The present disclosure relates to a communication system. The disclosure has particular but not exclusive relevance to wireless communication systems and devices thereof operating according to the 3rd Generation Partnership Project (3GPP) standards or equivalents or derivatives thereof. The disclosure has particular although not exclusive relevance to charging and policies for user equipment/user identities in the so-called ‘5G’ (or ‘Next Generation’) systems.
3GPP 3rd Generation Partnership Project
5GC 5th Generation Core Network
5GS 5th Generation System
AF Application Function
AM Policy Access and Mobility Management
AMF Access and Mobility Management Function
API Application Programming Interfaces
CDR Charging Data Record
CHF Charging Function
DNN Data Network Name
EPS Evolved Packet System
GPRS General Packet Radio Services
GTP-C GPRS Tunneling Protocol
HOL Head of Line
H-PCF Home Policy Control Function
HTTPS Hyper Text Transfer Protocol Secure
MNO Mobile Network Operator
NEF Network Exposure Function
NF Network Function
NRF Network Repository Function
PCC Policy and Charging Control
PCF Policy Control Function
PDU Protocol Data Unit
QoS Quality-of-Service
QUIC Quick UDP Internet Connections
REST Representational State Transfer
SDL Shared Data Layer
SLA Service level agreement
SM Session Management
SMF Session Management Function
S-NSSAI Single Network Slice Selection Assistance Information
SUPI Subscription Permanent Identifier
TCP Transport Control Protocol
TLS Transport Layer Security
TTI Transmission Time Interval
UDM Unified Data Management
UDR Unified Data Repository
UPF User Plane Function
UE User Equipment
UICC Universal Integrated Circuit Card
(U)SIM Universal Subscriber Identity Module
V-PCF Visited Policy Control Function
VPLMN Visited Public Land Mobile Network
For the purposes of the present document, the terms and definitions given in 3GPP Technical Report (TR) 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in 3GPP TR 21.905 [1].
User: As defined in 3GPP TR 21.905 [1]: An entity, not part of the 3GPP System, which uses 3GPP System services. Example: a person using a 3GPP System mobile station as a portable telephone.
user identity: information representing a user in a specific context. A user can have several user identities, e.g. a User Identity in the context of his profession, or a private User Identity for some aspects of private life, see 3GPP TR 22.904[5].
user identifier: a piece of information used to identify one specific User Identity in one or more systems, see 3GPP TR 22.904[5].
user identity profile: A collection of information associated with the User Identities of a user, see 3GPP TR 22.904[5].
It is important that the 5G system (5GS) allows for creation and utilization of user-specific identities in order to provide enhanced user experience, optimized performance and offer services to devices and users that are not part of the operator's 3GPP network. There are multiple scenarios where user-specific identities are applicable and required to be supported by the 5G system. For example, there are some scenarios where one or more users (i.e. humans) share one UE, and one or more users (i.e. devices) are behind one gateway UE and one or more users (i.e. gaming applications) are running on the same UE and each are treated as a different user. These are further discussed in details in [5].
Currently 5GS enables charging on per subscription basis with respective UE ID. However, for the above mentioned example use cases, there is no way for the 5G system e.g. the PCF, the SMF, the UPF, the CHF to create, report, manage and/or provide policies and charging information corresponding to different Users sharing this particular UE i.e. policies and charging enabler, to the granularity of individual user identifier(s).
According to an aspect of the present disclosure, network function node in a core network, includes: means for receiving, from User Equipment, UE, a non access stratum, NAS, message including identity information for the UE, and a plurality of user identity information, each of which includes a user identifier for a user that uses the UE; and means for sending, to a policy control and charging function node in the core network, the plurality of the user identity information for creating a Policy and Charging Control, PCC, rule based on the plurality of the user identity information.
According to another aspect of the present disclosure, a policy control and charging function node in a core network, includes: means for receiving, from a network function node in the core network, a plurality of a user identity information, each of which includes a user identifier for a user that uses user equipment, UE; means for creating a Policy and Charging Control, PCC, rule based on the plurality of the user identity information; and means for sending, to the network function node, the PCC rule.
