4 Principles for the Framework

23.2273GPPApplication and user interaction in the User Equipment (UE)Principles and specific requirementsRelease 5TS

The model presented in annex A defines a framework specifying principles for event handling, with the focus on issues related to application interaction. Principles for the framework are given below, using the stated definitions. The list is not necessarily complete.

4.1 Basic principles

  1. Irrespective of the principles given below, emergency calls shall override all other calls.
  2. The MT is the central resource and schedules internal and external entities according to the user’s preferences and external environment.

4.2 User requirements

  1. The user shall have the capability to make the ultimate decisions as elaborated below. Additionally, in the case where an UE is unmanned, none of the issues below shall render the UE inoperable such that it requires manual intervention locally at the UE to restore its use.
  2. The user shall have the capability of selecting preferences interactively and/or via prior set-up in one or more user profiles. These shall be valid on a global or on a per application basis. The user’s preferences shall be retained even in the event of loss of power.
    Preferences can be selected for an application when it is installed, or at any other time thereafter.
    Preferences, notably but not exclusively the priorities, can be modified at any time and this shall have effect at the earliest possible opportunity thereafter.
  3. The user shall have the capability to modify authorisations assigned to applications. These shall be valid on a global or on a per application basis in one or more user profiles.
  4. The user shall have the option to be advised to what extent an application has been authenticated at installation-time, and prevent the application from being installed based on this advice.
    The user shall have the option to be advised about the integrity of an application at installation-time, and prevent the application from being installed based on this advice.
  5. The user shall have the capability to abort or suspend any on-going call that has been set up automatically by an application.
  6. The user shall have the capability to require that the UE request permission from the user for individual calls, sets of calls (for instance all calls by a certain application) or all calls. The user shall have the capability to request the UE to record information on individual calls, sets of calls or all calls.
  7. The user shall have the capability to distinguish which entity/application caused a specific event. The UE uses this information to support the user’s preferences. The UE shall be able to inform the network of entity/application at set up time to support trace-ability when a call is set up.
  8. The user’s privacy shall be protected. Access to user data (including user profiles and any personal information in the UE) and audio functions (this would prevent for instance a mechanism that allows eavesdropping) shall not be possible without the user’s prior permission.
  9. The user shall have the capability to request from the UE which applications are present in the MExE environment and the (U)SIM, and whether they are running. The user shall also have the capability to request from the UE the status of other interfaces as shown in Figure 1, where implemented.

4.3 Specific requirements on applications

  1. An application shall not assume that it is the only one active. For example where several applications use the same interface the application and/or the protocols used over the interface must be able to handle contention.
  2. An application shall not interfere (terminate, suspend or degrade) with on-going calls set up by another application without authorisation from the user. For certain combinations of call (e.g., voice/data and USSD messages), interference can happen resulting in a level of degradation.
  3. An application shall not assume that it has priority over another application, and shall comply with the user’s currently selected preferences.

4.4 Specific requirements on the UE

  1. The UE shall have the capability to authenticate the source of the application.
  2. The UE shall have the capability to assure the integrity of an application.