Method and apparatus for providing a network search function

A technology for network equipment and user terminals, which is used in network topology, access restrictions, electrical components, etc.

Inactive Publication Date: 2014-01-01
NOKIA TECHNOLOGLES OY
4 Cites 5 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, searching for CSG cells may consume time and ...
View more

Method used

[0037] The UE 50 may also include an Auto Search Function (ASF) 55 which may be supported by components described in more detail below in conjunction with the description of FIG. 2 . The ASF 55 may provide functionality for discovering previously visited and allowed or accessible CSG/hybrid cells as described herein. As such, the ASF may include functionality that incorporates the storage of information associated with the locations of access points associated with two different RATs (eg, WiFi and E-UTRAN). In particular, the stored information may correlate CSG cell locations with corresponding WiFi hotspots or other access points that may be more geographically located. In this regard, since a WiFi hotspot (as an example) has a smaller geographic coverage area, its location is more accurate than that of a cell associated with E-UTRAN (eg, cell A44 or cell B46). Thus, by storing access point footprint information associated with the location of both the larger and smaller cells, more accurate information can be known about the location when forming the proximity indication message. Hence, resources can be saved with respect to handover, measurement overhead and UE battery life.
[0047] In an example embodiment, the logged information may be employed by the ASF of the UE 50 in idle mode or connected mode in order to improve CSG location determination, which may reduce UE power consumption related to CSG search. For example, once the U...
View more

Abstract

A method for providing an autonomous search function may include discovering, at a user terminal, a first access node providing access in accordance with a first radio access technology (RAT), causing an attempt to discover a second access node providing access in accordance with a second RAT in response to discovering the first access node where the first access node has a first coverage area and the second access node has a second coverage area that at least partially overlaps with the first coverage area, and causing storage of fingerprint information associated with the first access node together with storage of fingerprint information associated with the second access node. An apparatus and computer program product corresponding to the method are also provided.

Application Domain

Assess restrictionNetwork topologies

Technology Topic

FingerprintTelecommunications +3

Image

  • Method and apparatus for providing a network search function
  • Method and apparatus for providing a network search function
  • Method and apparatus for providing a network search function

Examples

  • Experimental program(1)

