Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND DEVICE FOR SERVICE COMPOSITION
Document Type and Number:
WIPO Patent Application WO/2021/223835
Kind Code:
A1
Abstract:
The present disclosure relates to service composition among a group of device, particularly in order to propose a user centric solution for composing a service in wireless network. To this end, the disclosure proposes a method performed by an SCF, comprising: receiving a request from a first device, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices to form a first logical device; and providing configuration information to the one or more second devices based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device. Further, this disclosure also proposes a corresponding method for service composition, which comprises: determining a first logical device to be formed; and sending a request to an SCF, for synthesizing functionalities for the first logical device.

Inventors:
XIAO XUN (DE)
HECKER ARTUR (DE)
DESPOTOVIC ZORAN (DE)
Application Number:
PCT/EP2020/062275
Publication Date:
November 11, 2021
Filing Date:
May 04, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HUAWEI TECH CO LTD (CN)
XIAO XUN (DE)
International Classes:
H04L29/08
Foreign References:
US20160182658A12016-06-23
US20180004580A12018-01-04
Attorney, Agent or Firm:
KREUZ, Georg (DE)
Download PDF:
Claims:
Claims

1. A method (100) for composing a service in wireless network, the method comprising: receiving (101), by a service composition function, SCF (200), a request from a first device (210), wherein the request is used to prescribe synthesized functionalities provided by one or more second devices (220) to form a first logical device; and providing (102), by the SCF (200), configuration information to the one or more second devices (220) based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

2. The method (100) according to claim 1, wherein the request comprises one or more of the following: a name of the first logical device; the synthesized functionalities provided by the one or more second devices (220); a condition to trigger a termination of the prescribed synthesized functionalities.

3. The method (100) according to claim 1 or 2, further comprises: receiving, by the SCF (200), a registration request from the first device (210) and/or the one or more second devices (220), to register the one or more second devices (220) at the SCF (200), wherein the registration request comprises a registration information of the one or more second devices (220).

4. The method (100) according to claim 3, wherein the registration information comprises at least one of: an identifier, a type, a specification, one or more interfaces, one or more applications of the one or more second devices (220), one or more specifications of subscriptions of third party services on the one or more second devices (220), a list of credentials to access the one or more second devices (220), and a list of credentials to access the subscriptions of third party services.

5. The method (100) according to claim 3 or 4, further comprises: sending, by the SCF (200), one or more verifications to the one or more second devices (220) to verify for the registration request.

6. The method (100) according to claim 5, wherein the one or more verifications are further used to check whether a requirement of the prescribed synthesized functionalities can be fulfilled by the one or more second devices (220) according to the registration information for the one or more second devices (220).

7. The method (100) according to one of the claims 3 to 6, comprising: determining, by the SCF (200), based on the registration request and/or a result of the one or more verifications, whether the registration is successful.

8. The method (100) according to claim 7, comprising: sending, by the SCF (200), a registration response to notify the first device (210) that sends the registration request, whether the registration is successful.

9. The method (100) according to one of the claims 1 to 8, wherein the set of actions and/or parameters comprises one or more of the following: one or more logical relationships between the one or more second devices (220), an inter-connection topology defining one or more ingress and/or egress devices of the one or more second devices (220), an interface protocol selection, one or more data exchange rules, one or more data formats, one or more security policies, one or more service quality requirements.

10. The method (100) according to one of the claims 1 to 9, wherein the configuration information comprises one or more of the following: a name of the first logical device; a list of one or more second devices that provide egress data for the prescribed synthesized functionalities; configurations for one or more transmitting interfaces; a list of one or more second devices (220) that consume ingress data for the prescribed synthesized functionalities; configurations for one or more receiving interfaces; required credentials for a second devices (220) to access another second device (220).

11. The method (100) according to one of the claims 1 to 10, comprising: receiving, by the SCF (200), a feedback from the one or more second devices, the feedback indicating that the configuration information has been deployed on the one or more second devices.

12. The method (100) according to one of the claims 2 to 11, comprising: terminating, by the SCF (200), the prescribed synthesized functionalities of the first logical device, if the condition to trigger the termination is met; or, notifying, by the SCF (200), the one or more second devices to remove the configuration information; or sending, by the SCF (200), a summary to the first device (210).

13. A method (900) for service composition in wireless network, the method comprising: determining (901), by a first device (210), a first logical device to be formed; and sending (902), by the first device (210), a request to a service composition function, SCF (200), for synthesizing functionalities for the first logical device, wherein the request is to prescribe synthesized functionalities provided by one or more second devices (220) to form the first logical device.

14. The method (900) according to claim 13, wherein the request comprises one or more of the following: a name of the first logical device; the synthesized functionalities provided by the one or more second devices; a condition to trigger a termination of the prescribed synthesized functionalities.

15. The method (900) according to claim 13 or 14, further comprises: sending, by the first device (210), a registration request to the SCF (200), to register the one or more second devices (220) at the SCF (200), wherein the registration request comprises a registration information of the one or more second devices (220).

16. The method (900) according to claim 15, wherein the registration information comprises at least one of: an identifier, a type, a specification, one or more interfaces, one or more applications of the one or more second devices (220), one or more specifications of subscriptions of third party services on the one or more second devices (220), a list of credentials to access the one or more second devices (220), and a list of credentials to access the subscriptions of third party services.

17. The method (900) according to one of the claims 13 to 16, comprising: sending, by the first device (210), a request to realize the SCF (200).

18. The method (900) according to one of the claims 13 to 17, comprising: receiving, by the first device (210), a registration response from the SCF (200), wherein the registration response is to notify whether the registration is successful.

19. The method (900) according to one of the claims 13 to 18, wherein the first device is one of the one or more second devices (220), the method further comprising: receiving, by the first device (210), configuration information from the SCF (200), wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

20. The method (900) according to one of the claims 13 to 19, comprises: receiving, by the first device (210), a summary from the SCF (200).

21. A network entity (1000) for composing a service in wireless network, wherein the network entity (1000) is configured to: receive a request (1001) from a first device (1100), wherein the request (1001) is used to prescribe synthesized functionalities provided by one or more second devices (1200) to form a first logical device; and provide configuration information (1002) to the one or more second devices (1200) based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

22. A user entity (1100) for service composition in wireless network, wherein the user entity (1100) is configured to: determine a first logical device to be formed; and send a request (1001) to a service composition function, SCF, for synthesizing functionalities for the first logical device, wherein the request (1001) is used to prescribe synthesized functionalities provided by one or more second devices (1200) to form the first logical device.

23. A computer program product comprising a program code for carrying out, when implemented on a processor, the method according to one of the claims 1 to 12, or the method according to one of the claims 13 to 20.

24. A user entity (1100) for service composition in wireless network, comprising: a processor, and a memory coupled to the processor and having processor-executable instructions stored thereon, which when executed by the processor, cause the processor to perform the method of claims 13 to 20.

25. A network entity (1000) for composing a service in wireless network, comprising: a processor, and a memory coupled to the processor and having processor-executable instructions stored thereon, which when executed by the processor, cause the processor to perform the method of claims 1 to 12.

