CN101273654A - Method and apparatus for locating a wireless local area network in a wide area network - Google Patents

Method and apparatus for locating a wireless local area network in a wide area network Download PDF

Info

Publication number
CN101273654A
CN101273654A CN200680035227.3A CN200680035227A CN101273654A CN 101273654 A CN101273654 A CN 101273654A CN 200680035227 A CN200680035227 A CN 200680035227A CN 101273654 A CN101273654 A CN 101273654A
Authority
CN
China
Prior art keywords
fingerprint
mobile device
information
wireless telecom
telecom equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200680035227.3A
Other languages
Chinese (zh)
Other versions
CN101273654B (en
Inventor
S·纳恩达
A·高吉科
M·M·德什帕德
N·简恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/355,538 external-priority patent/US8483704B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN101273654A publication Critical patent/CN101273654A/en
Application granted granted Critical
Publication of CN101273654B publication Critical patent/CN101273654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure is directed to a mobile communication device that measures characteristics or attributes of a first communications network that vary according to physical location within that first communications network to create a fingerprint, or signature, of a location within the first communications network. When the fingerprint of the current location of the mobile device is created it can be compared to a known fingerprint associated with a second communication network to determine the mobile device's proximity to the second communications network. Furthermore, the second and subsequent fingerprint that are generated for a particular communications network can be used to modify the stored fingerprint so as to refine it to improve detecting the proximity to the communications network.

Description

Be used to safeguard the method and apparatus of the fingerprint of wireless network
Priority request under 35U.S.C. § 119
Present patent application requires to transfer the assignee of the present invention and is clearly quoted thus and include the provisional application No.60/702 that is entitled as " ASSISTED WIRELESS NETWORK ACCESS POINTSEARCH IN WIRELESS COMMUNICATION NETWORKS (formula of the receiving aid wireless network access point search in the cordless communication network) " that submits to 25 days July in 2005 herein in, 591, with the provisional application No.60/750 that is entitled as " METHOD AND APPARATUS FOR LOCATING A WIRELESS LOCALAREA NETWORK IN A WIDE AREA NETWORK (being used for method and apparatus) " that submitted on December 16th, 2005 in wide area network location WLAN (wireless local area network), 920, and the provisional application No.60/750 that is entitled as " METHOD AND APPARATUS FOR MAINTAINING A FINGERPRINT FOR AWIRELESS NETWORK (safeguarding the method and apparatus of the fingerprint of wireless network) " of submission on December 16th, 2005,919 priority.
Background
The field
The disclosure relates generally to telecommunications, relates in particular to the system and method for the mobile communication equipment that support can communicate by letter via two kinds of dissimilar communication networks.
Background
The demand of wireless messages business caused developing the ever-increasing wireless network of number.CDMA20001x only provides an example of the wireless network of wide area telephony and data service.CDMA20001x is the wireless standard by a kind of employing code division multiple access (CDMA) technology of third generation partnership projects 2 (3GPP2) promulgation.CDMA is that a kind of spread processing that adopts allows a plurality of users to share the technology of a shared communication media.A kind of competitive wireless network that generally adopts in Europe is global system for mobile communications (GSM).Different with CDMA20001x, GSM utilizes arrowband time division multiple access (TDMA) to support radio telephone and data service.Some other wireless network comprises with the data transfer rate that is suitable for Email and web browse application to be supported the GPRS (GPRS) of high-speed data service and can throw in Voice ﹠ Video and use the used broadband voice and the global mobile communication system (UMTS) of data.
These wireless networks can be considered to adopt to vague generalization the wide area network of cellular technology.Cellular technology is based on the topological structure that geographical coverage area wherein is broken down into some cellular cells.A fixed base transceiver station (BTS) of communicating by letter with each mobile subscriber is arranged at these cellular cells in each.The just suitable gateway that in geographical coverage area, adopts a base station controller (BSC) to control each BTS and communication is routed to each packet switching network and Circuit Switching Network usually.
Along with the demand sustainable growth to the wireless messages business, mobile device just provides the Seamless Network between wide area cellular network and the WLAN (wireless local area network) (LAN) to cover in evolution to support integrated voice, data and Streaming Media simultaneously.The general use of WLAN provides phone and data service such as standard agreements such as IEEE 802.11, bluetooths on less relatively geographic area.The existence of WLAN provides the infrastructure by utilizing WLAN that cellular communication is expanded to no license frequency spectrum increases user capacity in wide area cellular network rare chance.
Recently, adopted various technology that mobile device can be communicated by letter with different networks.Adopted the technology of replenishing to allow the existence of mobile device search WLAN to have determined whether that WLAN can be for connecting.But, frequently or constantly search for unnecessarily consumed power of WLAN, and may make the battery repid discharge in the mobile device.Thus, by searching for available wireless LAN intelligently, can make portable terminal realize the improvement of power consumption and battery life.A kind of mode that improves search efficiency is to optimize adaptively to be used to determine whether the nigh criterion of WLAN.
Summary
An aspect relates to a kind of Wireless Telecom Equipment that comprises the memory of the information that is configured to store the position that relates to first communication network.This equipment also comprises and is configured to be stored in above-mentioned information processing device in the above-mentioned memory based on the one or more reference signal corrections from the second communication network.
Another aspect relates to a kind of Wireless Telecom Equipment that comprises processor and memory, and this memory configurations becomes first fingerprint based on one or more reference signals of second communication network of storage first communication network.This processor is configured to determine second fingerprint of this wireless device and based on above-mentioned first fingerprint of this second fingerprint correction based on these one or more reference signals.
Another aspect relates to a kind of communication means, and it comprises that storage relates to the information of the position of first communication network; And based on the one or more reference signal correction institute canned data of second communication network.
Should understand, other embodiment of the present disclosure will be that those skilled in the art institute is apparent because of follow-up specifying, and only illustrate in specifying and describe each embodiment of the present disclosure by illustrating.As recognizing, the disclosure can have other and different embodiment, and its several details can make an amendment aspect each other, and all these can not break away from spirit and scope of the present disclosure.Correspondingly, should to be considered to be illustrative and not restrictive in itself for accompanying drawing and specifying.
Brief Description Of Drawings
Non-limiting various aspects that illustrate wireless communication system by example in the accompanying drawings, wherein:
Figure 1A is the conceptual schema of an embodiment of wireless communication system;
Figure 1B is the conceptual schema of another embodiment of wireless communication system;
Fig. 2 illustrates both functional block diagram of an example of mobile device of can supporting cellular communicating by letter with WLAN; And
Fig. 3 A has described a kind of flow chart of creating the illustrative methods of fingerprint on mobile communication equipment;
Fig. 3 B has described a kind of flow chart of illustrative methods of the fingerprint of comparing diverse location;
Fig. 4 has described the flow chart of a kind of optimization at the illustrative methods of the existing fingerprint of known location;
Fig. 5 has described a kind of flow chart that is used to select the illustrative methods of cordless communication network;
Fig. 6 has described a kind of flow chart that is used to carry out at the illustrative methods of the global search of wireless network;
Fig. 7 has described a kind of flow chart that is used to carry out at the illustrative methods of the fingerprint search of wireless network;
Fig. 8 has described a kind of fingerprint and the adjacent first flow chart of execution at the illustrative methods of changing the hand search of wireless network of tabulating of utilizing.
Specify
Below in conjunction with the explanation that is intended to as each embodiment of the present disclosure that specifies of accompanying drawing elaboration, but not the intention representative can be put into practice unique embodiment of the present disclosure therein.Originally specify to providing purpose to comprise detail to thorough of the present disclosure.In certain embodiments, known structure and assembly illustrate with the notion of the present disclosure of avoiding confusion with the block diagram form.
In follow-up specifying, will change hand from a network in conjunction with the mobile subscriber and describe various technology to another network.Have in these technology and severally will navigate within one or more WLAN at mobile communication equipment and distribute and describe under the background among the wide area WAN that spreads all over the WAN overlay area.This mobile communication equipment can be any suitable device that can carry out radio telephone or data communication, such as cell phone that designs for working in the CDMA20001x network etc.This mobile communication equipment can be to adopt any suitable agreement to visit WLAN, comprises for example IEEE 802.11.Although these technology may be can with the background of the WAN phone of IEEE 802.11 network services in describe, these technology can be expanded the mobile communication equipment that can visit multimeshed network to other.For example, these technology can be applied to the mobile communication equipment that can switch between CDMA20001x network and GSM network.Correspondingly, to can only being intended to illustrate various aspects of the present disclosure, should understand these aspects scope that is widely used simultaneously with cell phone or any citation of any other specific embodiment of IEEE 802.11 network services.
Figure 1A is the conceptual schema of an embodiment of wireless communication system.Dividing a word with a hyphen at the end of a line in WAN 104 with a series of mobile devices 102 that have been shown in dotted line among the figure.WAN 104 comprises that support is dispersed throughout the BSC 106 of several BTS of this WAN overlay area.In Fig. 1, show single BTS 108 for ease of explanation.Can use mobile switching centre (MSC) 110 to provide to the gateway of public switch telephone network (PSTN) 112.Although do not illustrate in Fig. 1, the geography that WAN 104 can adopt numerous BSC of each self-supporting arbitrary number BTS to expand WAN 104 extends.When spreading all over WAN 104 and adopt a plurality of BSC, MSC 110 also can be used to coordinate the communication between each BSC.
WAN 104 also can comprise the one or more WLAN that are dispersed throughout this wide-area wireless overlay area.Single WLAN 114 has been shown among Fig. 1.WLAN 114 can be IEEE 802.11 networks or any other suitable network.WLAN 114 comprises access point 116 so that mobile device 102 can be communicated by letter with IP network 118.Can adopt server 120 to make IP network 118 and provide to MSC 110 interfaces of the gateway of PSTN 112.
When initially mobile device 102 being applied power, it will be attempted or insert WAN 104 or insert WLAN 114.The decision-making that inserts particular network can be depending on the various factors that relates to concrete application and overall design constraints.For example, mobile device 102 can be configured to insert WLAN 114 when service quality satisfies minimum threshold.Can utilize WLAN 114 to support mobile phone and data communication to much degree, just can the valuable bandwidth of much degree ground release use for other mobile subscribers.
Mobile device 102 can be configured to search for constantly or periodically from the access point 116 or the beacon of any other access point of WLAN.This beacon is the cyclical signal that has synchronizing information by access point 116 emissions.But the WLAN beacon search require mobile device so that be tuned to possible WLAN channel in one or more operational frequency bands of wlan system, and on this channel, carry out or initiatively or passive scanning.In drive sweep, mobile device only be tuned to this channel and the reception of carrying out specific a period of time to wait for beacon transmissions.In active scan, mobile device be tuned to this channel and implement be used to avoid with this channel on the access procedure of existing device conflict after transmit probe request.In case receive this probe request, access point just transmits probe response to this mobile device.Fail to detect beacon or do not receive under the situation of the probe response---just may be this situation if the mobile device 102 that is in position A is applied power---to probe request at mobile device 102, then mobile device 102 attempts to insert WAN 104.With regard to the Figure 1B that describes after a while, mobile device 102 is not (or periodically) scanning WLAN access point constantly, only just scans the WLAN access point but replace when it determines oneself near WLAN 114.Mobile device 102 can insert WAN 104 by the pilot signal of catching from BTS 108.In case catch this pilot signal, just can between mobile device 102 and BTS 108, set up dedicated radio link by means of means as known in the art.Mobile device 102 can utilize the radio company with BTS 108 to fetch 110 registrations to MSC.Registration is that to use the whereabouts that makes oneself be process known to the WAN 104 to mobile device 102.When registration process was finished, mobile device 102 can enter Light Condition, until or initiated calling by mobile device 102 or by PSTN 112.No matter be which kind of situation, all can between mobile device 102 and BTS 108, set up aerial traffic link to set up and to support this calling.
When in the embodiment that is described, when mobile device 102 is divided a word with a hyphen at the end of a line in WAN 104 from A in-position, position B, just can detect beacon now from access point 116.In case this situation takes place, just can set up dedicated radio link between the two by means as known in the art.Mobile device 102 obtains the IP address of server 120 then.Mobile device 102 can utilize the service of name server (DNS) to determine the IP address of this server.The domain name of server 120 can be thrown in by WAN 104 and be given mobile device 102.The IP address has been arranged, and mobile device 102 just can be set up with the network of server 120 and be connected.Connect in case set up network, just can measure coupling from the information of server 120 and determine whether the service quality of WLAN 114 is enough to mobile device 102 is changed hand to access point 116 with this machine.
Although described honeycomb WAN with should be noted that Figure 1A vague generalization, also can adopt other WAN.This can comprise WAN that those do not adopt MSC or other honeycombs and adopt those WAN that comprise wideband CDMA (WCDMA), TD-CDMA, GSM or other communication protocols such as like that.
Referring now to Figure 1B,, WLAN 114 and BTS 108 be illustrated in that a plurality of BTS 122,124,126 also have a plurality of WLAN 129,131 and the background of the big WAN of the access point 128,130 that is associated in.As shown in Figure 1B, mobile device 102 is not in the overlay area of any WLAN.Thus, the acquisition beacon signal will prove futile and consumed power unnecessarily when on this position.Even if mobile device can enter dormancy or idle mode continually preserving power, search WLAN beacon signal is consumed power rapidly also.In typical 802.11 network configuration, these beacon signals are to take place on the interval with tens of milliseconds of meterings; Mobile device must have this section period maintenance at least to revive and search for by every channel thus, consider that Wireless LAN access point may dispose at the different channels in different frequency scope and those scopes, mobile device 102 must have the time of appreciable amount will keep reviving could search for available wireless LAN access point.Similarly, in the situation of active scan, mobile device must continue to revive to implement the channel access procedure on this channel, transmits probe request then and continues to revive to receive probe response.It must carry out this process on each channel.In this case, mobile device 102 also must have the time of appreciable amount to keep reviving with search available wireless LAN access point, and this may cause power consumption and processing expenditure to increase.
As known in the art, mobile device 102 supervision are from the beacon and the pilot signal of each base station of cellular network.These signals can comprise pilot tone and paging signal.Mobile device monitors that these signals carry out the hand that changes between the base station to measure main signal and adjacent signal strength signal intensity.Equally each base station by synchronous network in, the phase place that mobile device also can be measured each pilot signal is assisted to change hand and is determined.Thus, on any position in network 104, but mobile device 102 is observed the most nearly n base station that measure signal intensity is arranged, and these signal strength signal intensities can be characterized as being two vector x 1..., x nAnd y 1..., y nIn this each x value is signal strength signal intensity from the pilot signal of base station, and each y value is the phase place from this pilot signal of base station.When observed signal was less than n, its residual value was set as sky.Because it is associated that pilot signal has pilot phase to be offset, be to start from a certain base station so these signal strength signal intensities and phase place can easily be designated.In as other WAN technology such as GSM, adjacent base station can be identified by its frequency channels or other Base Station Identifications signal strength signal intensity first and that be associated with each base station.
In WCDMA, each base station may be by not synchronously.As among the CDMA, when residing in Light Condition on the paging channel of mobile device in certain base station, its scans for neighbor base station signals.In the situation of CDMA, each base station utilizes the skew of same pseudorandom sequence spreading.In the situation of WCDMA, several signals of each base station, these signals be designed to allow mobile radio station catch fast with by these signals of this base station synchronously, and in case synchronous just determine expansion code group and the extended code that adopt this base station.This collection extended code and signal strength signal intensity thereof can be used to create the fingerprint that is used for being identified at the position that WCDMA covers, and it is corresponding to pilot frequency deviation in the cdma system and pilot signal strength.Base skew in the time of also can utilizing adjacent base station relative, it is corresponding to the pilot phase among the CDMA, if but each base station not by synchronously, then its clock may have relative drift, thus the base skew becomes insecure index when making.
But,, just can realize considerable Power Cutback by the acquisition beacon signal limiting is in the period of zone in 140 in mobile device.Thus, when mobile device 102 was periodically revived with paging channel among the monitoring WAN or quick paging channel, mobile device can also be determined the position of oneself.If mobile device is determined the position of oneself and is in the zone 140 that then it can search for the WLAN beacon signal.Otherwise mobile device can be avoided unnecessarily acquisition beacon signal.
