1. Field of the Invention
This invention relates to wireless communications. More specifically it relates to provision of location information for wireless devices.
2. Background of the Related Art
TCS produces wireless data communications technology solutions that require proven high levels of reliability. TCS' wireless data offerings include secure deployable communication systems and engineered satellite-based services; location-based wireless and VoIP Enhanced 9-1-1 services; messaging and location service infrastructure for wireless operators; and commercial location applications, like traffic and navigation, using the precise location of a wireless device.
TCS' location-based products include Xypoint® Location Platform, Xypoint® Reference Network, Xypoint® Assistance Data Server, and Xypoint® SUPL Server. Missing from the portfolio of products is a component that provides managed control over the delivery of mobile device location information to external systems.
In accordance with the principles of the present invention, a method of directing a location request in a wireless system to a serving location server based on emergency status, comprises steering a given location request to a given location server if the location request is a non-emergency location request. If the location request is related to an emergency, instead steering the location request to a different location server.
In accordance with another embodiment of the invention, a method of directing a location request in a wireless system to a serving location server based on data plan status, comprises steering a location request of a subscriber wireless device that has a valid data plan, to a given location server using a control plane. If the location request is related to a subscriber wireless device that has no valid data plan, instead steering the location request to a different location server.
In accordance with yet another embodiment of the invention, a method of directing a location request in a wireless system to a serving location server based on device type, comprises steering a location request of a subscriber wireless device of a first type, to a first location server. If the location request is related to a subscriber wireless device of a second type, instead steering the location request to a different location server.
In accordance with still another embodiment of the invention, a method of directing a location request in a wireless system to a serving location server based on application type, comprises steering a location request of a subscriber wireless device running an application of a first type, to a first location server. If the location request is related to a subscriber wireless device running an application of a different, second type, instead the location request is steered to a different location server.
In accordance with a further embodiment of the invention, a method of directing a location request in a wireless system to a serving location server with a fallback, comprises steering a location request of a subscriber wireless device, to a first location server. If the steered location request fails, and sufficient time remains, instead the location request is steered to a different location server.
Features and advantages of the present invention become apparent to those skilled in the art from the following description with reference to the drawings:
The present invention provides a Location Services Gateway server (XLSG) that provides managed control over the delivery of mobile device location information to external systems. As location information becomes more useful to users and applications, there becomes a need for a method of controlling access to that location information. The XLSG is a loosely coupled front-end to Location Servers (LS) to implement access control and privacy checking for the location information available from the LS.
Access services are provided to: (1) LCS Clients (applications) external to the carrier that implement Location Based Services (LBS). These are typically applications accessing the XLSG over the Internet; (2) LCS Clients (applications) executing on mobile devices within carrier networks requesting location information; and (3) Location servers external or internal to a carrier network that utilize the privacy checking capabilities of the XLSG.
In addition the XLSG implements a Location Access Manager (LAMM) which functions as a proxy location server to manage locations with a mobile device implementing a Location Agent (LA). The XLSG has particular application where location information can be provided to 3rd parties (external to a wireless carrier) to implement location based services (LBS).
In particular, a purpose of the XLSG is to provide access control to location information that is available via the mobile network and to provide that information as needed. For example there may be Location Based Services (LBS) that provide value added functions using locations of mobiles; since location information can be very sensitive the XLSG provides a set of configurable access controls to allow the users and systems to control the distribution of that location information.
As used in this description, the term “location server” (LS) is defined as a software and/or hardware entity offering location capabilities such as the TCS XLP. The term “LCS client” is a software and/or hardware entity that interacts with an XLSG for the purpose of obtaining location information for one or more mobiles by sending an MLP request to the XLSG. LCS Clients may or may not interact with human users. The LCS Client may be external to the carrier network or reside on the mobile. The term “subscriber” is a person who is the user of the mobile or the person who has the mobile account with the carrier.
The term “user” is used generically or preceded with some qualifier such as “LCS Client user” or “XLSG user” as needed.
This XLSG is described with reference to two primary functions (or use cases): 1. LCS Client originated location request; and 2. Privacy evaluation.
In particular, as shown in
All message interactions with the LCS Client and interactions with the LS are logged as TDRs and then aggregated into location transactions as LDRs to support billing and reporting functions.
In particular, as shown in
All Privacy Check requests are logged to facilitate postpaid billing and for prepaid customers there is a real time exchange with the OCS to assert a charge.
Devices or applications within a carrier network may initiate location requests which result in either of the above use cases. Depending on the originator and the target, the mobile may have an LCS Client and in this scenario the processing for the XLSG is considered a Mobile Terminated location request. A Mobile Originated (MO) location request is a “where am I” request from a mobile device that is used by the device to attain service(s) near the device's location.
Authentication is the process of confirming that the identity of an LCS Client by verifying the ID and password in a location request are identical to the ID and password in the LCS Client Profile. Authorization is the process of allowing access to locations only to those entities permitted to access them within the constraints defined in profiles.
The XLSG implements a set of profiles about system entities that form the basis for the access control rules of the XLSG. These entities include the Enterprise (carrier), Online Charging, System (OCS), Charging, Location Servers, LCS Clients, Applications, Charging Trigger, and Steering Profile. Device, Subscriber, and Privacy. In order to fulfill its access control rules, the XLSG requires data about each of these entities. For example, the Subscriber and Privacy profiles provide a set of options that define the access rules to its own location information, the device used by the subscriber, and network(s) on which the subscriber is provisioned. The device profile contains the characteristics of the device such as the types of networks that the device can utilize and, for multiple network devices, the order of preference for accessing the supported networks. The Enterprise Profile includes information such as the types of Location Servers belonging to the carrier and rules for steering requests to those location servers. The OCS and Charging profiles define the parameters and billing systems needed for real-time processing for prepaid subscribers. Each of the relevant entities are defined in the XLSG as a Profile and managed through the provisioning interface.
The XLSG utilizes information it receives in Location Requests and validates it according to the message specifications in the Mobile Location Protocol (MLP) and authenticates the requesting LCS Client. It then selects a location server and “steers” the request to that location server. LS selection is according to provisioned steering rules such as device type, application type, or request type. If more than one steering rule is provisioned they are evaluated according to a predefined precedence. The LS then requests a privacy authorization from the XLSG which evaluates it against the profile using business rules to determine if the Location Request should be authorized. If the request is authorized, the response to the location server causes the LS to continue the request which may include interactions with other location servers for roaming mobiles.
The XLSG may reside within a carrier with one or more wireless networks or may be in a standalone or hosted environment where it serves multiple carriers.
The exemplary XLSG implements the following external interfaces: LCS Client; Location Server; Privacy Interface; Location Agent Interface; Provisioning Interface; Online Charging System (OCS) Interface; Reporting Service/Logging Interface; system management; and administration.
LCS Client: This is an MLP interface for LBS applications to request the location of one of more mobile devices. The XLSG implements the Standard Location Immediate Service, the Emergency Location Immediate Service, and the Triggered Location Reporting Service from the MLP specification; the Standard and Emergency Reporting services are not supported in v1.1 of the XLSG. The XLSG preferably supports at least MLP versions 3.0 through 3.3.
Location Server: The LS provides location information to the XLSG over MLP for the XLSG to return to LCS Clients. After the XLSG completes the validation and authentication functions it uses MLP to request location information from the LS. The XLSG preferably supports at least MLP versions 3.0 through 3.3.
Privacy Interface: This interface provides a means for an LS or other external application to gain authorization for location requests. Privacy is supported both for Applications and Subscriber-to-Subscriber location requests.
Location Agent Interface: The Location Agent interface is between the Location Agent Manager (LAMM) function in the XLSG and a function executing on a mobile device called the Location Agent (LA). The LAMM forwards immediate and triggered requests to the LA which returns with locations. The LA obtains locations from onboard GPS or through interactions with location services.
Provisioning: The provisioning interface provides the capability to define the Enterprise (carrier), OCS, Charging, Location Server, LCS Client, Application, Device, Subscriber, Privacy profiles, Charging Trigger, and Steering Profile. These profiles are the core data set from which the XLSG makes access control decisions. The XLSG provides a web-based interface for XLSG users to access provisioning functions. Users include Subscribers to manage their privacy settings and carrier personnel such as customer care people. Subscribers can access privacy settings via the browser on their mobile device. A batch provisioning interface allows carriers to accomplish bulk provisioning for large quantities of data available in their other systems. The API also allows a carrier to integrate the management of XLSG Subscriber profiles into their nominal customer web site. Each carrier has a separate logical provisioning interface.
All provisioning access is secure and logged. The provisioning interface implements controls to ensure each request is associated with a role. These roles include: Product Operations, Service Representative Provisioning, and Subscriber Self-Provisioning. Each role is constrained to access specific profiles or portions of profiles.
Online Charging System (OCS) Interface: The OCS interface implements the 3GPP Ro protocol to an Online Changing System (OCS) to check subscriber's status, credit and apply charging. The XLSG sends Credit Control Request messages to the OCS for target subscribers on prepaid billing plans (provisioned) and for the request types provisioned in the Charging Trigger profiles. The response from the OCS indicates the results. Charges are asserted in real time for prepaid subscribers for the SLIS and TLRS MLP services and also for privacy requests.
Xypoint Reporting Service (XRS)/Logging Interface: The XRS is the reporting engine for reports about XLSG functions and operations. The XLSG has an FTP server to make the data available to the XRS which then uses that data to provide static and dynamic reports to users. Data output to the XRS include logs, metrics, and LDRs. This interface also serves the “postpaid” billing system where the system can retrieve LDRs via FTP.
System Management: The XLSG provides a System Management interface which supports integration with the carrier's network management system (NMS), implements traps to alert the NMS of certain error and fault conditions and queries to provide metrics. The traps report conditions not only about the XLSG application, but also the underlying OS and HW.
Admin: The XLSG provides a Command Line Interface (CLI) that is used by a Platform Administrator for system management of the XLSG such as start/stop subsystems, or interrogate detailed status information of interest.
The XLSG maintains transaction status as needed, supports 3 levels of request priority (normal, high and emergency), and implements a set of logs for recording transaction events and report metrics on activities.
The XLSG is configurable at deployment time to enable or disable certain major functions. The functions that can be configured include the Privacy interface, the LAMM, and the Application Interface.
The XLSG acts as a location broker and access gateway by allowing LCS Clients to obtain locations of subscribers across various carriers, networks, and location technologies. It executes on a commercial OS distribution consistent with a common platform definition. The XLSG provides for multicarrier/multi enterprise definitions and routing on a single platform.
The XLSG supports deployment of a single wireless carrier on a single hardware platform, and also supports deployment of multiple wireless carriers on a single hardware platform. The XLSG supports deployment of multiple wireless carriers on a single hardware platform using virtualization technology if the capacity of each instance of the XLSG program is 20 Transactions Per Second (TPS) or less. The XLSG preferably uses the MySQLStandard edition software for database functions. The XLSG preferably supports the Solaris version 10 or higher operating system, and allows LCS Clients to obtain location of Subscribers utilizing various carriers, networks, and location technologies.
The XLSG preferably provides the capability to localize the Subscriber User Interface to a local language, though only the subscriber graphical user interface (GUI) need have localization capability; all other parts of the XLSG may be in a given language, e.g., English.
There are 2 main location request uses cases that the XLSG supports: 1. LCS Client originated location request; and 2. Privacy request, though additional use cases are documented.
The general concept for real time billing requirements for prepaid subscribers is that the XLSG must communicate with an Online Charging System (OCS) to bill for location services. For subscribers who are not prepaid billing is accomplished offline via LDRs. However for prepaid subscribers the XLSG must ensure that charges are asserted at the time the location service is accomplished.
The XLSG performs the prepaid billing function for the Standard Location Immediate Service, the Triggered service, and for Privacy checks according to the Charging Trigger profile.
The XSLG does not implement specific charge amounts, but uses a set of identifiers from the received location request to determine the charging group. So for example an application sending a SLIR have a specific rating code based on the received client ID, QoS etc.
This section describes general MLP message processing requirements that are general across all 3 types of MLP location services. They are defined here if the requirement is broad across all the service types or are independent of service type. In addition to avoid repetitive requirements for individual MLP service types, some requirements are defined here if they are obviously applicable to each service type and can be worded accordingly.
The system preferably supports accepting MLP Network Initiated message location requests from multiple LCS Clients. The XLSG also provides three levels of priority processing for all messages associated with location requests including NORMAL, HIGH, and EMERGENCY listed from lowest priority to highest priority. The XLSG processes higher priority events before lower priority events according to the priorities defined in the following Table 1.
The XLSG ensures that the processing of location requests and authorization requests are independent for each Enterprise and the processing for one carrier is not delayed by the processing for another carrier. Priority processing is implemented in all XLSG queues and other processing sections where priority preference can be accommodated. The XLSG sends a message with a return of an error code MLP.SERVICE NOT SUPPORTED if the body message type in an MLP request is anything other than SLIR, EME_LIR, TLRR, or TLRSR.
The XLSG validates that an MLP message contains a body element in the message. The XLSG responds with HTTP.METHOD_NOT_ALLOWED error response upon receipt of any message from an LCS Client without a body element. The XLSG transmits a HTTP.BAD_REQUEST error response if the received message is unrecognizable. The XLSG transmits a HTTP.BAD_REQUEST error response if the received message cannot be correctly parsed. Preferably, though not necessarily, the system supports assigning each LCS Client their own URL. The system supports each LCS Client submitting HTTP and HTTPs requests.
The XLSG preferably has a function that verifies and responds to LCS Clients depending on which functions are enabled or disabled via the XLSG configuration capabilities.
If the transactions per second for LCS Client requests exceeds the configured maximum TPS (TPS is equivalent to location request sessions) then the XLSG preferably responds to location requests with the MLP.CONGESTION IN MOBILE NETWORK error code, a transaction being defined as the processing beginning with receipt of the first request message and ending when the service is complete for the SLIS, ELIS, and TLS services. Note: TPS measurements are across all Enterprises and all LCS Clients. There is no concept of allocating TPS requirements to individual Enterprises or LCS Clients.
Application Interface Module (AIM)
In particular, as shown in
The XLSG supports both the synchronous and asynchronous service types. The sequence begins when the XLSG receives the Standard Location Immediate Request (SLIR) from an LCS Client. The XLSG validates the SLIR and if the charging party is prepaid and SLIR is set in the Charging Trigger profile it outputs the credit control message exchange to the OCS. It then steers the SLIR to the appropriate LS. The LS in turn may send messages to the XLSG privacy interface for authorization. The XLSG waits for the LS to respond with a Standard Location Immediate Answer (SLIA), or identifies the absence of a response (timeout), and then transmits a SLIA back to the LCS Client. If the requested services was ASYNC, then the XLSG forwards each received and validated .SLIREP message to the requesting LCS Client
The Application Interface Function supports connectivity from multiple LCS Clients each submitting Location Requests. The function verifies the SLIR is valid, that the LCS Client is authenticated, and prepares the SLIR for steering to the selected location server.
