Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AUTHENTICATION IN PUBLIC LAND MOBILE NETWORKS COMPRISING TENANT SLICES
Document Type and Number:
WIPO Patent Application WO/2019/220002
Kind Code:
A1
Abstract:
Authentication in a public land mobile network, PLMN, having tenant slices is performed by a network element that has: a memory comprising program code; a communication circuitry for communication with entities in the PLMN; and a processing circuitry configured to execute the program code and according to the program code to cause: detecting a registration request from a mobile communication device, MCDt; detecting whether the registration request requests access to a network slice with one-tier authentication with the network slice, and: if yes, causing beginning of authenticating the MCDt with the network slice independently of any authentication between the MCDt and the PLMN.

Inventors:
SARTORI CINZIA (DE)
JERICHOW ANJA (DE)
SCHNEIDER PETER (DE)
Application Number:
PCT/FI2018/050376
Publication Date:
November 21, 2019
Filing Date:
May 18, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NOKIA TECHNOLOGIES OY (FI)
International Classes:
H04W4/70; H04L5/00; H04L41/00; H04W12/06; H04W48/18; H04W76/11
Domestic Patent References:
WO2018079690A12018-05-03
WO2018077960A12018-05-03
WO2018077232A12018-05-03
WO2018038489A12018-03-01
WO2018013925A12018-01-18
WO2018000890A12018-01-04
Foreign References:
US20170303259A12017-10-19
Other References:
3GPP: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System Architecture for the 5G System; Stage 2 (Release 15", 3GPP TS 23.501 V15..10, vol. SA WG2, no. V15.1.0, 28 March 2018 (2018-03-28), pages 1 - 201, XP051450586
Attorney, Agent or Firm:
ESPATENT OY (FI)
Download PDF:
Claims:
CLAIMS

1. A network element for a public land mobile network, comprising:

a memory comprising program code;

a communication circuitry for communication with entities in the public land mobile network; and

a processing circuitry configured to execute the program code and according to the program code to cause:

detecting a registration request from a mobile communication device;

detecting whether the registration request requests access to a network slice with one-tier authentication with the network slice, and:

if yes, causing beginning of authenticating the mobile communication device with the network slice independently of any authentication between the mobile communication device and the public land mobile network.

2. The network element of claim 1, wherein the registration request is a radio resource control connection setup message.

3. The network element of claim 1 or 2, wherein the registration request comprises an indication of a given network slice to which registration is requested.

4. The network element of any one of claims 1 to 3, wherein the registration request comprises Network Slice Selection Assistance lnformation.

5. The network element of claim 4, wherein the Network Slice Selection Assistance lnformation comprises at least one Single Network Slice Selection Assistance lnformation, S-NSSA1, the S-NSSA1 comprising a Slice/Service Type.

6. The network element of claim 5, wherein the S-NSSA1 further comprises a Slice Differentiator that allows differentiating between multiple network slices of the same Service Type.

7. The network element of any one of claims 1 to 6, wherein the registration response comprises a registration area indication.

8. A method in network element of a public land mobile network, comprising: detecting a registration request from a mobile communication device;

detecting whether the registration request requests access to a network slice with one-tier authentication with the network slice, and:

if yes, causing beginning of authenticating the mobile communication device with the network slice independently of any authentication between the mobile communication device and the public land mobile network.

9. The network element of any one of claims 1 to 7 or the method of claim 8, wherein the network element is an authentication server function.

10. The network element of any one of claims 1 to 7 or the method of claim 8, wherein the network element is a core access and mobility management function.

11. The network element of any one of claims 1 to 7 or the method of claim 8, wherein the network element is a security anchor function.

12. The network element of any one of claims 1 to 7 or the method of any one of claims 8 to 11, wherein the causing of the beginning of authenticating the mobile communication device with the network slice comprises obtaining an authentication vector for the mobile communication device from a tenant authentication entity of the network slice based on the registration request.

13. A mobile communication device comprising:

a memory comprising mobile communication device credentials specific to a network slice;

a radio communication circuitry for wirelessly communication; and

a processing circuitry configured to:

detect using the radio communication circuitry an available public land mobile network that provides access to the network slice;

form, based on the mobile communication device credentials, a registration request for one-tier authentication with the network slice independently of any authentication between the mobile communication device and the public land mobile network; and

send, using the radio communication circuitry, the registration request to the available public land mobile network.

