In order to satisfy the needs and demands of users of mobile communication devices, providers of wireless communication services continue to improve available services. One aspect of such improvements includes the ability to provide wireless communication services to a wide range of mobile devices. One enhancement made possible through new broadband cellular networks is the ability to service Internet-of-Things (IoT). Such devices consume little power, and are typically not used for voice communications. Although each IoT device that is attached to a network must have a network identifier, if the IoT is not designed for voice communication, the IoT has no need to have a telephone number associated with the device.
The following detailed description refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
In implementations described herein, some mobile devices (e.g., some user equipment (UE) devices) may not each have a Mobile Station International Subscriber Directory Number (MSISDN) (e.g., a telephone number). For example, some devices not used for person-to-person voice communication may not need a telephone number (e.g., a motion sensor), but just a network identifier for digital, wireless communication. If such a device is at a foreign network, the foreign network may be unable to handle or provide communication services to the device. To allow such a device to freely roam into the foreign network and to let the foreign network provide communication services to the device, the home network may provision a temporary MSISDN to the device.
In
UE device 102 may include a wireless communication device that includes a Subscriber Identity module (SIM) whose contents may be updated over-the-air (OTA). Examples of a UE device 102 that has or adapted to have a SIM card include: a smart phone; a tablet device; a wearable computer device (e.g., a smart watch); a global positioning system (GPS) device; a laptop computer; a media playing device; a portable gaming system; and an Internet-of-Thing (IoT) device. In some implementations, UE device 102 may correspond to a wireless Machine-Type-Communication (MTC) device that communicates with other devices over a machine-to-machine (M2M) interface, such as Long-Term-Evolution for Machines (LTE-M) or Category M1 (CAT-M1) devices and Narrow Band (NB)-IoT devices. UE device 102 may send packets over or to other devices in or over provider network 104-1.
In the implementation shown, the SIM card (also referred to herein as embedded SIM, embedded Universal Integrated Circuit Card (eUICC), or simply SIM) in UE device 102 includes one or more External Identifiers (IDs) but not an MSISDN. The External ID identifies a subscription associated with an International Mobile Subscription Identifier (IMSI) stored in the SIM. An External ID and MSISDN are described in greater detail with reference to
Because many provider networks cannot handle or service UE devices that do not have an MSISDN, for UE device 102 to freely roam in visiting networks, UE device 102 needs to acquire an MSISDN from provider network 104-1. Accordingly, when UE device 102 wants to roam, UE device 102 establishes a connection to its home provider network 104-1 that is capable of handling MSISDN-less devices. At this point, UE device 102 requests a MSISDN-leasing service from provider network 104-1. More specifically, an MSISDN renting program on UE device 102 transmits the External ID of UE device 102 to network 104-1 and obtains a temporary MSISDN. Once a MSISDN has been assigned and written into its SIM, UE device 102 is then free to roam to another network that may be incapable of handling MSISDN-less devices. When UE device 102 returns to its home network 104-1, UE device 102 may release the temporary MSISDN, allowing provider network 104-1 to recycle the MSISDN.
Access network 204 may allow UE device 102 to connect to core network 206. To do so, access network 204 may establish and maintain, with participation from UE device 102, an over-the-air channel with UE device 102; and maintain backhaul channels with core network 206. Access network 204 may convey information through these channels, from UE device 102 to core network 206 and vice versa.
Access network 104 may include a Long-term Evolution (LTE) radio network and/or a Fifth Generation (5G) radio network or other advanced radio network. These radio networks may include many wireless stations, one of which is illustrated in
Core network 206 may include a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), an optical network, a cable television network, a satellite network, a wireless network (e.g., a CDMA network, a general packet radio service (GPRS) network, an LTE network (e.g., a 4G network), a 5G network, an ad hoc network, a telephone network (e.g., the Public Switched Telephone Network (PSTN), an intranet, or a combination of networks. Core network 206 may allow the delivery of Internet Protocol (IP) services to UE device 102, and may interface with other networks, such as external network 208.
Depending on the implementation, core network 206 may include 4G core network components (e.g., a Serving Gateway (SGW), a Packet data network Gateway (PGW), a Mobility Management Entity (MME), etc.), 5G core network components (e.g., a User Plane Function (UPF), an Application Function (AF), an Access and Mobility Function (AMF), a Session Management Function (SMF), a Unified Data Management (UDM) function, a Network Slice Selection Function (NSSF), a Policy Control Function (PCF), etc.), or another type of core network components.
