SERVICE PROVISIONING BY LOCAL OPERATOR

Some embodiments of the present invention relate to an apparatus, a method, and a computer program product related to coexistence of two network operators, for example a local operator and an incumbent operator. In certain embodiments, a method may include monitoring if network information from a server part of an application is received by a client part of the application. The client part is connected to the server part via a first network that uses a radio access technology. The network information is related to a second network that uses the radio access technology, the second network being different from the first network. The method also includes controlling a cellular radio layer such that it interworks with the second network based on the received network and authentication information.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History
Description
CROSS-REFERENCE TO RELATED APPLICATION

The present application claims priority to PCT International Application No. PCT/EP2016/068565, filed on Aug. 3, 2016. The entire content of the priority application is hereby incorporated by reference.

BACKGROUND Field

Some networks may benefit from the coexistence of two different network operators. More particularly, a network may benefit from service provisioning by a local operator in the presence of an incumbent operator.

Description of the Related Art

Local operators (LOs), also known as micro operators, are used for deployment and specialized service provisioning in the fifth generation (5G) networks. LOs are particularly helpful in ultra-dense networks having high capacity demands. LOs are experiencing increasing opportunities for growth in shared spectrums, such as Citizens Broadband Radio Service (CBRS) providing a 3.5 gigahertz (GHz) band.

For example, a LO is an operator who leases a certain portion of a spectrum, and provides certain services in a given limited area. An incumbent operator (IO), on the other hand, provides services over a larger area, such as an entire country, or substantially an entire country.

Incumbent operators, or service providers that act in place of the incumbent operator, issue subscriber identity module (SIM) cards or universal integrated circuit cards (UICCs) comprising a universal subscriber identity module (USIM) application. Alternatively, they may provision data to an embedded UICC (eUICC) or an integrated UICC. SIM cards and UICCs are used to identify users and their associated network, and to allow users to roam to other incumbent networks if a roaming agreement is in place. An LO typically does not issue physical SIM cards or UICCs. The LO may deploy any radio access technology suitable for the LO spectrum, while the IO deploys a Third Generation Partnership Project (3GPP) network, such as Long Term Evolution (LTE), LTE-Advanced (LTE-A), or a 5th generation (5G) network.

There are various modes of operation currently being studied for local operators. Two common approaches are that the LOs and IOs operate jointly with bilateral revenue sharing agreements, or that LOs and IOs operate independently with limited interaction. The first approach has various benefits, such as better inter-working between IO and LO with better mobility support, as well as an optimized network deployment density, especially when multiple IOs cooperate with a single LO. A joint operation, however, would mean that the LOs would need to have bilateral agreements with all the IOs for deploying the network.

A manual public land mobile network (PLMN) scan to allow a user to select an appropriate PLMN based on the scanning of all PLMNs is available. The PLMN identity is always pre-configured in the UE or included in SIM card. But for the randomly deployed LOs, mechanisms for PLMN selection, authentication and charging are currently not available.

SUMMARY

A method, in certain embodiments, may include monitoring if network information from a server part of an application is received by a client part of the application. The client part is connected to the server part via a first network that uses a radio access technology. In addition, the network information is related to a second network that uses the radio access technology, the second network being different from the first network. The method may also include controlling a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

According to certain embodiments, an apparatus may include at least one processor and at least one memory including computer program code. The at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to monitor if network information from a server part of an application is received by a client part of the application. The client part is connected to the server part via a first network that uses a radio access technology, and the network information is related to a second network that uses the radio access technology, the second network being different from the first network. The at least one processor, with the at least one memory and the computer program code, may be configured to also cause the apparatus at least to control a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

An apparatus, in certain embodiments, may include means for monitoring if network information from a server part of an application is received by a client part of the application. The client part may connect to the server part via a first network that uses a radio access technology. In addition, the network information may relate to a second network that uses the radio access technology, the second network being different from the first network. The apparatus may also include means for controlling a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

According to certain embodiments, a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process. The process may include monitoring if network information from a server part of an application is received by a client part of the application. The client part may connect to the server part via a first network that uses a radio access technology. In addition, the network information may relate to a second network that uses the radio access technology, the second network being different from the first network. The process may also include controlling a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

According to certain embodiments, a computer program product encoding instructions for monitoring if network information from a server part of an application is received by a client part of the application. The client part may connect to the server part via a first network that uses a radio access technology. In addition, the network information may relate to a second network that uses the radio access technology, the second network being different from the first network. The method may also include controlling a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

A method, in certain embodiments, may include providing, by a server part of an application, network information to a client part of the application via a first network using a radio access technology. The network information may be related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

According to certain embodiments, an apparatus may include at least one processor and at least one memory including computer program code. The at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to provide, by a server part of an application, network information to a client part of the application via a first network using a radio access technology. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

An apparatus, in certain embodiments, may include means for providing, by a server part of an application, network information to a client part of the application via a first network using a radio access technology. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

According to certain embodiments, a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process. The process may include providing, by a server part of an application, network information to a client part of the application via a first network using a radio access technology. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

According to certain embodiments, a computer program product encoding instructions for performing a process according to a method including providing, by a server part of an application, network information to a client part of the application via a first network using a radio access technology. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

A method, in certain embodiments, may include checking if a client part of an application is connected to a server part of the application via a first network using radio access technology. The method may also include monitoring if the client part of the application becomes connected to the server part of the application via a predetermined second network of the radio access technology. The second network is different from the first network. In addition, the method may include providing, by the server part of the application to a charging device, an information on a usage of the second network for the communication between the server part of the application and the client part of the application if the client part of the application becomes connected to the server part of the application via the second network.

According to certain embodiments, an apparatus may include at least one processor and at least one memory including computer program code. The at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to check if a client part of an application is connected to a server part of the application via a first network using radio access technology. The at least one processor, with the at least one memory and the computer program code, may also be configured to cause the apparatus at least to monitor if the client part of the application becomes connected to the server part of the application via a predetermined second network of the radio access technology. The second network is different from the first network. In addition, the at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to provide, by the server part of the application to a charging device, an information on a usage of the second network for the communication between the server part of the application and the client part of the application if the client part of the application becomes connected to the server part of the application via the second network.

An apparatus, in certain embodiments, may include means for checking if a client part of an application is connected to a server part of the application via a first network using radio access technology. The apparatus may also include means for monitoring if the client part of the application becomes connected to the server part of the application via a predetermined second network of the radio access technology. The second network is different from the first network. In addition, the apparatus may include means for providing, by the server part of the application to a charging device, an information on a usage of the second network for the communication between the server part of the application and the client part of the application if the client part of the application becomes connected to the server part of the application via the second network.

According to certain embodiments, a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process. The process may include checking if a client part of an application is connected to a server part of the application via a first network using radio access technology. The process may also include monitoring if the client part of the application becomes connected to the server part of the application via a predetermined second network of the radio access technology. The second network is different from the first network. In addition, the process may include providing, by the server part of the application to a charging device, an information on a usage of the second network for the communication between the server part of the application and the client part of the application if the client part of the application becomes connected to the server part of the application via the second network.

According to certain embodiments, a computer program product encoding instructions for performing a process according to a method including checking if a client part of an application is connected to a server part of the application via a first network using radio access technology. The method may also include monitoring if the client part of the application becomes connected to the server part of the application via a predetermined second network of the radio access technology. The second network is different from the first network. In addition, the method may include providing, by the server part of the application to a charging device, an information on a usage of the second network for the communication between the server part of the application and the client part of the application if the client part of the application becomes connected to the server part of the application via the second network.

A method, in certain embodiments, may include monitoring if a user authenticates to a radio network by credentials in order to access the radio network. The method may also include checking if the user is authenticated to a predetermined application by the credentials when the user authenticates to the radio network by the credentials. In addition, the method may include granting access to the radio network for the user when the user is authenticated to the predetermined application by the credentials.

According to certain embodiments, an apparatus may include at least one processor and at least one memory including computer program code. The at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to monitor if a user authenticates to a radio network by credentials in order to access the radio network. The at least one processor, with the at least one memory and the computer program code, may also be configured to cause the apparatus at least to checking if the user is authenticated to a predetermined application by the credentials when the user authenticates to the radio network by the credentials. In addition, the at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to granting access to the radio network for the user when the user is authenticated to the predetermined application by the credentials.