14. The mobile communication device of claim 13, wherein the radio communication circuitry is configured to perform wireless local area network communications.

15. The mobile communication device of claim 13 or 14, wherein the registration request is a radio resource control connection setup message.

16. The mobile communication device of claim 13, wherein the registration request is sent independent of performing any cellular network registration.

17. The mobile communication device of any one of claims 13 to 16, wherein the registration request comprises an indication of a given network slice to which registration is requested.

18. The mobile communication device of any one of claims 13 to 17, wherein the mobile communication device has no user interface.

19. The mobile communication device of any one of claims 13 to 18, wherein the mobile communication device is configured to operate solely under control of one or more machines.

20. The mobile communication device of any one of claims 13 to 19, wherein the mobile communication device is configured to receive a registration response from the available public land mobile network.

21. The mobile communication device of claim 20, wherein the registration response comprises information identifying allowed one or more network slices.

22. The mobile communication device of claim 20 or 21, wherein the registration response comprises a 5G Globally Unique Temporary ldentity (5G-GUT1).

23. The mobile communication device of any one of claims 20 to 22, wherein the registration response comprises a registration area indication.

24. A method in a mobile communication device comprising:

maintaining mobile communication device credentials specific to a network slice;

detecting from radio communication an available public land mobile network that provides access to the network slice;

forming, based on the mobile communication device credentials, a registration request for requesting access to the network slice; and

sending, using radio communication, the registration request to the available public land mobile network.

25. The method or apparatus of any one of preceding claims, wherein the public land mobile network is a 5G public land mobile network.

26. A computer program comprising computer executable program code configured cause an apparatus to perform the method of any one of preceding claims, when executing the program code.

27. A computer program product comprising the computer program of claim 26 stored in a non-transitory memory.

Description:
AUTHENTICATION IN PUBLIC LAND MOBILE NETWORKS COMPRISING TENANT SLICES

TECHNICAL FIELD

[0001] The present application generally relates to authentication in public land mobile networks comprising tenant slices ln particular, though not exclusively, the present application relates to authentication in 5G networks comprising tenant slices.

BACKGROUND

[0002] This section illustrates useful background information without admission of any technique described herein representative of the state of the art.

[0003] Public Land Mobile Networks (PLMN) have greatly evolved during past decades from rudimentary voice communication enablers to mobile broadband lnternet devices. Currently, a fifth generation of mobile networks is being designed e.g. by further developing the Long-Term Evolution (LTE). 5G networks also support wireless LAN (WLAN or 1EEE 802.11) radio access.

[0004] Network slicing enables efficient sharing of network resources so that different users or types of uses employ the network resources with different requirements, such as Quality of Service.

[0005] ln order to use a network slice produced by network slicing, a mobile device is first authenticated (primary authentication) based on a subscriber database of the PLMN. Depending on the subscription details and policies of the PLMN, the mobile is by this implicitly authorized to use certain resources in the PLMN. Typically, these resources support a connection to a data network (outside the PLMN), which could be the lnternet, or, for example, a private data network of some third party company. A secondary authentication may be required by the data network, based on an own user data base in the data network ln case of a private data network, the secondary authentication is typically needed.

[0006] The third party is referred to as tenant, when it has rented resources of the PLMN, for example in form of a network slice. E.g., the PLMN operator creates a slice inside the PLMN for the third party, and the connections between the tenant’s mobile devices and the data network use the resources of this slice. Then the third party is a tenant of the PLMN operator. Each time a tenant’s mobile device attaches to the PLMN and is successfully authenticated using primary authentication, the PLMN authorizes it to use the tenant’s slice to connect to the tenant’s data network, but real access to the data network may only be granted by the tenant after successful secondary authentication.

SUMMARY

[0007] Various aspects of examples of the invention are set out in the claims.

[0008] According to a first example aspect of the present invention, there is provided a mobile communication device comprising:

[0009] a memory comprising mobile communication device credentials specific to a network slice;

[0010] a radio communication circuitry for wirelessly communication; and

[0011] a processing circuitry configured to:

[0012] detect using the radio communication circuitry an available public land mobile network that provides access to the network slice;

[0013] form, based on the mobile communication device credentials, a registration request for one-tier authentication with the network slice independently of any authentication between the mobile communication device and the public land mobile network; and

[0014] send, using the radio communication circuitry, the registration request to the available public land mobile network.

[0015] The one-tier authentication with the network slice may be performed independently of any authentication with the public land mobile network so that the mobile communication device can gain access to the network slice with only one authentication process. No public land mobile network attach related authentication may be needed.