According to another aspect of the present disclosure, a method for a network function node in a core network, the method includes: receiving, from User Equipment, UE, a non access stratum, NAS, message including identity information for the UE, and a plurality of user identity information, each of which includes a user identifier for a user that uses the UE; and sending, to a policy control and charging function node in the core network, the plurality of the user identity information for creating a Policy and Charging Control, PCC, rule based on the plurality of the user identity information.
According to another aspect of the present disclosure, a method for a policy control and charging function node in a core network, the method includes: receiving, from a network function node in the core network, a plurality of a user identity information, each of which includes a user identifier for a user that uses user equipment, UE; creating a Policy and Charging Control, PCC, rule based on the plurality of the user identity information; and sending, to the network function node, the PCC rule.
Example Aspect 1: Multi-User SM Policy Association Establishment for Cases where Multiple Users per UE are Involved
This example aspect discloses the following new functions when a UE 1 sends the PDU Session Establishment Request message with user identifier(s) to the AMF 2.
Step 1: The UE 1 sends the PDU Session Establishment Request message to the AMF 2 with user identifier(s) which represent the users of UE 1 (e.g. User ID1 and User ID2).
Step 2: Step 1 to step 7a from section 4.3.2.2.1 of TS 23.502 [3] take place for UE Requested PDU Session Establishment. The AMF 2 sends the Nsmf_PDUSession_CreateSMContext Request to the SMF 3 where the AMF 2 includes the user identifier(s) for which the PDU Session is to be established. When the SMF 3 retrieves the Session Management Subscription data that has an indication whether the PDU session being established needs per user PCC policy (e.g. per User ID1 or User ID2 represented by their user identifier(s)) or not. i.e., the UDM 5 manages the new Session Management Subscription data per PDU session and per UE 1 indicating whether the UE 1 needs per user PCC policy or not. If it is needed, then the PCC rule can be assigned per user basis (e.g. per User ID1 or per User ID2 represented by their user identifier(s)) and this make it possible to (1) perform PCC authorization per user basis, (2) apply PCC policy per user basis so that QoS control per user (e.g. User ID1 or User ID2 represented by their user identifier(s)) would be possible, and (3) generate a CDR based on the PCC rule per user.
Step 3: In scenarios when the SMF 3 receives PDU session create request with one or more user identifier(s), the SMF 3 determines that the PCC authorization is required, and thus requests to establish an SM Policy Association with the PCF 4. The PCF 4 can be chosen by the SMF 3 taking into account the user identifier(s) received in the PDU Session Establishment Request message from the UE 1.
Step 4: The SMF 3 sends to the PCF 4 a Npcf_SMPolicyControl_Create message including new/additional parameters such as user identifier(s), PDU session ID, DNN, App ID, and/or S-NSSAI. These parameters indicate to the PCF 4 that SM policy creation is required for the session with the provided PDU session ID associated with User(s) (i.e. user identifier(s)).
Step 5: If the PCF 4 does not have policy related subscriber information, the PCF 4 sends the Nudr_DM_Query request message to the UDM 5 including the user identifier(s).
Step 6: The UDM 5 sends the Nudr_DM_Query response message to the PCF 4 including Policy Data specific to the user identifier(s). The UDM 5 can provide this information as the UDM 5 manages Policy Data per combination of the SUPI (i.e. UE ID) and the user identifier(s) in addition to the Policy Data per SUPI.
Step 7: The PCF 4 sends the Nchf_SpendingLimitControl_Subscribe Request message to the CHF 6 to invoke an Initial or intermediate Spending Limit Report Retrieval including the SUPI and the user identifier(s).
Step 8: The CHF 6 sends the Nchf_SpendingLimitControl_Subscribe Response message to the PCF 4 with Status of the requested subscribed policy counters for the user (i.e., user identifier) and the SUPI (i.e., subscriber) combination in the Event Information, Pending policy counter statuses and their activation times, for all policy counter(s) available for the user (i.e., user identifier) and SUPI (i.e., subscriber) combination. The CHF 6 can provide this information as the CHF 6 manages Spending Limit Report related information per combination of the SUPI and the user identifier in addition to the Spending Limit Report related information per SUPI.
