This disclosure generally relates to location and roaming approaches in GSM, CDMA, and UMTS networks. Further, this disclosure relates to user plane location approaches in core networks and complementary access networks.
Mobile communications infrastructure is typically conceptualized in two generally separate components: the core network (“CN”) and the radio access network (“RAN”). Together, this infrastructure enables user equipment (“UE”), the RAN, and CN to be developed and implemented separately according to the permissive standards set by organizations such as 3GPP and ITEU. Thus, various types of RANs, such as GERAN or UTRAN, may be paired with a single UMTS CN. Also, the UMTS standards provide for protocol separation between data related to user communications and data related to control of the network's various components. For example, within a UMTS mobile communications network, User Plane (“UP”) bearers are responsible for the transfer of user data, including but not limited to voice or application data. Control Plane (“CoP”) bearers handle control signaling and overall resource management.
As mobile networks transition towards 3G and beyond, location services (LCS, applications of which are sometimes referred to as Location Based Services, or LBS) have emerged as a vital service component enabled or provided by wireless communications networks. In addition to providing services conforming to government regulations such as wireless E911, LCS solutions also provide enhanced usability for mobile subscribers and revenue opportunities for network operators and service providers alike.
Position includes geographic coordinates, relative position, and derivatives such as velocity and acceleration. Although the term “position” is sometimes used to denote geographical position of an end-user while “location” is used to refer to the location within the network structure, these terms may often be used interchangeably without causing confusion, Common position measurement types used in mobile positioning or LCS include, but are not limited to, range, proximity, signal strength (such as path loss models or signal strength maps), round trip time, time of arrival, and angle of arrival. Multiple measurements may be combined, sometimes depending on which measurement types are available, to measure position. These combination approaches include, but are not limited to, radial (for example, employing multiple range measurements to solve for best agreement among circular loci), angle (for example, combining range and bearing using signal strength or round trip time), hyperbolic (for example, using multiple time-of-arrival), and real time differencing (for example, determining actual clock offsets between base stations).
Generally, LCS methods are accomplished through CoP or UP methods. CoP Location (“CoPL”) refers to using control signaling within the network to provide location information of the subscriber or UE. UP Location (“UPL”), such as Secure User Plane Location (“SUPL”) uses user data to provide location information. CoPL location approaches include, but are not limited to, Angle-of-Arrival (“AoA”), Observed Time-Difference-of-Arrival (“OTDOA”), Observed-Time-Difference (“OTD”), Enhanced-OTD (“E-OTD”), Assisted Global Positioning System (“A-GPS”), and Assisted Galileo Navigation Satellite System (“A-GNSS”). UPL approaches include, but are not limited to, A-GPS, and A-GNSS, where this position data is communicated over Internet Protocol (“IP”).
There are two established architectures associated with location determination in modern cellular networks. The architectures are Control Plane (“CoP”) and User Plane (“UP”) architectures. Typically location requests are sent to a network through a query gateway function 1. Depending on the network implementation CoP 15 or UP 10 may be used but not a combination of both, as shown in
The difference between user plane and control plane, strictly, is that the former uses the communication bearer established with the device in order to communicate measurements. The latter uses the native signaling channels supported by the controlling network elements of the core and access to communicate measurements. As such, CoPL supports A-GPS—it uses control plane signaling interfaces to communicate GPS data to/from the handset. Similarly UPL may conduct E-OTD—the handset takes the timing measurements but it communicates them to the location platform using the data bearer.
UPL has the advantage of not depending on specific access technology to communicate measurement information. CoPL has the advantage that it may access and communicate measurements which may not be available to the device. Current models require network operators to deploy one or the other, CoPL or UPL.
CoPL uses the native signaling plane of the network to establish sessions and communicate messages associated with location requests and to communicate measurements used for determining location. The control plane is the signaling infrastructure used for procedures such as call control, hand-off, registration, and authentication in a mobile network; CoPL uses this same infrastructure for the performing location procedures. CoPL may utilize measurements made by both the control plane network elements as well as the end-user device being located.