Example Embodiment

[0021] Some embodiments of the present invention will now be described more fully below with reference to the accompanying drawings in which some, but not all, embodiments of the present invention are shown. In fact, various embodiments of the present invention can be embodied in many different forms and should not be construed as being limited to the embodiments set forth herein; in fact, these embodiments are provided so that the present disclosure will meet applicable legal requirements. Similar symbols refer to similar units throughout the text. As used herein, the terms "data", "content", "information" and similar terms may be used interchangeably to refer to data that can be sent, received, and/or stored according to embodiments of the present invention. Therefore, the use of any such terms should not be regarded as limiting the spirit and scope of the embodiments of the present invention.
[0022] In addition, as used herein, the term "circuit system" refers to: (a) hardware-only circuit implementation (for example, implementation in analog circuit systems and/or digital circuit systems); (b) circuits and computer program products The computer program product includes software and/or firmware instructions stored on one or more computer-readable memories, and the one or more computers work together to make the device perform one or more functions described herein; and (c ) The following circuits, such as, for example, a microprocessor or a part of a microprocessor, even if the software or firmware does not physically exist, these circuits still require the software or firmware for operation. This definition of "circuitry" applies to all uses of this term herein, including in any claims. As another example, as used herein, the term "circuitry system" also includes the following implementations, the implementations including one or more processors and/or parts thereof and accompanying software and/or firmware. As another example, the term "circuitry" as used herein also includes, for example, baseband integrated circuits or application processor integrated circuits for mobile phones or similar in servers, cellular network devices, other network devices, and/or other computing devices. integrated circuit.
[0023] As defined herein, “computer-readable storage media” referring to non-transitory, physical storage media (for example, volatile or non-volatile memory devices) can be used with “computer-readable transmission media” referring to electromagnetic signals. "Different.
[0024] Electronic devices continue to evolve with regard to their capabilities for providing wireless connectivity to mobile users. UTRAN and E-UTRAN mobile radio networks have continued to expand with the surge in the use of mobile electronic devices. Regarding the accessibility of mobile electronic devices, many individuals and businesses have sought to limit the group of users or subscribers who are allowed to access a particular CSG cell. The CSG may be associated with one or more cells served by an access point, an eNB, or a home eNB (eg, femto cell) that can provide access to the subscribers of the CSG.
[0025] The user equipment (UE) can be enabled to find supporting access points (for example, CSG/hybrid femtocell). For example, a UE that supports CSG features and has a non-blank list can be configured to use an autonomous search function (ASF) in idle mode to detect allowed or otherwise accessible CSG/hybrid cells. ASF will be supported on the serving carrier and also on non-serving frequencies including different RAT (Radio Access Technology) frequencies. After detecting and successfully camping on an allowed or accessible CSG/hybrid cell, the UE can be configured to remember the cell location (for example, by internally storing macro-layer fingerprints or RF (radio frequency) fingerprints), so that the UE can be Once in the same area, ASF can discover previously visited and allowed or accessible CSG/hybrid cells.
[0026] The location information identifying the location of the CSG/hybrid cell can be used when the UE is in the connected mode. In some cases, the UE may be configured to send a proximity indication when the UE enters or leaves one or more accessible CSG/hybrid cells. Therefore, for example, when the UE is approaching or is already in the vicinity of an allowed CSG/hybrid cell, the UE may send a proximity indication message to the corresponding serving eNB. The proximity indication message may indicate to the serving eNB, the home eNB, or other access points that the measurement configuration information is requested or that other actions related to the handover may be coming. In this way, the accuracy of the proximity indication message may affect the handover success rate, measurement overhead, UE battery life, and other aspects. For example, if the proximity indication message is received, but the UE is still outside the range of the home eNB, the UE may still consume energy to try to exchange measurement information and/or perform handover-related functions, thereby wasting resources. Generally speaking, sending proximity indications can vary with different modem implementations, so resource waste may not be uncommon. However, if the proximity indication message can be sent at a more precise time relative to the ability to successfully influence handover, the success rate, measurement overhead, UE battery life, etc. can be enhanced. Some example embodiments may provide improved accuracy and/or consistency with respect to proximity indications as described in more detail below.
[0027] figure 1 Illustrated as follows is a schematic block diagram showing a system for providing improved performance of autonomous search functions according to an exemplary embodiment of the present invention. However, it should be understood figure 1 An example embodiment is exemplified, so it should be understood that other architectures including additional or even fewer units may also be adopted in combination with other example embodiments implementing the present invention. and, figure 1 The system of illustrates a network implemented as E-UTRAN, however, in an alternative embodiment, any other network can be optionally substituted.