26. A non-transitory machine-readable storage medium having stored thereon processor-executable instructions, which when executed by a processor of a user entity cause the user entity to implement a method for composing a service in wireless network as claims 13 to 20.

27. A non-transitory machine-readable storage medium having stored thereon processor-executable instructions, which when executed by a processor of a network entity cause the network entity to implement a method for composing a service in wireless network as claims 1 to 12.

Description:
METHOD AND DEVICE FOR SERVICE COMPOSITION

TECHNICAL FIELD The present disclosure relates to mobile communication networks, and more particularly to the service composition among a group of devices. The disclosure proposes a user centric solution for composing a synthesized service in wireless network wherein it allows users to define and control the services. BACKGROUND

Today a user normally has multiple personal digital devices. For example, a user at least has a smart phone, one or multiple wearables (e.g. smart watch, fitness armbands and wireless earphones), one or multiple home appliances such as air-conditioner, lighting system, security web-cameras and so on. In addition to digital products, a user also has many applications (Apps) installed on devices, wherein some of Apps are paid subscription services.

A clear trend is that those devices are equipped with networking capability, in which wireless fidelity (WiFi) and Bluetooth interfaces are common. In the near future, interfaces to cellular networks will also be common on devices. For example, many smart watches on the market already are equipped with cellular functionality such as Apple Watch. Future mobile networks are expected to provide pervasive wireless coverage and high throughput/low latency connections for Intemet-of-things (IoT). It is predicted that there will be 50 billion of IoT devices connected to the network by 2025.

Service providers play different roles to provide various services to connected devices. For example, a mobile operator provides mobile communication services to mobile users (e.g. wireless coverage with network connectivity); vendors provide backend services for product maintenance and added value services; over the tops (OTTs) build applications (Apps) to enrich, diversify and amplify the utilizations of devices.

On the one hand, this shows a centralized control paradigm by the service providers. In specific, service catalogs are totally defined by a service provider; the feature on a device has to be provided by its vendor; and a specific functionality of an App has to be enabled by the OTT.

On the other hand, as an owner of devices and Apps, there is a very limited space where the services or features can be customized. It is even impossible for a user to associate two devices to temporally form a logically new device, especially when they are products of different vendors. In general, the current service paradigm can be seen as a provider-centric paradigm.

A provider-centric paradigm shows the following limitations: 1) a user will have to manage different accounts for different services; 2) seamless interoperability between devices of different vendors would be difficult. For example, a user has to manually pair a loudspeaker with a mobile phone via Bluetooth, which is usually cumbersome; 3) a user loses control over data once the data is transmitted to the server side. For example, personal data (e.g. photos, traces, browsing history), profiles and usage statistics are reportedly abused by some service providers (e.g. the privacy branch scandal of Facebook); and 4) a user cannot customize, combine, and/or compose with available services of its own.

However, there are many scenarios where a user needs more flexibility and self-control over the services. The reason is that application scenarios cannot be pre-defmed anymore. For instance, a user may want to dynamically decide if a HiFi loudspeaker should connect to its TV or its mobile phone; a user may also want to project a video through a projector nearby; a user may want to copy some files from a MacBook to a Windows PC without using a third party App; a user may even want to share private data (e.g. photos) in an encrypted way but combine to use multiple cloud storage providers (e.g. split between Google Cloud and Dropbox). All these scenarios will become increasingly popular with personalization. But there is no solution for providing self-control of service or device composition currently.

SUMMARY

In view of the above-mentioned limitations, embodiments of the present invention aim to introduce a solution for composing a synthesized service in wireless network. In particular, an objective is to provide new types of services that may be customized by one or more user’s devices. A general goal aims to allow a user to have fully control on how its devices, Apps and subscriptions therein should work cooperatively.

In particular, it is desired to provide a solution for managing resources to form a temporally collaborative group with a set of devices, Apps and/or subscriptions, so that a logically new device may be created by the wish of the user.

The objective is achieved by embodiments as provided in the enclosed independent claims. Advantageous implementations of the embodiments are further defined in the dependent claims.

A first aspect of the embodiments of the present invention provides a method for composing a service in wireless network, the method comprising: receiving, by a service composition function, SCF, a request from a first device, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices to form a first logical device; and providing, by the SCF, configuration information to the one or more second devices based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

The method of the first aspect enables the first device of a user to compose a synthesized service in the wireless network. In particular, by forming the first logical device, new types of service functionalities may be designed on the first device.

To this end, the present disclosure proposes a new network function, i.e. the SCF that provides the capability of forming the first logical device, and introduces one or more interfaces between the SCF and the first device as well as the one or more second devices respectively.

In an implementation form of the first aspect, the request comprises one or more of the following: a name of the first logical device; the synthesized functionalities provided by the one or more second devices; and a condition to trigger a termination of the prescribed synthesized functionalities. Notably, the request may be created from and defined by the first device. It may define how a set of registered devices will be utilized for a given objective.

In an implementation form of the first aspect, the method further comprises receiving, by the SCF, a registration request from the first device and/or the one or more second devices, to register the one or more second devices at the SCF, wherein the registration request comprises a registration information of the one or more second devices, wherein the registration information comprises at least one of: an identifier, a type, a specification, one or more interfaces, one or more applications of the one or more second devices, one or more specifications of subscriptions of third party services on the one or more second devices, a list of credentials to access the one or more second devices, and a list of credentials to access the subscriptions of third party services.

Optionally, a registered device could be updated by sending anew registration request with new descriptions or by some specific reconfiguration.

In an implementation form of the first aspect, the method further comprises sending, by the SCF, one or more verifications to the one or more second devices to verify for the registration request.

The SCF may verify the status (availability) of the device accordingly. When a device is a connected device, the SCF may verify the device over the connection. When the device is temporarily offline, the SCF may first store the (updated) description of the device and try to check with the device later. Optionally, if a device registers for itself, that is the registration request is directly sent from the device, the SCF may store the device description and mark the device as registered.

In an implementation form of the first aspect, the one or more verifications are further used to check whether a requirement of the synthesized functionalities prescribed may be fulfilled by the one or more second devices according to the registration information of the one or more second devices.

A resource description checklist may be defined for the SCF. In an implementation form of the first aspect, the method further comprises determining, by the SCF, based on the registration request and/or a result of the one or more verifications, whether the registration is successful.

In specific, the SCF may check the requirements of the previously received request for defining the logical device and matches them with the current device availability status.

In an implementation form of the first aspect, the method further comprises sending, by the SCF, a registration response to notify the first device that sends the registration request, whether the registration is successful.

For instance, if the checklist is fulfilled, the SCF may prescribe a workflow with configurations for individual devices. Otherwise, SCF may reply to the requester that the service composition is infeasible.

In an implementation form of the first aspect, the set of actions and/or parameters comprises one or more of the following: one or more logical relationships between the one or more second devices, an inter-connection topology defining one or more ingress and/or egress devices of the one or more second devices, an interface protocol selection, one or more data exchange rules, one or more data formats, one or more security policies, one or more service quality requirements.

Notably, the configuration information may be sent to every involved device with specified configuration parameters.

In an implementation form of the first aspect, the configuration information comprises one or more of the following: a name of the first logical device; a list of one or more second devices that provide egress data for the prescribed synthesized functionalities; configurations for one or more transmitting interfaces; a list of one or more second devices that consume ingress data for the prescribed synthesized functionalities; configurations for one or more receiving interfaces; required credentials for a second devices to access another second device.