Developed as an alternative to CoPL, Secure User Plane Location (“SUPL”) is set of standards managed by the Open Mobile Alliance (“OMA”) to transfer assistance data and positioning data over IP to aid network and terminal-based positioning technologies in ascertaining the position of a SUPL Enabled Terminal (“SET”).
User Plane Location (“UPL”) does not explicitly utilize the control plane infrastructure. Instead UPL assumes that a data bearer plane is available between the location platform and the end-user device. That is, a control plane infrastructure may have been involved in establishing the data bearer so that communication may occur with the device but no location-specific procedural signaling occurs over the control plane. As such, UPL is limited to obtaining measurements directly from the end-user device itself.
SUPL includes a Location User Plan (“Lup”) reference point, the interface between the SUPL Location Platform (“SLP”) and SET, as well as security, authentication, authorization, charging functions, roaming, and privacy functions. For determining position, SUPL generally implements A-GPS, A-GNSS, or similar technology to communicate location data to a designated network node over Internet Protocol (“IP”).
For any SET, an SLP 201 may perform the role of the home SLP (“H-SLP”), visited SLP (“V-SLP”) or emergency SLP (“E-SLP”). An H-SLP for a SET includes the subscription, authentication, and privacy related data for the SET and is generally associated with a part of the SET's home PLMN. A V-SLP for a SET is an SLP selected by an H-SLP or E-SLP to assist in positioning thereof. An E-SLP for a SET is an SLP associated with or contained in the PLMN serving the SET. The E-SLP may perform positioning in association with emergency services initiated by the SET.
The SLC 203 coordinates operations of SUPL in the network and interacts with the SET over the User Plane bearer to perform various functions including, but not limited to, privacy, initiation, security, roaming, charging, service management, and positioning calculation. The SPC 205 supports various functions including, but not limited to, security, assistance delivery, reference retrieval, and positioning calculation.
SUPL session initiation is network-initiated or SET-initiated. The SUPL architecture provides various alternatives for initiating and facilitating SUPL functions. For example, a SUPL Initiation Function (“SIF”) is optionally initiated using a Wireless Application Protocol Push Proxy Gateway (“WAP PPG”) 211, a Short Message Service Center (“SMSC/MC”) 213, or a User Datagram Protocol/Internet Protocol (“UDP/IP”) 215 core, which forms user plane bearer 220.
The operation of UPL is shown in
The SUPL Location Platform is a location server defined as part of the SUPL specification standardized by the OMA. It uses the User plane Location Protocol to determine the position of a SET. Each SET has a Home SLP (H-SLP) with which it has a special trust relationship
The Http Enabled Location Delivery (HELD) protocol is a Layer 7 location configuration protocol used for retrieving location information from a Location information server (LIS) within an access network. The protocol includes options for retrieving location information in two forms; by value and by reference. The device may acquire a literal location object describing the location of the device. If the mobile device requests a location by value it may request that the LIS create a PIDF-LO document. The device may request that the LIS provide a location reference in the faun of a location Uniform Resource Identifier (URI_or set of location URIs allowing the device to distributes its location information by reference. Both of these methods may be provided concurrently from the same LIS. The protocol is an extensible application-layer protocol. The HELD protocol is defined independently of any lower layers used to transport messages from one host to another. Generally HELD relies upon the underlying transport layer to provide authentication, confidentiality and protection.
A LIS 309 is responsible for providing that location information to devices within an access network 307. The LIS uses knowledge of the access network and its physical topology to generate and serve location information to devices. Each access network retains specific knowledge about topology and information regarding the appropriate LIS that has the specific knowledge necessary to locate a device. Automatic discover of the LIS is important where there is any chance of movement outside a single access network. Reliance on static configuration may lead to unexpected errors if a device moves between access networks.
Dynamic Host Configuration Protocol (DHCP) is a computer networking protocol used by hosts to retrieve IP address assignments and other configuration information. DHCP allows the access network provider to specify the address of a LIS as part of network configuration. If the device is able to acquire a LIS URI using DHCP or other protocol than this URI may be used directly. (A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. A location URI identifies a geographic location using a textual representation of the location's spatial coordinates in either two or three dimensions.)
