Not Applicable
Not Applicable
1. Field of the Invention
The present invention relates to a system, apparatus, method and computer program product for managing access to wireless communication devices while present within a specified physical area.
2. Description of Related Art
Until recently, if a person wanted to make or receive a telephone call in a private establishment, such as a store, restaurant or business office, or a governmental one, such as a library, court or office, that person went to a telephone, if one was available, in a location of the establishment owner's choosing. In many cases, this location was somewhat removed from the rest of the establishment This was often done to provide a quiet private place for the caller, but also to avoid disturbing other patrons, interfering with the operation of the establishment or to control access to the telephone.
With the spread of wirelesses mobile communications, particularly the handheld cellular telephone, this has completely changed. A mobile wireless user can receive and place calls from anywhere that a signal between the mobile device and a wireless base station can be established. This has taken the control of an establishment's environment away from its owners or managers.
There have been a number of inventions that are designed to simply block access to wireless services within in an area. They include blocking or jamming a signal, spoofing or proxying for the base station and using public location-based services to determine to location of the mobile device and denying service. The existing methods suffer from several problems, particularly inaccuracy in delineating the boundaries of the area under control and insufficient flexibility in differentiating between the requirements of users and uses of the mobile devices.
There have also been a number of inventions and systems that provide location-based wireless services. These services have been based on determining the location of a mobile device within a relatively large area based on a specific request from the device or from an outside agent. A single location is returned via this request. They are not triggered by the presence of the mobile device within an area.
With the evolution of features of mobile telephones to include more than just voice calling and the addition of regulatory requirements for mobile carriers, such as the provision of emergency calling from any location, the simple solution of denying all service within an locale is not enough. In addition to allowing emergency calls to be made, inbound calls to emergency workers should also be allowed. Once that is possible, it is a small step to allowing calling privileges to various classes of users based on the needs of the establishment. For example, in a business office, mobile calls may be disallowed except for certain managers.
It is an objective of this invention to provide precise location detection of mobile devices within a private location, termed a locale, and to provide differentiated access services to mobile devices within that locale or sub-areas of the locale, as defined by the owners or managers of the locale.
It may also be reasonable for an establishment to differentiate between types of communication. It may be allowable for users to send and receive text messages, since that activity would not disturb others, while disallowing voice calls, which would cause a disturbance.
Accordingly, it is an objective of this invention to provide a system and method to manage the access of individual modes of communication for a mobile device located within a managed locale. This includes the differential management of both inbound and outbound communications of all types, including, but not limited to, voice, video, text and data access.
In order that the management of wireless communication be restricted to the physically owned or managed locale, the method for detection and identification of the mobile devices must be able to precisely locate the device as being within the bounds of the locale. Once this is possible, it also becomes possible to segment that locale into smaller zones, providing differential management of mobile devices based on the zone. For example, the use of mobile telephones could be disallowed within a school building, except within a teachers' lounge; voice calls might be prohibited within the dining room of a restaurant, but allowed in the bar. It is an objective of this invention to provide a system and method for defining and monitoring multiple, potentially overlapping, management zones within a locale and to provide for differential management services specific to each zone.
Once the zonal location of a mobile device can be detected and access to the device can be managed, other services, beyond simple communications access restrictions or allowances, can be provided for the benefit of the owner or manager of the area within the zone and for the user of the device, while the device is present within a managed zone. These can be additional access-related services. For example, a restaurant might want to restrict usage of cell phones, but wish to allow patrons to be contacted. It could provide a service whereby incoming cell phone calls to patrons within the restaurant's zone are redirected to an operator and the patron is personally called a telephone outside of the restricted zone. Another service example is an option that users can subscribe to that redirects voice calls to another medium such as the conversion of a voice call to a text message in a zone where voice calls are proscribed, but SMS messages are allowed.
It is an objective of this invention to provide extended access control services with respect to mobile devices within a managed zone. These services will include, but not be limited to, intelligent redirection of inbound calls to a fixed telephone number within the locale and the ability to offer alternate means of communication with a managed device, including providing SMS access from calling voice telephones if SMS is allowed to a managed device and SMS to voice access from a managed device, if voice calling is restricted.