[0028] Refer now figure 1 , The system may include E-UTRAN 20, which may include multiple Node Bs communicating with Evolved Packet Core (EPC) 30 and other components. The EPC may include one or more mobility management entities (MME) and one or Multiple System Architecture Evolution (SAE) gateways. Node Bs may be evolved Node Bs (for example, eNBs 40 and 42) each having corresponding cells (cell A44 and cell B46), which define the coverage area of ​​the corresponding eNB. In some cases, one or more of the eNBs 40 and 42 may be CSG/hybrid HeNB, and the corresponding cells (eg, cell A44 and cell B46) may therefore be CSG/hybrid cells. One or more access points (APs) associated with another communication protocol (for example, WiFi) may also be included in the system. AP48 is an example of such an AP, and it can be assumed that AP48 interacts with wireless local area network (WLAN), worldwide interoperability for microwave access (WiMAX), WiFi, or some other short-range communication protocol (for example, with the Institute of Electrical and Electronics Engineers (IEEE) 802.11 related network) association. AP 48 may have a corresponding cell 49 that is generally smaller in size (and therefore more geographically restricted in coverage) than cell A44 or cell B46. AP 48 and/or eNBs 40 and 42 may be able to communicate with UE 50 and one or more other UEs (some of these UEs may be members of a closed subscriber group (CSG)). although figure 1 Only a specific number of eNBs, APs, and UEs are shown, but multiple nodes and mobile terminals may be included in the system. E-UTRAN 20 can communicate with EPC 30 which is a part of EPS (Evolved Packet System). In addition, although figure 1 An eNB is shown, but an NB, a base station (BS), or other AP may be employed in conjunction with embodiments operating according to other radio access technologies (RAT).
[0029] In an example embodiment, the UE50 may be a communication device, such as a computer (eg, personal computer, laptop computer, server, etc.), mobile phone, global positioning system (GPS) device, personal digital assistant (PDA), paging Devices, mobile TVs, gaming devices, cameras, audio/video players, radios, or any combination of the foregoing, and other types of electronic devices, which may include processors for executing various hardware and/or software processes And/or memory. UE50 can be configured to adopt combinations such as figure 2 The description describes the processing of an embodiment of the present invention in more detail.
[0030] Although not required, in some embodiments, the UE50 may be able to perform according to multiple first-generation (1G), second-generation (2G), 2.5G, third-generation (3G), 3.5G, 3.9G, and fourth-generation (4G) Any one or more of mobile communication protocols, LTE, etc. for communication. In this way, for example, the UE50 can communicate with other UEs or network devices via the network, and the UE50 can include one or more antennas for transmitting signals to and receiving signals from the base station site. The base station site can be, for example, a base station or an interface. An entry point, the base station is part of one or more cellular or mobile networks, and the access point can be coupled to a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet. Other devices, such as a processing unit (for example, a personal computer, a server computer, etc.) may be coupled to the UE 50 in turn. By directly or indirectly connecting the UE 50 to other devices, it is possible to enable the UE 50 to communicate with other devices according to many communication protocols including Hypertext Transfer Protocol (HTTP) to thereby realize various communications or other functions of the UE 50.
[0031] In an example embodiment, the UE 50 may include one or more receivers, antennas, and/or receiving circuitry for enabling the UE 50 to receive and decode signaling associated with one or more communication protocols or RAT frequencies. Therefore, for example, the UE 50 may include a receiving circuit system for performing RF communication with the eNB 40 or 42 via E-UTRAN, and the UE 50 may include a receiving circuit system for performing WiFi communication with the AP 48.
[0032] The eNBs 40 and 42 may provide E-UTRA user plane and control plane (for example, radio resource control (RRC)) protocol termination for the UE 50 and other UEs. The eNBs 40 and 42 can perform tasks such as radio resource management, radio bearer control, radio admission control, connection mobility control, dynamic allocation of resources to UEs on both the uplink and downlink, selection of MME when UE attaches, and Internet Protocol (IP) header compression and encryption, scheduling paging and broadcast information, routing data, and providing function hosting for configuration mobility measurement and report measurement functions. Each eNB may in some cases represent a separate cell (eg, cell A44 and cell B46) capable of serving UEs within the cell with respect to communication services according to E-UTRAN technology. Cells may overlap in some cases, and various smaller cells associated with other communication protocols (for example, WiFi hotspots, such as AP48) may be contained within the separated cell or overlap the boundary of the separated cell.
[0033] The MME can host the following functions, such as message distribution to the corresponding Node B, security control, idle state mobility control, EPS bearer control, encryption and integrity protection, etc. In an example embodiment, the MME may include an access control manager that may be configured to determine whether network access will be allowed or denied for a specific user. The SAE gateway can host the following functions, such as terminating and switching certain packets for paging and supporting UE mobility. In an example embodiment, EPC 30 may provide a connection to a network, such as the Internet.
[0034] In an example embodiment, one or more CSGs may be defined and may be served by a specific eNB (eg, eNB 40 and/or 42). Therefore, for example, if the UE 50 is in an area (eg, a cell) where communication with the eNB 42 is likely to occur, the UE 50 may know that the potential communication with the eNB 42 is possible. Similarly, if the UE 50 is in an area where communication with the eNB 40 is likely to occur, the UE 50 may also know that the potential communication with the eNB 40 is possible. However, if any of the eNBs 40 and 42 is associated with the CSG, access restrictions may be applied with respect to the UE 50.
