Wireless communication networks provide wireless data services to wireless user devices. Exemplary wireless data services include machine-control, internet-access, media-streaming, and social-networking. Exemplary wireless user devices comprise phones, computers, vehicles, robots, and sensors. The wireless user devices execute user applications that use the wireless data services. For example, a smartphone may execute a social-networking application that communicates with a content server over a wireless communication network.
The wireless communication networks have wireless access nodes which exchange wireless signals with the wireless user devices over radio frequency bands. The wireless signals use wireless network protocols like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), and Low-Power Wide Area Network (LP-WAN). The wireless access nodes exchange network signaling and user data with network elements that are often clustered together into wireless network cores. The wireless network elements comprise Access and Mobility Management Functions (AMFs), Security Edge Protection Proxies (SEPPs), User Plane Functions (UPFs), and the like.
A given wireless user device has a home wireless communication network but can also roam onto other wireless communication networks for service. When a wireless user device roams onto a visited network, the visited network contacts the home network for authorization. When the home network authorizes the roaming user device, then the visited network serves the roaming user device. When a wireless user device from the visited network visits the home network, then the home network contacts the visiting network for authorization. When the visited network authorizes the visiting user device, then the home network serves the visiting user device.
The wireless communication networks use network context to exchange the roaming authorization data in a secure manner. The network context comprises network-to-network communication information for Transport Layer Security (TLS), Internet Protocol Security (IPSec), Internet Protocol (IP) addressing, Internetwork Packet Exchange (IPX), public cryptography keys, Certificate Authorities (CAs), and/or some other networking data. The network context is typically manually exchanged between pairs of networks. Changes to the network context are manually shared between pairs of networks. The number of roaming networks and corresponding network context changes is rapidly expanding.
In a distributed ledger, a blockchain comprises a series of data blocks that store transactional information like account balances and title ownership. The blockchain is hosted by multiple geo-diverse ledger nodes that each execute a replicated contract to store identical contract results in redundant data blocks. The redundant data blocks in the blockchain are linked to one another by each data blocks storing a hash of the previous data block. Unfortunately, the distributed ledgers are not effectively integrated within the wireless communication networks. Moreover, the wireless communication networks do not efficiently use distributed ledgers to share network context that facilitates the exchange of roaming authorization data.
In some examples, a method comprises the following operations. Receive communication context from a home distributed ledger node in a home network and store the communication context in a visited distributed ledger node in a visited network. To serve a User Equipment (UE) that is visiting from the home network, retrieve the communication context for the home network from the visited distributed ledger node and exchange network signaling with the home network based on the communication context. Deliver a wireless data service to the UE that is visiting from the home network in response to the network signaling.
In some examples, a method comprises the following operations. A security function in a visited network receives communication context from a home network over a distributed ledger. A network function exchanges user signaling with a User Equipment (UE) that is visiting from the home network to authenticate and authorize the UE. The AMF exchanges network signaling with the security function to authenticate and authorize the UE. The security function uses the communication context to exchange the network signaling with the home network to authenticate and authorize the UE. In response to the authentication and authorization, the network function exchanges session signaling with the UE and with a wireless access node to deliver a wireless data service to the UE. The wireless access node exchanges user data with the UE to deliver the wireless data service to the UE in response to the session signaling.
In some examples, a visited network comprises a visited distributed ledger node, a network control system, and a wireless access node. The visited distributed ledger node receives communication context from a home distributed ledger node in a home network. The visited distributed ledger node and the home distributed ledger node comprise a distributed ledger that is shared by the visited network and the home network. The network control system receives a request from a visiting User Equipment (UE) that is visiting from the home network. The network control system retrieves the communication context for the home network from the visited distributed ledger node. The network control system exchanges network signaling with the home network based on the communication context. The network control system exchanges session signaling with a wireless access node based on the network signaling. The wireless access node exchanges the session signaling with the network control system and wirelessly exchanges user data with the visiting UE to deliver a wireless data service.
