WO2008016778A2 - System and method to facilitate handover - Google Patents

System and method to facilitate handover Download PDF

Info

Publication number
WO2008016778A2
WO2008016778A2 PCT/US2007/073698 US2007073698W WO2008016778A2 WO 2008016778 A2 WO2008016778 A2 WO 2008016778A2 US 2007073698 W US2007073698 W US 2007073698W WO 2008016778 A2 WO2008016778 A2 WO 2008016778A2
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
data
mobile unit
mobility
signal
Prior art date
Application number
PCT/US2007/073698
Other languages
French (fr)
Other versions
WO2008016778A3 (en
Inventor
Timothy S. Olson
Original Assignee
Agito Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agito Networks, Inc. filed Critical Agito Networks, Inc.
Priority to EP07840428.2A priority Critical patent/EP2050286B1/en
Publication of WO2008016778A2 publication Critical patent/WO2008016778A2/en
Publication of WO2008016778A3 publication Critical patent/WO2008016778A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • H04W36/0085Hand-off measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • H04W36/322Reselection being triggered by specific parameters by location or mobility data, e.g. speed data by location data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0083Determination of parameters used for hand-off, e.g. generation or modification of neighbour cell lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology

Definitions

  • the present invention relates generally to communications and, more particularly, to a system and method to facilitate handover.
  • wireless technologies have been developed for communication of voice, data and a combination of voice and data.
  • Many wireless devices are being manufactured to enable operabil ⁇ ty in more than one type of technology.
  • portable electronic devices such as cellular telephones and persona! digital assistants, can include interfaces that enable operation using cellular technologies, wireless local area network (Wl. AN) technologies, and/or Bluetooth technologies to name a few.
  • Wl. AN wireless local area network
  • Bluetooth technologies to name a few.
  • many enterprise networks support voice over internet protocol (VoIP) (hat can run over one or more wireless network.
  • VoIP voice over internet protocol
  • WiFi voice networks currently support VoIP and, with little integration, with a wider area voice network, such as cellular networks.
  • Dual mode phones which have both an 802.1 1 interface and a cellular interface, are emerging in the marketplace.
  • the invention relates generally to a system and method to facilitate handover fora mobile unit between radio technologies, As a further example, the invention enables a determination to be made whether a mobile unit resides in an area where a handoff from a first radio technology to a second radio technology may be desired.
  • the area or location where the handoff may be needed is predetermined such as to provide sufficient time to enable the system to set up the call on a new interface prior to the old interface becoming unusable.
  • the result of this evaluation can then be made available for a higher level mobility functions that determine on which radio techno Iog ⁇ interface communication should lake place.
  • One aspect of the invention provides a method to facilitate handover that includes detecting that a mobile unit resides within at least one predetermined location where a handover event from a first radio techaolog) to a second radio technology may need io occur, the second radio technology being different from the first radio tech «o ⁇ og> ,
  • Another aspect of the invention pro ⁇ ides s> stem to facilitate handover.
  • the ostein includes a mobile unit configured to operate according to at least first and second radio technologies.
  • a fingerprint detector evaluates input data ⁇ e g... corresponding ic scanned signals) relative to mobility fingerprint data that defines at least one predetermined roam zone to determine whether a handover between the f fot and second radio technologies should Q)ccur for the mobile unit,
  • the yvstem includes means for storing fingerprint data that define a mobility fingerprint for at least one predetermined roam zone.
  • the sjstem also includes means for evaluating whether to trigger a handoCT for the mobile unit from a first (e a: , current!) connected) radio technology to a second radio technology based on at least one recehed signal relative to the stored fingerprint data.
  • FlG, 1 depicts an example of a sjstcm that can be implemented according to an aspect of the invention.
  • FIG. 2 depicts an example of a mobile unit that can be implemented according to an aspect of the invention.
  • FlG. 3 depicts an example of a radio system that can he implemented in accordance with an aspect of the invention.
  • FlG. 4 depicts an example of a ⁇ x ireless network implementing mobilit> fl ⁇ g €rprif ⁇ ting in accordance with an aspect of the invention.
  • FlG. 5 depicts an example of a floor plan for part of a w ireless network demonstrating calibration that can be utilized to establish a mobility fingerpr ⁇ ni for a roam zone in accordance with an aspect of the ⁇ mention.
  • FIG. D depicts an example of a technique that can be utilized to establish a static mobilit) fingerprint for a roam ⁇ on ⁇ in accordance with an aspect of the invention.
  • TIG. 7 depicts an example of a s> ⁇ lem m which a mobility fingerprint is defined by information from different radio technologies,
  • FlG. 8 depicts an example of a vector fingerprint that can be determined for a roam zone according to an aspect of the imention.
  • FIG. 9 depicts an example of a mobility fingerprint detection system that can be implemented according to an aspect of the invention.
  • FlG. 10 is a graph plotting cellular received signal strength verses ViFi received signal strength that can be utilized to facilitate mobility fingerprint detection in accordance v. ith an aspect of the invention
  • FIG. 11 is a flow diagram depicting a method in accordance with an aspect of the invention
  • the invention relates general!) to a s> stem and method to facilitate handover between different radio technologies
  • the invention facilitates handover by enabling a location to be detected where such hando ⁇ er may need Io occur, For instance, one or more signals can be detected to identify the location, and a trigger signal can be generated to enable handover to occur in response to identifying the location.
