
Bogale, Tadilo Endeshaw, et al., “Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks,” arxiv.org, Jan. 12, 2018, pp. 1-10. |
Carter, Steve Sr., “E911 VoIP Essentials for Enterprise Deployments,” XO Communications, LLC, 2012, 9 pages. |
Chalise, Batu K., et al., “MIMO Relaying for Multiaccess Communication in Cellular Networks,” Sensor Array and MultiChannel Signal Processing Workshop, 2008, SAM 2008, 5th IEEE, Jul. 21, 2008, pp. 146-150. |
Cheng, W., et al., “Path Segment in MPLS Based Sement Routing Network,” Network Working Group, Oct. 2017, pp. 1-10. |
Christidis, Konstantinos, et al., “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, Special Section on the of Research in Internet of Things (IoT), vol. 4, May 10, 2016, pp. 1-12. |
Cox, Jacob H. Jr., et al., “Advancing Software-Defined Networks: A Survey,” IEEE, Oct. 12, 2017, pp. 25487-25526. |
Cui, Wenzhi et al., “DiFS: Distributed Flow Scheduling for Data Center Networks,” Nanjing University, China, Jul. 28, 2013, 10 pages. |
Doyle, Matthew G., “An IP Address Management Solution fora Server Solution Provider,” A Dissertation Submitted to The University of Liverpool, Sep. 28, 2005, 116 pages. |
Galvan T., Carlos E., et al., “Wifi bluetooth based combined positioning algorithm,” International Meeting of Electrical Engineering Research ENIINVIE 2012, Procedia Engineering 35 (2012 ), pp. 101-108. |
Geller, Michael, et al. , “5G Security Innovation with Cisco,” Whitepaper Cisco Public, Jun. 8, 2018, pp. 1-29. |
Gesbert, David, “Advances in Multiuser MIMO Systems (Tutorial Part II) Emerging Topics in Multiuser MIMO Networks,” IEEE PIMRC Conference, Sep. 2007, 107 pages. |
Halperin, Daniel, et al., “Augmenting Data Center Networks with Multi-Gigabit Wireless Links,” Aug. 15-19, 2011, SIGCOMM'11, ACM 978-1-4503-0797-0/11/08, pp. 38-49. |
Herb, Daniel, et al., “ROAUM: How to Unblock ROAMING IoT Using BLockchain,” available at https://uploads-ssl.webflow.com/5987a08baeea4300016b7bd9/5a7a6d6cee5bc400010a08f2 Roaum Roaming IoT Whitepaper.pdf, pp. 1-14. |
Hsieh, Cynthia, “Location Awareness in VMware View 4.5 and Above,” VMware, 2011, 8 pages. |
Husain, Syed, et al., “Mobile Edge Computing with Network Resource Slicing for Internet-of-Things,” IEEE 2017, pp. 1-7. |
Jero, Samuel, et al., “Identifier Binding Attacks and Defenses in Software-Defined Networks,” USENIX, The Advanced Computing Systems Association, Aug. 16-18, 2017, 19 pages. |
Ji, Philip N., et al., “Demonstration of High-Speed MIMO OFDM Flexible Bandwidth Data Center Network,” Optical Society of America, 2012, 2 pages. |
Kandula, Srikanth, et al., “Flyways to De-Congest Data Center Networks,” Microsoft Research, Oct. 23, 2009, 6 pages. |
Katayama, Y. et al., “MIMO Link Design Strategy for Wireless Data Center Applications,” IEEE Wireless Communications and Networking Conference: Services, Applications, and Business, 2012, 5 pages. |
Leary, Jonathan, et al., “Wireless LAN Fundamentals: Mobility,” Jan. 9, 2004, Cisco Press, 15 pages. |
Leonhardt, Ulf, “Supporting Location-Awareness in Open Distributed Systems,” May 1998, 186 pages. |
Morozov, Yury, “Blockchain Telecom: Bubbletone Blockchain,” Dec. 29, 2017, pp. 1-33. |
Network Heresy, “NVGRE, VXLAN and What Microsoft is Doing Right,” Oct. 3, 2011, 5 pages. |
Norwegian National Security Authority, “N-03 Security guidance for switches and routers,” Sep. 26, 2012, pp. 1-24. |
Saraiva de Sousa, Nathan F., et al., “Network Service Orchestration: A Survey,” IEEE Communications Surveys & Tutorials, Mar. 23, 2018, pp. 1-30. |
Savvides, Andreas, et al., “Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors”, Proceeding MobiCom '01 Proceedings of the 7th annual international conference on Mobile computing and networking, Jul. 2001, pp. 166-179. |
Shwetha, D., et al.,“ a Bandwidth Request Mechanism for QoS Enhancement in Mobile WiMAX Networks,” International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering, vol. 3, Issue 1, Jan. 2014, pp. 1-8. |
Sun, et al., “The future of Wi-Fi,” IEEE Communications Magazine, vol. 52, No. 11, Nov. 21, 2014, 166 pages. |
Ventre, Pier Luigi, et al., “Performance Evaluation and Tuning of Virtual Infrastructure Managers for (Micro) Virtual Network Functions,” ieee.org, Nov. 7-10, 2016, pp. 1-7. |
Wright, Joshua, “Detecting Wireless LAN MAC Address Spoofing,” Jan. 21, 2003, pp. 1-20. |
Zickau, Sebastian, et al., “Enabling Location-based Policies in a Healthcare Cloud Computing Environment,” 2014 IEEE 3rd International Conference on Cloud Networking (Cloudnet), Oct. 2014, pp. 353-358. |
Abdulqadder, Ihsan H., et al, “Deployment of Robust Security Scheme in SDN Based 5G Network Over NFV Enabled Cloud Environment,” IEEE, 2018, pp. 1-12. |
“Blockchain @ Telco: How blockchain can impact the telecommunications industry and its relevance to the C-Suite,” Monitor Deloitte, Jun. 20, 2018, 13 pages. |
Kaloxylos, Alexandros, “A Survey and an Analysis of Network Slicing in 5G Networks,” IEEE Communications Standards Magazine, Mar. 2018, pp. 60-65. |
Leukert, Bernd, et al., “IoT 2020: Smart and secure IoT platform,” International Electrotechnical Commission, Oct. 11 2016, 181 pages. |
Lin, Jun, et al., “Using blockchain to build trusted LoRaWAN sharing server,” Emeraldinsight.com, Sep. 7, 2017, pp. 1-15. |
Moinet, Axel, et al., “Blockchain based trust & authentication for decentralized sensor networks,” Jun. 6, 2017, 6 pages. |
Yang, Hui, et al., “Blockchain-based trusted authentication in cloud radio over fiber network for 5g,” Optical Communications and Networks (ICOCN), 2017 16th International Conference on IEEE, 2017, 3 pages. |
International Search Report and Written Opinion from the International Searching Authority, dated Jul. 31, 2019, 12 pages, for corresponding International Patent Application No. PCT/US2019/035146. |
Alvarenga, Igor D., et al., “Securing Configuration Management and Migration of Virtual Network Functions Using Blockchain,” Apr. 23, 2018, pp. 1-9. |
Number | Date | Country | |
---|---|---|---|
20190379544 A1 | Dec 2019 | US |
Number | Date | Country | |
---|---|---|---|
62682778 | Jun 2018 | US |