US20240022885A1 - Interface of an m2m server with the 3gpp core network - Google Patents
Interface of an m2m server with the 3gpp core network Download PDFInfo
- Publication number
- US20240022885A1 US20240022885A1 US18/352,408 US202318352408A US2024022885A1 US 20240022885 A1 US20240022885 A1 US 20240022885A1 US 202318352408 A US202318352408 A US 202318352408A US 2024022885 A1 US2024022885 A1 US 2024022885A1
- Authority
- US
- United States
- Prior art keywords
- sgsn
- server
- interface
- request
- send
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 92
- 238000004891 communication Methods 0.000 description 75
- 230000001413 cellular effect Effects 0.000 description 27
- 230000004913 activation Effects 0.000 description 26
- 238000007726 management method Methods 0.000 description 21
- 230000004044 response Effects 0.000 description 21
- 238000005516 engineering process Methods 0.000 description 18
- 230000009849 deactivation Effects 0.000 description 15
- 230000006870 function Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 239000013598 vector Substances 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 230000011664 signaling Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 101150014732 asnS gene Proteins 0.000 description 4
- 241000760358 Enodes Species 0.000 description 3
- 238000013475 authorization Methods 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000004846 x-ray emission Methods 0.000 description 3
- 229910001416 lithium ion Inorganic materials 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- QELJHCBNGDEXLD-UHFFFAOYSA-N nickel zinc Chemical compound [Ni].[Zn] QELJHCBNGDEXLD-UHFFFAOYSA-N 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 2
- HBBGRARXTFLTSG-UHFFFAOYSA-N Lithium ion Chemical compound [Li+] HBBGRARXTFLTSG-UHFFFAOYSA-N 0.000 description 1
- 241000700159 Rattus Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000004873 anchoring Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- OJIJEKBXJYRIBZ-UHFFFAOYSA-N cadmium nickel Chemical compound [Ni].[Cd] OJIJEKBXJYRIBZ-UHFFFAOYSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 239000000446 fuel Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 229910052987 metal hydride Inorganic materials 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- -1 nickel metal hydride Chemical class 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1063—Application servers providing network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
Definitions
- Machine type communication or alternately machine to machine (M2M) communication
- MTC Machine type communication
- Respective communication networks may include any number of MTC capable devices.
- Metering devices or tracking devices may be examples of MTC devices.
- UE user equipment
- MS Mobile Station
- WTRU Wireless Transmit/Receive Unit
- Machine type communications may use an MTC Server, which may alternately be referred to as an M2M Server.
- a M2M server may collect data or control information from MTC devices.
- a M2M server may also send data and other information to M2M devices.
- MTC devices may communicate via 3GPP networks such as Long Term Evolution (LTE) networks, Universal Mobile Telecommunication System (UMTS) networks, Worldwide Interoperability for microwave Access (WiMAX) networks, and the like.
- LTE Long Term Evolution
- UMTS Universal Mobile Telecommunication System
- WiMAX Worldwide Interoperability for microwave Access
- a cellular network node for example a Serving General Packet Radio Service (GPRS) Support Node (SGSN), may communicate with an M2M server.
- the cellular network node may receive subscriber data and control data.
- the control data may facilitate a network control procedure and the subscriber data may identify a device involved in the network control procedure.
- Example network control procedures may include network attach procedures, network detach procedures, authentication procedures, security mode procedures, Packet Data Protocol (PDP) context procedures, location area update procedures, routing area update procedures, tracking area update procedures, or the like.
- PDP Packet Data Protocol
- the cellular network node may determine that the device involved in the network control procedure is a machine to machine device based on the subscriber data.
- the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN.
- the cellular network node may also send the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server.
- the dedicated interface may be called a GM2M interface.
- the dedicated interface may be a logical interface internal to the network node.
- the M2M server may request control data such as the current status of a M2M device.
- the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like.
- the control data may be based on mobility control information or connection control information.
- the request for control data may be sent to a cellular network node via the GM2M interface.
- the cellular network node may initiate a network control procedure based on the request from the M2M server.
- the cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
- FIG. 1 A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented;
- FIG. 1 B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated in FIG. 1 A ;
- WTRU wireless transmit/receive unit
- FIG. 10 is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1 A ;
- FIG. 1 D is a system diagram of another example radio access network and another example core network that may be used within the communications system illustrated in FIG. 1 A ;
- FIG. 1 E is a system diagram of another example radio access network and another example core network that may be used within the communications system illustrated in FIG. 1 A ;
- FIG. 2 illustrates an example embodiment of a 3GPP network including an integrated M2M server
- FIG. 3 illustrates an example communication protocol stack for communication of a GM2M interface
- FIG. 4 illustrates an example M2M device attach procedure in accordance with an embodiment
- FIG. 5 illustrates an example M2M device routing area update procedure in accordance with an embodiment
- FIG. 6 illustrates an example M2M device initiated Packet Data Protocol (PDP) context activation procedure in accordance with an embodiment
- FIG. 7 illustrates an example M2M device detach procedure in accordance with an embodiment
- FIG. 8 illustrates an example authentication and cyphering procedure in accordance with an embodiment
- FIG. 9 illustrates an example security mode procedure in accordance with an embodiment
- FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment
- FIG. 11 illustrates an example network initiated PDP context activation procedure in accordance with an embodiment.
- FIG. 1 A is a diagram of an example communications system 100 in which one or more disclosed embodiments may be implemented.
- the communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users.
- the communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth.
- the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like.
- CDMA code division multiple access
- TDMA time division multiple access
- FDMA frequency division multiple access
- OFDMA orthogonal FDMA
- SC-FDMA single-carrier FDMA
- the communications system 100 may include wireless transmit/receive units (WTRUs) 102 a , 102 b , 102 c , and/or 102 d (which generally or collectively may be referred to as WTRU 102 ), a radio access network (RAN) 103 / 104 / 105 , a core network 106 / 107 / 109 , a public switched telephone network (PSTN) 108 , the Internet 110 , and other networks 112 , though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements.
- WTRUs wireless transmit/receive units
- RAN radio access network
- PSTN public switched telephone network
- Each of the WTRUs 102 a , 102 b , 102 c , 102 d may be any type of device configured to operate and/or communicate in a wireless environment.
- the WTRUs 102 a , 102 b , 102 c , 102 d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.
- UE user equipment
- PDA personal digital assistant
- the communications systems 100 may also include a base station 114 a and a base station 114 b .
- Each of the base stations 114 a , 114 b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102 a , 102 b , 102 c , 102 d to facilitate access to one or more communication networks, such as the core network 106 / 107 / 109 , the Internet 110 , and/or the networks 112 .
- the base stations 114 a , 114 b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 114 a , 114 b are each depicted as a single element, it will be appreciated that the base stations 114 a , 114 b may include any number of interconnected base stations and/or network elements.
- BTS base transceiver station
- AP access point
- the base station 114 a may be part of the RAN 103 / 104 / 105 , which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc.
- BSC base station controller
- RNC radio network controller
- the base station 114 a and/or the base station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown).
- the cell may further be divided into cell sectors.
- the cell associated with the base station 114 a may be divided into three sectors.
- the base station 114 a may include three transceivers, i.e., one for each sector of the cell.
- the base station 114 a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
- MIMO multiple-input multiple output
- the base stations 114 a , 114 b may communicate with one or more of the WTRUs 102 a , 102 b , 102 c , 102 d over an air interface 115 / 116 / 117 , which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.).
- the air interface 115 / 116 / 117 may be established using any suitable radio access technology (RAT).
- RAT radio access technology
- the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like.
- the base station 114 a in the RAN 103 / 104 / 105 and the WTRUs 102 a , 102 b , 102 c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 115 / 116 / 117 using wideband CDMA (WCDMA).
- WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+).
- HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
- the base station 114 a and the WTRUs 102 a , 102 b , 102 c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115 / 116 / 117 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A).
- E-UTRA Evolved UMTS Terrestrial Radio Access
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- the base station 114 a and the WTRUs 102 a , 102 b , 102 c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 1.times., CDMA2000 EV-DO, Interim Standard 2000 (IS-2000). Interim Standard (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
- IEEE 802.16 i.e., Worldwide Interoperability for Microwave Access (WiMAX)
- CDMA2000 Code Division Multiple Access 2000
- CDMA2000 1.times. CDMA2000 EV-DO
- IS-2000 Interim Standard 2000
- IS-856 Interim Standard
- GSM Global System for Mobile communications
- EDGE Enhanced Data rates for GSM Evolution
- GERAN GSM EDGE
- the base station 114 b in FIG. 1 A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like.
- the base station 114 b and the WTRUs 102 c , 102 d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN).
- the base station 114 b and the WTRUs 102 c , 102 d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN).
- WPAN wireless personal area network
- the base station 114 b and the WTRUs 102 c , 102 d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell.
- a cellular-based RAT e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.
- the base station 114 b may have a direct connection to the Internet 110 .
- the base station 114 b may not be required to access the Internet 110 via the core network 106 / 107 / 109 .
- the RAN 103 / 104 / 105 may be in communication with the core network 106 / 107 / 109 , which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the WTRUs 102 a , 102 b , 102 c , 102 d .
- the core network 106 / 107 / 109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication.
- the RAN 103 / 104 / 105 and/or the core network 106 / 107 / 109 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 103 / 104 / 105 or a different RAT.
- the core network 106 / 107 / 109 may also be in communication with another RAN (not shown) employing a GSM radio technology.
- the core network 106 / 107 / 109 may also serve as a gateway for the WTRUs 102 a , 102 b , 102 c , 102 d to access the PSTN 108 , the Internet 110 , and/or other networks 112 .
- the PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS).
- POTS plain old telephone service
- the Internet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite.
- the networks 112 may include wired or wireless communications networks owned and/or operated by other service providers.
- the networks 112 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 103 / 104 / 105 or a different RAT.
- the WTRUs 102 a , 102 b , 102 c , 102 d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102 a , 102 b , 102 c , 102 d may include multiple transceivers for communicating with different wireless networks over different wireless links.
- the WTRU 102 c shown in FIG. 1 A may be configured to communicate with the base station 114 a , which may employ a cellular-based radio technology, and with the base station 114 b , which may employ an IEEE 802 radio technology.
- FIG. 1 B is a system diagram of an example WTRU 102 .
- the WTRU 102 may include a processor 118 , a transceiver 120 , a transmit/receive element 122 , a speaker/microphone 124 , a keypad 126 , a display/touchpad 128 , non-removable memory 130 , removable memory 132 , a power source 134 , a global positioning system (GPS) chipset 136 , and other peripherals 138 .
- GPS global positioning system
- the base stations 114 a and 114 b , and/or the nodes that base stations 114 a and 114 b may represent, such as but not limited to transceiver station (BTS), a Node-B, a site controller, an access point (AP), a home node-B, an evolved home node-B (eNodeB), a home evolved node-B (HeNB), a home evolved node-B gateway, and proxy nodes, among others, may include some or all of the elements depicted in FIG. 1 B and described herein.
- BTS transceiver station
- Node-B a Node-B
- AP access point
- eNodeB evolved home node-B
- HeNB home evolved node-B gateway
- proxy nodes among others, may include some or all of the elements depicted in FIG. 1 B and described herein.
- the processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like.
- the processor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment.
- the processor 118 may be coupled to the transceiver 120 , which may be coupled to the transmit/receive element 122 . While FIG. 1 B depicts the processor 118 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.
- the transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 114 a ) over the air interface 115 / 116 / 117 .
- a base station e.g., the base station 114 a
- the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals.
- the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example.
- the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
- the WTRU 102 may include any number of transmit/receive elements 122 . More specifically, the WTRU 102 may employ MIMO technology. Thus, in one embodiment, the WTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 115 / 116 / 117 .
- the transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122 .
- the WTRU 102 may have multi-mode capabilities.
- the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
- the processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit).
- the processor 118 may also output user data to the speaker/microphone 124 , the keypad 126 , and/or the display/touchpad 128 .
- the processor 118 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132 .
- the non-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device.
- the removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like.
- SIM subscriber identity module
- SD secure digital
- the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102 , such as on a server or a home computer (not shown).
- the processor 118 may receive power from the power source 134 , and may be configured to distribute and/or control the power to the other components in the WTRU 102 .
- the power source 134 may be any suitable device for powering the WTRU 102 .
- the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
- the processor 118 may also be coupled to the GPS chipset 136 , which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102 .
- location information e.g., longitude and latitude
- the WTRU 102 may receive location information over the air interface 115 / 116 / 117 from a base station (e.g., base stations 114 a , 114 b ) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
- the processor 118 may further be coupled to other peripherals 138 , which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity.
- the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth.RTM. module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
- FM frequency modulated
- FIG. 10 is a system diagram of the RAN 103 and the core network 106 according to an embodiment.
- the RAN 103 may employ a UTRA radio technology to communicate with the WTRUs 102 a , 102 b , 102 c over the air interface 115 .
- the RAN 103 may also be in communication with the core network 106 .
- the RAN 103 may include Node-Bs 140 a , 140 b , 140 c , which may each include one or more transceivers for communicating with the WTRUs 102 a , 102 b , 102 c over the air interface 115 .
- the Node-Bs 140 a , 140 b , 140 c may each be associated with a particular cell (not shown) within the RAN 103 .
- the RAN 103 may also include RNCs 142 a , 142 b . It will be appreciated that the RAN 103 may include any number of Node-Bs and RNCs while remaining consistent with an embodiment.
- the Node-Bs 140 a , 140 b may be in communication with the RNC 142 a . Additionally, the Node-B 140 c may be in communication with the RNC 142 b .
- the Node-Bs 140 a , 140 b , 140 c may communicate with the respective RNCs 142 a , 142 b via an lub interface.
- the RNCs 142 a , 142 b may be in communication with one another via an lur interface.
- Each of the RNCs 142 a , 142 b may be configured to control the respective Node-Bs 140 a , 140 b , 140 c to which it is connected.
- each of the RNCs 142 a , 142 b may be configured to carry out or support other functionality, such as outer loop power control, load control, admission control, packet scheduling, handover control, macrodiversity, security functions, data encryption, and the like.
- the core network 106 shown in FIG. 10 may include a media gateway (MGW) 144 , a mobile switching center (MSC) 146 , a serving GPRS support node (SGSN) 148 , and/or a gateway GPRS support node (GGSN) 150 . While each of the foregoing elements are depicted as part of the core network 106 , it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
- MGW media gateway
- MSC mobile switching center
- SGSN serving GPRS support node
- GGSN gateway GPRS support node
- the RNC 142 a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an luCS interface.
- the MSC 146 may be connected to the MGW 144 .
- the MSC 146 and the MGW 144 may provide the WTRUs 102 a , 102 b , 102 c with access to circuit-switched networks, such as the PSTN 108 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and traditional land-line communications devices.
- the RNC 142 a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface.
- the SGSN 148 may be connected to the GGSN 150 .
- the SGSN 148 and the GGSN 150 may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between and the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the core network 106 may also be connected to the networks 112 , which may include other wired or wireless networks that are owned and/or operated by other service providers.
- FIG. 1 D is a system diagram of the RAN 104 and the core network 107 according to an embodiment.
- the RAN 104 may employ an E-UTRA radio technology to communicate with the WTRUs 102 a , 102 b , 102 c over the air interface 116 .
- the RAN 104 may also be in communication with the core network 107 .
- the RAN 104 may include eNode-Bs 160 a , 160 b , 160 c , though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment.
- the eNode-Bs 160 a , 160 b , 160 c may each include one or more transceivers for communicating with the WTRUs 102 a , 102 b , 102 c over the air interface 116 .
- the eNode-Bs 160 a , 160 b , 160 c may implement MIMO technology.
- the eNode-B 160 a for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102 a.
- Each of the eNode-Bs 160 a , 160 b , 160 c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. 1 D , the eNode-Bs 160 a , 160 b , 160 c may communicate with one another over an X2 interface.
- the core network 107 shown in FIG. 1 D may include a mobility management gateway (MME) 162 , a serving gateway 164 , and a packet data network (PDN) gateway 166 . While each of the foregoing elements are depicted as part of the core network 107 , it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
- MME mobility management gateway
- PDN packet data network
- the MME 162 may be connected to each of the eNode-Bs 160 a , 160 b , 160 c in the RAN 104 via an S 1 interface and may serve as a control node.