In some examples, a distributed ledger stores communication context for a home network. A visited network exchanges signaling with the home network to authenticate and authorize a visiting UE for a wireless data service. To exchange the signaling, the visited network and the home network use the communication context for the home network from the distributed ledger. The communication context for the home network comprises at least one of a cryptography key, Internet Protocol (IP) address, Transport Layer Security (TLS) information, Internet Protocol Security (IPSec) information, Internetwork Packet Exchange (IPX) information, and Certificate Authority (CA) information. The visited network delivers a wireless data service to the visiting UE based on the signaling.
Various examples of network operation and configuration are described herein. To authenticate User Equipment (UEs) 101 and 151, networks 100 and 150 first establish network-to-network connections based on network context, and then the networks 100 and 150 exchange authentication data over the network-to-network connections. The network context characterizes Transport Layer Security (TLS), Internet Protocol Security (IPSec), Internet Protocol (IP) addressing, Internetwork Packet Exchange (IPX), public cryptography keys, Certificate Authorities (CAs), and/or some other aspect of the network-to-network interface. To establish the network-to-network connections, home network gateway 115 transfers home network communication context for home network 100 to distributed ledger 120. Distributed ledger 120 transfers the home network communication context to visited network gateways 155. Visited network gateways 155 transfer the home communication context to visited network controllers 154. In a reciprocal manner, visited network gateways 155 transfer visited network communication context for visited networks 150 to distributed ledger 120. Distributed ledger 120 transfers the visited network communication context to home network gateway 115. Home network gateway 115 transfers the visited communication context to home network controller 114. Home network controller 114 and visited network controllers 154 use the home and visited context to establish the network-to-network connections. To authenticate UEs 101 and 151, home network controller 114 and visited network controllers 154 exchange authorization data for UEs 101 and 151 over the network-to network connections. Home network controller 114 authorizes wireless data service for home UEs 101 that are visiting visited networks 150 responsive to the exchange of the authorization data. Home network controller 114 transfers authorization signaling to visited network controllers 154 responsive to its authorization of the wireless data service for home UEs 101. Visited network controllers 154 authorize wireless data service for visiting UEs 151 that are visiting home network 100 responsive to the exchange of the authorization data. Visited network controllers 154 transfer authorization signaling to home network controller 114 responsive to their authorization of the wireless data service for visiting UEs 151—and home network controller 114 authorizes wireless data service for visiting UEs 151 responsive to this authorization signaling.
Network controller 114 transfers session signaling to wireless access nodes 112 and network user plane 113 responsive to the authorization of the wireless data service for visiting UEs 151. Wireless access nodes 112 and network user-plane 113 deliver the wireless data service to visiting UEs 151 responsive to the session signaling. Network controllers 154 transfers session signaling to wireless access nodes 152 and network user planes 153 responsive to the authorization of the wireless data service for home UEs 101. Wireless access nodes 152 and network user-planes 153 deliver the wireless data service to home UEs 101 responsive to the session signaling.
Advantageously, distributed ledger 120 is effectively integrated within networks 100 and 150. Moreover, wireless communication networks 100 and 150 efficiently use distributed ledger 120 to share network context that facilitates the exchange of roaming authorization data.
