CN101273654B - Method and apparatus for maintaining fingerprint of a wireless network - Google Patents

Method and apparatus for maintaining fingerprint of a wireless network Download PDF

Info

Publication number
CN101273654B
CN101273654B CN200680035227.3A CN200680035227A CN101273654B CN 101273654 B CN101273654 B CN 101273654B CN 200680035227 A CN200680035227 A CN 200680035227A CN 101273654 B CN101273654 B CN 101273654B
Authority
CN
China
Prior art keywords
fingerprint
mobile device
information
communication network
wireless telecom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200680035227.3A
Other languages
Chinese (zh)
Other versions
CN101273654A (en
Inventor
S·纳恩达
A·高吉科
M·M·德什帕德
N·简恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/355,538 external-priority patent/US8483704B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN101273654A publication Critical patent/CN101273654A/en
Application granted granted Critical
Publication of CN101273654B publication Critical patent/CN101273654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure is directed to a mobile communication device that measures characteristics or attributes of a first communications network that vary according to physical location within that first communications network to create a fingerprint, or signature, of a location within the first communications network. When the fingerprint of the current location of the mobile device is created it can be compared to a known fingerprint associated with a second communication network to determine the mobile device's proximity to the second communications network. Furthermore, the second and subsequent fingerprint that are generated for a particular communications network can be used to modify the stored fingerprint so as to refine it to improve detecting the proximity to the communications network.