Mobile device 102 can monitor from the beacon of each base station of WAN and pilot signal.These signals can comprise pilot tone and paging signal.Mobile device monitors that these signals carry out the hand that changes between the base station to measure main signal and adjacent signal strength signal intensity.Equally, each base station by synchronous network in, the phase place that mobile device also can be measured each pilot signal is assisted to change hand and is determined.Thus, on the optional position in network 104, but mobile device 102 is observed the most nearly n base station that measure signal intensity is arranged, and these signal strength signal intensities can be characterized as being two vector x 1..., x nAnd y 1..., y nIn this each x value is signal strength signal intensity from the pilot signal of base station, and each y value is the phase place from this pilot signal of base station.When observed signal was less than n, its residual value was set as sky.Because it is associated that pilot signal has pilot phase to be offset, be to start from a certain base station so these signal strength signal intensities and phase place can easily be designated.In as other WAN technology such as GSM, adjacent base station can be identified by its frequency channels or other Base Station Identifications signal strength signal intensity first and that be associated with each base station.In some aspects, can utilize anyly be used to catch, signal regularly etc. is as the signal that is used for obtaining forming the measurement of above-described these one or more vectors.In addition, these vectors need not to be formed, to store or use as two vectors as described or include these information with above-described form.Thus, in some respects, utilization be for example to identify the source of the reference signal of pilot tone or paging signal etc. and the information of at least one feature.
This information can be used as the notional fingerprint or the signature of the position of mobile device 102.Thus, if each position in zone 140 has a certain known fingerprint, then mobile device just can be determined its current fingerprint and itself and known fingerprint are compared to determine whether this mobile device is positioned at zone 140.Although two attributes (that is, pilot signal strength and phase place) that utilize WAN are only mentioned in top discussion.In addition, as discussed above, can use other dynamic attributes of WAN to replace or use in conjunction with these two attributes.For example, can use pilot offset values as fingerprint; Even the number of pilots signals available also is a possibility attribute that uses for fingerprint.In addition, each attribute of formation fingerprint may not be the attribute of WAN.For example, many mobile devices have and can be used for determining the GPS receiver of mobile device with respect to the position of WLAN.GPS information can be by direct or even use indirectly.As an example of a kind of situation in back, base station IDs can be used for defining fingerprint corresponding to the position of this mobile device with the phase measurement from different Satellite GPS signals.Thus, under the meaning of its broad sense, fingerprint is the set of the attribute that changes of the position-based of first communication network, but and mobile device be used for determining the adjacency of second communication network.In addition, fingerprint also can comprise the feature (for example, the MAC ID of WiFi access point, frequency accent, channel, RSSI information) of the transmitter of second communication network.In such example, the WAN parameter can be considered to trigger parameter, thus the match triggers WLAN of these parameters search.These WLAN parameters can be used as the search parameter of the search that is triggered at searching period.
These attributes can calculate and can not break away from the scope of the present disclosure with various different modes.For example, desirable such as the instant measurement of attributes such as pilot signal strength and phase place and used as fingerprint.But even when mobile device is static, the value of these attributes also can change because of the environment changeability.Correspondingly, desirable multiple measurement and be averaged together or go up meaningful ways with certain statistics and made up and generate fingerprint.
Fig. 2 illustrates to support communicate by letter with WLAN both functional block diagram of an example of mobile device of WAN.Mobile device 102 can comprise WAN transceiver 202 and WLAN transceiver 204.In at least one embodiment of mobile device 102, WAN transceiver 202 can be supported CDMA20001x, WCDMA, GSM, TD-CDMA or other WAN communications with BTS (not shown), and WLAN transceiver 204 can be supported to communicate by letter with the IEEE 802.11 of access point (not shown).Should be noted that these notions of describing in conjunction with mobile device 102 can be extended to other WAN and wireless lan technology.Each transceiver 202,204 is illustrated as has independent antenna 206,207 separately, but transceiver 202,204 also can shared single broad-band antenna.Each antenna 206,207 can be realized with one or more radiant elements.
Mobile device 102 also is illustrated as to have and is coupled to both processors 208 of transceiver 202,204, and still, each transceiver also can use independent processor in the alternative embodiment of mobile device 102.Processor 208 can be implemented as hardware, firmware, software or its combination in any.For example, processor 208 can comprise microprocessor (not shown).This microprocessor can be used to support (1) to control and manage to make to the access of wide area wireless communication network and WLAN and (2) processor 208 interfaces to keypad 210, display 212, reach other user interfaces (not shown) and other software application.Processor 208 also can comprise the digital signal processor (DSP) (not shown) that has support such as convolutional encoding, Cyclic Redundancy Check function, modulation, reaches the embedded software layer of various signal processing functions such as spread processing.This DSP also can carry out vocoder functions with support telephony applications.The mode that realizes processor 208 will depend on concrete application and the design constraint of forcing at whole system.Should be noted that hardware, firmware and software arrangements are in these circumstances and how to realize best that at each application-specific under the described function collection be interchangeable.
Processor 208 can be configured to carry out the algorithm that change hand of triggering from a network to another.This algorithm can be implemented as one or more software application of being supported by the framework of discussing in the early time based on microprocessor.Alternatively, this algorithm can be and processor 208 separate modules.This module can realize in hardware, software, firmware or its combination in any.Depend on the specific design constraint, this algorithm can be integrated in any entity of 102 li of mobile devices, or the multiple entity of striding in the mobile device 102 distributes.
For some purpose known in the art, from the signal strength signal intensity of access point can be at mobile device 102 places with receiving that signal strength indicator (RSSI) piece 216 measures.This RSSI feeds back to the measurement of WLAN transceiver 204 for the intensity of the existing signal of the usefulness of automatic gain control, therefore can not increase mobile device 102 circuit complexity be provided for processor 208.Alternatively, the quality of dedicated radio link can be determined from beacon.Because beacon is the known spread-spectrum signal of priori, so the copy of this beacon can be stored in the memory 211 at mobile device 102 places.Can demodulated beacon this replica beacon in being stored in memory be used for estimating the energy of the beacon launched by means as known in the art.
Get back to previously mentioned fingerprint, mobile device 102 also comprise processor 208 can carry out with create multiple fingerprint and with different fingerprints with each other the comparison algorithm.For example, use keypad 212, the user of mobile device 102 just can select to make mobile device 102 to create current fingerprint also with the key of this fingerprint storage in memory 211.If when this fingerprint is created, this mobile device is to be connected to a WLAN, and then the fingerprint of being stored will be associated with this Wireless LAN access point.In addition, the incident that also can on periodic basis, maybe should programme of this fingerprint---such as successfully inserting, needing service quality successfully to insert etc.---and by record automatically to close.
As the result of top process, memory 211 can comprise the WLAN search list that is similar to the ground layout of following table for example:
Figure A20068003522700121
First row of last table are meant the WAN ID of WAN.WAN ID identifies system and the network of this WAN, promptly is called SID/NID in wide area wireless system.Certain base station among the WAN can be by pilot frequency deviation, pilot signal strength, or as other attributes of the part of the formation fingerprint discussed below identify.The position of fingerprint sign mobile device.Secondary series is meant the textual identifier of wlan network.The 3rd identifier is meant Wireless LAN access point (being also referred to as BSS).Three access point (A are arranged in first overlay area of base station A in this exemplary table 1, A 2, A 3).Similarly, two access points are arranged in the overlay area of base station B.Certainly, in the zone that covers by any WANID, much more WLAN can be arranged, but the user of mobile device may be associated and they are lost interest in because of those access points with WLAN that this user is not allowed to access.Correspondingly, last table can only comprise the fingerprint of those access points that this user is typically connected to.
All the other these two row comprise those values that constitute fingerprint itself.In this sample table, access point A 1, A 2And A 3Fingerprint comprise intensity and phase information.But, access point B 1And B 2Fingerprint only comprise signal strength information.Although be also noted that each fingerprint in this table is is that the vector of n comes annotation by length, the non-null components of this vector may be less than n.That is, have several values may be sky, thereby fingerprint comparison is restricted to the vector component of those non-NULLs.At work, mobile device can from dormancy or idle mode is revived and to its current location calculated fingerprint again with the comparison of the information in the row 4 and 5 itself and the last table.Mobile device is defined in fingerprint matching and oneself corresponding clauses and subclauses of WAN ID when its registration of forward direction usually.Thus, when when WAN ID A registers, only use and go up the fingerprint that is associated with WAN ID A in the table and mate.Fingerprint creation and comparison also can take place during the afoot calling.Based on this comparison, mobile device can define access point that a SSID and BSSID indicate and be close to and can search for its beacon signal completely in row 1 and 2; Otherwise it can return idle mode and needn't take a lot of trouble to search for the WLAN beacon signal.
Last table is exemplary in essence and had not both described all possible information that can be used to characterize fingerprint and also do not described WAN ID all various combinations with respect to access point ID.For example, covered because most of zones have the multiple WAN service supplier of its own WAN ID (SID/NID) separately, so the clauses and subclauses of an access point may occur repeatedly, each is associated with different WAN ID and separately signature is arranged.Except the table of describing above, can adopt independent table (maybe may adopt the clauses and subclauses that add in the original table) to store about responding the information of access point (that is BSS ID).For example, Wireless LAN access point is configured to work on the particular channel in a special frequency band usually.Thereby this table can comprise the job information of this access point makes mobile device can use it to the acquisition beacon signal, rather than requires different may the making up of mobile device search traversal.Other information about access point can comprise its ability, such as fail safe, service quality, throughput, and networking information.
Flow chart with reference to figure 3A comes the establishment of fingerprint table is explained.At frame 302, mobile device is connected to WLAN.Benefit under the situation of any fingerprint that prestores having no way of, mobile device scans the WLAN access point with typical way.In case mobile device is connected with this access point, the user just can catch current fingerprint at this equipment of frame 304 signalings.This function can be Client-initiated usually,---such as common those WLAN of subscribing or connecting of user---is stored in the fingerprint database because the user may only want some WLAN.But the establishment of fingerprint also can be initiated as one of these many functions of carrying out when being connected to WLAN automatically by mobile device.
At frame 306, mobile device catch to constitute the value of those attributes of fingerprint, and at frame 308, this equipment with this fingerprint storage in database.It will be favourable that the attribute of the WLAN that is currently connected to is also stored with this fingerprint.
Current fingerprint can be carried out in various manners with the comparison of depositing fingerprint and can not break away from the scope of the present disclosure.The following describes a kind of particular technology.But, many replacements but on the function equivalence technology also may be utilized.
The value that the attribute that constitutes fingerprint may have variations (even also can change for same position) or be difficult to the measurement of high accuracy ground.Thus, the comparison between the fingerprint should not depend on exact duplicity as the test of determining coupling.Similarly, zone 140 may reflect with the false alarm to be that cost is given the operation that detects the higher importance of access point earlier decision-making.In other words, more much bigger than zone 114 if zone 140 is selected to, then mobile device 102 can just not determine oneself to answer acquisition beacon signal (that is false alarm) in it also is in regional 114.But if the zone 140 is selected near fitted area 114, then will have mobile device should be at the acquisition beacon signal but fingerprint matching algorithm does not instruct it to make the situation of search as yet.
Be this type of changeability of reply fingerprint, definition one helps to control determines whether fingerprint mates " departing from " amount of having deposited fingerprint.
Figure A20068003522700131
Last table comprises the deviation value of signal strength signal intensity and the independent deviation value of phase bit position of fingerprint.To explain the use of these values about the flow chart of Fig. 3 B.At frame 320, mobile device is revived or is controlled to catch the fingerprint of its current location.The signal strength signal intensity of fingerprint of continuing has a vector and phase place that the example of one vector is arranged, and gathers a pair of vector x 1..., x nAnd y 1..., y n
At frame 322, check the table clause of current WAN ID and definite access point that is associated with this WAN ID.Can observe the identifier of pilot tone by search in database, further search optimization is in the cards.For cdma network, search criteria can be the PN phase deviation that can observe pilot tone.Next frame 324 with these access points separately fingerprint and current fingerprint comparison to have determined whether coupling.On algorithm, this comparison and definite following execution:
Arrive n for i=1:
Determine whether | x i-s i() |<d i()
Determine whether | y i-p i() |<q i()
Thus, deviation value d and q can be used to select current fingerprint (x and y vector) coupling to have deposited fingerprint (s and p vector) to how many approaching degree.These deviation values are big more, and the difference of these values just can be big more but still has coupling.
If coupling is arranged at frame 324, then frame 326 can make all difference of determining given access point (for example, | x i-s i() | and | y i-p i() |) whether sum also drop on chosen wantonly the comparison under separately the threshold value (for example X and Y).This test that adds can help to capture individual difference may show some sight that mates but can determine not mate when generally considering fingerprint.
If the test in frame 324 and 326 is satisfied a Wireless LAN access point in the last table, then mobile device is controlled to search for the beacon signal of this access point.If in frame 324 or 326 coupling not, then mobile device continues to seek the coupling on another fingerprint of another BSS ID.Under the situation that has an above access point fingerprint matching current location fingerprint, then can make the size of difference or difference sum or other certain determine to select that access point of the current fingerprint of the most approaching coupling of its fingerprint.In the situation of this multiple coupling, when mobile device scanning WLAN access point, it can locate one or more access points.
Fig. 4 has described a kind of flow chart of optimizing the illustrative methods of fingerprint entries.At frame 402, mobile device is connected to the access point of WLAN as known in the art after search and catching beacon signal.This access point has the MAC Address that is used as its BSS ID.Also can use other sign units to distinguish diverse access point; But BSS ID is worth easily.At frame 404, mobile device determines whether its access point that is connected to has clauses and subclauses in fingerprint table thus.If no, then can generate current fingerprint (referring to Fig. 3 A) and at frame 406 with its storage.If the existing fingerprint entries of this access point exists, then can utilize current fingerprint to optimize and deposit fingerprint at frame 408.---if having---also can be optimised as the part of this optimizing process, at frame 410 deviation values.
This optimizing process utilizes current fingerprint to revise and deposits fingerprint, is not situation about representing merely when finding this access point for the first time so that this has deposited fingerprint, benefits from the value that records during this access point repeatedly finding but in fact replace.But the reference signal strength parameter is described an a kind of like this example of optimization, but it is applicable to that equally well phase parameter or any other are used for creating the attribute of fingerprint.According to this method, it is also maintained that fingerprint is updated the record of number of times.In this example, access point A 1Fingerprint be updated for the K time.This fingerprint comprises vector s 1(A 1) ... s n(A 1), and current fingerprint comprises vector x 1..., x nEach value of this s vector is upgraded according to following formula:
New s i=[(K-1) (old s i)+x i]/K
Such running mean optimization only is exemplary in essence, and has and manyly can be used for optimizing the acceptable mathematical technique of fingerprint value and can not break away from the scope of the present disclosure.To the optimization of fingerprint also can by as change existing value substitute or the additional value that adds new attribute (for example, but the number of measurement pilot signals) to fingerprint is reached.
Deviation value also can be optimised.For example, initial deviation values can be a default value.Such as 10dB (about signal strength signal intensity) for example, the default value that perhaps departs from can be variable, such as 5% of fingerprint value.In this example, the vector that departs between x that records and the s vector is vector m 1..., m nNew deviation value d iBy the last d of MAX[( i), m i, (acquiescence