[0035] In this regard, for example, if it is assumed that the eNB 40 is associated with a CSG for which the UE 50 does not have access rights, the UE 50 can be prevented from accessing the CSG associated with the eNB 40. However, if the eNB 42 is associated with the CSG to which the UE 50 has access rights, the UE 50 may be able to access the CSG associated with the eNB 42. In this way, for example, it can be considered that the eNB42 is associated with an accessible CSG cell regarding the UE50, and it can be considered that the eNB40 is associated with an inaccessible cell regarding the UE50.
[0036] In an example embodiment, the UE 50 may include an access manager that may be configured to provide CSG access control functions. In this regard, for example, the access manager may be configured to maintain or store identities of cells that the UE 50 is not accessible to, for example, to prevent the UE 50 from consuming resources due to multiple access attempts to non-accessible CSG cells. Thus, for example, the access manager 80 may store a white list and/or a black list or a forbidden list, the white list including a list of CSG cells for which the UE 50 has access rights, and the blacklist or forbidden list including a list of CSG cells that the UE 50 does not List of CSG cells with access rights.
[0037] UE50 can also include figure 2 The description combines the automatic search function (ASF) 55 supported by the component more specifically described. The ASF 55 can provide the function of discovering previously visited and allowed or accessible CSG/hybrid cells as described herein. In this way, ASF may include a function that incorporates the storage of information associated with the location of access points associated with two different RATs (for example, WiFi and E-UTRAN). Specifically, the stored information can correlate the CSG cell location with the corresponding WiFi hotspot or other access points that can be more accurately located geographically. In this regard, since a WiFi hotspot (as an example) has a smaller geographic coverage area, its location is more accurate than the location of the cell associated with E-UTRAN (eg, cell A44 or cell B46). Therefore, by storing the access point footprint information associated with the locations of both the larger cell and the smaller cell, more accurate information about the location can be known when the proximity indication message is formed. Therefore, resources can be saved regarding handover, measurement overhead and UE battery life.
[0038] Refer now figure 2 , Provides a device 65 for implementing an improved autonomous search function. The apparatus 65 may include a processor 70, a user interface 72, a communication interface 74, and a memory device 76 or communicate with the processor 70, the user interface 72, the communication interface 74, and the memory device 76 in other ways. The memory device 76 may, for example, include one or more volatile and/or non-volatile memories. In other words, for example, the memory device 76 may be an electronic storage device (for example, a computer-readable storage medium) including gates configured to be retrieved by a storage machine (for example, a computing device such as the processor 70) Data (for example, bits). The memory device 76 may be configured to store information, data, applications, instructions, etc. for enabling the apparatus to perform various functions according to example embodiments of the present invention. For example, the memory device 76 may be configured to buffer input data for processing by the processor 70. Additionally or alternatively, the memory device 76 may be configured to store instructions for execution by the processor 70.
[0039] The apparatus 65 may in some embodiments be a user terminal (for example, the UE 50) that may operate independently or in combination with the network. However, in some embodiments, the apparatus 65 may be instantiated at one or more of the network equipment or the UE 50. Therefore, the apparatus 65 may be any computing device configured to employ an example embodiment of the invention. However, in some embodiments, the apparatus 65 may be implemented as a chip or a chipset (which in turn may be adopted at one of the above-mentioned devices). In other words, the device 65 may include one or more physical packages (eg, chips) that include materials, components, and/or wiring on structural components (eg, substrates). The apparatus 65 may form a part, component, or component group of a larger device (for example, UE50) in some cases. The structural assembly may provide limitations for the physical strength, size savings, and/or electrical interaction of the component circuit system included thereon. The device 65 may therefore be configured to implement embodiments of the invention on a single chip or as a single "system on a chip" in some cases. In this way, in some cases, a chip or a chip set may constitute a component for performing one or more operations for providing the functions described herein.
[0040] The processor 70 can be implemented in many different ways. For example, the processor 70 may be implemented as various hardware processing devices, such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing unit with or without an attached DSP, or various other processing circuits. One or more hardware processing devices in the system. These other processing circuit systems include integrated circuits, such as, for example, ASIC (application specific integrated circuit), FPGA (field programmable gate array), microcontroller unit (MCU), hardware accelerator, and dedicated Computer chips etc. As such, in some embodiments, the processor 70 may include one or more processing cores configured for independent execution. Multi-core processors can implement multi-processing in a single physical package. Additionally or alternatively, the processor 70 may include one or more processors configured to be serially connected via a bus to implement independent execution of instructions, pipelining, and/or multithreading.