  • portions of the invention may be embodied as a method, data processing system, or computer program product, Accordingly, these portions of the present invention may take the furrn of an entire! ⁇ ' hardware embodiment an entire! ⁇ software embodiment, or an embodiment combining software and hardware. Furthermore, portions of the invention may be a computer program product on a computer-usable storage medium ha ⁇ ing computer readable program code on the medium. Any suitable computer-readable medium man be utilized including, but not limited to, static and dynamic dotage de ⁇ ice&, hard disks, optical storage devices, and magnetic storage devices
  • These computer-executable instructions may also be stored in computer- readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture including instructions which implement the function specified In the flowchart block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
  • the invention relates to a system and method to facilitate handover for a mobile unit between different radio technologies.
  • radio technology and variations of this term are intended to encompass any form of wireless communication that mas be utilized to send, to receive or to send and receive audio signals (including voice signals), data signals or a combination of voice and data signals without requiring a hard-wired connection.
  • Examples of different radio technologies include cellular telephones (e.g., 2G, 3G or 4G technologies), wireless networks, (e.g., wireless local area networks (WLAN), &uch as WiFi; wireless metropolitan area networks (WirelessMAN), such as WiMax; and any variation and improvements thereof), satellites, Bluetooth, two-way (or half-duplex) radio, and any combinations thereof.
  • the mobile unit can be implemented in any form of wireless technology, such as including a cellular telephone, personal digital assistant (PDA), a portable computer (e.g., a laptop computer, or tablet computer) and the like.
  • PDA personal digital assistant
  • portable computer e.g., a laptop computer, or tablet computer
  • the mobile unit is configured to enable operation using at least two different radio technologies.
  • the approach described herein enables a determination to be made that a mobile unit resides m an area where a handoff from a first radio technology to a second radio technology may be desired.
  • the area or location where the handoff may be needed is predetermined such as to provide sufficient time to enable the system to set up the call on a new interface prior to the old interface becoming unusable.
  • the predetermined location where handoffmay be needed is referred to herein as mobility fingerprint.
  • the general terra "mobility fingerprint" can correspond to any method used to identify a roam zone where handoff may be required.
  • the mobility ftnge ⁇ ri ⁇ t can be evaluated by a fingerprint detection algorithm, such as based on periodic or intermittent monitoring of one or more inputs.
  • Fingerprint evaluation is a generic technique that may be applied from either the client device or the network infrastructure. The result of this evaluation can then be made available for a higher level mobility functions that determine on which radio technology interface communication should take piaee,
  • FIG. 1 a schematic block diagram of a system 10 that can implement mobility fingerprinting is depicted.
  • the system 10 includes a mobile unit S 2, a first radio system 14 and a second radio system 16.
  • the system 10 can include a plurality of mobile units.
  • Each of the first radio system 14 and second radio system 16 employs a different radio technology
  • the mobile unit 12 includes circuitry configured to interface with at least the radio technologies implemented by the first and second radio systems.
  • the mobile unit 12 may be configured to communicate using any number of radio technologies in addition to those of the depicted radio systems 14 and 16.
  • the first radio system S 4 can employ a wireless network, such as WiFi or WIMAX.
  • the first radio system 14 can include any number of access points that cooperate to form the wireless network.
  • the second radio system 16 may operate using a cellular technology- and thus include a plurality of cell base stations for communication over a corresponding coverage area.
  • the mobile unit 12 is portable and thus can be carried or otherwise transported in space, such as by a user, within the system Id.
  • at least one predetermined location is pre- identified as a roam zone 1 S where it has been ascertained that a handoff from a first radio technology to a second radio technology may need to occur.
  • the roam zone 18 can be defined by a mobility fingerprint.
  • the roam zone ⁇ 8 can have dimensions in two-dimensional space or three-dimensional space depending upon the direction of travel of the mobile unit relative to the location. For example, a user can carry a mobile unit across the floor or ground as well as transport the mobile unit 12 between floors of a multi-floor building or dwelling.
  • One difficulty associated with a device that can operate according to multiple radio technologies is being able to determine when to transition from a first radio technology to a second radio technology such that the user does not detect a disturbance in the continuity of the communication. For example, when transitioning from communication over a wireless network (e.g., voice over internet protocol (VoIP)) to cellular, it may often take several seconds to setup the cellular call This long cail setup time means that any monitoring on the wireless network should assure that the call does not degrade beyond acceptable call quality before the cellular cail is ready. Since the roam zones are established before handover Is to occur (e.g.. a priori), each roam 2one can be established at a predetermined location to provide the mobile unit 12 with ample time to setup the call on the interface for the new radio technology before the signs! on the old (pre-handover) radio technology degrades to an unusable level
  • a variety of mechanisms can be utilized to gather mobility fingerprint data to identify each of the one or more roam zones 18 in the system 10. Examples of data that can be collected to provide a mobility fingerprint for a given roam zone 18 include: received signal strength indicator (RSSI) measurements, transmit power of detected transmitters, physical coordinates of measurements, the identity of transceivers from which signals are detected. Additionally, beacons or other forms of signaling (e.g., RFiD fags) can be provided at a desired roam zone !8 in conjunction with other signals in the system 10 to provide the mobility fingerprints for respective roam zones. Alternatively, the beacons or other signaling ⁇ individually or in any combination thereof) can be provided at the roam zones to establish mobility fingerprints.
  • RSSI received signal strength indicator
  • beacons or other forms of signaling e.g., RFiD fags
  • RFiD fags can be provided at a desired roam zone !8 in conjunction with other signals in the system 10 to provide the mobility fingerprints for respective roam zones.