Description

Method and apparatus for the fingerprint of safeguarding wireless network
Priority request under 35U.S.C. § 119
present patent application requires to transfer the assignee of the present invention and is clearly quoted thus and include the provisional application No.60/702 that is entitled as " ASSISTED WIRELESS NETWORK ACCESS POINTSEARCH IN WIRELESS COMMUNICATION NETWORKS (formula of the receiving aid wireless network access point search in cordless communication network) " that submits to 25 days July in 2005 herein in, 591, with the provisional application No.60/750 that is entitled as " METHOD AND APPARATUS FOR LOCATING A WIRELESS LOCALAREA NETWORK IN A WIDE AREA NETWORK (being used for the method and apparatus at wide area network positioned radio local area network (LAN)) " that submitted on December 16th, 2005, 920, and the provisional application No.60/750 that is entitled as " METHOD AND APPARATUS FOR MAINTAINING A FINGERPRINT FOR AWIRELESS NETWORK (safeguarding the method and apparatus of the fingerprint of wireless network) " of submission on December 16th, 2005, 919 priority.
Background
The field
The disclosure relates generally to telecommunications, relates in particular to the system and method for the mobile communication equipment that support can communicate by letter via two kinds of dissimilar communication networks.
Background
Demand to the wireless messages business causes developing the ever-increasing wireless network of number.CDMA2000 1x only is to provide an example of the wireless network of wide area telephony and data service.CDMA2000 1x is the wireless standard by a kind of employing code division multiple access (CDMA) technology of third generation partnership projects 2 (3GPP2) promulgation.CDMA is that a kind of spread processing that adopts allows a plurality of users to share the technology of a shared communication media.A kind of competitive wireless network that generally adopts in Europe is global system for mobile communications (GSM).Different from CDMA2000 1x, GSM utilizes arrowband time division multiple access (TDMA) to support radio telephone and data service.Some other wireless network comprises being suitable for the data transfer rate that Email and web-browsing use and supports the GPRS (GPRS) of high-speed data service and can throw in Voice ﹠ Video and use broadband voice used and the global mobile communication system (UMTS) of data.
These wireless networks can be considered to adopt to vague generalization the wide area network of cellular technology.Cellular technology is based on the topological structure that geographical coverage area wherein is broken down into some cellular cells.A fixed base transceiver station (BTS) of communicating by letter with each mobile subscriber is arranged at these cellular cells in each.Usually the just suitable gateway that adopts a base station controller (BSC) to control each BTS and communication is routed to each packet switching network and Circuit Switching Network in geographical coverage area.
Along with the demand sustainable growth to the wireless messages business, mobile device just in evolution to support integrated voice, data and Streaming Media to provide simultaneously the Seamless Network between wide area cellular network and WLAN (wireless local area network) (LAN) to cover.WLAN is general uses standard agreements such as IEEE 802.11, bluetooth that phone and data service are provided on the geographic area of less.The existence of WLAN provides by the infrastructure of utilizing WLAN, cellular communication to be expanded to increases the rare chance of user capacity in wide area cellular network without the license frequency spectrum.
Recently, adopted various technology that mobile device can be communicated by letter with different networks.Adopted the technology of replenishing to allow the existence of mobile device search WLAN to have determined whether that WLAN can be for connecting.But, frequently or constantly search for unnecessarily consumed power of WLAN, and may make the battery repid discharge in mobile device.Thus, by searching for intelligently available wireless LAN, can make mobile terminal realize the improvement of power consumption and battery life.A kind of mode that improves search efficiency is to optimize adaptively be used to having determined whether the nigh criterion of WLAN.
Summary
An aspect relates to a kind of Wireless Telecom Equipment that comprises the memory of the information that is configured to store the position that relates to the first communication network.This equipment also comprises and being configured to based on be stored in the processor of the above-mentioned information in above-mentioned memory from one or more reference signal corrections of second communication network.
Another aspect relates to a kind of Wireless Telecom Equipment that comprises processor and memory, and this memory is configured to store first fingerprint based on one or more reference signals of second communication network of the first communication network.This processor is configured to determine the second fingerprint of this wireless device and based on above-mentioned the first fingerprint of this second fingerprint correction based on the one or more reference signal.
Another aspect relates to a kind of communication means, and it comprises that storage relates to the information of the position of the first communication network; And based on the one or more reference signal correction institute canned data of second communication network.
Should understand, other embodiment of the present disclosure will be that those skilled in the art institute is apparent because of follow-up illustrating, and only illustrate in illustrating and describe each embodiment of the present disclosure by illustrating.As can recognize, the disclosure can have other and different embodiment, and its several details can make an amendment aspect each other, and all these can not break away from spirit and scope of the present disclosure.Correspondingly, should to be considered to be illustrative and not restrictive in itself for accompanying drawing and illustrating.
Brief Description Of Drawings
Non-limiting various aspects that illustrate wireless communication system by example in the accompanying drawings, wherein:
Figure 1A is the conceptual schema of an embodiment of wireless communication system;
Figure 1B is the conceptual schema of another embodiment of wireless communication system;
Fig. 2 illustrates both functional block diagram of an example of mobile device of can supporting cellular communicating by letter with WLAN; And
Fig. 3 A has described a kind of flow chart that creates the illustrative methods of fingerprint on mobile communication equipment;
Fig. 3 B has described a kind of flow chart of illustrative methods of the fingerprint of comparing diverse location;
Fig. 4 has described a kind of optimization for the flow chart of the illustrative methods of the existing fingerprint of known location;
Fig. 5 has described a kind of flow chart of the illustrative methods for selecting cordless communication network;
Fig. 6 has described a kind of for the flow chart of execution for the illustrative methods of the global search of wireless network;
Fig. 7 has described a kind of for the flow chart of execution for the illustrative methods of the fingerprint search of wireless network;
Fig. 8 has described a kind ofly to utilize fingerprint and adjacent first list to carry out flow chart for the illustrative methods of changing the hand search of wireless network.
Illustrate
Below in conjunction with the explanation that is intended to as each embodiment of the present disclosure that illustrates of accompanying drawing elaboration, but not the intention representative can be put into practice unique embodiment of the present disclosure therein.Originally illustrate as providing the purpose to thorough understanding of the present disclosure to comprise detail.In certain embodiments, known structure and assembly are with the block diagram form concept of the present disclosure that illustrates to avoid confusion.
In follow-up illustrating, change hand in connection with the mobile subscriber from a network and describe various technology to another network.Have in these technology and severally will navigate within one or more WLAN at mobile communication equipment and distribute and describe under background in the wide area WAN that spreads all over the WAN overlay area.This mobile communication equipment can be any suitable device that can carry out radio telephone or data communication, such as cell phone that designs for working in CDMA2000 1x network etc.This mobile communication equipment can be to adopt any suitable agreement to visit WLAN, comprises for example IEEE 802.11.Although these technology may be can with the background of the WAN phone of IEEE 802.11 network services in describe, these technology can be expanded the mobile communication equipment that can access multimeshed network to other.For example, these technology can be applied to the mobile communication equipment that can switch between CDMA2000 1x network and GSM network.Correspondingly, to can only being intended to illustrate various aspects of the present disclosure with cell phone or any citation of any other specific embodiment of IEEE 802.11 network services, should understand simultaneously these aspects scope that is widely used.