- the MME 162 may be responsible for authenticating users of the WTRUs 102 a , 102 b , 102 c , bearer activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102 a , 102 b , 102 c , and the like.
- the MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
- the serving gateway 164 may be connected to each of the eNode-Bs 160 a , 160 b , 160 c in the RAN 104 via the S1 interface.
- the serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102 a , 102 b , 102 c .
- the serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102 a . 102 b , 102 c , managing and storing contexts of the WTRUs 102 a , 102 b , 102 c , and the like.
- the serving gateway 164 may also be connected to the PDN gateway 166 , which may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the PDN gateway 166 may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the core network 107 may facilitate communications with other networks.
- the core network 107 may provide the WTRUs 102 a , 102 b . 102 c with access to circuit-switched networks, such as the PSTN 108 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and traditional land-line communications devices.
- the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108 .
- the core network 107 may provide the WTRUs 102 a , 102 b , 102 c with access to the networks 112 , which may include other wired or wireless networks that are owned and/or operated by other service providers.
- IMS IP multimedia subsystem
- FIG. 1 E is a system diagram of the RAN 105 and the core network 109 according to an embodiment.
- the RAN 105 may be an access service network (ASN) that employs IEEE 802.16 radio technology to communicate with the WTRUs 102 a , 102 b , 102 c over the air interface 117 .
- ASN access service network
- the communication links between the different functional entities of the WTRUs 102 a , 102 b , 102 c , the RAN 105 , and the core network 109 may be defined as reference points.
- the RAN 105 may include base stations 180 a , 180 b , 180 c , and an ASN gateway 182 , though it will be appreciated that the RAN 105 may include any number of base stations and ASN gateways while remaining consistent with an embodiment.
- the base stations 180 a , 180 b , 180 c may each be associated with a particular cell (not shown) in the RAN 105 and may each include one or more transceivers for communicating with the WTRUs 102 a , 102 b , 102 c over the air interface 117 .
- the base stations 180 a , 180 b , 180 c may implement MIMO technology.
- the base station 180 a may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102 a .
- the base stations 180 a , 180 b , 180 c may also provide mobility management functions, such as handoff triggering, tunnel establishment, radio resource management, traffic classification, quality of service (QoS) policy enforcement, and the like.
- the ASN gateway 182 may serve as a traffic aggregation point and may be responsible for paging, caching of subscriber profiles, routing to the core network 109 , and the like.
- the air interface 117 between the WTRUs 102 a . 102 b , 102 c and the RAN 105 may be defined as an R 1 reference point that implements the IEEE 802.16 specification.
- each of the WTRUs 102 a , 102 b , 102 c may establish a logical interface (not shown) with the core network 109 .
- the logical interface between the WTRUs 102 a . 102 b , 102 c and the core network 109 may be defined as an R 2 reference point, which may be used for authentication, authorization, IP host configuration management, and/or mobility management
- the communication link between each of the base stations 180 a , 180 b , 180 c may be defined as an R 8 reference point that includes protocols for facilitating WTRU handovers and the transfer of data between base stations.
- the communication link between the base stations 180 a , 180 b , 180 c and the ASN gateway 182 may be defined as an R 6 reference point.
- the R 6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of the WTRUs 102 a , 102 b , 102 c.
- the RAN 105 may be connected to the core network 109 .
- the communication link between the RAN 105 and the core network 109 may defined as an R 3 reference point that includes protocols for facilitating data transfer and mobility management capabilities, for example.
- the core network 109 may include a mobile IP home agent (MIP-HA) 184 , an authentication, authorization, accounting (AAA) server 186 , and a gateway 188 . While each of the foregoing elements are depicted as part of the core network 109 , it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
- MIP-HA mobile IP home agent
- AAA authentication, authorization, accounting
- the MIP-HA may be responsible for IP address management, and may enable the WTRUs 102 a , 102 b , 102 c to roam between different ASNs and/or different core networks.
- the MTP-HA 184 may provide the WTRUs 102 a , 102 b , 102 c with access to packet-switched networks, such as the Internet 110 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and IP-enabled devices.
- the AAA server 186 may be responsible for user authentication and for supporting user services.
- the gateway 188 may facilitate interworking with other networks.
- the gateway 188 may provide the WTRUs 102 a , 102 b , 102 c with access to circuit-switched networks, such as the PSTN 108 , to facilitate communications between the WTRUs 102 a , 102 b , 102 c and traditional land-line communications devices.
- the gateway 188 may provide the WTRUs 102 a , 102 b , 102 c with access to the networks 112 , which may include other wired or wireless networks that are owned and/or operated by other service providers.
- the RAN 105 may be connected to other ASNs and the core network 109 may be connected to other core networks.
- the communication link between the RAN 105 the other ASNs may be defined as an R 4 reference point, which may include protocols for coordinating the mobility of the WTRUs 102 a , 102 b , 102 c between the RAN 105 and the other ASNs.
- the communication link between the core network 109 and the other core networks may be defined as an R 5 reference, which may include protocols for facilitating interworking between home core networks and visited core networks.
- M2M Servers may provide M2M services for M2M devices.
- an M2M server may send data to and receive data from an M2M device.
- the M2M server may collect control information or data regarding the M2M device that is generated or maintained by the 3GPP Core Network.
- Example control data may include, but is not limited to, mobility information (e.g., routing area information, location area information, tracking area information, etc.), connection information (e.g., PDP context information, IP address, other addressing information, network attach/detach data, etc.), security information (e.g., authentication information, cyphering information, security mode information, etc.), or any other information maintained or generated by a 3GPP core network.
- mobility information e.g., routing area information, location area information, tracking area information, etc.
- connection information e.g., PDP context information, IP address, other addressing information, network attach/detach data, etc.
- security information e.g., authentication information, cyphering information, security mode information, etc.
- a connection may be established between an M2M server and the cellular network node.
- the cellular network node may be a SGSN.
- the connection between the cellular network node and the M2M server may be a dedicated interface.
- the dedicated interface may be referred to herein as a GM2M interface.
- the GM2M interface may include a defined communications protocol stack. Control and/or data signals from an M2M device and an M2M server may be communicated via the dedicated interface.
- the cellular network node may determine that a device is a machine to machine device based on subscriber data.
- the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN.
- the APN may be received from another cellular network node, for example a HLR.
- Subscriber data may be other data which may be used to identify a machine to machine device.
- the cellular network node may store an indication that identifies the device as an M2M device.
- the indication may be used to determine that the device is an M2M device.
- the M2M server may request control data such as the current status of a M2M device.
- the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like.
- the control data may be based on mobility control information or connection control information.
- the request for control data may be sent to a cellular network node via the GM2M interface.
- the cellular network node may initiate a network control procedure based on the request from the M2M server.
- the cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
- the systems and methods disclosed herein may be described in relation to connecting an M2M Server to the SGSN of the 3GPP Core Network. However, the systems and methods disclosed herein may be applicable to other connection implementations. As such, use of the concepts described herein may not be limited to connections relating to the SGSN of the 3GPP Core Network.
- the interface may be between the M2M server and a GGSN.
- the dedicated interface may be between the M2M server and a MME in an LTE network.
- an SGSN may include one or more logical interfaces for communication with various network nodes and entities.
- Exemplary interfaces with the SGSN may include one or more of the following:
- FIG. 2 illustrates an exemplary 3GPP architecture including an M2M server 236 in accordance with an embodiment.
- M2M Server 236 (which may be referred to as A Machine Type Communication (MTC) Server) may be integrated with a 3GPP network.
- M2M server 236 may include an interface with SGSN 226 .
- the interface may be referred to as a GM2M interface.
- FIG. 2 illustrates how various network nodes and connected devices may communicate in a 3GPP network.
- M2M Device/GW 202 may be a WTRU capable of connecting to a 3GPP network.
- M2M Device/GW 202 may be a M2M device, such as a sensor reporting data.
- M2M Device/GW 202 may be a gateway collecting information from various M2M devices in order to relay data to the 3GPP network.
- M2M Device/GW 202 may include Generic Communication (xGC) interface 204 and Service Capability (SC) 206 .
- xGC 204 may be a communications interface that allows M2M Device/GW 202 to communicate with a variety of devices, gateways, and/or networks using different communications protocols.
- SC 206 may be may provide service functions that may be shared by different applications or devices. For example, SC 206 may provide application enablement, reachability/addressing/repository functionality for applications, remote entity management, security, data retention, transaction management, compensation brokerage (charging), and/or act as an interworking proxy. SC 206 may provide other European Telecommunications Standards Institute (ETSI) M2M service capabilities.
- ETSI European Telecommunications Standards Institute
- xGC 204 may be integrated as part of SC 206 .
- M2M Device/GW 202 may also include WiFi interface 208 , which may allow M2M Device/GW 202 to connect to WiFi networks.
- M2M Device/GW 202 may also include UMTS interface 210 , which may facilitate M2M Device/GW 202 to connect to UMTS networks.
- the UMTS interface is exemplary, and M2M Device/GW 202 may also include interfaces for LTE networks, WiMax networks and the like.
- M2M Device/GW 202 may be in communication with Femto Access Point (FAP) 212 .
- FAP 212 may be part of a radio access network (RAN) which provides M2M Device/GW 202 with radio access to a 3GPP network.
- RAN radio access network
- FAP 212 may include a Home NodeB or may include a traditional NodeB.
- FAP 212 may include other nodes which facilitate radio access to a 3GPP network.
- FAP 212 may include NodeB 214 and Radio Network Controller 216 .
- NodeB 214 and Radio Network Controller 216 may be part of a RAN for a UMTS network.
- NodeB 214 may communicate with RNC 216 via an Iub interface.
- FAP 212 may communicate with Home NodeB (HNB) Gateway (GW) 218 , for example via an luh interface.
- HNB GW 218 may act as a gateway between FAP 212 and the core network (CN) of a 3GPP system.
- CN core network
- HNB GW 218 may communicate with a 3GPP CN via an Iu interface.
- HNB GW 218 may communicate with Circuit-Switched CN 220 via an lucs interface.
- HNB GW 218 may communicate with Packet-Switched CN 224 via an lups interface.
- CS CN 220 and PS CN 224 may be logical partitions of a 3GPP CN.
- CS CN 229 may include MSCNLR 222 .
- MSCNLR 222 may provide support for CS functionality for M2M Device/GW 202 .
- PS CN 224 may include SGSN 226 .
- SGSN 226 may facilitate the delivery of data packets to and from WTRUs within a geographical or network service area. SGSN 226 may route and transfer packets, provide mobility management functionality, provide logical link management, authenticate WTRUs, provide fee charging services (such as billing user data), and the like.
- PSN CN 224 may include GGSN 228 .
- GGSN 228 may facilitate operative communication between a 3GPP network and external networks such as the Internet and X.25 networks.
- GGSN 228 may communicate with Packet Data Network (PDN) 232 , for example via a Gi interface.
- PDN 232 may be any packet-based communication network.
- PDN 232 may provide M2M Network Application (App) 234 with a packet-based communication link for communication with PS CN 224 .
- M2M Network App 234 may be an application being executed by a computing device which is meant to communicate with M2M Device/GW 202 and/or M2M Server 236 .
- M2M Network App 234 may communicate with PDN 232 via an mla interface, and may use various communication protocols such as a Constrained Application Protocol (CoAp), a Hypertext Transfer Protocol (HTTP), a Session Initiation Protocol (SIP), and/or the like.
- PS CN 224 may also include HLR 230 , which may store location information and user profile information for devices in communication with the 3GPP network. The user profile information may be an example of subscriber data.
- M2M Server 236 may include Network Generic Communication (NGC) interface 240 and Network Applications Enablement (NAE) function 238 .
- NAE 238 may serve as a contact point for M2M applications within the network.
- CS CN 220 , PS CN 224 , and M2M Server 236 may be part of an operator owned network.
- GM2M may be a logical interface between SGSN 226 and M2M Server 236 .
- Control data and/or user data from M2M Device/GW 202 may be communicated between SGSN 226 and M2M Server 236 via GM2M.
- control data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236 , while user data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236 via GGSN 228 .
- control data may be sent from M2M Device/GW 202 to FAP 212 via UMTS interface 210 .
- the control data may be routed from FAP 212 to HNB GW 218 .
- the control data may be routed from HNB GW 218 to SGSN 226 .
- SGSN 226 may then communicate the control data to M2M Server 236 via the GM2M interface.
- user data from M2M Device/GW 202 may be routed from to SGSN 226 in a manner similar to control data. However, in this example user data may be routed from SGSN 226 to GGSN 228 , for example, via the Gn interface. GGSN 228 may then route the user data from M2M Device/GW 202 to M2M server 236 , for example via an mla interface. The user data may be received by M2M Server via NAE 238 , NGC 240 or another interface.
- the GM2M interface may be for the control path (e.g., registration, security functions, authentication, etc.).
- SGSN 226 may perform user registration with M2M Server 236 without communicating through other network nodes or entities.
- the direct communication may provide for more efficient signaling within the CN, for example during an Attach procedure. Signaling of attach, authentication, and authorization may be performed via the GM2M interface, and other signaling and data path communications may be performed via the Gi interface.
- M2M Server 236 may receive control information via the GM2M interface without M2M Device/GW 202 establishing a PDP Context Activation and/or registering with M2M Server 236 .
- a PDP context between the network and a device may have been established.
- An interface between GGSN 228 and M2M Server 236 may also be established.
- the interface between GGSN 228 and M2M Server 236 may be utilized for data (payload) traffic.
- Procedures may be defined to facilitate connection of an M2M Server to a 3GPP network.
- an M2M server may be connected with the SGSN of the 3GPP Core Network, e.g., on the GM2M Interface.
- charging and billing functions of the M2M server and or 3GPP network may be integrated via the GM2M interface.
- signaling overhead may be reduced by allowing communication directly between the SGSN and the M2M Server rather than routing all communications through the GGSN.
- An M2M Server that is integrated within a 3GPP core network may communicate device specific information via the GM2M interface.
- the device specific information may be control information.
- device identity information such as an International mobile Subscriber Identity (IMSI), an International Mobile Equipment Identity (IMEI), Packet Temporary Mobile Subscriber Identity (P-TMSI), and/or the like may be communicated via the GM2M interface.
- Location related information such as routing area (RA) information, location area (LA) information, tracking area (TA) information, and/or the like may be communicated via the GM2M interface.
- Security related information such integrity key, ciphering keys, and/or the like may be communicated via the GM2M interface.
- PDP context related information such as IP addressed, PDP type, and/or the like may be communicated via the GM2M interface.
- a SGSN may recognize communications from an M2M device as an M2M communication.
- the SGSN may recognize that M2M communications may be routed to an M2M server.
- the SGSN may identify a device or a communication from a device as M2M related based on subscriber information.
- the SGSN may be M2M aware to the extent that it may associate M2M information with 3G WTRU/UE information.
- the M2M device may refrain from sending an indication that is an M2M device in each message.
- the SGSN may recognize that information from the M2M is M2M information based on the identity of the M2M device.
- the device identity information may be subscriber information.
- the SGSN may recognize that information from the M2M device is M2M information based on an indication in a received message.
- the indication may be subscriber information.
- an M2M device may be in communication with multiple SGSNs via multiple GM2M interfaces.
- Subscriber information may be used by a SGSN to identify a M2M device.
- an HLR may send default Access Point Name (APN) information along with other subscriber data to the SGSN.
- the subscriber data including the APN may be used to identify a M2M device.
- the SGSN may be configured with a M2M APN, and may compare the M2M APN with the received APN included in the subscriber data. If the SGSN M2M APN matches the received APN included in the subscriber data, the SGSN may recognize the device associated with the subscriber data as an M2M device.
- the M2M APN may indicate that a device is an M2M device. Thus, a device may omit an indication of its M2M status, as the SGSN may recognize the device as M2M capable based on subscriber data associated with the device.
- An M2M Server and a 3GPP network may use a combined authentication procedure.