Possibly, the configuration information may comprise other parameters as well. In an implementation form of the first aspect, the SCF is in a mobile network, and/or in a cloud data center.

Possibly, in a case of a cloud deployment, the SCF may be a template and instantiated as a virtual instance by a request from the first device. If the SCF is on the first device or in a mobile network, the first device may activate a button to enable the SCF.

Another possibility is that, a part of the SCF functions are situated in the cloud, and another part of the SCF is situated in the operator’s network.

Alternatively, the SCF may be implemented on a terminal device. For example, it may be just a program on smartphone. In this case, this terminal device manages all devices and processes service composition request.

In an implementation form of the first aspect, the method further comprises receiving, by the SCF, a feedback from the one or more second devices, the feedback indicating that the configuration information has been deployed on the one or more second devices.

Generally, the service composition may start to work after the configuration is applied by all involved devices. A summary of the deployment may be collected by the SCF, and may be sent back to the device as a deployment result.

In an implementation form of the first aspect, the method further comprises: terminating, by the SCF, the prescribed synthesized functionalities of the first logical device, if the condition to trigger the termination is met; notifying, by the SCF, the one or more second devices to remove the configuration information; and/or sending, by the SCF, a summary to the first device.

Possibly, a termination condition may be specified as in the previous request, or a new request sent from a device.

In an implementation form of the first aspect, the first device and/or the SCF may be one of the one or more second devices. In particular, the first device and/or SCF may also participate and provide the synthesized functionalities.

A second aspect of the embodiments of the present invention provides a method for service composition in wireless network, the method comprising: determining, by a first device, a first logical device to be formed; and sending, by the first device, a request to an SCF, for synthesizing functionalities for the first logical device, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices to form the first logical device.

In an implementation form of the second aspect, the request comprises one or more of the following: a name of the first logical device; one or more existing synthesized functionalities provided by the one or more second devices; and a condition to trigger a termination of the prescribed synthesized functionalities.

In an implementation form of the second aspect, the method further comprises sending, by the first device, a registration request to the SCF, to register the one or more second devices at the SCF, wherein the registration request comprises a registration information of the one or more second devices, wherein the description comprises at least one of: an identifier, a type, a specification, one or more interfaces, one or more applications of the one or more second devices, one or more specifications of subscriptions of third party services on the one or more second devices, a list of credentials to access the one or more second devices, and a list of credentials to access the subscriptions of third party services.

In an implementation form of the second aspect, the method further comprises sending, by the first device, a request to realize the SCF.

In an implementation form of the second aspect, the method further comprises receiving, by the first device, a registration response from the SCF, wherein the registration response is to notify whether the registration is successful.

In an implementation form of the second aspect, if the SCF is in a mobile network, the method comprises: sending, by the first device, a request for creating the SCF, to an operator; and receiving, by the first device, a resource allocation for the SCF from the operator.

Optionally, this request may be sent by turning on a switch or software button on the device, or it may also be a request sent manually from the device e.g. making a call through the operator’s network. The processing of the request may involve a series of operations such as authentication, authorization and resource management. A response may be sent back to the first device with the deployment result including such as access information.

In an implementation form of the second aspect, if the SCF is in a cloud data center, the method comprises: sending, by the first device, a request to subscribe cloud resource for the SCF, to a cloud service provider; and receiving, by the first device, a response notifying that the cloud resource subscription is successful, from the cloud service provider.

Optionally, the SCF instance may run in cloud data centers ranging from big data centers at a centralized location to micro data centers at edge of the network. The role of a cloud provider may be the resource provider accommodating the SCF instance, or the provider of SCF logic itself.

In an implementation form of the second aspect, the SCF runs on the first device. The SCF may also be realized in a hub device. That is, a personal device acts as a main hub device to provide service composition functionalities with other available devices.

In an implementation form of the second aspect, wherein the first device is one of the one or more second devices, the method further comprises receiving, by the first device, configuration information from the SCF, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

The first device may also deploy the configuration information to realize the synthesized functionalities.

In an implementation form of the second aspect, the method further comprises receiving, by the first device, a summary from the SCF. A third aspect of the embodiments of the present invention provides a network entity for composing a service in wireless network, wherein the network entity is configured to: receive a request from a first device, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices to form a first logical device; and provide configuration information to the one or more second devices based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

Implementation forms of the network entity of the third aspect may correspond to the implementation forms of the method of the first aspect described above. The network entity of the third aspect and its implementation forms achieve the same advantages and effects as described above for the method of the first aspect and its implementation forms.

A fourth aspect of the embodiments of the present invention provides an entity that is controlled by a user for service composition in wireless network, wherein the entity is configured to: determine a first logical device to be formed; and send a request to an SCF, for synthesizing functionalities for the first logical device, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices to form the first logical device.

Implementation forms of the entity of the fourth aspect may correspond to the implementation forms of the method of the second aspect described above. The entity of the fourth aspect and its implementation forms achieve the same advantages and effects as described above for the method of the second aspect and its implementation forms.

A fifth aspect of the embodiments of the present invention provides a computer program product comprising a program code for carrying out, when implemented on a processor, the method according to the first aspect and any implementation forms of the first aspect, or the second aspect and any implementation forms of the second aspect.

A sixth aspect of the embodiments of the present invention provides a computer program product comprising a program code for carrying out, when implemented on a processor, the method according to the second aspect and any implementation forms of the second aspect. According to a seventh aspect of the disclosure, a user entity for service composition in wireless network, comprising: a processor, and a memory coupled to the processor and having processor-executable instructions stored thereon, which when executed by the processor, cause the processor to perform the various method of the second aspect.

An advantage of the user entity according to the seventh aspect is the same as the second aspect described above.

According to eighth aspect of the disclosure, a network entity for service composition in wireless network, comprising: a processor, and a memory coupled to the processor and having processor-executable instructions stored thereon, which when executed by the processor, cause the processor to perform the various method of the first aspect.

An advantage of the network device according to the eighth aspect is the same as the first aspect described above.

According to ninth aspect of the disclosure, a non-transitory machine-readable storage medium having stored thereon processor-executable instructions, which when executed by a processor of a user entity cause the user entity to implement a method for service composition in wireless network as various method of the second aspect.

An advantage of the UE according to the ninth aspect is the same as the second aspect described above.

According to ninth aspect of the disclosure, a non-transitory machine-readable storage medium having stored thereon processor-executable instructions, which when executed by a processor of a network entity, cause the network entity to implement various method of the first aspect. An advantage of the network entity according to the ninth aspect is the same as the first aspect described above.

It has to be noted that all devices, elements, units and means described in the present application could be implemented in the software or hardware elements or any kind of combination thereof. All steps which are performed by the various elements described in the present application as well as the functionalities described to be performed by the various entities are intended to mean that the respective entity is adapted to or configured to perform the respective steps and functionalities. Even if, in the following description of specific embodiments, a specific functionality or step to be performed by external entities is not reflected in the description of a specific detailed element of that entity which performs that specific step or functionality, it should be clear for a skilled person that these methods and functionalities may be implemented in respective software or hardware elements, or any kind of combination thereof.