[0041] In an example embodiment, the processor 70 may be configured to execute instructions stored in the memory device 76 or otherwise accessible by the processor 70. Alternatively or additionally, the processor 70 may be configured to perform hard-coded functions. In this way, whether it is configured by hardware or software methods or by a combination thereof, the processor 70 can represent (for example, physically implemented in a circuit system) an entity that can be configured accordingly according to the present invention The embodiment performs operations. Therefore, for example, when the processor 70 is implemented as an ASIC, FPGA, etc., the processor 70 may be specifically configured hardware for performing the operations described herein. Alternatively, as another example, when the processor 70 is implemented as an executor of software instructions, these instructions may specifically configure the processor 70 to execute the algorithms and/or operations described herein when the instructions are executed. However, in some cases, the processor 70 may be a processor of a specific device (for example, a mobile terminal or a network device), and the device is adapted to further configure the processor 70 to adopt the embodiment of the present invention by using the following instructions. To perform the algorithms and/or operations described here. The processor 70 may include a clock, an arithmetic logic unit (ALU), logic gates, and other components configured to support the operation of the processor 70.
[0042] Meanwhile, the communication interface 74 may be any device configured to receive and/or send data from and/or to the network and/or any other device or module communicating with the device 50, such as in hardware or a combination of hardware and software Implemented equipment or circuit system. In this regard, the communication interface 74 may, for example, include an antenna (or multiple antennas) for implementing communication with a wireless communication network and supporting hardware and/or software. In some environments, the communication interface 74 may alternatively support or also support wired communication. As such, for example, the communication interface 74 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB), or other mechanisms.
[0043] The user interface 72 may communicate with the processor 70 to receive instructions input by the user at the user interface 72 and/or provide audible, visual, mechanical, or other output to the user. As such, the user interface 72 may include, for example, a keyboard, mouse, joystick, display, touch screen, touch area, soft keys, microphone, speaker, or other input/output mechanisms. In an example embodiment where the apparatus 65 is implemented as a server or some other network device, the user interface 72 may be restricted or eliminated. However, in an embodiment in which the apparatus 65 is implemented as a communication device (for example, UE50), the user interface 72 may include any or all of a speaker, a microphone, a display, a keyboard, etc. and other devices or units. In this regard, for example, the processor 70 may include one or more units configured to control a user interface, such as, for example, a user interface circuit system of at least some functions of a speaker, a ringer, a microphone, a display, and the like. The processor 70 and/or the user interface circuitry including the processor 70 may be configured to pass computer program instructions (eg, software and/or software) stored on a memory (eg, memory device 76, etc.) accessible by the processor 70 Firmware) to control one or more functions of one or more units of the user interface.
[0044] In an example embodiment, the processor 70 may be implemented to include the search manager 80 or otherwise control the search manager 80. As such, in some embodiments, the processor 70 may be regarded as causing, directing, or controlling the execution or occurrence of various functions attributed to the search manager 80 as described herein. The search manager 80 may be any device such as a device or circuit system that operates according to software or is implemented in hardware or a combination of hardware and software (for example, the processor 70 operates under software control, and the processor 70 It is implemented as an ASIC or FPGA or a combination thereof specifically configured to perform the operations described herein, thereby configuring the device or circuit system to perform the corresponding functions of the search manager 80 as described herein. Therefore, in an example in which software is adopted, a device or circuit system that executes the software (for example, the processor 70 in one example) forms a structure associated with such a device.
[0045] In some embodiments, the search manager 80 may be configured to help provide proximity indications in a more accurate manner. In this regard, the search manager 80 may be configured (eg, at the UE 50) to discover a first access node (eg, eNB42) that provides access according to a first RAT (eg, UTRAN or E-UTRAN) , Where the first access node is associated with a CSG accessible to the UE50. According to some example embodiments, the search manager 80 may also be configured to, in response to discovering the first access node, cause an attempt to discover a second access node (eg, AP 48) that provides access according to the second RAT. The search manager 80 may also be configured to store the fingerprint information associated with the first access node in association with storing the fingerprint information associated with the second access node for future use in combination with CSG cell discovery. In some embodiments, the search manager 80 may also be configured to report fingerprint information associated with the first access node and fingerprint information associated with the second access node to a network device (eg, eNB 42). In some embodiments, the search manager 80 may also be configured to initiate an attempt to discover a second access node in response to the subsequent discovery of the first access node and to respond to the second access node and the first access node. The discovery of the node is related to the discovery and causes the generation of a neighbor indication message.