UEs 101 and 151 wirelessly communicate with wireless access nodes 112 and 152 over wireless links that use wireless technologies like Fifth Generation New Radio (5GNR), Long Term Evolution (LTE), Institute of Electrical and Electronic Engineers (IEEE) 802.11 (WIFI), Low-Power Wide Area Network (LP-WAN), Bluetooth, and/or some other wireless communication protocols. Wireless access nodes 112 and 152, user-planes 113 and 153, controllers 114 and 154, gateways 115 and 155, ledger 120, and networks 130 communicate over network connections that comprise metallic wiring, glass fibers, radio channels, or some other communication media. The network connections use technologies like IEEE 802.3 (ETHERNET), Internet Protocol (IP), Time Division Multiplex (TDM), Data Over Cable System Interface Specification (DOCSIS), General Packet Radio Service Transfer Protocol (GTP), 5GNR, LTE, WIFI, LP-WAN, Bluetooth, virtual switching, inter-processor communication, bus interfaces, and/or some other data communication protocols. UEs 101 and 151 and wireless access nodes 112 and 152 include radios. UEs 101 and 151, Wireless access nodes 112 and 152, user-planes 113 and 153, controllers 114 and 154, gateways 115 and 155, ledger 120, and networks 130 comprise microprocessors, software, memories, transceivers, bus circuitry, and the like. The microprocessors comprise Digital Signal Processors (DSP), Central Processing Units (CPU), Graphical Processing Units (GPU), Application-Specific Integrated Circuits (ASIC), and/or the like. The memories comprise Random Access Memory (RAM), flash circuitry, disk drives, and/or the like. The memories store software like operating systems, user applications, radio applications, and network functions. The microprocessors retrieve the software from the memories and execute the software to drive the operation of wireless communication networks 100 and 150 as described herein.
One of network gateways 155 transfers new network communication context for one of visited networks 150 to distributed ledger 120. Distributed ledger 120 transfers the new visited network communication context to network gateway 115. Network gateway 115 transfers the new visited communication context to network controller 114. Visited UEs 151 are visiting home network 100 and transfer roaming requests to network controller 114. Network controller 114 transfers the roaming requests to the one of network controllers 154 based on the new visited network communication context. For example, network controller 114 may use new IP addresses for the one of controllers 154. The one of network controllers 154 authorizes wireless data service for visiting UEs 151 responsive to the roaming requests and transfers authorization signaling for UEs 151 to network controller 114 using the new context. Network controller 114 authorizes wireless data service for visiting UEs 151 responsive to the authorization signaling from the one of network controllers 154 and transfers session signaling to network user plane 113 (and wireless access nodes 112) responsive to the authorization of the wireless data service for visiting UEs 151. Visiting UEs 151 exchange user data with external systems over user-plane 113 (and wireless access nodes 112) to deliver the wireless data service responsive to the session signaling.
SEPP 415 is configured with a new public cryptography key, and in response, SEPP 415 transfers its new public cryptography key to GW 416. GW 416 transfers the new public cryptography key for SEPP 415 to LN 421. LNs 421-423 to develop consensus on the new public cryptography key for SEPP 415. In this example, consensus is achieved when LN 421—the source of the new context—is authenticated and authorized by LNs 422-423. LNs 423 notify GWs 466 of the new transaction—the new public cryptography key for SEPP 415 in home network 400. GWs 466 transfers the new public cryptography key for SEPP 415 in home network 400 to SEPPs 465.
Contemporaneously, one of SEPPs 465 is configured to use a new Certificate Authority (CA) for its digital certificates, and in response, transfers its new CA ID to one of GWs 466 which transfers the new CA ID to one of LNs 423. LNs 421-423 to develop consensus on the new CA ID. LN 421 notifies GW 416 of the new transaction—the new CA ID for one of SEPPs 465. GW 416 transfers the new CA ID for the one of SEPPs 465 to SEPP 415.
UE 401 is affiliated with 5G home communication network 400 but is visiting one of 5G visited communication networks 450. UE 401 transfers a roaming request to one of AMFs 462 which transfers the roaming request to the one of SEPPs 465 with the new CA. The one of SEPPs 465 transfers a roaming request for UE 401 to SEPP 415 and uses the new CA for its digital certificate to SEPP 415. SEPP 415 uses the new CA ID to validate the digital certificate from the one of SEPPs 465. The one of SEPPs 465 uses the new public key for SEPP 415 to authenticate SEPP 415. SEPP 415 transfers the roaming request to AMF 412 which authenticates and authorizes UE 401 and transfers a roaming authorization for UE 401 to SEPP 415. SEPP 415 transfers the roaming authorization for UE 401 to the one of SEPPs 465. The one of SEPPs 465 transfers the roaming authorization for UE 401 to the one of AMFs 462. The one of AMFs 462 signals one of SMFs 464, UE 401, and one of IWFs 461 or access networks 452 to serve UE 401. The one of SMFs 464 signals one of UPFs 463 to serve UE 401. UE 401 exchanges user data with networks 430 and possibly network 400 over one of access networks 452 and data centers 460.