- a M2M capable WTRU may carry out generation of a cypher key (Ck) and an integrity key ( 1 k ) during authentication with the network.
- the M2M capable WTRU may also carry out generation of M2M Device Session Ciphering Key (KsCk) and M2M device Session Integrity key (Kslk) as part of the same procedure.
- the authentication keys may be signaled to the network in one or more messages.
- the SGSN may receive the keys and forward the KsCk and Kslk to the M2M server via the GM2M interface.
- an M2M device may identify itself as M2M capable in a Mobility Management (MM) message, a Global Multimedia Mobility (GMM) message, a call control (CC) message, and/or a Session Management (SM) message.
- MM Mobility Management
- GMM Global Multimedia Mobility
- CC call control
- SM Session Management
- an M2M device may set the 8.sup.th bit of a MM message, a GMM message, a CC message, and/or a SM message to “1” to indicate that tit is M2M capable.
- a device may indicate that it is M2M capable using the attach type field of in a GMM Attach request message.
- the SGSN may receive an indication in the attach type field that the device is an M2M device and may store an indication of the M2M capability of the device in memory.
- the skip indicator filed of Layer 3 (L3) messages may be set to “1111” to indicate that a device is M2M capable.
- FIG. 3 illustrates an example communication protocol stack for GM2M interface 326 .
- GM2M 326 may be a logical interface, for example if M2M Server 322 is integrated as part of SGSN 324 .
- GM2M 326 may be an internal interface inside of SGSN 324 .
- M2MAP 302 may be an M2M application part protocol layer for M2M Server 322 .
- M2MAP 304 may be an M2M application part protocol layer for SGSN 324 .
- UDP 306 and UDP 308 may form the user datagram protocol (UDP) layer for the GM2M interface.
- the UDP destination port for M2MAP messages may be 2859.
- UDP port 2859 may be the registered port for M2MAP.
- M2M Server 322 may also include IP layer 310. L2 layer 314, and L1 layer 318. Similarly, SGSN 324 may include IP layer 312, L2 layer 316, and L1 layer 320. SGSN 324 and M2M Server 322 may include publicly addressable IP addresses.
- M2MAP messages may have defined message formats with defined information elements.
- Table 1 illustrates an exemplary M2MAP header.
- the contents of Table 1 may be fixed parts of the M2MAP header.
- the specific contents of each message e.g., information elements
- the protocol discriminator may use a value of “1110.”
- Table 2 below, is a list of example M2MAP message types.
- FIG. 4 illustrates an example attach procedure in accordance with an embodiment.
- the attach procedure may be a combined GPRS/IMSI Attach procedure.
- a Device Attach Update procedure may be defined in order to inform M2M Server 420 of MS/M2M 402 performing a successful or unsuccessful attach procedure.
- MS/M2M 402 may send Attach Request 422 to New SGSN 406 , for example via RAN 404 .
- Attach Request 422 may include a IMSI, a P-TMSI, an old Routing Area Identity (RAI), a classmark, a Cyphering Key Sequence Number (CKSN), an Attach Type, Discontinuous reception (DRX) parameters, an old P-TMSI and/or the like.
- New SGSN 406 may send ID Request 424 to Old SGSN 408 , for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID Response 426 which may identify MS/M2M 402 , for example by IMSI.
- ID Request 428 may be sent to MS/M2M 402 , for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID Response 426 which may identify MS/M2M 402 , for example by IMSI.
- New SGSN 406 may facilitate Authentication 428 and Authentication 430 between MS/M2M 402 and HLR 416 , respectively. If a PDP context had previously existed for MS/M2M 402 , New SGSN 406 may send Delete PDP Context request 436 to GGSN 410 . In response, GGSN 410 may send Delete PDP Context Response 438 . New SGSN 406 may send Update Location 440 to HLR 416 , for example, if a SGSN number has changed since a previous GPRS detach or if Attach Request 422 was the first attach request by MS/M2M 402 .
- Update Location 440 may include a SGSN number, a SGSN address, an IMSI for MS/M2M 402 , and/or IMEI software version (IMEISV).
- HLR 416 may send Cancel Location 442 to Old SGSN 408 , for example to delete MM and PDP contexts.
- Old SGSN 408 may respond with Cancel Location ACK 442 upon cancellation of procedures related to MS/M2M 402 .
- To delete an old PDP context for example if the contexts have yet to be deleted, Old SGSN 408 may send Delete PDP Context request 44 to GGSN 410 .
- GGSN may delete the old PDP context for MS/M2M 402 and respond with Delete PDP Context Response 436 .
- HLR 416 may send Insert Subscriber Data 448 to New SGSN 406 , which may include subscriber data for MS/M2M 402 .
- the subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402 .
- the APN may be a default APN for M2M devices.
- New SGSN 406 may determine that MS/M2M 402 is an M2M capable device, for example based on the received APN. As an example, New SGSN 406 may compare the received APN with a default APN for M2M devices. New SGSN 406 may acknowledge the receipt of the subscriber data, for example by sending Insert Subscriber Data ACK 450 .
- HLR 416 may acknowledge the creation of a new MM context and/or successful location update by sending Location update ACK 452 to New SGSN 406 .
- Old SGSN 406 may inform New MSCNLR 414 of the location update for MS/M2M 402 by sending Location update Request 454 .
- Location update is inter-MSC (i.e., more than one MSC is involved)
- New MSCNLR 414 may send update Location 456 to HLR 416 .
- HLR 416 may send Cancel Location 458 to Old MSCNLR 418 .
- Old MSCNLR 418 may respond with Cancel Location ACK 460 .
- HLR 416 may send Insert Subscriber Data 462 to New MSCNLR 414 , which may include subscriber data for MS/M2M 402 .
- the subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402 .
- the APN may be a default APN for M2M devices.
- New MSC/VLR 414 may acknowledge the receipt of the subscriber data, for example by sending Insert Subscriber Data ACK 464 .
- HLR 416 may send update Location ACK 466 to New MSCNLR 414 .
- New MSCNLR 414 may indicate location acceptance by sending Location Update Accept 468 to New SGSN 406 .
- New SGSN 406 may then process the location update by performing Customized Applications for Mobile Network Logic (CAMEL) Procedures 470 .
- New SGSN 406 may send Attach Accept 472 to MS/M2M 402 indicating that the attach procedure was successful and is complete.
- MS/M2M 402 may acknowledge Attach Accept 472 by sending Attach Complete 474 .
- New SGSN 406 may send TMSI Reallocation Complete 476 , for example if VLR TMSI was changed.
- CAMEL Customized Applications for Mobile Network Logic
- New SGSN 406 may send M2M Device Attach Update 478 to M2M server 420 .
- M2M Device Attach Update 478 may be sent from New SGSN 406 to M2M Server 420 via the GM2M interface.
- a Device Attach message may use a skip indicator field to indicate it is an M2M procedure.
- the SGSN may interpret the skip indicator field.
- a WTRU may use an attach type field in GMM ATTACH REQUEST MESSAGE to indicate it is an M2M device.
- the SGSN may interpret the type of attach field and send DEVICE ATTACH UPDATE to the M2M Server at the end of attach procedure.
- M2M Device Attach Update messages There may be several types of M2M Device Attach Update messages that a SGSN may send to an M2M based on an attach procedure. For example, when an SGSN sends an Attach Accept Message to a M2M device, it may also send a M2M Device Attach Accept type M2M Device Attach Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Attach Reject Message to a M2M device, it may also send a M2M Device Attach Reject type M2M Device Attach Update message to the M2M Server via the GM2M interface.
- the SGSN when the SGSN receives an Attach complete Message from an M2M device, it may send a M2M Device Attach Complete type M2M Device Attach Update message to the M2M server via the GM2M interface.
- M2M Device Attach Update messages e.g., attach accept/reject/complete type messages
- a M2M server may send a M2M Device Attach Status Request message to a SGSN to determine an attach status of an M2M device.
- the M2M Device Attach Status Request message may be sent via the GM2M server to the SGSN.
- An example information element for a M2M Device Attach Status request messages is shown in Table 4, below.
- FIG. 5 illustrates an example routing area update procedure in accordance with an embodiment.
- MS/M2M 502 may send Routing Area Update request 510 to SGSN 506 .
- Routing Area Update Request 510 may indicate that MS/M2M 502 may have entered a new routing area or may be a periodic routing area update.
- Routing Area Update request 510 may include a P-TMSI, an old RAI, an old P-TMSI Signature, an Update Type and the like.
- BSS Base Station Subsystem
- Security Functions 512 may be executed between MS/M2M 502 and SGSN 506 .
- SGSN 506 may send Routing Area update 514 to MS/M2M 502 .
- SGSN 506 may perform CAMEL Procedures 516 to process the Routing Area Update.
- MS/M2M 502 may send Routing Area Update Confirm 518 to SGSN 506 to confirm the routing area update is complete.
- SGSN 506 may associate information from M2/M2M 502 with M2M information. For example, the SGSN may have determined MS/M2M 502 was a M2M device in an earlier transaction (such as an attach).
- SGSN 506 may send M2M Routing Area Update 520 to M2M Server 508 , for example via the GM2M interface.
- M2M Device Routing Area Update messages There may be several types of M2M Device Routing Area Update messages that a SGSN may send to an M2M server based on a Routing Area procedure. For example, when an SGSN sends a Routing Area Update Accept Message to a M2M device, it may also send a M2M Device Routing Area Update Accept type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Routing Area Update Reject Message to a M2M device, it may also send a M2M Device Routing Area Update Reject type M2M Device Routing Area Update message to the M2M Server via the GM2M interface.
- the SGSN when the SGSN receives a Routing Area Update Complete message from a M2M device, it may send a M2M Device Routing Area Update Complete type M2M Device Routing Area Update message to the M2M server via the GM2M interface.
- M2M Device Routing Area Update messages e.g., Routing Area Update Accept/Reject/Complete type messages
- Table 5 Example information elements for M2M Device Routing Area Update messages (e.g., Routing Area Update Accept/Reject/Complete type messages) are shown in Table 5, below.
- a M2M server may send a M2M Device Routing Area Information Request message to a SGSN to determine routing area information status of an M2M device.
- the M2M Device Routing Area Information Request message may be sent via the GM2M interface.
- An example information element for a M2M Device Routing Area Information Request message is shown in Table 6, below.
- FIG. 6 illustrates an example PDP Context Update procedure in accordance with an embodiment.
- MS/M2M 602 may send Activate PDP Context Request 612 to SGSN 606 .
- Activate PDP Context Request 612 may include a Network Service Access Point Identifier (NSAPI), a Transaction Identifier (TI), a PDP type, a PDP Address, an APN, a Quality of Service (QoS) Request, Protocol Configuration options of the like.
- SGSN 606 may determine that MS/M2M 602 is M2M capable, for example based on a received APN, IMSI or other identifier.
- SGSN 606 may perform CAMEL Procedures 614 to process Activate PDP Context Request 612 and PDP Context establishment. SGSN 606 may validate the PDP Context request. If SGSN 606 is unable to validate the request, it may send MS/M2M 602 an Activate PDP Context Reject Message (Not shown in FIG. 6 ). However, to create the PDP Context, SGSN 606 may send Create PDP Context Request 616 to GGSN 608 . GGSN 608 may choose to accept or reject the request. If accepted, GGSN 608 may send Create PDP Context Response 618 to SGSN 606 .
- MS/M2M 602 , RAN 604 and SGSN 606 may engage in Radio Access Bearer Setup 620 . If BSS trace is activated, SGSN may send Invoke trace 622 to RAN 604 . SGSN 606 may also send Update PDP Context request 624 to GGSN 608 , for example if during Radio Access Bearer Setup 620 there was a QOS change for MS/M2M 602 . If so, GGSN may respond with Update PDP Context Response 626 . SGSN 606 may perform further CAMEL Procedures 628 to acknowledge PDP Context establishment. SGSN may send Activate PDP Context Accept 630 to MS/M2M 602 , which may indicate that a PDP context was successfully established.
- SGSN 606 may send PDP Context Update 632 to M2M Server 610 to inform M2M Server 610 of the new PDP Context for MS/M2M 602 .
- PDP Context Update 632 may be sent via the GM2M interface.
- M2M Device PDP Context Activation Update messages may be sent to an M2M Server based on a Routing Area procedure. For example, when a SGSN sends an Activate PDP Context Accept message to a M2M device, it may also send a M2M Device Activate PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M Server via the GM2M interface.
- an SGSN when an SGSN sends an Activate PDP Context Reject Message to a M2M device, it may also send a M2M Device Activate PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M Server via the GM2M interface.
- the SGSN when the SGSN receives a Modify PDP Context Accept message from a M2M device, it may send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface.
- a SGSN may send a Modify PDP Context Accept message to a M2M device, in which case it may still send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface.
- a SGSN may also send or receive a Modify PDP Context Reject message, and in either case the SGSN may send a M2M Device Modify PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface.
- Example information elements for M2M Device PDP Context Activation Update messages are shown in Table 7, below.
- FIG. 7 illustrates an example device detach procedure in accordance with an embodiment.
- MS/M2M 702 may send Detach Request 714 to SGSN 706 .
- Detach Request 714 may indicate that MS/M2M 502 desires to detach from the network and may include a detach type, a P-TMSI, a P-TSMI signature, a switch off notification and/or the like.
- SGSN 706 may send GGSN 708 Delete PDP Context Request 714 .
- GGSN 708 may delete the PDP Context for MS/M2M 702 and send SGSN 706 Delete PDP Context response 716 .
- SGSN 706 may perform CAMEL Procedures 718 to process the PDP Context deletion.
- SGSN 706 may send IMSI Detach Indication 720 to MSCNLR 710 , for example if Detach Request 714 indicates that the detach procedure is an IMSI detach procedure.
- SGSN 706 may send GPRS Detach Indication 722 to MSCNLR 710 , for example if Detach Request 714 indicates that the detach procedure is a GPRS detach procedure.
- SGSN 706 may perform CAMEL Procedures 724 to process detach.
- SGSN 706 may send Detach Accept 726 to MS/M2M 702 to indicate the detach procedure was successful.
- SGSN 706 may send M2M Device Detach Update 728 to M2M Server 712 , for example via the GM2M interface, in order to inform M2M Server 712 of the detach procedure.
- MS/M2M 702 , BSS/UTRAN 704 , and/or SGSN 706 may also perform PS Signaling Connection Release 730.
- Example information elements for M2M Device Detach Accept Messages are shown in Table 8, below.
- FIG. 8 illustrates an example authentication and key agreement procedure in accordance with an embodiment.
- the authentication and key agreement procedure may begin with distribution of authentication vectors from Home Environment (HE) to the Serving Network (SN) at 810 .
- VLR/SGSN 804 may send Authentication Data Request 812 to HE/HLR 806 .
- HE/HLR 806 may generate authentication vectors and transmit the authentication vectors to VLR/SGSN 804 as part of Authentication data response 816 .
- Each authentication vector may include a random number (RAND), an expected response (XRES), a cipher key (CK), an integrity key (IK), and an authentication token (AUTH).
- VLR/SGSN 804 may store the authentication vectors.
- MS/M2M 802 and VLR/SGSN 804 may engage in authentication and key establishment.
- VLR/SGSN 804 may transmit user authentication request 824 to MS/M2M 802 .
- User authentication request 824 may include RAND(i) and AUTH(i), which may be the random number and the authentication token for AV(i), respectively.
- MS/M2M 802 may verify AUTN(i), for example by checking a Universal Subscriber Identity Module (USIM), and may compute a response based on AV91) (RES(i)).
- USIM Universal Subscriber Identity Module
- MS/M2M 802 may send RES(i) to VLR/SGSN 804 as part of User authentications response 828 .
- VLR/SGSN 804 may compare RES(i) and XRES(i). If RES(i) and XRES(i) match, VLR/SGSN 804 may consider the authentication and key agreement exchange to be successfully completed.
- VLR/SGSN 804 may select CK(i) and IK(i) as the cyphering and integrity keys.
- MS/M2M 802 may compute CK(i) and IK(i).
- VLR/SGSN 804 may send M2M Device Authentication and Key Update 836 to M2M Server 808 , for example via the GM2M interface, to inform M2M Server of the successful authentication and key agreement.