In addition to access-related services, locale and zone-specific transaction and information services can be directly provided to a mobile device user at the direction of the zone manager without an explicit effort on the device user's part. An example of a transaction service would be the sending of an SMS message to a device detected on entry to a facility for which an entrance fee is charged, such as a parking garage. Upon receipt of such a message and an affirmative response from the user, entry would be granted. Similarly, a user might have pre-existing account which, upon detection of the device, cause the transaction to be processed without any explicit action by the mobile device user.
It is an objective of this invention to provide a method by which the managers of a locale can actively offer a transaction service to the user of a mobile device within a zone of the locale without initiation by the mobile device user. The will include, but is not limited to, transactions which require a confirmation by the user for completion and transactions that will be automatically be completed without user interaction, if a pre-existing authorization exists. These latter transactions may or may not have user notification at the time of the transaction. Notification and confirmation may be delivered by any medium supported by the device, at the choosing of the zone operator. This will include, but is not limited to, text, voice, video and web-based methods.
Information services can provide the user with information provided by locale management as a function of being within a zone and as a condition of access to the mobile device while within the managed area. This is of particular use in a multi-zoned managed locale. For example, upon entering an establishment, an SMS-capable detected device could be sent a text message indicating that voice calls would be restricted while inside; another service could be that a mobile device user would be informed of the availability of offers within a store upon entry and the opportunity to opt-in to receive them as the user moved about the store, moving from zone to zone within.
It is an objective of this invention to provide a method by which the managers of a locale can offer information services to a user of a mobile device within a zone of the managed locale without initiation by the user. This information will only be delivered to a user while within a managed zone and the user will be allowed to opt-out of reception of the information. The information may be delivered by any medium supported by the device, at the choosing of the zone operator. This will include, but is not limited to, text, voice, video and web-based methods.
1. Is a drawing showing a Virtual Private Cell Locale containing overlapping Zones with a hierarchy of Zones.
2. Is a drawing showing a Virtual Private Cell Locale within cells of two carriers
3. Is a drawing showing a block diagram of the elements of an example of the system where the Virtual Private Cell Locale zone detection and identification components are connected directly to a carrier policy manager.
4. Is a drawing showing a block diagram of the elements of an example of the system where the Via Private Cell Locale zone detection and identification components are connected to the carrier-specific components via a locale-specific policy manager.
A system for managing the access and services provided to mobile communications terminals while situated within a specified location using location detection subsystems, access and service policy management subsystems, transaction and information processing systems and at least one wireless network mobile switching center.
The following drawings are described for further reference.
With reference to drawing 1, the environment of a preferred embodiment is shown containing: a base station [B1] is shown along with the area of the cell it controls, the encompassing circle. The mobile terminals [T1-T4] are present within the cell. The physical area [L1] is a locale to be managed by its owners or managers. It is also termed a Virtual Private Cell. [L1]consists of three internal areas termed zones [Z1, Z2, Z3]. [Z3] overlaps [Z1] and, as will be described, is of higher priority in a hierarchy of zones. This is the simplest environment managed by the invention, as it represents a physical area served by only a single carrier.
With reference to drawing 2, which describes an alternative environment of a preferred embodiment. In this environment, the VPC Locale [L1] and its Zones [Z1, Z2, Z3] is present within the areas of two cells, each operated by a separate wireless network operator (carrier). The mobile terminals [T1-T4] are present within the cells. This environment can be extended to include as many overlapping cells as there are competing carriers.
With reference to drawing 3, a diagram of the elements of the system present in a preferred embodiment is shown. A VPC locale is shown containing a zone. The zone contains three mobile terminal Zone Detection Devices [101]. The detection devices are connected to a Zone Identification Controller [102]. While the Zone identification Controller is logically place within the domain, it is not necessarily physically within the boundaries of the VPC locale. As shown the Zone Identification Controller may be connected to detection devices monitoring other zones within the VPC locale. A mobile terminal [T] is also shown within the zone. This terminal is in communication with a wireless base station [BSC]. The base station is connected to its controlling Mobile Switching Center [MSC].