In particular, as shown in
Batch requests are defined as an SLIR that has multiple msid elements or an msid range in the request. The SLIR is validated and then decomposed into individual SLIR requests for each misd which are in turn sent to location servers via the steering function. For synchronous batch requests the XLSG then tracks the SLIA responses from each location server and assembles the position elements from those SLIA responses into a single SLIA which is transmitted back to the LCS Client. The XLSG sets a timeout to await those SLIA responses and if any are missing the XLSG creates a pos element for the missing SLIA with an error code. If any SLIA messages are received from a location server after the assembled SLIA is sent to the LCS Client, they are discarded.
For ASYNC requests the XLSG creates an SLIA and transmits it back to the LCS Client. As in the MLP protocol the XLSG in turn receives SLIA messages from more than one location server. If the received SLIA has no error, then it is discarded. If the SLIA from the location server has an error, then the XLSG creates a SLIREP message and sends it to the corresponding LCS Client with the error code received in the SLIA. All received SLIREP messages are simply forwarded to the LCS Client.
In particular, as shown in
The system preferably provides an SLIR validation function. The XLSG validates that the syntax and format of the SLIR is conforming. The XLSG preferably ignores an unsupported parameter and continues processing the received SLIR as if the unsupported parameter was not in the message.
The XLSG preferably validates that the msid.enc parameter is “ASC”; and validates that the msid.type parameter in the SLIR is an msid type supported by the Enterprise. For batch requests the XLSG preferably validates all msid parameters contained within the received SLIR. For batch requests the XLSG verifies that the number of msids does not exceed the maximum batch requests provisioned for the Enterprise. The system preferably provides an LCS Client authentication function to manage the connections to the LCS Clients submitting location requests. The XLSG authenticates the LCS client using the id field of the client portion of the SLIR to ensure it matches the id that is provisioned for the LCS Client.
If the “LCS Client Pwd Required” in the LCS Client profile is set to true, then the XLSG authenticate the LCS client using the pwd field of the client portion of the SLIR to ensure it matches the password that is provisioned for the LCS Client.
If the seviceid element is present in the SLIR the XLSG authenticates the Application using the client.serviceid field of the hdr of the SLIR to ensure it matches the application identifier that was provisioned for an Application associated with the LCS Client. The XLSG rejects the location request with “Unauthorized Application” if the prio parameter is set to HIGH and the maximum priority that is provisioned for the LCS Client is Normal.
The XLSG verifies that the LCS Client and Application are authorized to request the SLIS service as defined in the LCS Client and Application Profiles. For Asynchronous requests the XLSG sends an SLIA to the requesting LCS Client.
The XLSG provides a function to assert charges for subscribers designated as prepaid billing plan for the Standard Location Immediate Service.
If the Application profile indicates that the target Subscriber is the Charging Party, SLIR is set in the Charging Trigger profile, and the target Subscriber is prepaid and, then the CCR message is sent to OCS with the Subscriber-Id AVP in the Credit Control Request (CCR) message populated with target Subscriber (MSISDN or IMSI). If the Application profile indicates that the Requestor is the Charging Party, SLIR is set in the Charging Trigger profile, and the requestor element is present in the SLIR, and the Requestor is prepaid, then the CCR message is sent to OCS with the Subscriber-Id AVP in the CCR message populated with Requestor MSISDN or IMSI.
For SLIR the XSLG sends the CCR with a Rating Group AVP based on the information in the received message and other corresponding AVPs as in the Charging Profile.
Upon receipt of the Credit Control Answer (CCA) message from the OCS the XLSG verifies that the DIAMETER_SUCCESS (2001) Result-Code and Granted Service Unit are in the CCA message.
The XLSG verifies that the CCA messages is received within the time period defined by the configured Tx timer.
The XLSG provides a function to handle each msid in a batch request individually for steering to a selected location server.
The XLSG decomposes a batch SLIR request into individual SLIR requests that are sent to Location Servers. Each individual SLIR for a batch request includes the eqop, geo_info, func, pushaddr, and service_coverage elements from the received SLIR if present in the received SLIR.
If the Application profile indicates the charging entity is “Target”, the XLSG checks the subscriber profile of each msid in the batch request if the target Subscriber is prepaid. If SLIR is set in the Charging Trigger profile, then the XLSG sends a CCR message to OCS with the Subscriber-Id AVP in the CCR message populated with target Subscriber MSISDN or IMSI for each of the prepaid msids.
If the Application profile indicates that the Requester is the Charging Party, the requestor element is present in the batch SLIR, the requestor is prepaid, SLIR is set in the Charging Trigger profile then the XLSG outputs as many CCR message as there are msids in the batch request with the Subscriber-Id AVP in the CCR message populated with requestor MSISDN or IMSI.
For synchronous SLIR requests the XLSG processes and assembles SLIA responses from the location servers. The XLSG provides a function for receiving and processing the SLIA from Location Servers.
For a batch, Synchronous requests the XLSG verifies that the SLIA from the LS contains the same number of pos parameters as the number of msids sent to the LS.
The XLSG verifies that the LS responds with a SLIA within the time specified by eqop.resp_timer or the default timer in the Enterprise profile.
For synchronous batch requests the XLSG creates a single SLIA from all the SLIAs received from location servers corresponding to the msids in the original SLIR request.
For synchronous batch requests the XLSG creates a pos element with result code MLP. SYSTEM FAILURE in the created “batch SLIA” for all msids for which a SLIA was not received from the location server for each of those msids.
For Synchronous batch requests if an SLIA is received from a location server after the “batch SLIA” was transmitted to the LCS Client the XLSG discards the SLIA received from the LS.
For ASYNC batch requests if the XLSG receives an SLIA with an error code after the XLSG had previously transmitted a SLIA to the LCS Client the XLSG creates a SLIREP message with the same error code and sends it to the LCS Client.
If the received SLIA indicates an error, and charge was applied to this transaction, then the XLSG sends a CCR message with Refund populated in Requested-Action AVP.
The XLSG transmits an SLIA received from the LS to the LCS Client with all same parameters received in the SLIA. The XLSG provides a function for receiving and processing the SLIREP from Location Servers.
The XLSG verifies that the req_id element in the received SLIPREP message is for an active location service request.
If the CCR/CCA exchange invoked by SLIR indicates it was a charged event, and correlated SLIREP was not successfully received, then XLSG sends a CCR message with Refund populated in Requested-Action AVP.”
The XLSG preferably transmits a SLIREP received from the LS to the LCS Client with all same parameters received in the SLIREP.
Unsuccessful Scenarios
For detected errors, the XLSG may include the add_info parameter to SLIA messages containing an error code with descriptive text clarifying the reason for the error code.
The XLSG provides a function to respond to the LCS Client for invalid received messages.
The XLSG transmits a HTTP.BAD_REQUEST error response if the received message is unrecognizable or cannot be correctly parsed.
The XLSG sends an SLIA with an error code MLP.SYNTAX ERROR if the received message has a syntax error as defined by the XML DTD.
The XLSG sends an SLIA with an error code MLP.FORMAT ERROR if the message has an invalid format as defined by the XML DTD.
The XLSG provides a function to respond to the LCS Client for SLIR validation failures.
The XLSG sends an SLIA with an error code MLP.
The XLSG sends an SLIA with an error code MLP.FORMAT ERROR to the LCS Client if the received message does not contain a body.
The XLSG sends an SLIA with an error code MLP. SERVICE NOT SUPPORTED to the LCS Client if the received message does not have the msid.enc parameter as “ASC”.
The XLSG sends an SLIA with an error code MLP. PROTOCOL ELEMENT ATTRIBUTE NOT SUPPORTED to the LCS Client if the msid.type parameter of a SLIR is not supported by the Enterprise.
The XLSG sends an SLIA with error code MLP.TOO MANY POSITION ITEMS to the LCS client if the number of msid parameters in the SLIR exceeds the maximum batch requests provisioned for the Enterprise.
The XLSG provides a function to respond to the LCS Client for SLIR authentication failures.
The XLSG sends an SLIA with an error code MLP.UNAUTHORIZED_APPLICATION to the LCS Client if the LCS client is not authenticated.
The XLSG sends an SLIA with an error code MLP.UNAUTHORIZED_APPLICATION to the LCS Client if the Application is not authenticated.
If online charging was invoked for SLIS service and the OCS server responds to a CCA message with a result-code other than Succeeded the XLSG send an SLIA to the LCS Client with the error code MLP.UNSPECIFIED ERROR and add_info field as defined in Table 22.
If online charging was invoked for SLIS service and the XLSG does not receive the CCA message from the OCS server within the time defined by the OCS Response Timer, then the XLSG sends an SLIA to the LCS Client with error code MLP.UNSPECIFIED ERROR with the add_info field as defined in Table 22.
The XLSG provides a function to respond to the LCS Client for Location Server problems.
The XLSG sends an SLIA for Synchronous SLIS or the SLIREP for Asynchronous SLIS with an error code MLP.SYSTEM FAILURE to the LCS Client if an LS is not available.
The XLSG sends an SLIA for Synchronous SLIS or the SLIREP for Asynchronous SLIS to the LCS Client with error code MLP. SYSTEM FAILURE if no response is received from the LS within the time specified by eqop.resp_timer or the “Default response timer” specified in the Enterprise profile.
The XLSG sends either an SLIA for Synchronous SLIS or the SLIREP for Asynchronous SLIS to the LCS Client with error code MLP. SYSTEM FAILURE if no response is received from the LS within the time specified by eqop.resp_timer or the “Default response timer” specified in the Enterprise profile.
The XLSG does not identify the absence (timeout) of SLIREP messages. This function is considered application level error handling for the LCS Client.
In particular, as shown in
The processing assumes that an LS process the EME_LIR differently than the LS processes the SLIR. For example it is probable that the LS not perform quality of position checks since this is an emergency service. In any case the processing for the XLSG is almost a complete pass through from LCS Client to the LS other than the validation and authentication requirements listed below.
Emergency services do not include prepaid processing.
The requirements for ELIS include batch requests, Asynchronous request, and Async batch request in the same structure as for the SLIS. There is no prepaid billing processing for ELIS.
The system provides an EME_LIR validation function. The XLSG validates that the format of the EME_LIR conforms. The XLSG ignores an unsupported parameter and continue processing the received EME_LIR as if the unsupported parameter was not in the message. The XLSG validates that the msid.enc parameter is “ASC”. The XLSG validates that the msid.type parameter in the EME_LIR is an msid type supported by the Enterprise.
For batch requests the XLSG validates all msid parameters contained within the received EME_LIR. For batch requests the XLSG verifies that the number of msids does not exceed the maximum batch requests provisioned for the Enterprise.
The system provides an LCS Client authentication function to manage the connections to the LCS Clients submitting location requests.
The XLSG authenticates the LCS client using the id field of the client portion of the EME_LIR to ensure it matches the id that is provisioned for the LCS Client. If the “LCS Client Pwd Required” in the LCS Client profile is set to true, then the XLSG authenticates the LCS client using the pwd field of the client portion of the EME_LIR to ensure it matches the password that is provisioned for the LCS Client.
The XLSG validates that the LCS client is authorized to request Emergency services, and skip charging process. If the seviceid element is present in the EME_LIR the XLSG authenticates the Application using the client.serviceid field of the hdr of the SLIR to ensure it matches the application identifier that was provisioned for an Application associated with the LCS Client.
The XLSG processes all EME_LIR messages with the EMERGENCY priority for all processing.
The XLSG provides a function to handle each msid in a batch request individually for steering to a selected location server.
The XLSG decomposes a batch EME_LIR request into individual EME_LIR requests that are sent to Location Servers.
Each individual EME_LIR for a batch request includes the eqop, geo_info, loc_type, pushaddr, and MapRequest elements from the received EME_LIR if present in the received EME_LIR.
For ASYNC batch requests, the XLSG creates an EME_LIA message with the same number of eme_pos elements as there were msids in the request and result code MLP.OK for each eme_pos element.
For synchronous EME_LIR requests, the XLSG process and assemble EME_LIA responses from the location servers. The XLSG provides a function for receiving and processing the EME_LIA from Location Servers. The XLSG processes all EME_LIA messages with the EMERGENCY priority for all processing.
For a batch, Synchronous requests the XLSG to verify that the EME_LIA from the LS contains the same number of eme_pos parameters as the number of msids sent to the LS.
The XLSG verifies that the LS has responded with an EME_LIA within the time specified by eqop.resp_timer or the “Default response timer” specified in the Enterprise profile.”
For Synchronous batch requests, the XLSG creates a single EME_LIA from all the EME_LIAs received from location servers corresponding to the msids in the original EME_LIR request.
The XLSG creates a pos element with result code MLP. SYSTEM FAILURE in the created “batch EME_LIA” for all msids for which a EME_LIA was not received from the location server.
For Synchronous batch requests, if an EME_LIA is received from a location server after the “batch EME_LIA” was transmitted to the LCS Client, the XLSG discards the EME_LIA received from the LS.
For ASYNC batch requests, if the XLSG receives an EME_LIA with an error code after the XLSG had previously transmitted a EME_LIA to the LCS Client, the XLSG creates an EME_LIREP message with the same error code and sends it to the LCS Client.
The XLSG sends all parameters of the EME_LIA received from the LS to the LCS Client and transmits an EME_LIA to the LCS Client.
The XLSG provides a function for receiving and processing the EME_LIREP from Location Servers. The XLSG verifies that the req_id element in the received EME_LIREP message is for an active location service request. The XLSG transmits an EME_LIREP received from the LS to the LCS Client with all same parameters received in the EME_LIREP.
For unsuccessful scenarios, the following defines exemplary responses and error codes that the XLSG sends in response to the EME_LIR to the LCS Client. The XLSG includes the add_info parameter to all EME_LIA messages containing an error code with descriptive text clarifying the reason for the error code. The XLSG provides a function to respond to the LCS Client for invalid received messages.
The XLSG sends an EME_LIA with an error code MLP.FORMAT ERROR if the message has an invalid format. The XLSG sends an EME_LIA with an error code MLP.SYNTAX ERROR if the received message has a syntax error.
The XLSG provides a function to respond to the LCS Client for EME_LIR validation failures. The XLSG sends an EME_LIA with an error code MLP.SERVICE NOT SUPPORTED to the LCS Client if the received message does not have the msid.enc parameter as “ASC”.
The XLSG sends an EME_LIA with an error code MLP. PROTOCOL ELEMENT ATTRIBUTE NOT SUPPORTED to the LCS Client if the msid.type parameter of a EME_LIR is not supported by the Enterprise.
For batch requests, the XLSG sends an EME_LIA with an error code MLP.TOO MANY POSITION ITEMS to the LCS Client if there is more than the number of allowed msids as defined in the Enterprise profile.
The XLSG provides a function to respond to the LCS Client for EME_LIR authentication failures.
The XLSG sends an EME_LIA with an error code MLP.UNAUTHORIZED APPLICATION to the LCS Client if the LCS client is not authenticated.