An access provider (AP) operates the LIS so that devices (and targets) may retrieve their location information. The LIS exists since not all Devices are capable of determining location information, and in many cases it is more efficient to determine the location information with assistance from the LIS.
Typically, the device discovers the URI for the LIS for sending the HELD protocol requests from it initialization over the access network. The product of the LIS discovery process is one or more Http URI. These URIs may be used for location configuration using HELD. Additional information regarding automatic discovery may be found in Thomson, Winterbottom, “Discovering the local Location Information Server (LIS)” IETF, Feb. 9, 2009, the entirety of which is incorporated by reference.
The access network 307 is the network that provides a connection between a device and the Internet. The access network 307 may include the physical infrastructure: cabling, radio transmitters, switching and routing nodes and servers. The access network covers the infrastructure necessary to provide a physical connection to the Internet. The access network also covers the services required to enable IP communication, which include servers that provide addressing and configuration information such as DHCP and Domain Name Server (DNS) servers. DHCP is a computer networking protocol used by hosts to retrieve IP address assignments and other configuration information.
In certain situations such as roaming, the SLP may not have enough information about network topology to determine an accurate location estimate and may need assistance from another SLP. Additionally, the LIS may not be able to provide a literal location or a literal location with the accuracy required by the request. The present subject matter is directed to leveraging the information inherently provided by the LIS to the HELD client to assist the H-SLP in determining an appropriate V- SLP for determining a location estimate.
The prior art does not explicitly define how H-SLP servers determines the V-SLP. Thus, there is a need in the art to overcome, the limitations of the prior art and provide a novel system and method for SUPL roaming in networks.
The current subject matter leverages the discovery process of the HELD client to assist the H-SLP in selecting an appropriate V-SLP in order to locate the device.
In order to obviate the deficiencies of the prior art, the present subject matter discloses a novel method for assisting in the selection of a visiting secure user plane location platform (SLP) for a mobile device. The method includes accessing a network and searching a location information server associated with the access network using a HTTP protocol. The method includes receiving identifying information from the LIS; and, transmitting the identifying information along with the characteristics of the wireless communications network to the H-SLP. The H-SLP using the LIS to aid in the selection of a V-SLP to locate the mobile device.
It is further an object to present a novel method of selecting a second secure user plane location platform (SLP) for a mobile device, the mobile device having an integrated secure user plane location (SUPL) and HTTP enabled location delivery (HELD) client. The method including initiating a SUPL session; accessing a network and requesting identity information is received at the mobile device and is transmitted along with network measurements to a first secure user plane location platform. The first secure user plane location platform selecting the second SLP based upon the identity of the LIS and whether the LIS is associated with a SLP.
It is still an object of the disclosed subject matter to present a method of locating a SUPL enabled terminal (SET) mobile device having a HTTP enable Location delivery (HELD) client. The method includes initiating a location session; requesting network measurements of a wireless communications network form the mobile device. Information regarding LISs associated with a network assessed by the mobile devices as a HELD client along with the requested network measurements is received and V-SLP is selected based upon the identifying information
It is still another object to present a system for selecting a V-SLP for a roaming mobile device. The system includes the mobile device which includes a SUPL enable Terminal (SET) having an integral HELD client; a local Access network assessable by the HELD client of the SET; the local access networking having a LIS associated with a SLP. The system further includes a H-SLP associated with the mobile device. The local access network provides identity information of the LIS to the mobile via the HELD client which in turn provides the identity information to the H-SLP, the H-SLP determines a V-SLP based on the identity information.
Another embodiment of the present subject matter provides a method for providing assistance data to a mobile device in a wireless communications network. These embodiments and many other objects and advantages thereof will be readily apparent to one skilled in the art to which the disclosed subject matter pertains from a perusal of the claims, the appended drawings, and the following detailed description of the embodiments.
Various aspects of the present disclosure will be or become apparent to one with skill in the art by reference to the following detailed description when considered in connection with the accompanying exemplary non-limiting embodiments.
With reference to the figures where like elements have been given like numerical designations to facilitate an understanding of the present subject matter, the various embodiments of a system and method for SUPL roaming are herein described.