[0046] image 3 The diagram illustrates some of the activities managed by the search manager 80 according to an example embodiment. In some cases, it can be executed when UE50 is in idle mode image 3 Activities shown in. In this regard, as shown in operation 100, an autonomous search function may be performed for CSG/hybrid cells. Then in operation 110, a determination is made as to whether any CSG/hybrid cells (for example, allowed CSG cells) are found. If a CSG/hybrid cell is found, information about any WiFi networks that can be detected may be recorded in operation 120. In some cases, signal parameters associated with the WiFi network, such as, for example, service set identifier (SSID), MAC address, received signal strength, and other information can be recorded as WiFi fingerprint or WiFi fingerprint information. In some cases, information about a detectable WiFi network (for example, WiFi fingerprint information) may be recorded together with a cellular fingerprint (for example, a macro cell RF fingerprint indicating the RF cell location of an allowed CSG cell). The information about detectable WiFi networks can be sorted by signal strength in some cases. In some cases, the recorded information (for example, WiFi fingerprint information and corresponding cellular fingerprints) may be reported to the server or other network devices (for example, in the operator's network) in operation 130. Reporting recorded information can enable the server to store information associated with multiple UEs. The information recorded in the report can also enable the server to provide the UE with the information as needed to facilitate the generation of accurate proximity indications. For example, it is assumed that fingerprint information associated with a WiFi network can be used as a location indication in a larger coverage area of ​​a macro cell. The fingerprint information of the cellular macro cell is more accurate.
[0047] In an example embodiment, the ASF of the UE 50 in idle mode or connected mode may use the recorded information in order to improve the CSG location determination, which may reduce UE power consumption related to CSG search. For example, once the UE50 is in the connected mode and the ASF recognizes the overlapping macro cell RF fingerprint, the UE50 can activate (if not currently activated) the WiFi receiver of the UE50 to search for stored WiFi networks. If a WiFi network matching the WiFi fingerprint is detected, both the stored WiFi fingerprint and the corresponding stored cellular fingerprint can match and the proximity indication can be triggered. By triggering the proximity indication in this way, the accuracy of the proximity indication can be improved. As an alternative, instead of activating the WiFi receiver in response to detecting an allowed CSG cell, the active WiFi receiver can detect a WiFi network that matches the stored WiFi fingerprint information provided to ASF and can make the UE50 determine Does the overlapped macro cell RF fingerprint also exist to trigger the proximity indication message?
[0048] Figure 4 The figure illustrates an example of using WiFi fingerprint information and cellular fingerprint information to trigger a proximity indication message according to an example embodiment. In this regard, such as Figure 4 As shown in, in operation 200, the cellular fingerprint can be measured and the CSG/hybrid database can be checked to determine whether the CSG/hybrid cell corresponding to the detected cellular fingerprint is an allowed CSG cell. Then, a determination may be made in operation 210 as to whether the measured cellular fingerprint indicates that the UE 50 is close to the allowed CSG/hybrid cell. If the UE50 is near the allowed CSG/hybrid cell (for example, within the communication range), the UE50 may initiate a WiFi scan in operation 220 to try to discover any WiFi networks and check the stored information to see if any WiFi networks are detected. The fingerprint matches the correspondingly recorded cellular fingerprint information. Then, a determination is made in operation 230 as to whether the WiFi network is near the corresponding previously recorded CSG/hybrid cell (for example, within the communication range). If it is determined that the WiFi network is nearby (for example, the WiFi fingerprint matches the corresponding cellular fingerprint information), a proximity indication may be sent to the corresponding eNB in ​​operation 240.
[0049] In some cases, the network entity may also include means for supporting the operation of example embodiments. Figure 5 An example of such a device 465 is shown. Such as Figure 5 As shown in, the apparatus 465 may include a processor 470, a communication interface 474, and a memory device 476. The processor 470, the communication interface 474, and the memory device 476 may differ in size and semantics in some cases, and may be different from each other in basic form and function. figure 2 The processor 70, the communication interface 74 and the memory device 76 are similar. The device 465 may also include a fingerprint manager 480. The fingerprint manager 480 may be implemented as a network node configured to receive information about the detected WiFi network and cellular fingerprint information. Information from multiple UEs can be combined (for example, including WiFi fingerprints and cellular fingerprints), and the combined information can be provided to other UEs.
[0050] Example embodiments can therefore provide storage of cellular fingerprint information along with WiFi fingerprint information, which can be used, for example, in some embodiments to improve the accuracy of proximity indication generation. However, it should be understood that the exemplary embodiments can also be implemented in the context of other types of networks, where information indicating nearby femto or pico cells is used within a macro cell to identify locations more finely, for example, to help discover CSG more efficiently. The cell can be advantageous.