In addition to some of the above-mentioned functional components, core network 206 may also include a Device Roaming State Server (DRSS) and a SIM-OTA. One of the reasons for implementing the DRSS is to allow a UE device 102 (serviced by provider network 104-1) that has an External ID but not an MSISDN to roam into a foreign network 104-2 that cannot handle MSISDN-less devices. The SIM-OTA provides over-the-air updates to SIM cards in UE devices 102.
In an exemplary embodiment, the DRSS allocates a temporary MSISDN from its pool of MSISDNs in exchange for an External ID, for the UE device 102. The DRSS then instructs the SIM-OTA to update the UE device 102's SIM with the temporary MSISDN. The DRSS is described below in greater detail with reference to
External network 208 may include networks that are external to core network 206. In some implementations, external network 208 may include packet data networks, such as an Internet Protocol (IP) network. An IP network may include, for example, an IP Multimedia Subsystem (IMS) network that may provide a Short Messaging Service (SMS), Voice-over-IP (VoIP) service, etc. In some implementations, external network 208, rather than core network 206, include a DRSS and/or a SIM-OTA.
Processor 302 may include a processor, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), programmable logic device, chipset, application specific instruction-set processor (ASIP), system-on-chip (SoC), central processing unit (CPU) (e.g., one or multiple cores), microcontrollers, and/or other processing logic (e.g., embedded devices) capable of controlling device 200 and/or executing programs/instructions.
Memory/storage 304 may include static memory, such as read only memory (ROM), and/or dynamic memory, such as random access memory (RAM), or onboard cache, for storing data and machine-readable instructions (e.g., programs, scripts, etc.).
Memory/storage 304 may also include a floppy disk, CD ROM, CD read/write (R/W) disk, optical disk, magnetic disk, solid state disk, holographic versatile disk (HVD), digital versatile disk (DVD), and/or flash memory, as well as other types of storage device (e.g., Micro-Electromechanical system (MEMS)-based storage medium) for storing data and/or machine-readable instructions (e.g., a program, script, etc.). Memory/storage 304 may be external to and/or removable from network device 200. Memory/storage 304 may include, for example, a Universal Serial Bus (USB) memory stick, a dongle, a hard disk, off-line storage, a Blu-Ray® disk (BD), etc. Memory/storage 304 may also include devices that can function both as a RAM-like component or persistent storage, such as Intel® Optane memories.
Depending on the context, the term “memory,” “storage,” “storage device,” “storage unit,” and/or “medium” may be used interchangeably. For example, a “computer-readable storage device” or “computer-readable medium” may refer to both a memory and/or storage device.
Input component 306 and output component 308 may receive input from a user and provide output to a user. Input/output components 306 and 308 may include, for example, a display screen, a keyboard, a mouse, a speaker, a microphone, a camera, a DVD reader, USB lines, and/or other types of components.
Network interface 310 may include a transceiver (e.g., a transmitter and a receiver) for network device 300 to communicate with other devices and/or systems. For example, via network interface 310, network device 300 may communicate over a network, such as the Internet, an intranet, a terrestrial wireless network (e.g., a WLAN, WiFi, WiMax, etc.), a satellite-based network, optical network, etc. Network interface 310 may include a modem, an Ethernet interface to a LAN, and/or an interface/connection for connecting device 300 to other devices (e.g., a Bluetooth interface).
Communication path 312 may provide an interface (e.g., a bus) through which components of device 300 can communicate with one another.
In some implementations, network device 300 may perform the operations described herein in response to processor 302 executing software instructions stored in a non-transient computer-readable medium, such as memory/storage 304. The software instructions may be read into memory/storage 304 from another computer-readable medium or from another device via network interface 310. The software instructions stored in memory/storage 304, when executed by processor 302, may cause processor 302 to perform processes that are described herein. In other implementations, the instructions may be hard coded. For example, when network device 300 is implemented as a DRSS device, the DRSS device may execute software instructions to lease temporary MSISDNs to UE devices 102 in exchange for their External IDs. In another example, when network device 300 is implemented as a UE device 102, UE device 102 may run software instructions to request a temporary MSISDN from provider network 104-1.