BRIEF DESCRIPTION OF DRAWINGS

The above described aspects and implementation forms of the embodiments of the present invention will be explained in the following description of specific embodiments in relation to the enclosed drawings, in which

FIG. 1 shows a method according to an embodiment of the invention.

FIG. 2 shows a general SC architecture according to an embodiment of the invention.

FIG. 3 shows a general SC architecture within carrier networks according to an embodiment of the invention. FIG. 4 shows a general SC architecture within OTT service providers according to an embodiment of the invention.

FIG. 5 shows a general SC architecture within a personal device according to an embodiment of the invention. FIG. 6 shows a SC procedure in a 3GPP Network according to an embodiment of the invention. FIG. 7 shows a SC procedure in clouds according to an embodiment of the invention.

FIG. 8 shows a SC procedure in a hub device according to an embodiment of the invention.

FIG. 9 shows a method according to an embodiment of the invention

FIG. 10 shows a network entity according to an embodiment of the invention FIG. 11 shows an entity on a device according to an embodiment of the invention.

DETAILED DESCRIPTION OF EMBODIMENTS

Illustrative embodiments of method, device, and program product for efficient packet transmission in a communication system are described with reference to the figures. Although this description provides a detailed example of possible implementations, it should be noted that the details are intended to be exemplary and in no way limit the scope of the application. Moreover, an embodiment/example may refer to other embodiments/examples. For example, any description including but not limited to terminology, element, process, explanation and/or technical advantage mentioned in one embodiment/example is applicative to the other embodiments/examples. The previously described scenarios, in which a user needs more flexibility and self-control over the services, are considered as a “user-centric” paradigm. Note that a user here is not just limited to a natural person who owns one or several devices or Apps. A user eventually represented or delegated by a device generalizes as a logical entity which would like to form temporal collaborations, which is planned, controlled and operated by the device. The device may under control of the user who owns some resources e.g. devices, equipment and software. In specific, through a device, a user will have to be able to define synthesized services based on existing resources e.g. devices, Apps and subscriptions.

In general, existing solutions provide very limited space for service composition, although they target to enrich their services, e.g. enabling more features on their devices and/or apps. We classify them in the categories as follows.

The first class of existing solutions is called closed ecosystem. Within the ecosystem, the vendor develops various features for its products. Many of them enable cross-device collaborations and improve productivity.

For example, with Apple’s Macbook and iPhone/iPad, the so-called universal clipboard service allows a user to copy at one device and seamlessly paste on another device; another example is Huawei’s Multi-screen Collaborations such as phone-to-laptop and laptop-to- phone synchronization; Huawei’s Vision TV, which integrates IoT control, information sharing center, smartphone mirroring and so on; This in general aims to provide a method for information sharing among multiple devices either through a communication network or a local hub device. In addition, Samsung provides its SmartThings Hub® that supports adding IoT devices to the hub, and managing them through an App. Every vendor on the market tries to build an ecosystem with its own products.

Usually, every vendor tries to specialize its own products in order to distinguish products of its opponents. This aims to compete the market share.

The second class of existing solutions is called third party App. Many third party Apps are developed in order to overcome the barrier between the devices from different vendors. A third party App acts as an intermediate gateway where the information flow can be bridged between two different ecosystems. Examples include many existing cloud storage services (e.g. Google Drive, Dropbox, Microsoft Azure and so on), 1 Clipboard based on Google Drive realizes the same functionality as Apple’s Universal Clipboard, IPassword as a password manager delegating the authentication to different OTTs. In a different way, software companies are also trying to build their own ecosystem that dominates the usage on devices. The third class of existing solutions is from mobile network operators. Recently, operators start to play a more important role not only at traditional mobile services (e.g. calling and internet surfing with a data plan, but also at other service enabling such as proximity services (ProSe). A ProSe function gives a possibility that neighboring devices may communicate directly with each other without going through the infrastructure. An operator acts as a moderator for service discovery and radio resource scheduling, and coordinated devices, no matter if they are from the same vendor, manufacturers or software companies. For example, in V2X communication, cooperative awareness message (CAM) and Decentralized Environmental Notification Message (DENM) are typical scenarios where ProSe function helps.

However, the main disadvantages of existing solutions are summarized as follows.

Firstly, a boundary exists between vendors, software developers (companies) and operators. This boundary blocks many possible collaborations across products, Apps and subscribers. For instance, a Samsung smartphone cannot copy-paste to an Apple’s Macbook, unless an App does this job. Sometimes, such a boundary is deliberately maintained in order to prevent competitors.

Secondly, neither a closed ecosystem nor an App can cover all use cases, which is an endless wish list. Requirements from users are diverse and unpredictable. A service provider focuses more on those popular use cases. Though the ProSe function provided by operators is neutral to the brands, it is only for service discovery between proximity subscribers. Thus, ProSe function does not really enable service composition.

The most critical disadvantage is that services provided with existing solutions are still under the control of respective service providers. What kinds of services and/or how the services that can be used are fully defined by the providers. With considering the first two deficiencies above, a user has limited space to customize with its existing resource to compose individually new services for itself.

In general, there is a missing part to realize a user-centric service paradigm, where a user yields an opportunity to compose self-defined services based on its available resources. Firstly, the terms that will be used in this disclosure are defined as following:

• Device: Device in this disclosure may be a combination of any of the original digital device equipment, Apps and subscription that may belong to an owner. For example, a device may be hardware equipment that has chipsets onboard for one/some/all of purposes on computing, storage and networking; or it may be a hardware component that realizes certain actuations interacting with the physical world (such as cameras, sensors, GPS and so on); or especially it may be a software element (e.g. App) that is realized in a form of computer program running on a dedicated hardware equipment (such as server machine, smart phone, tablet); or it may be a combination of any previous possibilities.

• Subscription: A paid service with access permission (such as membership of video streaming, music, additional cloud resource and so on). A subscription usually binds with a credential that is held by its subscriber. A subscription may be associated with a device.

• User: A user may be a natural person or an organization who is the owner or authorized to manage a set of devices. User and owner may be interchangeably used in this disclosure.

• Service composition (SC): A set of devices (may or may not associate with subscriptions) collaborate in a specified way and form a new logical device that provides synthesized services expected by a user.

FIG. 1 shows a method 100 according to an embodiment of the invention, particularly for composing a service in wireless network. In a particular embodiment of the invention, the method 100 is performed by an SCF 200. The method 100 comprises: a step 101 of receiving, by the SCF 200, a request from a first device 210, wherein the request is used to prescribe synthesized functionalities provided by one or more second devices 220 to form a first logical device; and a step 102 of providing, by the SCF 200, configuration information to the one or more second devices 220 based on the request, wherein the configuration information indicates a set of actions and/or parameters to form the first logical device.

In order to realize an SC, first of all, a user should have a unified way to manage devices, which have been authorized for management. According to embodiments of this invention, the first device may be a device accessed by the user, and the second devices may be the devices, which have been authorized for management, including the devices that may belong to the device owner or may belong to another device owner. In addition, a user may able to plan an SC through the first device. The SC describes how functionalities of a first logical device shall be synthesized. According to embodiments of the invention, the first device sends the request to the SCF, to prescribe the synthesized functionalities provided by one or more second devices. Moreover, a composed service may be deployed and controlled in run time in order to guarantee a service quality and align with any incurred policy.

