In this digital age, modern telecommunication service providers and device manufacturers are increasingly relying on public and/or private IP networks, including the Internet, as a core part of their technology. For example, many telecommunications service providers now offer a suite of Voice over IP (“VoIP”) services, as well as various data services, that utilize IP networks and/or IP-based wireless access networks (e.g., access networks based on IEEE 802.16 (“WiMAX”), IEEE 802.20 Mobile Broadband Wireless Access (MBWA), Ultra Wideband (UWB), 802.11 wireless fidelity (“Wi-Fi”), Bluetooth, and similar standards) for at least part of their infrastructure. Likewise, device manufacturers are producing the next generation of mobile devices (e.g. wireless handhelds, wireless handsets, mobile phones, personal digital assistances, notebook computers, and similar devices) that are enabled to send and receive information utilizing IP-based telecommunications services. In fact, many of today's modern mobile devices are able to function as “dual-mode devices” that take advantage of both cellular network technologies and IP-based technologies.
Unlicensed Mobile Access (UMA) technology has developed as part of this trend to incorporate IP solutions into mobile device telecommunication systems. UMA technology has recently been accepted into Release 6 of the 3rd Generation Partnership Project (3GPP) and is also referred to as Generic Access Network (GAN) technology. In various implementation schemes, UMA allows wireless service providers to merge cellular networks (such as Global System for Mobile Communications (GSM) networks) and IP-based wireless networks into one seamless service (with one mobile device, one user interface, and a common set of network services for both voice and data). One goal of UMA is to allow subscribers to move transparently between cellular networks and IP-based wireless networks with seamless voice and data session continuity, much like they can transparently move between cells within the cellular network. Seamless in-call handover between the IP-based wireless network and the cellular network ensures that the user's location and mobility do not affect the services delivered to the user.
At an operational level, UMA technology effectively creates a parallel radio access network, the UMA network, which interfaces to the mobile core network using standard mobility-enabled interfaces. For example, UMA can replace a system's GSM radio technology on the lower protocol layers with a wireless LAN or similar technology. A call or other communication may be tunneled to the switch (e.g., mobile switching center or MSC) of a mobile service provider via an access point (e.g., a Wi-Fi access point connected to a modem via the Internet) and gateway (e.g., a UMA network controller). In many, cases, the mobile core network remains unchanged, making it much easier to maintain full service and operational transparency and allowing other aspects of the service infrastructure to remain in place. For example, in many systems that utilize UMA, the existing service provider's business support systems (BSS), service delivery systems, content services, regulatory compliance systems, and operation support systems (OSS) can support the UMA network without change. Likewise, service enhancements and technology evolution of the mobile core network apply transparently to both cellular access and UMA.
As the incorporation of IP solutions, such as UMA, into mobile device telecommunication systems expands, wireless service providers and wireless users may face various obstacles. For example, mobile service subscribers can be hesitant to embrace new technologies with which they are not familiar. The service providers must therefore convince users of the benefits of using VoIP-enabled mobile devices, including dual-mode mobile devices such as those capable of functioning on both GSM and UMA networks. It must be simple for consumers to configure their mobile device to access their local wireless LAN in a secure, reliable manner. For example, using current technology, a technician may have to assist a customer to determine whether the customer's wireless access point has connectivity to a larger network. A customer using an IP-based wireless telecommunications enabled mobile device may not know why her mobile device is unable to place calls via her wireless access point. Alternatively, if a customer has network connectivity but still cannot place VoIP calls, it may be difficult for a customer to know whether he properly configured his access point to connect to his service provider.
The need exists for a system that overcomes the above problems, as well as one that provides additional benefits, such as simplifying the process of configuring, troubleshooting, and acquiring details about VoIP connectivity. Overall, the examples herein of some prior or related systems and their associated limitations are intended to be illustrative and not exclusive. Other limitations of existing or prior systems will become apparent to those of skill in the art upon reading the following Detailed Description
The following description provides specific details for a thorough understanding of, and enabling description for, various embodiments of the technology. One skilled in the art will understand that the technology may be practiced without these details. In some instances, well-known structures and functions have not been shown or described in detail to avoid unnecessarily obscuring the description of the embodiments of the technology. It is intended that the terminology used in the description presented below be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain embodiments of the technology. Although certain terms may be emphasized below, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section.
In general, some network elements are described herein as performing certain functions. Those functions could be performed by other elements in the same or differing networks, which could reduce the number of network elements. Alternatively or additionally, network elements performing those functions could be replaced by two or more elements to perform portions of those functions.