Step 9: PCC authorization and policy decision take place in the PCF 4 based on received parameters from the SMF 3/UDM 5/CHF 6. The PCC authorization may fail when a validation condition is not satisfied.
Step 10: The PCF 4 sends the Npcf_SMPolicyControl_Create response message to the SMF 3. If the PCC authorization failed in the PCF 4 due to an invalidity specific to the user, then Npcf_SMPolicyControl_Create response message includes a cause value indicating that “PCC authorization specific to user failed”.
Step 11: Based on received feedback from the PCF 4 in the Npcf_SMPolicyControl_Create Response message, the SMF 3 sends the PDU Session Accept message to the UE 1 including Authorized QoS rules valid exclusively for user identifier(s)). On the other hand, if the SMF 3 receives the cause value indicating that “PCC authorization specific to user failed”, the SMF 3 sends the PDU Session Reject message with a SM cause value “PCC authorization specific to user failed”. If the UE 1 receives the PDU Session Reject message with the SM cause value “PCC authorization specific to user failed” from the SMF 3, the UE 1 shall apply this failure only to this user identifier. i.e., this failure does not affect any other user identifier(s).
Example Aspect 2: AM Policy Association Establishment in Order to Enable Policies and Charging where Multiple Users per UE are Involved
This example aspect discloses the following new functions when AM Policy Association is established between the AMF 2 and the (V-)PCF 41.
The
Step 0: The AMF 2 may initiate the AM Policy Association Establishment procedure by one of the following triggers:
Step 1: The AMF 2 decides to establish AM Policy Association with the (V-)PCF 41 where multiple Users per UE 1 (e.g. user identifier(s)) are involved.
Step 2: The AMF 2 sends the Npcf_AMPolicyControl_Create request message to the (V-) PCF 41 with user identifier(s), DNN, App ID, S-NSSAI.
Step 3: The (V-)PCF 41 to apply operator policies for the UE 1 with received user identifier(s).
Step 4: The (V-)PCF 41 sends the Npcf_AMPolicyControl_Create response message specific to the user identifier(s) to the AMF 2.
Step 5: Based on the received Npcf_AMPolicyControl_Create response message specific to the user identifier(s) from the (V-)PCF 41, along with other information, the AMF 2 deploys access and mobility control policy specific to the user identifier(s).
Example Aspect 3: Multi-User UE Policy Association Establishment
This example aspect discloses the following new function to the Multi-User UE Policy Association Establishment.
The
Step 0: One or more user(s) associated with the UE 1 with e.g. User ID 1, User ID 2 (represented by their user identifier(s)) register to 5GS.
Step 1: The AMF 2 decides to establish policy association e.g. based on a UE Policy Container received from the roaming-in UE 1 in the VPLMN.
Step 2: The AMF 2 sends to the V-PCF 41 the Npcf_UEPolicyControl_Create Request message with user identifier(s), DNN, App ID, S-NSSAI as additional parameters.
Step 3: The V-PCF 41 forwards the Npcf_UEPolicyControl_Create Request message that is received from the AMF 2 in step 2 to the H-PCF 42.
Step 4: The H-PCF 42 updates the UE Policy Association related data per user (i.e. user identifier) basis and sends the Npcf_UEPolicyControl_Create Response (UE ID, PDU session policy & PCC rule information specific to user identifier(s)) message to the V-PCF 41 with PDU session policy & PCC rule information specific to user identifier(s).
Step 5: The V-PCF 41 updates the Policy Control Request Trigger parameters in the V-PCF 41 and forwards the Npcf_UEPolicyControl_Create Response (UE ID, PDU session policy & PCC rule information specific to user identifier(s)) message to the AMF 2 including the Npcf_UEPolicyControl_Create Response (UE ID, PDU session policy & PCC rule information specific to user identifier(s)).