[0016] The available public land mobile network may comprise a base station. The base station may be a 5G base station or gNB. The base station may support wireless local area network, WLAN, compliant radio communications. The WLAN radio communications may comply with 1EEE 802.11 standard, any version thereof (such as b, a, n, g, etc.). The base station may be a non- 3GPP base station. The base station may be configured to use N31WF to hide details on non-3GPP access to the 3GPP network.

[0017] The radio communication circuitry may be configured to perform 1EEE 802.11b compliant communications. The radio communication circuitry may be capable of accessing the available public land mobile only with 1EEE 802.11b compliant communications. The radio communication circuitry may be capable of performing cellular communications. The radio communication circuitry may support at least one of: GSM; GPRS; UMTS; LTE; 5G.

[0018] Compliance with 1EEE 802.11b may be used in sake of universality without intention to restrict using more recent versions of 1EEE 802.11 such as 1EEE 802.11h or 1EEE 802.11g.

[0019] The registration request may be a radio resource control connection setup message. The registration request may be sent independent of performing any cellular network registration.

[0020] The registration request may comprise an indication of a given network slice to which registration is requested. The registration request may comprise Network Slice Selection Assistance lnformation. The Network Slice Selection Assistance lnformation (NSSAI) may comprise at least one Single Network Slice Selection Assistance lnformation (S-NSSAI), the S-NSSA1 comprising a Slice/Service Type (S-NSSAI-SST) and optionally a Slice Differentiator (S-NSSAI-SD) that allows differentiating between multiple network slices of the same Service Type.

[0021] The mobile communication device may be configured to support EAP. The mobile communication device may be configured to support EAP-TLS. The mobile communication device may be configured to support EAP, EAP-TLS or any tenant configured authentication method directly with the network slice.

[0022] The mobile communication device may be configured to support 5G AKA. The mobile communication device may be configured to support 5G AKA directly with the network slice.

[0023] The mobile communication device may be configured to support EAP- AKA’. The mobile communication device may be configured to support EAP-AKA’ directly with the network slice.

[0024] The mobile communication device may be configured to support any other EAP method or other tenant configured authentication method. The mobile communication device may be configured to support any other EAP method or any tenant configured authentication method directly with the network slice.

[0025] The mobile communication device may be an lnternet-of-Things device. The mobile communication device may have no user interface. The mobile communication device may be configured to operate under control of one or more machines. The mobile communication device may be configured to operate solely under control of one or more machines.

[0026] The mobile communication device may be configured to receive a registration response from the available public land mobile network. The registration response may comprise information identifying allowed one or more network slices. The registration response may comprise a 5G Globally Unique Temporary ldentity (5G-GUT1). The registration response may comprise a registration area indication. The registration response may comprise one or more mobility restrictions.

[0027] The mobile communication device may be a mobile device. Alternatively, the mobile communication device may be a fixed device.

[0028] According to a second example aspect of the present invention, there is provided a method in a mobile communication device comprising:

[0029] maintaining mobile communication device credentials specific to a network slice;

[0030] detecting from radio communication an available public land mobile network that provides access to the network slice;

[0031] forming, based on the mobile communication device credentials, a registration request for requesting access to the network slice; and

[0032] sending, using radio communication, the registration request to the available public land mobile network.

[0033] According to a third example aspect of the present invention, there is provided a network element for a public land mobile network, comprising:

[0034] a memory comprising program code;

[0035] a communication circuitry for communication with entities in the public land mobile network; and

[0036] a processing circuitry configured to execute the program code and according to the program code to cause:

[0037] detecting a registration request from a mobile communication device;

[0038] detecting whether the registration request requests access to a network slice with one-tier authentication with the network slice, and:

[0039] if yes, causing beginning of authenticating the mobile communication device with the network slice independently of any authentication between the mobile communication device and the public land mobile network.

[0040] According to a fourth example aspect of the present invention, there is provided a method in network element of a public land mobile network, comprising:

[0041] detecting a registration request from a mobile communication device;

[0042] detecting whether the registration request requests access to a network slice with one-tier authentication with the network slice, and:

[0043] if yes, causing beginning of authenticating the mobile communication device with the network slice independently of any authentication between the mobile communication device and the public land mobile network.