  • the one or more signals utilized to define the mobility fingerprint for the each roam zone 18 can be a wireless signal propagating according to the first radio technology (e.g., utilized by the first radio system 14), the second radio technology (e.g., utilized by the second radio system 16), another radio technology with which the mobile unit 12 can interface, or one or more signals according to any combination of radio technologies.
  • the particular types of information and signals utilized to provide the mobility fingerprint can vary for a given location according to the type of radio technologies and the technologies supported by the mobile unit 12, for example.
  • a trigger signal can be generated in response to detecting that the mobile unit
  • the trigger signal can be utilized to initiate a handoff event by higher level control functions implemented within the system 10.
  • the higher level control may evaluate other conditions associated with the communication and resources to determine whether the handover event should occur.
  • the detection that the mobile unit resides within the roam iona 18 can be performed by the mobile unit 12, by the first radio system 14, by the second radio system 16, or by a combination of the mobile unit and the first and second radio systems,
  • fingerprint data can be stored in memory of the mobile unit.
  • the mobility fingerprint data can be stored in management software associated with the first radio system, the second radio system or for each of the first and second radio systems.
  • mobility fingerprint data can be loaded into memory of the mobile unit 12, such as in response to detecting that the mobile unit has entered a bounded area.
  • the bounded area can be defined as including any number of one or more base stations or access points, such as may be associated with a floor, building or campus, or another physical structure or defined area that may provide wireless coverage according to a given radio technology,
  • one or both of the first radio system i 4 and the second radio system 16 may include any number of one or more such bounded areas spaced apart from each other to define an enterprise.
  • the bounded area can include a boundary, which may be a physical boundary, an RF boundary or a combination thereof.
  • the same or different algorithms can be employed for the respective bounded areas for the radio systems 14 and 16 to detect whether a mobile unit resides in one of the predetermined roam zones 18. The differences in the algorithms may vary based upon the radio technology as well as based on the type of mobile unit 12 as well as other parameters that may be utilized to establish the predetermined roam zones.
  • each of the predetermined roam zones can be established for predetermined locations as to maintain adequate signs!
  • FIG. 2 depicts an example of a mobile unit 50 that can be implemented according to an aspect of the invention.
  • the mobile unit 50 is a wireless device that includes at least two wireless transceivers 52, indicated as first, second and Nth wireless transceiver, where N is a positive integer denoting the number of wireless transceivers.
  • Each of the wireless transceivers 52 is operative to send and receive wireless signals via corresponding antennas 54.
  • each wireless transceiver 52 includes circuitry' for demodulating and converting the received signals to an appropriate digital format for processing at the receiver as is known in the art.
  • Each transceiver 52 may also include circuitry for converting data being provided from the mobile unit and from modulating and performing frequency conversion of such data and for sending such data out via the antenna 54.
  • the mobile unit 50 also includes a processor 56 that is programmed and configured to control operation of the mobile unit based upon executable instructions stored in associated memory 58.
  • the memory can include random access memory (RAM), read only memory (ROM), flash memory, or other type of memory device.
  • the processor 56 can communicate with each of the transceivers 52 via a bus 60.
  • the processor 56 can also retrieve and store data and instructions relative to the memory 58 over the bos. Alternatively or additionally, the processor 56 may include cache or access other associated memory (not shown) directly.
  • the mobile unit 50 may also include a user interface 64 that can be employed by a user for interacting with the mobile unit 50.
  • the user interface 64 can include an arrangement of graphical interface elements as well as buttons and other controls (e.g., knobs, dials and touch screen controls and the like) for implementing the various functions of the mobile unit 50.
  • the processor 56 can execute instructions, corresponding to a fingerprint detection algorithm 62. for detecting that the mobile unit 50 resides within a predetermined roam zone.
  • the detection algorithm 62 can enable an evaluation of one or more signals relative to predefined fingerprint data (e.g., also stored in the memory 58) associated with the one or more roam zones to ascertain whether the mobile unit resides within a roam zone.
  • a trigger signal can be generated for initiating handover from a first radio technology in which the mobile unit is current! ⁇ ' operating to a second, different radio technology.
  • FlG. 3 depicts a schematic block diagram of a radio system 100 that operates according to a given radio technology.
  • the radio system 100 is intended to provide an overview for any radio technology that can be implemented including, for example, cellular and wireless networks (e.g., VViFi, WlMAX) to name a few.
  • the system 100 includes a plurality of base stations, indicated at base station I (BSl), BS2, BS3 through BSP, where P is a positive integer indicating the number of base stations in the system 100 or a portion of the system.
  • BSl base station I
  • BS2 base station2
  • BSP base station 3
  • P is a positive integer indicating the number of base stations in the system 100 or a portion of the system.
  • each of the base stations 102, 104, 106 and 1OS may correspond to a cellular base station.
  • each of the base stations 102, S 04, 106 and 108 may correspond to ars access point. That is, the term base station is not intended to denote any particular radio technology, but is intended as a generic term that can be utilized to implement a given radio technology for a geographical area,
  • Each of the base stations 102, 104, 106 and 108 includes a coverage area indicated schematically at dashed lines 1 10, 1 12, 114 and 1 16, respectively.
  • each of the base stations can be positioned strategically according to a plan to provide a substantially continuous coverage according to the overlapping coverage areas 1 10, 112, 1 14, and 1 16 provided by the respective base stations.
  • Each of the base stations 102, 104 and 106 and 108 can be connected to each other such as over a network (e.g., a iocal or wide area network or the public telephone switch network) to coordinate operation between the respective base stations.
