Typically, current network embedded devices may be upgraded through a device management agent that may run as a separate process on an operating system (OS). In such an example, an attack on a kernel thereof such as the main OS kernel or a critical software failure in the OS may destroy the functionality of the complete system and/or the system may not be robust for security against software attacks. Additionally, systems such as a computer system like a personal computer (PC) may be upgraded through a device management agent that may run in a separate virtual machine. The virtual machine may be protected by a hypervisor. Unfortunately, such systems may not be robust for an embedded device that may be threatened by active software attacks.
Systems, methods, and/or techniques for performing device recovery using a device management agent (DMAG) on a device may be provided. The DMAG may be in secure execution environment that may be protected by a hypervisor and/or may use or include a tiny operating system that may include or have a full network stack. The DMAG or other entity on the device may receive control of the device and/or may determine or detect whether an application and/or an operating system on the device may not be in a normal service (e.g., upon or after receiving such control). The DMAG or other entity may initiate a secure session with a DMS based on the application and/or operating system not being in the normal service such that the DMS may determine whether the device may have a potential software problem. In examples, such a software problem may be that an application system may have been infected by malware that make the application stop functioning or not behaving as expected, may be that a function may stop working due to a bug after a software upgrade to the application system, and/or the like. The DMAG or other entity may set up or establish a recovery and/or upgrade session based on the device having the potential software problem (e.g., using the secure session) and/or may receive a software image to do a re-flash of the operating system and/or the application. A re-flash may include a reinstallation of the application system (e.g., including the operating system) and/or an entire or whole platform software into a state that may be known to function without bugs or with malware. In one example, the DMAG or other entity may send a re-boot request command such that the device may be re-booted (e.g., to get back into the normal service). The re-boot request command may be sent and/or the device re-booted after the re-flash (e.g., when the whole application system including the application system operating system may have been re-installed). Additionally, in examples, the application (e.g., not the whole application system) may be re-flashed and/or re-installed as described herein. In such an example, a re-boot may not be performed and/or may not occur.
In an example, an integrity of one or more of a hypervisor on the device, a tiny OS on the device, and/or the DMAG may be verified or checked during re-boot (e.g., in response to the re-boot command request and re-boot occurring). The integrity may be checked using a secure boot process and/or secure boot code. Further, a set of diagnostic commands may be received from the DMS to determine whether the application and/or operating system may be in the normal service (e.g., such that the DMAG may determine whether the device may be in the normal service). Further, in examples, a failure notification may be provided (e.g., sent or received) that may indicate a fault behavior including that the application and/or operating system may not be in the normal service. The failure notification may be registered and/or stored using the DMS in one example. Additionally, according to examples, the control of the device (e.g., execution control thereof) may be received via a handover by the device and/or the hypervisor. The handover may occur from a WatchDog timer reset such that the hypervisor and/or the device may use the WatchDog timer to force the control to the DMAG. Additionally, the application and/or the operating system on the device not being be in the normal service may be determined or detected based on the handover occurring from the WatchDog timer reset. In an example, an external network request such as an external network connection request may not be accepted or may be denied (e.g., by the DMAG) and/or an external network request may be initiated (e.g., by the DMAG) such that the request may be directed to a limited number of trusted external management entities such as the DMS.
The Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, not is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to the examples herein that may solve one or more disadvantages noted in any part of this disclosure.
A more detailed understanding of the embodiments disclosed herein may be had from the following description, given by way of example in conjunction with the accompanying drawings.
A detailed description of illustrative embodiments may now be described with reference to the various Figures. Although this description provides a detailed example of possible implementations, it should be noted that the details are intended to be exemplary and in no way limit the scope of the examples described herein.
As described herein, typically, current network embedded devices may be upgraded through a device management agent running as a separate process on an ordinary OS.
In examples, there may further be systems such as the system shown in
As such, systems and/or method may be provided herein that may improve robustness of such current systems and/or embedded devices. For example, the system and/or methods described herein may include a network embedded device management system that may be robust against fatal software failures in a main OS as well as against active attacks on that part of the system. Additionally, the system and/or methods may improve the software integrity of the hypervisor and the device management agent at boot time and/or during run time. Device management operations may be carried out by a central, more computational powerful, device management system and/or a hypervisor protected device management agent may be configured to accept control commands from such a central unit. The system may be robust against software attacks on the main OS running in the system and may have a “self-healing” mechanism to recover from critical software failures on the main OS.