[0044] lf the registration request does not request access to the network slice with one-tier authentication with the network slice, attempting to perform network attach with the mobile communication device. The network attach may be based on resources of a subscriber identity module of the mobile communication device. The subscriber identity module may be a universal subscriber identity module.

[0045] The network element may be an authentication server function.

[0046] The network element may be a core access and mobility management function.

[0047] The network element may be a security anchor function.

[0048] The causing of the beginning of authenticating the mobile communication device with the network slice may comprise obtaining an authentication vector for the mobile communication device from a tenant authentication entity of the network slice based on the registration request.

[0049] The public land mobile network may be a 5G public land mobile network.

[0050] According to a fifth example aspect of the present invention, there is provided a computer program comprising computer executable program code configured to cause a mobile communication device to execute the method of the second example aspect.

[0051] According to a sixth example aspect of the present invention, there is provided a computer program comprising computer executable program code configured to cause a network element to execute the method of the fourth example aspect.

[0052] According to seventh example aspect of the present invention, there is provided a program product comprising the computer program of the fifth or sixth example aspect.

[0053] The computer program of any example aspect may be stored in a computer readable memory medium.

[0054] Any foregoing memory medium may comprise a digital data storage such as a data disc or diskette, optical storage, magnetic storage, holographic storage, opto- magnetic storage, phase-change memory, resistive random access memory, magnetic random access memory, solid-electrolyte memory, ferroelectric random access memory, organic memory or polymer memory. The memory medium may be formed into a device without other substantial functions than storing memory or it may be formed as part of a device with other functions, including but not limited to a memory of a computer, a chip set, and a sub assembly of an electronic device. The memory medium may be a non- transitory memory medium.

[0055] Different non-binding example aspects and embodiments of the present invention have been illustrated in the foregoing. The embodiments in the foregoing are used merely to explain selected aspects or steps that may be utilized in implementations of the present invention. Some embodiments may be presented only with reference to certain example aspects of the invention lt should be appreciated that corresponding embodiments may apply to other example aspects as well. For example, the underlying method steps implicitly disclosed by apparatus related aspects and embodiments may be applied as part of various methods of this document as well and vice versa, method steps may be implemented by apparatuses disclosed by this document.

BRIEF DESCRIPTION OF THE DRAWINGS

[0056] For a more complete understanding of example embodiments of the present invention, reference is now made to the following descriptions taken in connection with the accompanying drawings in which:

[0057] Fig. 1 shows an architectural drawing of a system of an example embodiment;

[0058] Fig. 2 shows a block diagram of a mobile communication device of a tenant according to an example embodiment; and

[0059] Fig. 3 shows a flow chart of a process in the mobile communication device of Fig. 2 according to an example embodiment;

[0060] Fig. 4 shows a block diagram of a network element for a public land mobile network according to an example embodiment; and

[0061] Fig. 5 shows a flow chart of a process in the network element of Fig. 4 according to an example embodiment;

[0062] Fig. 6 shows two high-level architectures representative of two different examples embodiments; and

[0063] Fig. 7 shows an example on that how a multi-tenant logic can be applied to the Policy Control function PCF.

DETAILED DESCRIPTON OF THE DRAWINGS

[0064] An example embodiment of the present invention and its potential advantages are understood by referring to Figs. 1 through 7 of the drawings ln this document, like reference signs denote like parts or steps.

[0065] Fig. 1 shows an architectural drawing of a system 100 of an example embodiment. The system comprises a first mobile communication device 110, denoted as MCDt in short; a public land mobile network or PLMN 120 (e.g. a 4G, LTE, or 5G network); an authentication and accounting function 122 AAAplmn; a network slice 124 drawn as part of the PLMN 120; a tenant database DBt 126; and a tenant accounting and authentication function AAAt 128. ln sake of simplicity, Fig. 1 shows the network slice 124 entirely on one PLMN 120. ln an example embodiment, some parts of the network slice 124 are not under control of the PLMN 120. Fig. 1 further shows a WLAN i.e. 1EEE 802.11b compliant access point 121 comprised by the PLMN 120 for WLAN radio access to the PLMN 120 as one portion of a radio interface ln addition, the PLMN 120 normally comprises normal cellular base stations and other equipment not drawn in Fig. 1 in sake of simplicity.

[0066] ln an example embodiment, the MCDt 110 gains access to the network slice 124 by communicating with the network slice 124 over the PLMN WLAN access point 121 to perform one-tier authentication with the AAAt 128. The MCDt 110 need not have any subscriber identity module that would be suited for normal authentication with the PLMN 120 or through the PLMN 120 with a home PLMN (not shown).