UE 451 is affiliated with 5G visited communication network 450 but is visiting 5G home communication network 400. UE 451 transfers a roaming request to AMF 412 which transfers the roaming request to SEPP 415. SEPP 415 transfers the roaming request for UE 451 to the one of SEPPs 465 that has the new CA and uses the new CA ID to validate its digital certificate. The one of SEPPs 465 uses the new public key to authenticate SEPP 415. The one of SEPPs 465 transfers the roaming request to one of AMFs 462 which authenticates and authorizes UE 451 and transfers a roaming authorization for UE 451 to the one of SEPPs 465. The one of SEPPs 465 transfers the roaming authorization for UE 451 to SEPP 415. SEPP 415 transfers the roaming authorization for UE 451 to AMF 412. AMF 412 signals SMF 414, UE 451, and IWFs 411 or access networks 402 to serve UE 451. SMF 414 signals UPF 413 to serve UE 451. UE 451 exchanges user data with networks 430 and possibly one of networks 450 over one of access networks 402 and data center 410.
ENET AN 702 comprises ENET card 705 and node circuitry 706. ENET card 705 comprises ports, analog-to-digital interfaces, DSP, memory, and transceivers that are coupled over bus circuitry. Node circuitry 706 comprises memory, CPU, user interfaces and components, and transceivers that are coupled over bus circuitry. The memory in node circuitry 706 stores an operating system and network applications for IP and ENET. The ports in ENET card 705 are wireline coupled to UE 451 over an ENET link. Transceivers in ENET card 705 are coupled to transceivers in node circuitry 706. Transceivers in node circuitry 706 are coupled to transceivers in IWF 411. The CPU in node circuitry 706 executes the operating system and network applications to exchange network signaling and user data with UEs and IWFs.
UE 401 is affiliated with 5G home communication network 400 but is visiting one of 5G visited communication networks 450. UE 401 transfers a roaming request to one of AMFs 462 which transfers the roaming request to the one of SEPPs 465 that has the new public key. This one of SEPPs 465 transfers a roaming request for UE 401 to SEPP 415 and uses its new public key. SEPP 415 uses the new public key to validate the roaming request from the one of SEPPs 465. SEPP 415 transfers the authenticated roaming request to AMF 412 which authenticates and authorizes UE 401 and transfers a roaming authorization for UE 401 to SEPP 415. SEPP 415 transfers the roaming authorization for UE 401 to the one of SEPPs 465, and the SEPPs may again use the new public key. The one of SEPPs 465 transfers the roaming authorization for UE 401 to the one of AMFs 462. The one of AMFs 462 signals UE 401 and other network elements (not shown). UE 401 exchanges user data with networks 430 (not shown).
SEPP 415 is configured with a new TLS algorithm, and in response, SEPP 415 transfers its new TLS algorithm ID to GW 416. GW 416 transfers the new TLS algorithm ID for SEPP 415 to LN 421. LNs 421-423 interact to develop consensus on the new TLS algorithm ID for SEPP 415. LNs 423 notify GWs 466 of the new transaction—the new TLS algorithm ID for SEPP 415 in home network 400. GWs 466 transfers the new TLS algorithm ID for SEPP 415 to SEPPs 465.