Step 6: The AMF 2 deploys the Access and Mobility policy (AM policy).
Example Aspect 4: Multi-User Charging with AF Influence in Order to Enable Policies and Charging where Multiple Users per UE are Involved
This example aspect discloses the following new function to the Multi-User Charging with the AF 8 influence in order to enable policies and charging where multiple Users per UE 1 are involved.
Step 0: In this scenario, it is assumed that the CHF 6 has been subscribed to User ID (e.g. user identifier(s)) based policies and uses reporting service provided by the SMF 3.
Step 1: The AF 8 sends to the PCF 4 the Nnef_ChargeableParty_Create request message, and additionally includes user identifier(s), DNN, App ID, thus becoming chargeable party for the session.
Step 2: The PCF 4 forwards the received request with corresponding parameters to the SMF 3.
Step 3: The SMF 3 sends a N4 Session Modification Request message with the User ID based (e.g. per user identifier) policies and uses reporting to the UPF 7 where Usage Reporting is configured, thus modifying the Usage Reporting Rules so that the usage collection for charging indicates the User ID (e.g. user identifier), etc.
Step 4: The UPF 7 sends a N4 Session Modification Response message to the SMF 3.
Step 5: The SMF 3 sends the Nchf_Notify message with the User ID (e.g. user identifier) specific charging report to the CHF 6 as the CHF 6 has subscribed to this service.
Beneficially, the above described example aspects include, although they are not limited to, one or more of the following functionalities:
In order to provide these functionalities, the above example aspects describe exemplary methods comprising (at least some of) the following steps:
Benefits
Currently 5GS enables charging on per subscription basis with respective UE ID, and there is no way for 5G systems (PCF, SMF, UPF, AF, CHF) to create, report, manage and/or provide policies and charging information corresponding to different Users sharing this particular UE i.e. policies and charging enabler, to the granularity of individual user identifier(s). The present disclosure proposes example aspects that enable charging and policing for use cases of multiple user identities per UE.
System Overview
In this network, users of mobile devices 1 (UEs) can communicate with each other and other users via respective base stations 9 and a core network 10 using an appropriate 3GPP radio access technology (RAT), for example, an E-UTRA and/or 5G RAT. It will be appreciated that a number of base stations 9 form a (radio) access network or (R)AN. As those skilled in the art will appreciate, whilst one mobile device 1 and one base station 9 are shown in
Each base station 9 controls one or more associated cells (either directly or via other nodes such as home base stations, relays, remote radio heads, distributed units, and/or the like). A base station 9 that supports E-UTRA/4G protocols may be referred to as an ‘eNB’ and a base station 9 that supports Next Generation/5G protocols may be referred to as a ‘gNBs’. It will be appreciated that some base stations 9 may be configured to support both 4G and 5G, and/or any other 3GPP or non-3GPP communication protocols.
The mobile device 1 and its serving base station 9 are connected via an appropriate air interface (for example the so-called ‘Uu’ interface and/or the like). Neighbouring base stations 9 are connected to each other via an appropriate base station to base station interface (such as the so-called ‘X2’ interface, ‘Xn’ interface and/or the like). The base station 9 is also connected to the core network nodes via an appropriate interface (such as the so-called ‘S1’, ‘N2’, ‘N3’ interface, and/or the like).
The core network 10 typically includes logical nodes (or ‘functions’) for supporting communication in the telecommunication system. Typically, for example, the core network 10 of a ‘Next Generation’/5G system will include, amongst other functions, control plane functions (CPFs) and user plane functions (UPFs) 7. It will be appreciated that the core network 10 may also include, amongst others: an Access and Mobility Management Function (AMF) 2; a Session Management Function (SMF) 3; a Policy Control Function (PCF) 4; a Unified Data Management/Unified Data Repository (UDM/UDR) 5; and a Charging Function (CHF) 6.