In a communication or set of communications 106, the access point 104 receives IP packets from the telecommunications device 108. These IP packets are then transported through the IP network 114 to a signaling gateway 116, which in the example of
The network system 100 of
Referring to
In general, the described network system 200 accepts registration requests and communication connections from the mobile device 206. The accepted registration requests can be requests to either the cellular telephone network 202 or to the IP-based network 204. Accordingly, to handle requests to the cellular telephone network 202, the cellular telephone network 202 includes one or more cell towers 208 that are configured to accept cellular communications 210 from the mobile device 206. The cell towers 208 are connected to a base station controller 212 (such as a base station controller/radio network controller (BSC/RNC)) via a private network 214. The private network 214 can include a variety of connections (not shown) such as T1 lines, a wide area network (WAN), a local area network (LAN), various network switches, and other similar components.
The base station controller 212 controls communication traffic to a carrier core network 216, where all communications are managed (including both cellular and IP-based). Components of the carrier core network 216 in this example include a switch (e.g., mobile switching center or MSC) 218, which is configured to control data/call flows and perform load balancing, as well as other functions. The carrier core network 216 may also include a variety of system databases such as an operation support subsystem (OSS) database 220, a business support system (BSS) database 222, and home location register (HLR) 224 or other central subscriber database that contains details of a carrier's subscribers for billing, call logging, etc.
The sample network system 200 of
When the mobile device 206 attempts to access the IP network 204 (i.e., to initiate an IP-based communication), information (e.g., data, voice, SMS, etc.) is initially formatted in the cellular system's 202 native protocol and then encapsulated into Internet Protocol (IP) packets, which are transmitted to the access point 226 and routed through the IP network 204 to a security gateway 236. In contrast to non-IP communication requests, such transmissions bypass the cellular telephone system's 202 existing network of radio towers. The security gateway 236 controls access to a network controller 238, which communicates with a data store 240 for logging and accessing communications data. Thus, one function of the network controller 238 is to manage access to the carrier network 216 when dealing with an IP-based communication (in a similar manner to that performed by the base station controller 212 for a non-IP-based communication).
In one example, authentication of a request for access by the mobile device 206 over the IP network 204 is handled by the security gateway 236, which communicates with an authentication, access and authorization (AAA) module 240 that is most likely associated with the carrier network 216. Challenges and responses to requests for access by the mobile device 206 are communicated between the HLR 224 and the AAA module 242. When authorization is granted, the security gateway 236 communicates the assignment of an IP address to the mobile device 206 that requested access. Once the security gateway 236 passes the IP address to the mobile device 206, the public IP address assigned to the mobile device 206 is passed to the network controller 238.
In another authorization example, upon receiving an identifier from the mobile device 206, the network controller 238 may query the data store 242 to determine if the mobile device 206 is authorized for accessing the IP network 204. Sample identifiers that may be utilized to determine access include a media access control (MAC) address associated with an access point, a mobile device or subscriber identifier (such as an International Mobile Subscriber Identifier (IMSI)), an Internet Protocol (IP) address (or “Public IP address”) associated with the access point, a fully qualified domain name (FQDN), or other similar types of information. The data store 242 may be a single database, table, or list, or a combination of databases, tables, or lists, such as one for IP addresses 244, one of MAC addresses 246, and one for FQDNs 248. The data store 242 may include “blocked” identifiers as well as “authorized” identifiers. Authorized accesses to the IP-based wireless telecommunications network may be maintained by the network controller 238 in an authorized session table or similar data construct.
In some cases, the signaling portion of a communication (e.g., the portion of the communication that governs various overhead aspects of the communication such as, for example, when the call starts, when the call stops, initiating a telephone ring, etc.) is routed through the network controller 238 to the switch 218, while the voice bearer portion of the communication (e.g., the portion of the communication that contains the actual content (either data or voice information) of the communication) is routed through the network controller 238 to a media gateway 250. In other words, the media gateway 250 controls the content flow between the service provider and the mobile device 206, while the switch 218 controls the signaling flow (or controls overhead-related flow) between the service provider and the mobile device 216.
The service availability and pricing indication facility can be implemented in environments other than the environments depicted in
Connection LEDs 305, 310, and 315 indicate the number of currently connected mobile devices to the access point 300. That is, a connection LED will be lit when the access point 300 is paired with a mobile device and is currently being used by the mobile device to support an IP-based communication from a mobile device (e.g., a VoIP call). While only three LEDs are depicted in
In the example of
In the example of
In some embodiments, indications about network access and VoIP availability may be made by turning LEDs on or off, by causing an LED to blink on and off, by means of different colors or types of lights, by means of text on an LCD panel, or by some other means. In some embodiments, the method by which the access point provides indications is not restricted to using a user-visible interface on an access point. Instead of, or in addition to, the access point interface, a visual or aural indication may be provided to a user via a mobile device, a personal computer, or other device that can receive and communicate information from the access point.