The technical problem(s) that have to be solved may as follows: 1) how to create and maintain a profile list of all available devices in a unified way; 2) how to formulate an SC based on the maintained device profile, for example, the connectivity pattern, an execution logic and service policy for a set of devices; and 3) how a formulated SC can be deployed onto the respective device.

Embodiments of this invention propose a user-controlled function acting as a service hub for the devices, called service-composition network function (SC-NF) or simply service composition function (SCF).

SC-NF or SCF serves the following main purposes:

Resource Management where profiles of devices with or without subscriptions can be created, updated and removed at the SCF in order to form a unified view. The managed information includes:

- Profiles of devices/subscriptions: specifications of the devices (e.g. capacity, type, feasible interfaces, functions and so on);

- Credentials: accounts (e.g. user names and passwords) of devices or subscriptions (e.g. Apps running on the devices);

Formulating SC, where a composition scheme and policy requested from a device with available devices will be sent to SCF. After receiving the request, SCF generates a workflow configuration for all involved devices and/or itself. The configuration specifies parameters for interaction protocols, interfaces. SC Deployment, where SCF instructs every involved device with the generated workflow configuration so that the composed service is activated. During the run time, SCF may receive run-time data from the devices for monitoring and service quality control.

A general architecture with the proposed SCF / SC-NF 200, according to an embodiment of the invention, is depicted in FIG. 2.

A device Dev U 210 which has the authority to manage the devices 220 (i.e. Devi, Dev2 to Dev K and Dev U), is shown in FIG. 2. The devices 220 may be controlled by the owner of the device U. The devices 220 may be owned by the user of device Dev U 210 or by other users. A user may use the Dev U 210 to interact with SC-NF 200 where such devices may or may not participate an SC. The general procedure for an SC is described as follows.

Firstly, a device may be registered to SC-NF 200, wherein a profile list will be created at SC-NF 200 and specifications, configurations, profiles and credentials are maintained there.

Secondly, an SC request is sent to SC-NF 200 from the Dev U 210. In the request, a set of devices are specified and how involved devices should collaborate to each other is prescribed. These tasks will be done with signaling between the SC-NF 200 and the Dev U 210 over an interface, for instance, named as Intf_SC-NF2Dev.

Thirdly, the SC request will be processed by the SC-NF 200. After that, SC-NF 200 will decompose the SC into detailed configurations for every device 220 with logical relationships, interface parameters, collaboration policies and so on.

The detailed configurations may be deployed onto each device 220 to realize the SC. After the deployment, SC-NF 200 monitors the execution status and coordinate the involved resource to fulfill service requirements if applicable. These tasks may be done with the signaling between the SC-NF 200 and every device 220 over an interface, e.g. the Intf SC- NF2Dev.

The SC-NF 200 has multiple embodiment options, which are briefly discussed as follows. The first embodiment is that the SC-NF 200 may be implemented in an operator’s network. For example, the operator may provision resource to run an SC-NF 200 instance in the operator’s network. The Dev U 210 interacts with the SC-NF instance over wireless connectivity provided by a mobile network. The architecture according to this embodiment of the invention, is depicted in FIG. 3.

The second embodiment option is that the SC-NF 200 may be implemented as an OTT service as shown in FIG. 4. For example, a cloud data center provider may provision resource to run an SC-NF 200 as a tenant service. The cloud data center guarantees provisioned execution resource to the SC-NF 200. In addition, a cloud service provider could also provide SC-NF instantiation. The device 210 may access the SC-NF 200 through any possible network connectivity such as mobile network / WiFi connections.

Another possibility of the architecture is decentralization (not shown in figure here). The decentralized architecture may be the combined architecture of FIG. 3 and FIG. 4. For instance, a part of the SC-NF 200 functions situate in OTT (e.g. part 1), and a part of the SC-NF 200 situate in operator’s network (e.g. part 2). The part 1 and part 2 coordinate with each other to provide functionalities of a logic SC-NF entity.

The third embodiment is that an SC-NF 200 may be implemented on a device 220 (e.g. Dev2) as shown in FIG. 5. For example, it may be just a program on a smartphone considering that the smartphone may be capable enough to provide resource for SC-NF 200. In this case, the Dev U 210 manages all resources and processes SC request.

Another example is that the main hub device or the SC-NF 200 may situate in a local network, e.g. router or WiFi box at home. The Dev U 210 may manage and control some/all devices at home to compose a service using local wireless network.

In another possible implementation, the Dev U 210 may proactively collect or have the information of other devices around, and start to design SC with the discovered resource. For example, the Dev U 210 may send broadcast or unicast message to each of the devices nearby to compose a service. All these variants will be further discussed in following embodiment sections. SC-NF or SCF in 3GPP network: The first embodiment is that the SC is realized by utilizing a mobile network system. In this case, devices interact with SC-NF 200, which is a special user plane network function (UP-NF) long-lived running in an operator’s network domain. The detailed procedure is illustrated in FIG. 6.

1. The device 210 accessed by a user may send a request for an SC-NF instance creation. The request may be an activation switch turned on the device or it may also be a request sent manually from the device 210 e.g. making a call through the operator’s network. la. This request is received by the network, which will allocate resource for deployment. Processing the request involves a series of operations such as authentication (e.g. Authentication Service Function (AUSF)), authorization (e.g. Policy Control Function (PCF)) and resource management. This may also involve the location service in order to have a location-based deployment to the device 210. The resource allocation will be done by interacting with the (virtualized) NF management interface (such as ETSI Network Function Virtualization (NFV) manager). lb. The device 210 may receive a response, wherein the response may comprise access information and/or deployment result. 2. A device 220 is registered at SC-NF 200. In registration, it comprises registration information, particularly description, of the device 220. Attributes of a device description may include one or more of the attributes in Table 1 as example, or may not be limited to the fields in Table 1. Table 1 Device Description Attribute List

A registered device 220 may be updated by sending a new registration request with new descriptions or by some specific reconfiguration.

According to embodiment of the invention, there are generally two ways to register a device. The first way may be that a device registers for another device at SC-NF 200. For example, Dev U registers for Dev A. The second way may be that a device registers itself at SC-NF 200. For example, the Dev U 210 registers itself, which refers to a case that Dev U 210 and Dev A 220 are the same, i.e., Dev U 210 is Dev A 220.

3. The SC-NF 200 receives the registration request and there are two possibilities to verify the status (availability) of the device 220:

3a. The first case is that the device 220 is a connected device. SC-NF 200 verifies the device 220 over the connection. For the type of a hardware equipment or component, the status check could be its specifications that are provided within the registration request; for the type of an App, the status check could be its supported functionality features; for a subscription, the status check could be its tariff and/or its accessibility to the subscribed service;

3b. The second case is that the device 220 is temporarily offline. In this case, SC-NF 200 will first store the (updated) description of the device 220 and try to check with the device later. The check can be done in a periodical manner with a threshold limit to stop. If the number of trials reaches the limit, the registration of this device fails.