From a security architecture perspective, a device or device platform may be an important part of an M2M security solution. For example, to design solutions that may work in real and practical use case scenarios, a life-cycle management perspective for a device platform may be used and/or considered.
A device oriented threat may be provided, considered, and/or used. For example, threats against the devices in the system may occur. There may also be threats against end-user units or back-end systems. In an example, the threats against end-user units or back-end systems may not be taken into account in one or more of the examples described herein. According to an example, with the respect to attacks against the devices, the systems and/or methods herein may take into account network based attacks, software based attacks against the device themselves, and/or the like (e.g., and may provide improved robustness and/or software integrity thereto).
High assurance security and safety embodiments or examples may be provided and/or used in one or more examples described herein. For example, high assurance security and safety embodiments or examples as described herein may be used in defense, avionics, finance sectors, and/or the like. In examples, such high assurance and safety embodiments or examples may have a number of important and fairly unique design requirements or requests. For example, design and implementation may be evaluated according to a standard such as common criteria. For methods such as common criteria to work, an evaluated target system (e.g., software and hardware) may have to be defined (e.g., the function the software may provide should be specified without dynamic features, and/or the like that may make it difficult or hard to evaluate from a security perspective) and small enough to be evaluated with reasonable efforts. Other common requirements or requests may include segmentation and separation that may be of special concern when security and safety may be involved.
In, for example, high assurance embodiments or examples, separation may translate to physical partitioning. For example, given a number of modules with different function and security level, each module may be assigned a dedicated hardware component such as a CPU. This may create a distributed system with clear boundaries and interfaces that may makes information flow analysis feasible. Unfortunately, there also may be one or more disadvantageous to this approach. For example, it may generally results in large, complex and inefficient systems, for example, in terms of power consumption, size, development and manufacturing cost, and/or the like.
An alternative or additional example to physical partitioning may be or may include logical partitioning. With logical partitioning, one or more hardware components may be responsible for functionalities and separation may be guaranteed by other techniques such as, for example, in software. Such solutions may generally not be evaluated as a monolithic system due to their size and complexity. But, in an example such as with careful partitioning and separation of logic, it may be possible to design, implement and evaluate such systems. One technique to do so may be the existence of a small trusted base that may enable or enforce separation of other components. This trusted base may be a separation kernel and may include a real-time OS, a microkernel or a type 1 hypervisor or equivalent thereof.
Different from this example, an alternative or additional manner or way of making separation may be the use of a type 2 hypervisor or equivalent thereof. Unlike a type 1 hypervisor, a type 2 hypervisor may not run directly on the hardware, but instead on top of the main operation system kernel. This may imply that the isolation given by a type 2 hypervisor may not be better than the isolation properties given by the underlying operation system. Typically such an operation system may complex and large and it may be hard to actually provide high-level isolation security guarantees for such system.
In an example herein, a M2M unit or device may be protected with a hypervisor protected Device Management AGent (DMAG). The DMAG may run on a tiny OS. The tiny OS may include a full, but tiny network stack and may have direct access to at least one network device interface. In examples, the full network stack may be able to set up arbitrary IP based network connections with a network peer and may include as described herein Contiki, TinyOS, and/or other operating system stacks. The management agent (e.g., DMAG) may associated with a Device Management back-end Server or System or Device Management Server or System (e.g., a DMS) that may include a device unique security association such that the back-end server may be an entity (e.g., the only entity) that the management agent may trust and may accept control commands to and/or from.
In examples, the system (e.g., that may be shown in
The secure WatchDog timer may reset functionality and in combination with the hypervisor functionality may make sure that the DMAG regularly gets control of the device. In an example, the DMAG may not get control of the device and the WatchDog functionality may force control to the agent (e.g., the DMAG) to ensure that the agent may get control. The agent such as the DMAG may be regularly in contact with the back-end server that may issue system reset commands.