Figure A20068003522700151
)] calculate.
In these examples, mobile device generates fingerprint and is stored in the fingerprint database in the above.But the somewhere of upstream more in some or all the be replaced and stored in wide area wireless communication networks in these fingerprints is such as can be by the database 111 of MSC 110 visits etc.In the case, can reduce processing requirements and memory requirement to mobile device.At work, mobile device will be created current fingerprint, and send this fingerprint to MSC (maybe may send BSC to---if database there).MSC will carry out fingerprint comparison then and instruct mobile device whether to want the access point searching beacon signal.Under this layout, MSC can receive the fingerprint from a plurality of mobile devices, and the database of its available access point is more much bigger than what can find in single mobile device.Alternatively, each user who can be the wide area wireless communication network creates personalized fingerprint database and it is stored in its this sound zone system place.
In case having described mobile device, Fig. 5 determines that it should search for a kind of exemplary algorithm that WLAN is promptly carried out.At frame 502, mobile device has determined whether that any fingerprint can be for comparison.Although this determines to make about whether any available fingerprint is arranged actually; But it also can be about whether determining of any fingerprint that is associated with current base station ID arranged.If there is fingerprint then to generate current fingerprint, and uses its contrast to deposit fingerprint at frame 506 and do search to seek coupling for comparison at frame 504.If the coupling of finding, then mobile device can be searched for the access point that is associated with the fingerprint that mates, and is connected with this access point at frame 508.In case connect, mobile device just keep being communicated with until run into cause its carry out in frame 516 change the hand search change the hand trigger event.
If can be for the usefulness of search without any fingerprint at frame 502, perhaps without any depositing the current fingerprint of fingerprint matching, then mobile device can be carried out global search at frame 510.By global search, mobile device can be found the WLAN that can insert at frame 512, and is connected to this WLAN at frame 514.In case connect, mobile device just keeps being communicated with, until run into cause its carry out in frame 516 change the hand search change the hand trigger event.
Fig. 6 has described a kind of flow chart of illustrative methods of the global search that is used to carry out frame 510.As described in the application of mentioning in front and including in, mobile device can form the available frequency that will scan gradually and be in harmonious proportion the tabulation of channel with near the WLAN locating.Thus, at frame 602, mobile device begins to scan this scan list.In case find the access point of WLAN at frame 604, just negotiable and connect a connection.Although in the flow chart of Fig. 6, do not illustrate, can limit so that this scanning can and not continue to take place always by a timer or other certain parameters the scanning of this scan list.At frame 606, mobile device determines whether newfound access point has corresponding clauses and subclauses in fingerprint database.If no, then this access-in point information and fingerprint are added into.
Fig. 7 has described a kind of flow chart of illustrative methods of the fingerprint search that is used to carry out frame 506.In frame 702, mobile device or other certain network systems are determined the potential tabulation that may mate the access point fingerprint of current location fingerprint.Referring to this figure, the arthmetic statement of comparison diagram 3B a kind of possible replacement matching algorithm.In this example, for each pilot signal, fingerprint comprises CDMA band class, Pilot PN skew, pilot frequency intensity and pilot phase.Pilot tone sorts with sort in descending order by intensity.Use the PN deviant of strong pilot tone of current fingerprint, find the coupling fingerprint in the fingerprint depositing.If find the above potential fingerprint that may mate of pre-determined maximum number, then can use the previously described method that relates to pilot frequency intensity and pilot phase (if available) to come it is simplified.In this way, just generated the tabulation of the potential fingerprint that may mate.If do not find any coupling, then carry out global search at frame 704.
At frame 706, this scan list of sequential scanning is until having a WLAN to be found at frame 708 and connecting.If be found without any WLAN, then proceed in the scanning of 710 pairs of tabulations of frame, until this tabulation by limit or timer expires.If this situation takes place, then can carry out global search at frame 714.But, when a WLAN is found and connect, use current fingerprint to optimize the fingerprint of this access point at frame 712.
Finally, mobile device will run into the situation that oneself may no longer continue to be communicated in its access point that connects.In these cases, certain networking component of wireless device or other initiate to make mobile device carry out to contiguous WLAN change the hand search change the hand trigger event.Fig. 8 has described a kind of flow chart that is used to carry out the exemplary algorithm of changing the hand search of frame 516.
In frame 802, be created as the scan list of all access points that try to find out near WLAN and will search for.As described in the application of mentioning in the early time and including in, this network can safeguard the adjacent unit tabulation of WLAN.Use this tabulation, search will be changed near the WLAN that hand arrives just can be by quicker and execution expeditiously.For 802.11 WLAN, for example, the tabulation of adjacent unit generally includes SSID, BSSID, frequency band, channel and pattern.These information has been arranged, mobile device just accurately access point searching and need not to scan the traversal many unnecessary replacement access points.At frame 802, augmented information for the tabulation of typical adjacent unit from fingerprint database.For example, can utilize current fingerprint to come fingerprint based on access point to eliminate the tabulation of adjacent unit and go up one or more in the middle of these access points.Alternatively, can use current fingerprint to come from the tabulation of adjacent unit, to select the highest candidate of one or two possibility.But generally speaking, at frame 802, be that the tabulation of neighbour unit is determined scan list with the finger print information coupling.At frame 804, each access point in the scan list is scanned, and if find WLAN at frame 806, just connect.In case connect, just can revise fingerprint database.If this WLAN has fingerprint entries, then these clauses and subclauses are optimised.If this Wireless LAN access point does not still have the fingerprint clauses and subclauses, then add new clauses and subclauses to database.
Each illustrative logical blocks, module, circuit, element and/or the assembly of describing in conjunction with embodiment disclosed herein can be designed to carry out herein with general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic components, discrete gate or transistor logic, discrete hardware components or its, and combination in any of the function of description realizes or carries out.General processor can be a microprocessor, but in alternative, processor can be any conventional processors, controller, microcontroller or state machine.Processor also can be implemented as the combination of computation module, for example DSP and the combination of microprocessor, a plurality of microprocessor, one or more microprocessors of cooperating with the DSP core or any other this type of configuration.
Method of describing in conjunction with embodiment disclosed herein or algorithm can be embodied directly in hardware, in the software module of being carried out by processor or embody in the two combination.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or any other form known in the art.Storage medium can be coupled to processor so that this processor can from/read and writing information to this storage medium.In alternative, storage medium can be integrated into processor.
Top explanation provides some illustrative aspects and embodiment.Various modifications to these embodiment and aspect drop within the scope of the present disclosure, and the generic principles of definition herein can be applied to other embodiment.Thus, claims are not to be intended to be defined to shown these embodiment herein, but should be awarded the full breadth consistent with the claim of language performance, citation to the singulative of a key element is not intention expression " having and only have " therein, unless clear and definite so statement, but should be " one or more " definitely.For the key element that runs through each embodiment that the disclosure describes, those of ordinary skills are known or will be quoted clearly for all the 26S Proteasome Structure and Function equivalences known to it from now on and include in this, and are intended to contain for claims.In addition, content disclosed herein is central to be to be intended to contribution to give the public without any content, and no matter whether this type of openly narrates to dominance in claims.To under the regulation of the 6th section of 35U.S.C. § 112, understand without any the claim key element, unless this key element be to use phrase " be used for ... device " enunciate, perhaps in the situation of claim to a method this key element be to use phrase " be used for ... step " narrate.