However, there is an exception where a device is an offline device. For example, a device 220 may only have Bluetooth, infrared and/or WiFi interface(s), so it cannot be reached by or connect to SC-NF 200. From the SC-NF’s point of view, the device 220 is an offline resource. In this case, the SC-NF 200 ignores its availability check while just stores the device description. However, an offline device should also be able to participate a future SC, while the device 220 will have to make sure the availability of a non-cellular device.

4. The SC-NF 200 sends a registration response to notify the registration result. The registration response may be sent to the SC-NF client or the registered device 220, depending on the method how the device 220 was registered. A successful registration may be that a device eventually passes the verification check. A failed registration may be that the SC-NF 200 finds the attributes of the verified device not matching with the registration requests or the SC-NF 200 fails to communicate with the device.

5. An SC request is defined and sent to SC-NF 200. The service composition request defines how a set of registered resources may be utilized for a given objective. In specific, an SC may include at least one of the parameters in Table 2 for example.

Table 2. Service Composition Request Fields

An SC request may be generated by the device 210. The device 210 may provide a friendly interface to the user who may easily design an SC, e.g. having a graphic user interface and/or a command line terminal. With synchronized view of all available devices, an initial feasibility can be done for a proposed SC. Note that an SC request may also include SC- NF 200 as part of the workflow. 6. The SC request is processed by SC-NF 200. In specific, SC-NF 200 may check the requirements of the SC request and match them with the current device availability status. This may include the checklist in Table 3.

Table 3. Resource Description Checklist

If the checklist is fulfilled, SC-NF 200 prescribes a workflow with configurations for individual device. Otherwise, SC-NF 200 will reply to the device 210 that the SC is infeasible. The configuration is sent to every involved device with specified configuration parameters. The configuration may at least contain the parameters in Table 4.

Table 4. Configuration for a Service Composition

7a. Configurations will be deployed by all involved devices and after that the SC starts to work. A summary of the deployment is collected by the SC-NF 200 and sent back to the device 210 as a deployment result. 7b. In run-time, according to the monitoring status, the devices 220 may send status update to SC-NF 200. Sometimes, the device 220 may find the service quality cannot be fulfilled, and the devices 220 may send proactively status update to the SC-NF 200.

While in some other scenarios, the SC-NF 200 may also update the quality requirements to the devices 200, for example, the radio environment is changed. If the adjustment cannot fulfill the requirement of the SC, SC-NF 200 stops the SC.

8. SC-NF 200 sends a response to the device 210 about the deployment status. Note that from Step 2 to Step 8, it can be a loop until a termination condition is triggered. A termination condition may be specified as in the SC request, or as a new request from a device 210. 9. To terminate an SC, SC-NF 200 sends a termination notification to every involved device 220.

10. SC-NF 200 sends a service summary to the requesting device 210.

SC-NF or SCF in clouds: A similar embodiment is that an SC-NF is deployed in a cloud environment. In this embodiment, the SC-NF instance runs in cloud data centers ranging from big data centers at a centralized location to micro data centers at edge of the network.

The role of a cloud provider may be the resource provider accommodating the SC-NF instance, or the provider of SC-NF logic itself. In a first case, the cloud provider is agnostic to the SC-NF instance. In a second case, the cloud provider is aware of the functionality of SC-NF instance and may provide additional assistances to the SC-NF instance. In both cases, the sovereignty of the SC-NF instance belongs to its owner who deploys it in a cloud service provider.

The procedure of how service composition is realized with SC-NF deployed in clouds is depicted in FIG. 7. In particular, the procedure comprises the following steps:

1. A device 210 sends a request to subscribe cloud resource from a cloud service provider, which may be done by accessing an interface provided by the cloud service provider.

2. The cloud service provider may send a response to the device whether the cloud resource subscription request succeeds.

3. There are two options where an SC-NF instance may be created with the subscribed cloud resource.

3a. An SC-NF 200 may be directly instantiated by the cloud service provider as part of the resource provisioning;

3b. Or an SC-NF instance may be instantiated from the source of a third party App provider. 3c. After a successful deployment, the deployment information about the SC-NF instance 200 may be sent as a response to the device 210.

For both ways, the placement of the SC-NF 200 may be either specified by the device 210 during cloud resource subscription or automatically scheduling by the cloud service provider in terms of some resource management policies as well as explicit requirements from the device 210 (e.g. a location-based deployment is preferred).

4. A device registration request is sent to SC-NF 200. The first way to register device 220 is that the device 210 may provide device description and send to the SC-NF 200 over an interface provided by the cloud. The interface may be just the same interface where the device 210 subscribes the cloud resource or a different one. In this case, the registered device could be either a connected device or an offline device that cannot access to the SC- NF 200. The second way to register a device 220 is that the user may directly access from a device 220 and configure the device to register at the SC-NF 200 in the cloud. The description of a device 220 may contain one or more of the information listed in Table 1.

5. After receiving the registration request, the SC-NF 200 checks the status of the device 220 with the checklist similar to Table 3.

If the type of the device 220 is a connected device and the registration request is not sent directly from the device 220, the SC-NF 200 uses the provided information to connect to the device 220 and finish the checking list. Similarly, if the device 220 is temporarily offline, SC-NF 200 will try multiple times in order to finish the checking; if the registration request is directly sent from the device 220, the SC-NF 200 stores the device description and marks the device as registered.

If the type of the device 220 is a disconnected device, SC-NF 200 only stores its description. Then it is the full responsibility of the device 210 which should guarantee the availability of the devices 220 in an SC.

6. SC-NF 200 sends a device registration response to the device 210 with the registration status. 7. An SC request is sent to SC-NF 200. Similar to the previous embodiment, an SC request provides the information as in Table 2. Similarly, an SC request may also include SC-NF as part of the specified workflow. Over the interface to the SC-NF 200, a comprehensive view is provided to the device 210. As a pre-stage verification, a device 210 can check the availability of registered devices when designing an SC request.

8. SC-NF 200 receives and processes the SC request. In specific,

8a. SC-NF 200 verifies the devices 220 listed in the SC request. This check may provide a secondary verification on the availability in case any mismatch happened in the pre-stage verification.

8b. If the checklist verification passed, SC-NF 200 prescribes and sends a workflow with configurations for individual devices 220. Otherwise, SC-NF 200 informs the device 210 that the SC is infeasible.

9. Every device 220 receives its configuration from SC-NF 200. In specific,

9a. The configuration may optionally processed by every involved device 220, which takes the specified parameters in the configuration and deploys locally. A configuration for a device 220 contains at least one of the parameters listed in Table 4.

9b. After the configuration is deployed, the SC starts to work. The summary of the deployment may be collected by the SC-NF 200 and sent back to the device 210 as a deployment result.

In run-time, according to the monitoring status, the SC-NF 200 may send necessary configuration changes to one or more working devices in order to guarantee the service quality. If the adjustment cannot fulfill the requirement of the SC, SC-NF 200 may stop the service.