According to an example, the DMAG or agent may get control after the WatchDog may time out. In an example (e.g., if the DMAG may get control after a WatchDog time out), the DMAG may contact the DMS that may issue a set of control commands to determine the cause of the WatchDog reset and may issue a set of reset commands such as re-flash that may put the device back to a functional state.
One or more of the examples such as the systems or methods described herein (e.g., as shown in
In an example, a Trusted Computing Base (TCB) may be provided and/or used. The TCB may be a set of hardware and software functions that may have been evaluated such that the user of the system may have a certainty (e.g., may be fairly sure) that such a set of the system may behave correctly (e.g., may not have a problem such as malware, and/or the like) and/or that it may not have a security hole and/or may not be as susceptible to attack, which may be why it may be trusted and/or a TCB. The TCB may be small and may include the hypervisor, the tiny OS and the DMAG to be trusted. The rest of the system such as that shown in
Additionally, one or more device management tasks such as heavy device management tasks may be performed by the DMS. Example of such heavy tasks may include, but may not be limited to, searching for and retrieving software or application and/or software or application configurations, advanced device diagnostics such as virus scan and version checks, and/or the like. As such, one or more of the example methods described herein may offload potential computational and power constraints on the device from computational and power demanding tasks.
An example herein may include having a failure and software attack recovery mechanism for resource constraint M2M units. According to this example, the system may recover from a severe software fault or software attack without direct manual intervention by a local operator with physical access of the device. Instead, a remote back-end management system may handle the recovery without the use of physical presence.
One or more of the examples described herein may be provided or used on a single CPU embedded system in an embodiment (e.g., shown in
The M2M unit device recovery system may include one or more of the following core functions or actions. For example, a partition of the an embedded system with a thin hypervisor (e.g., and in turn an MMU or a memory protection unit (MPU)) may be provided such that the main OS may run in isolated secure execution environment that may include a first Virtual Machine (VM), and a DMAG that runs in a parallel (other). The main OS may further run in a second VM that may be securely separated from the isolated secure execution environment and/or the first VM such that the first VM running in the secure execution environment may not influence the execution of the second VM running separately, for example, except through a defined hypervisor provided application programming interface (API) that may not compromise the security of the hypervisor or the device management agent.
Further, the hypervisor may have control (e.g., full control) of the MMU or MPU on the system. In an example, the hypervisor may make sure that the non-trusted part of the system such as the main OS may not have memory access to one or more of the following: the boot code and the data used by the secure boot process; the WatchDog reset timer on the SoC; the hypervisor code and data used by the hypervisor; the tiny OS and the device management agent and the data used by these entities; and/or the like.
In an example, the DMAG and the DMS may have a trust relation. For example, the DMAG and the DMS may have a trust relation based on cryptographic keys that may be used to set up a secure communication channel between the DMAG and the DMS. This may include a shared symmetric key or public keys embedded in certificates, and/or the like. These keys may be used to set up secure sessions between DMAG and DMS protected by temporary session keys.
Additionally, in an example, the hypervisor and the DMAG may be booted with a secure boot process. In such an example, a trusted boot code that may be located in ROM or flash memory may perform or make an integrity check of the hypervisor prior to launch. The trusted boot code may also perform or make an integrity check of the tiny OS and the device management agent prior to the hypervisor such that these services may be launched in a trusted VM. According to an example, the integrity check may fail. The system may be not booted in an example (e.g., if the integrity check fails) and/or a recovery DMAG routine (e.g., with access to the key material used to set up a secure session with DMS) may be started. The recovery DMAG routine may contact the DMS that may be trying to recover the system through a re-flash in one example.