As an example of an additional way of providing network status to a user of a dual-mode wireless telecommunications device (such as the mobile device 206 of
As shown in screen 410, when the device comes within communication range of an IP-based wireless telecommunications network access point that it has been configured to access, the mobile device will automatically attempt to login to the access point. If the login succeeds, a “Wi-Fi” network icon 415 (or similar icon depending on the type of connection—as connection types other than Wi-Fi are possible such as IEEE 802.16 (“WiMAX”), IEEE 802.20 Mobile Broadband Wireless Access (MBWA), Ultra Wideband (UWB), 802.11 wireless fidelity (“Wi-Fi”), Bluetooth, etc.) is displayed on the screen. The “Wi-Fi” network icon 415 indicates that the device is able to place a call or perform other communications using the access point, should the user desire to do so. The “Wi-Fi” network icon 415 may also be used to represent the relative signal strength of the access point signal by the number of bars displayed in the icon. When the device has logged into the access point, the device may also display the service set identifier (SSID) 417 of the access point, as shown in screen 410. While not shown, in some embodiments, as an alternative to displaying the SSID 417 of the access point on the screen 410, the user can configure preferences that allow the interface to display a user specified name for that access point (e.g., “Home” or “Julie's,” etc.). As shown in all three screens 400, 410 and 420, the device may also display the enhanced operator name string (EONS) 444, so that the user will know the carrier's network to which the mobile device has connected.
If the dual mode device is within communication range of an access point, but the access point is unable to provide connectivity to the mobile device (as described in more detail with respect to
If the access point is able to connect to IP Access Network, at a block 620 the access point turns network LED green to display to the user that IP network connectivity has been established. After achieving IP network connectivity, the power-on sequence proceeds to block 625 where the access point attempts to connect to a security gateway and/or network controller. To request registration, the access point makes a request to create an authorization protocol, such as an extensible authorization protocol for GSM subscriber identity module (EAP-SIM), connection with the network controller.
At block 630, a test is made to determine whether a connection has been achieved with the security gateway and/or network controller. If a connection with the security gateway/network controller cannot be achieved, at a block 645 the access point turns on the IP-based network LED. The power-on sequence then terminates, as the user or system operator must troubleshoot to determine why IP-based network connectivity cannot be established (in the meantime, the network may establish a dummy security gateway that would not require credentialing). If the access point is able to connect to the security gateway/network network controller, at a block 635 the access point changes the color of IP-based network LED to green to display to the user that IP-based network connectivity has been established. Another step that the access point may take is to determine if there is enough bandwidth to exchange sufficient data to enable a voice call (with the awareness/supervision of the SGW). If the bandwidth is sufficient, then the access point changes the color of the VoIP LED to green, indicating that such calls may be made.
It will be appreciated that the access point might periodically repeat one or more of the power-on sequence steps and update the interface lights accordingly so that the lights accurately indicate the status of the access point. The steps may be repeated on an automated basis, at the request of a system administrator, or at the request of a user. Various embodiments of this logic flow may contain these steps in a different order, may exclude some steps, add other steps, or change the logic flow in some combination of the above.
The interface lights on the access point give useful information to both users and customer support personnel. For example, if a customer is performing an initial configuration of access point, he may not know why the access point is not working. By providing an indication to the customer that network access cannot be established by turning network access LED red, the customer can then follow instructions related to resolving a no network access condition. Such instructions might suggest he should check to make sure he configured the cables correctly. As a result, he might resolve the issue more quickly than he would have without information from the LEDs. As another example, a customer may find that she cannot make phone calls using VoIP. Upon inspecting the access point she is using, she can observe that there is no VoIP availability. As a result, she can contact her service provider to determine why the VoIP service appears unavailable from her access point. Since there is an indicator showing that network access is available, but VoIP service is not, neither she nor the customer service representative will need to spend time investigating whether the access point has network access. They can thus quickly focus their investigation on the availability of VoIP service.
Through these indicators, an access point can communicate information about its status to a user. As a result, a customer can provide useful information to a customer service representative, or the customers can use this information to troubleshoot the problem on their own. The information provided by the indicators narrows the range of possible problems and can reduce the amount of time either a customer or customer service representative spends resolving an issue.
In addition to being interested in network status, a user of a dual-mode wireless telecommunications device may also be interested in learning about location-based pricing options for a given telecommunications transaction, especially in the case where the cost to a user of using the device to make an IP-based telecommunications transaction is based, at least in part, on location and/or the particular network components being used to access the IP network. For example, when using Wi-Fi access points to connect to the network, a user may be charged according to the actual Wi-Fi access point being used. To further illustrate, according to the specific service plan that the user has selected, a user with her own access point at home may only be charged when accessing the IP network through an access point other than the one that is in her home. In another example, certain access point owners, such as retailers, may partner with a mobile telecommunications service provider to offer use of their own access points at no charge (e.g., as a part of a promotion) to users who may otherwise pay a per-transaction charge for communication transactions involving such an access point.