10. SC-NF 200 may optionally send a response to the device 210 with the SC deployment summary.

11. To terminate an SC when termination conditions are met,

11a. SC-NF 200 sends a termination notification to every involved device 220;

1 lb. SC-NF 200 sends a service summary to the device 210. SC-NF or SCF on a hub device: The third embodiment is realized in a hub device. A device may act as a main hub device to provide SC functionalities with other available devices. It should be noted that the main hub device may also participate in an SC. According to this embodiment, the procedure is described in FIG. 8.

1. A device 210 activates SC-NF 200 on the device 210, called as main hub device. la. The activated SC-NF 200 on the main hub device 210 broadcasts a message, wherein the message may include the address information for accessing the service, authentication related information and security communication information.

The broadcast message may be done in two ways, where the first way is to broadcast over a local network (e.g. a WiFi network), and the second way is to broadcast directly over the air as a beacon signal. Every device 220 in the communication range will receive the broadcast message. In particular, the communication range in the local network scenario represents the network domain; and the communication range in the beacon signal broadcasting scenario represents the area that can be covered by the main hub device 210. The broadcasting may be periodical so that new device 220 may discover the existence of the main hub device 210. lb. After activation, SC-NF 200 can send a response to the device 210. This could be just a notification on the device 210 to show the status of the SC-NF 200.

2. There may be two ways for device registration.

2a. The first way is that the main hub device 210 actively scans and adds discovered devices 220. In specific, the main hub device 210 sends a scan discovery message to the network or the neighboring area, the scan discovery message will be received by the neighboring devices, in which device 220 can decide if it accepts the discovery.

If a device 220 confirms the discovery, the device 220 may reply with a description message to the main hub device 210 as 2b in Fig. 8. The confirmation may be done automatically by the device 220 itself or manually on the device 220. Note that the scan discovery message may be also combined with the broadcast message in the previous step. 2c. The second is that a device 220 may register at the main hub device 210 with the broadcast information, instead of waiting for the scanning discovery. This may be done by the device 220 or by its owner proactively. To register the device 220, the access information may be used to connect to the main hub device 210 by following the authentication rules and security policies. If necessary, a credential may be required in order to access the main hub device 210. After that, the device 220 may provide its description to the main hub device 210.

3. Information of the description is similar to the fields in Table 1. Similarly, the main hub device 210 may still check the description provided by the devices, and the resource may be for example device 220. If description information is verified, the resource is successfully registered at the main hub device 210. Otherwise, the registration of the device fails.

4. An SC request is planned on the main hub device 210. In the SC request, it defines how a set of registered devices should be organized in order to form a new logical service. Similarly, an SC request may include at least some of the parameters in Table 2 as well as the SC-NF 200 as part of the workflow. The SC request is processed by the SC-NF 200 on the same device. In specific,

4a. SC-NF 200 may define a workflow configuration composed with all involved devices 220. In specific, SC-NF 200 on the main hub device follows a checklist similarly as the checklist defined in Table 3, to check the availability and capability of the devices 220;

4b. If all devices 220 fulfill the requirements, individual configurations as in Table 4 may be prepared and sent to devices 220 respectively.

5. Each device 220 applies the configurations prescribed by the main hub device 210 (SC-NF 200 on the main hub device 210). In specific,

5a. The configurations are parsed by the device 220. Similarly, the configurations may also specify for example how much storage, computing and networking capabilities are required for the logical device; what the inputs or outputs will be generated; which peer (devices) the device will communicate with; or how the communication parameters the interface of the resource will use.

5b. After applying the configurations, each device 220 may send its feedback as a summary to the main hub device 210. In run-time, according to the monitoring status, the devices 220 may send status update to SC-NF 200. Sometimes, the device 220 may find the service quality cannot be fulfilled, and the devices 220 may send proactively status update to the SC-NF 200.

While in some other scenarios, the SC-NF 200 may also update the quality requirements to the devices 200, for example the radio environment is changed. In run-time, according to the monitoring status, the main hub device 210 may send necessary configuration changes to one or more working devices 220 in order to guarantee the service quality. If the adjustment cannot fulfil the SC requirement, the main hub device 210 may stop the SC.

6. After the configurations are deployed to the devices 220, the composed service starts to work. On the main hub device 210, relevant logs based on the summaries from individual device 220 will be recorded for future references.

7. If a termination condition is satisfied, the SC finishes. The termination condition may be a timer according to the duration parameter, an expected SC outcome and/or an order directly from the owner. A statistic report may be generated and/or stored.

It can be seen that, the SC-NF 200 may be implemented at different layers on the main hub device 210. Firstly, this may be an App developed directly by a vendor who supports service composition for its own products (i.e. devices/ Apps). This App may also support products from other companies if a standardized interface/protocol is used. Secondly, it may be a third party App, where different software companies may provide similar kind of Apps but featured with special designs that differentiate themselves to the other. Thirdly, this may be a kernel level functionality in the operation system (OS), which requires main OS providers to support service composition functionalities.

FIG. 9 shows a method 900 according to an embodiment of the invention, particularly for service composition in wireless network. In a particular embodiment of the invention, the method 900 may be performed by a first device 210. The method 900 comprises: a step 901 of determining a first logical device to be formed; and a step 902 of sending a request to an SCF 200, for synthesizing functionalities for the first logical device, wherein the request is used to request the SCF 200 to prescribe synthesized functionalities provided by one or more second devices 220 to form the first logical device, and the request comprises configurations for the one or more second devices 220.

FIG. 10 shows a network entity 1000 adapted for composing a service in wireless network according to an embodiment of the invention. The network entity 1000 may comprise processing circuitry (not shown) configured to perform, conduct or initiate the various operations of the network entity 1000 described herein. The processing circuitry may comprise hardware and/or software. The hardware may comprise analog circuitry or digital circuitry, or both analog and digital circuitry. The digital circuitry may comprise components such as application-specific integrated circuits (ASICs), field-programmable arrays (FPGAs), digital signal processors (DSPs), or multi-purpose processors. The network entity 1000 may further comprise memory circuitry, which stores one or more instruction(s) that can be executed by the processor or by the processing circuitry, in particular under control of the software. For instance, the memory circuitry may comprise a non-transitory storage medium storing executable software code which, when executed by the processor or the processing circuitry, causes the various operations of the network entity 1000 to be performed. In one embodiment, the processing circuitry comprises one or more processors and a non-transitory memory connected to the one or more processors. The non-transitory memory may carry executable program code which, when executed by the one or more processors, causes the network entity 1000 to perform, conduct or initiate the operations or methods described herein.

The network entity 1000 may further comprise a communication interface, e.g. transceiver which is used to receive/transmit message from/to other devices, e.g. device 210, or 220 etc.

In particular, the communication interface of the network entity 1000 may be configured to receive a request 1001 from a first device 1100, wherein the request 1001 may be used to prescribe synthesized functionalities provided by one or more second devices 1200 to form a first logical device. Further, the processor of the network entity 1000 may be configured to provide configuration information 1002 to the one or more second devices 1200 based on the request 1001, wherein the configuration information 1002 indicates a set of actions and/or parameters to form the first logical device. According to embodiments of this invention, an SCF may be implemented on the network entity 1000. The network entity 100 may be able to perform or executed the procedures described in previous embodiments to act as an SCF 200 using for example the processor. It should be noted that, the network entity 1000 according to embodiments of this invention, may be a user-controlled entity. It is different from a conventional network entity, which may be controlled by a network operator.