[0067] More specifically, in an example embodiment, an S-NSSA1 or S-NSSA1-SD is included in messages exchanged between Core Access and Mobility Management Function (AMF) of the PLMN 120 - Authentication Server Function (AUSF) of the PLMN - tenant-owned Unified Data Management (T-UDM) or between the AMF - T-AUSF (tenant-owned AUSF)- T-UDM and primary authentication is initiated with, for example, EAP-TLS directly with the tenant (if tenant’s subscribers have no US1M credentials) or with one of the mandatory authentication methods (e.g., with 5G AKA or EAP-AKA') (if tenant’s subscriber have US1M credentials), while the PLMN 120 provides an infrastructure access for the network slice 124 based on service level agreements with the tenant ln this example embodiment, no primary authentication for infrastructure usage on the PLMN 120 is needed ln one implementation, there is provided a method within the AUSF of a home PLMN of the MCDt to allow routing the MCDt’s signaling directly to the T-UDM and to run primary authentication with credentials received from the T-UDM. ln another implementation, there is provided a method within the AMF to directly address a tenant’s AUSF, T-AUSF, which is connected to the T-UDM. ln these aforementioned two implementations, the AMF and/or the AUSF are configured to apply decision methods based on the NSSA1, for example, if a message is routed to the AUSF or T-AUSF. lf AUSF, then decision method is needed, whether to route the request to the UDM or to any of the T-UDMs.

[0068] Some generic structures are next described before further illustrating various possibilities of some example embodiments.

[0069] Fig. 2 shows a block diagram of the MCDt 110; comprising:

[0070] a memory 210 comprising MCDt credentials 220 specific to the network slice 124, such as a shared secret known also by the AAAt 128 and device 1D and/or one or more certificates;

[0071] a radio communication circuitry 230 for wirelessly communication (e.g. with the access point 121); and

[0072] a processing circuitry 240 (e.g. one or more of processors, logic circuits, and/or application specific integrated circuits) configured to:

[0073] detect using the radio communication circuitry an available PLMN (e.g., PLMN 120) that provides access to the network slice 124;

[0074] form, based on the MCDt credentials 220, a registration request for one- tier authentication with the network slice 124 independently of any authentication between the MCDt 110 and the PLMN 120; and

[0075] send, using the radio communication circuitry 230, the registration request to the available PLMN.

[0076] Fig. 3 shows a flow chart of a process in the MCDt 110 of Fig. 2 according to an example embodiment, comprising:

[0077] maintaining 310 mobile communication device credentials specific to the network slice 124;

[0078] detecting 320 from radio communication an available PLMN that provides access to the network slice 124 (e.g., by detecting broadcast signals such as an SS1D or system information element of the access point 121);

[0079] forming 330, based on the MCDt credentials, the registration request for requesting access to the network slice 124; and

[0080] sending 340, using radio communication, the registration request to the available PLMN.

[0081] Fig. 4 shows a block diagram of a network element 400 for a PLMN according to an example embodiment, comprising:

[0082] a memory 410 comprising program code 412;

[0083] a communication circuitry 420 for communication with entities in the PLMN; and

[0084] a processing circuitry 430 configured to execute the program code 412 and according to the program code 412 to cause:

[0085] detecting a registration request from the MCDt 110;

[0086] detecting whether the registration request requests access to the network slice 124 with one-tier authentication with the network slice 124, and:

[0087] if yes, causing beginning of authenticating the MCDt 110 with the network slice 124 independently of any authentication between the MCDt and the PLMN 120.

[0088] Fig. 5 shows a flow chart of a process in the network element of Fig. 4, comprising:

[0089] detecting 510 a registration request from the MCDt 110;

[0090] detecting 520 whether the registration request requests access to the network slice 124 with one-tier authentication with the network slice 124, and:

[0091] if yes, causing beginning of authenticating the MCDt with the network slice 124 independently of any authentication between the MCDt 110 and the PLMN 120.

[0092] By authentication between the MCDt 110 and the PLMN 120, reference is made to authenticating these two entities to each other. The network slice 124 can be implemented using the PLMN 120 so that signaling between the MCDt 110 and the network slice 124 can flow between the MCDt 110 and the PLMN 120 as when authenticating the MCDt with the network slice. However, authentication of the MCDt 110 with the network slice 124 is not governed by the PLMN 120. lnstead, in course of successful registration of the MCDt to the network slice 124, any elements of the PLMN 120 not controlled by the network slice 124 are informed of the positive authentication so that access is maintained for the MCDt to the network slice 124.