Claims (24)

1. Wireless Telecom Equipment comprises:
Memory, it is configured to store the information of the position that relates to first communication network; And
Processor, it is configured to be stored in described information in the described memory based on the one or more reference signal corrections from the second communication network.
2. Wireless Telecom Equipment as claimed in claim 1 is characterized in that described information comprises the fingerprint of described first communication network.
3. Wireless Telecom Equipment as claimed in claim 2 is characterized in that, described fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described first communication network.
4. Wireless Telecom Equipment as claimed in claim 1 is characterized in that, described processor is further configured by adjusting described runout information based on described one or more reference signals revises described fingerprint.
5. Wireless Telecom Equipment as claimed in claim 2 is characterized in that described fingerprint comprises the phase information of described one or more reference signals.
6. Wireless Telecom Equipment as claimed in claim 5 is characterized in that, described processor is further configured by adjusting described phase information based on the current phase information of described one or more reference signals revises described fingerprint.
7. Wireless Telecom Equipment as claimed in claim 2 is characterized in that described fingerprint comprises the signal strength information of described one or more reference signals.
8. Wireless Telecom Equipment as claimed in claim 7 is characterized in that, described processor is further configured by adjusting described signal strength information based on the current demand signal strength information of described one or more reference signals revises described fingerprint.
9. Wireless Telecom Equipment comprises:
Memory, its be configured to store first communication network, based on first fingerprint from one or more reference signals of second communication network; And
Processor, it is configured to
A) determine second fingerprint of described Wireless Telecom Equipment based on described one or more current reference signals, and
B) based on described first fingerprint of the described second fingerprint correction.
10. Wireless Telecom Equipment as claimed in claim 9 is characterized in that, described processor is further configured and becomes to set up being connected between described Wireless Telecom Equipment and described first communication network, and determines described second fingerprint after setting up described connection.
11. Wireless Telecom Equipment as claimed in claim 9 is characterized in that, described first fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described first communication network.
12. Wireless Telecom Equipment as claimed in claim 11 is characterized in that, described processor is further configured by adjust described runout information based on the runout information of described second fingerprint revises described first fingerprint.
13. Wireless Telecom Equipment as claimed in claim 9 is characterized in that, described first fingerprint comprises the phase information of described one or more reference signals.
14. Wireless Telecom Equipment as claimed in claim 13 is characterized in that, described processor is further configured by adjust described phase information based on the phase information of described second fingerprint revises described first fingerprint.
15. Wireless Telecom Equipment as claimed in claim 9 is characterized in that, described first fingerprint comprises the signal strength information of described one or more reference signals.
16. Wireless Telecom Equipment as claimed in claim 15 is characterized in that, described processor is further configured by adjust described signal strength information based on the signal strength information of described second fingerprint revises described first fingerprint.
17. a communication means comprises:
Storage relates to the information of the position of first communication network; And
Based on one or more reference signal correction institute canned data from the second communication network.
18. method as claimed in claim 17 is characterized in that, described information comprises the fingerprint of described first communication network.
19. method as claimed in claim 18 is characterized in that, described fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described first communication network.
20. method as claimed in claim 19 is characterized in that, described fingerprint is corrected by adjusting described runout information based on described one or more reference signals.
21. method as claimed in claim 18 is characterized in that, described fingerprint comprises the phase information of described one or more reference signals.
22. method as claimed in claim 21 is characterized in that, described fingerprint is to be corrected by adjusting described phase information based on the current phase information of described one or more reference signals.
23. method as claimed in claim 18 is characterized in that, described fingerprint comprises the signal strength information of described one or more reference signals.
24. method as claimed in claim 23 is characterized in that, described fingerprint is to be corrected by adjusting described signal strength information based on the current demand signal strength information of described one or more reference signals.
CN200680035227.3A 2005-07-25 2006-07-24 Method and apparatus for maintaining fingerprint of a wireless network Active CN101273654B (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US70259105P 2005-07-25 2005-07-25
US60/702,591 2005-07-25
US75091905P 2005-12-16 2005-12-16
US75092005P 2005-12-16 2005-12-16
US60/750,920 2005-12-16
US60/750,919 2005-12-16
US11/355,538 2006-02-15
US11/355,538 US8483704B2 (en) 2005-07-25 2006-02-15 Method and apparatus for maintaining a fingerprint for a wireless network
PCT/US2006/028732 WO2007014177A1 (en) 2005-07-25 2006-07-24 Method and apparatus for maintaining a fingerprint for a wireless network

Publications (2)

Publication Number Publication Date
CN101273654A true CN101273654A (en) 2008-09-24
CN101273654B CN101273654B (en) 2013-05-22

Family

ID=40006473

Family Applications (2)

Application Number Title Priority Date Filing Date
CN200680035227.3A Active CN101273654B (en) 2005-07-25 2006-07-24 Method and apparatus for maintaining fingerprint of a wireless network
CN200680035235.8A Active CN101273655B (en) 2005-07-25 2006-07-24 Method and apparatus for locating a wireless local area network in a wide area network

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN200680035235.8A Active CN101273655B (en) 2005-07-25 2006-07-24 Method and apparatus for locating a wireless local area network in a wide area network

Country Status (2)

Country Link
CN (2) CN101273654B (en)
UA (4) UA93383C2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102504670A (en) * 2011-10-27 2012-06-20 北京东方雨虹防水技术股份有限公司 Permeable epoxy resin waterproof coating for concrete
CN105191451A (en) * 2013-02-12 2015-12-23 英特尔Ip公司 Methods, wireless communication stations, and system for synchronizing devices and neighbor area networking (NAN) configuration
TWI666591B (en) * 2017-11-30 2019-07-21 大陸商北京集創北方科技股份有限公司 Optical detection method for multiple fingerprint information authentication and information processing device using the same

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014107858A1 (en) * 2013-01-10 2014-07-17 华为技术有限公司 Access point discovery method, device and system
WO2018008402A1 (en) * 2016-07-04 2018-01-11 株式会社村田製作所 Position detection system and receiver
CN106922005B (en) * 2017-03-23 2020-06-19 北京小米移动软件有限公司 Method and device for accessing wireless access point and computer readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2930206B1 (en) * 1998-03-30 1999-08-03 埼玉日本電気株式会社 Handoff device for mobile communication system
US6167268A (en) * 1999-02-16 2000-12-26 Motorola, Inc. Method and apparatus for controlling scanning of a subscriber unit

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102504670A (en) * 2011-10-27 2012-06-20 北京东方雨虹防水技术股份有限公司 Permeable epoxy resin waterproof coating for concrete
CN105191451A (en) * 2013-02-12 2015-12-23 英特尔Ip公司 Methods, wireless communication stations, and system for synchronizing devices and neighbor area networking (NAN) configuration
CN105191451B (en) * 2013-02-12 2017-05-17 英特尔Ip公司 Methods, wireless communication stations, and system for synchronizing devices and neighbor area networking (NAN) configuration
US9907037B2 (en) 2013-02-12 2018-02-27 Intel IP Corporation Methods, wireless communication stations, and system for synchronizing devices and neighbor area networking (NAN) configuration
TWI666591B (en) * 2017-11-30 2019-07-21 大陸商北京集創北方科技股份有限公司 Optical detection method for multiple fingerprint information authentication and information processing device using the same

Also Published As

Publication number Publication date
UA101416C2 (en) 2013-03-25
UA95595C2 (en) 2011-08-10
CN101273655A (en) 2008-09-24
UA93383C2 (en) 2011-02-10
CN101273655B (en) 2013-07-17
UA97347C2 (en) 2012-02-10
CN101273654B (en) 2013-05-22

Similar Documents

Publication Publication Date Title
CA2616774C (en) Method and apparatus for maintaining a fingerprint for a wireless network
US8798008B2 (en) Method and apparatus for locating a wireless local area network in a wide area network
US8078165B2 (en) Configuring preferred user zone lists for private access points for wireless networking
EP2055114B1 (en) Intelligent network acquisition for wireless clients
CN101273654B (en) Method and apparatus for maintaining fingerprint of a wireless network
US11825556B2 (en) Frequency band scan in user equipment
RU2406269C2 (en) Method and device designed to detect location of wireless local network in global network
RU2439852C1 (en) Method and device supporting wireless network fingerprint

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1125247

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1125247

Country of ref document: HK