As noted earlier, each SET has a H-SLP with which it has a special trust relationship. For SET initiated location requests, the SET typically contacts its own H-SLP first, and if the H-SLP cannot provide a location for the SET's current access network, it is the responsibility of the H-SLP to identify another SLP which may perform the request and then to initiate SUPL roaming procedures to allow the new SLP to assist with the position determination.
For network initiated location requests, the H-SLP contacts the SET and indicates that a SUPL session required. Once again, if the SET turns out to be in an access network that the H-SLP does not support, it is the H-SLP's responsibility to identify a V-SLP and to initiate SUPL roaming procedures.
In SUPL, there is also the concept of emergency location requests. In this case, the SET is allowed to respond to unknown Emergency SLPs (E-SLPs) for emergency network initiated requests. In this case, it is the responsibility of the E-SLP to identify an V-SLP to assist with positioning if the E-SLP is not able to locate the SET in its current access network. In either case, if the H-SLP or E-SLP cannot provide an adequate location estimate, a V-SLP may be required.
The LIS is a network server that provides devices with information about their location. It uses the HELD protocol standardized by the IETF. Devices that require location information request their location from the LIS. In the architectures developed by the IETF, NENA and other standards forums, the LIS is made available in the IP access network that connects the device to the Internet. In other modes of operation, the LIS also provides location information to other requesters relating to a target device.
Unlike the SLP in SUPL, the trust relationship between the device and the LIS is based on the characteristics of the access network. There are standardized methods for HELD clients to discover LISs in arbitrary access networks and it is generally assumed that when the access network is trusted, then so is the LIS associated with the access network. In addition the trust relationship of the access network may be based on other relationships such an entity which administers a plurality of access networks. If the entity is trusted, those access networks associated therewith may be trusted.
The disclosed subject matter describes a system and method whereby the HELD protocol may be used to assist an H-SLP in identifying an V-SLP.
The method uses the integrated SUPL SET and HELD client to identify a locally discovered LIS to the H-SLP and uses a URI provided by that LIS to notify the H-SLP of an SLP potentially usable as an V-SLP.
In a SUPL session (whether network initiated or SET initiated), the SET is responsible for gathering network information and reporting this back to the H-SLP (or E-SLP for emergency requests). With this disclosed subject matter, prior to sending this information, the SET first attempts to discover any local LISs in one or more of its available access networks using its integrated HELD client or DHCP client. The access networks may be any of WiFi, WiMax, Bluetooth, 802.11, TDMA, CDMA, AMPS, GPRS, UMTS, LTE. WiFi, WiMax, Bluetooth, 802.11, or wire. These networks do not need to be the same access network used for connecting to the SLP, for example the mobile device may be connected to the SLP over a CDMA wireless communication system and connected to the access network over a WiFi connection. The device uses the HELD protocol to obtain IETF defined Presence Information Data Format Location Objects (PIDF-LOs) from the LISs, which may include position estimates and civic addresses. It may also obtain location URIs which enable other parties to query the LIS for a location by reference as discussed in the background.
If any LIS are discovered, their identities are sent to the relevant SLP (H-SLP or E-SLP) along with the other requested network measurements. These identities may be transmitted in the form of URIs. In addition to their own identities, the access network may also provide the SET with URIs for a plurality of LIS and or SLPs associated with the access networks.
In a receiving the URI, the H-SLP may determine whether any of them are also SLPs which could act as V-SLPs, based on the URI. The H-SLP may then initiate SUPL roaming procedures with a chosen V-SLP if desired.
Exemplary methods used by the SLP to locate the mobile may include but are not limited to, TDOA, TOA, RTD, AOA, RSSI, Advanced forward link trilateration (“A-FLT”), Enhanced observed time difference (“EOTD”), Observed time difference of arrival (“OTDOA”), time of arrival (“TOA”), uplink-TOA and uplink-TDOA, Enhanced cell/sector and cell-ID, etc., and hybrid combinations thereof.