- M2M Device Authentication and Key Agreement Update messages There may be several types of M2M Device Authentication and Key Agreement Update messages that a SGSN may send to an M2M server based on an authentication, key agreement and/or cyphering procedure. For example, when a SGSN receives an Authentication and Key Agreement Response Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Response type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface.
- an SGSN when an SGSN receives an Authentication and Key Agreement Reject Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Reject Message type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface.
- the SGSN when the SGSN receives an Authentication and Key Agreement Failure Message from a M2M device, it may send a M2M Device Ro Authentication and Key Agreement Failure type M2M Device Authentication and Key Agreement Update message to the M2M server via the GM2M interface.
- Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below.
- a reject message may include a reject reason and/or the ciphering and/or integrity keys.
- a M2M server may send a M2M Device Authentication and Key Agreement Request message to a SGSN to determine authentication and key agreement status of an M2M device.
- the M2M Device Authentication and Key Agreement Request message may be sent via the GM2M interface.
- An example information element for a M2M Device Authentication and Key Agreement Request message is shown in Table 10, below,
- FIG. 9 illustrates an example security mode update procedure in accordance with an embodiment.
- Radio Resource Control (RRC) Connection Establishment may be performed between MS/M2M 902 and Serving Radio Network Controller (SRNC) 904 .
- SRNC 904 may store Hyper Frame Number (HFN) START values and UE Security Capability.
- MSM/M2M 902 may send Initial L3 Message 914 to VLR/SGSN 906 .
- Initial L3 Message 914 may be a location update request, a Connection Management (CM) service request a routing area update request, an attach request, a paging response, or the like.
- CM Connection Management
- MS/M2M 902 may perform authentication and key generation, for example, as described with respect to FIG.
- VLR/SGSN 906 may decide allowed UE cyphering capabilities (UlAs) and integrity capabilities (UEAs). VLR/SGSN 906 may send Security Mode Command 920 to SRNC 904 , which may include UTAs, IK, UEAs, CK, and/or the like. At 922 , SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection.
- UAs UE cyphering capabilities
- UEAs integrity capabilities
- SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection.
- SRNC 904 may send Security Mode Command 924 to MS/M2M 902 .
- Security Mode Command 924 may include a CN domain, a UTA, FRESH, a UE security capability, UEA, Message Authentication Code for Integrity (MAC-I), and/or the like.
- MS/M2M may verify the message and start integrity security.
- MS/M2M 902 may indicate that the security mode procedure was successful by sending Security Mode Complete 930 .
- SRNC 904 may verify Security Mode Complete 930 has been received.
- SRNC 904 may send Security Mode Complete to VLR/SRNC 906 .
- MS/M2M 902 may start cyphering/deciphering.
- SRNC 904 may start cyphering/deciphering.
- VLR/SRNC 906 may send M2M Device Security Mode Update 940 to M2M Server 908 , for example via the GM2M interface.
- M2M Device Security Mode Update messages There may be several types of M2M Device Security Mode Update messages that a SGSN may send to an M2M server based on a security mode procedure. For example, when a SGSN receives a Security Mode Complete Message from a RNC, it may also send a M2M Device Security Mode Complete type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives a Security Mode Reject Message from a RNC, it may also send a M2M Device Security Mode Reject Message type M2M Device Security Mode Update message to the M2M Server via the GM2M interface.
- Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below.
- SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
- a M2M server may send a M2M Security Request message to a SGSN to determine security mode status of an M2M device.
- the M2M Device Security Mode Request message may be sent via the GM2M interface.
- An example information element for a M2M Device Security Mode Request message is shown in Table 12, below.
- FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment.
- SGSN 1006 may send Location Reporting Control 1010 to RAN 1004 .
- SGSN 1006 may send Location reporting Control 1010 because it detects form subscriber data for MS/M2M 1002 that SGSN 1006 should monitor the service area in which MS/M2M 1002 is located.
- Location reporting Control 1010 may trigger a periodic or standalone report about the current location of MS/M2M 1002 .
- RAN 1004 may store the report, for example if periodic reporting is requested.
- SGSN 1006 may request to be notified if MS/M2M 1002 moves into or out of a determined service region.
- MS/M2M 1002 may move to a new service location, which may be in a reporting area request in Location Reporting Control 1010 .
- RAN 1004 may determine the location of MS/M2M 1002 and send Location report 1014 to SGSN 1006 .
- SGSN 1006 may inform M2M server 1008 of the location of MS/M2M 1002 .
- SGSN 1006 may send M2M Device Location Report Update 1016 to M2M Server 1008 , for example via the GM2M interface.
- SGSN 1006 may cancel an early location report request, for example by sending Cancel Location reporting 1018 to RAN 1004 .
- Example information elements for M2M Device Location Report Update messages are shown in Table 13, below.
- SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
- a M2M server may send a M2M Security Request message to a SGSN to request a location report status of an M2M device.
- the M2M Device Location Reporting Request message may be sent via the GM2M interface.
- An example information element for a M2M Device Location Reporting Request message is shown in Table 14, below.
- FIG. 11 illustrates an example network initiated PDP Context Activation procedure in accordance with an embodiment.
- the control procedure may be initiated by M2M Server 1110 or may be initiated by a cellular network node.
- M2M Server 110 may send Request 1109 to SGSN 1104 , for example via the GM2M interface.
- Request 1109 may be a M2M Device PDP Context Activation/Modification Request Message.
- SGSN 1104 may send Request Initiation 1111 to GGSN 1108 which may initiate a network control procedure such as a PDP context activation procedure.
- the PDP context activation procedure may be initiated by a cellular network node.
- GGSN 1108 may receive PDP Protocol Data Unit (PDU) 1112 from the cellular network node.
- PDP PDU 1112 may be sent from M2M Server 1110 directly to GGSN 1108 .
- GGSN 1108 may determine if a Network-requested PDP Context Activation procedure should be activated. GGSN 1108 may send Routing Information for GPRS 114 to HLR 1106 . If HLR 1106 determined the request may be served, HLR 110 may send Routing Information for GPRS ACK 1116 to GGSN 1108 . GGSN 1108 may send PDU Notification Request 1118 to SGSN 1104 , whose identity may be indicated by HLR 1106 . SGSN 1104 may send PDU Notification Response 1120 , which may indicate that it will inform MS/M2M 1102 to activate the PDP context indicated. SGSN 1104 may send Request PDP Context Activation 1124 to MS/M2M 1102 .
- MS/M2M 1102 may perform PDP Context Activation Procedure 1126 with GGSN 1108 .
- SGSN 1104 may send PDP Context Update 1128 to M2M Server 1110 , for example via the GM2M interface.
- Example information elements for PDP Context Activation/Modification Request Messages are shown in Table 15, below.
- a SGSN may send a M2M Device PDP Context Deactivation update to a M2M server, for example upon the completion of a successful PDP context deactivation procedure.
- M2M Device PDP Context Deactivation messages There may be several types of M2M Device PDP Context Deactivation messages that a SGSN may send to an M2M server based on a PDP deactivation procedure. For example, when a SGSN receives a Deactivate PDP Context Request Message from a M2M device, it may also send a M2M Device Deactivate PDP Context Request type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface.
- an SGSN when an SGSN sends a Deactivate PDP Context Accept Message to a M2M device, it may also send a M2M Device Deactivate PDP Context Accept Message type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface.
- M2M Device DP Context Deactivation Update messages e.g., Deactivate PDP Context Accept/Complete type messages
- a network node such as a M2M server, may initiate a PDP Context Deactivation Request.
- a M2M server may send a M2M Device PDP Context Deactivation Request to a SGSN.
- the SGSN may start a PDP context deactivation procedure.
- Example information elements for M2M Device PDP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 17, below.
- a M2M server may initiate a PDP Context Information Request.
- a M2M server may send a M2M Device PDP Context Information Request to a SGSN to request PDP context status of a M2M device.
- the SGSN may treat the request a M2M PDP Context Activation Update message.
- Example information elements for M2M Device PDP Context Information Request messages are shown in Table 18, below.
- a timeout may be employed.
- the timeout may be multiple of 1 second, and in an embodiment may not exceed 60 seconds.
- the procedure may be cancelled and/or reinitiated.
- ROM read only memory
- RAM random access memory
- register cache memory
- semiconductor memory devices magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
- a processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A network node may be configured to receive a request for an authentication and key establishment procedure from a machine to machine (M2M) device. The network node may be configured to determine a key agreement between the network node and the M2M device using the authentication and key establishment procedure. The network node may be configured to receive a request from an M2M server for the key agreement to be used to communicate with the M2M device. The network node may be configured to send the key agreement to the M2M server.
Description
- This application is a continuation of U.S. patent application Ser. No. 17/184,070 filed Feb. 24, 2021, which is a continuation of U.S. patent application Ser. No. 15/643,411 filed Jul. 6, 2017, which was a continuation of U.S. patent application Ser. No. 13/806,450 filed Jun. 11, 2013, which issued on Aug. 15, 2017 as U.S. Pat. No. 9,736,873, which is a continuation of the National Stage entry under 35 U.S.C. § 371 of Patent Cooperation Treaty Application No. PCT/US2011/041767, filed Jun. 24, 2011, which claims the benefit of U.S. Provisional Patent Application No. 61/358,688, filed Jun. 25, 2010, the contents of which are hereby incorporated by reference herein.
- Machine type communication (MTC), or alternately machine to machine (M2M) communication, is a form of data communication which may involve one or more devices or entities that may communicate without human interaction. Respective communication networks may include any number of MTC capable devices. Metering devices or tracking devices may be examples of MTC devices. As used herein, the term user equipment (UE), Mobile Station (MS), and Wireless Transmit/Receive Unit (WTRU) may include MTC devices.
- Machine type communications may use an MTC Server, which may alternately be referred to as an M2M Server. A M2M server may collect data or control information from MTC devices. A M2M server may also send data and other information to M2M devices. MTC devices may communicate via 3GPP networks such as Long Term Evolution (LTE) networks, Universal Mobile Telecommunication System (UMTS) networks, Worldwide Interoperability for microwave Access (WiMAX) networks, and the like.
- A cellular network node, for example a Serving General Packet Radio Service (GPRS) Support Node (SGSN), may communicate with an M2M server. The cellular network node may receive subscriber data and control data. The control data may facilitate a network control procedure and the subscriber data may identify a device involved in the network control procedure. Example network control procedures may include network attach procedures, network detach procedures, authentication procedures, security mode procedures, Packet Data Protocol (PDP) context procedures, location area update procedures, routing area update procedures, tracking area update procedures, or the like.
- The cellular network node may determine that the device involved in the network control procedure is a machine to machine device based on the subscriber data. For example, the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN. The cellular network node may also send the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server. The dedicated interface may be called a GM2M interface. The dedicated interface may be a logical interface internal to the network node.
- The M2M server may request control data such as the current status of a M2M device. For example, the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like. The control data may be based on mobility control information or connection control information. The request for control data may be sent to a cellular network node via the GM2M interface. The cellular network node may initiate a network control procedure based on the request from the M2M server. The cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
- A more detailed understanding may be had from the following description, given by way of example in conjunction with the accompanying drawings wherein:
-
FIG. 1A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented; -
FIG. 1B is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 10 is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 1D is a system diagram of another example radio access network and another example core network that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 1E is a system diagram of another example radio access network and another example core network that may be used within the communications system illustrated inFIG. 1A ; -
FIG. 2 illustrates an example embodiment of a 3GPP network including an integrated M2M server; -
FIG. 3 illustrates an example communication protocol stack for communication of a GM2M interface; -
FIG. 4 illustrates an example M2M device attach procedure in accordance with an embodiment; -
FIG. 5 illustrates an example M2M device routing area update procedure in accordance with an embodiment; -
FIG. 6 illustrates an example M2M device initiated Packet Data Protocol (PDP) context activation procedure in accordance with an embodiment; -
FIG. 7 illustrates an example M2M device detach procedure in accordance with an embodiment; -
FIG. 8 illustrates an example authentication and cyphering procedure in accordance with an embodiment; -
FIG. 9 illustrates an example security mode procedure in accordance with an embodiment; -
FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment; and -
FIG. 11 illustrates an example network initiated PDP context activation procedure in accordance with an embodiment. - A detailed description of illustrative embodiments will now be described with reference to the various Figures. Although this description provides a detailed example of possible implementations, it should be noted that the details are intended to be exemplary and in no way limit the scope of the application.
-
FIG. 1A is a diagram of anexample communications system 100 in which one or more disclosed embodiments may be implemented. Thecommunications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users. Thecommunications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth. For example, thecommunications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), and the like. - As shown in
FIG. 1A , thecommunications system 100 may include wireless transmit/receive units (WTRUs) 102 a, 102 b, 102 c, and/or 102 d (which generally or collectively may be referred to as WTRU 102), a radio access network (RAN) 103/104/105, acore network 106/107/109, a public switched telephone network (PSTN) 108, theInternet 110, andother networks 112, though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements. Each of theWTRUs WTRUs - The
communications systems 100 may also include abase station 114 a and abase station 114 b. Each of thebase stations WTRUs core network 106/107/109, theInternet 110, and/or thenetworks 112. By way of example, thebase stations base stations base stations - The
base station 114 a may be part of theRAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a base station controller (BSC), a radio network controller (RNC), relay nodes, etc. Thebase station 114 a and/or thebase station 114 b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with thebase station 114 a may be divided into three sectors. Thus, in one embodiment, thebase station 114 a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, thebase station 114 a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell. - The
base stations WTRUs air interface 115/116/117, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). Theair interface 115/116/117 may be established using any suitable radio access technology (RAT). - More specifically, as noted above, the
communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, thebase station 114 a in theRAN 103/104/105 and theWTRUs air interface 115/116/117 using wideband CDMA (WCDMA). WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA). - In another embodiment, the
base station 114 a and theWTRUs air interface 115/116/117 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE-A). - In other embodiments, the
base station 114 a and theWTRUs - The
base station 114 b inFIG. 1A may be a wireless router, Home Node B, Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like. In one embodiment, thebase station 114 b and theWTRUs base station 114 b and theWTRUs base station 114 b and theWTRUs FIG. 1A , thebase station 114 b may have a direct connection to theInternet 110. Thus, thebase station 114 b may not be required to access theInternet 110 via thecore network 106/107/109. - The
RAN 103/104/105 may be in communication with thecore network 106/107/109, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of theWTRUs core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown inFIG. 1A , it will be appreciated that theRAN 103/104/105 and/or thecore network 106/107/109 may be in direct or indirect communication with other RANs that employ the same RAT as theRAN 103/104/105 or a different RAT. For example, in addition to being connected to theRAN 103/104/105, which may be utilizing an E-UTRA radio technology, thecore network 106/107/109 may also be in communication with another RAN (not shown) employing a GSM radio technology. - The
core network 106/107/109 may also serve as a gateway for theWTRUs PSTN 108, theInternet 110, and/orother networks 112. ThePSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). TheInternet 110 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite. Thenetworks 112 may include wired or wireless communications networks owned and/or operated by other service providers. For example, thenetworks 112 may include another core network connected to one or more RANs, which may employ the same RAT as theRAN 103/104/105 or a different RAT. - Some or all of the
WTRUs communications system 100 may include multi-mode capabilities, i.e., theWTRUs WTRU 102 c shown inFIG. 1A may be configured to communicate with thebase station 114 a, which may employ a cellular-based radio technology, and with thebase station 114 b, which may employ anIEEE 802 radio technology. -
FIG. 1B is a system diagram of anexample WTRU 102. As shown inFIG. 1B , theWTRU 102 may include aprocessor 118, atransceiver 120, a transmit/receiveelement 122, a speaker/microphone 124, akeypad 126, a display/touchpad 128,non-removable memory 130,removable memory 132, apower source 134, a global positioning system (GPS)chipset 136, andother peripherals 138. It will be appreciated that theWTRU 102 may include any sub-combination of the foregoing elements while remaining consistent with an embodiment. Also, embodiments contemplate that thebase stations base stations FIG. 1B and described herein. - The
processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. Theprocessor 118 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables theWTRU 102 to operate in a wireless environment. Theprocessor 118 may be coupled to thetransceiver 120, which may be coupled to the transmit/receiveelement 122. WhileFIG. 1B depicts theprocessor 118 and thetransceiver 120 as separate components, it will be appreciated that theprocessor 118 and thetransceiver 120 may be integrated together in an electronic package or chip. - The transmit/receive
element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., thebase station 114 a) over theair interface 115/116/117. For example, in one embodiment, the transmit/receiveelement 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receiveelement 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit/receiveelement 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receiveelement 122 may be configured to transmit and/or receive any combination of wireless signals. - In addition, although the transmit/receive
element 122 is depicted inFIG. 1B as a single element, theWTRU 102 may include any number of transmit/receiveelements 122. More specifically, theWTRU 102 may employ MIMO technology. Thus, in one embodiment, theWTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over theair interface 115/116/117. - The
transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receiveelement 122 and to demodulate the signals that are received by the transmit/receiveelement 122. As noted above, theWTRU 102 may have multi-mode capabilities. Thus, thetransceiver 120 may include multiple transceivers for enabling theWTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example. - The
processor 118 of theWTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). Theprocessor 118 may also output user data to the speaker/microphone 124, thekeypad 126, and/or the display/touchpad 128. In addition, theprocessor 118 may access information from, and store data in, any type of suitable memory, such as thenon-removable memory 130 and/or theremovable memory 132. Thenon-removable memory 130 may include random-access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. Theremovable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, theprocessor 118 may access information from, and store data in, memory that is not physically located on theWTRU 102, such as on a server or a home computer (not shown). - The
processor 118 may receive power from thepower source 134, and may be configured to distribute and/or control the power to the other components in theWTRU 102. Thepower source 134 may be any suitable device for powering theWTRU 102. For example, thepower source 134 may include one or more dry cell batteries (e.g., nickel-cadmium (NiCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like. - The
processor 118 may also be coupled to theGPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of theWTRU 102. In addition to, or in lieu of, the information from theGPS chipset 136, theWTRU 102 may receive location information over theair interface 115/116/117 from a base station (e.g.,base stations WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment. - The
processor 118 may further be coupled toother peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, theperipherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth.RTM. module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like. -
FIG. 10 is a system diagram of theRAN 103 and thecore network 106 according to an embodiment. As noted above, theRAN 103 may employ a UTRA radio technology to communicate with theWTRUs air interface 115. TheRAN 103 may also be in communication with thecore network 106. As shown inFIG. 10 , theRAN 103 may include Node-Bs WTRUs air interface 115. The Node-Bs RAN 103. TheRAN 103 may also includeRNCs RAN 103 may include any number of Node-Bs and RNCs while remaining consistent with an embodiment. - As shown in
FIG. 10 , the Node-Bs RNC 142 a. Additionally, the Node-B 140 c may be in communication with theRNC 142 b. The Node-Bs respective RNCs RNCs RNCs Bs RNCs - The
core network 106 shown inFIG. 10 may include a media gateway (MGW) 144, a mobile switching center (MSC) 146, a serving GPRS support node (SGSN) 148, and/or a gateway GPRS support node (GGSN) 150. While each of the foregoing elements are depicted as part of thecore network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. - The
RNC 142 a in theRAN 103 may be connected to theMSC 146 in thecore network 106 via an luCS interface. TheMSC 146 may be connected to theMGW 144. TheMSC 146 and theMGW 144 may provide the WTRUs 102 a, 102 b, 102 c with access to circuit-switched networks, such as thePSTN 108, to facilitate communications between theWTRUs - The
RNC 142 a in theRAN 103 may also be connected to theSGSN 148 in thecore network 106 via an IuPS interface. TheSGSN 148 may be connected to theGGSN 150. TheSGSN 148 and theGGSN 150 may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between and theWTRUs - As noted above, the
core network 106 may also be connected to thenetworks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers. -
FIG. 1D is a system diagram of theRAN 104 and thecore network 107 according to an embodiment. As noted above, theRAN 104 may employ an E-UTRA radio technology to communicate with theWTRUs air interface 116. TheRAN 104 may also be in communication with thecore network 107. - The
RAN 104 may include eNode-Bs RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode-Bs WTRUs air interface 116. In one embodiment, the eNode-Bs B 160 a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, theWTRU 102 a. - Each of the eNode-
Bs FIG. 1D , the eNode-Bs - The
core network 107 shown inFIG. 1D may include a mobility management gateway (MME) 162, a servinggateway 164, and a packet data network (PDN)gateway 166. While each of the foregoing elements are depicted as part of thecore network 107, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. - The
MME 162 may be connected to each of the eNode-Bs RAN 104 via an S1 interface and may serve as a control node. For example, theMME 162 may be responsible for authenticating users of theWTRUs WTRUs MME 162 may also provide a control plane function for switching between theRAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA. - The serving
gateway 164 may be connected to each of the eNode-Bs RAN 104 via the S1 interface. The servinggateway 164 may generally route and forward user data packets to/from theWTRUs gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for theWTRUs 102 a. 102 b, 102 c, managing and storing contexts of theWTRUs - The serving
gateway 164 may also be connected to thePDN gateway 166, which may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between theWTRUs - The
core network 107 may facilitate communications with other networks. For example, thecore network 107 may provide the WTRUs 102 a, 102 b. 102 c with access to circuit-switched networks, such as thePSTN 108, to facilitate communications between theWTRUs core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between thecore network 107 and thePSTN 108. In addition, thecore network 107 may provide the WTRUs 102 a, 102 b, 102 c with access to thenetworks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers. -
FIG. 1E is a system diagram of theRAN 105 and thecore network 109 according to an embodiment. TheRAN 105 may be an access service network (ASN) that employs IEEE 802.16 radio technology to communicate with theWTRUs air interface 117. As will be further discussed below, the communication links between the different functional entities of theWTRUs RAN 105, and thecore network 109 may be defined as reference points. - As shown in
FIG. 1E , theRAN 105 may includebase stations ASN gateway 182, though it will be appreciated that theRAN 105 may include any number of base stations and ASN gateways while remaining consistent with an embodiment. Thebase stations RAN 105 and may each include one or more transceivers for communicating with theWTRUs air interface 117. In one embodiment, thebase stations base station 180 a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, theWTRU 102 a. Thebase stations ASN gateway 182 may serve as a traffic aggregation point and may be responsible for paging, caching of subscriber profiles, routing to thecore network 109, and the like. - The
air interface 117 between theWTRUs 102 a. 102 b, 102 c and theRAN 105 may be defined as an R1 reference point that implements the IEEE 802.16 specification. In addition, each of theWTRUs core network 109. The logical interface between theWTRUs 102 a. 102 b, 102 c and thecore network 109 may be defined as an R2 reference point, which may be used for authentication, authorization, IP host configuration management, and/or mobility management - The communication link between each of the
base stations base stations ASN gateway 182 may be defined as an R6 reference point. The R6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of theWTRUs - As shown in
FIG. 1E , theRAN 105 may be connected to thecore network 109. The communication link between theRAN 105 and thecore network 109 may defined as an R3 reference point that includes protocols for facilitating data transfer and mobility management capabilities, for example. Thecore network 109 may include a mobile IP home agent (MIP-HA) 184, an authentication, authorization, accounting (AAA)server 186, and agateway 188. While each of the foregoing elements are depicted as part of thecore network 109, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. - The MIP-HA may be responsible for IP address management, and may enable the WTRUs 102 a, 102 b, 102 c to roam between different ASNs and/or different core networks. The MTP-
HA 184 may provide the WTRUs 102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between theWTRUs AAA server 186 may be responsible for user authentication and for supporting user services. Thegateway 188 may facilitate interworking with other networks. For example, thegateway 188 may provide the WTRUs 102 a, 102 b, 102 c with access to circuit-switched networks, such as thePSTN 108, to facilitate communications between theWTRUs gateway 188 may provide the WTRUs 102 a, 102 b, 102 c with access to thenetworks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers. - Although not shown in
FIG. 1E , it will be appreciated that theRAN 105 may be connected to other ASNs and thecore network 109 may be connected to other core networks. The communication link between theRAN 105 the other ASNs may be defined as an R4 reference point, which may include protocols for coordinating the mobility of theWTRUs RAN 105 and the other ASNs. The communication link between thecore network 109 and the other core networks may be defined as an R5 reference, which may include protocols for facilitating interworking between home core networks and visited core networks. - M2M Servers may provide M2M services for M2M devices. For example, an M2M server may send data to and receive data from an M2M device. For M2M device communicating with the M2M server via a 3GPP network (e.g., a cellular network), the M2M server may collect control information or data regarding the M2M device that is generated or maintained by the 3GPP Core Network. Example control data may include, but is not limited to, mobility information (e.g., routing area information, location area information, tracking area information, etc.), connection information (e.g., PDP context information, IP address, other addressing information, network attach/detach data, etc.), security information (e.g., authentication information, cyphering information, security mode information, etc.), or any other information maintained or generated by a 3GPP core network.
- To send and receive data between a M2M server and a cellular network node of a 3GPP network, a connection may be established between an M2M server and the cellular network node. For example, the cellular network node may be a SGSN. The connection between the cellular network node and the M2M server may be a dedicated interface. The dedicated interface may be referred to herein as a GM2M interface. The GM2M interface may include a defined communications protocol stack. Control and/or data signals from an M2M device and an M2M server may be communicated via the dedicated interface.
- The cellular network node may determine that a device is a machine to machine device based on subscriber data. For example, the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN. The APN may be received from another cellular network node, for example a HLR. Subscriber data may be other data which may be used to identify a machine to machine device. For example, if the cellular network node has communicated with the M2M device in the past, it may store an indication that identifies the device as an M2M device. When the cellular network node receives subscriber data for the M2M device, such as a device identification or address, the indication may be used to determine that the device is an M2M device.
- The M2M server may request control data such as the current status of a M2M device. For example, the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like. The control data may be based on mobility control information or connection control information. The request for control data may be sent to a cellular network node via the GM2M interface. The cellular network node may initiate a network control procedure based on the request from the M2M server. The cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
- The systems and methods disclosed herein may be described in relation to connecting an M2M Server to the SGSN of the 3GPP Core Network. However, the systems and methods disclosed herein may be applicable to other connection implementations. As such, use of the concepts described herein may not be limited to connections relating to the SGSN of the 3GPP Core Network. For example the interface may be between the M2M server and a GGSN. In another example the dedicated interface may be between the M2M server and a MME in an LTE network.
- In a 3GPP network, an SGSN may include one or more logical interfaces for communication with various network nodes and entities. Exemplary interfaces with the SGSN may include one or more of the following:
-
- Ga-SGSN↔Charging Gateway Function (CGF)
- Gb-SGSN↔Base Station Subsystem (BSS)
- Gc-GGSN↔Home Location Register (HLR)
- Gd-SGSN↔Short Message Service (SMS) Mobile Switching Center (MSC)
- Ge-SGSN↔GSM Service Control Function (SCF)
- Gf-SGSN↔Equipment Identity Register (EIR)
- Gi-GGSN↔Public Data Network (PDN)
- Gn-SGSN↔GGSN
- Gp-GSN↔GPRS Support Node (GSN)
- Gr-SGSN↔Home Location Register (HLR)
- Gs-SGSN↔MSCNisitor Location register (VLR)
-
FIG. 2 illustrates an exemplary 3GPP architecture including anM2M server 236 in accordance with an embodiment. As shown inFIG. 2 , M2M Server 236 (which may be referred to as A Machine Type Communication (MTC) Server) may be integrated with a 3GPP network. For example,M2M server 236 may include an interface withSGSN 226. The interface may be referred to as a GM2M interface. -
FIG. 2 illustrates how various network nodes and connected devices may communicate in a 3GPP network. For example, M2M Device/GW 202 may be a WTRU capable of connecting to a 3GPP network. M2M Device/GW 202 may be a M2M device, such as a sensor reporting data. In another example, M2M Device/GW 202 may be a gateway collecting information from various M2M devices in order to relay data to the 3GPP network. M2M Device/GW 202 may include Generic Communication (xGC)interface 204 and Service Capability (SC) 206.xGC 204 may be a communications interface that allows M2M Device/GW 202 to communicate with a variety of devices, gateways, and/or networks using different communications protocols.SC 206 may be may provide service functions that may be shared by different applications or devices. For example,SC 206 may provide application enablement, reachability/addressing/repository functionality for applications, remote entity management, security, data retention, transaction management, compensation brokerage (charging), and/or act as an interworking proxy.SC 206 may provide other European Telecommunications Standards Institute (ETSI) M2M service capabilities. In an embodiment,xGC 204 may be integrated as part ofSC 206. M2M Device/GW 202 may also includeWiFi interface 208, which may allow M2M Device/GW 202 to connect to WiFi networks. M2M Device/GW 202 may also includeUMTS interface 210, which may facilitate M2M Device/GW 202 to connect to UMTS networks. The UMTS interface is exemplary, and M2M Device/GW 202 may also include interfaces for LTE networks, WiMax networks and the like. - M2M Device/
GW 202 may be in communication with Femto Access Point (FAP) 212.FAP 212 may be part of a radio access network (RAN) which provides M2M Device/GW 202 with radio access to a 3GPP network.FAP 212 may include a Home NodeB or may include a traditional NodeB.FAP 212 may include other nodes which facilitate radio access to a 3GPP network. For example,FAP 212 may includeNodeB 214 andRadio Network Controller 216.NodeB 214 andRadio Network Controller 216 may be part of a RAN for a UMTS network.NodeB 214 may communicate withRNC 216 via an Iub interface. -
FAP 212 may communicate with Home NodeB (HNB) Gateway (GW) 218, for example via an luh interface.HNB GW 218 may act as a gateway betweenFAP 212 and the core network (CN) of a 3GPP system. For example,HNB GW 218 may communicate with a 3GPP CN via an Iu interface. Continuing with this example,HNB GW 218 may communicate with Circuit-SwitchedCN 220 via an lucs interface.HNB GW 218 may communicate with Packet-SwitchedCN 224 via an lups interface.CS CN 220 andPS CN 224 may be logical partitions of a 3GPP CN. CS CN 229 may includeMSCNLR 222.MSCNLR 222 may provide support for CS functionality for M2M Device/GW 202. -
PS CN 224 may includeSGSN 226.SGSN 226 may facilitate the delivery of data packets to and from WTRUs within a geographical or network service area.SGSN 226 may route and transfer packets, provide mobility management functionality, provide logical link management, authenticate WTRUs, provide fee charging services (such as billing user data), and the like.PSN CN 224 may includeGGSN 228.GGSN 228 may facilitate operative communication between a 3GPP network and external networks such as the Internet and X.25 networks. For example,GGSN 228 may communicate with Packet Data Network (PDN) 232, for example via a Gi interface.PDN 232 may be any packet-based communication network. In an example,PDN 232 may provide M2M Network Application (App) 234 with a packet-based communication link for communication withPS CN 224.M2M Network App 234 may be an application being executed by a computing device which is meant to communicate with M2M Device/GW 202 and/orM2M Server 236.M2M Network App 234 may communicate withPDN 232 via an mla interface, and may use various communication protocols such as a Constrained Application Protocol (CoAp), a Hypertext Transfer Protocol (HTTP), a Session Initiation Protocol (SIP), and/or the like.PS CN 224 may also includeHLR 230, which may store location information and user profile information for devices in communication with the 3GPP network. The user profile information may be an example of subscriber data. -
M2M Server 236 may include Network Generic Communication (NGC)interface 240 and Network Applications Enablement (NAE)function 238.NAE 238 may serve as a contact point for M2M applications within the network. In an example,CS CN 220,PS CN 224, andM2M Server 236 may be part of an operator owned network. GM2M may be a logical interface betweenSGSN 226 andM2M Server 236. Control data and/or user data from M2M Device/GW 202 may be communicated betweenSGSN 226 andM2M Server 236 via GM2M. In an example embodiment, control data from M2M Device/GW 202 may be communicated fromSGSN 226 toM2M Server 236, while user data from M2M Device/GW 202 may be communicated fromSGSN 226 toM2M Server 236 viaGGSN 228. For example, control data may be sent from M2M Device/GW 202 toFAP 212 viaUMTS interface 210. The control data may be routed fromFAP 212 toHNB GW 218. The control data may be routed fromHNB GW 218 toSGSN 226.SGSN 226 may then communicate the control data toM2M Server 236 via the GM2M interface. Continuing with this example, user data from M2M Device/GW 202 may be routed from toSGSN 226 in a manner similar to control data. However, in this example user data may be routed fromSGSN 226 toGGSN 228, for example, via the Gn interface.GGSN 228 may then route the user data from M2M Device/GW 202 toM2M server 236, for example via an mla interface. The user data may be received by M2M Server viaNAE 238,NGC 240 or another interface. - In an example, the GM2M interface may be for the control path (e.g., registration, security functions, authentication, etc.). By allowing
M2M Server 236 to communicate directly withSGSN 226,SGSN 226 may perform user registration withM2M Server 236 without communicating through other network nodes or entities. The direct communication may provide for more efficient signaling within the CN, for example during an Attach procedure. Signaling of attach, authentication, and authorization may be performed via the GM2M interface, and other signaling and data path communications may be performed via the Gi interface.M2M Server 236 may receive control information via the GM2M interface without M2M Device/GW 202 establishing a PDP Context Activation and/or registering withM2M Server 236. To communicate via the Gi interface, a PDP context between the network and a device may have been established. An interface betweenGGSN 228 andM2M Server 236 may also be established. For example the interface betweenGGSN 228 andM2M Server 236 may be utilized for data (payload) traffic. - Procedures may be defined to facilitate connection of an M2M Server to a 3GPP network. For example, an M2M server may be connected with the SGSN of the 3GPP Core Network, e.g., on the GM2M Interface. For example, charging and billing functions of the M2M server and or 3GPP network may be integrated via the GM2M interface. Additionally, signaling overhead may be reduced by allowing communication directly between the SGSN and the M2M Server rather than routing all communications through the GGSN.
- An M2M Server that is integrated within a 3GPP core network may communicate device specific information via the GM2M interface. The device specific information may be control information. For example, device identity information such as an International mobile Subscriber Identity (IMSI), an International Mobile Equipment Identity (IMEI), Packet Temporary Mobile Subscriber Identity (P-TMSI), and/or the like may be communicated via the GM2M interface. Location related information such as routing area (RA) information, location area (LA) information, tracking area (TA) information, and/or the like may be communicated via the GM2M interface. Security related information such integrity key, ciphering keys, and/or the like may be communicated via the GM2M interface. PDP context related information such as IP addressed, PDP type, and/or the like may be communicated via the GM2M interface.
- A SGSN may recognize communications from an M2M device as an M2M communication. The SGSN may recognize that M2M communications may be routed to an M2M server. The SGSN may identify a device or a communication from a device as M2M related based on subscriber information. The SGSN may be M2M aware to the extent that it may associate M2M information with 3G WTRU/UE information. In an example, the M2M device may refrain from sending an indication that is an M2M device in each message. In this example, the SGSN may recognize that information from the M2M is M2M information based on the identity of the M2M device. For example, the device identity information may be subscriber information. In another example, the SGSN may recognize that information from the M2M device is M2M information based on an indication in a received message. The indication may be subscriber information. Additionally, an M2M device may be in communication with multiple SGSNs via multiple GM2M interfaces.
- Subscriber information may be used by a SGSN to identify a M2M device. For example, When an M2M device initiates an attach procedure, an HLR may send default Access Point Name (APN) information along with other subscriber data to the SGSN. The subscriber data including the APN may be used to identify a M2M device. For example, the SGSN may be configured with a M2M APN, and may compare the M2M APN with the received APN included in the subscriber data. If the SGSN M2M APN matches the received APN included in the subscriber data, the SGSN may recognize the device associated with the subscriber data as an M2M device. The M2M APN may indicate that a device is an M2M device. Thus, a device may omit an indication of its M2M status, as the SGSN may recognize the device as M2M capable based on subscriber data associated with the device.
- An M2M Server and a 3GPP network may use a combined authentication procedure. For example, a M2M capable WTRU may carry out generation of a cypher key (Ck) and an integrity key (1 k) during authentication with the network. The M2M capable WTRU may also carry out generation of M2M Device Session Ciphering Key (KsCk) and M2M device Session Integrity key (Kslk) as part of the same procedure. The authentication keys may be signaled to the network in one or more messages. The SGSN may receive the keys and forward the KsCk and Kslk to the M2M server via the GM2M interface.
- In another example, an M2M device may identify itself as M2M capable in a Mobility Management (MM) message, a Global Multimedia Mobility (GMM) message, a call control (CC) message, and/or a Session Management (SM) message. For example, an M2M device may set the 8.sup.th bit of a MM message, a GMM message, a CC message, and/or a SM message to “1” to indicate that tit is M2M capable. In another example, a device may indicate that it is M2M capable using the attach type field of in a GMM Attach request message. For example, the SGSN may receive an indication in the attach type field that the device is an M2M device and may store an indication of the M2M capability of the device in memory. In another example, the skip indicator filed of Layer 3 (L3) messages may be set to “1111” to indicate that a device is M2M capable.
-
FIG. 3 illustrates an example communication protocol stack forGM2M interface 326.GM2M 326 may be a logical interface, for example ifM2M Server 322 is integrated as part ofSGSN 324. In this example,GM2M 326 may be an internal interface inside ofSGSN 324.M2MAP 302 may be an M2M application part protocol layer forM2M Server 322.M2MAP 304 may be an M2M application part protocol layer forSGSN 324.UDP 306 andUDP 308 may form the user datagram protocol (UDP) layer for the GM2M interface. In an example, the UDP destination port for M2MAP messages may be 2859. UDP port 2859 may be the registered port for M2MAP.M2M Server 322 may also includeIP layer 310.L2 layer 314, andL1 layer 318. Similarly,SGSN 324 may includeIP layer 312,L2 layer 316, andL1 layer 320.SGSN 324 andM2M Server 322 may include publicly addressable IP addresses. - M2MAP messages may have defined message formats with defined information elements. For example, Table 1, below, illustrates an exemplary M2MAP header. The contents of Table 1 may be fixed parts of the M2MAP header. The specific contents of each message (e.g., information elements) are discussed with reference to
FIG. 4-11 , below. For example, the protocol discriminator may use a value of “1110.” -
TABLE 1 M2MAP Header Information IEI element Type/Reference Presence Format Length M2MAP Protocol M V ½ protocol discriminator discriminator Transaction Transaction M V ½ Identifier Identifier <message type> Message type M V 1 - Table 2, below, is a list of example M2MAP message types.
-
TABLE 2 M2MAP Message Types Bits 8 7 6 5 4 3 2 1 1 — — — — — — — M2MAP messages 1 0 0 0 0 0 0 1 M2M Device Attach Status Request 1 0 0 0 0 0 1 0 M2M Device Attach accept 1 0 0 0 0 0 1 1 M2M Device Attach complete 1 0 0 0 0 1 0 0 M2M Device Attach reject 1 0 0 0 0 1 0 1 1 0 0 0 0 1 1 0 M2M Device Detach accept 1 0 0 0 1 0 0 0 M2M Device Routing area Information Request 1 0 0 0 1 0 0 1 M2M Device Routing area update accept 1 0 0 0 1 0 1 0 M2M Device Routing area update complete 1 0 0 0 1 0 1 1 M2M Device Routing area update reject 1 0 0 0 1 1 0 0 M2M Device Security Mode Status Request 1 0 0 0 1 1 0 1 M2M Device Security Mode Complete 1 0 0 0 1 1 1 0 M2M Device Security Mode Reject 1 0 0 1 0 0 0 0 M2M Device Location Update 1 0 0 1 0 0 0 1 M2M Device Location Information Request 1 0 0 1 0 0 1 0 M2M Device Authentication and ciphering Status Request 1 0 0 1 0 0 1 1 M2M Device Authentication and ciphering resp 1 0 0 1 0 1 0 0 M2M Device Authentication and ciphering rej 1 0 0 1 1 1 0 0 M2M Device Authentication and ciphering failure 1 0 0 1 0 1 0 1 1 0 0 1 0 1 1 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 1 1 0 0 0 0 0 1 M2M Device Activate PDP context Status request 1 1 0 0 0 0 1 0 M2M Device Activate PDP context accept 1 1 0 0 0 0 1 1 M2M Device Activate PDP context reject 1 1 0 0 0 1 0 0 M2M Device Request PDP context activation 1 1 0 0 0 1 0 1 M2M Device Request PDP context activation rej. 1 1 0 0 0 1 1 0 M2M Device Deactivate PDP context request 1 1 0 0 0 1 1 1 M2M Device Deactivate PDP context accept 1 1 0 0 1 0 0 0 M2M Device Modify PDP context request (Network to MS direction) 1 1 0 0 1 0 0 1 M2M Device Modify PDP context accept (MS to network direction) 1 1 0 0 1 0 1 0 M2M Device Modify PDP context request (MS to network direction) 1 1 0 0 1 0 1 1 M2M Device Modify PDP context accept (Network to MS direction) 1 1 0 0 1 1 0 0 M2M Device Modify PDP context reject 1 1 0 0 1 1 0 1 1 1 0 0 1 1 1 0 1 1 0 0 1 1 1 1 1 1 0 1 0 0 0 0 1 1 0 1 0 0 0 1 1 1 0 1 0 0 1 0 1 1 0 1 0 0 1 1 1 1 0 1 0 1 0 0 1 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 1 0 1 0 1 1 1 1 1 0 1 1 0 0 0 1 1 0 1 1 0 0 1 1 1 0 1 1 0 1 0 1 1 0 1 1 0 1 1 1 1 0 1 1 1 0 0 -
FIG. 4 illustrates an example attach procedure in accordance with an embodiment. For example the attach procedure may be a combined GPRS/IMSI Attach procedure. A Device Attach Update procedure may be defined in order to informM2M Server 420 of MS/M2M 402 performing a successful or unsuccessful attach procedure. For example, MS/M2M 402 may send AttachRequest 422 toNew SGSN 406, for example viaRAN 404. AttachRequest 422 may include a IMSI, a P-TMSI, an old Routing Area Identity (RAI), a classmark, a Cyphering Key Sequence Number (CKSN), an Attach Type, Discontinuous reception (DRX) parameters, an old P-TMSI and/or the like.New SGSN 406 may sendID Request 424 toOld SGSN 408, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receiveID Response 426 which may identify MS/M2M 402, for example by IMSI. Alternatively, or supplemental toID request 424,New SGSN 406 may sendID Request 428 to MS/M2M 402, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receiveID Response 426 which may identify MS/M2M 402, for example by IMSI. -
New SGSN 406 may facilitateAuthentication 428 andAuthentication 430 between MS/M2M 402 andHLR 416, respectively. If a PDP context had previously existed for MS/M2M 402,New SGSN 406 may send DeletePDP Context request 436 toGGSN 410. In response,GGSN 410 may send DeletePDP Context Response 438.New SGSN 406 may send Update Location 440 toHLR 416, for example, if a SGSN number has changed since a previous GPRS detach or if AttachRequest 422 was the first attach request by MS/M2M 402. Update Location 440 may include a SGSN number, a SGSN address, an IMSI for MS/M2M 402, and/or IMEI software version (IMEISV).HLR 416 may send CancelLocation 442 toOld SGSN 408, for example to delete MM and PDP contexts.Old SGSN 408 may respond with CancelLocation ACK 442 upon cancellation of procedures related to MS/M2M 402. To delete an old PDP context, for example if the contexts have yet to be deleted,Old SGSN 408 may send Delete PDP Context request 44 toGGSN 410. GGSN may delete the old PDP context for MS/M2M 402 and respond with DeletePDP Context Response 436. -
HLR 416 may send Insert Subscriber Data 448 toNew SGSN 406, which may include subscriber data for MS/M2M 402. The subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402. The APN may be a default APN for M2M devices. At 449,New SGSN 406 may determine that MS/M2M 402 is an M2M capable device, for example based on the received APN. As an example,New SGSN 406 may compare the received APN with a default APN for M2M devices.New SGSN 406 may acknowledge the receipt of the subscriber data, for example by sending InsertSubscriber Data ACK 450.HLR 416 may acknowledge the creation of a new MM context and/or successful location update by sendingLocation update ACK 452 toNew SGSN 406.Old SGSN 406 may informNew MSCNLR 414 of the location update for MS/M2M 402 by sending Location update Request 454. If the location update is inter-MSC (i.e., more than one MSC is involved),New MSCNLR 414 may sendupdate Location 456 toHLR 416.HLR 416 may send CancelLocation 458 toOld MSCNLR 418.Old MSCNLR 418 may respond with CancelLocation ACK 460.HLR 416 may sendInsert Subscriber Data 462 toNew MSCNLR 414, which may include subscriber data for MS/M2M 402. The subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402. The APN may be a default APN for M2M devices. New MSC/VLR 414 may acknowledge the receipt of the subscriber data, for example by sending InsertSubscriber Data ACK 464.HLR 416 may send update Location ACK 466 toNew MSCNLR 414.New MSCNLR 414 may indicate location acceptance by sending Location Update Accept 468 toNew SGSN 406. -
New SGSN 406 may then process the location update by performing Customized Applications for Mobile Network Logic (CAMEL)Procedures 470.New SGSN 406 may send Attach Accept 472 to MS/M2M 402 indicating that the attach procedure was successful and is complete. MS/M2M 402 may acknowledge Attach Accept 472 by sending AttachComplete 474. Optionally.New SGSN 406 may sendTMSI Reallocation Complete 476, for example if VLR TMSI was changed. - Regardless of whether the attach procedure was successful or unsuccessful,
New SGSN 406 may send M2M Device AttachUpdate 478 toM2M server 420. M2M Device AttachUpdate 478 may be sent fromNew SGSN 406 toM2M Server 420 via the GM2M interface. A Device Attach message may use a skip indicator field to indicate it is an M2M procedure. The SGSN may interpret the skip indicator field. In another embodiment, a WTRU may use an attach type field in GMM ATTACH REQUEST MESSAGE to indicate it is an M2M device. The SGSN may interpret the type of attach field and send DEVICE ATTACH UPDATE to the M2M Server at the end of attach procedure. - There may be several types of M2M Device Attach Update messages that a SGSN may send to an M2M based on an attach procedure. For example, when an SGSN sends an Attach Accept Message to a M2M device, it may also send a M2M Device Attach Accept type M2M Device Attach Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Attach Reject Message to a M2M device, it may also send a M2M Device Attach Reject type M2M Device Attach Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives an Attach complete Message from an M2M device, it may send a M2M Device Attach Complete type M2M Device Attach Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Attach Update messages (e.g., attach accept/reject/complete type messages) are shown in Table 3, below.
-
TABLE 3 Information Elements for M2M Device Attach Update Messages Information IEI Element Type/Reference Presence Format Length Attach result Attach result O V ½ P-TMSI signature P-TMSI signature M TV 4 GMM cause GMM cause O V 1 P-TMSI Mobile identity M LV 6-9 IMSI Mobile identity M LV 6-9 - Additionally, a M2M server may send a M2M Device Attach Status Request message to a SGSN to determine an attach status of an M2M device. The M2M Device Attach Status Request message may be sent via the GM2M server to the SGSN. An example information element for a M2M Device Attach Status request messages is shown in Table 4, below.
-
TABLE 4 Information Elements for M2M Device Attach Status Messages IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 -
FIG. 5 illustrates an example routing area update procedure in accordance with an embodiment. MS/M2M 502 may send RoutingArea Update request 510 toSGSN 506. RoutingArea Update Request 510 may indicate that MS/M2M 502 may have entered a new routing area or may be a periodic routing area update. RoutingArea Update request 510 may include a P-TMSI, an old RAI, an old P-TMSI Signature, an Update Type and the like. Base Station Subsystem (BSS) 504 may add a Cell Global Identity prior to forwarding RoutingArea Update Request 510 toSGSN 506. Security Functions 512 may be executed between MS/M2M 502 andSGSN 506. Upon validating that MS/M2M 502 is allowed in the new RA and updating MM contexts.SGSN 506 may sendRouting Area update 514 to MS/M2M 502.SGSN 506 may performCAMEL Procedures 516 to process the Routing Area Update. MS/M2M 502 may send RoutingArea Update Confirm 518 toSGSN 506 to confirm the routing area update is complete. In an example,SGSN 506 may associate information from M2/M2M 502 with M2M information. For example, the SGSN may have determined MS/M2M 502 was a M2M device in an earlier transaction (such as an attach).SGSN 506 may send M2M RoutingArea Update 520 toM2M Server 508, for example via the GM2M interface. - There may be several types of M2M Device Routing Area Update messages that a SGSN may send to an M2M server based on a Routing Area procedure. For example, when an SGSN sends a Routing Area Update Accept Message to a M2M device, it may also send a M2M Device Routing Area Update Accept type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Routing Area Update Reject Message to a M2M device, it may also send a M2M Device Routing Area Update Reject type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives a Routing Area Update Complete message from a M2M device, it may send a M2M Device Routing Area Update Complete type M2M Device Routing Area Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Routing Area Update messages (e.g., Routing Area Update Accept/Reject/Complete type messages) are shown in Table 5, below.
-
TABLE 5 Information Element for M2M Device Routing Area Update Message IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 Routing area Routing area M V 6 identification identification GMM cause GMM cause M V 1 - Additionally, a M2M server may send a M2M Device Routing Area Information Request message to a SGSN to determine routing area information status of an M2M device. The M2M Device Routing Area Information Request message may be sent via the GM2M interface. An example information element for a M2M Device Routing Area Information Request message is shown in Table 6, below.
-
TABLE 6 Information Elements for M2M Device Routing Area Information Request Messages IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 -
FIG. 6 illustrates an example PDP Context Update procedure in accordance with an embodiment. MS/M2M 602 may send ActivatePDP Context Request 612 toSGSN 606. ActivatePDP Context Request 612 may include a Network Service Access Point Identifier (NSAPI), a Transaction Identifier (TI), a PDP type, a PDP Address, an APN, a Quality of Service (QoS) Request, Protocol Configuration options of the like. At 613,SGSN 606 may determine that MS/M2M 602 is M2M capable, for example based on a received APN, IMSI or other identifier.SGSN 606 may performCAMEL Procedures 614 to process ActivatePDP Context Request 612 and PDP Context establishment.SGSN 606 may validate the PDP Context request. IfSGSN 606 is unable to validate the request, it may send MS/M2M 602 an Activate PDP Context Reject Message (Not shown inFIG. 6 ). However, to create the PDP Context,SGSN 606 may send CreatePDP Context Request 616 toGGSN 608.GGSN 608 may choose to accept or reject the request. If accepted,GGSN 608 may send CreatePDP Context Response 618 toSGSN 606. - MS/
M2M 602,RAN 604 andSGSN 606 may engage in RadioAccess Bearer Setup 620. If BSS trace is activated, SGSN may send Invoketrace 622 toRAN 604.SGSN 606 may also send UpdatePDP Context request 624 toGGSN 608, for example if during RadioAccess Bearer Setup 620 there was a QOS change for MS/M2M 602. If so, GGSN may respond with UpdatePDP Context Response 626.SGSN 606 may performfurther CAMEL Procedures 628 to acknowledge PDP Context establishment. SGSN may send Activate PDP Context Accept 630 to MS/M2M 602, which may indicate that a PDP context was successfully established. Following transfer of Activate PDP Context Accept 630 to MS/M2M 602,SGSN 606 may sendPDP Context Update 632 toM2M Server 610 to informM2M Server 610 of the new PDP Context for MS/M2M 602.PDP Context Update 632 may be sent via the GM2M interface. - There may be several types of M2M Device PDP Context Activation Update messages that a SGSN may send to an M2M Server based on a Routing Area procedure. For example, when a SGSN sends an Activate PDP Context Accept message to a M2M device, it may also send a M2M Device Activate PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Activate PDP Context Reject Message to a M2M device, it may also send a M2M Device Activate PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives a Modify PDP Context Accept message from a M2M device, it may send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. Similarly, a SGSN may send a Modify PDP Context Accept message to a M2M device, in which case it may still send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. A SGSN may also send or receive a Modify PDP Context Reject message, and in either case the SGSN may send a M2M Device Modify PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. Example information elements for M2M Device PDP Context Activation Update messages are shown in Table 7, below.
-
TABLE 7 Information Element for M2M Device PDP Context Activation Update Message Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 Negotiated QoS Quality of service M LV 13-17 Radio priority Radio priority M V 1/2 PDP address Packet data O TLV 4-20 protocol address SM cause SM Cause M V 1 -
FIG. 7 illustrates an example device detach procedure in accordance with an embodiment. MS/M2M 702 may send DetachRequest 714 toSGSN 706. DetachRequest 714 may indicate that MS/M2M 502 desires to detach from the network and may include a detach type, a P-TMSI, a P-TSMI signature, a switch off notification and/or the like.SGSN 706 may sendGGSN 708 DeletePDP Context Request 714. In response,GGSN 708 may delete the PDP Context for MS/M2M 702 and sendSGSN 706 DeletePDP Context response 716.SGSN 706 may performCAMEL Procedures 718 to process the PDP Context deletion.SGSN 706 may send IMSI DetachIndication 720 toMSCNLR 710, for example if DetachRequest 714 indicates that the detach procedure is an IMSI detach procedure.SGSN 706 may send GPRS DetachIndication 722 toMSCNLR 710, for example if DetachRequest 714 indicates that the detach procedure is a GPRS detach procedure.SGSN 706 may performCAMEL Procedures 724 to process detach.SGSN 706 may send Detach Accept 726 to MS/M2M 702 to indicate the detach procedure was successful.SGSN 706 may send M2M Device DetachUpdate 728 toM2M Server 712, for example via the GM2M interface, in order to informM2M Server 712 of the detach procedure. MS/M2M 702, BSS/UTRAN 704, and/orSGSN 706 may also perform PSSignaling Connection Release 730. Example information elements for M2M Device Detach Accept Messages are shown in Table 8, below. -
TABLE 8 Information Element for M2M Device Detach Update Message IEI Information Element Type/Reference Presence Format Length P-TMSI or IMSI Mobile identity M LV 6-9 GMM cause GMM cause O V 1 -
FIG. 8 illustrates an example authentication and key agreement procedure in accordance with an embodiment. The authentication and key agreement procedure may begin with distribution of authentication vectors from Home Environment (HE) to the Serving Network (SN) at 810. VLR/SGSN 804 may sendAuthentication Data Request 812 to HE/HLR 806. In response, at 814 HE/HLR 806 may generate authentication vectors and transmit the authentication vectors to VLR/SGSN 804 as part ofAuthentication data response 816. Each authentication vector may include a random number (RAND), an expected response (XRES), a cipher key (CK), an integrity key (IK), and an authentication token (AUTH). At 818, VLR/SGSN 804 may store the authentication vectors. - At 820, MS/
M2M 802 and VLR/SGSN 804 may engage in authentication and key establishment. VLR/SGSN 804 may select an authentication vector (AV), for example the ith AV (AV(i)), where n may be the number of authentication vectors and 1<=i<=n. VLR/SGSN 804 may transmit user authentication request 824 to MS/M2M 802. User authentication request 824 may include RAND(i) and AUTH(i), which may be the random number and the authentication token for AV(i), respectively. At 826, MS/M2M 802 may verify AUTN(i), for example by checking a Universal Subscriber Identity Module (USIM), and may compute a response based on AV91) (RES(i)). MS/M2M 802 may send RES(i) to VLR/SGSN 804 as part of User authentications response 828. At 830, VLR/SGSN 804 may compare RES(i) and XRES(i). If RES(i) and XRES(i) match, VLR/SGSN 804 may consider the authentication and key agreement exchange to be successfully completed. At 832, VLR/SGSN 804 may select CK(i) and IK(i) as the cyphering and integrity keys. Similarly, at 834, MS/M2M 802 may compute CK(i) and IK(i). VLR/SGSN 804 may send M2M Device Authentication andKey Update 836 toM2M Server 808, for example via the GM2M interface, to inform M2M Server of the successful authentication and key agreement. - There may be several types of M2M Device Authentication and Key Agreement Update messages that a SGSN may send to an M2M server based on an authentication, key agreement and/or cyphering procedure. For example, when a SGSN receives an Authentication and Key Agreement Response Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Response type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives an Authentication and Key Agreement Reject Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Reject Message type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives an Authentication and Key Agreement Failure Message from a M2M device, it may send a M2M Device Ro Authentication and Key Agreement Failure type M2M Device Authentication and Key Agreement Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below. As an example a reject message may include a reject reason and/or the ciphering and/or integrity keys.
-
TABLE 9 Information Elements for M2M Device Authentication and Key Agreement Update Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 Ciphering Key Encryption O V 16 Information Integrity Key Integrity Protection O V 16 Information Reject Cause Reject Cause O V 1 - Additionally, a M2M server may send a M2M Device Authentication and Key Agreement Request message to a SGSN to determine authentication and key agreement status of an M2M device. The M2M Device Authentication and Key Agreement Request message may be sent via the GM2M interface. An example information element for a M2M Device Authentication and Key Agreement Request message is shown in Table 10, below,
-
TABLE 10 Information Element for M2M Device Authentication and Key Agreement Request Messages IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 -
FIG. 9 illustrates an example security mode update procedure in accordance with an embodiment. At 910, Radio Resource Control (RRC) Connection Establishment may be performed between MS/M2M 902 and Serving Radio Network Controller (SRNC) 904. At 912,SRNC 904 may store Hyper Frame Number (HFN) START values and UE Security Capability. MSM/M2M 902 may sendInitial L3 Message 914 to VLR/SGSN 906. For example,Initial L3 Message 914 may be a location update request, a Connection Management (CM) service request a routing area update request, an attach request, a paging response, or the like. At 916, MS/M2M 902 may perform authentication and key generation, for example, as described with respect toFIG. 8 . At 918, VLR/SGSN 906 may decide allowed UE cyphering capabilities (UlAs) and integrity capabilities (UEAs). VLR/SGSN 906 may sendSecurity Mode Command 920 toSRNC 904, which may include UTAs, IK, UEAs, CK, and/or the like. At 922,SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection. -
SRNC 904 may sendSecurity Mode Command 924 to MS/M2M 902.Security Mode Command 924 may include a CN domain, a UTA, FRESH, a UE security capability, UEA, Message Authentication Code for Integrity (MAC-I), and/or the like. At 928, MS/M2M may verify the message and start integrity security. MS/M2M 902 may indicate that the security mode procedure was successful by sendingSecurity Mode Complete 930. At 932,SRNC 904 may verifySecurity Mode Complete 930 has been received.SRNC 904 may send Security Mode Complete to VLR/SRNC 906. At 936, MS/M2M 902 may start cyphering/deciphering. At 938,SRNC 904 may start cyphering/deciphering. VLR/SRNC 906 may send M2M Device Security Mode Update 940 toM2M Server 908, for example via the GM2M interface. - There may be several types of M2M Device Security Mode Update messages that a SGSN may send to an M2M server based on a security mode procedure. For example, when a SGSN receives a Security Mode Complete Message from a RNC, it may also send a M2M Device Security Mode Complete type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives a Security Mode Reject Message from a RNC, it may also send a M2M Device Security Mode Reject Message type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below. As an example, SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
-
TABLE 11 Information Elements for M2M Device Security Mode Update Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 Ciphering Key Encryption O V 16 Information Integrity Key Integrity Protection O V 16 Information Cause Cause O TLV 8 - Additionally, a M2M server may send a M2M Security Request message to a SGSN to determine security mode status of an M2M device. The M2M Device Security Mode Request message may be sent via the GM2M interface. An example information element for a M2M Device Security Mode Request message is shown in Table 12, below.
-
TABLE 12 Information Element for M2M Device Security Mode Request Messages IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 -
FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment.SGSN 1006 may sendLocation Reporting Control 1010 toRAN 1004. For example,SGSN 1006 may sendLocation reporting Control 1010 because it detects form subscriber data for MS/M2M 1002 thatSGSN 1006 should monitor the service area in which MS/M2M 1002 is located.Location reporting Control 1010 may trigger a periodic or standalone report about the current location of MS/M2M 1002.RAN 1004 may store the report, for example if periodic reporting is requested. In another example,SGSN 1006 may request to be notified if MS/M2M 1002 moves into or out of a determined service region. At 1012, MS/M2M 1002 may move to a new service location, which may be in a reporting area request inLocation Reporting Control 1010.RAN 1004 may determine the location of MS/M2M 1002 and sendLocation report 1014 toSGSN 1006.SGSN 1006 may informM2M server 1008 of the location of MS/M2M 1002. For example,SGSN 1006 may send M2M DeviceLocation Report Update 1016 toM2M Server 1008, for example via the GM2M interface. Optionally,SGSN 1006 may cancel an early location report request, for example by sending CancelLocation reporting 1018 toRAN 1004. Example information elements for M2M Device Location Report Update messages are shown in Table 13, below. As an example, SGSN may store an indication that the M2M device is M2M capable from an earlier communication session. -
TABLE 13 Information Elements for M2M Device Location Reporting Update Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 10.5.1.4 Area Identity Area Identity O V As defined in [7] Last Known Last known O V As defined Service Area Service Area in [7] Position Data Position Data O V As defined in [7] - Additionally, a M2M server may send a M2M Security Request message to a SGSN to request a location report status of an M2M device. The M2M Device Location Reporting Request message may be sent via the GM2M interface. An example information element for a M2M Device Location Reporting Request message is shown in Table 14, below.
-
TABLE 14 Information Element for M2M Device Location Reporting Request Messages IEI Information Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 -
FIG. 11 illustrates an example network initiated PDP Context Activation procedure in accordance with an embodiment. In this example, the control procedure may be initiated byM2M Server 1110 or may be initiated by a cellular network node. For example, ifM2M server 1110 is initiating a network control procedure (for example a PDP context activation procedure as shown inFIG. 11 ),M2M Server 110 may sendRequest 1109 toSGSN 1104, for example via the GM2M interface.Request 1109 may be a M2M Device PDP Context Activation/Modification Request Message.SGSN 1104 may sendRequest Initiation 1111 toGGSN 1108 which may initiate a network control procedure such as a PDP context activation procedure. In another example, the PDP context activation procedure may be initiated by a cellular network node. In this example,GGSN 1108 may receive PDP Protocol Data Unit (PDU) 1112 from the cellular network node. In another example,PDP PDU 1112 may be sent fromM2M Server 1110 directly toGGSN 1108. -
GGSN 1108 may determine if a Network-requested PDP Context Activation procedure should be activated.GGSN 1108 may send Routing Information for GPRS 114 toHLR 1106. IfHLR 1106 determined the request may be served,HLR 110 may send Routing Information forGPRS ACK 1116 toGGSN 1108.GGSN 1108 may sendPDU Notification Request 1118 toSGSN 1104, whose identity may be indicated byHLR 1106.SGSN 1104 may sendPDU Notification Response 1120, which may indicate that it will inform MS/M2M 1102 to activate the PDP context indicated.SGSN 1104 may send RequestPDP Context Activation 1124 to MS/M2M 1102. Upon receipt of RequestPDP Context Activation 1124, MS/M2M 1102 may perform PDPContext Activation Procedure 1126 withGGSN 1108. Upon successful completion of PDP Context Activation Procedure 1126 (or unsuccessful completion),SGSN 1104 may sendPDP Context Update 1128 toM2M Server 1110, for example via the GM2M interface. Example information elements for PDP Context Activation/Modification Request Messages are shown in Table 15, below. -
TABLE 15 Information Elements for M2M Device Location Reporting Update Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 PDP address Packet data O TLV 4-20 protocol address - Additionally, a SGSN may send a M2M Device PDP Context Deactivation update to a M2M server, for example upon the completion of a successful PDP context deactivation procedure. There may be several types of M2M Device PDP Context Deactivation messages that a SGSN may send to an M2M server based on a PDP deactivation procedure. For example, when a SGSN receives a Deactivate PDP Context Request Message from a M2M device, it may also send a M2M Device Deactivate PDP Context Request type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Deactivate PDP Context Accept Message to a M2M device, it may also send a M2M Device Deactivate PDP Context Accept Message type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface. Example information elements for M2M Device DP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 16, below.
-
TABLE 16 Information Elements for M2M Device PDP Context Deactivation Update Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 PDP address Packet data O TLV 4-20 protocol address SM cause SM Cause M V 1 - In another example, a network node, such as a M2M server, may initiate a PDP Context Deactivation Request. For example, a M2M server may send a M2M Device PDP Context Deactivation Request to a SGSN. Upon receiving the M2M Device PDP Context Deactivation request from the M2M server, the SGSN may start a PDP context deactivation procedure. Example information elements for M2M Device PDP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 17, below.
-
TABLE 17 Information Elements for M2M Device PDP Context Deactivation Request Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 PDP address Packet data O TLV 4-20 protocol address - In another example, a M2M server may initiate a PDP Context Information Request. For example, a M2M server may send a M2M Device PDP Context Information Request to a SGSN to request PDP context status of a M2M device. Upon receiving the M2 M2M Device PDP Context Information Request from the M2M server, the SGSN may treat the request a M2M PDP Context Activation Update message. Example information elements for M2M Device PDP Context Information Request messages are shown in Table 18, below.
-
TABLE 18 Information Elements for M2M Device PDP Context Information Request Messages Information IEI Element Type/Reference Presence Format Length IMSI Mobile identity M LV 6-9 Negotiated QoS Quality of service M LV 13-17 Radio priority Radio priority M V 1/2 PDP address Packet data O TLV 4-20 protocol address SM cause SM Cause M V 1 - For each of the aforementioned “request” messages originating from a M2M server and sent to a SGSN via the GM2M interface, a timeout may be employed. The timeout may be multiple of 1 second, and in an embodiment may not exceed 60 seconds. For the case in which no response is received within the timeout, the procedure may be cancelled and/or reinitiated.
- Although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer-readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer-readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
Claims (1)
1. A network node comprising:
a transmitter;
a receiver; and
a processor, wherein:
the receiver and the processor are configured to receive a request for an authentication and key establishment procedure from a machine to machine (M2M) device;
the processor is further configured to determine a key agreement between the network node and the M2M device using the authentication and key establishment procedure;
the processor and the receiver are further configured to receive a request from an M2M server for the key agreement to be used to communicate with the M2M device; and
the processor and the transmitter are configured to send the key agreement to the M2M server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/352,408 US20240022885A1 (en) | 2010-06-25 | 2023-07-14 | Interface of an m2m server with the 3gpp core network |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35868810P | 2010-06-25 | 2010-06-25 | |
PCT/US2011/041767 WO2011163561A1 (en) | 2010-06-25 | 2011-06-24 | Interface of an m2m server with the 3gpp core network |
US201313806450A | 2013-06-11 | 2013-06-11 | |
US15/643,411 US20170311363A1 (en) | 2010-06-25 | 2017-07-06 | Interface of an m2m server with the 3gpp core network |
US17/184,070 US11706598B2 (en) | 2010-06-25 | 2021-02-24 | Interface of an M2M server with the 3GPP core network |
US18/352,408 US20240022885A1 (en) | 2010-06-25 | 2023-07-14 | Interface of an m2m server with the 3gpp core network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/184,070 Continuation US11706598B2 (en) | 2010-06-25 | 2021-02-24 | Interface of an M2M server with the 3GPP core network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240022885A1 true US20240022885A1 (en) | 2024-01-18 |
Family
ID=44588168
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/806,450 Active 2034-03-05 US9736873B2 (en) | 2010-06-25 | 2011-06-24 | Interface of an M2M server with the 3GPP core network |
US15/643,411 Abandoned US20170311363A1 (en) | 2010-06-25 | 2017-07-06 | Interface of an m2m server with the 3gpp core network |
US17/184,070 Active 2031-07-30 US11706598B2 (en) | 2010-06-25 | 2021-02-24 | Interface of an M2M server with the 3GPP core network |
US18/352,408 Pending US20240022885A1 (en) | 2010-06-25 | 2023-07-14 | Interface of an m2m server with the 3gpp core network |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/806,450 Active 2034-03-05 US9736873B2 (en) | 2010-06-25 | 2011-06-24 | Interface of an M2M server with the 3GPP core network |
US15/643,411 Abandoned US20170311363A1 (en) | 2010-06-25 | 2017-07-06 | Interface of an m2m server with the 3gpp core network |
US17/184,070 Active 2031-07-30 US11706598B2 (en) | 2010-06-25 | 2021-02-24 | Interface of an M2M server with the 3GPP core network |
Country Status (2)
Country | Link |
---|---|
US (4) | US9736873B2 (en) |
WO (1) | WO2011163561A1 (en) |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5443625B2 (en) | 2010-03-01 | 2014-03-19 | インターデイジタル パテント ホールディングス インコーポレイテッド | Machine-to-machine gateway architecture and functionality |
CN103190197B (en) * | 2010-08-27 | 2016-08-10 | 诺基亚技术有限公司 | The method and apparatus that convenient service quality controls |
US9148830B1 (en) * | 2011-07-06 | 2015-09-29 | Sprint Communications Company L.P. | Reverse link throughput using multiple input multiple output (MIMO) across multiple wireless devices |
US10045175B2 (en) * | 2011-07-14 | 2018-08-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Handling device generated data |
US20130058209A1 (en) * | 2011-09-01 | 2013-03-07 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for high availability machine-to-machine management |
US9232342B2 (en) | 2011-10-24 | 2016-01-05 | Interdigital Patent Holdings, Inc. | Methods, systems and apparatuses for application service layer (ASL) inter-networking |
EP2748970B1 (en) * | 2011-10-28 | 2018-04-11 | Telefonaktiebolaget LM Ericsson (publ) | Processing usage information for machine-to-machine communication |
JP6046734B2 (en) * | 2011-11-04 | 2016-12-21 | インテル コーポレイション | Small data techniques and configuration in wireless communication networks |
US9497102B2 (en) * | 2011-12-06 | 2016-11-15 | Qualcomm Incorporated | Systems and methods for machine to machine device control and triggering |
WO2013089452A1 (en) * | 2011-12-13 | 2013-06-20 | 엘지전자 주식회사 | Method and device for providing a proximity service in a wireless communication system |
EP2779782B1 (en) * | 2011-12-19 | 2016-11-09 | Huawei Technologies Co., Ltd. | Method and device for controlling delivery of packet data protocol context |
US9648653B2 (en) * | 2011-12-20 | 2017-05-09 | Lg Electronics Inc. | User equipment-initiated control method and apparatus for providing proximity service |
EP2837156B1 (en) * | 2012-04-09 | 2018-08-22 | Telefonaktiebolaget LM Ericsson (publ) | Method, apparatus and computer readable medium for providing quality of service functionality supporting a plurality of different data streams in a single ims session for machine-to-machine mtm device communications |
EP2658333B1 (en) * | 2012-04-26 | 2015-10-07 | Belgacom International Carrier Services | System and method for APN correction in GTP messages associated with GPRS data services offered by mobile operator using a sponsor network |
FI125393B (en) * | 2012-07-17 | 2015-09-30 | Arm Finland Oy | A method, apparatus and system for use in a web service |
US10178528B2 (en) * | 2012-07-27 | 2019-01-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Device connectivity management for machine type communications |
US8938731B2 (en) * | 2012-10-24 | 2015-01-20 | Telefonaktiebolaget L M Ericsson (Publ) | Cost optimization for firmware updates for globally mobile machine-to-machine devices |
US10536919B2 (en) * | 2013-01-04 | 2020-01-14 | Iot Holdings, Inc. | Method and apparatus for processing service layer detach commands and attach notifications |
US10834557B2 (en) | 2013-02-13 | 2020-11-10 | Aeris Communications, Inc. | Layered machine to machine (M2M) service methodology using class-based access point names (APNs) for the internet of things |
US9215549B2 (en) | 2013-02-13 | 2015-12-15 | Aeris Communications, Inc. | Method for delivering machine to machine (M2M) application control data over control plane in LTE/EPS utilizing standard bearer management procedures |
CN104104528A (en) * | 2013-04-03 | 2014-10-15 | 株式会社日立制作所 | Registration management device and registration management method for M2M platform |
EP2995099B1 (en) * | 2013-05-06 | 2019-07-10 | Convida Wireless, LLC | Device triggering |
US10104703B2 (en) * | 2013-05-14 | 2018-10-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Node and method for establishing direct communications |
CN105556928B (en) * | 2013-05-20 | 2019-06-11 | 诺基亚技术有限公司 | Via proxy access data source |
US20140376426A1 (en) * | 2013-06-20 | 2014-12-25 | Gary David Boudreau | Machine type communication aggregator apparatus and method |
GB2518256A (en) * | 2013-09-13 | 2015-03-18 | Vodafone Ip Licensing Ltd | Communicating with a machine to machine device |
CN104717600B (en) * | 2013-12-16 | 2019-12-10 | 中兴通讯股份有限公司 | M2M terminal/terminal peripheral accessibility management method and equipment |
EP2890073A1 (en) * | 2013-12-31 | 2015-07-01 | Gemalto SA | System and method for securing machine-to-machine communications |
US11012837B2 (en) * | 2014-05-14 | 2021-05-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Periodic management stabilization for internet of things |
US10135678B2 (en) * | 2014-06-13 | 2018-11-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile network IOT convergence |
US10212030B2 (en) * | 2014-06-13 | 2019-02-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile network IOT convergence |
US9992670B2 (en) | 2014-08-12 | 2018-06-05 | Vodafone Ip Licensing Limited | Machine-to-machine cellular communication security |
GB2529391A (en) * | 2014-08-12 | 2016-02-24 | Vodafone Ip Licensing Ltd | Machine-to-machine cellular communication security |
US9554392B2 (en) | 2014-10-15 | 2017-01-24 | At&T Intellectual Property I, L.P. | Machine to machine traffic management methods and systems |
US9838258B2 (en) | 2014-12-04 | 2017-12-05 | At&T Intellectual Property I, L.P. | Network service interface for machine-to-machine applications |
WO2016208950A1 (en) * | 2015-06-23 | 2016-12-29 | 엘지전자(주) | Method for transmitting/receiving data in wireless communication system, and device for same |
CN107852405B (en) | 2015-07-02 | 2021-02-02 | 康维达无线有限责任公司 | Apparatus for content security for service layer |
CN106413030B (en) * | 2015-08-03 | 2019-11-08 | 北京国双科技有限公司 | A kind of acquisition methods and device of routing area updating RAU indication information |
US9961712B2 (en) * | 2015-10-27 | 2018-05-01 | Verizon Patent And Licensing Inc. | Connection and traffic management in a multiple core network architecture |
KR102458443B1 (en) * | 2016-02-23 | 2022-10-25 | 삼성전자주식회사 | A method and apparuats for charging usage of a radio resource in a wireless communication system |
CN107302781B (en) * | 2016-04-14 | 2020-01-21 | 中国移动通信有限公司研究院 | Communication method and device based on dual-mode relay device, base station and terminal |
US11553561B2 (en) | 2016-10-28 | 2023-01-10 | Apple Inc. | Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication |
US10833876B2 (en) * | 2016-10-28 | 2020-11-10 | Apple Inc. | Protection of the UE identity during 802.1x carrier hotspot and Wi-Fi calling authentication |
WO2018089442A2 (en) * | 2016-11-09 | 2018-05-17 | Intel IP Corporation | Ue and devices for detach handling |
US10440776B2 (en) | 2017-03-17 | 2019-10-08 | Harris Corporation | Non-standard alternate protocol based satellite communications |
KR102449988B1 (en) | 2018-06-29 | 2022-10-05 | 삼성전자주식회사 | Apparatus and method for data communication in wireless communication system |
JP7500906B2 (en) | 2019-02-14 | 2024-06-18 | インテル・コーポレーション | Establishing Cloud-to-Cloud Access for Internet of Things (IoT) Devices |
CN110213744A (en) * | 2019-05-31 | 2019-09-06 | 恒宝股份有限公司 | A kind of smart card realizes the method, apparatus and smart card of M2M business |
CN110351729B (en) * | 2019-07-15 | 2022-05-13 | 西安高新兴物联软件有限公司 | Method, system, terminal and storage medium for automatically matching authentication parameters |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331298A1 (en) * | 2010-03-11 | 2012-12-27 | Huawei Technologies Co., Ltd. | Security authentication method, apparatus, and system |
US20130035067A1 (en) * | 2010-04-12 | 2013-02-07 | Huawei Technolgoies Co., Ltd. | Method and apparatus for authenticating communication device |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008151663A1 (en) * | 2007-06-12 | 2008-12-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatuses for authentication and reauthentication of a user with first and second authentication procedures |
WO2009002236A1 (en) * | 2007-06-27 | 2008-12-31 | Telefonaktiebolaget Lm Ericsson (Publ) | A method and apparatus for enabling connectivity in a communication network |
JP5479450B2 (en) * | 2008-04-02 | 2014-04-23 | ヴォウダフォン・グループ・ピーエルシー | Telecommunications network |
EP2874416B1 (en) * | 2009-04-28 | 2016-04-27 | Koninklijke KPN N.V. | Telecommunications network responsive to server-provided location information |
CN102045691B (en) * | 2009-10-10 | 2014-06-11 | 中兴通讯股份有限公司 | Method and device for acquiring grouped identifiers of machine type communication (MTC) equipment |
CN102687547B (en) * | 2009-12-28 | 2015-09-02 | 交互数字专利控股公司 | Machine-to-machine gateway architecture |
US8995336B2 (en) * | 2010-05-11 | 2015-03-31 | Telefonaktiebolaget L M Ericsson (Publ) | MTC service activation |
-
2011
- 2011-06-24 US US13/806,450 patent/US9736873B2/en active Active
- 2011-06-24 WO PCT/US2011/041767 patent/WO2011163561A1/en active Application Filing
-
2017
- 2017-07-06 US US15/643,411 patent/US20170311363A1/en not_active Abandoned
-
2021
- 2021-02-24 US US17/184,070 patent/US11706598B2/en active Active
-
2023
- 2023-07-14 US US18/352,408 patent/US20240022885A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331298A1 (en) * | 2010-03-11 | 2012-12-27 | Huawei Technologies Co., Ltd. | Security authentication method, apparatus, and system |
US20130035067A1 (en) * | 2010-04-12 | 2013-02-07 | Huawei Technolgoies Co., Ltd. | Method and apparatus for authenticating communication device |
Also Published As
Publication number | Publication date |
---|---|
US20130329653A1 (en) | 2013-12-12 |
WO2011163561A1 (en) | 2011-12-29 |
US20170311363A1 (en) | 2017-10-26 |
US20210185499A1 (en) | 2021-06-17 |
US9736873B2 (en) | 2017-08-15 |
US11706598B2 (en) | 2023-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706598B2 (en) | Interface of an M2M server with the 3GPP core network | |
TWI816160B (en) | Device and method for enhancements to nas protocol to transmit small data over signaling plane | |
US9820335B2 (en) | System and method for sharing a common PDP context | |
US20120252518A1 (en) | Network initiated triggering of an offline device | |
US9276806B2 (en) | Failover recovery methods with an edge component | |
EP3059984A1 (en) | Service capability server (scs) terminated short message service (sms) systems and methods | |
KR20150119420A (en) | Charging architecture for a converged gateway | |
US20130324170A1 (en) | Short messaging service (sms) over evolved packet core using wifi access | |
EP3285519B1 (en) | Inter-user equipment (ue) transfer (iut) for collaborative sessions that include media session information | |
US20120084388A1 (en) | Inter ue transfer between mobile internet protocol clients | |
WO2017123938A1 (en) | Integration of non-3gpp access in a 5g system user plane framework | |
US10212697B2 (en) | Device initiated triggers | |
JP6306630B2 (en) | Privacy for subscriber subscribers | |
US20150319587A1 (en) | Short message service in prose |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |