Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for location reporting in an untrusted network environment

A technology for reporting, location information, used in the field of communications

Inactive Publication Date: 2016-03-09
CISCO TECH INC
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are significant challenges to knowing the location of subscribers, especially for untrusted connection points within the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for location reporting in an untrusted network environment
  • System and method for location reporting in an untrusted network environment
  • System and method for location reporting in an untrusted network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] overview

[0014] In an example embodiment, a method is provided, and the method may include: retrieving, by a user equipment (UE), an AP medium access control (MAC) address of an access point (AP) to which the UE is connected, wherein the The AP is in an untrusted Internet Protocol (IP) access network; using the Internet Key Exchange Version 2 (IKEv2) protocol to report the location information of the UE to the Evolved Packet Data Gateway (ePDG) through the SWu interface, where the location information at least partially includes: The location of the UE in Global Positioning System (GPS) coordinates, the service set identifier (SSID) of the untrusted IP access network, the retrieved APMAC address, and cell identification (ID) information for the UE; and using the UE The location information of the UE populates a location database, wherein the location database at least partially includes location information of other UEs in the untrusted IP access network.

[0015] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the UE is connected; reporting location information for the UE to an evolved Packet Data Gateway over an SWu interface using Internet Key Exchange version 2 (IKEv2) protocol, wherein the location information includes, at least in part, a UE location in GPS coordinates, a service set identifier, the retrieved AP MAC address and cell identity information for the UE; and populating a location database with the location information. The method can include embedding the location information in an identity initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message using a Network Access Identifier (NAI) and communicating the location information from the ePDG to a PGW over an S2b interface using a private extension information element of GPRS Tunneling Protocol version 2 (GTPv2).

Description

technical field [0001] The present disclosure relates generally to the field of communications, and more particularly to systems and methods for location reporting in untrusted network environments. Background technique [0002] Networked architectures in communication environments, especially mobile wireless environments, have become increasingly complex. As end users become increasingly connected to the mobile wireless environment to do business, shop, interact with friends, maintain personal finances, and perform many other everyday functions, mobile communication networks have grown substantially in subscriber base. As the number of mobile subscribers increases, efficient management of communication resources becomes even more critical. In some instances, management of resources relies on the service provider knowing where the subscriber is connected to the network. Subscriber location is also required for lawful interception. There are significant challenges to knowi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/02H04L29/06H04W4/021H04W4/029H04W4/80
CPCH04L63/0428H04W4/02H04W12/02H04L63/30H04W48/16H04W4/029H04W4/80H04W84/12H04W4/021H04W4/027H04W12/06H04W12/033H04W12/0431H04L61/503H04L2101/622H04L2101/659H04W72/53H04W64/00H04J11/00H04L63/0892H04L69/16H04W8/04H04W88/02H04W88/12H04W88/16
Inventor 阿布舍克·达玛瓦特阿伦·卡旺德
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products