Figure 1A is the conceptual schema of an embodiment of wireless communication system.Dividing a word with a hyphen at the end of a line in WAN 104 with a series of mobile devices 102 that have been shown in dotted line in figure.WAN 104 comprises the BSC 106 of several BTS that support to be dispersed throughout this WAN overlay area.Show single BTS 108 for ease of explanation in Fig. 1.Can use mobile switching centre (MSC) 110 to provide to the gateway of public switch telephone network (PSTN) 112.Although do not illustrate in Fig. 1, the geography that WAN 104 can adopt numerous BSC of each self-supporting arbitrary number BTS to expand WAN 104 extends.When spreading all over WAN 104 and adopt a plurality of BSC, MSC 110 also can be used to coordinate the communication between each BSC.
WAN 104 also can comprise the one or more WLAN that are dispersed throughout this wide-area wireless overlay area.Single WLAN 114 has been shown in Fig. 1.WLAN 114 can be IEEE 802.11 networks or any other suitable network.WLAN 114 comprises access point 116 so that mobile device 102 can be communicated by letter with IP network 118.Can adopt server 120 to make IP network 118 and provide to MSC 110 interfaces of the gateway of PSTN 112.
When initially mobile device 102 being applied power, it will attempt or access WAN 104 or access WLAN 114.The decision-making of access particular network can be depending on the various factors that relates to concrete application and overall design constraints.For example, mobile device 102 can be configured to access WLAN 114 when service quality satisfies minimum threshold.Can utilize WLAN 114 to support mobile phone and data communication to much degree, just can the valuable bandwidth of much degree ground release use for other mobile subscribers.
Mobile device 102 can be configured to search for constantly or periodically from access point 116 or the beacon of any other access point of WLAN.This beacon is the cyclical signal with synchronizing information by access point 116 emissions.But the WLAN beacon search require mobile device so that be tuned to possible WLAN channel in one or more operational frequency bands of wlan system, and carry out on this channel or initiatively or passive scanning.In drive sweep, mobile device be only be tuned to this channel and the reception of carrying out specific a period of time to wait for beacon transmissions.In active scan, mobile device be tuned to this channel and implement be used to avoid with this channel on the access procedure of existing device conflict after transmit probe request.In case receive this probe request, access point just transmits probe response to this mobile device.In the situation that mobile device 102 fails beacon to be detected or the probe response that does not receive probe request---may be just this situation if the mobile device 102 that is in position A is applied power---, mobile device 102 attempts to access WAN 104.With regard to the Figure 1B that describes after a while, mobile device 102 is not (or periodically) scanning WLAN access point constantly, only just scans the WLAN access point but replace when it determines oneself near WLAN 114.Mobile device 102 can access WAN 104 by the pilot signal of catching from BTS 108.In case catch this pilot signal, just can set up dedicated radio link between mobile device 102 and BTS 108 by means of means as known in the art.Mobile device 102 can utilize the radio company with BTS 108 to fetch 110 registrations to MSC.Register is that mobile device 102 is used the whereabouts that makes oneself and is the process known to WAN 104.When registration process was completed, mobile device 102 can enter Light Condition, until or initiated calling by mobile device 102 or by PSTN 112.No matter be which kind of situation, all can set up aerial traffic link to set up and to support this calling between mobile device 102 and BTS 108.
In the embodiment that is describing, when mobile device 102 is divided a word with a hyphen at the end of a line in WAN 104 from A in-position, position B, the beacon from access point 116 just can be detected now.In case this situation occurs, just can set up dedicated radio link between the two by means as known in the art.Then mobile device 102 obtains the IP address of server 120.Mobile device 102 can utilize the service of name server (DNS) to determine the IP address of this server.The domain name of server 120 can be thrown in to mobile device 102 by WAN 104.The IP address has been arranged, and mobile device 102 just can be set up with the network of server 120 and be connected.Whether connect in case set up network, just can measure the service quality that coupling determines WLAN 114 with the machine from the information of server 120 is enough to mobile device 102 is changed hand to access point 116.
Although described honeycomb WAN with should be noted that Figure 1A vague generalization, also can adopt other WAN.This can comprise WAN that those do not adopt MSC or other honeycombs and adopt those WAN that comprise wideband CDMA (WCDMA), TD-CDMA, GSM or other communication protocols such as like that.
Referring now to Figure 1B,, WLAN 114 and BTS 108 be illustrated in a plurality of BTS 122,124,126 also have a plurality of WLAN 129,131 and the background of the access point 128 that is associated, 130 larger WAN in.As shown in Figure 1B, mobile device 102 is not in the overlay area of any WLAN.Thus, the acquisition beacon signal will prove futile and consumed power unnecessarily when on this position.Even if mobile device can enter dormancy or idle mode continually preserving power, search WLAN beacon signal is consumed power rapidly also.In typical 802.11 network configuration, these beacon signals are to occur on the interval with tens of milliseconds of meterings; Mobile device must have this section period maintenance at least revive and search for by every channel thus, consider that Wireless LAN access point may configure for the different channels in different frequency scope and those scopes, mobile device 102 must have the time of appreciable amount will keep reviving could search for available wireless LAN access point.Similarly, in the situation of active scan, mobile device must continue to revive to implement the channel access process on this channel, then transmits probe request and continues to revive to receive probe response.It must carry out this process on each channel.In this case, mobile device 102 also must have the time of appreciable amount to keep reviving to search for available wireless LAN access point, and this may cause power consumption and processing expenditure to increase.
As known in the art, mobile device 102 supervision are from beacon and the pilot signal of each base station of cellular network.These signals can comprise pilot tone and paging signal.Mobile device monitors that these signals carry out the hand that changes between the base station to measure main signal and adjacent signal strength signal intensity.Equally each base station by synchronous network in, the phase place that mobile device also can be measured each pilot signal is assisted to change hand and is determined.Thus, on any position in network 104, but mobile device 102 is observed the most nearly n base station that measure signal intensity is arranged, and these signal strength signal intensities can be characterized as being two vector x 1..., x nAnd y 1..., y nBe signal strength signal intensity from the pilot signal of base station in this each x value, and each y value is the phase place from this pilot signal of base station.When the signal of observing was less than n, its residual value was set as sky.Skew is associated because pilot signal has pilot phase, is to start from a certain base station so these signal strength signal intensities and phase place can easily be designated.In as other WAN technology such as GSM, adjacent base station can by its frequency channels or other Base Station Identifications be first and signal strength signal intensity that be associated with each base station identifies.
In WCDMA, each base station may be by not synchronously.As in CDMA, when residing in Light Condition on the paging channel of mobile device in certain base station, its scans for neighbor base station signals.In the situation of CDMA, each base station utilizes the skew of same pseudorandom sequence spreading.In the situation of WCDMA, several signals are launched in each base station, these signals be designed to allow the mobile radio station fast Acquisition with by synchronize of these signals of this base station emission, and in case expansion code group and the extended code that adopt synchronous just definite this base station.This collection extended code and signal strength signal intensity thereof can be used to create the fingerprint for the position that is identified at the WCDMA covering, and it is corresponding to the pilot frequency deviation in cdma system and pilot signal strength.Base skew in the time of also can utilizing adjacent base station relative, it is corresponding to the pilot phase in CDMA, if but each base station not by synchronously, its clock may have relative drift, thus when making, the base skew becomes insecure index.
But, by the acquisition beacon signal limiting is in the period of zone in 140 in mobile device, just can realize considerable power consumption saving.Thus, when mobile device 102 periodically revived to monitor paging channel in WAN or quick paging channel, mobile device can also be determined the position of oneself.If mobile device determines own position and be in regional 140, it can search for the WLAN beacon signal.Otherwise mobile device can be avoided unnecessarily acquisition beacon signal.