  • a network e.g., a iocal or wide area network or the public telephone switch network
  • the system 100 can also include a system control ! 18 that is programmed and/or configured to control operation and manage resources in the system 100.
  • the system control 1 18 can include a mobility manager 120 that is utilized to control higher level functions associated with handover events for a mobile unit between fee respective base stations as well as to control handover from the radio technology implemented by the system 100 to a different radio technology in which the mobile unit may operate.
  • the mobility manager 120 may condition the handover event on a variety of factors, such as capacity of the respective networks, available connection quality, estimate battery life of the mobile unit, the type of cad. Additionally or alternatively, (he mobility manage? 120 may also apply a cost algorithm u> determine which radio technology would provide the lowest cost for handling the call. Those skilled in the art will appreciate other factors thai may be evaluated to determine whether to complete the handoff.
  • the base station 102 is depicted as including at least one wireless transceiver
  • the wireless transceiver 122 that is operable to send and receive wireless signals within its coverage area.
  • the wireless transceiver 122 thus includes appropriate circuitry for sending and receiving signals via its one or more antennas 124.
  • the base station 102 also inc ludes a control ier 126 that is coupled to the wireless transceiver 122.
  • the controller 126 controls the operation of the transceiver 122.
  • the controller 126 can include appropriate hardware and software that is programmed and/or configured to perform the functions associated with the base stations.
  • the executable instructions can be stored in memory 128» which can be part of the controller or separate memory from the controller,
  • one or more of the respective base stations 102, 104, 106 and 108 can be programmed to detect that a mobile unit resides in a predetermined roam zone. The determination can be made based on signals received from the mobile unit at the respective base stations as well as from a combination of signals from neighboring base stations, based on which signals a determination can be made that the mobile unit resides in the roam zone.
  • a base station can also include additional transceivers or receivers that can receive one or more signals, in the same or a different radio technology, which can be utilized to determine if the mobile unit resides within the predetermined roam zone. In response to determining that the mobile unit reside ⁇ within the roam zone, a trigger signal can be generated.
  • the trigger signal can be generated b> a base station or b> the mobility manager 120 in the system 100,
  • the trigger signal ears in turn be utilised to initiate a handover event.
  • the handover event further can take into consideration a varien of other factors in the sv stem 100 as well as those associated with the mobile unit to determine whether to complete the handover from the radio technology of the s>stcm 100 to a different radio teehnolog> .
  • the system 100 may be programmed to send fingerprint data to a mobile unsl For example, in response to detecting that the mobile unit lias entered a coverage area provided by the system 100.
  • the bas>e station to which the mobile unit is connected can send a set of fingerprint data to enable detection of a mohiliu fingerprint for a selected portion or for the entire bounded area in which coverage is provided b ⁇ the s>stem 100.
  • fingerprint data may ⁇ x ⁇ over time
  • FiG. 4 depicts an example of a wireless network 300 associated with a given area (e g., a floor oi building, a campus or other area) 302.
  • a given area e g., a floor oi building, a campus or other area
  • I he w neiess network 300 includes a plurality of access points APL ⁇ P2, AP3.
  • AP4 and ⁇ P5 to provide coverage within or around the structure according a given radio technology (e.g . W iF ⁇ or WiMax).
  • Fhe area 302 can include one or more points of entr> or egress, indicated at 304, 306 and 308 through which mobile units may pass.
  • a mobility fingerprint for the point of egress 304 can be defined for each of the roam /one 310 to facilitate handover according to an aspect of the invention.
  • Mobility fingerprints FP2 arid FP3 can also be determined for roam zones 312 and 314, respectively, associated with points of egress 306 and 3OS, [0045J
  • FPl can be defined as a function of RSSI vectors
  • R 1 1. R31 and R21.
  • R 1 ] is the RSS ⁇ ⁇ ector from API to the roam zone 310
  • R3 i is the RSSi vector from AP3 to roam zone 310
  • R21 is the RSSI vector from AP2 to roam zone 310.
  • Similar mobility fingerprints FP2 and FP3 can be established as including RSSI vectors for each of the other roam /ones 312 and 314, respectively, as depicted In FIG. 4.
  • the fingerprint data gathering can be performed by fingerprint calibration data collection, adaptive fingerprint data collection, predicted fingerprint data collection or by an> combination of two or more such approaches.
  • the RSSI vectors ran include raw data marnsailv collected during calibration b> circuitry of a mobile device that can operate according to the radio technology of the wireless network. 300.
  • the raobi ⁇ t ⁇ fingerprint for a given roam zone further may be calculated based on the raw collected data (e g , RSSl measurements) as well as the additional information that can be gathered during calibration.
  • the calibration phase can also collect transmit power of the detected APs.
  • the physical coordinate* can be generated b> the network 300 or another system, such as a GPS.
  • the approach described herein supports using path loss as a metric.
  • the path loss from a gh en AP is independent of the transmit power, but requires that ih ⁇ transmit power of the AP be known.
  • ail trianguiation calculations can be made b ⁇ converting a received signal strength into a corresponding path loss value.
  • 1 here are several wa ⁇ s that the transmit power may be determined. F ⁇ r example, in a WLAK, tools of the WLAN management s> stem may be accessed to obtain an indication of the transmit power.
  • the mobile unit operates a ⁇ a wireless client in WTAN
  • various sen ices can interface with the WLAN management system to support intra-network roaming as the mobile unit roams within the coverage area(s) supported by the WLAN.
  • a Roam An> where (RA) server running within the WLAN can support such roaming as well as be programmed to access a WLAN management system and gather data that describes the current transmit power settings of the APs.
  • any subsequent changes in power can be detected by the RA server for providing an updated indication of the transmit power. With this transmit power data any signal measurement from the client may be easily converted into a path loss.
  • WLSE Wireless LAN Solution Engine
  • Beacon or probe response frames provided by an access point can be evaluated to provide an indication of transmit power for an access point.
  • the Compatibility Extensions (CCX) program which is available from Cisco Systems, Inc., provides elements that indicate the AP ' s current transmit power.
  • the IEEE is developing standards for doing the very same. These additions to the standard can be found in the current TGk draft. Those skilled in the art may understand and appreciate other methods that can be employed to provide an indication of transmit power for various types of wireless transmitters, which can be leveraged to determine path loss value.
  • FIG. 5 demonstrates an example of some calibration data that may be gathered near roam zone 310 for FPl for the wireless network 300 shown and described in FlG 4,
  • several data points are gathered for a plurality of respective locations 320 adjacent the egress point 304, which may reside both inside and outside the area (e.g., building) 302.
  • This data represents the raw data collected by a mobile unit 322, such as a reference data collection device, which can operates as a client within the wireless network 300.
  • a data collection device e.g., a mobile unit
  • This raw collected data can be processed into a mobility fingerprint (e.g., FPi of FlG. 4).
  • the mobility fingerprint calibration data may be collected and stored locally on the collection device and then transmitted to a management server (e.g., a roam anywhere (RA) server) for processing into a corresponding mobility fingerprint.
  • a management server e.g., a roam anywhere (RA) server
  • the collected data can be transmitted in real time to the roam anywhere (RA) server,
  • a portion or all such processing may be performed locally by the data collection device.
  • a strategic consideration is to not tose any of the collected data regardless of whether the device is connected to the wireless network 300. as such data can enhance the resulting mobility fingerprint.
  • Another consideration during the gathering of the calibration data is to ensure the APs used for the fingerprint generation belong to the desired wireless network 300 and not a rogue or neighboring network. Using signals from other AP's.
  • the filtering of extraneous APs and associated raw data can be done at any point, such as during the collection of the data or while the data is being processed for generating the mobility fingerprint.
  • Fingerprint calibration data collection generally requires thai an administrator or other person physically gather the data for the roaming zones. However, it is possible that the administrator may not know where all the roaming zones are in a given building. For example, there can be areas In the wireless network that are not exit points but do demonstrate weak or unusable wireless connectivity for communication purposes. Irs this case, without mobility fingerprint data for such locations, the roaming algorithm would need to fall back to simple signal strength and quality mechanisms for roaming such as described herein.
  • Adaptive fingerprint data collection provides a substantially automatic approach that can be utilized to gather fingerprint data.
  • Adaptive fingerprint collection is a mechanism where the mobile unit in the wireless network 300 derives fingerprint data as a result of its norma! operation, In this situation the gathered data can be the same data that is gathered during calibration, except that it is unlikely that the client will have physical coordinates.
  • approaches exist and may be developed in the future to enable an accurate determination of the mobile unit's location, such as through new additions in the standards related to location.
  • the TGv task group has defined mechanisms that allow a client to periodical! ⁇ generate its own location or receive its location from the WLAlS. Additionally or alternative, other methods, such as GPS or assisted GPS techniques, can be employed to generate location information.
  • Some of the methods that can be used to adaptive! ⁇ ' gather fingerprint data include Post RF failure scanning data examination (time based) and initial WLAN access scanning data examination.
  • Post RF failure scanning data examination time based
  • initial WLAN access scanning data examination By way of example, when the mobile client is in an active session within a WLAN, such as a voice, call data will be collected for the purpose of searching for fingerprint match.
  • Some amount of the past collected data e.g., about 5 to about IO seconds worth of data
  • the past data can be examined, it has been determined that the data collected within the last 5 to 10 seconds iikely contains data that identifies the zone where a handoff should be initiated.
  • the stored data can be transmitted to a roam anywhere (RA) server or other service for processing. Similar data can be collected by a plurality of mobile units operating in the wireless network, which data can be aggregated and processed to generate the mobility fingerprint for each identified roam zone. Other techniques cart be utilized to determine a common point of egress for a facility or building, for instance, data collected from multiple mobile devices can be examined to identify a common location where such devices exhibit substantially the same handover event according to a minimum signal strength criterion. The set of measurement data associated with Che handover events can be utilized to define a mobility fingerprint for the common point of egress. This common set of measurements should exist for the mobile unit regardless of the direction of travel after exiting the building.
  • RA roam anywhere
  • Another method of collecting adaptive data Is to examine scanning data collected by mobile units upon initial association with a wireless network. By tracking the time when the wireless network first becomes visible to the wireless adapter of the mobile unit, it is possible to identify the mobility fingerprint at this location. It should be noted that the fingerprint data collection method may require some amount of speculation as to where the client Is at the time of this normal wireless event. To improve the accuracy of this approach, the data collected in connection with such initial association by the mobile units can be collected over an extended period of time before using such collected data to generate a corresponding mobility fingerprint. For example, if the RA server can determine that several clients are seeing similar data at tJhe same RF locations then the data can be deemed statistically significant and, therefore, processed into a mobility fingerprint for such locations.
  • the predicted fingerprint data collection approach lies somewhere in between the former two methods of calibration and adaptive fingerprint data collection.