In this drawing (drawing 3), the Zone Identification Controller [102] is connected to a carrier-specific Policy Manager [201]. It may also be connected to Policy managers in other carrier domains. The Carrier Policy Manager is connected to a Carrier Locale Rule Base [202] and a Carrier Regulatory Rule Base [203] as well as a Carrier Transaction/Information Processor [204] and the carrier's MSC.
With reference to drawing 3, in an alternative preferred embodiment, the Zone Identification Controller is connected, via communication path [C5], to the carrier base station[BSC] controlling the cell in which the locale lies.
With reference to drawing 3, in an alternative preferred embodiment, the Zone Identification Controller is connected, via communication path [C6], to the Mobile Switch Center[MSC] controlling the cell in which the locale lies.
With reference to drawing 4, a diagram of the elements of the system present in an alternative preferred embodiment is shown. A locale is shown containing a zone. The zone contains three mobile terminal Zone Detection Devices [101]. The detection devices are connected to a Zone Identification Controller [102]. While the Zone identification Controller is logically place within the domain, it is not necessarily physically within the boundaries of the locale. As shown the Zone Identification Controller may be connected to detection devices monitoring other zones within the locale. A mobile terminal [T] is also shown within the zone. This terminal is in communication with a wireless base station [BSC]. The base station is connected to its controlling Mobile Switching Center [MSC].
In this drawing (drawing 4), the Zone Identification Controller [102] is connected to a Locale Policy manager [103]. The Locale Policy manager is connected to a Locale Policy Rule Base [104]. a Locale Transaction/Information Processor [105], and a carrier-specific Policy Manager [201]. It may also be connected to Policy managers in other carrier domains.
With reference to drawing 4, in an alternative preferred embodiment, the Zone Identification Controller is connected, via communication path [C5], to the carrier base station[BSC] controlling the cell in which the locale lies.
With reference to drawing 4, in an alternative preferred embodiment, the Zone Identification Controller is connected, via communication path [C6], to the Mobile Switch Center[MSC] controlling the cell in which the locale lies.
The Carrier Policy Manager is connected to a Carrier Locale Rule Base [202] and a Carrier Regulatory Rule Base [203] as well as a Carrier Transaction/Information Processor [204] and the carrier's MSC.
In a preferred embodiment, a communication path between elements of this invention may be a direct connection using a wired or wireless transport, a network connection over a public or private network, an internal connection, such a memory or internal storage where elements are implemented in a single computer system, or any combination of these transport methods.
In a preferred embodiment, the communications over a communication path may use private or public protocols including, but not limited to Internet protocols, telecommunications network protocols such as those defined in SS7 and wireless network protocols such as those defined for OSM.
In a preferred embodiment, a system for managing the access and services provided to mobile communications terminals, as shown in drawings 3 and 4. contains:
An alternative preferred embodiment of the system also contains:
An alternative preferred embodiment of the system also contains:
An alternative preferred embodiment of the system also contains:
An alternative preferred embodiment of the system also contains:
In an alternative preferred embodiment, there may be more than one VTIP. They may be differentiated by the services they provide, such as SMS messaging or IVR services. They may also be differentiated by the PSTN or PLMN with which they communicate.
A preferred embodiment of the system also contains a Mobile Switching Center [MSC] capable of responding to action requests made to it by a Carrier Policy Manager. In the context of this invention, the term Mobile Switching Center is used to include, but is not limited to, any of the following network-specific elements:
In a preferred embodiment of the system, the MSC is also capable of responding to requests for mobile terminal identification from a plurality of Zone Identification Controllers.
In an alternative preferred embodiment, the system also contains an MSC capable of initiating mobile terminal identification notifications to a plurality of Zone Identification Controllers.
An alternative preferred embodiment of the system also contains a Base Station Controller [BSC] capable of responding to requests for mobile terminal identification from a plurality of Zone Identification Controllers. In the context of this invention, the term Base Station Controller is used to include, but is not limited to, any of the following network-specific elements:
In an alternative preferred embodiment, the system also contains a BSC capable of initiating mobile terminal identification notifications to a plurality of Zone Identification Controllers.
In a preferred embodiment, the detection devices [101] are capable of monitoring at least the control channel traffic from mobile terminals [T], normally wireless telephones, supported by the base station [BSC] technology. They listen for transmissions from mobile terminals and report the data received along with attributes relevant to a location detection method to the Zone Identification Controller [102]. Depending on the detection method, these attributes may be time of arrival of the data, signal strength, angle of arrival, phase, or other parameters.