[0051] Image 6 with Figure 7 It is a flowchart of systems, methods and program products according to some example embodiments of the present invention. It will be understood that each block of the flowchart and the blocks in the flowchart can be implemented by various means, such as hardware, firmware, processors, circuitry, and/or other devices associated with software that executes one or more computer program instructions. The combination. For example, computer program instructions can implement one or more of the processes described above. In this regard, the computer program instructions that implement the above-described process may be stored by the memory device of the apparatus adopting the embodiment of the present invention and executed by the processor in the apparatus. As will be understood, any such computer program instructions can be loaded onto a computer or other programmable device (for example, hardware) to generate a machine, so that the resulting computer or other programmable device implements the The mechanism of the function specified in the block. These computer program instructions can also be stored in a computer-readable storage memory (different from a transmission medium, such as carrier waves or electromagnetic signals). The computer-readable storage memory can direct the computer or other programmable devices to work in a specific manner, so that the computer The instructions stored in the readable memory produce an article of manufacture whose execution implements the functions specified in the blocks of the flowchart. Computer program instructions can also be loaded on a computer or other programmable device to cause a series of operations to be executed on the computer or other programmable device to produce a computer-implemented process, so that the instructions executed on the computer or other programmable device are available for use. To implement the operation of the function specified in the block of the flowchart. such, Image 6 with Figure 7 The operations of when executed convert a computer or processing circuit system into a specific machine configured to execute an example embodiment of the present invention. thus, Image 6 with Figure 7 The operation definition of is used to configure a computer or processing circuitry (for example, the processor 70 or the processor 470) to execute the algorithm of the example embodiment. In some cases, general-purpose computers can be provided to execute Image 6 with Figure 7 An example of the search manager 80 or the fingerprint manager 480 of the algorithm shown in (for example, via the configuration of the processor 70 or the processor 470) to transform a general-purpose computer into a specific machine configured to execute example embodiments.
[0052] Thus, the blocks of the flowchart support a combination of devices for performing designated functions, a combination of operations for performing designated functions, and program instructions for performing designated functions. It will also be understood that one or more blocks in the flowchart and a combination of blocks in the flowchart can be implemented by a dedicated hardware-based computer system that performs specified functions or operations or implemented by a combination of dedicated hardware and computer instructions.
[0053] In this regard, such as Image 6 One embodiment of the method according to the example embodiment implemented in the UE shown in may include, in operation 300, discovering at a user terminal a first access node that provides access according to a first radio access technology (RAT). In some cases, the first access node may be associated with a closed subscriber group (CSG) accessible by the user terminal. The method may further include at operation 310, in response to discovering the first access node, causing an attempt to discover a second access node that provides access according to a second RAT, wherein the first access node has a first coverage area, And the second access node has a second coverage area that at least partially overlaps the first coverage area, and the second coverage area may be smaller than the first coverage area, and in operation 320, cause the storage of fingerprint information associated with the second access node Store fingerprint information associated with the first access node in association or together.
[0054] In some embodiments, some of the above operations can be modified or further expanded as described below. In addition, in some embodiments, additional optional operations (in Image 6 Some examples of these additional optional operations are shown in dashed lines). It should be understood that each of the modifications, optional additions, or expansions described below can be included with the above operations alone or in combination with any other feature among the features described herein. In an example embodiment, the method may further include reporting fingerprint information associated with the first access node and fingerprint information associated with the second access node to the network device in operation 330. In some embodiments, the method may additionally or alternatively include in operation 340, initiating an attempt to discover the second access node in response to subsequent discovery of the first access node. In some cases, the method may additionally or alternatively include in operation 350, in response to the second access node being discovered in relation to the discovery of the first access node, causing the generation of a proximity indication message. In an example embodiment, initiating an attempt to discover the second access node may include initiating the attempt when the user terminal is in an idle mode or a connected mode. In some embodiments, discovering a first access node may include discovering a communication node associated with UTRAN or E-UTRAN, and causing an attempt to discover a second access node may include causing an access to discover association with WiFi Point a try. In some cases, causing storage of fingerprint information also includes causing storage of signal parameters associated with the second access node (for example, SSID, MAC address, received signal strength, etc.).
[0055] In an example embodiment, for performing the above Image 6 The apparatus of the method may include one or more processors (for example, the processor 70) configured to perform some or each of the operations (300-350) described above. The processor 70 may, for example, be configured to perform operations (300-350) by performing hardware-implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations (300-350). Alternatively, the device may include a device for performing each of the operations described above. In this regard, according to an example embodiment, an example of an apparatus for performing operations 300-350 may include the search manager 80, for example. Additionally or alternatively, at least by virtue of the fact that the processor 70 can be configured to control the search manager 80 or even be implemented as the search manager 80, the processor 70 and/or is used to perform processing as described above Instructions for the information or devices or circuit systems that execute algorithms for processing the information may also form example means for performing operations 300-350.