  • WLSE Wireless LAN Solution Engine
  • WLC Wireless LAM Control System
  • the RA server imports signal strength information from one or more toois that support WLAN coverage prediction. An administrator can then identify the targeted roaming zones and the mobility fingerprint data would be generated for those identified locations.
  • the generated data can be substantially same as mentioned above with respect to the calibration data collection method.
  • a main portion of the predicted data acquired from such tools is the expected RSSi to each AP.
  • the RA server it is possible for the RA server to utilize the surveyed data directlv. AirMagnet Surveyor tool requires a user to walk around and collect data for the purpose of predicting coverage.
  • This data is in the format of a Hie with measured RSSl and other information. It is possible that this file may be directly imported by the RA server or other processing device to generate f ⁇ ngerprini data for one or more roaming zones,
  • the collected data can be processed io generate a mobility fingerprint for each identified roaming zone.
  • the collected data can be used to generate fingerprint data.
  • one approach is triangulation of a static, fingerprint based on the collected data.
  • Static Fingerprinting operates on the concept of defining one physical area by a range of signal strength values seen from multiple transmitters. The size of the area can be defined by the overall allowed signal strength range from each of the transmitters.
  • Static Fingerprint FPi can be located by the evaluating of RSSI vectors Rl 1 , R21 and R31. ⁇ t is possible to identify this specific location by finding the cross section of the signal received from each of the APs detected at the location.
  • FIG, 6 demonstrates an example of how FPI associated with the roam zone
  • FPl can be determined by finding the cross section where signal strength values RI l, R2! and R31 intersect. It will be appreciated that, in practice, the signals from the radios will not radiate uniformly (due to antennas, reflections, walls, interference, etc.) as shown in the example of FIG. 6: however, the concept being applied can work in practical scenarios.
  • Table 1 lists some example data thai can be used to define FPI for the roaming zone 310 in the example of FIG. 6.
  • the RSSl values are ordered in order from strongest to weakest, narneiy in descending order AP2, API and AP3.
  • One of the identifying factors of a static fingerprint can be the strength of the signal received from the APs.
  • the RSSI vector having the highest RSSl value can be considered a primary identifier for the fingerprint with the other RSSS vectors being secondary identifiers.
  • the RSS! Variance in Table S indicates the allowed range of signal strength that defines the size of the roaming zone 3 SO for each AP.
  • a mobility fingerprint can be generated based on signal characteristics from signals transmitted according to more than one type of radio technology
  • Signal characteristics can include attributes or properties, such as can be measured or calculated from the received signal, information carried by the signal as well a combination of attributes or properties and information.
  • static fingerprints can also include information from other radio technologies.
  • FIG. 7 expands on the static fingerprint FPl to include information relating to signals from multiple radio technologies.
  • the communication system 300 can also include one or more base stations 330, indicated at SS_1 through BS P, where P is a posithe integer denoting the number of base stations with which a mobile unit may be able to connect at the roaming *one 310.
  • the base stations 330 can correspond to cellular base stations, satellites, two-radio routers and the like.
  • the base stations in FlG. 7 are assumed to be cellular base stetsons that provide cellular information. A given location is often covered b> one or more cellular base station,
  • the static fingerprint FPl might be captured for predetermined location 304 to that include both WiFI radio information and cellular tower information.
  • GSM global system for mobile
  • MCC Mobile Country Code
  • MNC Mobile Network Code
  • LAC Location Area Code
  • RSSI Received Signal Strength Indicator
  • Vector mobility fingerprinting builds on the concept of the static fingerprint by combining several static fingerprints together. As a result, a vector fingerprint can provide an indication of direction of movement within a location. Since vector fingerprinting provides an additional movement component, vector fingerprinting can operate as a discriminator to help reduce false fingerprint detections or missed detections, [QQSSj By way of example, FlG, S demonstrates an example of a vector fingerprint
  • VFPl that includes a combination of four static fingerprints FPIA.
  • FPI B, FPl C and FPlD associated with the egress 304 of egress point 304 in the wireless network 300
  • Each static fingerprint may include signal characteristics from the same set of APs ⁇ e.g. * API, AP2 and AP3) or the static fingerprints can include one or more different APs.
  • signals from APs 5 signals from other radio technologies can also be utilized to form the static fingerprints that combine to define the vector fingerprint VFP], such as described herein.
  • Table 3 lists an example of sample values that might be included in a vector fingerprint VFPI of FlG. S. By evaluating the changing RSSl values it is possible to determine that the direction of motion is towards the roaming zone.
  • a false positive result can occur when a roaming ? ⁇ ne is falsely detected such that is causes an unwanted move from the current network to (he next network.
  • a false positive result can be the result of inaccurate measurements, environmental changes affecting the measurements, or incomplete measurements.
  • One way to mitigate false positives is to add one or more additional discriminators to the fingerprint detection algorithm, As used herein, a discriminator corresponds to an additional condition or criteria having a value that can prevent a fingerprint from becoming a positive match.
  • a discriminator thus can nullify an otherwise possthe fingerprint match if the discriminator has a predetermined value (or is within a predefined range of values),
  • one or more exclusion area* can be created to operate as discriminators.
  • An exclusion area can be detected by examining the complete set of signals received in a measurement, if a signal is received from an AP that is not in the fingerprint set or has a signal strength that is significantly different than what is expected for the fingerprint, then the area defined by the measurement can be considered excluded, Referring back to FlG.
  • an area or region 350 is shown that could cause a possible fake positive match, such as for the fingerprint FPI associated with the egress 304.
  • a possible fake positive match such as for the fingerprint FPI associated with the egress 304.