The XLSG sends an EME_LIA with a return error code MLP.UNAUTHORIZED APPLICATION if the LCS Client is not authorized to request Emergency services.
The XLSG provides a function to respond to the LCS Client for Location Server problems.
The XLSG sends an EME_LIA for Synchronous Emergency Service or the EME_LIREP for Asynchronous Emergency Service with an error code MLP.SYSTEM FAILURE to the LCS Client if an LS is not available.
The XLSG sends an EME_LIA for Synchronous Emergency Service or the EME_LIREP for Asynchronous Emergency Service to the LCS Client with error code MLP. SYSTEM FAILURE if no response is received from the LS within the time specified by eqop.resp_timer or the “Default response timer” specified in the Enterprise profile.
The XLSG does not identify the absence (timeout) of EME_LIREP messages. This function is considered application level error handling for the LCS Client.
Triggered Location Reporting Service
A triggered service is one of 3 types: Periodic; Mobile event; or Change of area.
Periodic: The XLSG sends a location report to the LCS client once for every defined interval time period or in batch mode.
Mobile event: The only defined event is that the mobile becomes available. (ms_action.type=MS_AVAIL)
Change of area: The mobile's location has met certain criteria such as entering or leaving some geographically defined area, for example for a geofencing application.
For the most part the XLSG is the gateway or intermediary for these services. It receives the request from an LCS Client, forwards requests to the location server, and forwards location reports from the LS back to the LCS Client. A triggered request can include all three of these types. The XLSG supports all three in combination in any single triggered request. If any location server doesn't support it, then an error message flow back to the LCS Client.
In particular, as shown in
Flat Rate model: Charging a “flat” rate per TLRR request. This charging model may be appropriate for Mobile Event and Change of Area types. This charging model is active if the corresponding Charging Trigger Profile includes TLRR but not TLREP.
Per Report model: In this model, charging consists of two parts: Trigger Session Initiation (i.e. TLRR) and each of the reports (i.e. TLREP) that were sent back to the requesting client. This charging model is active if the corresponding Charging Trigger Profile includes both TLRR and TLREP.
The XLSG supports a periodic triggered service, an event triggered service, a change of area triggered service, and any combination of these 3 triggered service types in a single TLRR. The XLSG provides a function to validate the Triggered Location Reporting Request.
The XLSG ignores an unsupported parameter and continues processing the received TLRR as if the unsupported parameter was not in the message.
The XLSG verifies that the deployed product is configured to support Triggered services.
The XLSG validates that the msid.enc parameter is “ASC”.
The XLSG validates that the msid.type parameter in the TLRR is an msid type supported by the Enterprise.
For batch requests, the XLSG validates all msid parameters contained within the received TLRR.
For batch requests, the XLSG verifies that the number of msids does not exceed the maximum batch requests provisioned for the Enterprise.
The XLSG verifies that either the interval element or the tlrr_event element (or both) are present in the TLRR.
The XLSG verifies that both the stop_time and duration elements are not both present in the TLRR.
The XLSG verifies that both the start_time and stop_time elements are not in the past (older than the current time) and that the start_time is not earlier than the stop_time.
The XLSG validates that the duration parameter does not exceed the “Max trigger periodic duration” provisioned for the Enterprise.
The XLSG provides a function to authenticate the LCS Client requesting the triggered service.
The XLSG authenticates the LCS client using the id field of the client portion of the TLRR to ensure it matches the id that is provisioned for the LCS Client. If the “LCS Client Pwd Required” in the LCS Client profiles is set to true, then the XLSG authenticates the LCS client using the pwd field of the client portion of the TLRR to ensure it matches the password that is provisioned for the LCS Client.
If the seviceid element is present in the TLRR, the XLSG authenticates the Application using the client.serviceid field of the hdr of the TLRR to ensure it matches the application identifier that was provisioned for an Application associated with the LCS Client.
The XLSG verifies that the LCS Client is authorized to request the Triggered Location Service as defined in the LCS Client Profile.
The XLSG rejects the location request with “Unauthorized Application” if the prio parameter is set to HIGH and the maximum priority that is provisioned for the LCS Client is Normal.
The XLSG provides a function to assert charges for subscribers designated as prepaid billing plan for the triggered service.
If the Application profile indicates that the target Subscriber is the Charging Party, the target Subscriber is prepaid and the received message is set in the Charging Trigger profile, then the XLSG performs the charging process defined in Table 2 with the Subscriber-Id AVP in the Credit Control Request (CCR) message populated with target Subscriber MSISDN or IMSI.
If the Application profile indicates that the Requestor is the Charging Party, and the requestor element is present in the TLRR, the Requestor is prepaid, and the received message is set in the Charging Trigger profile, then the XLSG performs the charging process defined in Table 2 with the Subscriber-Id AVP in the CCR message populated with Requestor MSISDN or IMSI.
If the Application profile indicates the charging entity is “Target”, the XLSG checks the subscriber profile of each msid in the batch request if the target Subscriber is prepaid. If TLRR is set in the Charging Trigger profile, then the XLSG sends a CCR message to OCS with the Subscriber-Id AVP in the CCR message populated with target Subscriber MSISDN or IMSI for each of the prepaid msids, and follows the charging process specified in Table 2 for each of the msids.
If the Application profile indicates that the Requester is the Charging Party, the requestor element is present in the batch TLRR, the requestor is prepaid, TLRR is set in the Charging Trigger profile then the XLSG sends as many CCR messages as there are msids in the batch request with the Subscriber-Id AVP in the CCR message populated with requestor MSISDN or IMSI, and follows the charging process specified in Table 2 for each of the msids.
The XSLG sends the CCR with a Rating Group AVP based on the information in the received message and other corresponding AVPs as in the Charging Profile.
Charging Trigger Profile includes TLRR but not TLREP; Per Report Charging Model is enabled if the corresponding Charging Trigger Profile includes both TLRR and TLREP.
Upon receipt of the Credit Control Answer (CCA) message from the OCS the XLSG verifies that the DIAMETER SUCCESS (2001) Result-Code and Granted Service Unit are in the CCA message.
The XLSG verifies that the CCA messages is received within the time period defined by the configured Tx timer.
Subsequent processing of the TLRR for non-batch requests is as specified in the Steering function.
The XLSG provides a function to handle each msid in a batch request individually for steering to a selected location server.
The XLSG decomposes a batch TLRR request into individual TLRR requests that are sent to Location Servers.
Each individual TLRR for a batch request includes the interval, start_time, stop_time, duration, tlrr_event, qop, geo_info, pushaddr, loc_type, prio, service_coverage, and MapRequest elements from the received TLRR if present in the received TLRR.
The XLSG creates a TLRA message with a unique req_id and result code MLP.OK and transmits it to the requesting LCS Client. Note: this req_id must be used for all of the TLREP messages for all of the msids in the batch request.
Subsequent processing for each of the TLRRs for batch requests is as specified in the Steering function.
The XLSG provides a function for processing the TLRA received from a location server.
The XLSG verifies that the LS responds with a TLRA within the time specified by the default timer in the Enterprise profile.
For an msid that was not from a batch request, the XLSG transmits a TLRA received from the LS to the LCS Client with all same parameters received in the TLRA. If a received TLRA is for an msid with an active session from a TLRR batch request, and the received TLRA indicated a result code other than MLP.OK, then the XLSG initiates an unsolicited tlrsa message to the corresponding LCS Client. If the received TLRA indicates an error, and the online charging was invoked for the transaction, then the XLSG sends a CCR message with Refund populated in Requested-Action AVP as specified in Table 2.
The XLSG provides a function for processing TLREP messages from Location Servers.
If the TLREP is received from the LS and there is no active triggered session, then the XLSG discards the TLREP.
Upon receipt of the TLREP without error, if the Application profile indicates that the target Subscriber is the Charging Party, the target Subscriber is prepaid, and TLREP is set in the Charging Trigger profile (i.e. Per Report Charging Model), then the XLSG performs online charging process as specified in Table 2 with the Subscriber-Id AVP in the Credit Control Request (CCR) message populated with target Subscriber MSISDN or IMSI.
Upon receipt of the TLREP without error, if the Application profile indicates that the Requester is the Charging Party, and the requestor element was present in the TLRR, the requestor is prepaid, and TLREP is set in the Charging Trigger profile (i.e. Per Report Charging Model), then the XLSG performs the online charging process as specified in Table 2 with the Subscriber-Id AVP in the CCR message populated with requestor MSISDN or IMSI.
As above under the TLREP processing, the XLSG verifies the received CCA message and uses the TX timer to verify receipt of the message.
If the TLREP failed to deliver to the LCS client, and the online charging was invoked for the TLREP, then the XLSG sends a CCR message with Refund populated in Requested-Action AVP and the same Subscriber-Id AVP for the online charging of this session.
The XLSG transmits a TLREP received from the LS to the LCS Client with all same elements received in the TLREP.
The XLSG provides a function for processing the TLRSR. Note that the TLRSR request may be for one or more msids with an active triggered service. Although triggered services may be requested for more than one msids, the list of msids in the stop request does not have to match the list of msids in an initial triggered service request.
The XLSG receives a TLRSR message and validates that the misd and req_id are for an active triggered service and ignores the message if they are not valid.
The XLSG sends a TLRSR to the active location server for the active triggered service with the same elements as received from the LCS Client.
The XLSG provides a function for receiving and processing the TLRSA from Location Servers.
The XLSG verifies that the LS responds with a TLRSA.
The XLSG transmits a TLRSA received from the LS to the LCS Client with all same parameters received in the TLRSA.
TLRR Unsuccessful Scenarios
The XLSG includes the add_info parameter to all TLRA messages containing an error code with descriptive text clarifying the reason for the error code.
The XLSG provides a function to respond to the LCS Client for invalid received messages.
The XLSG transmits a HTTP.BAD_REQUEST error response if the received message is unrecognizable or cannot be correctly parsed.
The XLSG sends a TLRA with an error code MLP.SYNTAX ERROR if the received message has a syntax error as defined by the XML DTD.
The XLSG sends a TLRA with an error code MLP.FORMAT ERROR if the message has an invalid format as defined by the XML DTD.
The XLSG provides a function to respond to the LCS Client for TLRR validation failures.
The XLSG sends a TLRA with an error code MLP.FORMAT ERROR to the LCS Client if the received message does not contain a body.
If the XLSG is not configured to support Triggered services then the XLSG transmits an TLRA to the requesting LCS Client with error code MLP.SERVICE NOT SUPPORTED.
The XLSG sends a TLRA with an error code MLP. SERVICE NOT SUPPORTED to the LCS Client if the received message does not have the msid.enc parameter as “ASC”.
The XLSG sends a TLRA with an error code MLP. PROTOCOL ELEMENT ATTRIBUTE NOT SUPPORTED to the LCS Client if the msid.type parameter of a TLRR is not supported by the Enterprise.
The XLSG sends a TLRA with error code MLP.TOO MANY POSITION ITEMS to the LCS client if the number of msid parameters in the TLRR exceeds the maximum batch requests provisioned for the Enterprise.
If the interval element and the tlrr_event element are not present in the TLRR, the XLSG sends the TLRA with error code MLP. SYNTAX ERROR to the LCS Client.
If the stop_time and duration elements are both present in the TLRR, then the XLSG sends a TLRA to the LCS Client with error code MLP.INVALID PROTOCOL ELEMENT VALUE.
If either the start_time or stop_time elements in the TLRR are both in the past (older than the current time), or the start_time is earlier than the stop_time, then the XLSG sends a TLRA to the LCS Client with error code MLP. INVALID PROTOCOL ELEMENT VALUE.
If the requested duration parameter exceeds the “Max trigger periodic duration” provisioned for the Enterprise, then the XLSG sends a TLRA to the LCS Client with error code MLP.INVALID PROTOCOL ELEMENT VALUE.
The XLSG provides a function to respond to the LCS Client for TLRR authentication failures.
The XLSG sends a TLRA with an error code MLP.UNAUTHORIZED_APPLICATION to the LCS Client if the LCS client is not authenticated.
The XLSG sends a TLRA with an error code MLP.UNAUTHORIZED_APPLICATION to the Application if the Application is not authenticated.
If online charging was invoked for a triggered session and the OCS server responds to a CCA message with a result-code other than Succeeded, the XLSG sends a TLRA to the LCS Client with the error code MLP.UNSPECIFIED ERROR and add_info field as defined in Table 22.
If online charging was invoked for the triggered service and XLSG does not receive the CCA message from the OCS server within the Tx timer, then the XLSG sends a TLRA to the LCS Client with error code MLP. UNSPECIFIED ERROR with add_info as defined in Table 22.
The XLSG provides a function to respond to the LCS Client for Location Server problems.
The XLSG sends a TLRA with an error code MLP.SYSTEM FAILURE to the LCS Client if an LS is not available.
The XLSG initiates online refund upon receiving TLRA with an error code.
Upon receipt of the TLRA with an error code, if online charging process was invoked, the XLSG initiates a CCR message with Refund populated in Requested-Action AVP, the same Subscriber-Id AVP for the online charging of this session and other parameters appropriately depending upon the charging model that was used, as defined in Table 2.
TLREP Unsuccessful Scenarios
If a CCR message has been output to the OCS and the XLSG does not receive the CCA message from the OCS server within the time defined by the OCS Tx timer, then the XLSG sends a TLREP to the LCS Client with error code MLP.UNSPECIFIED ERROR and add_info field as defined in Table 22.
If online charging was invoked with a charge for a TLREP (i.e. Per Report Charging Model) and the OCS server responds to a CCA message with a result-code other than Succeeded, the XLSG preferably initiates the cancellation procedure for the pending triggered session by sending a MLP TLRSR to the location server via the outbound interface. Once a MLP TLRSA is returned, the XLSG sends a MLP TLRSA to the LCS Client initiated the triggered session with the error code MLP.UNSPECIFIED ERROR and add_info field as defined in Table 22.
Steering
The XLSG receives incoming MLP requests from LCS Clients. The steering portion of the XLSG steers to a location determination platform based on a series of rules that are provisioned by an operator at deployment time. A request from an application is first processed as in Section 0 and is then sent to a location server (LS). Depending on various conditions, the best or correct LS is selected via this steering function.
In particular, there are six rules or parameters that the XLSG uses to select an LS. Some of these rules are exclusive meaning that only one rule may exist. Other rules can exist concurrently in order to allow a finer tuning of the steering to different LS. The rules are provisioned in the Enterprise Profile.
The rules are:
1. Enterprise (Operator)—A given operator may have only one location server or choose to route all XLSG requests to a single location server. This rule states that ALL location requests go to a single location server.
2. Request Type—Commercial vs. Emergency requests can be steered to different servers.
3. Data Plan—If a subscriber does not have a data plan, then only the GMLC control plane should be used.
4. Device Type—The operator provisions device types and each subscriber is provisioned with their device type. The device type states which location determination server should handle the request. This can be imperfect especially in GSM where users can switch SIMs with ease.
