Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 32.808
Word version: 8.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Rationale for the Analysis of a Common User Model and of the Basic Structure of a Common Profile Storage Framework
5
Considerations on a Common User Model
6
Basic Structure of the Common Profile Storage Framework (CPSF)
7
Gap-Analysis
8
Conclusions
A
Example for the realization of an end-user database according to the Common Profile Storage Framework
$
Change history
2
References
3
Definitions and abbreviations
Word‑p. 12
3.1
Definitions
3.2
Abbreviations
Word‑p. 13
4
Rationale for the Analysis of a Common User Model and of the Basic Structure of a Common Profile Storage Framework
Word‑p. 17
4.1
Motivation - Use Cases
4.2
Resulting required steps of investigation
Word‑p. 27
5
Considerations on a Common User Model
Word‑p. 29
5.1
Network Functions and Management Applications Using Subscriber/User Data
Word‑p. 30
5.1.1
Network Supporting Services
5.1.1.1
UMTS, CS and PS Network Supporting Services
5.1.1.1.1
Location Register
5.1.1.1.2
The Equipment Identity Register (EIR)
Word‑p. 34
5.1.1.1.3
The Mobile-services Switching Centre (MSC) Server (Media Control)
Word‑p. 35
5.1.1.2
IP Multimedia Subsystem (IMS) Network Supporting Services
5.1.1.3
I-WLAN
Word‑p. 36
5.1.2
Enabling Services
Word‑p. 40
5.1.2.1
Presence Service
5.1.2.1.1
IETF
5.1.2.1.2
3GPP
Word‑p. 43
5.1.2.1.3
3GPP2
Word‑p. 45
5.1.2.1.4
OMA
5.1.2.2
Location Service
Word‑p. 50
5.1.2.2.1
3GPP
5.1.2.2.2
OMA
Word‑p. 51
5.1.2.3
XDM
Word‑p. 52
5.1.2.3.1
OMA
5.1.2.4
Device Management
Word‑p. 55
5.1.2.4.1
OMA
5.1.2.5
Authorization and Authentication
Word‑p. 58
5.1.2.5.1
ITU-T
5.1.2.5.2
IETF
Word‑p. 62
5.1.2.5.3
3GPP
Word‑p. 66
5.1.2.5.4
OMA
Word‑p. 69
5.1.2.6
Accounting
Word‑p. 74
5.1.2.6.1
ITU-T
5.1.2.6.2
IETF
Word‑p. 75
5.1.2.6.3
3GPP
Word‑p. 78
5.1.2.6.4
OMA
Word‑p. 81
5.1.3
Network Hosted Business Services and Network functions
Word‑p. 85
5.1.3.1
MM Messaging Services (MMS)
5.1.3.1.1
3GPP
5.1.3.1.2
3GPP2
Word‑p. 89
5.1.3.1.3
OMA
Word‑p. 91
5.1.3.2
Content Services
Word‑p. 93
5.1.3.2.1
Digital Right Management (DRM)
5.1.3.2.2
Mobile Broadcast (BCAST)
Word‑p. 94
5.1.3.2.3
Dynamic Content Delivery (DCD)
Word‑p. 100
5.1.3.3
IMS Application Servers
Word‑p. 103
5.1.3.3.1
3GPP/3GPP2
5.1.3.3.2
OMA
Word‑p. 107
5.1.3.4
Store and Forward Messaging
Word‑p. 109
5.1.3.4.1
Instant Messaging (IM)
5.1.3.5
P2P and Group Communication
Word‑p. 111
5.1.3.5.1
Push To Talk Over Cellular (PoC)
5.1.3.6
Data Synchronization
Word‑p. 114
5.1.3.6.1
OMA
5.1.3.7
Gaming Service
Word‑p. 116
5.1.3.8
IN Services
Word‑p. 118
5.1.3.8.1
General Info
5.1.4
Generic User Profile (GUP)
Word‑p. 142
5.1.4.1
General Ideas
5.1.5
Management Applications
Word‑p. 147
5.1.5.1
Subscriber Management
5.1.5.1.1
ITU-T
5.1.5.1.2
3GPP