Mobile device 102 can monitor from the beacon of each base station of WAN and pilot signal.These signals can comprise pilot tone and paging signal.Mobile device monitors that these signals carry out the hand that changes between the base station to measure main signal and adjacent signal strength signal intensity.Equally, each base station by synchronous network in, the phase place that mobile device also can be measured each pilot signal is assisted to change hand and is determined.Thus, on the optional position in network 104, but mobile device 102 is observed the most nearly n base station that measure signal intensity is arranged, and these signal strength signal intensities can be characterized as being two vector x 1..., x nAnd y 1..., y nBe signal strength signal intensity from the pilot signal of base station in this each x value, and each y value is the phase place from this pilot signal of base station.When the signal of observing was less than n, its residual value was set as sky.Skew is associated because pilot signal has pilot phase, is to start from a certain base station so these signal strength signal intensities and phase place can easily be designated.In as other WAN technology such as GSM, adjacent base station can by its frequency channels or other Base Station Identifications be first and signal strength signal intensity that be associated with each base station identifies.In some aspects, can utilize any be used to catch, regularly etc. signal is as the signal that is used for obtaining forming the measurement of above-described the one or more vector.In addition, these vectors need not to be formed, to store as two vectors as described with or include these information with above-described form.Thus, in some respects, utilization be the source of sign such as the reference signal of pilot tone or paging signal etc. and the information of at least one feature.
This information can be used as notional fingerprint or the signature of the position of mobile device 102.Thus, if each position in zone 140 has a certain known fingerprint, mobile device just can be determined its current fingerprint and itself and known fingerprint are compared to determine whether this mobile device is positioned at zone 140.Although two attributes (that is, pilot signal strength and phase place) that utilize WAN are only mentioned in top discussion.In addition, as discussed above, can replace with other dynamic attributes of WAN or use in conjunction with these two attributes.For example, can use pilot offset values as fingerprint; Even the number of pilots signals available is also a possibility attribute for fingerprint.In addition, each attribute of formation fingerprint may not be the attribute of WAN.For example, many mobile devices have and can be used for determining that mobile device is with respect to the GPS receiver of the position of WLAN.GPS information can directly or even indirectly be used.As an example of rear a kind of situation, base station IDs can be used for defining fingerprint corresponding to the position of this mobile device with the phase measurement from the gps signal of different satellites.Thus, under the meaning of its broad sense, fingerprint is the set of the attribute that changes of the position-based of the first communication network, but and mobile device be used for determining the adjacency of second communication network.In addition, fingerprint also can comprise the feature (for example, the MAC ID of WiFi access point, frequency accent, channel, RSSI information) of the transmitter of second communication network.In such example, the WAN parameter can be considered to trigger parameter, thus the match triggers WLAN of these parameters search.The search parameter of the search that these WLAN parameters can be used as being triggered at searching period.
These attributes can calculate and can not break away from the scope of the present disclosure with various different modes.For example, the instant measurement of desirable attributes such as pilot signal strength and phase place and used as fingerprint.But even when mobile device is static, the value of these attributes also can change because of the environment changeability.Correspondingly, desirable multiple measurement also is averaged together or is made up to generate fingerprint with the upper significant mode of certain statistics.
Fig. 2 illustrates to support communicate by letter with WLAN both functional block diagram of an example of mobile device of WAN.Mobile device 102 can comprise WAN transceiver 202 and WLAN transceiver 204.In at least one embodiment of mobile device 102, WAN transceiver 202 can be supported CDMA2000 1x, WCDMA, GSM, TD-CDMA or other WAN communications with BTS (not shown), and WLAN transceiver 204 can be supported to communicate by letter with the IEEE 802.11 of access point (not shown).Should be noted that these concepts of describing in conjunction with mobile device 102 can be extended to other WAN and wireless lan technology.Each transceiver 202,204 is illustrated as has independent antenna 206,207 separately, but transceiver 202,204 also can share single broad-band antenna.Each antenna 206,207 can be realized with one or more radiant elements.
Mobile device 102 also is illustrated as to have and is coupled to transceiver 202,204 both processors 208, and still, each transceiver also can use independent processor in the alternative embodiment of mobile device 102.Processor 208 can be implemented as hardware, firmware, software or its combination in any.For example, processor 208 can comprise microprocessor (not shown).This microprocessor can be used to support (1) control and management to the access of wide area wireless communication network and WLAN and (2) make processor 208 interfaces to keypad 210, display 212, reach other user interfaces (not shown) and other software application.Processor 208 also can comprise with supporting such as convolutional encoding, cyclic redundancy check (CRC) (CRC) function, modulation, and the digital signal processor (DSP) (not shown) of the embedded software layer of the various signal processing functions such as spread processing.This DSP also can carry out vocoder functions with support telephony applications.The mode that realizes processor 208 will depend on concrete application and the design constraint of forcing at whole system.Should be noted that hardware, firmware and software are configured in these circumstances and how realize best that for each application-specific under described function collection be interchangeable.
Processor 208 can be configured to carry out the algorithm that changes hand that triggers from a network to another.This algorithm can be implemented as one or more software application of being supported by the framework based on microprocessor of discussing in the early time.Alternatively, this algorithm can be the module of separating with processor 208.This module can realize in hardware, software, firmware or its combination in any.Depend on the specific design constraint, this algorithm can be integrated in any entity of 102 li of mobile devices, or distributes across the multiple entities in mobile device 102.
For some purpose known in the art, from the signal strength signal intensity of access point can be at mobile device 102 places with receiving that signal strength indicator (RSSI) piece 216 measures.This RSSI feeds back to WLAN transceiver 204 for the measurement of the intensity of the existing signal of the use of automatic gain control, therefore can not increase mobile device 102 circuit complexity be provided for processor 208.Alternatively, the quality of dedicated radio link can be determined from beacon.Because beacon is the known spread-spectrum signal of priori, so the copy of this beacon can be stored in the memory 211 at mobile device 102 places.Can demodulated beacon be used for by means as known in the art estimating the energy of the beacon launched together with this replica beacon in being stored in memory.
Get back to previously mentioned fingerprint, mobile device 102 comprises also that processor 208 can carry out to create multiple fingerprint and with different fingerprints and the algorithm of comparing each other.For example, use keypad 212, the user of mobile device 102 just can select to make mobile device 102 to create current fingerprint also with the key of this fingerprint storage in memory 211.If when this fingerprint is created, this mobile device is to be connected to a WLAN, and the fingerprint of storing will be associated with this Wireless LAN access point.In addition, the event that also can maybe should programme on periodic basis of this fingerprint---such as successfully access, need service quality successfully to access etc. to close---and being automatically recorded.
As the result of top process, memory 211 can comprise the WLAN search list that is similar to the ground layout of following table for example:
Figure S2006800352273D00091
The first row of upper table refers to the WAN ID of WAN.WAN ID identifies the System and Network of this WAN, namely is called SID/NID in wide area wireless system.Certain base station in WAN can be by pilot frequency deviation, pilot signal strength, or as other attributes of the part of formation fingerprint discussed below identify.The position of fingerprint sign mobile device.Secondary series refers to the textual identifier of wlan network.The 3rd identifier refers to Wireless LAN access point (also referred to as BSS).Three access point (A are arranged in the first overlay area of base station A in this exemplary table 1, A 2, A 3).Similarly, two access points are arranged in the overlay area of base station B.Certainly, in the zone that is covered by any WANID, much more WLAN can be arranged, but the user of mobile device may be because those access points be associated and they are lost interest in the WLAN that this user is not allowed to access.Correspondingly, upper table can only comprise the fingerprint of those access points that this user is typically connected to.