  • the fingerprint algorithm would need to be configured to support mobility fingerprint detection w ith partial matches.
  • the AP4 RSSl vector we can conclude that this is not a fingerprint match for FP I , Similar exclusion conditions can be established for other mobility fingerprints.
  • data that defines exclusion areas can be provided with the fingerprint data in a fingerprint data set.
  • a mobility fingerprint includes radio information from a different radio technology than the current connection (see, e.g., FlG. 7), it is possible to use the different radio technology information as a discriminator. Assuming a mobile unit is currently connected with a WiFi wireless network 300, for example, cellular tower information, W'iMax information, Bluetooth information, an RFID tag or another radio technology can operate (individually or collectively) as a discriminator. Once a match has been made.
  • the celiular tower information may be used to confirm the overall fingerprint match as being a valid match.
  • the cellular tower information can be used as a discriminator in one or more ways.
  • a radio lower can be delected by matching one or more radio tower identifiers, such as MCC, M-NC, LAC, and/or Cell id.
  • the tower information can be detected as a discriminator if the measured RSSI matches the RSSI value defined by the mobility fingerprint. Additionally or alternatively, the tower information might indicate that the measured RSSI is less than fingerprint RSSI or if the measured RSSl is stronger than fingerprint RSSl.
  • FIG. 9 depicts an example of a system 400 that can be utilized to detect a mobility fingerprint according to an aspect of the invention.
  • the system 400 includes a fingerprint detector 402 that is programmed and/or configured to determine if a mobile unit resides within a predetermined roam zone.
  • the fingerprint detector 402 can be programmed with one or more fingerprint evaluation algorithms according to the type and content of the fingerprint data and based on where (what part of the system) the evaluation is performed.
  • the mobility fingerprint detector 402 thus can determine a fingerprint match based on a set of one or more inputs 404 and a predetermined fingerprint data set 406 that includes fingerprint data 408.
  • This particular type of input 404 can vary depending upon the type of signals and the sources of the signals that are utilized to generate the fingerprint date set 406.
  • the fingerprint detector 402 processes the inputs at 404 and compares the processed results relative to the set of fingerprint data 406.
  • the fingerprint detector 402 can be implemented in a mobile unit (e.g., a wireless client), a network infrastructure (such as a server associated with cellular base station or an access point), or may he distributed across a mobile unit and network.
  • the set of fingerprint data includes fingerprint data
  • the fingerprint data set 406 can include fingerprint data 408 for a group of roam zones as such as may be associated with a bounded area or other desired location or group oflocations.
  • the fingerprint data set 406 can be programmed by a fingerprint program signal indicated at 410.
  • the fingerprint data set may be fixed or n may be updated over time such is based on the program signal 410.
  • the program signal 410 can be provided to modify the fingerprint data 408 in the fingerprint data set such as to reflect changes in the roam zone.
  • the changes to roam zone can include adding a new roam 2oee, be ⁇ e ⁇ ing in an existing roam zone or changing the fingerprint data associated with a given roam zone.
  • the fingerprint data 408 thus can be provided to the fingerprint detector 402 for performing ami identifying mobility fingerprints.
  • the fingerprint detection system 400 can be implemented in a mobile unit. Due to the size of many enterprise systems, it would not be acceptable to configure the data for ail locations on the mobile unit - the amount of data could prove to be excessive and possible exhaust the memorj on the device. According!), roam zones can be organized into manageable groups or sets. The mobility fingerprint data set 406 associated with each roam zone in a given group can be distributed to the mobile unit in the form of the fingerprint data set 406 as needed.
  • one possible grouping for enterprise customers is to segment the data into selected areas, such as campus, building, and floor. Each floor may contain multiple roam zones, typically at the points of entry and exit of the building.
  • means are required to identify which fingerprint data sat the mobile unit currently needs.
  • This means can be in the form of key data provided by the mobile unit to the network, which can be evaluated by corresponding executable instructions.
  • the key can be generated by the network based on a connection the mobile unit being connected to a particular portion or portions in the network.
  • the type of key data can vary depending on the type of mobility fingerprints being employed. Examples of possible key data include Access Point BSSlD, GSM Cell Id, and GSM Location Area Code (LACj to name a few.
  • Other identifiers or RF tags associated with a particular location can also be utilized as key data to identify a set of fingerprint data that Ls needed for the mobile unit.
  • the key data can include the BSS ⁇ D of one or more AP, Irs this, case, the mobile unit can pass the BSSID of the ⁇ P to which it h currently connected to a higher level function (e.g., a mobility manager).
  • the higher level function cars cause the appropriate fingerprint data set to be loaded onto the mobile device based on the BSSID of the connected AP.
  • the mobile de ⁇ ice moves from AP to AP it may receive a new data set based on the key data. If the data set has been segmented b> floors, the mobile device can receive a new data set as it moves to each new floor in a building or possible as it moves to a new building. ThoM?
  • the one or more input 404 to the fingerprint detector 402 can include signal measurements by a device or devices implementing the system 400.
  • a measurement system 412 can receive one or more signals from a transceiver or from a plurality of different transceivers or receivers to provide measurements or other signal characteristics of the one or more received signals.
  • the measurements ma ⁇ ' include a received signal strength (RSS!) measurements from a detected base station as well (e.g., on AP or a ceil tower) as information identifying the detected base station.
  • RSS received signal strength
  • the base station can include an access point, such as for WiFi and W ⁇ Max wireless network as well as a cellular base station, for example, a data extractor 414 can be programmed and/or configured to extract predetermined data from a data signal 416.