UE 451 is affiliated with 5G visited communication network 450 but is visiting 5G home communication network 400. UE 451 transfers a roaming request to AMF 412 which transfers the roaming request to SEPP 415. SEPP 415 transfers the roaming request for UE 451 to the one of SEPPs 465 and uses the new TLS algorithm. The one of SEPPs 465 receives the roaming request using the new TLS algorithm and transfers the roaming request to one of AMFs 462 which authenticates and authorizes UE 451 and transfers a roaming authorization for UE 451 to the one of SEPPs 465. The one of SEPPs 465 transfers the roaming authorization for UE 451 to SEPP 415 and the two SEPPs may again use the new TLS algorithm. SEPP 415 transfers the roaming authorization for UE 451 to AMF 412. AMF 412 signals UE 451 and other network elements (not shown). UE 451 exchanges user data with networks 430 (not shown).
UE 401 is affiliated with 5G home communication network 400 but is visiting one of 5G visited communication networks 450. UE 401 transfers a roaming request to one of AMFs 462 which transfers the roaming request to one of SEPPs 465. The one of SEPPs 465 transfers a roaming request for UE 401 to SEPP 415 using its new IP address. SEPP 415 uses the new IP address to receive the roaming request from the one of SEPPs 465. SEPP 415 transfers the authenticated roaming request to AMF 412 which authenticates and authorizes UE 401 and transfers a roaming authorization for UE 401 to SEPP 415. SEPP 415 transfers the roaming authorization for UE 401 to the one of SEPPs 465, and the two SEPPs again use the new IP address. The one of SEPPs 465 transfers the roaming authorization for UE 401 to the one of AMFs 462. The one of AMFs 462 signals UE 401 and other network elements (not shown). UE 401 exchanges user data with networks 430 (not shown).
One of SEPPs 465 is configured to use a new IPX parameter, and in response, transfers its new IPX parameter to one of GWs 466 which transfers the new IPX parameter to one of LNs 423. LNs 421-423 interact to develop consensus on the new IPX parameter. LN 421 notifies GW 416 of the new transaction—the new IPX parameter for the one of SEPPs 465. GW 416 transfers the new IPX parameter for the one of SEPPs 465 to SEPP 415.
UE 451 is affiliated with 5G visited communication network 450 but is visiting 5G home communication network 400. UE 451 transfers a roaming request to AMF 412 which transfers the roaming request to SEPP 415. SEPP 415 transfers the roaming request for UE 451 to the one of SEPPs 465 and uses the new IPX parameter. The one of SEPPs 465 transfers the roaming request to one of AMFs 462 which authenticates and authorizes UE 451 and transfers a roaming authorization for UE 451 to the one of SEPPs 465. The one of SEPPs 465 transfers the roaming authorization for UE 451 to SEPP 415 and the two SEPPs may again use the new IPX parameter. SEPP 415 transfers the roaming authorization for UE 451 to AMF 412. AMF 412 signals UE 451 and other network elements (not shown). UE 451 exchanges user data with networks 430 (not shown).
The intranational network context ledger nodes comprise an intranational distributed ledger. The international network context ledger nodes comprise an intranational distributed ledger. The intranational distributed ledger and the international distributed ledger should mirror one another. Secure access to the ledgers drives consensus. Ledger GW 1115 may perform the mirroring between the ledgers. As the SEPPs add, modify, or delete network context in their ledger nodes over their ledger gateways, the ledgers are mirrored. The mirrored ledgers notify their ledger GWs about new, modified, or deleted network context, and the ledger GWs notify their SEPPs about the new, modified, or deleted network context.
For example, one of SEPPs 1152 may post a new TLS setting to the international ledger over its GW, and the international network context ledger node notifies ledger GW 1115. Ledger GW 1115 transfers the new TLS setting for the one of SEPPs 1152 to SEPP 1116 and to the intranational network context ledger node. The one of SEPPs 1152 and SEPPs 1116 use the new TLS setting to exchange UE authorization data. SEPPs 1153 may also use the new TLS setting to exchange UE authorization data with the one of SEPPs 1152.