5. Application ID—An application is defined to use a specific location server.
6. Fallback—Fallback to a different location server if a location request fails and there is “enough” time to send the request to another location server.
Table 3 provides the precedence order for the rules with a discussion for each of the allowable concurrency if multiple rules are defined.
Table 4 illustrates the allowed combination of steering rules in a “decision table” format. The top portion of the table lists the “causes”, or in this case the different rules that may be in effect. The right side of the table next to causes indicates the allowed combination of different rules. The lower section of the table shows the “effects” or in this case it indicates the final rule that is used for selecting the location server. In all cases there is no requirement for the XLSG to be provisioned with multiple rules, each rule can stand alone which is a condition not illustrated in this table.
Fallback is the process of selecting a 2nd LS if the results of the first location attempt were not successful. Unsuccessful results may come from two reasons; either the initial location server returned an error (or didn't respond), or the requested QoP was not possible. The fallback function selects only one additional LS; thus there are never more than two attempts to obtain a location for one request. Fallback rules are based on the rule that was used for the initial LS selection; in a sense the method for selecting a fallback LS proceeds through the rule in inverse precedence.
The structure of the profiles define that an MNVO is a subset of an Enterprise. Since steering is defined at the level of the Enterprise, there are no considerations of an MNVO that influences steering. Locations servers are associated with the Enterprise and the possible devices for an MVNO are a subset of the devices defined for the Enterprise. There may be LCS Clients and Applications defined for an MVNO which are not common to the Enterprise; in this circumstance there is a need for manual coordination of Application ID steering if that rule is selected for the Enterprise.
Generally speaking the LAMM is a location server. Steering to the LAMM is provisioned through either the Device Type rule, the Application ID rule, or a combination of the two. In addition, steering to the LAMM requires that the XLSG first check that the subscriber's device has the XLSA agent installed and registered in the profiles; and that the LAMM update the Subscriber Profile with status for registered agents. Steering to the LAMM takes precedence over a conflicting rule. For example if the Device Type rule is provisioned for the LAMM, and the Application rule for the request is provisioned to some other LS, the request is steered to the LAMM.
Successful Scenarios
Location Server Selection
The XLSG provides a steering function that selects a location server for each location request based on the rules provisioned in the Enterprise profile.
Steering rules are separate for each Enterprise independent of any other Enterprise. The XLSG steering function supports the following Location Server types:
The XLSG steers all SLIS, ELIS, and TLRS location requests according to the steering rules. The XLSG provides a steering rule called Enterprise which allows the definition of a single location server to be used for all location requests.
If the XLSG is provisioned with the Enterprise steering rule then no other rule is allowed. If the Enterprise rule is provisioned then the XLSG steers all location requests to the LS defined by that rule.
The XLSG provides a steering rule called Request Type that allows the definition of one or two location servers.
The XLSG provides two alternatives for the Request Type rule. Alternative 1 Request type rule specifies a LS to be used for all emergency location requests, and another LS to be used for all non-emergency location requests also called “commercial requests”. Alternative 2 Request type rule specifies a LS to be used for all emergency location requests.
If the XLSG is provisioned with the alternative 1 request type rule then no other rule is allowed.
If the XLSG is provisioned with the alternative 2 request type rule then the XLSG allows the provisioning of the Data Plan, Device Type and Application ID rules.
If the alternative 1 Request Type rule is in effect, the XLSG steers all emergency and commercial location requests to the LS defined by this rule.
If the alternative 2 request type rule is in effect, the XLSG steers all emergency location requests to the LS defined by this rule.
The XLSG provides a steering rule called Data Plan that allows the definition of one or two location servers.
The XLSG provides two alternatives for the Data Plan rule.
Alternative 1 Data Plan rule specifies a LS to be used for all Subscribers with an active mobile data plan, and another LS to be used for all Subscribers who do not have a mobile data plan.
Alternative 2 Data Plan rule specifies a LS to be used for all Subscribers who do not have a mobile data plan.
If the XLSG is provisioned with the alternative 1 Data Plan rule then only the Request Type rule may also be provisioned.
If the XLSG is provisioned with the alternative 2 Data Plan rule then the XLSG allows the provisioning of the Request Type, Device Type and Application ID rules.
If the alternative 1 Data Plan rule is in effect, the XLSG steers all data plan and non-data plan requests to the two LS defined by this rule.
If the alternative 2 Data Plan rule is in effect, the XLSG steers all non-data plan location requests to the LS defined by this rule.
The XLSG provides a steering rule called Device Type that allows the definition of a location server for each type of provisioned device.
If the XLSG is provisioned with the alternative Device Type rule, then the XLSG allows the provisioning of the Request Type rule, and the Data Plan rule for the LAMM.
If the Device Type rule is in effect, the XLSG steers all location requests to the location server associated with the device type indicated in the Device Profile corresponding to the Subscriber in the location request.
If the Device Type rule is provisioned for the LAMM, then the XLSG steers the request to the LAMM.
The XLSG provides a steering rule called Application ID that allows the definition of a location server for each Application.
If the XLSG is provisioned with the alternative Application ID rule, then the XLSG allows the provisioning of the Request Type rule, and the Data Plan rule for the LAMM.
If the Application ID rule is in effect, the XLSG steers all location requests to the location server associated the Application sending the location request.
If the Application ID rule is provisioned for the LAMM, the XLSG steers to the LAMM.
After the location server is selected from the steering rules, the XLSG provides a function to send the location request to the Location Server.
If the steering is for a triggered request, and the triggered request contains more than one type of triggered function (e.g. periodic, change of area or mobile event) then the XLSG verifies that the selected location server supports all of the requested triggered location types and invokes the fallback procedure if they are not supported.
If the selected location server is the LAMM, then the XLSG verifies that the target Subscriber has the XLSA agent installed on its corresponding device and invokes the fallback procedure if it is not installed.
The XLSG transmits a location request (SLIR, EME_LIR, or TLRR) to the Location Server selected by the steering rules where that location request is as defined by other requirements.
Unsuccessful Scenario—Fallback
The XLSG provides the capability known as fallback which causes the XLSG to attempt a location request to a second location server if the response from the first selected location server was unsuccessful.
The XLSG selects a fallback location server for the Standard Location Immediate Service and the Emergency Location Immediate Service if the first attempted location server returned an error.
If the location request was a Triggered service, then the XLSG returns an MLP response with an error.
If the fallback location server is selected for any msid in a synchronous batch request, the XLSG waits for responses from all location servers before sending the corresponding response to the LCS Client. (SLIA, EME_LIA).
The XLSG provides a function to select a fallback location server if the initial location attempt is not successful or returns an error to the requesting LCS Client.
If the Application ID rule was the final LS selector, then the XLSG searches all other defined Location Servers for a match between 1.) The supported location technologies for the device; and 2.) Location technologies supported by a Location server, and sends the request to the first LS found that is not the same one as the LS that failed. Upon failure of the last retry (including the case no other location server found), the XLSG returns the original error received from the location server in the 1st attempt.
If the Device Type rule was the final LS selector, then the XLSG searches all other defined Location Servers for a match between 1.) The supported location technologies for the device; and 2.) Location technologies supported by a Location server, and sends the request to the first LS found that is not the same one as the LS that failed. Upon the failure of the last retry (including the case no other location server found), the XLSG returns the original error received from the location server in the 1st attempt.
If the Data Plan rule was the final LS selector, and the request was for a Subscriber with a data plan, then the XLSG searches all other defined Location Servers for a match between 1.) The supported location technologies for the device; and 2.) Location technologies supported by a Location server, and sends the request to the first LS found that is not the same one as the LS that failed. Upon failure of the last retry (including the case no other location server found), the XLSG returns the original error received from the location server in the 1st attempt.
If the Data Plan rule was the final LS selector, and the request was for a Subscriber with no data plan, then the XLSG returns an MLP response with the original error received from the location server in the 1st attempt.
If the Request Type rule was the final LS selector and the request was for commercial, then no fallbacks are applicable. If the Request Type rule was the final LS selector and the request was for emergency, then the XLSG sends the location request to the other location server defined by the other Request Type rule(S) of the same enterprise. The selection of other location servers follows the same logic defined for the corresponding rule(s), with an extension that for emergency request a subscriber with Data Plan can fallback to non-data plan location server. Upon failure of the last retry (including the case no other location server was found), the XLSG returns the original error received from the location server in the 1st attempt.
If Enterprise rule is defined, then the XLSG returns an MLP response with the original error received from the location server in the 1st attempt. The XLSG provides a function to return an error response to LCS Clients for location requests that were not completed.
The XLSG sends an SLIA, EME_LIA, or TLRA with an error code MLP.UNSPECIFIED ERROR to the LCS Client if the message received from the location server could not be correctly parsed.
The XLSG sends an SLIA, EME_LIA, or TLRA with an error code MLP.SYSTEM FAILURE to the LCS Client if the LS is not available.
The XLSG sends an SLIA, EME_LIA, or TLRA to the LCS client with error code MLP. SYSTEM FAILURE if no response is received from the LS within the time specified by eqop.resp_timer or a system default timer (where eqop.resp_timer does not apply to the triggered service).
Location Agent Management Module (LAMM)
The LAMM component of the XLSG interfaces with the TCS Xypoint Location Agent (XLSA) via any appropriate protocol. The LAMM component may be the sole interface to a Location Agent on the handset to maintain control of the interface between the XLSA and a Location Gateway. The LAMM supports sending geofencing to the handset and receiving location reports from the handset. The LAMM supports Network-initiated location requests. The LAMM is able to determine if a mobile device has a Location Agent, and is able to determine what version of the Location Agent a mobile device may be using. A Third Party Application is able to cancel a location request/session. If an operator-controlled mechanism allows users to opt-out, then the Network Element must be able to cancel the session. The type of handset may be determined (BREW, RIM, Windows Mobile, etc.) so that the XLSG-LAMM can craft the payload in the MT SMS message appropriately. The Location Agent differentiates multiple LBS applications through a unique ID associated with each LBS application. The system provides a mechanism to make sure that cancelled geofences are removed from the XLSG-LAMM to avoid dangling geofences. All triggered-periodic TLRR messages may be coordinated from within the SSPE (Server Side Polling Engine). The system generates a log for each Location Agent downloaded by mobile phone number. The system generates a log for each Location Agent downloaded by the wireless operator. The system generates a log for each Location Agent downloaded by the device Operating System. This download is implemented by an external system, but may simply log each agent registration in the LAMM. The system generates a log each time a subscriber denies a location request upon receiving a location notification (Position Report). The system generates a log of all location fix types (Cell ID, A-GPS, etc.) by MDN. The system generates a log of all location fix types (Cell ID, A-GPS, etc.) by MSISDN. The system generates a log indicating the fix type requested for each location transaction. The system generates a log indicating the actual fix type result for each location transaction. The system generates a log indicating the uncertainty of result for each location transaction. The system generates a log indicating that a location failure resulted from the E-911 setting on a handset. The Location Agent supports Store & Forward SMS.
Privacy Profile Register (PPR)
The Privacy function receives requests from a Location Server or external system to authenticate requestors and authorize location requests. This function also outputs notifications to location servers when the provisioning data of a Subscriber (msid) changes.
Location Privacy Assertion
Location privacy assertion is used between a Location Server requesting Privacy status and the XLSG implementing the Privacy Checking Entity. The XLSG receives an LPARequest message which contains the parameters to be authorized such as the target Subscriber and the application requesting to locate the subscriber. The XLSG performs a set of authentication and authorization functions such as checking that the target subscriber has enabled the requesting application. For emergency or lawful interception requests the privacy check functions are bypassed. The XLSG responds with the LPAResponse message which contains the results of the privacy check.
If Privacy check was set as Chargeable event in Charging Trigger Profile and the charging entity for the transaction is Prepaid, then charging is processed Online.
The XLSG provides 5 privacy definition concepts: Application Based Privacy; Requestor Based Privacy; App-Requestor Based Privacy; Time Based Privacy; and Subscriber Default Privacy.
Application Based Privacy: A subscriber can define the privacy settings for each Application that the subscriber has enabled, optionally date and time can be used.
Requestor Based Privacy: A subscriber can define the privacy settings for each “requesting” Subscriber that the target subscriber has enabled, optionally date and time can be used.
App-Requestor Based Privacy: A subscriber can define the privacy settings per requestor and application, i.e., only the selected requestor uses the selected application is allowed, optionally date and time can be used.
Time Based Privacy: A subscriber can define the privacy settings based on date and time.
Subscriber Default Privacy: A subscriber can define the default privacy settings to be applied to privacy requests in the absence of any identifiable requesting application and/or requesting subscriber. A default setting may be “Not Allowed”.
There are 3 levels of privacy checking: (1) Global “location” allowed; (2) Location requests allowed or disallowed for each individual application and/or requestor; and (3) Temporal location settings for each application and/or requesting subscriber.
The XLSG supports privacy decision rules as specified in Table 1.
In particular, for each subscriber, there is a Global Privacy Setting. If the Global Privacy Setting is set to not allowed, “not allowed” is returned as a privacy action for all the privacy checking requests.
On a per enterprise basis, there is a flag for enabling/disabling Application Based Privacy. When Application Based Privacy is enabled, additional date/time based rules are allowed.
On a per enterprise basis, there is a flag for enabling/disabling Requestor Based Privacy. When Requestor Based Privacy is enabled, additional date/time based rules are allowed.
On a per enterprise basis, there is a flag for enabling/disabling Time Based Privacy. Time Based Privacy cannot be enabled if any of Application Based Privacy and/or Requestor Based Privacy is enabled.
On a per enterprise basis, Application Based Privacy and Requestor Based Privacy can be enabled at the same time, in which case additional date/time based rules is allowed.
For each subscriber, there is a Subscriber Default Privacy Setting, which is used when Application Based Privacy and/or Requestor Based Privacy is/are enabled, but the mandatory information element(s) is missing in the received LPARequest. Subscriber Default Privacy may be hard coded to “Not Allowed”.
In Table 5, the scenarios where none of the privacy modes (i.e. Application Based Privacy, Requestor Based Privacy and Time Based Privacy) is enabled need not be made applicable.
In particular, as shown in
The XLSG validates the format and syntax of the Location Privacy Assertion Request (LPARequest).
The XLSG validates the version of the Location Privacy Assertion Request (LPARequest) is, e.g., 1.0.
The XLSG validates that the LPARequest contains a pcp_hdr and that the pceClient.id element contains the identifier for a Location Server in the profiles and the pceClient.pwd matches the password provisioned for that LS.
The XLSG ensures that the ueid (target Subscriber) contains a valid Subscriber msid that has been defined in the profiles.
If the clientCategory in the LPARequest is set to Emergency or Lawful Interception and the Override Allowed is enabled in the LCS Client profile, then the XLSG does not perform additional privacy checks.
The XLSG provides a privacy check function. The XLSG ensures that the target Subscriber has globally authorized location requests. If Application Based Privacy is enabled and the LPARequest contains the applicationID, then the XLSG validates that the applicationID element is an Application that has been authorized for location requests by the target Subscriber.