All the other these two row comprise those values that consist of fingerprint itself.In this sample table, access point A 1, A 2And A 3Fingerprint comprise intensity and phase information.But, access point B 1And B 2Fingerprint only comprise signal strength information.Although be also noted that each fingerprint in this table is to come annotation by the vector that length is n, the non-null components of this vector may be less than n.That is, have several values may be sky, thereby fingerprint comparison is restricted to the vector component of those non-NULLs.At work, mobile device can from dormancy or idle mode be revived and its current location calculated fingerprint is compared the information in row 4 and 5 itself and upper table again.Mobile device is defined in fingerprint matching with oneself usually when the corresponding entry of the WAN ID of its registration of forward direction.Thus, when registering to WAN ID A, only mate with the fingerprint that is associated with WAN ID A in table.Fingerprint creation and comparison also can occur during afoot calling.Based on this comparison, mobile device can define a SSID and BSSID and be close at the access point of row 1 and 2 indicatings and can search for its beacon signal completely; Otherwise it can return to idle mode and needn't take a lot of trouble to search for the WLAN beacon signal.
Upper table is exemplary in essence and had not both described all possible information that can be used to characterize fingerprint and also do not described WAN ID with respect to all various combinations of access point ID.For example, the multiple WAN service supplier who is had separately its oneself WAN ID (SID/NID) due to most of zones covers, and therefore the entry of an access point may occur repeatedly, and each is associated from different WAN ID and separately signature is arranged.Except the table of describing above, can adopt independent table (maybe may adopt the entry that adds in original table) to store about responding the information of access point (that is, BSS ID).For example, Wireless LAN access point is configured to work on a particular channel in a special frequency band usually.Thereby this table can comprise the job information of this access point makes mobile device can use it to the acquisition beacon signal, rather than requires different may the making up of mobile device search spread.Other information about access point can comprise its ability, such as fail safe, service quality, throughput, and networking information.
Explain with reference to the establishment to fingerprint table of the flow chart of figure 3A.At frame 302, mobile device is connected to WLAN.Benefit from any fingerprint that prestores in the situation that have no way of, mobile device scans the WLAN access point with typical way.In case mobile device is connected with this access point, the user just can catch current fingerprint at this equipment of frame 304 signalings.This function can be Client-initiated usually,---such as common those WLAN of subscribing or connecting of user---is stored in fingerprint database because the user may only want some WLAN.But the establishment of fingerprint also can be initiated as one of these many functions of carrying out when being connected to WLAN automatically by mobile device.
At frame 306, mobile device catch to consist of the value of those attributes of fingerprint, and at frame 308, this equipment with this fingerprint storage in database.It will be favourable that the attribute of the WLAN that is currently connected to is also stored with this fingerprint.
Current fingerprint with deposit comparing of fingerprint and can carry out in various manners and can not break away from the scope of the present disclosure.The following describes a kind of particular technology.But, many replacements but on function the equivalence technology also may be utilized.
The attribute of formation fingerprint may have variation (even also can change for same position) or be difficult to the value of high accuracy ground measurement.Thus, the comparison between fingerprint should not depend on exact duplicity as the test of determining coupling.Similarly, zone 140 may reflect and gives the operation decision-making that the higher importance of access point detected earlier take false alarm as cost.In other words, more much bigger than zone 114 if zone 140 is selected to, mobile device 102 can just not determine oneself to answer acquisition beacon signal (that is, false alarm) in it also is in regional 114.But, if the zone 140 is selected near fitted area 114, will have mobile device should be at the acquisition beacon signal but fingerprint matching algorithm not yet instruction its make the situation of search.
Be this type of changeability of reply fingerprint, definition one helps to control determines whether fingerprint mates " departing from " amount of having deposited fingerprint.
Figure S2006800352273D00101
Upper table comprises the deviation value of signal strength signal intensity and the independent deviation value of phase bit position of fingerprint.To explain about the flow chart of Fig. 3 B the use of these values.At frame 320, mobile device is revived or is controlled to catch the fingerprint of its current location.The signal strength signal intensity of fingerprint of continuing has a vector and phase place that the example of one vector is arranged, and gathers a pair of vector x 1..., x nAnd y 1..., y n
At frame 322, check the table clause of current WAN ID and definite access point that is associated with this WAN ID.By the identifier of search observable pilot tone in database, further search optimization is in the cards.For cdma network, search criteria can be the PN phase deviation of observable pilot tone.Next frame 324 with these access points separately fingerprint and current fingerprint comparison to have determined whether coupling.On algorithm, this comparison and definite following execution:
Arrive n for i=1:
Determine whether | x i-s i() |<d i()
Determine whether | y i-p i() |<q i()
Thus, deviation value d and q can be used to select current fingerprint (x and y vector) coupling to have deposited the degree how many fingerprints (s and p vector) approach to.These deviation values are larger, and the difference of these values just can be larger but still has coupling.
If at frame 324, coupling is arranged, frame 326 can make all difference of determining given access point (for example, | x i-s i() | and | y i-p i() |) whether sum also drop on chosen wantonly the comparison under separately threshold value (for example X and Y).This test that adds can help to capture individual difference and may show coupling but can determine not some sight of coupling when generally considering fingerprint.
If the test in frame 324 and 326 is satisfied a Wireless LAN access point in upper table, mobile device is controlled to search for the beacon signal of this access point.If in frame 324 or 326 coupling not, mobile device continues to seek the coupling on another fingerprint of another BSS ID.In the situation that an above access point fingerprint matching current location fingerprint may be arranged, can make the size of difference or difference sum or other certain determine to select its fingerprint near that access point of the current fingerprint of coupling.In the situation of this multiple coupling, when mobile device scanning WLAN access point, it can locate one or more access points.
Fig. 4 has described a kind of flow chart of optimizing the illustrative methods of fingerprint entries.At frame 402, mobile device is connected to the access point of WLAN as known in the art after searching for and catching beacon signal.This access point has the MAC Address that is used as its BSS ID.Also can identify unit with other and distinguish diverse access point; But BSS ID is worth easily.At frame 404, mobile device determines whether its access point that is connected to has entry in fingerprint table thus.If no, can generate current fingerprint (referring to Fig. 3 A) and at frame 406 with its storage.If the existing fingerprint entries of this access point exists, can utilize current fingerprint to optimize at frame 408 and deposit fingerprint.As the part of this optimizing process, also can be optimised if---have---at frame 410 deviation values.
This optimizing process utilizes current fingerprint to revise and deposits fingerprint, is not the situation of simple representative when finding for the first time this access point so that this has deposited fingerprint, benefits from but in fact replace the value that records during this access point repeatedly finding.But the reference signal strength parameter is described an a kind of like this example of optimization, but it is applicable to equally well phase parameter or any other is used for creating the attribute of fingerprint.According to this method, it is also maintained that fingerprint is updated the record of number of times.In this example, access point A 1Fingerprint be updated for the K time.This fingerprint comprises vector s 1(A 1) ... s n(A 1), and current fingerprint comprises vector x 1..., x nEach value of this s vector is upgraded according to following formula:
New s i=[(K-1) (old s i)+x i]/K
Such running mean optimization is only exemplary in essence, and has and manyly can be used for optimizing the acceptable mathematical technique of fingerprint value and can not break away from the scope of the present disclosure.Also can be by as changing substituting or additionally adding the value of new attribute (for example, but the number of measurement pilot signals) to reach to fingerprint of existing value to the optimization of fingerprint.