The OMA SUPL location architecture is based on the premise that a device 410 has a home network, and all requests for location go through the SUPL server in the home network, i.e., H-SLP. That is, communication using SUPL goes between the H-SLP and the device. The H-SLP, however, may not be able to provide location information about a device 410 at a remote location (e.g. another continent, etc.)
If the device is in a visited network, then the authentication in the home network will have information about the visited network and using the information the identity of the location server in the visited network, the V-LS 436.
It is therefore an aspect of embodiments of the present subject matter to implement SUPL roaming in an exemplary network. One aspect of the present subject matter allows an H-SLP to obtain the identity and information for a V-SLP from the mobile.
The H-SLP may select a V-SLP from the identity information received from the LIS. The H-SLP may maintain a record of LIS and associated SLP in a database or look up table, such that the identification of the LIS provides potential SLP from which to select. The database may also have other associations related to the access network, LIS or SLP by which the selection of a V-SLP may be made. For example the database may include a course location estimate associated with the LIS or access network, or may include the QoS associated with the access network, or may contain other entities associated with the access network or LIS. Upon selection of a V-SLP, the H-SLP may proxy location requests to the V-SLP for assistance in the location determination process using OMA RLP or MLP.
In
An exemplary mobile device or SET may be but is not limited to a cellular device, text messaging device, computer, portable computer, vehicle locating device, vehicle security device, communication device, and wireless transceiver.
While preferred embodiments of the present subject matter have been described, it is to be understood that the embodiments described are illustrative only and that the scope of the disclosed subject matter is to be defined solely by the appended claims when accorded a full range of equivalence, many variations and modifications naturally occurring to those of skill in the art from a perusal hereof.
This application is a CIP of co-pending U.S. application Ser. No. 12/404,757 entitled “SYSTEM AND METHOD FOR SUPL ROAMING IN WIMAX NETWORKS”, filed Mar. 16, 2009. This application is co-pending with and claims priority benefit of U.S. provisional application No. 61/186,262 entitled “SUPL HELD INTERWORKING” filed Jun. 11, 2009. This application is also related to concurrently filed and co-pending U.S. non-provisional application Ser. No. 12/782,920 entitled “SYSTEM AND METHOD FOR SUPL HELD INTERWORKING”. The entirety of the disclosures are herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4728959 | Maloney | Mar 1988 | A |
5327144 | Stilp et al. | Jul 1994 | A |
5608410 | Stilp et al. | Mar 1997 | A |
5959580 | Maloney et al. | Sep 1999 | A |
6047192 | Maloney | Apr 2000 | A |
6091362 | Stilp | Jul 2000 | A |
6097336 | Stilp | Aug 2000 | A |
6101178 | Beal | Aug 2000 | A |
6108555 | Maloney et al. | Aug 2000 | A |
6115599 | Stilp | Sep 2000 | A |
6119013 | Maloney et al. | Sep 2000 | A |
6127975 | Maloney | Oct 2000 | A |
6172644 | Stilp | Jan 2001 | B1 |
6184829 | Stilp | Feb 2001 | B1 |
6266013 | Stilp et al. | Jul 2001 | B1 |