As described herein, the hypervisor may provide or use a WatchDog timer. The WatchDog timer may be used to maintain an API to the non-trusted portion or part of the system such as the main OS. The hypervisor or another component may enable or allow the non-trusted OS to call a routine in the DMAG that may keep the WatchDog timer alive. A WatchDog timer reset may also occur or be performed. In an example, (e.g., if a WatchDog timer reset occurs or may be performed), a dedicated interrupt routine may be invoked and may encompass or use the DMAG such that the dedicated interrupt routine may take over the execution. Such a routine may perform, cause, or include one or more of the following. In the routine, the DMAG may contact the device management back-end system by setting up a secure communication channel between the DMAG and the DMS. The DMS may use this secure channel to issue a set of diagnostic commands. In an example, a root cause to the WatchDog reset may not be identified or determined and/or fixed. In such an example (e.g., if the root cause to the WatchDog reset cannot be identified and fixed in a direct way), the DMS may send a new software packages to the device and request a re-flash of the system. One or more other recovery options or procedures may be used or invoked and the examples herein may not be limited to a particular recovery option.
According to additional examples, the DMAG with some regularity may be provided or given execution rights. If such rights may not be given, according to an example, the WatchDog timer may make sure the DMAG gets this right. The DMAG may choose to contact the DMS that may issue pending device management commands towards the device. The DMS may also contact the system running on the first VM (e.g., the isolated secure execution environment) and may request it to request the DMAG to contact the DMS for device management. This may be done through a dedicated hypervisor API call.
In an example, an external communication that may be performed by the DMAG may be an external communication with the DMS. As such, according to an example, the DMAG may initiate external network requests that may be directed towards or to a limited number of trusted external device management entities such as the DMS, and/or the like. This may help enable or ensure that the DMAG may be protected from network-based attacks, DoS attacks, and/or the like. Additionally, in an example, the DMAG (e.g., to be protected from external attacks such as external DoS attacks) may not accept or may deny an external network request such as an external network connection request. Furthermore, the DMAG may initiate communication with the DMS preventing denial-of-service attacks through session invitations from external network entities.
As shown, at 21, due to a software failure or a software attack, a M2M application (e.g., 516 of
At 22, the application M2M server may notice that it may have a problem reaching or communicating with the M2M application or that the behavior may not be as expected (e.g., may not be in the normal service). According to examples, the application M2M server may determine whether the problem may be based on network connectivity (e.g., by pinging a nearby M2M unit). In an example (e.g., after excluding that the problem may be due to network connectivity by pinging a nearby M2M unit), the M2M server may send a failure notification to the DMS (e.g., 512 of
The M2M unit application and/or the operating system running the M2M application may be out of the normal service. The application and/or operating system being out of the normal service may indicate or imply that the normal hand over to the DMAG through a hyper call to keep the WatchDog timer (e.g., 510 of
In an example, at 24, the DMAG may imitate or initiate a secure session towards the DMS. As such, a secure channel (e.g., 520 of
At 25, in an example, the DMS may further check or access a failure notification register and may determine or find out whether the particular M2M unit may have a potential software problem and/or the reason for the problem. For example, the failure notification may be received and stored in a register or table (e.g., memory associated therewith). The DMS may check the register or table at 25 to determine whether a particular M2M unit such as the unit or device 500 may have a software problem or a potential software problem.
At 26, the DMS and DMAG may set up a software recovery and/or upgrade session. According to an example, a software image such as a new software image may be transferred to the DMAG or an existing back-up image on the M2M persistence storage medium may be used by the DMAG to do a re-flash of the main operating system and the applications running on the main operation system.
At 27, the DMAG may issue a re-boot request command of the M2M system (e.g., the M2M unit or device). The M2M device or unit (e.g., the system or M2M system) may be rebooted based on the command. For example, the re-boot request command may force a hardware reboot of the system (e.g., the M2M unit or device 500) such that the system may shut down, reset and clear volatile memories and may then start-up again.
At 28, the tiny OS and/or the DMAG may be checked by a secure boot process that may be on the M2M unit (e.g., during reboot the integrity of the hypervisor). The secure boot code may be protected from modification by physical isolation and/or rewrite protection. The secure boot code may also verify an integrity of the main OS and the M2M application running on the main OS. Example of secure a secure boot process may include, but may not be limited to, a process where the boot code may reside in integrity protected memory (e.g., memory that may hard for an attacker to modify) and/or where the boot code may perform integrity checks of software or application blocks including operating system blocks that may be loaded into volatile memory during the boot. Such integrity checks may include one or more of the following: a check of one-way hash function, a check of a digital signature or a so-called Message Authentication Code (MAC), and/or the like.