In another example, one of SEPPs 1153 may post the new IPX setting to the intranational ledger over its GW, and the intranational network context ledger node notifies ledger GW 1115. Ledger GW 1115 transfers the new IPX setting for the one of SEPPs 1153 to SEPP 1117 and to the international network context ledger node. The one of SEPPs 1153 and SEPPs 1117 then use the new IPX setting to exchange UE authorization data. SEPPs 1152 and the one of SEPPs 1153 may use the new IPX setting to exchange UE authorization data.
In another example, SEPPs 1116 may post new IP addressing ledger GW 1115. Ledger GW 1115 posts the new IP addressing to the international network context ledger node, and the international ledger notifies SEPPs 1152 over the GWs. SEPPs 1116 and SEPPs 1152 then use the new IP addressing to exchange UE authorization data. Through mirroring, SEPPs 1153 may use the new IP addressing. In yet another example, SEPPs 1117 may post new IP addressing to ledger GW 1115. Ledger GW 1115 posts the new IP addressing to the intranational network context ledger node which notifies SEPPs 1153 over the GWs. SEPPs 1117 and SEPPs 1153 then use the new IP addressing to exchange UE authorization data. Through mirroring, SEPPs 1152 may use the new IP addressing if needed. In another example, the international network and intranational network might not correspond to geo-political boundaries but instead correspond to networks that are outside and inside of a security administrative zone or jurisdiction subject to the same security policies and governance requirements.
The wireless data network circuitry described above comprises computer hardware and software that form special-purpose networking circuitry to serve wireless data service to visiting UEs and to authorize the wireless data service for home UEs that are visiting other networks. The computer hardware comprises processing circuitry like CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory. To form these computer hardware structures, semiconductors like silicon or germanium are positively and negatively doped to form transistors. The doping comprises ions like boron or phosphorus that are embedded within the semiconductor material. The transistors and other electronic structures like capacitors and resistors are arranged and metallically connected within the semiconductor to form devices like logic circuitry and storage registers. The logic circuitry and storage registers are arranged to form larger structures like control units, logic units, and Random-Access Memory (RAM). In turn, the control units, logic units, and RAM are metallically connected to form CPUs, DSPs, GPUs, transceivers, bus circuitry, and memory.
In the computer hardware, the control units drive data between the RAM and the logic units, and the logic units operate on the data. The control units also drive interactions with external memory like flash drives, disk drives, and the like. The computer hardware executes machine-level software to control and move data by driving machine-level inputs like voltages and currents to the control units, logic units, and RAM. The machine-level software is typically compiled from higher-level software programs. The higher-level software programs comprise operating systems, utilities, user applications, and the like. Both the higher-level software programs and their compiled machine-level software are stored in memory and retrieved for compilation and execution. On power-up, the computer hardware automatically executes physically-embedded machine-level software that drives the compilation and execution of the other computer software components which then assert control. Due to this automated execution, the presence of the higher-level software in memory physically changes the structure of the computer hardware machines into special-purpose networking circuitry to serve wireless data service to visiting UEs and to authorize the wireless data service for home UEs that are visiting other networks.
The above description and associated figures teach the best mode of the invention. The following claims specify the scope of the invention. Note that some aspects of the best mode may not fall within the scope of the invention as specified by the claims. Those skilled in the art will appreciate that the features described above can be combined in various ways to form multiple variations of the invention. Thus, the invention is not limited to the specific embodiments described above, but only by the following claims and their equivalents.
This United States patent application is a continuation of U.S. patent application Ser. No. 17/569,974 that was filed on Jan. 6, 2022 and is entitled “WIRELESS COMMUNICATION NETWORK AUTHORIZATION OF HOME USER EQUIPMENT AND VISITING USER EQUIPMENT.” U.S. patent application Ser. No. 17/569,974 is hereby incorporated by reference into this United States patent application.
Number | Date | Country | |
---|---|---|---|
Parent | 17569974 | Jan 2022 | US |
Child | 18918645 | US |