MME 402 may provide control plane processing for core network 206. For example, MME 402 may implement tracking and paging procedures for UE device 102, may activate and deactivate bearers for UE device 102, may authenticate a user of UE device 102, and may interface to non-LTE radio access networks. A bearer may represent a logical channel with particular quality of service (QoS) requirements. MME 402 may also select a particular SGW 404 for a UE device 102. An MME 402 may interface with other MMES 402 in core network 206 and may send and receive information associated with UE devices 102, which may allow one MME 402 to take over control plane processing of UE devices 102 serviced by another MME 402, if the other MME 402 becomes unavailable. During the authentication of UE device 102 at MME 402, MME 402 may route messages to HSS 406 during authentication for verifying or validating UE device 102's identity.
MME 402 may communicate with other core network components to create and manage a new session for a UE device 102, for example, when the UE device 102 attaches to core network 206, when bearers need to be added or modified for an existing session for the UE device 102, when a connection to a new PGW 410 needs to be created, or during a handover procedure (e.g., when the UE device 102 needs to switch to a different SGW 404).
SGW 404 may provide an access point to UE device 102, handle forwarding of data packets for UE device 102, perform transport level markings (e.g., QCI), and act as a local anchor point during handover procedures between wireless stations (e.g., eNB). In addition, SGW 404 may forward messages between MME 402 and PGW 410. For example, when SGW 404 receives a message from MME 402 indicating that UE device 102 is unavailable to accommodate a request to change its bearer, SGW 404 may forward the message to PGW 410.
HSS 406 may provide user subscription, registration, and profile information to other components in network 104-1, and store such information, locally or at other network components (e.g., AAA). In one implementation, HSS 406 may store and/or access authentication information at the AAA. When MME 402 routs requests for authentication to HSS 406 from another network component, HSS 406 may access the AAA to retrieve user credentials and provide them to MME 402. In one implementation, HSS 406 may perform authentication on and/or other functions upon receipt of requests from DRSS 408.
HSS 406 may also receive requests from DRSS 408 to update subscription information associated a particular IMSI and UE device 102. The update may include writing a temporary MSISDN assigned to the UE device 102 and its External ID to the user profile or account. Once the update is complete, HSS 406 may receive requests from other network components regarding the UE device 102 and the MSISDN.
DRSS 408 may receive a requests for authentication and/or to lease a temporary MSISDN, from UE device 102. The request may provide an External ID associated with the UE device 102 that needs the MSISDN, a time interval for which the UE device 102 needs the MSISDN (or the time when the MSISDN lease should expire), and an IMSI. In some instances, when the request does not indicate for how long the MSISDN is to be leased, DRSS 408 may itself supply a default value.
When DRSS 408 receives an MSISDN request that includes an External ID associated with the UE device 102, DRSS 408 may request HSS 406 to authenticate UE device 102. If the authentication results in successful validation of UE device 102, DRSS 408 selects an MSISDN from its list of MSISDNs and removes the selected MSISDN from the list. In addition, DRSS 408 records, in its database, the External ID of the UE device 102 to which the MSISDN is leased and the IMSI of the UE device 102. If possible, DRSS 408 may also indicate how long the MSISDN is to be leased. The time information may be used, for example, to terminate the lease when the lease expires.
Upon selecting the temporary MSISDN for UE device 102, DRSS 408 may request HSS 406 to update the account or a profile associated with the UE device 102, with the temporary MSISDN and the External ID. When the update is complete, DRSS 408 instructs SIM-OTA 409 to send the selected MSISDN to the SIM of the UE device 102 and cause SIM to store the MSISDN.
DRSS 408 may also receive a request from UE device 102 that it has finished roaming and that it wants to return the leased MSISDN to DRSS 408. When DRSS 408 receives the notification, DRSS 408 may perform another authentication of UE device 102 at HSS 406. If the authentication validates the identity of the UE device 102, DRSS 408 requests SIM-OTA 409 to remove the MSISDN from the SIM in UE device 102. In addition, DRSS 408 may schedule the MSISDN to be returned to its pool of MSISDNs and request HSS 406 to perform any updates or cleanup activities on any records associated with the UE device 102 (e.g., remove the MSISDN from the records associated with the UE device).