At 29, the M2M application may be running again. For example, once re-booted or re-boot may be complete, the M2M application may be up and running again.
At 30 (e.g., optionally), the DMS may issue a set of diagnostics commands towards the M2M unit and the applications running on the M2M units to make sure it works at expected. For example, once the M2M device or unit may be rebooted, the DMS may issue the set of diagnostics command thereto. Alternatively or additionally, the M2M application server maybe informed that the system (e.g., the device or unit) may have been reset and it may be asked to check that the service may be running as expected again.
As described herein, the examples herein may be deployed or implemented on a single core embedded system. For example, the disclosed or described examples may be can be realized in several different ways including on a single core system as depicted in
The examples described herein may further be deployed or implemented on a multi-core embedded system. For example, the examples described herein may be used in a system with multiple CPUs. Unlike a single CPU system (e.g., shown in
In a multi-core deployment of a M2M unit or device (e.g., 600), a hypervisor (e.g., 606a-606n) may be running on each of the cores to make sure that the untrusted or semiuntrusted main OS or OSs running on the cores may not access security critical units on a SoC (e.g., 601) such as WatchDog timer (e.g., 610) and/or may be an interrupt controller, and/or the like as the hypervisor may be running in a privileged CPU mode such as the most privileged CPU mode on the system. This may imply or may provide that even if multiple VMs may not be running on one or several of the cores, a hypervisor may be present on these cores to not compromise the security of the system. The DMAG (e.g., 604) may be present on one of the cores such as on CPU 2 according to the example in
A restore session may occur. In an example (e.g., when a restore session may occur as described herein, the DMAG and the tiny OS running in the trusted VM may get, receive, or have unique access right to the network resource of the device. This may be provided or ensured by the hypervisors running in the system that may give rights such as this exclusive right the DMAG (e.g., when requested through a dedicated hyper call in an example).
Example of hypervisors that may be used in this configuration (e.g., shown in
As shown in
As shown in
The communications systems 100 may also include a base station 114a and a base station 114b. Each of the base stations 114a, 114b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102a, 102b, 102c, and/or 102d to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 110, and/or the networks 112. By way of example, the base stations 114a and/or 114b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 114a, 114b are each depicted as a single element, it will be appreciated that the base stations 114a, 114b may include any number of interconnected base stations and/or network elements.
The base station 114a may be part of the RAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. The base station 114a and/or the base station 114b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with the base station 114a may be divided into three sectors. Thus, in one embodiment, the base station 114a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, the base station 114a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
The base stations 114a and/or 114b may communicate with one or more of the WTRUs 102a, 102b, 102c, and/or 102d over an air interface 115/116/117, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). The air interface 115/116/117 may be established using any suitable radio access technology (RAT).
More specifically, as noted above, the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, the base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, and/or 102c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 115/116/117 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
In another embodiment, the base station 114a and the WTRUs 102a, 102b, and/or 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115/116/117 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A).
In other embodiments, the base station 114a and the WTRUs 102a, 102b, and/or 102c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1×, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
The base station 114b in
The RAN 103/104/105 may be in communication with the core network 106/107/109, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the WTRUs 102a, 102b, 102c, and/or 102d. For example, the core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown in
The core network 106/107/109 may also serve as a gateway for the WTRUs 102a, 102b, 102c, and/or 102d to access the PSTN 108, the Internet 110, and/or other networks 112. The PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). The Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite. The networks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, the networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 103/104/105 or a different RAT.
Some or all of the WTRUs 102a, 102b, 102c, and/or 102d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102a, 102b, 102c, and/or 102d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the WTRU 102c shown in
The processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. The processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment. The processor 118 may be coupled to the transceiver 120, which may be coupled to the transmit/receive element 122. While
The transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114a) over the air interface 115/116/117. For example, in one embodiment, the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
In addition, although the transmit/receive element 122 is depicted in
The transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122. As noted above, the WTRU 102 may have multi-mode capabilities. Thus, the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
The processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). The processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128. In addition, the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132. The non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102, such as on a server or a home computer (not shown).
The processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in the WTRU 102. The power source 134 may be any suitable device for powering the WTRU 102. For example, the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
The processor 118 may also be coupled to the GPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102. In addition to, or in lieu of, the information from the GPS chipset 136, the WTRU 102 may receive location information over the air interface 115/116/117 from a base station (e.g., base stations 114a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
The processor 118 may further be coupled to other peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
As shown in
The core network 106 shown in
The RNC 142a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an IuCS interface. The MSC 146 may be connected to the MGW 144. The MSC 146 and the MGW 144 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices.
The RNC 142a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface. The SGSN 148 may be connected to the GGSN 150. The SGSN 148 and the GGSN 150 may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between and the WTRUs 102a, 102b, and/or 102c and IP-enabled devices.
As noted above, the core network 106 may also be connected to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
The RAN 104 may include eNode-Bs 160a, 160b, and/or 160c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode-Bs 160a, 160b, and/or 160c may each include one or more transceivers for communicating with the WTRUs 102a, 102b, and/or 102c over the air interface 116. In one embodiment, the eNode-Bs 160a, 160b, and/or 160c may implement MIMO technology. Thus, the eNode-B 160a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
Each of the eNode-Bs 160a, 160b, and/or 160c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in
The core network 107 shown in
The MME 162 may be connected to each of the eNode-Bs 160a, 160b, and/or 160c in the RAN 104 via an S1 interface and may serve as a control node. For example, the MME 162 may be responsible for authenticating users of the WTRUs 102a, 102b, and/or 102c, bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102a, 102b, and/or 102c, and the like. The MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
The serving gateway 164 may be connected to each of the eNode-Bs 160a, 160b, and/or 160c in the RAN 104 via the S1 interface. The serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102a, 102b, and/or 102c. The serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102a, 102b, and/or 102c, managing and storing contexts of the WTRUs 102a, 102b, and/or 102c, and the like.
The serving gateway 164 may also be connected to the PDN gateway 166, which may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and IP-enabled devices.
The core network 107 may facilitate communications with other networks. For example, the core network 107 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices. For example, the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108. In addition, the core network 107 may provide the WTRUs 102a, 102b, and/or 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
As shown in
The air interface 117 between the WTRUs 102a, 102b, and/or 102c and the RAN 105 may be defined as an R1 reference point that implements the IEEE 802.16 specification. In addition, each of the WTRUs 102a, 102b, and/or 102c may establish a logical interface (not shown) with the core network 109. The logical interface between the WTRUs 102a, 102b, and/or 102c and the core network 109 may be defined as an R2 reference point, which may be used for authentication, authorization, IP host configuration management, and/or mobility management.
The communication link between each of the base stations 180a, 180b, and/or 180c may be defined as an R8 reference point that includes protocols for facilitating WTRU handovers and the transfer of data between base stations. The communication link between the base stations 180a, 180b, and/or 180c and the ASN gateway 182 may be defined as an R6 reference point. The R6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of the WTRUs 102a, 102b, and/or 102c.
As shown in
The MIP-HA may be responsible for IP address management, and may enable the WTRUs 102a, 102b, and/or 102c to roam between different ASNs and/or different core networks. The MIP-HA 184 may provide the WTRUs 102a, 102b, and/or 102c with access to packet-switched networks, such as the Internet 110, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and IP-enabled devices. The AAA server 186 may be responsible for user authentication and for supporting user services. The gateway 188 may facilitate interworking with other networks. For example, the gateway 188 may provide the WTRUs 102a, 102b, and/or 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, and/or 102c and traditional land-line communications devices. In addition, the gateway 188 may provide the WTRUs 102a, 102b, and/or 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
Although not shown in
Although the terms device, UE, or WTRU may be used herein, it may and should be understood that the use of such terms may be used interchangeably and, as such, may not be distinguishable.
Further, although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer-readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
This application claims the benefit of the U.S. Provisional Application No. 62/023,774, filed Jul. 11, 2014, which is hereby incorporated by reference herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/039965 | 7/10/2015 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62023774 | Jul 2014 | US |