If Application Based Privacy is enabled and the LPARequest contains the applicationID, then the XLSG verifies that the current day and time are allowed for the requesting application in the Privacy profile if temporal privacy is set for the application ID.
The XLSG performs Application privacy checks only if the Application Privacy is enabled as defined in the Enterprise (MVNO) profiles.
If Requestor Based Privacy is enabled and the requestor parameter is present in the LPARequest, then the XLSG validates that the requestor parameter is another msid that has been authorized by the target Subscriber.
If Requestor Based Privacy is enabled and the requestor parameter is present in the LPARequest, then the XLSG verifies that the current day and time are allowed for the requestor in the Privacy profile if temporal privacy is set for the requestor.
The XLSG performs Requestor privacy checks only if the Requestor Privacy is enabled as defined in the Enterprise (MVNO) profiles.
If both Application Based Privacy and Requestor Based Privacy are enabled, and both the requestor parameter and the applicationID are present in the request, then the XLSG validates the requestor and applicationID that have been authorized by the target Subscriber.
If both Application Based Privacy and Requestor Based Privacy are enabled and both the requestor and applicationID parameters are present in the LPARequest, then the XLSG verifies that the current day and time are allowed for the requestor and applicationID in the Privacy profile if temporal privacy is set for the requestor and applicationID.
The XLSG performs Requestor and Application Privacy checks only if both Requestor Based Privacy and Application Based Privacy are enabled as defined in the Enterprise (MVNO) profiles.
If Time Based Privacy is enabled, then the current day and time are allowed by the target Subscriber.
The XLSG performs Time Based Privacy checks only if both Time Based Privacy is enabled as defined in the Enterprise (MVNO) profiles.
If Application Based Privacy and/or Requestor Based Privacy is/are enabled, but the requestor parameter is not present in the request and/or the applicationID is not present in the request, then the XLSG uses the Subscriber Default Privacy.
If none of Application Based Privacy, Requestor Based Privacy and/or Time Based Privacy is enabled, the XLP uses the subscriber's Global Privacy Setting for all privacy check requests.
The XLSG provides a function to perform billing to the OCS for privacy checks when either the target subscriber or the requestor are prepaid.
If the Application profile indicates that the target Subscriber is the Charging Party, Privacy check was set as Chargeable event in Charging Trigger Profile, and the target Subscriber is prepaid, then the CCR message is sent to OCS with the Subscriber-Id AVP in the Credit Control Request (CCR) message populated with target Subscriber MSISDN or IMSI.
If the Application profile indicates that the Requestor is the Charging Party, and the requestor element is present in the LPARequest, Privacy check was set as Chargeable event in Charging Trigger Profile, and the Requestor is prepaid, then the CCR message is sent to OCS with the Subscriber-Id AVP in the CCR message populated with Requestor MSISDN or IMSI.
The XSLG sends the CCR with a Rating Group AVP based on the information in the received message and other corresponding AVPs as in the Charging Profile.
Upon receipt of the Credit Control Answer (CCA) message from the OCS the XLSG verifies that the DIAMETER SUCCESS (2001) Result-Code and Granted Service Unit are in the CCA message.
The XLSG verifies that the CCA message is received within the configured Tx Timer.
The XLSG sends the LPAResponse with the privacyAction parameter set to the value provisioned in the Privacy profile.
Unsuccessful Scenarios
If the format of the LPARequest is not valid, the XLSG sends a LPAResponse to the requesting LS with a Result Code of FORMAT ERROR.
If the syntax of the LPARequest is not valid, the XLSG sends a LPAResponse to the requesting LS with a Result Code of SYNTAX ERROR.
If the version of the LPARequest is other than, e.g., “1.0”, the XLSG sends a LPAResponse to the requesting LS with a Result Code of UNSUPPORTED VERSION.
If the pceClient.id or pceClient.pwd of the LPARequest are not for a valid Location Server, the XLSG sends a LPAResponse to the requesting LS with a Result Code of MISCONFIGURATION OF PRIVACY CHECKING ENTITY.
If the ueid does not contain a valid Subscriber msid that has been defined in the profiles, the XLSG sends a LPAResponse to the requesting LS with a Result Code of UNKNOWN SUBSCRIBER.
If the XLSG cannot find a matching applicationID based on the received LPARequest, the XLSG treats as if applicationID is absent and uses the Subscriber Default Privacy for the privacy checking (i.e. “Not Allowed” in the initial XLSG release).
If Application Based Privacy is enabled and the ApplicationID parameter is an Application that has not been authorized for location requests by the target Subscriber, the XLSG sends a LPAResponse to the requesting LS with a privacy action_type of POSITION_NOT_ALLOWED.
If Requestor Based Privacy is enabled and the requestor parameter is a Subscriber that has not been authorized for location requests by the target Subscriber, the XLSG sends a LPAResponse to the requesting LS with a privacy action_type of POSITION_NOT_ALLOWED.
If online charging was invoked for the transaction, the OCS server responds in the CCA message with a result-code other than Succeeded, the XLSG sends a LPAResponse to the requesting LS with the result code UNSPECIFIED ERROR and with addinfo containing either “PREPAID CHARGING ERROR” or OCS SYSTEM ERROR. The mapping of the error codes are shown in Table 22.
If the XLSG does not receive the CCA message from the OCS server within the time defined by the OCS Response Timer, then the XLSG sends a LPAResponse to the requesting LS with result code UNSPECIFIED ERROR and with the addinfo containing “OCS TIMEOUT”.
If Time Based Privacy is enabled or temporal privacy is set when Application Based Privacy and/or Requestor Based Privacy is/are enabled, the current date/time are not allowed by the Subscriber for the application and/or the requestor, then the XLSG sends a LPAResponse to the requesting LS with a privacy action_type of POSITION_NOT_ALLOWED.
Privacy Profile Update Notification
The update notification function is a message output to a location server when the Subscriber profile is updated and an MLP TLRS session is active. The notification message simply contains the msid and no further information. The response from the location server is an acknowledgment which is received by the XLSG with no further processing.
In particular, as shown in
Profile Management
Provisioning is focused on add, change, delete and view (ACD) of the Enterprise, Location Server, LCS Client, Application, Device, Subscriber, Charging, Charging Trigger, Steering and Privacy profiles in the XLSG. The profiles are the repository of the data elements used in the authentication, authorization, and steering functions of the XLSG.
The provisioning interface comprises both a browser/web interface and an API such as SOAP. The purpose of the API is to enable easier integration with other systems and support deployment of the XLSG with different user interfaces as needed. For example a carrier may integrate the XLSG Subscriber self management capability into the carrier's web site (white labeled).
The provisioning interface enforces access control rules through a definition of “user” roles defining which roles have rights to perform each function over the provisioning interface.
OCS and Charging Profiles
The OCS profile defines the parameters for communication with the OCS. Before online charging is invoked, charging trigger profile is checked to see if the request type is set as chargeable event in Charging Trigger profile. Only then online charging processing starts. The Charging profile provides a mapping from the information received via location request or privacy check message to Rating Group. The database is queried upon receipt of an MLP message that is configured in the Charging Trigger profile.
The XLSG ensures that a valid Enterprise Profile is created before an OCS Profile is created. The XLSG allows the provisioning of up to two OCS profiles per Enterprise.
Table 6 shows items provided by the XLSG associated with the OCS Profile. The XLSG ensures that a valid Enterprise Profile is created before a Charging Profile is created.
Table 7 shows items provided by the XLSG associated with the Charging Profile. The XLSG allows the provisioning of one or more Charging profiles per Enterprise. The XLSG ensures that a valid Enterprise Profile is created before a Charging Trigger Profile is created.
Table 8 shows items provided by the XLSG associated with a Charging Trigger Profile. The XLSG allows the provisioning of one or more Charging Trigger profiles per Enterprise.
Table 9 shows items provided by the XLSG associated with a Location Server Profile. The Location Server Profile provides a data repository that contains Location Server characteristics such as location technologies supported. There is at least one Location Server for each Enterprise, and no Location Server is associated with more than one Enterprise. The XLSG ensures that a valid Enterprise Profile is created before a Location Server Profile is created. The XLSG supports one or more Location Servers per Enterprise.
Table 10 shows items provided by the XLSG associated with an LCS Client Profile. The LCS Client Profile provides a data repository that contains characteristics of each LCS Client such as authentication and authorization parameters. An LCS Client can be associated with more than one Enterprise and zero or more Applications. The XLSG ensures that a valid Enterprise Profile is created before an LCS Client Profile is created, and ensures that a valid LCS Client Profile is created before an Application Profile is created. The XLSG allows the definition of an LCS Client without an Application defined. The XLSG associates an LCS Client with one Enterprise, and an Application with one or more LCS Clients.
Table 11 shows items provided by the XLSG associated with an Application Profile. The Application Profile (AP) provides a data repository that contains characteristics of each Application such as authentication and authorization parameters and its association with an LCS Client. The default application may have the same levels as provided for each application: location allowed and temporal settings. The privacy in the “default application” is used in the privacy evaluation when no applicationID is specified in the privacy request.
Table 12 shows items provided by the XLSG associated with a Device Profile. The Device Profile (DP) contains technical information about the model of the handsets or mobile device that an Enterprise supports. Each Device type can be associated with more than one Subscriber. The XLSG ensures that a valid Enterprise Profile is created before a Device Profile is created. The XLSG supports one or more Devices per Enterprise.
Table 13 shows items provided by the XLSG associated with a Location Service Provider Profile. The Location Service Provider Profile provides a data repository that contains the characteristics associated with the Location Service Provider, such as LCS Client information and priority etc. There is at least one Location Service Provider for each Enterprise. The XLSG ensures that a valid Enterprise Profile is created before a Location Service Provider Profile is created. The XLSG supports one or more Location Service Provider per Enterprise.
Table 14 shows items provided by the XLSG associated with a Subscriber Profile. The Subscriber Profile (SP) provides a definition of each Subscriber such as personal information and preferences. It is associated with only one Enterprise, one device, and one Privacy Profile. The XLSG ensures that valid Enterprise and Device Profiles are created before a Subscriber Profile is created. The XLSG ensures that a valid Subscriber Profile is created before a Privacy Profile is created, and ensures that each Subscriber Profile is associated with an Enterprise Profile and a Device Profile.
Table 15 shows items provided by the XLSG associated with a Privacy Profile. The Privacy Profile (PP) provides a data repository that holds authorization and privacy preferences for each target Subscriber. There is one Privacy Profile for each LCS Client and each requesting Subscriber that are enabled to locate a target Subscriber. There may be a default privacy setting associated with each Subscriber called the “default Application”.
The XLSG outputs a descriptive and meaningful response to the entity requesting a provisioning function if the request did not pass authentication or data integrity checks.
A logging function captures data as LDRs from location requests and other XLSG activities. The data is captured in a set of records associated with these activities. The purpose of logging is to allow insights to XLSG processing, enable billing functions, and general reporting functions. The LDRs are output to external systems for further analysis such as the Xypoint Reporting Service (XRS) and an external billing system; a common LDR format serves both of these functions. Log contents include a number of raw data elements such as date/time stamps, requesting LCS Client/Subscriber, Enterprise, result codes, and other details. As such they allow the XRS to create a variety of detailed and summary views. The three functional areas that are logged include: (1) Location requests including the end-to-end messaging with Location Servers; (2) Privacy requests and results; and (3) Profile modifications.
LDRs are separate for each Enterprise, MVNO, non-TCS Location Server, and each LCS Client. The XLSG uses independent FTP credentials (usr/pwd) for each Enterprise, MVNO, Location Server, and each LCS Client. The XLSG outputs LDRs to the Xypoint Reporting Service (XRS) and to an external billing system.
Location Request LDRs
The log entries for location requests include not only the request information but the results of the location request. The result may be successful with a location returned from a Location Server or may end in an error response.
The XLSG processes location requests on a pass through basis by receiving location requests from LCS Clients, forwarding them to Location Servers, and then responding back to the LCS Client. A transaction is defined as an aggregate of more than one of these events (equivalent to the term “session”). An LDR that is logged by the XLSG is defined as one record that incorporates all of the logged information for an entire transaction. For example the LDR for an SLIR request from an LCS Client includes the parameters in the original SLIR, the SLIR sent to the LS, and SLIA received from the LS, and the SLIA sent to the LCS Client.
Table 16 shows exemplary definitions of an LDR created by the XLSG for each location request received on the LCS Client interface. The XLSG creates an LDR for the Standard Location Immediate Request, Emergency Location Immediate Request, Triggered Location Request, and each TLREP message for the Triggered Location Reporting Service. The XLSG creates a separate LDR for each msid in a batch request. The XLSG creates a log entry for location requests that are successful, and for location requests that do not pass validation or authorization functions and therefore result in an error code response to the LCS Client. The XLSG logs the lack of a response from a Location Server, and may log a rejected MLP location request because the maximum configured TPS has been exceeded. The XLSG includes a date/time stamp for each LDR including a date/time stamp for each message sent/received.
Table 17 shows exemplary Triggered Location Request Summary LDR Contents.
Table 18 shows exemplary Triggered Location Request TLREP LDR Contents.
Table 19 shows exemplary Privacy Request LDR Contents. Logging for the Privacy interface involves capture of transactions comprising request and response message details. The XLSG creates a Privacy LDR for each LPARequest/LPAResponse transaction on the Privacy interface. The XLSG includes a date/time stamp for each LDR including a date/time stamp for each Privacy request. The XLSG logs failed authentication events on the Privacy interface, and logs all Privacy Interface error codes as specified in Table 21 as unshaded rows in the table. The LDR for the Privacy Request includes the pceClient.id identifier of the system sending the LPARequest, and the date/time that the message was received.
Logging on the provisioning interface focuses on capture of changes to all the profiles. The XLSG generates a log entry for each add, change, and delete on the provisioning interface. The provisioning interface log includes the authentication identifier and role associated with the request. The XLSG also logs failed authentication events on the provisioning interface. The provisioning interface log includes the date/time that the request was received; the type of request: Add, Change, or Delete; the data in the request; and the profile data that existed before the request to Add, Change, or Delete was applied to the profile.
The XLSG processes location requests on a pass through basis by receiving location requests from LCS Clients, forwarding them to Location Servers, and then responding back to the LCS Client. A transaction is defined as an aggregate of more than one of these events; the term transaction being equated with the term “session”. The XLSG captures metrics for both the LCS Client and Privacy interfaces, and records metrics for both requests and responses. Request metrics include a breakdown by message type. Response metrics include a breakdown of success and unsuccessful requests.
The logs are used for robust and comprehensive reporting and for billing purposes. But the logs are detailed records that are filtered and aggregated for a user to obtain meaningful data—functions that the XRS performs. And logs are also intended for historical and flexible reporting. The logs may be output to users or other systems through the administrative or SNMP interfaces so that users can gain real time insights into XLG processing and events.