As a terminal [T] enters a cell, either by a handover or power-on sequence, it communicates with the base station [BSC]. It also communicates with the base station when it attempts to connect to make a call or other transmission, such as send a message. It also responds to the base station when setting up to receive a call or other transmission. Periodic probes and replies may also be transmitted by the terminal, depending on the cellular technology used. It is these communications that are monitored by the detection devices.
In a preferred embodiment, a VPC locale[L1], as depicted in drawing 1, is defined as a physical three-dimensional space under the control of an owner or managers of that space. This area could be a building, a set of offices within a building, a campus or any other place under private control. A VPC locale is located, in this preferred embodiment, within the three-dimensional space of a wireless carrier communications cell controlled by a base station [B1].
In an alternative preferred embodiment, the VPC locale can span several cells.
In a preferred embodiment, a VPC locale [L1] is further subdivided into zones[Z1, Z2, Z3], which are also physical three-dimensional spaces. These are also depicted in drawing 1. As shown, Zones may overlap [Z2, Z3]. A zone represents an area in which a specific set of rules governing the use of mobile terminals will be applied to all terminals[T1, T2, T3] within a zone. When zones overlap, a hierarchy of zones will be applied and, if rules conflict, those of the zone higher in the hierarchy will prevail.
In a preferred embodiment, the Zone Identification Controller takes the data reports from the detection devices within the VPC locale and, using known methods for location detection, such as relative signal strength, angle of arrival, time difference of arrival or any other method, determines if the transmission emanates from a terminal within the VPC locale and if which zone or zones the terminal is present. It may also determine if a terminal is outside a zone.
In a preferred embodiment, where the data from the mobile terminal is not encrypted and a terminal identifier is present, the Zone Identification Controller saves the terminal identifier.
In an alternative preferred embodiment, as shown in
In an alternative preferred embodiment, as shown in
In an alternative preferred embodiment, as shown in
In an alternative preferred embodiment, where, the data from the terminal is encrypted, as shown in
In a preferred embodiment, the Zone Identification Controller, as shown in
In an alternative preferred embodiment, where the data from a mobile terminal is encrypted and the Zone Identification Controller cannot provide a terminal identifier, the Zone Identification Controller, as shown in drawing 3, whenever it determines that a terminal exists in, enters or leaves at least one zone, sends the event associated with the terminal activity which, in addition to the type of event, includes the encrypted data, the list of zones in which the terminal appears and any additional state information associated with the terminal to the Carrier Policy manager [201] of the carrier whose Base Station is communicating with the terminal.
The types of events that can be reported to the Carrier Policy Manager include, but are not limited to:
In an alternative preferred embodiment, as shown in drawing 4, the Zone Identification Controller, whenever it determines that a terminal exists in, enters or leaves at least one zone, sends the event associated with the terminal activity which, in addition to the type of event, includes the terminal identifier, the list of zones in which the terminal appears and any additional state information associated with the terminal to a VPC Policy manager [103].
In an alternative preferred embodiment, where the data from a mobile terminal is encrypted and the Zone Identification Controller cannot provide a terminal identifier, the Zone Identification Controller, as shown in drawing 4, whenever it determines that a terminal exists in, enters or leaves at least one zone, sends the event associated with the terminal activity which, in addition to the type of event, includes the encrypted data, the list of zones in which the terminal appears and any additional state information associated with the terminal to a VPC Policy manager [103].
In a preferred embodiment, as shown in drawing 4, the VPC Policy Manager receives events from a Zone Identification Controller. If the terminal referenced in the event is not currently known by the VPC Policy Manager, the policy manager creates a state object or variable for the terminal. For each zone referenced in the event the policy manager queries the VPC Policy Rule Base for the rules associated with the zone and applies each rule found.
In an alternative preferred embodiment, as shown in drawing 4, the VPC Policy Manager receives events from a Zone Identification Controller where the terminal is not identified and the encrypted data is included as part of the event. The VPC Policy Manager sends a request to identify the terminal, with the encrypted data to the MSC of the carrier associated with the base station with which the terminal was communicating. In this case the VPC Policy manager caches the event until a response event is received from the MSC, at which time the cached event is modified to contain the terminal identifier and handled as in the previous paragraph.