When DRSS 408 terminates the lease of the MSISDN, depending on the implementation, DRSS 408 may use different procedures to recycle the MSISDN. For example, rather than immediately returning the MSISDN to its pool of free MSISDNs, in one implementation, DRSS 408 may maintain the status of the MSISDN as unavailable to be leased to other UE devices 102. In this scheme, DRSS 408 may continue to lease other MSISDNs from its pool until the pool is almost exhausted—only then does DRSS 408 attempt to return the MSISDN to the pool. Consequently, DRSS 408, HSS 406, and other network components also retain records accrued to the MSISDN, and provider network 104-1 can implements network policies that allow UE device 102 to continue to roam for an extended time after the expiry of temporary MSISDN.
In a different implementation, DRSS 408 may keep a table of MSISDNs that have been leased in the past. That is, for each of the MSISDNs, DRSS 408 may retain information about its past leases. Such information may include, for example, when a particular MSISDN was leased, to what UE devices 102 the MSISDN was leased, what networks UE devices 102 visited, and for how long the MSISDN was leased for each of the UE devices 102. Such information may later be used to determine UE device 102's roaming pattern. In addition, such information may be used to select a particular MSISDN for a UE device 102 (e.g., to support optimized MSISDN leases).
In the above MSISDN recycling schemes, DRSS 408 and other network components may delay the deletion of records associated with the expired MSISDN. Accordingly, other network components, such as HSS 406, may also delay the removal of information associated with the leased MSISDN. The delay between the MSISDN expiry and the removal of the records may provide the provider network 104-1 and visiting network 104-2 with a sufficient time to settle transactions. For example, if an MSISDN lease terminates while UE device 102 is still roaming, provider network 104-1 and visiting network 104-2 may use such delays to settle charges. If provider network 104-1 immediately deleted all records associated with the leased MSISDN upon its expiry, provider network 104-1 may be unable to properly charge UE device 102 for the service fees accrued at network 104-2, if the charges incurred at visiting network 104-2 are forwarded to provider network 104-1 long after the MSISDN expiry.
Referring to
PGW 410 may function as a gateway to external network 208. In addition, when UE device 102 attaches to provider network 104-1, PGW 410 may allocate an IP address for UE device 102. Additionally, when PGW 410 receives a message from a Policy and Charge Rules Function (PCRF) to modify Quality-of-Service (QoS) for UE device 102, PGW 410 may dispatch a message to MME 402 (via SGW 404) to change the bearer for UE device 102.
In both
External ID field 504 may store an External ID. An External ID typically has two components: a username and a domain (e.g., “Jane.Donut@donutmaker.com”). MSISDN field 506 may include an MSISDN selected from DRSS 408's pool of MSISDNs that may be leased. An MSISDN identifies a specific subscription. An example of MSISDN includes a telephone number, Mobile Directory Number, etc. In an exemplary implementation, an MSISDN may include a country code, a local number, and a subscriber number. When DRSS 408 selects an MSISDN from its MSISDN pool, it removes the selected MSISDN from the pool and records the MSISDN in the MSISDN field 506.
Timestamp field 508 may indicate the time at which the MSISDN in MSISDN field 506 is leased. Expiration time field 510 may indicate the time at which the leased MSIDN may expire or a duration of the time for which MSISDN is leased. IMSI field 512 may include the International Mobile Subscriber Identity.
As shown, process 600 may include UE device 102 detecting a visiting network or its new roaming state (block 602; block 702). When UE device 102 detects network 104-2, UE device 102 may perform its initial attach process, including required authentication at network 104-2. After the completion of the process, UE device 102 may send, via visiting network 104-2, a request for a temporary MSISDN to DRSS 408 in network 104-1 (block 604; signal 704). The request may include the External ID of UE device 102, the IMSI associated with the UE device 102, and a possible expiration time.
When DRSS 408 in network 104-1 receives the request from UE device 102 attached to visiting network 104-2, DRSS 408 may authenticate and/or register UE device 102 at HSS 406 in network 104-1 (block 606: signal 706). If the authentication is not successful (block 608: NO), DRSS 408 may notify the UE device 102 of the authentication failure (block 610).