Deviation value also can be optimised.For example, initial deviation values can be default value.Such as 10dB (about signal strength signal intensity) for example, the default value that perhaps departs from can be variable, such as 5% of fingerprint value.In this example, the vector that departs between the x that records and s vector is vector m 1..., m nNew deviation value d iBy the last d of MAX[( i), m i, (acquiescence
Figure S2006800352273D00121
)] calculate.
In these examples, mobile device generates fingerprint and is stored in fingerprint database in the above.But the somewhere of upstream more in some or all the be replaced and stored in wide area wireless communication networks in these fingerprints is such as can be by the database 111 of MSC 110 access etc.In the case, can reduce processing requirements and memory requirement to mobile device.At work, mobile device will create current fingerprint, and send this fingerprint to MSC (if maybe may send BSC to---database there).MSC then will carry out fingerprint comparison and whether the instruction mobile device wants the access point searching beacon signal.Under this layout, MSC can receive the fingerprint from a plurality of mobile devices, and the database of its available access point is more much bigger than what can find in single mobile device.Alternatively, each user who can be the wide area wireless communication network creates personalized fingerprint database and it is stored in its this sound zone system place.
In case having described mobile device, Fig. 5 determines that it should search for a kind of exemplary algorithm that WLAN is namely carried out.At frame 502, mobile device has determined whether that any fingerprint can be for comparison.Can about whether any can making with fingerprint be arranged actually although this determines; But it can be also about whether determining of any fingerprint that is associated with current base station ID arranged.If there is fingerprint to generate current fingerprint at frame 504 for comparison, and uses its contrast to deposit fingerprint at frame 506 and do search to seek coupling.If the coupling of finding, mobile device can be searched for the access point that is associated with the fingerprint that mates, and is connected with this access point at frame 508.In case connect, mobile device just keep being communicated with until run into cause its carry out in frame 516 change the hand search change the hand trigger event.
If can be for search without any fingerprint at frame 502, perhaps without any depositing the current fingerprint of fingerprint matching, mobile device can be carried out global search at frame 510.By global search, mobile device can be found the WLAN that can be accessed by at frame 512, and is connected to this WLAN at frame 514.In case connect, mobile device just keeps being communicated with, until run into cause its carry out in frame 516 change the hand search change the hand trigger event.
Fig. 6 has described a kind of flow chart of illustrative methods of the global search for carrying out frame 510.As described in the application of mentioning in front and including in, mobile device can form gradually the available frequency that will scan and be in harmonious proportion the list of channel with near the WLAN locating.Thus, at frame 602, mobile device begins to scan this scan list.In case find the access point of WLAN at frame 604, just negotiable and connect a connection.Although do not illustrate in the flow chart of Fig. 6, can be limited so that this scanning can and not continue to occur always by a timer or other certain parameters the scanning of this scan list.At frame 606, mobile device determines whether newfound access point has corresponding entry in fingerprint database.If no, this access-in point information and fingerprint are added into.
Fig. 7 has described a kind of flow chart of illustrative methods of the fingerprint search for carrying out frame 506.In frame 702, mobile device or other certain network systems are determined the potential list that may mate the access point fingerprint of current location fingerprint.Referring to this figure, the arthmetic statement of comparison diagram 3B a kind of possible replacement matching algorithm.In this example, for each pilot signal, fingerprint comprises CDMA band class, Pilot PN skew, pilot frequency intensity and pilot phase.Pilot tone sorts with sort in descending order by intensity.Use the PN deviant of strong pilot tone of current fingerprint, find the coupling fingerprint in depositing fingerprint.If find the above potential fingerprint that may mate of pre-determined maximum number, can use the previously described method that relates to pilot frequency intensity and pilot phase (if available) that it is simplified.In this way, just generated the list of the potential fingerprint that may mate.If do not find any coupling, carry out global search at frame 704.
At frame 706, this scan list of sequential scanning is until have a WLAN to be found and connect at frame 708.If be found without any WLAN, proceed in the scanning of 710 pairs of lists of frame, until this list is by limit or timer expires.If this situation occurs, can carry out global search at frame 714.But, when having a WLAN to be found and connecting when upper, optimize the fingerprint of this access point at the frame 712 current fingerprints of use.
Finally, mobile device will run into the situation that oneself may no longer continue to be communicated in its access point that connects.In these cases, certain networking component of wireless device or other initiate to make mobile device carry out to contiguous WLAN change the hand search change the hand trigger event.Fig. 8 has described a kind of flow chart of the exemplary algorithm of changing the hand search for carrying out frame 516.
In frame 802, be created as the scan list of all access points that try to find out near WLAN and will search for.As described in the application of mentioning in the early time and including in, this network can be safeguarded adjacent first list of WLAN.Use this list, search will be changed near WLAN that hand arrives just can be by quicker and carry out expeditiously.For 802.11 WLAN, for example, adjacent first list generally includes SSID, BSSID, frequency band, channel and pattern.These information has been arranged, mobile device just accurately access point searching and need not to scan the traversal many unnecessary replacement access points.At frame 802, augmented information from fingerprint database for typical adjacent first list.For example, can utilize current fingerprint to eliminate in adjacent first list one or more in the middle of these access points based on the fingerprint of access point.Alternatively, can come to select the highest candidate of one or two possibility from the first list of neighbour with current fingerprint.But generally speaking, at frame 802, be that scan list is determined in the first list of neighbour and finger print information coupling.At frame 804, each access point in scan list is scanned, and if find WLAN at frame 806, just connect.In case connect, just can revise fingerprint database.If this WLAN has fingerprint entries, this entry is optimised.If this Wireless LAN access point there is no fingerprint entries, add a new entry to database.
Can realize or carry out with general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic components, discrete gate or transistor logic, discrete hardware components or its combination in any that is designed to carry out the function of describing herein in conjunction with each illustrative logical blocks, module, circuit, element and/or assembly that embodiment disclosed herein describes.General processor can be microprocessor, but in alternative, processor can be any conventional processors, controller, microcontroller or state machine.Processor also can be implemented as the combination of computation module, for example combination of DSP and microprocessor, multi-microprocessor, with one or more microprocessors or any other this type of configuration of DSP central cooperation.
Method or the algorithm described in conjunction with embodiment disclosed herein can be embodied directly in hardware, in the software module of being carried out by processor or embody in the two combination.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or any other form known in the art.Storage medium can be coupled to processor so that this processor can from/read and writing information to this storage medium.In alternative, storage medium can be integrated into processor.
Top explanation provides some illustrative aspects and embodiment.Within the various modifications of these embodiment and aspect are dropped on the scope of the present disclosure, and the generic principles of definition herein can be applied to other embodiment.Thus, claims are not to be intended to be defined to shown these embodiment herein, but should be awarded the full breadth consistent with the claim of language performance, be not intention expression " having and only have " to the citation of the singulative of a key element therein, unless clear and definite so statement, but should be definitely " one or more ".For the key element that runs through each embodiment that the disclosure describes, those of ordinary skills are known or will be quoted clearly for all the 26S Proteasome Structure and Function equivalences known to it from now on and include in this, and are intended to contain for claims.In addition, be the intention contribution to the public without any content in the middle of content disclosed herein, this type of open whether narration in claims no matter dominantly.To understand under the regulation of the 6th section of 35U.S.C. § 112 without any the claim key element, unless this key element be use phrase " be used for ... device " enunciate, perhaps in the situation of claim to a method this key element be use phrase " be used for ... step " narrate.

