System and method for location reporting in an untrusted network environment

A technology for reporting, location information, applied in the field of communication

Inactive Publication Date: 2019-07-19
CISCO TECH INC
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are significant challenges to knowing the location of subscribers, especially for untrusted connection points within the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for location reporting in an untrusted network environment
  • System and method for location reporting in an untrusted network environment
  • System and method for location reporting in an untrusted network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] overview

[0014] In an example embodiment, a method is provided, and the method may include: retrieving, by a user equipment (UE), an AP medium access control (MAC) address of an access point (AP) to which the UE is connected, wherein the The AP is in an untrusted Internet Protocol (IP) access network; using the Internet Key Exchange Version 2 (IKEv2) protocol to report the location information of the UE to the Evolved Packet Data Gateway (ePDG) through the SWu interface, where the location information at least partially includes: The location of the UE in Global Positioning System (GPS) coordinates, the service set identifier (SSID) of the untrusted IP access network, the retrieved AP MAC address, and cell identification (ID) information for the UE; and The UE's location information populates a location database, wherein the location database at least partially includes location information of other UEs in the untrusted IP access network.

[0015] The method may in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides systems and methods for location reporting in an untrusted network environment. An example method is provided and may include: retrieving, by a user equipment (UE), an AP media access control (MAC) address of an access point (AP) to which the UE is connected; using an Internet key exchange version 2 (IKEv2) protocol reports the location information of the UE to the evolved packet data gateway through the SWu interface, wherein the location information at least partially includes: the UE location in GPS coordinates, the service set identifier, the retrieved AP MAC address, and the cell identification information; and populate the location database with the location information. The method may include using a Network Access Identifier (NAI) to embed the UE's location information into an ID Initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message and using a proprietary extension of GPRS Tunneling Protocol Version 2 (GTPv2) The information element transmits the location information of the UE from the ePDG to the PGW through the S2b interface.

Description

technical field [0001] The present disclosure relates generally to the field of communications, and more particularly to systems and methods for location reporting in untrusted network environments. Background technique [0002] Networked architectures in communication environments, especially mobile wireless environments, have become increasingly complex. As end users become increasingly connected to the mobile wireless environment to do business, shop, interact with friends, maintain personal finances, and perform many other everyday functions, mobile communication networks have grown substantially in subscriber base. As the number of mobile subscribers increases, efficient management of communication resources becomes even more critical. In some instances, management of resources relies on the service provider knowing where the subscriber is connected to the network. Subscriber location is also required for lawful interception. There are significant challenges to knowi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W12/02H04L29/06H04W4/021H04W4/029H04W4/80
CPCH04L63/0428H04W4/02H04W12/02H04L63/30H04W48/16H04W4/029H04W4/80H04W84/12H04W4/021H04W4/027H04W12/06H04W12/033H04W12/0431H04L61/503H04L2101/622H04L2101/659H04W72/53H04W64/00H04J11/00H04L63/0892H04L69/16H04W8/04H04W88/02H04W88/12H04W88/16
Inventor 阿布舍克·达玛瓦特阿伦·卡旺德
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products