Word‑p. 148
5.1.5.1.3
3GPP2
Word‑p. 151
5.1.5.1.4
TISPAN
Word‑p. 152
5.1.5.1.5
OMA
Word‑p. 158
5.1.5.1.6
TMF
Word‑p. 161
5.1.5.2
Statistics
Word‑p. 168
5.1.5.2.1
ITU-T
5.1.5.2.2
3GPP
Word‑p. 169
5.1.5.3
Charging Management
Word‑p. 171
5.1.5.3.1
Offline Charging
Word‑p. 172
5.1.5.3.2
Online Charging
Word‑p. 173
5.1.5.4
Billing
Word‑p. 175
5.1.5.4.1
3GPP
5.1.5.5
System Management
5.1.5.5.1
ITU-T
5.1.5.5.2
3GPP
Word‑p. 176
5.1.5.5.3
TMF
Word‑p. 177
5.1.5.6
Personal Network Management (PNM)
Word‑p. 180
5.1.5.6.1
3GPP
5.2
Standardization documents containing subscriber/user information
Word‑p. 183
5.3
Basics of a Common User Data Model
Word‑p. 186
5.3.1
Characteristics of an End-User
5.3.1.1
Types of Data Assigned to an End-User
5.3.1.2
The Identity of an End-User
Word‑p. 187
5.3.1.2.1
The UID
5.3.1.2.2
Representation of the Identity of the End-User through his Keys
Word‑p. 188
5.3.1.2.3
Identity Management of the End-User
Word‑p. 199
5.3.1.2.3.1
Motivation for analysing Identity Management
5.3.1.2.3.2
Identity Management in OMA
Word‑p. 202
5.3.1.2.3.3
Identity Management using a common datamodel and the CPSF
Word‑p. 205
5.3.1.4
The Relation between an End-User and a Subscriber
Word‑p. 206
5.3.2
Semantic Identity of Data Entities
Word‑p. 207
5.3.3
Adapting Entities
Word‑p. 208
5.3.4
Content of Post Update Triggers
5.3.5
Adaptation Layer
5.3.6
Different Levels of Data Consolidation
Word‑p. 209
5.3.6.1
Adaptation Layer for partial Data Consolidation (Approach 1)
5.3.6.2
Adaptation Layer for full data consolidation (Approach 2)
Word‑p. 210
5.3.6.3
Mixed Scenarios (Approach 3)
Word‑p. 211
6
Basic Structure of the Common Profile Storage Framework (CPSF)
Word‑p. 213
6.1
Logical View
6.1.1
Actual End-User Data Storage Framework
Word‑p. 214
6.1.2
Adaptation Layer Functionality
Word‑p. 215
6.1.2.1
Adapting Entities
6.1.2.2
Access Control
Word‑p. 216
6.1.2.3
Post-Update Trigger Mechanism
6.1.2.4
Preserving the Real-Time Capability of the CPSF
6.2
Physical View
6.2.1
Centralized Data Base
6.2.2
Distributed Data Base
Word‑p. 217
6.3
Analysis of alternative solutions
Word‑p. 218
6.3.1
Logically Centralized Approach
6.3.2
Logically Distributed Approach
Word‑p. 220
6.4
Tooling
Word‑p. 221
7
Gap-Analysis
Word‑p. 222
7.1
Concept of the End-User
7.2
Concept of a Model Entity for a Contract Holder/Subscriber
7.3
Concept of a Contract
7.4
Introduction of a network function "Common Profile Store (CPS)"
Word‑p. 223
8
Conclusions
Word‑p. 224
8.1
Introduce the Concept of an End-User
8.2
Introduce the Concept of a Contract
8.3
Introduce a network function "Common Profile Store (CPS)"
A
Example for the realization of an end-user database according to the Common Profile Storage Framework
Word‑p. 226
A.1
The Model Structure
A.2
The Network Architecture
Word‑p. 229
$
Change history
Word‑p. 231