[0056] An example of an apparatus according to an example embodiment may include at least one processor and at least one memory including computer program code. At least one memory and computer program code may be configured to, together with at least one processor, cause the apparatus (in any combination with or without the above-described modifications and expansions) to perform operations 300-350.
[0057] An example of a computer program product according to an example embodiment may include at least one computer-readable storage medium having a computer-executable program code portion stored therein. The computer executable program code portion may include program code instructions for performing operations 300-350 (in any combination with or without the above-described modifications and expansions).
[0058] In some cases, the operations (300-350) described above can be implemented together with any of the modifications in a method that involves facilitating access to at least one interface to allow access via at least one network. A service. In such a case, at least one service can be regarded as performing operations 300-350 at least.
[0059] Figure 7 Illustrated is an alternative embodiment of the method according to an example embodiment, for example implemented in a network node. The method may include, at operation 500, receiving, for example, from a user terminal, information indicating a first access node, the first access node providing access according to a first radio access technology. The first access node may be associated with a closed subscriber group accessible to the user terminal. The method may also include receiving information indicating a second access node that provides access according to a second radio access technology. The first access node may have a first coverage area, and the second access node may have a second coverage area that at least partially overlaps the first coverage area. The method may further include associating the information indicating the first access node with the information indicating the second access node at operation 520 (in some cases with the information indicating the other first access node and the second access node obtained from other user terminals). The information of the two access nodes is stored together). The method may further include providing fingerprint information associated with the first access node and fingerprint information associated with the second access node to one or more of the user terminals in operation 530.
[0060] In an example embodiment, for performing the above Figure 7 The apparatus of the method may include one or more processors (for example, the processor 470) configured to perform some or each of the operations (500-530) described above. The processor 470 may, for example, be configured to perform operations (500-530) by performing hardware-implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations (500-530). Alternatively, the device may include a device for performing each of the operations described above. In this regard, according to an example embodiment, an example of a device for performing operations 500-530 may include a fingerprint manager 480, for example. Additionally or alternatively, at least by virtue of the fact that the processor 470 can be configured to control the fingerprint manager 480 or even be implemented as the fingerprint manager 480, the processor 470 and/or is used to perform processing as described above The instructions of the information or the device or circuit system that executes the algorithm for processing the information may also form an example apparatus for performing operations 500-530.
[0061] An example of an apparatus according to an example embodiment may include at least one processor and at least one memory including computer program code. At least one memory and computer program code may be configured to, together with at least one processor, cause the apparatus (in any combination with or without the above-described modifications and expansions) to perform operations 500-530.
[0062] An example of a computer program product according to an example embodiment may include at least one computer-readable storage medium having a computer-executable program code portion stored therein. The computer-executable program code portion may include program code instructions for performing operations 500-530 (in any combination with or without the modifications and expansions described above).
[0063] In some cases, the operations (500-530) described above and any of the modifications are implemented in a method that involves facilitating access to at least one interface to allow access via at least one network service. In this case, at least one service may be regarded as performing at least operations 500-530.
[0064] Those skilled in the art to which the invention set forth herein relates, who benefit from the teachings presented in the foregoing description and associated drawings, will come to mind many modifications and other embodiments of these inventions. It will therefore be understood that the present invention will not be limited to the specific embodiments disclosed, and modifications and other embodiments are intended to be included within the scope of the appended claims. In addition, although the foregoing description and associated drawings describe some example embodiments in the context of certain example combinations of units and/or functions, it should be understood that alternative embodiments may provide different combinations of units and/or functions without departing from The scope of the appended claims. In this regard, for example, as may be set forth in some of the appended claims, unit and/or function combinations other than those explicitly described above are also envisaged. Although specific terms are used here, they are used only in a general and descriptive sense and not for limiting purposes.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products