In a preferred embodiment, as shown in drawing 4, the VPC Policy Manager receives other types of events in addition to the events posted by the Zone Identification Controller. These include:
A rule is defined by a trigger event, as defined above, the zones in which the rule applies, a set of conditions and a set of actions. If the event occurs, the rule will tested and possibly executed. The set of conditions is a conditional expression, whose arguments are terminal, zone, VPC or system state variables, that must evaluate to true or false. The set of actions is a list of actions to be performed for this rule. Actions describe the operations that are to be performed as a result of the event and may be conditionally executed depending on the state of the terminal as known by the policy manager, the state of the policy manager or any element of the system.
In a preferred embodiment, as shown in drawing 4, the actions of a rule are applied if the event type and zone match those defined in the rule and the conditions evaluate to true. If there are conflicting actions and they are for the same zone, those of the latest rule evaluated will be applied. If there are conflicting actions when the event occurs in more than one zone, the actions associated with the zone highest in the zone hierarchy are applied.
In a preferred embodiment there are several types of actions:
In a preferred embodiment, as shown in drawing 4, there are two major classes of actions, those which are applied locally by system elements associated with the VPC Locale and those associated with the Carrier with which the terminal causing the event is communicating. VPC locale actions include, but are not limited to:
Actions 1-3 are performed locally by the VPC Policy Manager and actions 4-5 are performed by sending a message to a VPC TIP via communication path [C17] in drawing 4.
In a preferred embodiment, as shown in drawing 4, Carrier actions, Access Actions and Carrier Transaction/Information Actions are applied indirectly. Both the actions and the events that triggered them are sent to the appropriate Carrier Policy Manager (CPM) [201] by the VPC Policy manager.
In a preferred embodiment, access actions are used to manage the use of access services available to a mobile terminal while in a zone of the VPC locale. The types of access services that may be managed using actions include, but are not limited to:
In a preferred embodiment, as shown in drawing 4, actions sent to the CPM include, but are not limited to:
In a preferred embodiment, as shown in drawing 4, a Carrier Policy Manager (CPM) [201] is connected to at least one VPC Locale Policy Manager (VPM) [103] and receives events and the actions generated by the VPM as the result of those events.
In an alternative preferred embodiment, as shown in drawing 3, a CPM is connected to at least one VPC Local Zone Identification Controller (ZIC) [102] and receives events directly from the ZIC. In this embodiment, the VPC Locale does not contain its own VPM.
In a preferred embodiment, a CPM may service events and actions for a single VPC or for multiple VPCs. The VPCs may be owned and managed by a plurality of subscribers to the access and service management services offered by the Carrier.
In a preferred embodiment, a CPM receives events from a ZIC or VPM. If the mobile terminal referenced in the event is not currently known by the CPM, the policy manager creates a state object or variable for the terminal. For each zone referenced in the event the policy manager queries the Carrier VPC Policy Rule Base (CVPRB) [202], the Carrier Regulatory Rule Base (CRRB) [203] and the Carrier User Configuration Rule Base (CUCRB) [204] for the rules associated with the zone and applies each rule found.
In an alternative preferred embodiment, as shown in drawing 3, the CPM receives events from a ZIC where the terminal is not identified and the encrypted data is included as part of the event. The CPM sends a request to identify the terminal, with the encrypted data to the MSC of the carrier associated with the base station with which the terminal was communicating. In this case the CPM caches the event until a response event is received from the MSC, at which time the cached event is modified to contain the terminal identifier and handled as in the previous paragraph.
In an alternative preferred embodiment, as shown in drawing 3, the CPM receives keys for decrypting the terminal data from the MSC as the keys are generated for mobile terminals within the cell containing the VPC. In this embodiment, events from a ZIC where the terminal is not identified and the encrypted data is included as part of the event are decoded directly by the CPM.
In a preferred embodiment, a CPM receives other types of events in addition to the events posted by a ZIC or VPM. These include:
In a preferred embodiment, the types of rules and actions processed by the CPM include those defined for the VPM above.