[0093] ln an example embodiment, requests can be received by same network elements of the PLMN 120 as in a normal network attach, i.e. not to the network slice 124. Then, the requests should be forwarded as required for normal network attach. Some other requests can be received for accessing the network slice 124. To this end, Fig. 6 shows two high-level architectures representative of two different examples embodiments.

[0094] The tenant has provided its users with mobile communication device credentials that comprise or are alternatively formed of: a tenant certificate and a root certificate. A T-UDM comprises the certificates of each MCDt subscribed to the tenant’s network slice 124.

[0095] ln Fig. 6, a multi-tenant database, DB, concept is proposed, using T-UDMs to differentiate from the mobile network operator UDM. ln this example case, the vertical tenant exclusively owns the subscriber data (T-UDM). Primary authentication is performed using the T-UDM.

[0096] Fig. 6 also shows two different sharing models ln a first model, the AUSF is shared between mobile network operator and tenants, each of them having its own T- UDM. ln the second model the AUSF is owned by the tenant, i.e. called T-AUSF.

[0097] ln both options, the primary authentication is performed by the tenant. The tenant has the possibility of having US1M based or non-US!M based primary authentication configured with its subscribers.

[0098] Fig. 7 shows an example on that how a multi-tenant logic can be applied to the Policy Control function PCF of the PLMN 120.

[0099] ln some cases, the tenant requires a very isolated network but using shared spectrum, the RAN resources as well as the AMF-AUSF can be dedicated to the tenant’s network slice ln this case, even a dedicated T-AMF can be introduced lf instead the isolation is not a strict requirement, the vertical can use a shared RAN, AMF and AUSF. ln both cases (or any other intermediate case, e.g. shared RAN but dedicated AMF) the subscriber data can be owned and visible to the tenant only ln order to enable this use case, the following Rel.15 interfaces can be enhanced with the S-NSSA1 information or part of it; that is the SD (service Discriminator) that represents the tenant 1D:

N12: AMF/SEAF-AUSF (S-NSSA1 or S-NSSA1-SD)

N13: AUSF-UDM (S-NSSA1 or S-NSSA1-SD)

For policy:

N7-N15: AMF-PCF (S-NSSA1 or S-NSSA1-SD)

[0100] As used in this document, the term "circuitry" may refer to one or more or all of the following:

(a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and;

(b) combinations of hardware circuits and software, such as (as applicable):

(i) a combination of analog and/or digital hardware circuit(s) with software/firmware; and

(ii) any portions of hardware processor(s) with software (including digital signal processor(s)), software, and memory(ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions); and

(c) hardware circuit(s) and or processor(s), such as a microprocessor(s) or a portion of a microprocessor(s), that requires software (e.g., firmware) for operation, but the software may not be present when it is not needed for operation.

[0101] This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.

[0102] Without in any way limiting the scope, interpretation, or application of the claims appearing below, a technical effect of one or more of the example embodiments disclosed herein is that a network slice can be made accessible to mobile communication devices without need for subscriber identity modules. [0103] Embodiments of the present invention may be implemented in software, hardware, application logic or a combination of software, hardware and application logic. The software, application logic and/or hardware may reside entirely or in part on a memory of the apparatus MCDt 110 or the network element 400. ln an example embodiment, the application logic, software or an instruction set is maintained on any one of various conventional computer-readable media ln the context of this document, a "computer-readable medium" may be any non-transitory media or means that can contain, store, communicate, propagate or transport the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer, with one example of a computer described and depicted in Fig. 4. A computer- readable medium may comprise a computer-readable storage medium that may be any media or means that can contain or store the instructions for use by or in connection with an instruction execution system, apparatus, or device, such as a computer.

[0104] lf desired, the different functions discussed herein may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the before-described functions may be optional or may be combined.

[0105] Although various aspects of the invention are set out in the independent claims, other aspects of the invention comprise other combinations of features from the described embodiments and/or the dependent claims with the features of the independent claims, and not solely the combinations explicitly set out in the claims.

[0106] lt is also noted herein that while the foregoing describes example embodiments of the invention, these descriptions should not be viewed in a limiting sense. Rather, there are several variations and modifications which may be made without departing from the scope of the present invention as defined in the appended claims.