Sign In to Follow Application
View All Documents & Correspondence

System And Method For Providing A Gateway Assisted Cellular Network

Abstract: The present disclosure provides a system (106) and a method for providing a gateway assisted cellular network. The system (106) receives an authentication request from a radio access node (RAN) (102), wherein the RAN (102) is identified based on the authentication request. The system (106) authorizes communication between the RAN (102) and a core network (104) based on the authentication request. The system (106) transmits one or more capabilities associated with the RAN (102) to the core network (104). The system (106) transmits spectrum information from the core network (104) to the RAN (102) based on the one or more capabilities. The system (106) provides access of the core network (104) to one or more users based on the spectrum information.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 March 2023
Publication Number
40/2024
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. JAMADAGNI, Satish
228, 5th Cross, 8th Main, Arekere Micolayout, Bangalore - 560076, Karnataka, India.
2. NAYAKA MYSORE ANNAIAH, Mahesh
173, 7th B Main Road, Hampinagara, RPC Layout, Vijayanagara 2nd Stage, Bengaluru - 560104, Karnataka, India.
3. OOMMEN, Mathew
2105, Bridge View Lane, Plano, TX - 75093, USA.

Specification

DESC:RESERVATION OF RIGHTS
[0001] A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as but are not limited to, copyright, design, trademark, integrated circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (hereinafter referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner.

FIELD OF INVENTION
[0002] The embodiments of the present disclosure relate to a field of wireless networks. More particularly, the present disclosure relates to a system and a method for providing a gateway assisted cellular network.

BACKGROUND
[0003] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0004] Current fifth generation (5G) communication technology is developed as a part of the 3rd Generation Partnership Project (3GPP) and meant to deliver higher multi-giga bytes per second (Gbps) peak data speeds, ultra-low latency, more reliability, massive network capacity, increased availability, and a uniform user experience to multiple users. Higher performance and improved efficiency of the 5G technology connects new industries and provides elevated user experiences. Though, with the release of the 5G technology, some of industry required objectives have been met, but there are still a few issues that need to be resolved, such as related to accommodating industry verticals, architectures to support private networks, and supporting flexible network deployments.
[0005] In addition, available 5G network architecture supports private networks but only in a rudimentary way. Mechanisms for hosting neutral radio access network (RAN) nodes into a network are not currently available leading to under-utilization and monetization of any given spectrum pool. Further, the current 5G architecture does not support coreless operation of radio access nodes which may be “host neutral” or from a private deployment or a host of other possible private/public radio access node deployment combinations. Private radio access node deployment need prior agreements with a macro network operator and prior interoperability with core networks. The available 5G architecture lacks capability where macro networks/macro core networks receive RAN nodes and make them operational.
[0006] There is, therefore, a need in the art to provide a system and a method that can mitigate the problems associated with the conventional systems for hosting RAN nodes.

OBJECTS OF THE INVENTION
[0007] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are listed herein below.
[0008] It is an object of the present disclosure to provide and a system and a method that supports dynamic association/disassociation between a radio access node (RAN) node and a core network via a gateway.
[0009] It is an object of the present disclosure to provide and a system where the gateway is used as a spectrum sharing entity through which the RAN entities request temporary backhaul services, negotiate spectrum for use by the RAN entity, and other such related functions.
[0010] It is an object of the present disclosure to provide and a system where all non-permanent or third party, or private RAN entities will be able to access the core network entities via the gateway.

SUMMARY
[0011] This section is provided to introduce certain objects and aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0012] In an aspect, the present disclosure relates to a system for providing a gateway assisted network. The system includes a processor communicatively coupled to the gateway. The system includes a memory operatively coupled with the processor, where said memory stores instructions which, when executed by the processor, cause the processor receive an authentication request from a radio access node (RAN), where the RAN is identified based on the authentication request. The processor authorizes communication between the RAN and a core network based on the authentication request. The processor transmits one or more capabilities associated with the RAN to the core network. The processor transmits spectrum information from the core network to the RAN based on the one or more capabilities. The processor provides access to the core network to one or more users based on the spectrum information.
[0013] In an embodiment, the processor may receive subscription information from the one or more users connected to the RAN and provide the subscription information to the core network based on the authorized communication.
[0014] In an embodiment, the processor may receive information corresponding to a bandwidth and a count of the one or more users that are connected to the RAN based on the authorized communication and transmit the amount of the bandwidth and the count of the one or more users to the core network.
[0015] In an embodiment, the processor may provide an Internet Service Provider (ISP) service to the RAN from the core network and negotiate the spectrum information with the core network.
[0016] In an embodiment, the one or more capabilities may include services supporting at least one of a Long-Term Evolution (LTE) network, a fourth generation (4G) network, and a fifth generation network (5G).
[0017] In an embodiment, the RAN may be configured to authenticate the one or more users and transmit the subscription information associated with the one or more users to the core network via the processor.
[0018] In an embodiment, the processor may facilitate communication between one or more management plane elements in the RAN and the core network.
[0019] In an aspect, the present disclosure relates to a method for providing a gateway assisted network. The method includes receiving, by a processor, associated with a system, an authentication request from a RAN, where the RAN is identified based on the authentication request. The method includes authorizing, by the processor, communication between the RAN and a core network based on the authentication request. The method includes transmitting, by the processor, one or more capabilities associated with the RAN to the core network. The method includes transmitting, by the processor, spectrum information from the core network to the RAN based on the one or more capabilities. The method includes providing, by the processor, access to the core network to one or more users based on the spectrum information.
[0020] In an embodiment, the method may include receiving, by the processor, subscription information from the one or more users connected to the RAN and providing the subscription information to the core network based on the authorized communication.
[0021] In an embodiment, the method may include receiving, by the processor, information related to a bandwidth and a count of the one or more users that are connected to the RAN based on the authorized communication and transmitting the amount of the bandwidth and the count of the one or more users to the core network.
[0022] In an embodiment, the method may include providing, by the processor, an ISP service to the RAN from the core network and negotiating the one or more spectrum information with the core network.
[0023] In an embodiment, the one or more capabilities may include services supporting at least one of a LTE network, a 4G network, and a 5G network.
[0024] In an embodiment, the method may include authenticating, by the RAN, the one or more users and transmitting the subscription information associated with the one or more users to the core network via the processor.
[0025] In an embodiment, the method may include facilitating, by the processor, communication between one or more management plane elements in the RAN and the core network.

BRIEF DESCRIPTION OF DRAWINGS
[0026] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes the disclosure of electrical components, electronic components, or circuitry commonly used to implement such components.
[0027] FIG. 1 illustrates an example gateway assisted cellular architecture (100), in accordance with an embodiment of the present disclosure.
[0028] FIG. 2 illustrates an example block diagram (200) of a proposed system (106), in accordance with an embodiment of the present disclosure.
[0029] FIG. 3 illustrates an example isolated private fifth generation (5G) network architecture (300), in accordance with an embodiment of the present disclosure.
[0030] FIGs. 4A-4B illustrates example shared private 5G network architecture (400A, 400B), in accordance with embodiments of the present disclosure.
[0031] FIG. 5 illustrates an example network slicing of the private 5G architecture (500), in accordance with an embodiment of the present disclosure.
[0032] FIG. 6 illustrates an example User Plane (600) for data flow, in accordance with an embodiment of the present disclosure.
[0033] FIG. 7 illustrates an example representation (700) of a macro network gateway entity, in accordance with an embodiment of the present disclosure.
[0034] FIG. 8 illustrates an example representation of a NG-C1 interface (800) used by a base station configured in the RAN for communicating with base stations configured in the core network, in accordance with an embodiment of the present disclosure.
[0035] FIG. 9 illustrates an example sequence diagram (900) for mutual authentication and registration between the gateway and the core network, in accordance with an embodiment of the present disclosure.
[0036] FIG. 10 illustrates an example sequence diagram (1000) for dimensioning base station capabilities, in accordance with an embodiment of the present disclosure.
[0037] FIG. 11 illustrates an example method flow diagram of the proposed system (106), in accordance with an embodiment of the present disclosure.
[0038] FIG. 12 illustrates an example computer system (1200) in which or with which embodiments of the present disclosure may be implemented.
[0039] The foregoing shall be more apparent from the following more detailed description of the disclosure.

DETAILED DESCRIPTION
[0040] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address all of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein.
[0041] The ensuing description provides exemplary embodiments only and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0042] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail to avoid obscuring the embodiments.
[0043] Also, it is noted that individual embodiments may be described as a process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.
[0044] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising” as an open transition word without precluding any additional or other elements.
[0045] Reference throughout this specification to “one embodiment” or “an embodiment” or “an instance” or “one instance” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
[0046] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
[0047] The present disclosure describes an architecture that supports dynamic association / disassociation between a private Radio Access Node (RAN) or a host neutral RAN node, and a core network via a gateway. The gateway provides necessary security considerations, spectrum negotiation capabilities, payment capabilities, and associated procedures for enabling dynamic association / disassociation. Further, the gateway-based association between the RAN and the core network may also facilitate mobile radio scenarios where the RAN node may be an unmanned aerial vehicle (UAV). This may include scenarios where the UAV may not have access to the core network for certain periods.
[0048] Various embodiments of the present disclosure will be explained in detail with reference to FIGs. 1-11.
[0049] FIG. 1 illustrates an example gateway assisted cellular architecture (100), in accordance with an embodiment of the present disclosure.
[0050] As illustrated in FIG. 1, a RAN (102) may interface with a core network (104) via a gateway (106). Further, the RAN (102) may include one or more include RAN nodes. The RAN (102) may be an enterprise, macro, private, public, unmanned aerial vehicle (UAV) or an ephemeral RAN attachment to the core network (104). Further, the gateway (106) may facilitate authentication of the RAN (102), using a know your customer verification (KYC), provide exchange of data hierarchies, and privacy requirements.
[0051] In an embodiment, one or more interfaces may be configured between the gateway (106) and the RAN (102). A management plane may be configured that provides authorization and authentication of the RAN (102) itself. The management plane may also handle spectrum allocation to the RAN (102) and handle other related issues pertaining to the RAN (102). The gateway (106) may support exchange of federated Artificial Intelligence (AI) data for operations, administration, and management (OAM) purposes, facilitate interaction between the OAM or management plane elements in the RAN (102) and the core network (104). Further, the gateway (106) may act as an entry point to the core network (104). All non-permanent private RAN entities may be able to access the core network (104) via the gateway (106) which may enforce new trust relationships. When the private RAN access node does not have a spectrum, the gateway (106) may also act as a spectrum sharing entity. The gateway (106) may facilitate the private RAN node to request for temporary backhaul / Internet Service Provider (ISP) services, negotiate spectrum for use, and other such related functions.
[0052] In an embodiment, the gateway (106) may also be referred as a system (106) throughout the disclosure that facilitates dynamic association / disassociation between the RAN (102) and the core network (104).
[0053] In an embodiment, the system (106) may receive an authentication request from the RAN (102), wherein the RAN (102) may be identified based on the authentication request. The system (106) may authorize communication between the RAN (102) and the core network (104) based on the authentication request. The system (106) may facilitate communication between one or more management plane elements in the RAN (102) and the core network (104). This may ensure that authorization of the authentication request.
[0054] In an embodiment, the system (106) may transmit one or more capabilities associated with the RAN (102) to the core network (104). Further, the system (106) may transmit spectrum information from the core network (104) to the RAN (102) based on the one or more capabilities. The one or more capabilities may include but not limited to services supporting at least one of: a Long-Term Evolution (LTE) network, a fourth generation (4G) network, and a fifth generation (5G) network.
[0055] In an embodiment, the system (106) may provide access to the core network (104) to one or more users based on the spectrum information. The system (106) may receive subscription information from the one or more users connected to the RAN (102) and provide the subscription information to the core network (104) based on the authorized communication. Furthermore, the system (106) may receive information related to a bandwidth and a count of the one or more users that may be connected to the RAN (102) based on the authorized communication and transmit the amount of the bandwidth and the count of the one or more users to the core network (104). The system (106) may provide an Internet Service Provider (ISP) service to the RAN (102) from the core network (104) and negotiate the spectrum information with the core network (104).
[0056] In an embodiment, the system (106) may configure the RAN (102) to authenticate the one or more users and transmit the subscription information associated with the one or more users to the core network (104).
[0057] Although FIG. 1 shows exemplary components of the network architecture (100), in other embodiments, the network architecture (100) may include fewer components, different components, differently arranged components, or additional functional components than depicted in FIG. 1. Additionally, or alternatively, one or more components of the network architecture (100) may perform functions described as being performed by one or more other components of the network architecture (100).
[0058] FIG. 2 illustrates an example block diagram (200) of a proposed system (106), in accordance with an embodiment of the present disclosure.
[0059] Referring to FIG. 2, the system (106) may comprise one or more processor(s) (202) that may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that process data based on operational instructions. Among other capabilities, the one or more processor(s) (202) may be configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (106). The memory (204) may be configured to store one or more computer-readable instructions or routines in a non-transitory computer readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory (204) may comprise any non-transitory storage device including, for example, volatile memory such as random-access memory (RAM), or non-volatile memory such as erasable programmable read only memory (EPROM), flash memory, and the like.
[0060] In an embodiment, the system (106) may include an interface(s) (206). The interface(s) (206) may comprise a variety of interfaces, for example, interfaces for data input and output (I/O) devices, storage devices, and the like. The interface(s) (206) may also provide a communication pathway for one or more components of the system (106). Examples of such components include, but are not limited to, processing engine(s) (208) and a database (210), where the processing engine(s) (208) may include, but not be limited to, a data parameter engine (212) and other engine(s) (214). In an embodiment, the other engine(s) (214) may include, but not limited to, a data management engine, an input/output engine, or the like.
[0061] In an embodiment, the processing engine(s) (208) may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (208) may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) (208) may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the system (106) may comprise the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the system (106) and the processing resource. In other examples, the processing engine(s) (208) may be implemented by electronic circuitry.
[0062] In an embodiment, the processor (202) may receive an authentication request via the data parameter engine (212). The authentication request may be from the RAN (102), where the RAN may be identified based on the authentication request. The processor (202) may store the authentication request in the database (210).
[0063] In an embodiment, the processor (202) may authorize communication between the RAN (102) and the core network (104) based on the authentication request. The processor (202) may facilitate communication between one or more management plane elements in the RAN (102) and the core network (104). This may ensure that authorization of the authentication request.
[0064] In an embodiment, the processor (202) may transmit one or more capabilities associated with the RAN (102) to the core network (104). Further, the processor (202) may transmit spectrum information from the core network (104) to the RAN (102) based on the one or more capabilities. The one or more capabilities may include but not limited to services supporting at least one of: a Long-Term Evolution (LTE) network, a fourth generation (4G) network, and a fifth generation (5G) network.
[0065] In an embodiment, the processor (202) may provide access to the core network (104) to one or more users based on the spectrum information. The processor (202) may receive subscription information from the one or more users connected to the RAN (102) and provide the subscription information to the core network (104) based on the authorized communication. Furthermore, the processor (202) may receive a bandwidth and a count of the one or more users that may be connected to the RAN (102) based on the authorized communication and transmit the amount of the bandwidth and the count of the one or more users to the core network (104). The processor (202) may provide an Internet Service Provider (ISP) service to the RAN (102) from the core network (104) and negotiate the spectrum information with the core network (104).
[0066] In an embodiment, the processor (202) may configure the RAN (102) to authenticate the one or more users and transmit the subscription information associated with the one or more users to the core network (104).
[0067] FIG. 3 illustrates an example isolated private fifth generation (5G) network architecture (300), in accordance with an embodiment of the present disclosure.
[0068] In an embodiment, a private 5G network architecture may be categorized into different deployment options with the level of integration with the mobile operator’s public network. This may include an isolated network where the entire private network is owned and operated by the one or more users and completely isolated from a public network. Further, the private 5G network architecture may also include a shared network, which may be hybrid configuration that leverages part of the telecommunication service provider’s infrastructure. Furthermore, the private 5G network architecture may also include a private network slice under the public network. The private network may be realized by network slicing. Leverage operator’s may use existing public network infrastructure and offer private connection through a software defined network slice.
[0069] As illustrated in FIG. 3, in an embodiment, the isolated private 5G network architecture may be hosted and operated by the one or more users to ensure full control of the network. The network may be completely isolated from the public network, minimizing the risk of data breach. However, investment of building and operating the infrastructure may be very high and may require operation by personnel with an expertise in telecommunication networks. The isolated private 5G network may be suitable for public safety agencies or large enterprises with an abundance of resources and a high concern for data privacy. For example, public communication systems may be maintained for rescue teams with an isolated private 5G network set up in a mobile vehicle.
[0070] FIGs. 4A-4B illustrates example shared private 5G network architecture (400A, 400B), in accordance with embodiments of the present disclosure.
[0071] In an embodiment, the shared private 5G network architecture shares the infrastructure of a mobile operator’s public network to lower a cost associated with the private 5G network set up. Depending on a business requirement, the one or more users may choose a number of components to be managed between themselves and the mobile operator.
[0072] As illustrated in FIG. 4A, a user plane function (UPF) and a Multi-access Edge Computing (MEC) may be configured with the RAN (402) where a fast and a stable connection is needed. Further, a business owner may maintain the RAN (402) locally, ensuring control over coverage and network quality while facilitating system management by the mobile operator.
[0073] As illustrated in FIG. 4B, the UPF and the MEC may be configured outside the RAN (402) so that the one or more users may receive low latency communication.
[0074] FIG. 5 illustrates an example network slicing of the private 5G architecture (500), in accordance with an embodiment of the present disclosure.
[0075] As illustrated in FIG. 5, in an embodiment, network slicing of the private 5G architecture may ensure data isolation and network quality when using an end-to-end private 5G connection provided by the mobile operator’s existing infrastructure. This approach may possess a lower investment cost for infrastructure, but may lack control of the network. Further, network slicing of the private 5G network architecture may be suitable for scenarios that require deployment on wide area, such as smart city Internet of Things (IoT) connections or autonomous driving services. Organizations may lease a private bandwidth from the operator and depending on the business type, operators may choose different Service Level Agreements (SLAs) to fit their business needs.
[0076] FIG. 6 illustrates an example User Plane (600) for data flow, in accordance with an embodiment of the present disclosure.
[0077] As illustrated in FIG. 6, the system (106) may utilize a User Plane (606) for data slow/ Quality of Service (QoS) exchange between the RAN (602) and the gateway (604). The User Plane (606) may be a two-way user information and capability configuration/plane that processes subscription configuration received when the RAN (602) attaches to the gateway (604). A RAN node of the RAN (602) may manage the user authentication at the RAN level itself and share a list of users to the gateway (604) for application processing. Further, the RAN node may update the user data/subscription information to the gateway (604) even when a user equipment (UE) is authenticated at the gateway (604).
[0078] FIG. 7 illustrates an example representation (700) of a macro network gateway entity, in accordance with an embodiment of the present disclosure.
[0079] As illustrated in FIG. 7, in an embodiment, the RAN (702) may support the radio access entities, multiple levels of data aggregation, and data breakout levels. Further, the RAN (702) may be able to distinguish multiple levels of data stream hierarchies, device types, and be able to support multiple levels of data breakout mechanisms. Different data streams may be identified by (APNs) or (QCI) or new identifiers that may provide per application service level / QoS requirement index. In one embodiment the MEC and the UPF may be collocated in the RAN node and the gateway (706) may provide a channel to the data path. Further, the gateway (706) acts as an entry point to a core network (704) as where third party, or private RAN entities may be able to access the core network (704) entities via the gateway (706). A public infrastructure (708) (for example internet) may be utilized between the RAN (702) and the core network (704). A management system (710) may be configured to facilitate the authentication and the authorization of the RAN (702) and the UE (712).
[0080] In an embodiment, the following procedures may be used by the gateway (706).
1. Know Your Customer verification (KYC) with a secure mutual authentication between a RAN node and the core network (704) may be enabled by the gateway (706).
2. The gateway (706) and the RAN node spectrum sharing negotiation mechanism may be initiated.
3. The management system (710) may configure the RAN node
4. Subscriber information exchange mechanisms may be enabled between the core network (704) and one or more private RAN nodes via the gateway (706).
[0081] A procedure for onboarding a “Private RAN or a Host neutral RAN node” entity at the gateway may include the following steps:
1. The “private or host neutral” RAN entity may search for the core network entities that may help provide services to its users.
2. The Neutral / Private RAN node may first identify itself via the KYC mechanism.
3. Once the KYC parameters are verified by the gateway entity, the security mechanism may be invoked where the “private or host neutral” node may establish a tunnel between the gateway and the RAN node.
4. Once the security procedure is established, the RAN node may provide its capability information to the core network and the core network may inform the RAN node on the available spectrum bands for use. Further, the core network may download the necessary RAN configuration information that may be acknowledged by the RAN entity.
5. Additional information may be provided by the private RAN node such as the “ephemeral status” of the connection, the amount of bandwidth required, possible number of users that may attach to the RAN during the service period.
6. A mechanism of resolution of the UE credentials may be facilitated using the following steps:
a. The RAN node may inform the gateway/core network that the user verification shall be handled by the RAN node itself.
b. The RAN node may prefer to update the core network of the user list with the capabilities / credentials / service subscription information. Further, the core network may update this information in the appropriate core network entities such as a Home Subscriber Server (HSS), an Enhanced Subscriber Services (ESS), an Electronic Image Stabilization (EIS) so that users may be treated as regular users of the core network.
[0082] FIG. 8 illustrates an example representation of a NG-C1 interface (800) used by a base station configured in the RAN for communicating with base stations configured in the core network, in accordance with an embodiment of the present disclosure.
[0083] As illustrated in FIG. 8, in an embodiment, an NG-C1 interface (802) may be incorporated with the system (106)/gateway (806). The gateway (806) (termed as SSGW in FIG. 8) may interface with the base stations via the NG-C1 interface (802). Through this interface, the macro base stations may register with SSGW as a spectrum owner device and the other base stations may register with SSGW as a spectrum client. The Spectrum client may request the SSGW for additional spectrums. Father, the macro base stations may register with SSGW as spectrum owners and the base stations from the private network may register with the SSGW as the spectrum client and request for additional spectrum dynamically.
[0084] FIG. 9 illustrates an example sequence diagram (900) for mutual authentication and registration between the gateway and the core network, in accordance with an embodiment of the present disclosure.
[0085] As illustrated in FIG. 9, the sequence diagram (900) may include the following steps:
[0086] At step 906: A core network (904) may send a registration request to a gateway (902).
[0087] At step 908: The gateway (902) may accept the registration request and send an acknowledgment to the core network (904).
[0088] At step 910: The core network (904) may send a registration complete message to the gateway (902) and complete the registration.
[0089] FIG. 10 illustrates an example sequence diagram (1000) for dimensioning base station capabilities, in accordance with an embodiment of the present disclosure.
[0090] As illustrated in FIG. 10, the sequence diagram (1000) may include the following steps:
[0091] At step 1006: A gateway (1002) may send an update regarding a capability of one or more base stations (BS) to a core network (1004).
[0092] At step 1008: The core network (1004) may send a BS capability re-dimensioning request to the gateway (1002) based on the approved capability of the one or more base stations (BS).
[0093] At step 1010: The gateway (1002) may send a confirmatory response to the core network (1004) based on approval of the BS capability re-dimensioning request.
[0094] FIG. 11 illustrates an example method flow diagram of the proposed system (106), in accordance with an embodiment of the present disclosure.
[0095] As illustrated in FIG. 11, the method flow diagram (1100) may include the following steps:
[0096] At step 1110: The gNB (1102) may search and store a nearest gateway (1104). The gNB (1102) may also acquire an address of the gateway (1104). Further a SCTP link may be established between the gNB (1102) and the gateway (1104).
[0097] At step 1112: The gNB (1102) may send a gNB-gateway link device capabilities update to the gateway (1104).
[0098] At step 1114: The gateway (1104) may create a gNB context and update the gNB (1102) capabilities.
[0099] At step 1116: The gateway (1104) may send gNB-gateway link 6 GCN capabilities update to the gNB (1102).
[00100] At step 1118: The gNB (1102) may evaluate among the best link 6 GCN and choose the best 6GCN.
[00101] At step 1120: The gNB (1102) may send gNB-gateway set up request to the gateway (1104).
[00102] At step 1122: The gateway (1104) may assess the GW admission control to decide on the admissible capabilities of the gNB (1102) and choose the 6CGNs.
[00103] At step 1124: The gateway (1104) may send gNB-gateway set up response to the gNB (1102).
[00104] At step 1126: The gNB (1102) may evaluate a permissible gNB and 6GCN capabilities and the admitted 6GCNs and determine if it is ok to proceed further.
[00105] At step 1128: The gNB (1102) may send a gNB-gateway 6GCN connectivity request to the gateway (1104).
[00106] At step 1130: The gateway (1104) may send a gateway-6GCN initial context setup request to a 6GCN-1 (1106).
[00107] At step 1132: The gateway (1104) may send a gateway-6GCN initial context setup request to a 6GCN-N (1108).
[00108] At step 1134: The 6GCN-1 (1106) may send a gateway-6GCN initial context setup response to the gateway (1104).
[00109] At step 1136: The 6GCN-N (1108) may send a gateway-6GCN initial context setup response to the gateway (1104).
[00110] At step 1138: The gateway (1104) may send a gNB-gateway 6GCN connectivity response to the gNB (1102).
[00111] At step 1140: The gateway (1104) may be successfully connected with the 6GCN-1 (1106) and the 6GCN-N (1108).
[00112] FIG. 12 illustrates an exemplary computer system (1200) in which or with which embodiments of the present disclosure may be implemented.
[00113] As shown in FIG. 12, the computer system (1200) may include an external storage device (1210), a bus (1220), a main memory (1230), a read-only memory (1240), a mass storage device (1250), a communication port(s) (1260), and a processor (1270). A person skilled in the art will appreciate that the computer system (1200) may include more than one processor and communication ports. The processor (1270) may include various modules associated with embodiments of the present disclosure. The communication port(s) (1260) may be any of an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. The communication ports(s) (1260) may be chosen depending on a network, such as a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the computer system (1200) connects.
[00114] In an embodiment, the main memory (1230) may be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. The read-only memory (1240) may be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chip for storing static information e.g., start-up or basic input/output system (BIOS) instructions for the processor (1270). The mass storage device (1250) may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces).
[00115] In an embodiment, the bus (1220) may communicatively couple the processor(s) (1270) with the other memory, storage, and communication blocks. The bus (1220) may be, e.g. a Peripheral Component Interconnect PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB, or the like, for connecting expansion cards, drives, and other subsystems as well as other buses, such a front side bus (FSB), which connects the processor (1270) to the computer system (1200).
[00116] In another embodiment, operator and administrative interfaces, e.g., a display, keyboard, and cursor control device may also be coupled to the bus (1220) to support direct operator interaction with the computer system (1200). Other operator and administrative interfaces can be provided through network connections connected through the communication port(s) (1260). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system (1200) limit the scope of the present disclosure.
[00117] While considerable emphasis has been placed herein on the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be implemented merely as illustrative of the disclosure and not as a limitation.

ADVANTAGES OF THE INVENTION
[00118] The present disclosure provides the necessary security considerations, the spectrum negotiation capabilities, the payment capabilities, and the associated procedures and mechanisms for a gateway assisted cellular network.
[00119] The present disclosure provides an architecture that supports dynamic association / disassociation between a private Radio Access Node (RAN) and a core network via a gateway.
[00120] The present disclosure provides a gateway that acts as a spectrum sharing entity through which RAN entities may request for temporary backhaul / Internet Service Provider (ISP) services, negotiate spectrum for use, and other such related functions.
,CLAIMS:1. A system (106) for providing a gateway assisted network, the system (106) comprising:
a processor (202) communicatively coupled to the gateway;
a memory (204) operatively coupled with the processor (202), wherein said memory (204) stores instructions which, when executed by the processor (202), cause the processor (202) to:
receive an authentication request from a radio access node (RAN) (102), wherein the RAN (102) is identified based on the authentication request;
authorize communication between the RAN (102) and a core network (104) based on the authentication request;
transmit one or more capabilities associated with the RAN (102) to the core network (104);
transmit spectrum information from the core network (104) to the RAN (102) based on the one or more capabilities; and
provide access of the core network (104) to one or more users based on the spectrum information.
2. The system (106) as claimed in claim 1, wherein the processor (202) is to receive subscription information from the one or more users connected to the RAN (102), and provide the subscription information to the core network (104) based on the authorized communication.
3. The system (106) as claimed in claim 1, wherein the processor (202) is to receive information corresponding to a bandwidth and a count of the one or more users that are connected to the RAN (102) based on the authorized communication, and transmit the amount of the bandwidth and the count of the one or more users to the core network (104).
4. The system (106) as claimed in claim 1, wherein the processor (202) is to provide an Internet Service Provider (ISP) service to the RAN (102) from the core network (104) and negotiate the spectrum information with the core network (104).
5. The system (106) as claimed in claim 1, wherein the one or more capabilities comprise services supporting at least one of: a Long-Term Evolution (LTE) network, a fourth generation (4G) network, and a fifth generation (5G) network.
6. The system (106) as claimed in claim 2, wherein the RAN (102) is configured to authenticate the one or more users and transmit the subscription information associated with the one or more users to the core network (104) via the processor (202).
7. The system (106) as claimed in claim 1, wherein the processor (202) is to facilitate communication between one or more management plane elements in the RAN (102) and the core network (104).
8. A method for providing a gateway assisted network, the method comprising:
receiving, by a processor (202), associated with a system (106), an authentication request from a radio access node (RAN) (102), wherein the RAN (102) is identified based on the authentication request;
authorizing, by the processor (202), communication between the RAN (102) and a core network (104) based on the authentication request;
transmitting, by the processor (202), one or more capabilities associated with the RAN (102) to the core network (104);
transmitting, by the processor (202), spectrum information from the core network (104) to the RAN (102) based on the one or more capabilities; and
providing, by the processor (202), access of the core network (104) to one or more users based on the spectrum information.
9. The method as claimed in claim 8, comprising receiving, by the processor (202), subscription information from the one or more users connected to the RAN (102), and providing the subscription information to the core network (104) based on the authorized communication.
10. The method as claimed in claim 8, comprising receiving, by the processor (202), information corresponding a bandwidth and a count of the one or more users that are connected to the RAN (102) based on the authorized communication and transmitting the amount of the bandwidth and the count of the one or more users to the core network (104).
11. The method as claimed in claim 8, comprising providing, by the processor (202), an Internet Service Provider (ISP) service to the RAN (102) from the core network (104) and negotiating the spectrum information with the core network (104).
12. The method as claimed in claim 8, wherein the one or more capabilities comprise services supporting at least one of: a Long-Term Evolution (LTE) network, a fourth generation (4G) network, and a fifth generation (5G) network.

Documents

Application Documents

# Name Date
1 202321023232-STATEMENT OF UNDERTAKING (FORM 3) [29-03-2023(online)].pdf 2023-03-29
2 202321023232-PROVISIONAL SPECIFICATION [29-03-2023(online)].pdf 2023-03-29
3 202321023232-POWER OF AUTHORITY [29-03-2023(online)].pdf 2023-03-29
4 202321023232-FORM 1 [29-03-2023(online)].pdf 2023-03-29
5 202321023232-DRAWINGS [29-03-2023(online)].pdf 2023-03-29
6 202321023232-DECLARATION OF INVENTORSHIP (FORM 5) [29-03-2023(online)].pdf 2023-03-29
7 202321023232-ENDORSEMENT BY INVENTORS [23-03-2024(online)].pdf 2024-03-23
8 202321023232-DRAWING [23-03-2024(online)].pdf 2024-03-23
9 202321023232-CORRESPONDENCE-OTHERS [23-03-2024(online)].pdf 2024-03-23
10 202321023232-COMPLETE SPECIFICATION [23-03-2024(online)].pdf 2024-03-23
11 202321023232-FORM-8 [28-03-2024(online)].pdf 2024-03-28
12 202321023232-FORM 18 [28-03-2024(online)].pdf 2024-03-28
13 202321023232-Power of Attorney [09-04-2024(online)].pdf 2024-04-09
14 202321023232-Covering Letter [09-04-2024(online)].pdf 2024-04-09
15 202321023232-CORRESPONDENCE(IPO)(WIPO DAS)-23-04-2024.pdf 2024-04-23
16 Abstract1.jpg 2024-06-14
17 202321023232-FORM-26 [28-02-2025(online)].pdf 2025-02-28