An Application Server (AF) 8 may also be provided within the core network 10 or coupled to the core network 10. From the core network 10, connection to an external IP network 11 (such as the Internet) is also provided.
The components of this system are configured to perform one or more of the above described exemplary embodiments.
User Equipment (UE)
(R)AN Node
Core Network Node
Modifications and Alternatives
Detailed example embodiments have been described above. As those skilled in the art will appreciate, a number of modifications and alternatives can be made to the above example embodiments whilst still benefiting from the inventions embodied therein. By way of illustration only a number of these alternatives and modifications will now be described.
In the above description, the UE, the (R)AN node, and the core network node are described for ease of understanding as having a number of discrete modules (such as the communication control modules). Whilst these modules may be provided in this way for certain applications, for example where an existing system has been modified to implement the invention, in other applications, for example in systems designed with the inventive features in mind from the outset, these modules may be built into the overall operating system or code and so these modules may not be discernible as discrete entities. These modules may also be implemented in software, hardware, firmware or a mix of these.
Each controller may comprise any suitable form of processing circuitry including (but not limited to), for example: one or more hardware implemented computer processors; microprocessors; central processing units (CPUs); arithmetic logic units (ALUs); input/output (10) circuits; internal memories/caches (program and/or data); processing registers; communication buses (e.g. control, data and/or address buses); direct memory access (DMA) functions; hardware or software implemented counters, pointers and/or timers; and/or the like.
In the above embodiments, a number of software modules were described. As those skilled in the art will appreciate, the software modules may be provided in compiled or un-compiled form and may be supplied to the UE, the (R)AN node, and the core network node as a signal over a computer network, or on a recording medium. Further, the functionality performed by part or all of this software may be performed using one or more dedicated hardware circuits. However, the use of software modules is preferred as it facilitates the updating of the UE, the (R)AN node, and the core network node in order to update their functionalities.
The above embodiments are also applicable to ‘non-mobile’ or generally stationary user equipment.
Various other modifications will be apparent to those skilled in the art and will not be described in further detail here.
[1] 3GPP TR 21.905: “Vocabulary for 3GPP Specifications”. V16.0.0 (2019-06-11)
[2] 3GPP TS 23.501: “System Architecture for the 5G System; Stage 2”. V16.0.0 http://www.3gpp.org/ftp/Specs/archive/23_series/23.501/23501-f40.zip
[3] 3GPP TS 23.502: “Procedures for the 5G System; Stage 2” V16.0.0 http://www.3gpp.org/ftp/Specs/archive/23_series/23.502/23502440.zip
[4] New SID: SA2 Study item on the Usage of User Identifiers in the 5G System (FS_UU15) S2-1906717
[5] SA1 TR 22.904 Study on user centric identifiers and authentication http://www.3gpp.org/ftp/Specs/archive/22_series/22.904/22904-g10.zip
This application is based upon and claims the benefit of priority from European Patent Application No. 19208398.8, filed on Nov. 11, 2019, the disclosure of which are incorporated herein in their entirety by reference.
1 MOBILE DEVICE (UE)
2 AMF
3 SMF
4 PCF
5 UDM/UDR
6 CHF
7 UPF
8 AF
9 (R)AN node
10 core network
11 external IP network
31 TRANSCEIVER CIRCUIT
32 ANTENNA
33 USER INTERFACE
34 CONTROLLER
35 MEMORY
36 OPERATING SYSTEM
37 COMMUNICATIONS CONTROL MODULE
51 TRANSCEIVER CIRCUIT
53 ANTENNA
55 NETWORK INTERFACE
57 CONTROLLER
59 MEMORY
61 OPERATING SYSTEM
63 COMMUNICATIONS CONTROL MODULE
71 TRANSCEIVER CIRCUIT
75 NETWORK INTERFACE
77 CONTROLLER
79 MEMORY
81 OPERATING SYSTEM
83 COMMUNICATIONS CONTROL MODULE
Number | Date | Country | Kind |
---|---|---|---|
19208398.8 | Nov 2019 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2020/041535 | 11/6/2020 | WO |