Claims (19)

1. Wireless Telecom Equipment comprises:
Memory, it is configured to store the information of the position that relates to the first communication network; And
Processor, it is configured to be stored in described information in described memory based on the one or more reference signal corrections from the second communication network;
Wherein, described information comprises the fingerprint of described the first communication network, and described fingerprint comprises the signal strength information of one or more reference signals;
Described fingerprint is used for determining the adjacency of described second communication network.
2. Wireless Telecom Equipment as claimed in claim 1, is characterized in that, described fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described the first communication network.
3. Wireless Telecom Equipment as claimed in claim 2, is characterized in that, described processor is further configured into by adjusting described runout information based on described one or more reference signals and revises described fingerprint.
4. Wireless Telecom Equipment as claimed in claim 1, is characterized in that, described fingerprint comprises the phase information of described one or more reference signals.
5. Wireless Telecom Equipment as claimed in claim 4, is characterized in that, described processor is further configured into by adjusting described phase information based on the current phase information of described one or more reference signals and revises described fingerprint.
6. Wireless Telecom Equipment as claimed in claim 1, is characterized in that, described processor is further configured into by adjusting described signal strength information based on the current demand signal strength information of described one or more reference signals and revises described fingerprint.
7. Wireless Telecom Equipment comprises:
Memory, its be configured to store the first communication network, based on the first fingerprint from one or more reference signals of second communication network; And
Processor, it is configured to
A) determine the second fingerprint of described Wireless Telecom Equipment based on described one or more current reference signals, and
B) based on described the second described the first fingerprint of fingerprint correction;
Wherein, described the first fingerprint comprises the signal strength information of one or more reference signals;
Described the first fingerprint is used for determining the adjacency of described second communication network.
8. Wireless Telecom Equipment as claimed in claim 7, is characterized in that, described processor is further configured into sets up being connected between described Wireless Telecom Equipment and described the first communication network, and determines described the second fingerprint after setting up described connection.
9. Wireless Telecom Equipment as claimed in claim 7, is characterized in that, described the first fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described the first communication network.
10. Wireless Telecom Equipment as claimed in claim 9, is characterized in that, described processor is further configured into by adjusting described runout information based on the runout information of described the second fingerprint and revises described the first fingerprint.
11. Wireless Telecom Equipment as claimed in claim 7 is characterized in that, described the first fingerprint comprises the phase information of described one or more reference signals.
12. Wireless Telecom Equipment as claimed in claim 11 is characterized in that, described processor is further configured into by adjusting described phase information based on the phase information of described the second fingerprint and revises described the first fingerprint.
13. Wireless Telecom Equipment as claimed in claim 7 is characterized in that, described processor is further configured into by adjusting described signal strength information based on the signal strength information of described the second fingerprint and revises described the first fingerprint.
14. a communication means comprises:
Storage relates to the information of the position of the first communication network; And
Based on the one or more reference signal correction institute canned data from the second communication network;
Wherein, described information comprises the fingerprint of the first communication network, and described fingerprint comprises the signal strength information of one or more reference signals;
Described fingerprint is used for determining the adjacency of described second communication network.
15. method as claimed in claim 14 is characterized in that, described fingerprint comprises the runout information that relates to the sizes of virtual of the overlay area of an access point in described the first communication network.
16. method as claimed in claim 15 is characterized in that, described fingerprint is corrected by adjusting described runout information based on described one or more reference signals.
17. method as claimed in claim 14 is characterized in that, described fingerprint comprises the phase information of described one or more reference signals.
18. method as claimed in claim 17 is characterized in that, described fingerprint is to be corrected by adjusting described phase information based on the current phase information of described one or more reference signals.
19. method as claimed in claim 14 is characterized in that, described fingerprint is to be corrected by adjusting described signal strength information based on the current demand signal strength information of described one or more reference signals.
CN200680035227.3A 2005-07-25 2006-07-24 Method and apparatus for maintaining fingerprint of a wireless network Active CN101273654B (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
US70259105P 2005-07-25 2005-07-25
US60/702,591 2005-07-25
US75091905P 2005-12-16 2005-12-16
US75092005P 2005-12-16 2005-12-16
US60/750,920 2005-12-16
US60/750,919 2005-12-16
US11/355,538 2006-02-15
US11/355,538 US8483704B2 (en) 2005-07-25 2006-02-15 Method and apparatus for maintaining a fingerprint for a wireless network
PCT/US2006/028732 WO2007014177A1 (en) 2005-07-25 2006-07-24 Method and apparatus for maintaining a fingerprint for a wireless network