The XLSG provides peg counts for messages received on the LCS Client interface. The XLSG provides a peg count for each received SLIR, EME_LIR, TLRR, and TLRSR. The XLSG provides a peg count for messages received on the LCS Client interface which are either in error or not recognized as a SLIR, EME_LIR, or TLRR. The XLSG also provides a peg count for Prepaid Status messages received on the OCS Interface; for messages received on the location server interface; and for each received SLIA, EME_LIA, TLRA, TLREP, TLRSA. The XLSG also provides a peg count for each error response from location servers as defined in Table 20.
The XLSG provides a metric that records the average number of concurrent immediate location request active sessions (SLIS, and ELIS) at any time. The XLSG provides a metric that records the average number of concurrent triggered location request active sessions at any time; and records the maximum number of concurrent sessions at any time. The XLSG provides a peg count to capture the average elapsed time (duration) required for completion of transactions. The XLSG records transaction duration metrics by Subscriber, Application, LCS Client, Location Server and Location Service Type. For each Location Request that results in an error code the XLSG records the event as a metric including the specific error code as specified in Table 21 as unshaded rows. The XLSG supports the ability to write peg counts to a file. The XLSG is capable of writing the peg count file in at specific time intervals. The specific time intervals are configurable in minutes. The XLSG includes a date and time, representing the time the peg counts were collected, in the file for each peg counts. The XLSG supports Greenwich Mean Time and Local machine time for peg count files.
The XLSG includes the configured time interval the peg counts in the file that were collected. For example, if the system is configured to collect peg counts on a 5 minutes interval, a 5 would be in the peg count lines in the file.
The XLSG names the peg count file in the following format: ‘hostname’.pegcnt.YYYYMMDDhhmmss.log
Privacy Interface
The XLSG provides a peg count for each received LPARequest. The XLSG records the processing of each LPARequest by the Privacy interface that was “successful” as a metric. The XLSG records the transmission of each LPAResponse as a metric. The XLSG provides a peg count for each LPARequest. that resulted in an error. The XLSG records the processing of each LPARequest by the Privacy interface that was “unsuccessful” as a metric. The XLSG provides a peg count for each transmitted LPUNotification.
OCS Interface
The XLSG may provide a peg count for each Capabilities-Exchange-Request (CER), Capabilities-Exchange-Answer (CEA), Device-Watchdog-Request (DWR), Device-Watchdog-Answer (DWA), Disconnect-Peer-Request (DPR), Disconnect-Peer-Answer (DPA), Diameter Credit Control Application (DCCA) Messages, Credit-Control-Request (CCR), Credit-Control-Answer message (CCA), and each of the above OCS interface messages that were in error.
Provisioning Interface
The XLSG may also provide peg counts for each add, change, and delete on the Enterprise Profile, OCS Profile, Charging Profile, Location Server Profile, LCS Client Profile, Application Profile, Device Profile, Subscriber Profile, and Privacy Profile.
External interfaces include an LCS Client Interface: Used for application and subscribers to request location services. A Location Server Interface: After validation functions the XLSG forward location requests to selected location servers and processes responses from LS. A Privacy Interface is used for external Location Servers to access the authentication and authorization capabilities of the XLSG. A Provisioning Interface is used to configure the location services processing. An Online Charging Interface: The Diameter interface is used for real time billing functions for prepaid services such as checking availability of funds and asserting a service charge. A Reporting Service: The XLSG outputs logs and metric data to the XRS for reporting. An SNMP Interface. XLSG network and system management functions. An Admin Interface. CLI level interface for XLSG system administration.
LCS Client Interface
The XLSG may receive and transmit MLP messages on the LCS Client interface. The XLSG transports MLP messages over HTTP 1.1. The XLSG uses the HTTP port defined in the Enterprise Profile for unencrypted MLP traffic (defaulted to 9210). The XLSG uses the HTTPS port defined in the Enterprise Profile for encrypted SSL/TLS (defaulted to 9211). The XLSG supports the connection semantics of a single request per HTTP connection. This model may include multiple msids and may be referred to as a batch request. The connection per request model may be the default connection policy.
The XLSG supports the SLIR message using the HTTP POST received from an LCS Client. The XLSG transmits the SLIA message using the HTTP Response to an LCS Client. The XLSG supports the EME_LIR (HTTP POST) message received from an LCS Client. The XLSG transmits the EME_LIA Answer (HTTP Response) message to an LCS Client. The XLSG supports the TLRR and TLRSR (HTTP POST) messages received from an LCS Client. The XLSG transmits the TLRA, TLREP, and TLRSA (HTTP Response) messages to an LCS Client. The request URL is defined in the Enterprise Profile. For example: http://location-server.carrier.com:9211/XLSGLocationQueryService. The XLSG responds with HTTP.METHOD_NOT_ALLOWED error response upon receipt of any unsupported message from an LCS Client.
If the XLSG receives a message defined as an MLP Extension message then it discards the message, i.e., does not process the contents of the message.
If an MLP request (SLIR_EME_LIR, or TLRR) has an extension element, the XLSG passes the extension element to the corresponding location server. If a batch MLP request has an extension element, the XLSG passes the extension element in each individual SLIR for each msid in the batch request to the corresponding location server.
Location Server Interface
The XLSG supports the following location servers and location server types over the location server interface:
The XLSG transports MLP messages over HTTP 1.1. The XLSG sends all messages to the Location Server over the HTTP port defined in the LS Profile for encrypted SSL/TLS. The XLSG transmits the SLIR, EME_LIR, TLRR and TLRSR messages using the HTTP POST to a Location Server. The XLSG supports the SLIA, EME_LIA, TLRA, TLREP, and TLRA messages using the HTTP Response from a Location Server.
Privacy Interface
The Privacy interface is used for external Location Servers to access the authentication and authorization capabilities of the XLSG. The external Location Server is within a secure network. The purpose is for the Location Server to query the XLSG with a request to locate a Subscriber and respond with the results of authorization checks. The protocol is simply that the XLSG receives a request message from the external system and then sends a response. The request message includes a number of parameters that the XLSG compares to the Profiles. The response message provides the result of the request with simple approval status.
The Privacy interface supports HTTP/1.1 as the transport protocol.
Location Agent Interface
The Location Agent interface is between the Location Agent Manager (LAMM) function in the XLSG and a function executing on a mobile device called the Location Agent (LA). The LAMM forwards immediate and triggered requests to the LA which returns with locations. The LA obtains locations from onboard GPS or through interactions with location services.
The XLSG provides an interface to Location Agents.
Provisioning Interface
The provisioning interface is used to configure the location services processing for the XLSG and reports. The functions on the interface include add, change, delete, and view (ACD) the various parameters.
The XLSG provides four types of provisioning/user interfaces:
Web interface: A typical Internet web based browser UI.
Mobile web interface: Subscriber self-provisioning from the mobile device.
API: B2B interface (e.g. web services, XML over SOAP) for real time synchronization with carriers other OSS/BSS. This interface may allow integration of the provisioning interface with other carrier OSS systems such as an HLR, billing, or the carrier's CRM system. To clarify terminology, this XLSG specification use the term “API” which is equivalent to the term “CLI”.
Batch interface: for bulk loading of provisioning data, especially devices and subscribers.
The XLSG provides the option for encryption of all messages and data transferred on the provisioning interface. The XLSG provides an HTTP and HTTPS web interface for browsers over HTTP 1.1. The XLSG uses the HTTP port defined in the Enterprise Profile for unencrypted HTTP web provisioning functions. The XLSG uses the HTTPS port defined in the Enterprise Profile for encrypted SSL/TLS web provisioning functions.
The XLSG supports the following browsers on the web interface: Apple Safari 3.x, Google Chrome 1.x, Microsoft Internet Explorer 6 7, 8.x, Mozilla Firefox 2, 3.x, and Opera 9.x.
The XLSG provides an HTTP mobile web interface for use on mobile devices. The XLSG uses the HTTP port defined in the Enterprise Profile for unencrypted HTTP mobile web provisioning functions. The XLSG also uses the HTTPS port defined in the Enterprise Profile for encrypted SSL/TLS mobile web provisioning functions. The XLSG supports the following browsers on the mobile web interface: Apple Safari (iPhone, iPod Touch), Opera Mobile, RIM Blackberry Bold.
The XLSG provides a real time API for integration with other systems. This interface may be structured as XML over SOAP or similar middleware technology. The XLSG supports provisioning of the profiles over the API. The XLSG provides a batch provisioning interface.
This interface may be structured as a set of well defined file formats and an FTP server that allows other systems to load bulk provisioning data. This interface may be a layer that utilizes the API for detailed provisioning of individual data sets. The XLSG supports provisioning of the profiles over the batch provisioning interface.
OCS Interface
The OCS Interface is used for real time billing for prepaid Subscribers. The interface comprises of the Diameter Base Protocol which implements the connectivity between the XLSG and OCS. The base protocol then is used to exchange credit control messages according to the 3GPP Ro interface. The Diameter charging function and interface definitions are based on 3GPP and other relevant specifications.
The XLSG supports Credit Control Request (CCR) and Credit Control Answer (CCA) messages as defined in 3GPP 32.299.
Xypoint Reporting Service/Logging Interface
The XRS is the reporting engine for reports about XLSG functions and operations. The XLSG sends a set of data to the XRS which then uses that data to provide static and dynamic reports to users. Data output to the XRS include logs, metrics, and LDRs.
The XLSG provides an interface to the Xypoint Reporting Service system. The XLSG outputs the XRS data to any other system connecting to this interface, i.e., it does not require any specific version of the XRS to be connected. The customer may connect some other reporting engine to this interface, assuming that this other system can process the same data formats.
The XLSG provides an FTP server to allow other systems to retrieve LDRs.
SNMP V2 Monitoring Interface
The XLSG uses SNMPv2 for network management (RFC 2578-RFC 2579). The XLSG implements the TCS-BASE-MIB.mib[27] for reporting faults (traps) to an Element or Network Management System.
The XLSG implement the TCS-EMS_APP-METRICS.mib[28] for reporting metrics (query) to an Element or Network Management System.
The XLSG resets metrics if an Element or Network Management System issues a query with the attribute tcsmPegCountResetControl contains a value of 1.
The XLSG generates an alarm if the disk utilization TBD % for the disk containing the logs exceeds a configurable %.
The XLSG asserts a fault over the SNMP interface if the MLP prio parameter is set to High and Normal is the maximum priority that is provisioned for the LCS Client. The XLSG asserts a fault over the SNMP interface if the number of queued location requests on the MLP interface exceeds a configurable parameter. The XLSG asserts a critical alarm over the SNMP interface if the number of queued location requests on the MLP interface exceeds a configurable parameter.
Admin Interface
The Admin Interface is used by a System Administrator to control the operation of the XLSG. The system administrator ensures that the XLSG is properly configured, and remains operational. It is a system administrator for other back office systems such as the Location Server. It installs the XLSG, implements XLSG upgrades, and configures the hardware, operating system, and XLSG subsystems such as database. It obtains periodic reports showing resource utilization, fault logs, monitors alerts, and solves problems. It is an employee/agent of the Enterprise where the XLSG is installed, e.g. in an Information Technology (IT) department.
The XLSG provides a mechanism for the Platform Administrator to create additional users for provisioning functions where each user is assigned to a role. The XLSG provides the Administrator User Group access to system root and system administration, operations, and maintenance functions. The XLSG Admin interface implements a command to clear all metric counters. The XLSG Administrator Interface provides the capability to configure the product license options.
The XLSG provides a dashboard view for the Platform Administrator to view summary information about the system. The XLSG provides a capability for the Platform Administrator to start and stop the system. The XLSG provides the capability for the Platform Administrator to manage log creation and log access controls for other systems to access the logs, and the capability for the Platform Administrator to view system events.
Table 20 contains exemplary result codes returned to the LCS Client. The shaded rows are result codes that are possible but not supported in the disclosed embodiments of the XLSG.
Table 21 contains exemplary result codes returned on the Privacy Interface. The shaded rows are result codes that are possible but not supported in the disclosed embodiments of the XLSG.
Table 22 defines exemplary error codes received in the CCA message returned on the OCS Interface and the corresponding error code sent to an LCS Client. All Online charging specific errors are mapped to UNSPECIFIED ERROR for both PCP and MLP interface, and then addinfo field has additional info regarding to error type.
Provisioning of the XLSG is preferably accomplished via a browser using HTTPS that utilizes the Provisioning Interface to maintain the profiles. For instance, the XLSG preferably provides the ability to provision an Enterprise Profile; a Location Server Profile; an LCS Client Profile; a Device Profile; a Subscriber Profile; and/or a Privacy Profile, using a browser. The XLSG utilizes HTTPS as the preferred protocol for communicating with browsers.
The XLSG provides the ability to “bulk load” subscriber profiles for an Enterprise. The system supports the ability to perform manual backup and recovery options in less than, e.g., 2 hours.
Configuration Management
The following are the requirements for configuration management of the XLSG. The MLP LCS Client Interface port # for HTTP is preferably configurable, as is the MLP LCS Client Interface port # for HTTPS. The Privacy Interface port # for HTTPS is configurable, as is the LS Server Interface Port # for HTTPS. The Provisioning Interface port # for HTTPS is configurable, as is the directory for the Location Request logs, and the directory for the Privacy Request logs.
A threshold for queued location requests on the MLP interface that generate a fault is preferably configurable, as is a threshold for queued location requests on the MLP interface that generate a critical alarm.
Function Enabling
The XLSG supports the ability to enable or disable certain classes of functions and XLSG capabilities. These functions may include call flows depending on the network type, location service type, XLSG functional module, and others. For example if the XLSG is not licensed to support CDMA networks, then the provisioning functions for CDMA network are disabled, and as a result the customer would not be permitted to define a location server for CDMA networks.
The XLSG implements a configuration item to enable/disable Triggered Location Reporting Service. The XLSG implements a configuration item to enable/disable the Application Interface Module (AIM). In this scenario the XLSG may be deployed to provide only the Privacy Profile Register (PPR) module. The XLSG implements a configuration item to enable/disable the Location Agent Management Module (LAMM).
When the configuration disallows certain types of encryption, the allowed encryption methods may include: 1. Mass market encryption commodities and software with key lengths not exceeding 64-bits; and 2. Encryption items (including key management products and company proprietary implementations) with key lengths not exceeding 56-bits for symmetric algorithms, up to 512-bits for asymmetric key exchange algorithms, and 112 bits for elliptic curve algorithms.
The performance and Capacity Management capabilities of the disclosed embodiments of an XLSG are as follows. Ideally the XLSG supports the definition of no fewer than 128 Enterprises, a minimum of 20 Location Servers per Enterprise. There is ideally no maximum number of LCS Client and Applications except through limitations of XLSG platform system resources, nor is there a maximum number of Devices except through limitations of XLSG platform system resources. There is no maximum number of Subscriber and Privacy Profiles Devices except through limitations of XLSG platform system resources.