If HSS 406 is able to validate the identity of UE device 102 (block 608: YES), however, DRSS 408 may select a temporary MSISDN from its pool of MSISDNs that may be leased to UE devices 102 (block 612). DRSS 408 may then assign the selected MSISDN to UE device 102 (block 708). The assignment may entail creating a record 502 in table 500 in the database of DRSS 408. The record 502 may include the selected MSISDN, the External ID of UE device 102, the timestamp associated with the MSISDN selection, and the IMSI of UE device 102. In some implementations, the record may also indicate when the MSISDN is to expire (i.e., expiration time).
Process 600 may further include DRSS 408 requesting HSS 406 to update the user account or profile for the UE device 102, to reflect the MSISDN lease (block 614: signal 710) and requesting SIM-OTA 409 to update the SIM in UE device 102 with the assigned MSISDN (block 616; signal 712). In response to the request, SIM-OTA 409 may then forward the MSISDN to UE device 102 and cause the SIM in UE device 102 to store the MSISDN (block 618; block 714). After the MSISDN has been leased to UE device 102, UE device 102 may roam in network 104-2 and receive their network services.
As shown, process 650 may include UE device 102 detecting home network 104-1 (block 652; block 722). When UE device 102 detects network 104-1, UE device 102 may perform its attach process, including authentication at its home network 104-1. After the completion of the process, UE device 102 may send a request to return the MSISDN to DRSS 408 in network 104-1 (block 654; signal 724). The request may include the MSISDN of UE device 102 and the IMSI of UE device 102. In some implementations, the request may also include the possible expiration time and/or the External ID.
When DRSS 408 in network 104-1 receives the request from UE device 102, DRSS 408 may authenticate UE device 102 at HSS 406 in network 104-1 (block 656: signal 726). If the authentication is not successful (block 658: NO), DRSS 408 may notify the UE device 102 of the authentication failure (block 660).
If HSS 406 is able to validate the identity of UE device 102 (block 658: YES), however, DRSS 408 may then un-assign the MSISDN (block 562; block 728). The un-assignment may include removing or marking the record 502, in table 500 in the database of DRSS 408, that was created during the assignment—during process 600. As indicated above, in some implementations, DRSS 408 may not remove the record 502, but indicate that the MSISDN is no longer leased to UE device 102. DRSS 408 may also place the MSISDN in a waiting queue for its eventual return to its pool of MSISDNs that may be leased to UE devices 102.
Process 600 may further include DRSS 408 requesting HSS 406 to update the user account or its profile for the UE device 102, to reflect the release of the ISISDN (or the un-assignment) (block 664: signal 730) and requesting SIM-OTA 409 to update the SIM in UE device 102, such that the SIM no longer includes the MSISDN (block 666; signal 732). In response to the request, SIM-OTA 409 may then update the SIM in UE device 102, to erase/delete the MSISDN in the SIM in UE device 102 (block 668; block 734). After the MSISDN has been released, UE device 102 may no longer be able to receive services from network 104-2 when UE device 102 is in the coverage area of network 104-2.
In this specification, various preferred embodiments have been described with references to the accompanying drawings. It will be evident that modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded in an illustrative rather than restrictive sense.
In the above, while a series of blocks have been described with regard to the processes illustrated in
It will be apparent that aspects described herein may be implemented in many different forms of software, firmware, and hardware in the implementations illustrated in the figures. The actual software code or specialized control hardware used to implement aspects does not limit the invention. Thus, the operation and behavior of the aspects were described without reference to the specific software code—it being understood that software and control hardware can be designed to implement the aspects based on the description herein.
Further, certain portions of the implementations have been described as “logic” that performs one or more functions. This logic may include hardware, such as a processor, a microprocessor, an application specific integrated circuit, or a field programmable gate array, software, or a combination of hardware and software.
To the extent the aforementioned embodiments collect, store, or employ personal information of individuals, it should be understood that such information shall be collected, stored, and used in accordance with all applicable laws concerning protection of personal information. Additionally, the collection, storage, and use of such information can be subject to consent of the individual to such activity, for example, through well known “opt-in” or “opt-out” processes as can be appropriate for the situation and type of information. Storage and use of personal information can be in an appropriately secure manner reflective of the type of information, for example, through various encryption and anonymization techniques for particularly sensitive information.
No element, block, or instruction used in the present application should be construed as essential to the implementations described herein unless explicitly described as such. As used herein, the articles “a,” “an,” and “the” are intended to include one or more items. The phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise.