Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 32.808
Word version: 8.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Rationale for the Analysis of a Common User Model and of the Basic Structure of a Common Profile Storage Framework
5
Considerations on a Common User Model
6
Basic Structure of the Common Profile Storage Framework (CPSF)
7
Gap-Analysis
8
Conclusions
A
Example for the realization of an end-user database according to the Common Profile Storage Framework
$
Change history
2
References
p. 7
3
Definitions and abbreviations
p. 12
3.1
Definitions
p. 12
3.2
Abbreviations
p. 13
4
Rationale for the Analysis of a Common User Model and of the Basic Structure of a Common Profile Storage Framework
p. 17
4.1
Motivation - Use Cases
p. 17
4.2
Resulting required steps of investigation
p. 27
5
Considerations on a Common User Model
p. 29
5.1
Network Functions and Management Applications Using Subscriber/User Data
p. 30
5.1.1
Network Supporting Services
p. 30
5.1.1.1
UMTS, CS and PS Network Supporting Services
p. 30
5.1.1.1.1
Location Register
p. 30
5.1.1.1.2
The Equipment Identity Register (EIR)
p. 34
5.1.1.1.3
The Mobile-services Switching Centre (MSC) Server (Media Control)
p. 35
5.1.1.2
IP Multimedia Subsystem (IMS) Network Supporting Services
p. 35
5.1.1.3
I-WLAN
p. 36
5.1.2
Enabling Services
p. 40
5.1.2.1
Presence Service
p. 40
5.1.2.1.1
IETF
p. 40
5.1.2.1.2
3GPP
p. 43
5.1.2.1.3
3GPP2
p. 45
5.1.2.1.4
OMA
p. 45
5.1.2.2
Location Service
p. 50
5.1.2.2.1
3GPP
p. 50
5.1.2.2.2
OMA
p. 51
5.1.2.3
XDM
p. 52
5.1.2.3.1
OMA
p. 52
5.1.2.4
Device Management
p. 55
5.1.2.4.1
OMA
p. 55
5.1.2.5
Authorization and Authentication
p. 58
5.1.2.5.1
ITU-T
p. 58
5.1.2.5.2
IETF
p. 62
5.1.2.5.3
3GPP
p. 66
5.1.2.5.4
OMA
p. 69
5.1.2.6
Accounting
p. 74
5.1.2.6.1
ITU-T
p. 74
5.1.2.6.2
IETF
p. 75
5.1.2.6.3
3GPP
p. 78
5.1.2.6.4
OMA
p. 81
5.1.3
Network Hosted Business Services and Network functions
p. 85
5.1.3.1
MM Messaging Services (MMS)
p. 85
5.1.3.1.1
3GPP
p. 85
5.1.3.1.2
3GPP2
p. 89
5.1.3.1.3
OMA
p. 91
5.1.3.2
Content Services
p. 93
5.1.3.2.1
Digital Right Management (DRM)
p. 93
5.1.3.2.2
Mobile Broadcast (BCAST)
p. 94
5.1.3.2.3
Dynamic Content Delivery (DCD)
p. 100
5.1.3.3
IMS Application Servers
p. 103
5.1.3.3.1
3GPP/3GPP2
p. 103
5.1.3.3.2
OMA
p. 107
5.1.3.4
Store and Forward Messaging
p. 109
5.1.3.4.1
Instant Messaging (IM)
p. 109
5.1.3.5
P2P and Group Communication
p. 111
5.1.3.5.1
Push To Talk Over Cellular (PoC)
p. 111
5.1.3.6
Data Synchronization
p. 114
5.1.3.6.1
OMA
p. 114
5.1.3.7
Gaming Service
p. 116
5.1.3.8
IN Services
p. 118
5.1.3.8.1
General Info
p. 118
5.1.4
Generic User Profile (GUP)
p. 142
5.1.4.1
General Ideas
p. 142
5.1.5
Management Applications
p. 147
5.1.5.1
Subscriber Management
p. 147
5.1.5.1.1
ITU-T
p. 147
5.1.5.1.2
3GPP
p. 148
5.1.5.1.3
3GPP2
p. 151
5.1.5.1.4
TISPAN
p. 152
5.1.5.1.5
OMA
p. 158
5.1.5.1.6
TMF
p. 161
5.1.5.2
Statistics
p. 168
5.1.5.2.1
ITU-T
p. 168
5.1.5.2.2
3GPP
p. 169
5.1.5.3
Charging Management
p. 171
5.1.5.3.1
Offline Charging
p. 172
5.1.5.3.2
Online Charging
p. 173
5.1.5.4
Billing
p. 175
5.1.5.4.1
3GPP
p. 175
5.1.5.5
System Management
p. 175
5.1.5.5.1
ITU-T
p. 175
5.1.5.5.2
3GPP
p. 176
5.1.5.5.3
TMF
p. 177
5.1.5.6
Personal Network Management (PNM)
p. 180
5.1.5.6.1
3GPP
p. 180
5.2
Standardization documents containing subscriber/user information
p. 183
5.3
Basics of a Common User Data Model
p. 186
5.3.1
Characteristics of an End-User
p. 186
5.3.1.1
Types of Data Assigned to an End-User
p. 186
5.3.1.2
The Identity of an End-User
p. 187
5.3.1.2.1
The UID
p. 187
5.3.1.2.2
Representation of the Identity of the End-User through his Keys
p. 188
5.3.1.2.3
Identity Management of the End-User
p. 199
5.3.1.2.3.1
Motivation for analysing Identity Management
p. 199
5.3.1.2.3.2
Identity Management in OMA
p. 202
5.3.1.2.3.3
Identity Management using a common datamodel and the CPSF
p. 205
5.3.1.4
The Relation between an End-User and a Subscriber
p. 206
5.3.2
Semantic Identity of Data Entities
p. 207
5.3.3
Adapting Entities
p. 208
5.3.4
Content of Post Update Triggers
p. 208
5.3.5
Adaptation Layer
p. 208
5.3.6
Different Levels of Data Consolidation
p. 209
5.3.6.1
Adaptation Layer for partial Data Consolidation (Approach 1)
p. 209
5.3.6.2
Adaptation Layer for full data consolidation (Approach 2)
p. 210
5.3.6.3
Mixed Scenarios (Approach 3)
p. 211
6
Basic Structure of the Common Profile Storage Framework (CPSF)
p. 213
6.1
Logical View
p. 213
6.1.1
Actual End-User Data Storage Framework
p. 214
6.1.2
Adaptation Layer Functionality
p. 215
6.1.2.1
Adapting Entities
p. 215
6.1.2.2
Access Control
p. 216
6.1.2.3
Post-Update Trigger Mechanism
p. 216
6.1.2.4
Preserving the Real-Time Capability of the CPSF
p. 216
6.2
Physical View
p. 216
6.2.1
Centralized Data Base
p. 216
6.2.2
Distributed Data Base
p. 217
6.3
Analysis of alternative solutions
p. 218
6.3.1
Logically Centralized Approach
p. 218
6.3.2
Logically Distributed Approach
p. 220
6.4
Tooling
p. 221
7
Gap-Analysis
p. 222
7.1
Concept of the End-User
p. 222
7.2
Concept of a Model Entity for a Contract Holder/Subscriber
p. 222
7.3
Concept of a Contract
p. 222
7.4
Introduction of a network function "Common Profile Store (CPS)"
p. 223
8
Conclusions
p. 224
8.1
Introduce the Concept of an End-User
p. 224
8.2
Introduce the Concept of a Contract
p. 224
8.3
Introduce a network function "Common Profile Store (CPS)"
p. 224
A
Example for the realization of an end-user database according to the Common Profile Storage Framework
p. 226
A.1
The Model Structure
p. 226
A.2
The Network Architecture
p. 229
$
Change history
p. 231