An apparatus, in certain embodiments, may include means for monitoring if a user authenticates to a radio network by credentials in order to access the radio network. The apparatus may also include means for checking if the user is authenticated to a predetermined application by the credentials when the user authenticates to the radio network by the credentials. In addition, the apparatus may include means for granting access to the radio network for the user when the user is authenticated to the predetermined application by the credentials.

According to certain embodiments, a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process. The process may include monitoring if a user authenticates to a radio network by credentials in order to access the radio network. The process may also include checking if the user is authenticated to a predetermined application by the credentials when the user authenticates to the radio network by the credentials. In addition, the process may include granting access to the radio network for the user when the user is authenticated to the predetermined application by the credentials.

According to certain embodiments, a computer program product encoding instructions for performing a process according to a method including monitoring if a user authenticates to a radio network by credentials in order to access the radio network. The method may also include checking if the user is authenticated to a predetermined application by the credentials when the user authenticates to the radio network by the credentials. In addition, the method may include granting access to the radio network for the user when the user is authenticated to the predetermined application by the credentials.

A method, in certain embodiments, may include receiving at a base station user credentials from a client part of an application via a first network using a radio access technology. The method may also include forwarding the user credentials to a server part of the application. In addition, the method may include receiving network information from the server part of the application based on the forwarded user credentials. Further, the method may include transmitting the network information from the base station to the client part of an application. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network

According to certain embodiments, an apparatus may include at least one processor and at least one memory including computer program code. The at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to receive at a base station user credentials from a client part of an application via a first network using a radio access technology. The at least one processor, with the at least one memory and the computer program code, may also be configured to forward the user credentials to a server part of the application. In addition, the at least one processor, with the at least one memory and the computer program code, may be configured to cause the apparatus at least to receive network information from the server part of the application based on the forwarded user credentials. Further, the at least one processor, with the at least one memory and the computer program code, may be configured to transmit the network information from the base station to the client part of an application. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network

An apparatus, in certain embodiments, may include means for receiving at a base station user credentials from a client part of an application via a first network using a radio access technology. The apparatus may also include means for forwarding the user credentials to a server part of the application. In addition, the apparatus may include means for receiving network information from the server part of the application based on the forwarded user credentials. Further, the apparatus may include means for transmitting the network information from the base station to the client part of an application. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

According to certain embodiments, a non-transitory computer-readable medium encoding instructions that, when executed in hardware, perform a process. The process may include receiving at a base station user credentials from a client part of an application via a first network using a radio access technology. The process may also include forwarding the user credentials to a server part of the application. In addition, the process may include receiving network information from the server part of the application based on the forwarded user credentials. Further the process may include transmitting the network information from the base station to the client part of an application. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

According to certain embodiments, a computer program product encoding instructions for performing a process according to a method including receiving at a base station user credentials from a client part of an application via a first network using a radio access technology. The method may also include forwarding the user credentials to a server part of the application. In addition, the method may include receiving network information from the server part of the application based on the forwarded user credentials. Further, the method may include transmitting the network information from the base station to the client part of an application. The network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

BRIEF DESCRIPTION OF THE DRAWINGS

Further details, features, objects, and advantages are apparent from the following detailed description of certain embodiments of the present invention which is to be taken in conjunction with the appended drawings:

FIG. 1 illustrates a system according to certain embodiments.

FIG. 2 illustrates an overview of the multi-operator multi-connectivity concept according to certain embodiments.

FIG. 3 illustrates a signaling diagram for cell detection, selection, and access according to certain embodiments.

FIG. 4 illustrates a cell search procedure according to certain embodiments.

FIG. 5 illustrates a cell search procedure with beam discovery according to certain embodiments.

FIG. 6 illustrates traffic steering according to certain embodiments.

FIG. 7 illustrates a flow diagram according to certain embodiments.

FIG. 8 illustrates an apparatus according to certain embodiments.

FIG. 9 illustrates a flow diagram according to certain embodiments.

FIG. 10 illustrates an apparatus according to certain embodiments.

FIG. 11 illustrates a flow diagram according to certain embodiments.

FIG. 12 illustrates an apparatus according to certain embodiments.

FIG. 13 illustrates a flow diagram according to certain embodiments.

FIG. 14 illustrates an apparatus according to certain embodiments.

FIG. 15 illustrates a flow diagram according certain embodiments.

FIG. 16 illustrates an apparatus according to certain embodiments.

FIG. 17 illustrates a protocol stack with interfaces according to certain embodiments.

FIG. 18 illustrates an overview of the multi-operator multi-connectivity according to certain embodiments.

FIG. 19 illustrates a signal flow diagram according to certain embodiments.

FIG. 20 illustrates a signal flow diagram according to certain embodiments.

FIG. 21 illustrates a signal flow diagram according to certain embodiments.

FIG. 22 illustrates a flow diagram according to certain embodiments.

FIG. 23 illustrates a flow diagram according to certain embodiments.

FIG. 24 illustrates a flow diagram according to certain embodiments.

FIG. 25 illustrates a flow diagram according to certain embodiments.

DETAILED DESCRIPTION

Certain embodiments discussed below, may relate to the second approach, in which the IOs and LOs are uncoordinated. LOs may lease a network spectrum from regulatory authorities, within finite geographic area. This allows certain embodiments to provide for an easy deployment and service provisioning by the LOs, without depending on cooperation or coordination with the IOs. The LO may provide specialized services such as high-performance gaming or virtual reality arenas, ultra-low latency robotics arena, network for an industrial plant. The services may be provisioned using a 5G user equipment (5G UE), along with 5G-radio access points (5G-RAP), also referred to as 5G NodeB (5G NB).

The services provided by the LOs may allow the UE access to a wide variety of features such as extreme mobile broadband with significantly high capacity, and ultra-low latency with very high levels of reliability. There are various cost benefits of using widely available 5G-RAPs, as compared to other using proprietary base stations, with access to the 5G UEs. For example, by removing the SIM cards or UICC with USIM applications, in 5G UE, the LOs have more flexibility in having access to a wide variety of users with different charging functionalities.

By using 5G NB, LO can achieve economy of scale, while also maintaining network and service deployment flexibility. There may also be reduced administrative overhead for both LOs and IOs, as compared to an embodiment in which the LO and IO and coordinated. Some of the embodiments may also provide for a less error prone network configuration that can employ standardized access to LO networks, while also increasing user satisfaction and quality of experience for specialized service. Certain embodiments may also prevent the network of IO from being challenged by specialized services, and allow for easy, even seamless, accessibility of LO networks by users.

Certain embodiments of the invention are described in detail with reference to the accompanying drawings, wherein the features of the embodiments can be freely combined with each other unless otherwise described. The description of certain embodiments is given by way of example only, and is in no way intended as limiting the invention to the disclosed embodiments. Moreover, it is to be understood that an apparatus including at least one processor and at least one memory comprising computer program code is configured to perform the corresponding methods, although in some cases only the apparatus or only the method is described.

In certain embodiments, LO may use 5G instead of other radio access technologies (RATs), such as wireless land access network (WLAN), because 5G provides features such as ultra-reliability and low-latency communications, along with extreme mobile broadband data rates. In embodiments in which the LO seeks to deploy a high-performance gaming arena and/or a virtual reality center utilizing a 5G network may be helpful. In other examples, the LO may seek to employ potentially new business cases where the LO can make use of the 5G features to create new business opportunities. The one or more virtual reality centers may provide the end users with access to live football games, concerts, or any other form of entertainment, which users may access through a user equipment, such as a smartphone.

If user access to the LO network can be made easier, as provided for in some of the embodiments described below, users irrespective of the IO may be able to access the services provided by the LO. Such networks could be provided by any provider, such as an industrial provider of Internet of Things (IoT) services, which may have an explicit focus on providing users with varying services.

Users of the IO may roam into the LO network based on the user identity provided in the SIM card of the user equipment. The user identity stored in the SIM card, which may take the form of a USIM, may be an example of “user information”. However, according to some embodiments, roaming may be replaced by using application level details for authentication, instead of the SIM card. The application level details may be an example of credentials. Alternatively, some embodiments may utilize a soft SIM or a virtual SIM, as shown in FIGS. 18-22.

FIG. 1 illustrates a system according to certain embodiments. In particular, FIG. 1 illustrates a 5G UE 11 having multi-operator multi-connectivity with the LO and IO. Both the LO and the IO may carry traffic from and to the UE simultaneously. That is, the 5G UE can be connected simultaneously to both 5G-RAP or 5G-NB 12 of the IO and 5G-RAP or 5G-NB 13 of the LO, and traffic can be carried on both of these connections. The base stations or RAPs are connected to respective core networks (CN) 14, 15. In one example, the IO core network provides connectivity to basic services such as voice calls and internet. The LO core network, on the other hand, provides connectivity for special services and use cases.

In certain embodiments, there may not be a separate SIM at the UE for the LO, but there may be a logical link 16 between the policy, charging, and/or user information functions between the LO CN to the IO CN. The logical link may be over the Internet, or may use any other network form. In other words, there may be a logical link via the application layer between the LO CN user-specific functions and the 5G UE application layer. As such, in some embodiments new users can be created, and prepaid or post-paid charging functions may be configured for the LO using the IO-CN. The 5G UE may have multiple transmit-receive chains and related functionalities that help support multi-operator multi-connectivity. In other embodiments, UEs may have a single transmit-receive chain that can operate with a lower performance level.

LOs may include a local home network, in certain embodiments, that may be rented to consumers. When consumers are located at an area in which the local home network is employed, such as the home or office of the consumer, the consumers may have access to the local network. Upon leaving their homes or offices, consumers may exit the home network and return to using the IO network.

In some embodiments, one network may be different from another network if the respective core networks are different from each other. In other words, different may indicate independent operation of the one network as compared to another network using dedicated infrastructure and/or spectral resources. In some other embodiments, the another network may share or lease spectral resources and/or infrastructure from the one network, yet still be considered different because the respective core networks are different. Although LO and IO may be different networks, they may utilize the same radio access technology (RAT). For example IO and LO may both use a 5G network. In some other embodiments, however, the IO and LO may use two different RATs.

Certain embodiments may provide the 5G UE multi-operator multi-connectivity in a standardized manner, so that the LO operators can deploy their network using 5G-RAPs, and provide ultra-reliability, low latency, high capacity and other 5G features. With the developing localized spectrum licensing and/or sublicensing agreements, the LOs may have access to large amounts of spectrum due to local usage only, without depending on the IOs.

In one embodiment, the LO may cooperate with one or more IO in order to provide support for system access and charging functionalities. Such an embodiments, however, may limit the flexibility of the LO from having fast, and possibly random, deployment of networks that may allow for the creation of new revenue models. A standardized procedure for LO deployment using 5G technology can reduce deployment costs. Some of the embodiments, therefore, provide easy LO deployment with a focus on tailored service provisioning. Cell selection and/or authentication using a LO that may be accessed through SIM-less access or via frequent exchanges of a physical SIM card may also be provided in some embodiments. Some embodiments may also provide for cell selection and/or cell access using a virtual or soft SIM

In certain embodiments, operators may deploy networks in unlicensed band which can tightly interwork with the LTE network, using an application layer. These embodiments may also provide for multi-operator multi-connectivity operation with normal cell selection, related procedures for the IOs, and the use of application specific criteria for the LOs. For example, the UE application layer may provide assistance and/or act as a trigger in cell search, cell selection, and/or traffic steering between IO and LO, as well as for charging the user for the services provided by the LO.

Cell search may include the UE application layer initiating and providing frequency bands and center frequencies for cell searching at the appropriate conditions. Cell selection may involve the use of cell selection criteria with appropriate identifications (IDs), such as PLMN IDs, or any other application related IDs, and/or Random Access Channel preamble. These criteria may be provided by the UE application layer, based on the dynamic information available from the application server. In some embodiments, the application server may be a cloud based server, as shown in FIGS. 4 and 5.

The UE application server may also help in traffic steering between IO and LO. In particular, the application layer may provide an indication to UE buffers about routing certain traffic types over the LO network and the IO network, respectively. In certain embodiments, a user may be charged for use of the LO network based on the application layer user information and/or authentication information provided to the UE during cell selection and connection establishment. The charging of the usage of the LO network may be done by the LO through the application itself For example, if a user is using a gaming application that utilizes a LO, the charge, such as a monetary fee, may be assessed to the user through the gaming application.

FIG. 2 gives an overview of the multi-operator multi-connectivity concept according to some embodiments. As shown in the bottom part of FIG. 2, a 5G UE 21 may be connected to 5G NBs of the IO (IO-5G NB 22) and the LO (LO-5G NB 23), respectively, via multi-connectivity links. The 5G UE itself may have a layered software structure comprising an application layer 24 and a lower layer, such as a cellular radio layer 25. The software structure may be located in at least one processor and at least one memory comprising computer program code. Each of these layers may comprise one or more sub-layers. For example, the cellular radio layer 25 may comprise a physical layer, a radio resource control (RRC) layer, and/or a radio link control layer. The application layer 24 typically comprises a client part of one or more applications.

A protocol architecture according to certain embodiments is illustrated in FIG. 17. The LO Application 177 may provide the cell search and/or selection parameters, as well as other parameters included in initiating the process, to physical layer (PHY) 171 of the UE protocol stack. For example, LO application 177 may use interface 1711 to communication with PHY layer 171, which may be implementation specific and/or developed as an Application Programming Interface (API). For traffic steering, LO Application 177 could route either Internet Protocol (IP) layer 175 packets meant for the LO network to the appropriate radio interfaces, or provide one or more rules to the Packet Data Convergence Protocol (PDCP) layer 174 of the protocol stack. Interface 1712 may be used for the routing of IP layer 175 packets or PDCP layer 174 packets.

Interface 1713, in certain embodiments, may be used towards charging function 178, in order to allow for the charging of users for services used in the LO network and/or the usage of the LO network for the services. Medium Access Control (MAC) 172, Radio Link Control (RLC) 173, and Transmission Control Protocol (TCP) 176 layers may also be included. FIG. 17 is merely given as one example that utilizes IP packets, but the described method and/or protocol can be extended to any other packet embodiment, such as Ethernet packets.

In the top part of FIG. 2, an embodiment is shown in which the 5G UE 21 selects the IO-5G NB 22 based on 3GPP procedures. On the other hand, the LO-5G NB 23 may be selected by a selection procedure in which the UE, and the application layer thereof, may be involved. This selection procedure of LO-5G NB may be referred to as a “UE defined cell selection procedure” and is discussed below.

FIG. 3 shows a signal flow diagram according to certain embodiments. In step 31, an application may be running on the UE. This side of the application may be referred to as the client part of the application. The application may trigger a search for a LO network. Since the UE may currently be served by the IO network, the UE may connect to the server part of the application running on an application server via an IO network, as shown in step 32. In step 33, the application server may provide to the UE access information, such as carrier frequency. The application server may in some embodiments provide this information on its own volition, while in other embodiments the application server provides the information in response to a request from the client part of the application.

The UE, using the cellular radio layer, may search for a LO network (NW), as shown in step 34, based on the access information received from the application server in step 33. For example, the application layer may provide the received access information to the cellular radio layer, or the application layer may generate some control commands in order to control the cellular radio layer based on the received access information. In some embodiments, the application server can trigger LO NW cell search. For example, when the application server is aware of both the geographical coverage information of LO NW and the location information of 5G UE, cell search may be triggered. If a LO NW grants access to the UE, the UE may steer some traffic, such as traffic related to the application in step 31, to the application server via the LO NW, as shown in step 35.

The UE may in some embodiments be connected to both IO network and LO network simultaneously. In certain embodiments, if a given service is not requested by the UE, the UE may disconnect from the IO network.

FIG. 4 illustrates a cell search procedure according to certain embodiments. In particular, as shown in FIG. 4, UE application layer 24, also referred to as the client part, may interact with application server 46, also referred to as the server part, to provide access parameters to cellular radio layer 25 of the UE 21. For example, search parameters 44 may be exchanged. Search parameters 44 may be used for cell searching according to a search function 45. The search parameters may include, in some embodiments, one or more of the frequency bands, and/or a center frequency in order to listen to a discovery signal and/or a synchronization signal, as well as to determine when and/or where to initiate cell search. Search parameters 44 allow for a dynamic provisioning of information to the UE, where the frequency bands and other related radio parameters may be configurable.

Application server 46 may also provide radio fingerprint information to help optimize the cell search procedure. The UE may use the fingerprint information, for example, to search only when required, thereby saving UE battery power. For the radio fingerprint information, the application server may utilize crowdsourcing, to collect information from all of the UEs subscribing to a particular application for accessing LO networks, based at least in part on the cell search information provided by all the UEs subscribed to that application.

In certain embodiments, the application may serve as an aggregation point where multiple local operators collaborate to provision service to the end users. This service provisioning may include the establishment of a security association by providing credentials to the user or UE. One example may be to use popular social media sites to provide authentication and cell search information, where multiple LOs can collaborate and reuse the available information. Thus, a generic application such as an application store from the UE's operating system provider may provide access to the charging and/or authentication functions in order to allow the LOs to connect to the UE. In some embodiments, the application may provide the charging and/or authentication function to the LO network, if the application already has the credentials of the user, such as credit card information to allow a user to make a payment.

In 5G, cell search and discovery may be based on beam-specific system design. In certain embodiments, a discovery signal and/or system information may be broadcast over specific beams in the LO network that may be aware of the application context. The LO application, also referred to as the server part, may determine the application context, such as UE proximity to the LO network and/or possible location information. In a 5G network, the LO 5G NB 23 may not send the system access and discovery signal information at all times. In other words, the LO may utilize selective signalling. The selective sending of the information may optimize energy savings and avoid unnecessary information broadcasting, which may help to maximize spectral efficiency and capacity of the network.

According to some embodiments, the LO application may configure one or more beams 51, 52, as shown in FIG. 5, in LO-5G NB 23 to send discovery and synchronization information, along with the system information to the 5G UE. The beams may be based on the beam ID, and may allow the 5G UE 21 to discover the LO network. The beams may also provide the same information to the client part of application 24 in UE 21, which may then inform cellular radio layer 25. An overview of this procedure is shown in FIG. 5, where LO application, which may be the server part on cloud application server 46, can send the LO-5G NB discovery information. The discovery information may inform the 5G NB 21 to configure discovery and system information broadcast through first Beam 51 and second Beam 52. In certain embodiments, the two beams may have distinct or separate functions. For example, the discovery signal information may be different in the two beams. The application server may be a separate application server or may be installed on a cloud or a cloud application server.

The application layer, in certain embodiments, may provide the cell selection parameters, such as the PLMN selection criteria, and/or radio parameter information, such as signal strength and quality criteria, provided by the application layer. The cellular radio layer in the UE may use selection criteria or radio parameter information, and compares the information with other information, available in for example in a first system information block (SIB) cellAccessRelatedInfo parameter to decide whether or not to select the detected cell. Other information related to the random access procedure, especially using application layer random access preambles may be provided to a lower layer. In some embodiments, the application layer in the UE may provide the cellular radio layer in the UE with possible random access preambles that may be used for cell initial access.

Certain embodiments may use multi-operator multi-connectivity, and efficiently steer traffic between the LO and IO. Traffic meant for IO, for example, may be prioritized and routed to the IO using legacy traffic flow templates (TFT). For the LO, on the other hand, the TFT may be provided by the application server directly to the client part of the application on the UE. The client part of the application may then use the received traffic flow template to influence the UE application scheduler. The application scheduler may decide, for example, to which network the traffic should be routed, and then routes the traffic according to the available rules. Such traffic steering can be particularly useful, since the LO network may be tailored for provisioning very specialized services, such as high-performance gaming or virtual reality arenas, which can impose strict limitations on the throughput and latency requirements of the traffic. A traffic flow template may be an example of a traffic flow parameter.

The LO network may also, in certain embodiments, utilize mobile edge computing, whereby the core network may be collocated with the radio access network, to minimize the end-to-end latency for the services provided over the LO network. Since the IO can be deployed for all services, such tailored service provisioning may in some embodiments not be used in the IO network. The LO providing access to a limited set of services can provide the UE with the application ID parameters to allow the UE to manage traffic steering.

FIG. 6 illustrates traffic steering according to certain embodiments. In particular, FIG. 6 illustrates that the application server 46, such as a cloud application server can provide a traffic flow template 68 to a client part or application layer 24 of UE 21. Based on the traffic flow template, UE application scheduler 67 may control the cellular radio layer 25 to route certain traffic, for example LO traffic, to the LO-5G NB 23, and certain other traffic, for example IO traffic, to the IO-5G NB 22. The traffic may then be forwarded to the respective core networks 14, 15. An LO traffic buffer 61 and an IO traffic buffer 62 are also provided. One or more multiconnectivity (MC) links are provided between 5G UE 21 and IO-5G NB 22 and between 5G UE 21 and LO-5G NB 23.

A charging function may be based on UE application subscription information that may be provided during service flow establishment. In such an embodiment, the LO network may be simplified by removing roaming based on information derived from a SIM card, as discussed above, although roaming may still be allowed in the network. In certain embodiments, end users subscribing to a particular service can access the LO network. The charging policies may depend, at least in part, on the traffic volume and/or service type used by the end user. The LO Packet Data Network (PDN), such as a PDN Gateway (P-GW) may enforce the bearer level quality of service (QoS) class identifier values (QCI) based on the UE application (UE App) subscription type. The LO radio access network may enforce QCI values, similar to processes outlined in the LTE evolved packet core (EPC).

The application layer, in certain embodiments, may know the user identity, such as a Mobile Station International Subscriber Directory Number (MSISDN), from when the user or client part accessed the application or server part via the IO network. The LO may therefore still apply the same charging, whether the charge is prepaid or postpaid, even if the client part gains access the server part via the LO network. In other words, the application may charge the user for usage of the LO network using similar charging to the IO network.

FIG. 7 illustrates a flow diagram according to certain embodiments. The UE may first connect to the IO network, as shown in step 71. The UE may then send a measurement report of the IO network and/or GPS information to the application server via the client part of the application on the UE, as shown in step 72, using the IO network. Instead of, or in addition to, using GPS information, data of any other positioning system or any other location information may be transmitted.

Based on the provided measurement report and/or location information, the LO application located in the UE may detect that the UE is in the proximity of the LO network. For example, the LO application server may have the radio fingerprint information in the vicinity of the areas where the LO 5G NBs are deployed. The radio fingerprint information may include information about the IO network in the vicinity of the LO network. The IO network measurements that the UE conducts, especially those used for providing mobility and service continuity, may comprise corresponding information. For example, the radio fingerprint information may contain the IO network cell IDs and corresponding signal strengths, which may be measured by the UE.

The UE may therefore conduct IO network measurements and convey this information to the client side of the LO application in the UE, which may transmit this information to the application server, via the IO network. The application server, based on matching the radio fingerprint information with the IO measurements taken by the UE, may estimate the proximity of the UE to the LO network. When the server estimates that the UE is in the proximity of LO network, the application server may configure the LO application in the UE to configure the UE radio layer to initiate cell search and selection procedure. Accordingly, the application configures the UE, and the cellular radio layer therein, to perform measurements to detect the LO network, as shown in step 73.

When the UE detects the LO network based on the measurements, the UE may initiate a cell selection procedure, as shown in step S74. The cell selection procedure may be based on parameters provided by the application, as shown in step 75.

In step 76, if the UE has accessed the LO network and is still served by the IO network, traffic steering may be performed in order to route the traffic to the appropriate network. The traffic steering may be based on parameters, such as traffic flow template. Traffic flow template may be a template provided to the UE by the core network for informing the UE about the relative priorities of the applications requesting resources for uplink transmissions. The information contained within the traffic flow template may be enhanced to inform the UE as to which traffic should be routed to the LO or IO network, respectively, and may also be provided to the cellular radio layer.

Charging of the traffic in the LO network may be done on the application server, based on the information or credentials provided by the UE, as shown in step 77. The information may include any information that the charging functions may deem helpful in charging the user, via the client part of the application.

FIG. 8 shows an apparatus according to certain embodiments. The apparatus may be a terminal such as a UE, or an element thereof. FIG. 9 shows a flow diagram according to an example embodiment of the invention. The apparatus according to FIG. 8 may perform the steps described in FIG. 9, but is not limited to those steps. The steps of FIG. 9 may also be performed by another apparatus that is not illustrated in FIG. 8.

The apparatus comprises a processor, a memory comprising computer program code, and/or a transceiver used to send and/or receive information or data. The processor along with the memory may be used as monitoring means 110 and controlling means 120. The monitoring means 110 and controlling means 120 may be a monitoring circuitry and controlling circuitry, respectively.

The monitoring means 110 monitors if network information from a server part of an application is received by a client part of the application, as shown in step 110 in FIG. 9. The network parameter is related to a second network, for example the LO network. The client part, which may be located on a processor and/or memory at the UE, may be connected to the server part via a first network, such as an IO network. The first network and the second network are different from each other but may be of a same radio access technology, such as 5G, LTE, or LTE-A.

If the network information is received, as shown in FIG. 9, the controlling means 120 may control a cellular radio layer. The cellular layer may be a layer of the UE on which the client part is installed. The cellular layer may interwork with the second network based on the received network information, as shown in step 120.

FIG. 10 illustrates an apparatus according to certain embodiments. The apparatus may be an application, an application server, or an element thereof, such as a server part of the application. FIG. 11 shows a flow diagram according to certain embodiments. The apparatus according to FIG. 10 may perform the steps of FIG. 11 but is not limited to those steps. The steps of FIG. 11 may be performed by the apparatus of FIG. 10, but may also be performed by another apparatus.

The apparatus comprises a processor, a memory comprising computer program code, and/or a transceiver used to send and/or receive information or data. The processor along with the memory may be used as providing means 210. The providing means 210 may be a providing circuitry.

The providing means 210 provides, by a server part of an application, network information to a client part of the application via a first network using a fist access technology, as shown in step 210. The network information may be related to a predetermined second network, such as a LO network. The client part may be connected to the server part via a first network, for example a IO network, and the first network and the second network may be different from each other. In some embodiments, however, the first network and the second network may use the same radio access technology, such as 5G, LTE, or LTE-A.

FIG. 12 illustrates an apparatus according to certain embodiments. The apparatus may be an application, application server, or an element thereof such as a server part of the application. FIG. 13 illustrates method flow diagram according to certain embodiments. The apparatus according to FIG. 12 may perform the steps of FIG. 13, but is not limited to those steps. The method of FIG. 13 may be performed by the apparatus of FIG. 12, but may also be performed by another apparatus.

The apparatus according to FIG. 12 comprises a processor, a memory comprising computer program code, and/or a transceiver used to send and/or receive information or data. The processor along with the memory may be used as checking means 310, monitoring means 320, and providing means 330. The checking means 310, monitoring means 320, and providing means 330 may be a checking circuitry, monitoring circuitry, and providing circuitry, respectively. The apparatus of FIG. 12 may comprise the features of the apparatus of FIG. 10, as well.

The checking means 310 may check in step 310 whether a client part of an application is connected to a server part of the application via a first network, such as an IO network, using radio access technology, such as 5G, LTE, or LTE-A.

If the client part is connected to the server part via the first network, as shown in step 310, the monitoring means 320 monitors if the client part becomes connected to the server part via a predetermined second network, for example a LO network, different from the first network but of the same radio access technology, as shown in step 320.

If the client part becomes connected to the second network, the providing means 330 provides to a charging device an information on a usage of the second network for the communication between the server part and the client part, as shown in step 330. The providing means 330 may be a portion of (integrated with) the server part of the application. The providing means 330 keeps informing on the usage of the second network, while the client part may be connected to the server part via the second network.

FIG. 14 shows an apparatus according to certain embodiments. The apparatus may be a radio network, or an element thereof, such as a base station. The base station may be a NodeB or a 5G NB. FIG. 15 shows a flow diagram according to certain embodiments. The apparatus according to FIG. 14 may perform the steps of FIG. 15, but is not limited to those steps. The steps of FIG. 15 may be performed by the apparatus of FIG. 14, or any other apparatus.

The apparatus according to FIG. 14 comprises a processor, a memory comprising computer program code, and/or a transceiver used to send and/or receive information or data. The processor along with the memory may be used as monitoring means 410, checking means 420, and granting means 430. The monitoring means 410, checking means 420, and granting means 430 may be a monitoring circuitry, checking circuitry, and granting circuitry, respectively. The monitoring means 410 may monitor whether a user authenticates to a radio network by credentials in order to access the radio network, as shown in step 410. For example, the credentials may be used to authenticate to an application.

If the user is authenticated to the radio network by the credentials, as shown in step 410, the checking means 420 may check, in step 420, if the user is authenticated to a predetermined application by the credentials. If the user is authenticated to the predetermined application by the credentials, the granting means 430 grants access to the radio network for the user, as shown in step 430.

FIG. 16 shows an apparatus according to an example embodiment of the invention. The apparatus comprises at least one processor 610, at least one memory 620 including computer program code, and the at least one processor 610, with the at least one memory 620 and the computer program code, being arranged to cause the apparatus to perform at least one of the methods or processes illustrated in FIGS. 9, 11, 13, and 15.

It should be understood that each signal or block in FIGS. 1-15 and 17 may be implemented by various means or their combinations, such as hardware, software, firmware, one or more processors and/or circuitry. In one embodiment, a system may include several devices, such as, for example, a base station, a UE, an application server, and/or additional servers or hosts upon which the IO and the LO operate. The system may include more than one UE, bases station, or application server. The base station may be a network node, a server, a host, and/or any other access or network node.

Each of these devices may include at least one processor 610 or control unit or module, and at least one memory 620 may be provided in each device. The memory 620 may include computer program instructions or computer code contained therein. One or more transceiver may also be provided, and each device may also include an antenna. Certain embodiments may include one antenna per device, while other embodiment may include many antennas and multiple antenna elements that may be provided to each of the devices. Other configurations of these devices, for example, may be provided. For example, the devices network may be additionally configured for wired communication, in addition to wireless communication using any form of communication hardware.

Transceivers may, independently, be a transmitter, a receiver, or both a transmitter and a receiver, or a unit or device that may be configured both for transmission and reception. The transmitter and/or receiver (as far as radio parts are concerned) may also be implemented as a remote radio head which is not located in the device itself, but in a mast, for example. The operations and functionalities may be performed in different entities, such as nodes, hosts or servers, in a flexible manner In other words, division of labor may vary case by case. One possible use is to make a network node deliver local content. One or more functionalities may also be implemented as virtual application(s) in software that can run on a server.

A user device or user equipment may be a mobile station (MS) such as a mobile phone or smart phone or multimedia device, a computer, such as a tablet, provided with wireless communication capabilities, personal data or digital assistant (PDA) provided with wireless communication capabilities, portable media player, digital camera, pocket video camera, navigation unit provided with wireless communication capabilities or any combinations thereof. The LO application may operate on hardware of the UE.

In some embodiments, an apparatus, such as a server or a base station, may include means for carrying out embodiments described above in relation to FIGS. 1-15 and 17. In certain embodiments, at least one memory including computer program code can be configured to, with the at least one processor, cause the apparatus at least to perform any of the processes described herein.

A processor 610 may be embodied by any computational or data processing device, such as a central processing unit (CPU), digital signal processor (DSP), application specific integrated circuit (ASIC), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), digitally enhanced circuits, or comparable device or a combination thereof. The processors may be implemented as a single controller, or a plurality of controllers or processors.

For firmware or software, the implementation may include modules or unit of at least one chip set (for example, procedures, functions, and so on). A memory 620 may independently be any suitable storage device, such as a non-transitory computer-readable medium. A hard disk drive (HDD), random access memory (RAM), flash memory, or other suitable memory may be used. The memories may be combined on a single integrated circuit as the processor, or may be separate therefrom. Furthermore, the computer program instructions may be stored in the memory and which may be processed by the processors can be any suitable form of computer program code, for example, a compiled or interpreted computer program written in any suitable programming language. The memory or data storage entity is typically internal but may also be external or a combination thereof, such as in the case when additional memory capacity is obtained from a service provider. The memory may be fixed or removable.

The memory and the computer program instructions may be configured, with the processor for the particular device, to cause a hardware apparatus such as a base station, a server, or a UE, to perform any of the processes described above (see, for example, FIGS. 1-15 and 17). Therefore, in certain embodiments, a non-transitory computer-readable medium may be encoded with computer instructions or one or more computer program (such as added or updated software routine, applet or macro) that, when executed in hardware, may perform a process such as one of the processes described herein. Computer programs may be coded by a programming language, which may be a high-level programming language, such as objective-C, C, C++, C#, Java, etc., or a low-level programming language, such as a machine language, or assembler. Alternatively, certain embodiments may be performed entirely in hardware.

Furthermore, certain embodiments may be provided with a variety of configurations for communication. For example, the UE may be configured for device-to-device, machine-to-machine, or vehicle-to-vehicle communication.

FIG. 18 illustrates an overview of the multi-operator multi-connectivity according to certain embodiments. In certain embodiments, 5G UE 1810 may download LO network access information in order to gain access to the LO network. For example, the application layer of the UE may receive the LO network access information, and provide assistance for secure cell selection and/or access. In some embodiments, the existing IO SIM may be used for downloading the access information.

In order to download the network information, an IP connection may be established between 5G UE 1810 and IO-5G NB 1820. Before an IP connection may be established, however, an IP address may be exchanged between the 5G UE 1810 and IO-Core network through the IO-5G NB 1820. The IP address may be exchanged upon the authentication of 5G UE 1810 by IO-5G NB 1820. In some embodiments, credentials within the existing IO network access credentials 1860, or alternatively a provisioning network access credentials, for example virtual SIM 1870, may be used for authentication, at which point the 5G UE 1810 may be directed to the LO Application Server, which may be located in LO-5G NB 1830. As can be seen in FIG. 18, IO-5G NB 1820 may use credentials received from IO Network access credentials 1860 to communicate with IO core network 1840 to authenticate 5G UE 1810. Alternatively, or in addition to, IO-5G NB 1820 may use credentials received from IO Network access credentials 1860 to communicate with provisioning server 1850 via IO core network 1840 to authenticate 5G UE 1810. In other words, provisioning server 1850 may send 5G UE 1810 LO access related information based on credentials presented in IO network access credentials 1860.

Once the redirection to the LO Application Server occurs, an application layer authentication may occur, and access credentials may be provided to 5G UE 1810. For example, the access credentials may be in accordance with embedded universal integrated circuit card (eUICC) or integrated UICC (iUICC) provisioning. Because the download may be authorized by the application layer, the redirect to the provisioning server may authenticate the user by its application layer login information.

Cell selection criteria may include various identifications that can be used by 5G UE 1810 to determine whether to select and/or access LO-5G NB 1830. The criteria may include, for example, PLMN IDs or other application related IDs or random access channel preambles. The IDs may be provided by the LO application layer, based on the dynamic information available from the LO cloud application server, as described above. Cell selection may account for location and/or previous history information of the UE, which may be stored in the UE application. The location history may allow the UE to better select a cell with which to connect. In one example, the UE may be able to use the location history information to recognize a home network. For example, if a UE is at the same location every night, the application may deem this location to be a home network.

In addition, the cell selection and/or access may depend on the device used. A user may have multiple devices that may be activated at different times and/or locations. For example, the user may have a home subscription, a work place subscription, and a normal operator subscription, which may simply involve the use of a 5G network. The subscription may indicate the relationship that the user has with the IO or LO, which may be location dependent, such as home or office, or quality of service dependent, for example, gold, silver or bronze. The connectivity to a cell and/or the selection of a cell may depend on available network bandwidth. In some embodiments, the user may have a guaranteed bandwidth rate (GBR) that may be taken into consideration when selecting and/or accessing a LO network.

In certain embodiments, the LO may be a combination of multiple service providers, with cell selection and access provisioned by a single access provider. The LO network may be chosen based on the radio access information, such as load conditions, user contact information, regulatory constraints, and/or subscriber status. The load conditions may provide access information to the LO network having the lowest load and/or providing for load conditions that support the best QoS. User contact information, for example, may be a certain level of subscription of the UE that may determine how much access the UE may be granted by the LO. A different charge may be assessed for each level of subscription.

Some embodiments allow for fast, easy service provisioning to an end user by a LO, without cumbersome dealings with an IO. The LOs may in certain embodiments merely have to obtain access to the spectrum before deploying their services, which may make it easier to deploy localized networks in a cost efficient manner The services provided by the LO, for example, may include virtual reality centers, high-performance gaming arenas, football arenas where the fans can view the games wearing augmented reality devices, or any other form of entertainment. Such services may be aided by deploying networks that are tailored to specific services being offered, which could even operate independently from the IO network.

Fast deployment and easy access to the end users, potentially without geographic limitations of their home IO network, may achieve significant improvements to the functioning of both the UE and the network itself LO networks may also for high-speed mobile internet access for roaming users. The charging and/or authentication may be provided by a provisioning server maintained by a third-party access provider, in the form of an application installed in the UE.

In certain embodiments, the UE may have a soft SIM or virtual SIM (V-SIM) that may be downloadable and/or installable within the UE. A soft or V-SIM may be employed on at least one processor and/or at least one memory located in the UE, and may provide similar functionality as an IO SIM. Similar to the IO SIM, the V-SIM may be used to authenticate the UE to a given LO network. Alternatively, the UE may be pre-provisioned with USIM applications for the area in which the UE may be located. Some embodiments may include one or more virtual SIMs, which may share a common baseband and may work in virtual shifts. Multiple virtual SIMs may be used to provide the best service for the UE depending on the needs of the application layer, such as SMS, data amount, and/or round trip times.

FIG. 19 illustrates a signal flow diagram according to certain embodiments. Similar to FIG. 18, 5G UE 1910 may have a secure credential storage that holds IO network access credentials 1930, for example an IO SIM, that may include credentials that are used by the IO core network 1940 to authenticate 5G UE 1910. IO-5G NB may use credentials received from the secure credential storage 1930 to communicate with IO core network 1940 to authenticate 5G UE 1910. In some embodiment, IO network 1940 may communicate with provisioning server 1950 to aid in the authentication of 5G UE 1910.

In other embodiments, 5G UE 1910 may have provisioning network access credentials that may take the form of a soft-SIM or V-SIM 1920. As opposed to having to go through IO core network 1940, V-SIM 1920 may directly communicate with provisioning server 1950 for authentication. The provisioning server may be collocated with a cloud application server, or may be any other server, that includes the LO user subscription information to which the V-SIM could communicate for authentication. In other words, the LO application may provide the soft or virtual SIM with the information needed to access the LO. Credentials located within V-SIM 1920 may then be used by 5G UE 1910 access and exchange authentication information with a virtual reality network 1960, a home network 1970, and/or a residential network 1980. In other words, provisioning server 1950 may send UE 1910 LO access related information based on provisioning network access credentials presented in V-SIM 1920. Networks 1960, 1970, and/or 1980 may be special use LOs. In some embodiments, therefore, V-SIM 1920 may provide for the benefits of other secure credential storage, without having to coordinate between the LOs and IOs. 5G UE 1910 may therefore connect to a multitude of networks, not limited to the IO network alone.

The UE, in certain embodiments, may decide when to apply the information to connect to the network. This decision by the UE may be based on assistance information provided to the UE by the LO application. In other embodiments, the decision of whether to apply the information to connect to the network may be based on implementation specific measurements conducted by the UE. For example, the UE may use historical location information or fingerprint information. Fingerprint information may, for example, include reference signal received power (RSRP). Historical location information may indicate where the user has been, and can be used to determine where the user may likely go. Other embodiments may utilize WLAN service set identifiers (SSID), global positioning system (GPS) information, or any other information.

The decision of when to apply the cell access information using the virtual or soft SIM may also be used to fetch the cell access information needed in order to enable the access to the LO network. In certain embodiments, there may be different access credentials required for different LO network operators. FIG. 20 illustrates a signal flow diagram according to certain embodiments. In step 2010, UE 2001 may connect to LO application server 2004 through IO network 2002 and the secure credential storage that holds IO network access credentials, such as IO SIM. In other embodiments, UE 2001 may connect to LO application server 2004 using provisioning network access credentials that may be stored in a soft or virtual SIM. UE 2001 may then receive LO access credentials and connectivity assistance information, as shown in step 2020. UE 2001 may search for LO network 2003 based on the received assistance information, as shown in step 2030, and detect LO network 2003, as shown in step 2040. As discussed above, before UE 2001 connects to the LO network 2003, UE 2001 may decide whether or not to connect to the LO network.

The decision on whether or not to connect to LO network 2003, as well as when to connect to the LO network, may be based on specific measurements conducted by UE 2001, such as historical location information, fingerprint information, WLAN SSIDs and signal strength information, LO network load information and/or GPS location information. The decision by UE 2001 may also be based on the QoS factors, such as the ability of the LO to provide the user with a minimum or guaranteed bandwidth rate. In step 2050, UE 2001 may connect to the LO network 2003 using operator-specific access credentials. Once connected, UE 2001 may engage in data communication with both the LO network 2003 and the IO network 2002.

In some other embodiments, the UE may consider spectral resources of the LO network when accessing the network. The spectral resources, for example, may depend on the location dependent and/or time-varying, which depends on the regulatory constraints applicable in the area where the network is deployed. FIG. 21 illustrates a signal flow diagram according to certain embodiments. In step 2110, there may be a tight interworking between spectrum access server (SAS) 2105, which provides spectral resource information and LO application server 2104. SAS may be used to provide dynamic updates related to the access credentials and other information, while connecting to the LO network 2103. For example, the updates may relate to time-dependent spectral information. In some embodiments, therefore, the network information received by the client part of the application located at the UE may originate at the SAS.

In step 2120, UE 2101 may connect LO application server 2105 through the IO network 2102 or through secure credential storage, such as SIM. In other embodiments, UE 2101 may connect to LO application server 2104 using provisioning network access credentials presented in via a soft or virtual SIM. UE 2101 may then receive access credentials and connectivity assistance information, as shown in step 2130. The connectivity assistance information may include information received at LO application server 2104 from the spectrum access server 2105. For example, the connectivity assistance information may include time-dependent spectrum information from SAS. The remaining steps 2140, 2150, 2160, and 2170, may be similar to steps 2030, 2040, 2050, and 2060, respectively, in FIG. 20.

Certain embodiments may account for event specific access. For example, a conference or event organizer may provide registered attendees with the option to download the LO application to the UE, while registering for a conference or an event. This may, in some embodiment, be similar to a conference or event organizer providing WLAN login credentials to registered attendees of the event. The connectivity at the event may be provided using the LO network, to which access may be dynamically provisioned through the application.

In certain embodiments, various access differentiation based on different classes to the LO network may be provided to the attendees based on their registration type. For example, gold, silver, and bronze patrons, which may represent different level of registration for the event, may receive different access credentials. In addition, the organizer of the event may receive separate access credentials as well. The differing access credentials may be provided through the LO application, and may provide the UE with different QoS levels depending on the registration type.

In some embodiments, a third party access provider may want to offer users their own local LTE network, as a replacement for the personalized WLAN that many users own. The LO application may use the access credentials provided by the third party access provider. In other words, the UE would have a soft or virtual SIM, as shown in FIG. 19, which may redirect the UE to the server of the third party access provide for authentication and/or authorization of the UE. The server of the third party access provider may then verify the access credentials for the operator, and grant access and/or assign security credentials that allow the UE to connect to the network.

In certain embodiments, air interface security may have limited impact on the third party being used to facilitate the UE connection to the network. In order for the third party server to be able to communicate with the network, the third party server may be authenticated. The third party server may obtain an IP address from the network, undergo a successful authentication, and then facilitate the user gaining authorization to the LO network as well. The authentication method described above include the server of the third party access provider verifying the access credentials for the operator, and granting access and/or assigning security credentials that allow the UE to connect to the network.

If not available, network access information may be downloaded using the existing secure credential storage, such as an IO SIM. In other embodiments, the network access information may be received, for example when scanning a code from a screen of a user equipment where a user has logged in. In order to properly download network access information, an IP connection may be used. Before the IP connection may be established, however, an IP address authentication may occur. The authentication may be done via the existing secure credential storage, such as IO SIM or provisioning SIM. In other words, an IP address of the client part of the application may be authenticated using network access credentials or provisioning network access credentials received from a secure credential storage.

Once authentication occurs, the client part may be redirected and connected to the LO Application server. An application layer authentication may take place at the LO Application server, and network access credentials may be provided to the client part of the application. In some embodiments, the received network access credentials may be received at the user equipment via eUICC provisioning.

In some embodiments, the download of network access information may be authorized on the application layer. In other words, the client part is redirected to the provisioning server, and the user is then authenticated by its application layer log-in. Communication is therefore facilitated at the user equipment in which the client part of the application resides using the upper application layer and the lower layer, for example a baseband and a secure credential storage.

FIG. 22 illustrates a flow diagram according to certain embodiments. In particular, FIG. 22 illustrates UE operations in a multi-operator, multi-connectivity environment. The multi-operator, multi-connectivity environment may include the incumbent/main operator and/or the local/micro operators. In step 2210, the user equipment may move around within a network. The UE may then check a LO application for location and/or presence of the LO network, as shown in step 2220. If an LO network is detected, the UE may determine whether or not the UE has connectivity access information for the LO network, as shown in step 2230. If no connectivity access information is detected, as shown in step 2240, the UE may download secure access information from the LO server.

When the UE does have connectivity access information, the UE may search for and detect LO network, as shown in step 2250. If no LO network is detected, the UE may continue to search for the LO network. However, if the network is detected, the UE LO application may check the suitable or available LO network connectivity, as shown in step 2260, using event specific access and/or specific measurements conducted by the UE. In other embodiments, the user of the UE LO application may check and/or choose an available LO network. In step 2270, the UE may connect to the LO network in a secure manner The UE may engage in multi-operator, multi-connectivity with both the IO and the LO, as shown in step 2280, as well as in FIGS. 2 and 18.

FIG. 23 illustrates a flow diagram according to certain embodiments. In particular, FIG. 23 may illustrate a client part of the application located, for example, in a UE. In step 2310, the client part of the application located in the user equipment may monitor whether the network information has been received from the server part of the application. In step 2320, the client part of the application may provide the server part of the application credentials from a secure credential storage, such as a provisioning subscriber identity module, virtual subscriber identity module, or a soft subscriber identity module. The credentials provided by the client part may be used to authenticate the client part of the application. In some embodiments, an IP address of the client part of the application may be authenticated using network access credentials or provisioning network access credentials received from a secure credential storage.

In certain embodiments, the client part of the application may be authenticated on an application layer using network access credentials from an embedded universal integrated circuit card. The application layer of the client part provides network information to a lower layer of a user equipment in which the client part of the application is located. In step 2330, the client part of the application may control a lower layer, for example a cellular radio layer, such that the cellular radio layer interworks with the second network based on the received network information. The client part and the server part of the application may then connect via the second network.

FIG. 24 illustrates a flow diagram according to certain embodiments. In particular, FIG. 24 may illustrate a server part of the application located in an LO application server. In step 2410, the server part of the application may receive network access information from the SAS. In step 2420, the server part of the application may authenticate an IP address of the client part of the application before providing the client part of the application the network information. In some embodiments, the client part of the application may be authenticated using credentials from a virtual or soft subscriber identity module. In other words, authentication may in part depend on network access credentials or provisioning network access credentials received from a secure credential storage at the user equipment. Once authenticated, the server part of the application may provide the client part of the application network information, as shown in step 2430. The network information may then be used to connect the client part and the server part of the application.

FIG. 25 illustrates a flow diagram according to certain embodiments. In particular, FIG. 25 may illustrate an IO 5G-NB or any other IO network node. In step 2510, the IO network node or base station may receive credentials from a client part of the application, and forward credentials to a server part of the application, as shown in step 2520. In step 2530, the IO network node or base station may authenticate a IP address of the client part of the application. The authentication may occur either before or after the IO network node or base station receives network information from the server part of the application, as shown in step 2540. Authentication of the client part of the application may occur on an application layer. While in some embodiments the authentication may occur in the IO network node or base station, in other embodiments the authentication may occur in the server part of the application.

Once the client part of the application has been authenticated, and once the network information has been received by the IO network node or base station, the network information may be transmitted to the client part of the application, as shown in step 2550. The network information may be related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

Some of above embodiments describe that the LO network may be used for some dedicated, specialized services, while the IO network may be a more general purpose network. However, the services which may be offered via each of these networks are not limited in any way. For example, LO network may offer telephone services, or IO network may offer real-time gaming Embodiments of the invention may be employed not only in 3GPP networks, such as LTE, LTE-A, 5G, but also in other radio networks where the terminals may access one or more networks simultaneously.

One piece of information may be transmitted in one or plural messages from one entity to another entity. Each of these messages may comprise additional or different pieces of information. Names of network elements, protocols, and methods are based on current standards. In other embodiment utilizing other technologies, the names of these network elements and/or protocols and/or methods may be different, as long as they provide a corresponding functionality. A terminal may be any device which may connect to the respective network. For example, a terminal may be a UE, a mobile phone, a laptop, a smartphone, and/or a machine-type communication device.

If not otherwise stated or otherwise made clear from the context, the statement that two entities are different may means that they perform different functions. It does not necessarily mean that they are based on different hardware. That is, each of the entities described in the present description may be based on a different hardware, or some or all of the entities may be based on the same hardware. It does not necessarily mean that they are based on different software. That is, each of the entities described in the present description may be based on different software, or some or all of the entities may be based on the same software. Embodiments of the invention may be employed fully or partly in the cloud, wherein a resource (e.g. processor, software, memory, network) for the respective task may be shared with other applications.

According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example a base station such as a NodeB, a eNodeB, or a 5G NB, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s). According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example a terminal such as a UE, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s). According to the above description, it should thus be apparent that example embodiments of the present invention provide, for example an application server or a server part of an application, or a component thereof, an apparatus embodying the same, a method for controlling and/or operating the same, and computer program(s) controlling and/or operating the same as well as mediums carrying such computer program(s) and forming computer program product(s).

Implementations of any of the above described blocks, apparatuses, systems, techniques, means, entities, units, devices, or methods include, as non-limiting examples, implementations as hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, a virtual machine, or some combination thereof. It should be noted that the description of the embodiments is given by way of example only and that various modifications may be made without departing from the scope of the invention as defined by the appended claims.

The features, structures, or characteristics of certain embodiments described throughout this specification may be combined in any suitable manner in one or more embodiments. For example, the usage of the phrases “certain embodiments,” “some embodiments,” “other embodiments,” or other similar language, throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present invention. Thus, appearance of the phrases “in certain embodiments,” “in some embodiments,” “in other embodiments,” or other similar language, throughout this specification does not necessarily refer to the same group of embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the invention.

Partial Glossary 3GPP 3rd Generation Partnership Project 5G 5th Generation 5G NB NodeB of 5th Generation App Application CN Core Network EPC Evolved Packet Core GPS Global Positioning System ID Identification IO Incumbent Operator IoT Internet of Things LO Local Operator LTE Long Term Evolution LTE-A LTE Advanced MC Multi-Connectivity NW Network OS Operating System P-GW Packet Data Network Gateway PLMN Public Land Mobile Network QCI QoS Class Identifier QoS Quality of Service RAP Radio Access Point RAT Radio Access Technology SIB System Information Block SIM Subscriber Identity Module TFT Traffic Flow Templates UE User Equipment UICC Universal Integrated Circuit Card USIM Universal Subscriber Identity Module WLAN Wireless Local Area Network

Claims

1. An apparatus comprising:

at least one processor; and
at least one memory including computer program code,
wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:
monitor if network information from a server part of an application is received by a client part of the application, wherein the client part is connected to the server part via a first network that uses a radio access technology, wherein the network information is related to a second network that uses the radio access technology, the second network being different from the first network; and
control a cellular radio layer such that the cellular radio layer interworks with the second network based on the received network information.

2. The apparatus according to claim 1, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:

access the second network via the cellular radio layer when the network information comprises a request to connect the client part of an application to the server part of an application via the second network; and
connect the client part to the server part via the second network after the accessing of the second network.

3. The apparatus according to claim 1, wherein the at least one processor, with the at least one memory and the computer program code, is configured to cause the apparatus to at least access the second network via the cellular radio layer using an access parameter of the second network, wherein the network information comprises the access parameter of the second network.

4. The apparatus according to claim 2, wherein the at least one processor, with the at least one memory and the computer program code, is configured to cause the apparatus to at least authenticate a user of the client part of the application to the second network using credentials, wherein the client part is authenticated to the application by credentials, and the user is authenticated to the first network by user information different from the credentials.

5. The apparatus according to claim 1, wherein the at least one processor, with the at least one memory and the computer program code, is configured to cause the apparatus to at least:

provide the server part of the application credentials from a virtual subscriber identity module or soft subscriber identity module, wherein the credentials are used to authenticate the client part of the application.

6. The apparatus according to claim 1, wherein an internet protocol address of the client part of the application is authenticated using network access credentials or provisioning network access credentials received from a secure credential storage.

7. The apparatus according to claim 1, wherein the client part of the application is authenticated on an application layer using network access credentials from an embedded universal integrated circuit card.

8. The apparatus according to claim 7, wherein application layer of the client part provides network information to a lower layer of a user equipment in which the client part of the application is located.

9. The apparatus according to claim 1, wherein the received network information originates at a spectrum access server.

10. The apparatus according to claim 1, wherein the at least one processor, with the at least one memory and the computer program code, is configured to cause the apparatus to at least:

determine at the client part of the application whether to access the second network based on cell selection criteria, wherein the cell selection criteria comprises at least one of an identification of the second network, location history of a user equipment in which the client part of the application is located, a type of the user equipment, or a subscription of a user of the client part of the application.

11. The apparatus according to claim 1, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:

download the network information at a user equipment to a virtual subscriber identity module or a soft subscriber identity module.

12. An apparatus comprising:

at least one processor; and
at least one memory including computer program code,
wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:
provide, by a server part of an application, network information to a client part of the application via a first network using a radio access technology,
wherein the network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

13. The apparatus according to claim 12, wherein the network information comprises at least one of an access parameter of the second network or a request to connect the client part to the server part via the second network.

14. The apparatus according to claim 12, wherein the network information is provided to a virtual subscriber identity module or a soft subscriber identity module of the user equipment.

15. The apparatus according to claim 12, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:

authenticate the client part of the application server using credentials from a virtual or soft subscriber identity module.

16. The apparatus according to claim 12, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:

receive network information at the server part of the application server from a spectrum access server.

17. The apparatus according to claim 12, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:

authenticate an internet protocol address of the client part of the application before providing the client part of the application the network information, wherein the authentication depends in part on credentials received from the client part of the application.

18. The apparatus according to claim 17, wherein the credentials are network access credentials or provisioning network access credentials received from a secure credential storage

19. The apparatus according to claim 17, wherein the authentication of the internet protocol address occurs in an application layer.

20. An apparatus comprising:

at least one processor; and
at least one memory including computer program code,
wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least:
receive at a base station user credentials from a client part of an application via a first network using a radio access technology;
forward the user credentials to a server part of the application;
receive network information from the server part of the application based on the forwarded user credentials; and
transmit the network information from the base station to the client part of an application, wherein the network information is related to a predetermined second network that uses the radio access technology, the second network being different from the first network.

21. The apparatus according to claim 20, wherein the at least one processor, with the at least one memory and the computer program code, are configured to cause the apparatus to at least further comprising:

authenticate an internet protocol address of the client part of the application using network access credentials or provisioning network access credentials received from a secure credential storage at a user equipment, and
wherein the network information is transmitted to the client part of the application after authentication of the internet protocol address.
Patent History
Publication number: 20180041897
Type: Application
Filed: Nov 11, 2016
Publication Date: Feb 8, 2018
Inventors: Athul PRASAD (Helsinki), Silke HOLTMANNS (Klaukkala), Zexian LI (Espoo), Mikko Aleksi UUSITALO (Helsinki)
Application Number: 15/349,423
Classifications
International Classification: H04W 12/06 (20060101); H04W 12/08 (20060101); H04W 8/18 (20060101); H04W 4/00 (20060101);