Publications (2)

Publication Number Publication Date
CN101273654A CN101273654A (en) 2008-09-24
CN101273654B true CN101273654B (en) 2013-05-22

Family

ID=40006473

Family Applications (2)

Application Number Title Priority Date Filing Date
CN200680035235.8A Active CN101273655B (en) 2005-07-25 2006-07-24 Method and apparatus for locating a wireless local area network in a wide area network
CN200680035227.3A Active CN101273654B (en) 2005-07-25 2006-07-24 Method and apparatus for maintaining fingerprint of a wireless network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN200680035235.8A Active CN101273655B (en) 2005-07-25 2006-07-24 Method and apparatus for locating a wireless local area network in a wide area network

Country Status (2)

Country Link
CN (2) CN101273655B (en)
UA (4) UA93383C2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102504670A (en) * 2011-10-27 2012-06-20 北京东方雨虹防水技术股份有限公司 Permeable epoxy resin waterproof coating for concrete
WO2014107858A1 (en) * 2013-01-10 2014-07-17 华为技术有限公司 Access point discovery method, device and system
WO2014126606A1 (en) 2013-02-12 2014-08-21 Qi Emily H Methods, wireless communication stations, and system for synchronizing devices and neighbor area networking (nan) configuration
JP6702417B2 (en) * 2016-07-04 2020-06-03 株式会社村田製作所 Position detection system and receiver
CN106922005B (en) * 2017-03-23 2020-06-19 北京小米移动软件有限公司 Method and device for accessing wireless access point and computer readable storage medium
TWI666591B (en) * 2017-11-30 2019-07-21 大陸商北京集創北方科技股份有限公司 Optical detection method for multiple fingerprint information authentication and information processing device using the same

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1233142A (en) * 1998-03-30 1999-10-27 日本电气株式会社 Handoff device for mobile communication system
US6167268A (en) * 1999-02-16 2000-12-26 Motorola, Inc. Method and apparatus for controlling scanning of a subscriber unit

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1233142A (en) * 1998-03-30 1999-10-27 日本电气株式会社 Handoff device for mobile communication system
US6167268A (en) * 1999-02-16 2000-12-26 Motorola, Inc. Method and apparatus for controlling scanning of a subscriber unit

Also Published As

Publication number Publication date
UA93383C2 (en) 2011-02-10
UA97347C2 (en) 2012-02-10
CN101273654A (en) 2008-09-24
CN101273655B (en) 2013-07-17
UA101416C2 (en) 2013-03-25
CN101273655A (en) 2008-09-24
UA95595C2 (en) 2011-08-10

Similar Documents

Publication Publication Date Title
US8798008B2 (en) Method and apparatus for locating a wireless local area network in a wide area network
CA2616774C (en) Method and apparatus for maintaining a fingerprint for a wireless network
EP2055114B1 (en) Intelligent network acquisition for wireless clients
US20080076398A1 (en) Configuring preferred user zone lists for private access points for wireless networking
CN101273654B (en) Method and apparatus for maintaining fingerprint of a wireless network
US11825556B2 (en) Frequency band scan in user equipment
RU2406269C2 (en) Method and device designed to detect location of wireless local network in global network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1125247

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1125247

Country of ref document: HK