To help a user understand when and how much he or she will be charged for partaking in an IP-based telecommunications transaction the user's device may include a user interface that provides such information, as depicted in
Referring to
Screen 710 of
The screens 720 and 730 of
With respect to
At block 801 the routine receives information from the mobile device or from the access point that can be used in making a pricing determination. The types of information that the routine receives at block 801 may include information such as a subscriber identifier (e.g., MSISDN or IMSI), current mobile device location information (e.g., GIS coordinates), information about the mobile service cells in the area (e.g., GSM cell ID as recorded by the mobile device), MAC address(es) or range(s) related to the access point, the SSID for the access point, the IP address from which the communication is coming from, a cell global identifier (CGI), etc. Some or all of this information may be gathered by the mobile device and communicated to the appropriate carrier network component(s) during a conventional registration process. For example, the MAC information and the SSID for the access point may be gathered by the mobile device during its initial handshake with the access point. Some of this information may also be obtained directly from the access point.
Once the routine 800 has received the appropriate information (as described in block 801), the routine 800 proceeds, at block 802, to process the received information to make a pricing indication decision. This may include conducting one or more database lookups. For example, a carrier network database (such as the data store 242 of
The result of this processing in block 802 may include a session variable (e.g., a “billing zone” or other variable) to be used for communications made from that access point. Thus, at block 803, the routine 800 passes this session variable to the switch or other carrier network component for billing purposes. The result of the processing at block 802 may also result in the generation of an icon indicator or text that shows the result of the pricing indication decision. At block 804 the routine returns an icon or text back to the mobile device or transmits a code reflective an icon or text to the mobile device. The mobile device may be configured (e.g., as part of the 3GPP UMA standard) to retrieve icon indicator data from the network at the time of registering with the network. The icon indicator and/or text can then be displayed to the user of the mobile device, for example, on an idle screen as shown in
Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” As used herein, the terms “connected,” “coupled,” or any variant thereof, means any connection or coupling, either direct or indirect, between two or more elements; the coupling of connection between the elements can be physical, logical, or a combination thereof. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, shall refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or,” in reference to a list of two or more items, covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list.
The above detailed description of embodiments of the system is not intended to be exhaustive or to limit the system to the precise form disclosed above. While specific embodiments of, and examples for, the system are described above for illustrative purposes, various equivalent modifications are possible within the scope of the system, as those skilled in the relevant art will recognize. For example, while processes or blocks are presented in a given order, alternative embodiments may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed in parallel, or may be performed at different times. Further any specific numbers noted herein are only examples: alternative implementations may employ differing values or ranges.
The teachings of the methods and system provided herein can be applied to other systems, not necessarily the system described above. The elements and acts of the various embodiments described above can be combined to provide further embodiments.
Any patents and applications and other references noted above, including any that may be listed in accompanying filing papers, are incorporated herein by reference. Aspects of the technology can be modified, if necessary, to employ the systems, functions, and concepts of the various references described above to provide yet further embodiments of the technology.
These and other changes can be made to the invention in light of the above Detailed Description. While the above description describes certain embodiments of the technology, and describes the best mode contemplated, no matter how detailed the above appears in text, the invention can be practiced in many ways. Details of the system may vary considerably in its implementation details, while still being encompassed by the technology disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the technology should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the technology with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the invention encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the invention under the claims.
While certain aspects of the technology are presented below in certain claim forms, the inventors contemplate the various aspects of the technology in any number of claim forms. For example, while only one aspect of the invention is recited as embodied in a computer-readable medium, other aspects may likewise be embodied in a computer-readable medium. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the technology.
This application is a Continuation of U.S. application Ser. No. 12/446,448 filed Apr. 20, 2009, which is a U.S. National Stage application of International Application No. PCT/US07/82160, entitled SYSTEM AND METHOD TO INDICATE IP-BASED WIRELESS TELECOMMUNICATIONS SERVICE AVAILABILITY AND RELATED INFORMATION, filed Oct. 22, 2007, which claims priority to U.S. Provisional Patent Application No. 60/862,596, filed Oct. 23, 2006, entitled “System and Method to Indicate IP-Based Wireless Telecommunications Service Availability,” and U.S. Provisional Patent Application No. 60/853,149, filed Oct. 20, 2006, entitled “Personalization of Telecom Service Based Upon User Location,” each of which is hereby incorporated by reference into the present application.
Number | Date | Country | |
---|---|---|---|
60862596 | Oct 2006 | US | |
60853149 | Oct 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12446448 | US | |
Child | 13073944 | US |