The XLSG supports a minimum of 75 Transactions Per Second (TPS is equivalent to location request sessions) (TPS) on a Model 5000 SA platform of 2 servers. The XLSG processes an additional 75 TPS for each additional Model 5000 SA server added to the system beyond the initial 2 servers for a single instance of the XLSG. Transactions per Second (TPS) are defined as the sum of Location Requests and Privacy Evaluation Requests.
When the XLSG receives a location request from an LCS Client the XLSG outputs a corresponding location request to the location server, or responds to the LCS Client, within 250 milliseconds for 99.9% of location requests. When the XLSG receives a privacy request, the XLSG outputs a response within 250 milliseconds for 99.9% of Privacy requests.
Fault Management
The XLSG reports SNMP traps for fault conditions, and generates alarms and events in the SNMP 2.0 version format. The XLSG is capable of automatically clearing alarms when the condition is alleviated. The XLSG sends clear alarm message when the fault condition is cleared. The XLSG supports alarm filtering based on severity, the severity level used for alarm filtering being configurable. Exemplary alarm severity codes are as follows:
Severity code 5: Critical. Service delivery is impaired. Must be investigated immediately.
Severity code 4: Major. Serious problems are likely to occur, or may occur if something else goes wrong. Must be investigated very soon.
Severity code 3: Minor. Should be investigated, but is not urgent.
Severity code 2: Warning. Something abnormal happened. It may or may not require action.
Severity code 1: Indeterminate. Something happened whose significance or impact is unknown.
Severity code 0: Clear. Informational; does not indicate a problem.
The XLSG provides alarms, events, and predefined severity levels for reporting on the SNMP interface. The XLSG provides an alarm for a XLSG database error (Severity 5), an alarm when given location request errors are sent on the LCS Client interface within a window of a given number of minutes (Severity 2). The XLSG provides an alarm when 3 consecutive timeouts occur for a location server (Severity 4). The XLSG provides an alarm when the CPU usage has reached the high water mark (Severity 4). The XLSG provides an alarm when disk storage utilization has reached the high water mark (Severity 4).
The XLSG implements a method for external Billing/Accounting systems to extract LDRs for the purpose of billing for location requests.
The XLSG allows data backup and data recovery to perform online backup and recovery of the system.
Table 23 defines various definitions, abbreviations and acronyms.
With respect to steering of a received location request, each LCS Client may be provisioned to be paired to a specific location determination server. Based on an incoming subscriber ID, a location request may be steered to a specific server.
Moreover, the quality of position may be used to determine which location determination device to steer a received location request to. For instance, it may be advantageous to steer all precise requests to XSS and all coarse positions to XLP.
Alternatively, or additionally, steering could be based at least in part on the state of the handset. For instance, MLP Request Type—depending if the request is a SLIR or TLRR, different servers could be picked.
Local area location determining methods may be steered to, within the principles of the present invention. For instance, a location may be reported based on a Wi-Fi or WiMAX network with which the user is present in.
The LDAP interface may be used to acquire the subscriber profile.
While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art be able to make various modifications to the described embodiments of the invention without departing from the true spirit and scope of the invention.
This application claims priority from U.S. Provisional No. 61/457,029, entitled “Location Services Gateway Server” to Titus et al., filed Dec. 13, 2010; and from U.S. Provisional No. 61/457,138 “Location Services Agent” to Titus et al., filed Jan. 12, 2011, the entirety of both of which are expressly incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
1103073 | O'Connel | Jan 1914 | A |
3400222 | Nightingale | Sep 1968 | A |
3920908 | Kraus | Nov 1975 | A |
4310726 | Asmuth | Jan 1982 | A |
4399330 | Kuenzel | Aug 1983 | A |
4494119 | Wimbush | Jan 1985 | A |
4651156 | Martinez | Mar 1987 | A |
4680785 | Akiyana et al. | Jul 1987 | A |
4706275 | Kamil | Nov 1987 | A |
4725719 | Oncken et al. | Feb 1988 | A |
4756020 | Fodale | Jul 1988 | A |
4776000 | Parienti | Oct 1988 | A |
4776003 | Harris | Oct 1988 | A |
4776033 | Scheinert | Oct 1988 | A |
4831647 | D'Avello et al. | May 1989 | A |
4845740 | Tokuyama et al. | Jul 1989 | A |
4852149 | Zwick | Jul 1989 | A |
4852155 | Barraud | Jul 1989 | A |
4860341 | D'Avello et al. | Aug 1989 | A |
4891638 | Davis | Jan 1990 | A |
4891650 | Sheffer | Jan 1990 | A |
4901340 | Parker et al. | Feb 1990 | A |
4935956 | Hellwarth et al. | Jun 1990 | A |
4951308 | Bishop et al. | Aug 1990 | A |
4952928 | Carroll | Aug 1990 | A |
5003585 | Richer | Mar 1991 | A |
5014206 | Scribner | May 1991 | A |
5043736 | Darnell et al. | Aug 1991 | A |
5046088 | Margulies | Sep 1991 | A |
5055851 | Scheffer et al. | Oct 1991 | A |
5063588 | Patsiokas et al. | Nov 1991 | A |
5068656 | Sutherland | Nov 1991 | A |
5068891 | Marshall | Nov 1991 | A |
5070329 | Jasinaki | Dec 1991 | A |
5081667 | Drori | Jan 1992 | A |
5103449 | Jolissant | Apr 1992 | A |
5119104 | Heller | Jun 1992 | A |
5127040 | D'Avello et al. | Jun 1992 | A |
5128938 | Borras | Jul 1992 | A |
5138648 | Palomeque et al. | Aug 1992 | A |
5138650 | Stahl et al. | Aug 1992 | A |
5144283 | Arens et al. | Sep 1992 | A |
5144649 | Zicker et al. | Sep 1992 | A |
5159625 | Zicker | Oct 1992 | A |
5161180 | Chavous | Nov 1992 | A |
5177478 | Wagai et al. | Jan 1993 | A |
5187710 | Chou et al. | Feb 1993 | A |
5193215 | Olmer | Mar 1993 | A |
5208756 | Song | May 1993 | A |
5214789 | George | May 1993 | A |
5216703 | Roy | Jun 1993 | A |
5218367 | Scheffer et al. | Jun 1993 | A |
5220593 | Zicker | Jun 1993 | A |
5223844 | Mansell | Jun 1993 | A |
5233642 | Renton | Aug 1993 | A |
5235630 | Moodey | Aug 1993 | A |
5239570 | Koster | Aug 1993 | A |
5265155 | Castro | Nov 1993 | A |
5266944 | Carroll et al. | Nov 1993 | A |
5274802 | Altine | Dec 1993 | A |
5276444 | McNair | Jan 1994 | A |
5289527 | Tiedemann | Feb 1994 | A |
5291543 | Freese et al. | Mar 1994 | A |
5293642 | Lo | Mar 1994 | A |
5297189 | Chabernaud | Mar 1994 | A |
5299132 | Wortham | Mar 1994 | A |
5301223 | Amadon et al. | Apr 1994 | A |
5301234 | Mazziotto et al. | Apr 1994 | A |
5309501 | Kozik et al. | May 1994 | A |
5311572 | Frieder et al. | May 1994 | A |
5321735 | Breeden | Jun 1994 | A |
5325302 | Izidon | Jun 1994 | A |
5325418 | McGregor et al. | Jun 1994 | A |
5327144 | Stilp et al. | Jul 1994 | A |
5329578 | Brennan et al. | Jul 1994 | A |
5334974 | Simms | Aug 1994 | A |
5339352 | Armstrong et al. | Aug 1994 | A |
5341414 | Popke | Aug 1994 | A |
5343493 | Kaimullah | Aug 1994 | A |
5347568 | Moody | Sep 1994 | A |
5351235 | Lahtinen | Sep 1994 | A |
5353335 | D'Urso | Oct 1994 | A |
5359182 | Schilling | Oct 1994 | A |
5359642 | Castro | Oct 1994 | A |
5359643 | Gammino | Oct 1994 | A |
5361212 | Class | Nov 1994 | A |
5363425 | Mufti | Nov 1994 | A |
5369699 | Page et al. | Nov 1994 | A |
5374936 | Feng | Dec 1994 | A |
5379451 | Nakagoshi | Jan 1995 | A |
5381338 | Wysocki | Jan 1995 | A |
5384825 | Dillard et al. | Jan 1995 | A |
5387993 | Heller | Feb 1995 | A |
5388147 | Grimes | Feb 1995 | A |
5390339 | Bruckert | Feb 1995 | A |
5394158 | Chia | Feb 1995 | A |
5396227 | Carroll | Mar 1995 | A |
5396545 | Nair et al. | Mar 1995 | A |
5396558 | Ishiquoro et al. | Mar 1995 | A |
5398190 | Wortham | Mar 1995 | A |
5404580 | Simpson et al. | Apr 1995 | A |
5406614 | Hara | Apr 1995 | A |
5408513 | Busch et al. | Apr 1995 | A |
5408519 | Pierce et al. | Apr 1995 | A |
5408682 | Ranner et al. | Apr 1995 | A |
5412726 | Nevoux et al. | May 1995 | A |
5418537 | Bird | May 1995 | A |
5423076 | Westergreen | Jun 1995 | A |
5430759 | Yokev et al. | Jul 1995 | A |
5432841 | Rimer | Jul 1995 | A |
5434789 | Fraker | Jul 1995 | A |
5438615 | Moen | Aug 1995 | A |
5440621 | Castro | Aug 1995 | A |
5454024 | Lebowitz | Sep 1995 | A |
5457737 | Wen | Oct 1995 | A |
5461390 | Hoshen | Oct 1995 | A |
5465289 | Kennedy | Nov 1995 | A |
5469497 | Pierce et al. | Nov 1995 | A |
5470233 | Fuchterman | Nov 1995 | A |
5479408 | Will | Dec 1995 | A |
5479482 | Grimes | Dec 1995 | A |
5485161 | Vaughn | Jan 1996 | A |
5485163 | Singer | Jan 1996 | A |
5485505 | Norman et al. | Jan 1996 | A |
5488563 | Chazelle | Jan 1996 | A |
5497149 | Fast | Mar 1996 | A |
5502761 | Duncan et al. | Mar 1996 | A |
5506893 | Buscher et al. | Apr 1996 | A |
5508931 | Snider | Apr 1996 | A |
5509056 | Ericsson et al. | Apr 1996 | A |
5513243 | Kage | Apr 1996 | A |
5515287 | Hakoyama | May 1996 | A |
5517555 | Amadon et al. | May 1996 | A |
5517559 | Hayashi et al. | May 1996 | A |
5519403 | Bickley | May 1996 | A |
5532690 | Hertel | Jul 1996 | A |
5535434 | Siddoway | Jul 1996 | A |
5539398 | Hall | Jul 1996 | A |
5543776 | L'Esperance | Aug 1996 | A |
5550897 | Seiderman | Aug 1996 | A |
5552772 | Janky | Sep 1996 | A |
5555286 | Tendler | Sep 1996 | A |
5568119 | Schipper | Oct 1996 | A |
5570416 | Kroll | Oct 1996 | A |
5574648 | Pilley | Nov 1996 | A |
5577100 | McGregor et al. | Nov 1996 | A |
5579372 | Åstrom | Nov 1996 | A |
5579376 | Kennedy, III et al. | Nov 1996 | A |
5583918 | Nakagawa | Dec 1996 | A |
5586175 | Hogan et al. | Dec 1996 | A |
5588009 | Will | Dec 1996 | A |
5592535 | Klotz | Jan 1997 | A |
5604486 | Lauro | Feb 1997 | A |
5606313 | Allen | Feb 1997 | A |
5606850 | Nakamura | Mar 1997 | A |
5610815 | Gudat | Mar 1997 | A |
5610972 | Emery et al. | Mar 1997 | A |
5614890 | Fox | Mar 1997 | A |
5615116 | Gudat | Mar 1997 | A |
5621793 | Bednarek et al. | Apr 1997 | A |
5625669 | McGregor et al. | Apr 1997 | A |
5628051 | Salin | May 1997 | A |
5633912 | Tsoi | May 1997 | A |
5640447 | Fonseca | Jun 1997 | A |
5673306 | Amamdon | Sep 1997 | A |
5682600 | Salin | Oct 1997 | A |
5692037 | Friend | Nov 1997 | A |
5717688 | Belanger et al. | Feb 1998 | A |
5719918 | Serbetciouglu | Feb 1998 | A |
5722067 | Fougnies et al. | Feb 1998 | A |
5732346 | Lazarides | Mar 1998 | A |
5740534 | Ayerst | Apr 1998 | A |
5761618 | Lynch | Jun 1998 | A |
5767795 | Schaphorst | Jun 1998 | A |
5768509 | Gunluk | Jun 1998 | A |
5774533 | Patel | Jun 1998 | A |
5778313 | Fougnies | Jul 1998 | A |
5787357 | Salin | Jul 1998 | A |
5790636 | Marshall | Aug 1998 | A |
5793859 | Mathews | Aug 1998 | A |
5794142 | Vantilla et al. | Aug 1998 | A |
5797091 | Clise | Aug 1998 | A |
5797094 | Houde et al. | Aug 1998 | A |
5797096 | Lupien | Aug 1998 | A |
5802492 | Delorme | Sep 1998 | A |
5806000 | Vo | Sep 1998 | A |
5815816 | Isumi | Sep 1998 | A |
5822700 | Hultt | Oct 1998 | A |
5826185 | Wise et al. | Oct 1998 | A |
5828740 | Khuc | Oct 1998 | A |
5850599 | Seiderman | Dec 1998 | A |