6281834 | Stilp | Aug 2001 | B1 |
6285321 | Stilp et al. | Sep 2001 | B1 |
6288675 | Maloney | Sep 2001 | B1 |
6288676 | Maloney | Sep 2001 | B1 |
6317081 | Stilp | Nov 2001 | B1 |
6317604 | Kovach, Jr. et al. | Nov 2001 | B1 |
6334059 | Stilp et al. | Dec 2001 | B1 |
6351235 | Stilp | Feb 2002 | B1 |
6366241 | Pack | Apr 2002 | B2 |
6388618 | Stilp et al. | May 2002 | B1 |
6400320 | Stilp et al. | Jun 2002 | B1 |
6463290 | Stilp et al. | Oct 2002 | B1 |
6483460 | Stilp et al. | Nov 2002 | B2 |
6492944 | Stilp | Dec 2002 | B1 |
6519465 | Stilp et al. | Feb 2003 | B2 |
6546256 | Maloney | Apr 2003 | B1 |
6563460 | Stilp et al. | May 2003 | B2 |
6603428 | Stilp | Aug 2003 | B2 |
6646604 | Anderson | Nov 2003 | B2 |
6661379 | Stilp et al. | Dec 2003 | B2 |
6765531 | Anderson | Jul 2004 | B2 |
6771625 | Beal | Aug 2004 | B1 |
6782264 | Anderson | Aug 2004 | B2 |
6873290 | Anderson et al. | Mar 2005 | B2 |
6876859 | Anderson et al. | Apr 2005 | B2 |
6996392 | Anderson | Feb 2006 | B2 |
7023383 | Stilp et al. | Apr 2006 | B2 |
7167713 | Anderson | Jan 2007 | B2 |
7271765 | Stilp et al. | Sep 2007 | B2 |
7340259 | Maloney | Mar 2008 | B2 |
7427952 | Bull et al. | Sep 2008 | B2 |
7440762 | Maloney et al. | Oct 2008 | B2 |
7593738 | Anderson | Sep 2009 | B2 |
7613155 | Shim | Nov 2009 | B2 |
7778639 | Shim | Aug 2010 | B2 |
7962153 | Yan | Jun 2011 | B2 |
8000701 | Dawson | Aug 2011 | B2 |
20020172223 | Stilp et al. | Nov 2002 | A1 |
20030064734 | Stilp et al. | Apr 2003 | A1 |
20030143988 | Jamadagni | Jul 2003 | A1 |
20060003775 | Bull et al. | Jan 2006 | A1 |
20060030333 | Ward et al. | Feb 2006 | A1 |
20060058042 | Shim | Mar 2006 | A1 |
20060246919 | Park et al. | Nov 2006 | A1 |
20070111746 | Anderson et al. | May 2007 | A1 |
20070155401 | Ward et al. | Jul 2007 | A1 |
20070155489 | Beckley et al. | Jul 2007 | A1 |
20070182547 | Wachter et al. | Aug 2007 | A1 |
20070286212 | Kim et al. | Dec 2007 | A1 |
20070287411 | Kim et al. | Dec 2007 | A1 |
20070287448 | Kim et al. | Dec 2007 | A1 |
20070293239 | Dawson et al. | Dec 2007 | A1 |
20080005275 | Overton et al. | Jan 2008 | A1 |
20080132244 | Anderson et al. | Jun 2008 | A1 |
20080132247 | Anderson et al. | Jun 2008 | A1 |
20080137524 | Anderson et al. | Jun 2008 | A1 |
20080158059 | Bull et al. | Jul 2008 | A1 |
20080160952 | Bull et al. | Jul 2008 | A1 |
20080160953 | Mia et al. | Jul 2008 | A1 |
20080161015 | Maloney et al. | Jul 2008 | A1 |
20080200182 | Shim | Aug 2008 | A1 |
20080228654 | Edge | Sep 2008 | A1 |
20080248811 | Maloney et al. | Oct 2008 | A1 |
20080261611 | Mia et al. | Oct 2008 | A1 |
20080261612 | Mia et al. | Oct 2008 | A1 |
20080261613 | Anderson et al. | Oct 2008 | A1 |
20080261614 | Mia et al. | Oct 2008 | A1 |
20090005061 | Ward et al. | Jan 2009 | A1 |
20090191841 | Edge et al. | Jul 2009 | A1 |
20100062752 | Shim | Mar 2010 | A1 |
20110004672 | Garcia-Martin et al. | Jan 2011 | A1 |
20120028598 | Bakker et al. | Feb 2012 | A1 |
20120184293 | Li et al. | Jul 2012 | A1 |
20120202447 | Edge et al. | Aug 2012 | A1 |
20120202517 | Edge et al. | Aug 2012 | A1 |
Number | Date | Country |
---|---|---|
2006031022 | Mar 2006 | WO |
2006088472 | Aug 2006 | WO |
2009022857 | Feb 2009 | WO |
Number | Date | Country | |
---|---|---|---|
20100311439 A1 | Dec 2010 | US |
Number | Date | Country | |
---|---|---|---|
61186262 | Jun 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12404757 | Mar 2009 | US |
Child | 12813278 | US |