FIG. 11 shows a user entity 1100 adapted for service composition in wireless network according to an embodiment of the invention. The user entity 1100 may be the devices 210 and/or 220 in the previous embodiments. The user entity 1100 may be configured to determine a first logical device to be formed. Further, the user entity 1100 may be configured to send a request 1001 to an SCF 1000, for synthesizing functionalities for the first logical device. In particular, the request 1001 may be used to request the SCF 1000 to prescribe synthesized functionalities provided by one or more second devices 1200 to form the first logical device, and the request 1001 comprises configurations for the one or more second devices 1200. In a specific embodiment, the network entity 1000 shown in FIG. 11 may be the network entity 1000 shown in FIG. 10. According to embodiments of this invention, the user entity 1100 may be a user device controlled and managed by a user.

To summarize, this disclosure proposes a solution for service composition with devices. In particular, the disclosure involves three parts: 1) a set of devices, which can be networked and/or offline and managed by a user/device, 2) a newly proposed NF (i.e., SC-NF that provides the functionality of service composition) and 3) interfaces between the device (user) and the SC-NF. A main part of this disclosure is new interfaces and signaling parameters exchanged over the new interfaces.

In particular, the new interfaces may include:

An interface between the device and the SC-NF (e.g., Intf_SC-NF2Dev)

The first main function of this interface is that a user of a device may use this interface to manage its devices at the SC-NF. In specific, for device management, a user may use this interface for device registration, update and de-registration as shown in the exemplary embodiments. Signaling parameters may include: • Detailed hardware profiles/specifications including compute, storage, networking capabilities of any nature (local, remote, virtual, physical, devices, services, etc);

• Featured hardware components (e.g. camera, sensors, and so on)

• Available software element(s) (installed/compatible Apps), discovery modes and so on; or,

• The corresponding credentials or access modalities and any combination of them.

All these parameters associate to individual devices that are identified by device identifiers (i.e. DEV IDs).

The second main function of this interface is that a device may use this interface to create a SC request with SC-NF. In specific, signaling parameters may include:

• A list of resources (e.g. DEV_IDs) where the listed services are presented as service access points with descriptions, e.g. URLs or URIs, of the usable services, along with the credentials.

• A composition workflow to specify how the listed devices and/or the SC-NF should collaborate with each other where status of existing availability/capacity of the listed device are checked; (communication) protocols, parameters, interfaces are provisioned; policy compliance is verified.

The composition workflow defines a set of triggers (events, conditions) about the state of specific devices and/or environment and (a set of) actions that will be performed when the events happen. The third main function of this interface is to deploy a composed service to the registered devices. In specific, signaling parameters include:

• The composition workflow configuration corresponding to DEV ID and an SC ID that is instructed on every involved device. The status may be proactively reported from or inquired at the device. The status may indicate the run-time data of the device such as incurred consumptions (e.g. physical resource / tariff resource), connectivity quality (e.g. packet lost, bandwidth and latency) and so on. It can be seen that, the embodiments of this disclosed invention bring the following key benefits.

To the users/devices, it provides a unified view of the devices for the users/devices, which are scattered in existing paradigm scheme where the service providers control and manage the devices separately. Within existing schemes, it is difficult to have an overall view as brought by the SC-NF.

It further provides new types of services that can be customized by individual device. Within the provider-centric paradigm, a new service is created by the service provider rather than the user, this largely limits the variety of the service market. A user/device is restricted by service providers who decide what kinds of services will be available.

More importantly, it provides a self-sovereign domain where a user/device may fully control how the devices work together. This largely mitigates the privacy branching issues, data ownership issues and so on. The key reason is that the propose SC-NF becomes a service hub that is only accessible to its actual owner. In this case, a user or user device, e.g. user entity 1100 may easily design necessary logics such as encryption logic, cryptographical hash logic and so on to protect their own data; even personalized cloud storage utilization can be added when sending data to multiple cloud drives. However, in existing provider-centric paradigm, there is no such a self-sovereign domain for a user. All services are directly provided at providers’ domain, otherwise a user/device cannot use their services.

This disclosure is also meaningful to service providers. First of all, it enables the possibility that a user/device may customize new service. This brings benefits to the service providers in the sense of service variety. It not only implies new service capability, but also means new business opportunities. Users may be attracted by the new service capability, which gives them more controllability. User may be also willing to pay for the new service capability.

An additional benefit is that this embodiments of the present invention disclosure potentially improves general data protection regulation (GDPR) compliance for service providers. The reason is that an SC-NF acts like a middlebox, which is owned and controlled by the user/device, to store personal data in a secure manner. This eliminates the current way that a device directly uploads its personal data to the domain of a service provider (e.g. a cloud storage). When the data is needed by a third party, it has to get an approval by the device in order receive the data from the SC-NF. Such a model improves accountability of the whole system, which is again GDPR requirement. In principle, with an SC-NF, a service provider does not have to store personal data from all its devices.

The present disclosure has been described in conjunction with various embodiments as examples as well as implementations. However, other variations can be understood and effected by those persons skilled in the art and practicing the claimed invention, from the studies of the drawings, this disclosure and the independent claims. In the claims as well as in the description the word “comprising” does not exclude other elements or steps and the indefinite article “a” or “an” does not exclude a plurality. A single element or other unit may fulfill the functions of several entities or items recited in the claims. The mere fact that certain measures are recited in the mutual different dependent claims does not indicate that a combination of these measures cannot be used in an advantageous implementation.

Furthermore, any method according to embodiments of the invention may be implemented in a computer program, having code means, which when run by processing means causes the processing means to execute the steps of the method. The computer program is included in a computer readable medium of a computer program product. The computer readable medium may comprise essentially any memory, such as a ROM (Read-Only Memory), a PROM (Programmable Read-Only Memory), an EPROM (Erasable PROM), a Flash memory, an EEPROM (Electrically Erasable PROM), or a hard disk drive.

Moreover, it is realized by the skilled person that embodiments of the network entity 1000 or the user entity 1100 comprises the necessary communication capabilities in the form of e.g., functions, means, units, elements, etc., for performing the solution. Examples of other such means, units, elements and functions are: processors, memory, buffers, control logic, encoders, decoders, rate matchers, de-rate matchers, mapping units, multipliers, decision units, selecting units, switches, interleavers, de-interleavers, modulators, demodulators, inputs, outputs, antennas, amplifiers, receiver units, transmitter units, DSPs, trellis-coded modulation (TCM) encoder, TCM decoder, power supply units, power feeders, communication interfaces, communication protocols, etc. which are suitably arranged together for performing the solution.

Especially, the processor(s) of the network entity 1000 or the user entity 1100 may comprise, e.g., one or more instances of a Central Processing Unit (CPU), aprocessing unit, a processing circuit, a processor, an Application Specific Integrated Circuit (ASIC), a microprocessor, or other processing logic that may interpret and execute instructions. The expression “processor” may thus represent a processing circuitry comprising a plurality of processing circuits, such as, e.g., any, some or all of the ones mentioned above. The processing circuitry may further perform data processing functions for inputting, outputting, and processing of data comprising data buffering and device control functions, such as call processing control, user interface control, or the like.