5854975 | Fougnies et al. | Dec 1998 | A |
5856974 | Gervais | Jan 1999 | A |
5889473 | Wicks | Mar 1999 | A |
5905736 | Ronen et al. | May 1999 | A |
5920821 | Seaholtz et al. | Jul 1999 | A |
5930701 | Skog | Jul 1999 | A |
5940755 | Scott | Aug 1999 | A |
5943399 | Bannister | Aug 1999 | A |
5946629 | Sawyer | Aug 1999 | A |
5946630 | Willars | Aug 1999 | A |
5950130 | Coursey | Sep 1999 | A |
5953398 | Hill | Sep 1999 | A |
5974054 | Couts | Oct 1999 | A |
5974133 | Fleischer | Oct 1999 | A |
5978685 | Laiho | Nov 1999 | A |
5983091 | Rodriguez | Nov 1999 | A |
5987323 | Huotari | Nov 1999 | A |
5999811 | Molne | Dec 1999 | A |
6029062 | Hanson | Feb 2000 | A |
6035025 | Hanson | Mar 2000 | A |
6038444 | Schipper | Mar 2000 | A |
6049710 | Nilsson | Apr 2000 | A |
6058300 | Hanson | May 2000 | A |
6064875 | Morgan | May 2000 | A |
6070067 | Nguyen | May 2000 | A |
6073004 | Balachandran | Jun 2000 | A |
6073015 | Berggren et al. | Jun 2000 | A |
6075982 | Donovan et al. | Jun 2000 | A |
6081508 | West | Jun 2000 | A |
6101378 | Barabash | Aug 2000 | A |
6115458 | Taskett | Sep 2000 | A |
6119014 | Alperovich et al. | Sep 2000 | A |
6122503 | Daly | Sep 2000 | A |
6122520 | Want | Sep 2000 | A |
6138158 | Boyle et al. | Oct 2000 | A |
6148197 | Bridges | Nov 2000 | A |
6148198 | Anderson | Nov 2000 | A |
6149353 | Nilsson | Nov 2000 | A |
6157823 | Fougnies et al. | Dec 2000 | A |
6169891 | Gorham et al. | Jan 2001 | B1 |
6173181 | Losh | Jan 2001 | B1 |
6181935 | Gossman | Jan 2001 | B1 |
6188752 | Lesley | Feb 2001 | B1 |
6195543 | Grandberg | Feb 2001 | B1 |
6198431 | Gibson | Mar 2001 | B1 |
6199045 | Giniger | Mar 2001 | B1 |
6205330 | Windbladh | Mar 2001 | B1 |
6208854 | Roberts | Mar 2001 | B1 |
6208870 | Lorello et al. | Mar 2001 | B1 |
6223046 | Hamill-Keays et al. | Apr 2001 | B1 |
6226529 | Bruno | May 2001 | B1 |
6249680 | Wax | Jun 2001 | B1 |
6249744 | Morita | Jun 2001 | B1 |
6266614 | Alumbaugh | Jul 2001 | B1 |
6289373 | Dezonno | Sep 2001 | B1 |
6304635 | Iwami | Oct 2001 | B1 |
6314108 | Ramasubramani | Nov 2001 | B1 |
6317594 | Gossman | Nov 2001 | B1 |
6321257 | Kotola et al. | Nov 2001 | B1 |
6327479 | Mikkola | Dec 2001 | B1 |
6335968 | Malik | Jan 2002 | B1 |
6356630 | Cai et al. | Mar 2002 | B1 |
6360102 | Havinis | Mar 2002 | B1 |
6370373 | Gerth | Apr 2002 | B1 |
6373930 | McConnel et al. | Apr 2002 | B1 |
6381316 | Joyce et al. | Apr 2002 | B2 |
6381535 | Durocher | Apr 2002 | B1 |
6393014 | Daly et al. | May 2002 | B1 |
6393269 | Hartmaier et al. | May 2002 | B1 |
6396913 | Perkins, III | May 2002 | B1 |
6397054 | Hoirup et al. | May 2002 | B1 |
6397055 | McHenry et al. | May 2002 | B1 |
6421707 | Miller | Jul 2002 | B1 |
6442257 | Gundlach | Aug 2002 | B1 |
6456852 | Bar et al. | Sep 2002 | B2 |
6473622 | Meuronen | Oct 2002 | B1 |
6483907 | Wong et al. | Nov 2002 | B1 |
6487180 | Borgstahl | Nov 2002 | B1 |
6487602 | Thakker | Nov 2002 | B1 |
6490450 | Batni et al. | Dec 2002 | B1 |
6496690 | Cobo | Dec 2002 | B1 |
6505046 | Baker | Jan 2003 | B1 |
6507589 | Ramasubramani | Jan 2003 | B1 |
6512930 | Sandegren | Jan 2003 | B2 |
6526335 | Treyz et al. | Feb 2003 | B1 |
6526351 | Whitham | Feb 2003 | B2 |
6529593 | Nelson | Mar 2003 | B2 |
6529732 | Vainiomaki et al. | Mar 2003 | B1 |
6539232 | Hendrey | Mar 2003 | B2 |
6587688 | Chambers et al. | Jul 2003 | B1 |
6609004 | Morse | Aug 2003 | B1 |
6621810 | Leung | Sep 2003 | B1 |
6654786 | Fox et al. | Nov 2003 | B1 |
6667688 | Menard et al. | Dec 2003 | B1 |
6677894 | Sheynblat et al. | Jan 2004 | B2 |
6694351 | Shaffer | Feb 2004 | B1 |
6728353 | Espejo | Apr 2004 | B1 |
6728635 | Hamada | Apr 2004 | B2 |
6731943 | McCormick | May 2004 | B1 |
6782258 | Ung | Aug 2004 | B2 |
6868074 | Hanson | Mar 2005 | B1 |
6879835 | Greene | Apr 2005 | B2 |
6882850 | McConnell | Apr 2005 | B2 |
6898633 | Lyndersay | May 2005 | B1 |
6915138 | Kraft | Jul 2005 | B2 |
6952575 | Countryman | Oct 2005 | B1 |
6970869 | Slaughter et al. | Nov 2005 | B1 |
6985742 | Giniger | Jan 2006 | B1 |
6993325 | Waesterlid | Jan 2006 | B1 |
7020480 | Coskun | Mar 2006 | B2 |
7072665 | Blumberg | Jul 2006 | B1 |
7106717 | Rousseau et al. | Sep 2006 | B2 |
7110773 | Wallace | Sep 2006 | B1 |
7120418 | Herajarvi | Oct 2006 | B2 |
7127264 | Hronek | Oct 2006 | B2 |
7130383 | Naidoo et al. | Oct 2006 | B2 |
7145462 | Dewing | Dec 2006 | B2 |
7180415 | Bankert | Feb 2007 | B2 |
7224696 | Bouleros | May 2007 | B2 |
7240108 | Smith | Jul 2007 | B2 |
7245216 | Burkley | Jul 2007 | B2 |
7269428 | Wallenius | Sep 2007 | B1 |
7317705 | Hanson | Jan 2008 | B2 |
7328031 | Kraft | Feb 2008 | B2 |
7356328 | Espejo | Apr 2008 | B1 |
7386588 | Mousseau | Jun 2008 | B2 |
7392038 | Ratschunas | Jun 2008 | B1 |
7409428 | Brabec | Aug 2008 | B1 |
7453990 | Welenson | Nov 2008 | B2 |
7480915 | Costa Requena | Jan 2009 | B2 |
7486641 | Reddy | Feb 2009 | B2 |
7522182 | Bang | Apr 2009 | B2 |
7626951 | Croy | Dec 2009 | B2 |
7792989 | Toebes | Sep 2010 | B2 |
7826818 | Gollnick | Nov 2010 | B2 |
7869815 | Ishii | Jan 2011 | B2 |
7890122 | Walsh | Feb 2011 | B2 |
8005683 | Tessesl | Aug 2011 | B2 |
8027658 | Suryanarayana | Sep 2011 | B2 |
8060389 | Johnson | Nov 2011 | B2 |
8308570 | Fiedler | Nov 2012 | B2 |
20010006889 | Kraft | Jul 2001 | A1 |
20010031641 | Ung et al. | Oct 2001 | A1 |
20010034224 | McDowell et al. | Oct 2001 | A1 |
20010040949 | Blonder | Nov 2001 | A1 |
20020068546 | Plush | Jun 2002 | A1 |
20020085538 | Leung | Jul 2002 | A1 |
20020093435 | Baron | Jul 2002 | A1 |
20020098851 | Walczak | Jul 2002 | A1 |
20020102996 | Jenkins | Aug 2002 | A1 |
20020103762 | Lopez | Aug 2002 | A1 |
20020133568 | Smith et al. | Sep 2002 | A1 |
20020168986 | Lau et al. | Nov 2002 | A1 |
20020173317 | Nykanen | Nov 2002 | A1 |
20020183072 | Steinbach | Dec 2002 | A1 |
20020188680 | McCormick | Dec 2002 | A1 |
20030003909 | Keronen | Jan 2003 | A1 |
20030008661 | Joyce | Jan 2003 | A1 |
20030017832 | Anderson | Jan 2003 | A1 |
20030022664 | Goldstein | Jan 2003 | A1 |
20030040300 | Bodic | Feb 2003 | A1 |
20030044654 | Holt | Mar 2003 | A1 |
20030058096 | Shteyn | Mar 2003 | A1 |
20030086422 | Klinker et al. | May 2003 | A1 |
20030105864 | Mulligan | Jun 2003 | A1 |
20030118160 | Holt | Jun 2003 | A1 |
20030119525 | Rajkotia | Jun 2003 | A1 |
20030120826 | Shay | Jun 2003 | A1 |
20030155413 | Kovesdi | Aug 2003 | A1 |
20030186709 | Rhodes | Oct 2003 | A1 |
20030193967 | Fenton | Oct 2003 | A1 |
20040032485 | Stephens | Feb 2004 | A1 |
20040076277 | Kuusinen | Apr 2004 | A1 |
20040078694 | Lester | Apr 2004 | A1 |
20040103431 | Davenport et al. | May 2004 | A1 |
20040110524 | Takano | Jun 2004 | A1 |
20040143852 | Meyers | Jul 2004 | A1 |
20040176123 | Chin | Sep 2004 | A1 |
20040196858 | Tsai | Oct 2004 | A1 |
20040199614 | Shenfield et al. | Oct 2004 | A1 |
20050004968 | Mononen | Jan 2005 | A1 |
20050020242 | Holland | Jan 2005 | A1 |
20050020287 | Pohutsky et al. | Jan 2005 | A1 |
20050048948 | Holland et al. | Mar 2005 | A1 |
20050064884 | Dumont | Mar 2005 | A1 |
20050074107 | Renner | Apr 2005 | A1 |
20050078612 | Lang | Apr 2005 | A1 |
20050101335 | Kelly | May 2005 | A1 |
20050101338 | Kraft | May 2005 | A1 |
20050130673 | Annamalai | Jun 2005 | A1 |
20050132060 | Mo | Jun 2005 | A1 |
20050135569 | Dickinson | Jun 2005 | A1 |
20050141522 | Kadar | Jun 2005 | A1 |
20050164721 | Yeh | Jul 2005 | A1 |
20050186974 | Cai | Aug 2005 | A1 |
20050190789 | Salkini | Sep 2005 | A1 |
20050238156 | Turner | Oct 2005 | A1 |
20050265536 | Smith | Dec 2005 | A1 |
20050282518 | D'Evelyn | Dec 2005 | A1 |
20060010200 | Mousseau | Jan 2006 | A1 |
20060020965 | Steelberg | Jan 2006 | A1 |
20060023747 | Koren | Feb 2006 | A1 |
20060028995 | Canoy | Feb 2006 | A1 |
20060053197 | Yoshimura | Mar 2006 | A1 |
20060072729 | Lee | Apr 2006 | A1 |
20060077911 | Shaffer | Apr 2006 | A1 |
20060079330 | Dvorak et al. | Apr 2006 | A1 |
20060088152 | Green | Apr 2006 | A1 |
20060109960 | D'Evelyn | May 2006 | A1 |
20060120320 | Shim | Jun 2006 | A1 |
20060148415 | Hamalainen | Jul 2006 | A1 |
20060154710 | Serafat | Jul 2006 | A1 |
20060183460 | Srinivasan et al. | Aug 2006 | A1 |
20060194595 | Myllynen | Aug 2006 | A1 |
20060223549 | Chang | Oct 2006 | A1 |
20060225090 | Shim et al. | Oct 2006 | A1 |
20060250987 | White | Nov 2006 | A1 |
20060258380 | Liebowitz | Nov 2006 | A1 |
20060276168 | Fuller | Dec 2006 | A1 |
20070049288 | Lamprecht | Mar 2007 | A1 |
20070110076 | Brouwer | May 2007 | A1 |
20070201623 | Hines | Aug 2007 | A1 |
20070243885 | Shim | Oct 2007 | A1 |
20070287473 | Dupray | Dec 2007 | A1 |
20080059304 | Kimsey | Mar 2008 | A1 |
20080144779 | Ray et al. | Jun 2008 | A1 |
20080146343 | Sullivan et al. | Jun 2008 | A1 |
20090253403 | Edge et al. | Oct 2009 | A1 |
20090323636 | Dillon | Dec 2009 | A1 |
20100076767 | Vieri | Mar 2010 | A1 |
20100178973 | Snoddy et al. | Jul 2010 | A1 |
20100218664 | Toledano et al. | Sep 2010 | A1 |
20100317317 | Maier et al. | Dec 2010 | A1 |
20110028165 | Ni | Feb 2011 | A1 |
20110076982 | Li et al. | Mar 2011 | A1 |
20110171927 | Wijayanathan et al. | Jul 2011 | A1 |
20110273568 | Lagassey | Nov 2011 | A1 |
20120001750 | Monroe | Jan 2012 | A1 |
20120189107 | Dickinson | Jul 2012 | A1 |
20130012232 | Titus et al. | Jan 2013 | A1 |
20130072308 | Peck et al. | Mar 2013 | A1 |
20130079152 | Hall | Mar 2013 | A1 |
Number | Date | Country |
---|---|---|
2308528 | Dec 1995 | GB |
PCTNO990000178 | Jun 1997 | WO |
PCTSE9800992 | May 1998 | WO |
PCTFI9900935 | Nov 1998 | WO |
PCTSE9900875 | May 1999 | WO |
Entry |
---|
International Preliminary Report on Patentability received in PCT/US2012/00024 dated Dec. 11, 2012. |
Bond, “Cellular Carriers Use Prepaid Programs to Reach Untapped Markets,” Billing World, Mar. 1997, pp. 14-17. |
Robbrock, the Intelligent Network—Changing the Face of Telecommunications, IEEE, Jan. 1991, pp. BCG 21207-BCG 21220. |
MultiMedia Publishing Corp., “Prepaid Cellular and Prepaid Wireless Market Report and Forecast 1997-2002,” sales literature, undated. |
Nextlink, “Introducing a New Prepaid Telephone Service from NEXTLINK,” sales literature, undated. |
Open Development Corp., “openMedia Cellular Prepaid,” sales literature, undated. |
Tecore, Inc., “Pre-Paid Cellular,” sales literature, Mar. 25, 1997, pp. 1-4. |
Open Mobile Alliance, user Plane Location Protocol Candidate Version 1.0, OMA-TS-ULP-V1—0-20060127-C, Jan. 27, 2006, pp. 1-66. |
Open Mobile Alliance, Secure User Plane Location Architecture Candidate Version 1.0, OMA-AD-SUPL-V1—0-20060127-C, Jan. 27, 2006, pp. 1-77. |
The Power of Mobile Unified Messaging; Siemans and Comverse to Demonstrate WAP-Based Messaging Applications on Live GBRS System, Comverse, Feb. 2000. |
Chin, The Study of the Interconnection of GSM Mobile Communication System Over IP Based Network, IEEE, pp. 2219-2233. |
International Search Report received in PCT/US2011/02001 dated Apr. 17, 2012. |
International Search Report received in PCT/US2011/001990 dated Apr. 24, 2012. |
International Search Report received in PCT/US11/01971 dated Jun. 26, 2013. |
Number | Date | Country | |
---|---|---|---|
20120149325 A1 | Jun 2012 | US |
Number | Date | Country | |
---|---|---|---|
61457029 | Dec 2010 | US | |
61457138 | Jan 2011 | US |