In a preferred embodiment, a CPM may also generate additional actions including, but not limited to:
In a preferred embodiment, for each event received, the CPM first searches the CVPRB for rules matching the event and evaluates them as described for the VPM above, generating actions to be executed. The actions are them merged with any actions generated by a VPM and sent with the event to the CPM. If there are conflicting actions,a new action generated by the CPM will replace the preexisting conflicting action.
In a preferred embodiment, for each event received, the CPM secondly searches the CRRB for rules matching the event and evaluates them as described for the VPM above, generating actions to be executed. The actions are them merged with any previously generated actions. If there are conflicting actions,a new action generated by the CPM will replace the preexisting conflicting action.
In a preferred embodiment, for each event received, the CPM thirdly searches the CUCRB for rules matching the event and evaluates them as described for the VPM above, generating actions to be executed. The actions are them merged with any previously generated actions. If there are conflicting actions,a new action generated by the CPM will replace the preexisting conflicting action.
In a preferred embodiment, the CPM then sends each resulting actions to the target system component for execution. The target system components may include, but are not limited to the CPM itself, the MSC controlling the mobile terminal associated with the action, or a CTIP.
In a preferred embodiment, as shown in drawing 3, the CPM may also send actions to the VPC Locale ZIC in which associated mobile terminal is present.
In a preferred embodiment, as shown in drawing 4, the CPM may also send actions to the VPM for the VPC locale in which associated mobile terminal is present.
In a preferred embodiment, the MSC controlling mobile terminals in the cells in which a at least one VPC Locale exists, receives action requests from at least one CPM. The action requests sent to an MSC are those used to manage mobile terminal access to the network or are requests for information or notification of mobile terminal status. These actions include, but are not limited to:
The MSC responds to action requests by providing the service requested and returning any responses as event messages to the the CPM.
In a preferred embodiment, as shown in drawing 4, the system may contain at least one VPC Transaction/Information Processor (VTIP). This element of the system connects to the communication network on which a mobile terminal being managed by the system is present. This connection is outside the bounds of the system being described. The VTIP receives actions from the VPM as requests to execute a transaction or information service with respect to a particular mobile terminal. These actions include, but are not limited to:
The specific details of the service provided are configured within the VTIP and are not part of this invention. They are expected to be IVR, SMS or transaction services provided by existing systems and techniques which interact directly with a given mobile terminal using standard communication interfaces with the network on which the terminal is present.
The VTIP responds to action requests by providing the service requested and returning any responses as event messages to the VPM. A single VTIP action request may generate multiple events. The types of events to be returned are indicated in the action request and my include, but are not limited to:
In a preferred embodiment, as shown in drawing 4, the VTIP may be implemented as one or more separate elements, each capable of a single mode of service such as a Voice Processing System, Text Message Processing system or Transaction Processing system. A VTIP may also be implemented as part of the VPM.
In a preferred embodiment, as shown in drawing 3, the system may contain at least one Carrier Transaction/Information Processor (CTIP). This element of the system connects to the communication network on which a mobile terminal being managed by the system is present. This connection is outside the bounds of the system being described. The CTIP receives actions from the CPM as requests to execute a transaction or information service with respect to a particular mobile terminal. These actions include, but are not limited to:
3. Execute Transaction or Information Request for a specified mobile terminal
In a preferred embodiment, as shown in drawing 3, a CTIP may provide information or transaction service for a plurality of the VPC locales managed via the CPM to which it is connected.
The specific details of the service provided are configured within the CTIP and are not part of this invention. They are expected to be IVR, SMS or transaction services provided by existing systems and techniques which interact directly with a given mobile terminal using standard communication interfaces with the network on which the terminal is present.
The CTIP responds to action requests by providing the service requested and returning any responses as event messages to the CPM. A single CTIP action request may generate multiple events. The types of events to be returned are indicated in the action request and my include, but are not limited to:
In a preferred embodiment, as shown in drawing 3, the CTIP may be implemented as one or more separate elements, each capable of a single mode of service such as a Voice Processing System, Text Message Processing system or Transaction Processing system. A CTIP may also be implemented as part of the CPM.
This application claims the benefit of PPA Ser. No. 60/498,757, filed 2003 Aug. 29 by the present inventors.