  • the data signal 416 can be received over a wireless communication link after appropriate preprocessing and removal of the physical layer.
  • the data extractor 414 can extract predetermined information elements from the media access control (MAC) layer of an associated protocol stack over which Information is being communicated.
  • the information elements for example, can include the transmit power associated with the detected base station (e.g., access point).
  • the input 404 can also include physical location coordinates for where the measurements are taken.
  • the input 404 to the fingerprint detector 402 can include a variety of other information derived from one or more signals that can be received by or transmitted from a mobile unit.
  • Examples of such other signals include GFS information, beacon signals (e.g., from a Bluetooth beacon located adjacent or at the roam zone) as well as other signal transmitters and transceivers that may be operating within the muitimode wireless communication system.
  • the fingerprint detector 402 can Include a preprocessing block 420 that is programmed and/or configured to implement preprocessing on the input 404,
  • the preprocessing 420 can include filtering or extraction of extraneous data from the input 404 to enable appropriate processing of the relevant input data, For example, the preprocessing 420 can arrange the input data into an appropriate format (e.g., array, table, linked lists, or other data structures) to facilitate processing thereof.
  • an appropriate format e.g., array, table, linked lists, or other data structures
  • the scaling component 422 can perform appropriate scaling to eliminate (or reduce) variations in the hardware and software used to make the measurements. That is, the scaling component 422 can scale signal characteristics or parameters from a scan set to be consistent with signal characteristics defined by the mobility fingerprint data. For instance, the use of a path loss for measurements can correspond to one type of scaling to help eliminate the absolute value problem thai can arise from RSSI measurements. However, the use of path loss does not solve receiver and transmitter gain differences that may also be present. For example, it is likely that two different mobile units from two different manufacturers have antennas with different receiver gain characteristics.
  • the scaling component 422 may implement a sum scaling algorithm that works on the principle of converting each individual AP measurement into a weighted proportion of sum of all measurements.
  • the scaling component can scale both the fingerprint RSS values and the measured RSS values so that they are evaluated to be a proportional match rather than an absolute match,
  • the scaling component 422 thus can apply weighting to the scanned RSS values corresponding to the inverse of the scaled measured received signal strength.
  • the scaling component 422 may also utilize a strongest AP scaling algorithm to scale the measured data provided by the measurements system 412.
  • the strongest AP Scaling algorithm assumes that when any measurement scanning takes place, the resulting SCANset is a match to the fingerprint data 208 that is under evaluation. If the SCANset is a match, the strongest AP in the SCANset would also be a match.
  • AH other RSSl values in the SCANset can be sealed by the difference of the strongest RSSl value in the SCANset and the corresponding RSSI value in the FPset.
  • the scaling component can determine a scale value to apply as follows; where: APm is the strongest AP in SCANset, atid
  • FP_AP ⁇ is the corresponding RSSI value from the FPset.
  • the scaling component 422 can scale each S_RSS ⁇ i) value, such as follows;
  • die scaling component 422 can also determine a scaling value for each device by measuring a constant source and taking the difference between a reference device and the test device.
  • the fingerprint data set 406 can be generated when signals (defining a mobility fingerprint) are sampled at the roam zone by a given reference device having particular operating parameters.
  • the mobile unit mov ing within the system or enterprise may be a different type of device than the reference device, such that certain parameters of the input 404 to the fingerprint detector 402 may require device scaling.
  • the scaling value for a given scanning device (or mobile unit) can be expressed as follows: where; RSSIRB is the measurement with the reference device, and
  • each supported device may either be configured with its measured scale value to be delivered with the fingerprint data 408.
  • each supported device may either be configured with its measured scale value to be delivered with the fingerprint data 408.
  • scaling ears be performed at the measurement system 412. Since fingerprint data can be associated with different roam ?.ones, different scaling may be applied for different groups of the fingerprint data.
  • the scaling component 422 provides the scaled input data to an evaluate* 424.
  • the evaiuator 424 is programmed and/or configured to determine if the mobility fingerprint defined by the input data at 404 substantially matches any of the fingerprint data 408. As used herein, the term “substantially” is intended to Include minor variations or deviations in the associated term that is being modified, such as within a detem ⁇ nable variance.
  • the evaiuator 424 employs an evaluation algorithm that compares the Instantaneous sampled data from inputs at 404 relative to the fingerprint data 408.
  • the evaluation algorithm performed by the evaiuator 424 can be implemented as logic on the mobile unit, logic in the network or as a combination of logic on the mobile unit and the network.
  • Such logic further can be provided In the form of hardware (e.g., field programmable gate array (FPGA) or other logic structure), software ⁇ e.g.. executable instructions stored in memory or running on a processor) or as a combination of hardware and software.
  • FPGA field programmable gate array
  • the algorithm that is utilized can vary significantly depending on the data that was available at the time of generating the mobility fingerprint data 408, For example, different algorithms would likely ho needed depending on whether the fingerprint information available is only data with respect to the roaming zones or whether the data covers the entire coverage area. This is because having a complete coverage data set allows the possibility to more accurately define the probability that a given roaming zone is detected against the total coverage area available.
  • the evaiuator 424 can also include a calculator 428 programmed to calculate fingerprint parameters based on the input received at 404.
  • the calculator 428 can be programmed with one or more algorithms 429 to compute the values consistent with the fingerprint date collection approached utilized to gather the fingerprint data 408. Examples of the types of algorithms that can be employed b> the evaiuator 424 and the calculator 428 are described below with respect to certain example embodiments.
  • the calculator 42S can calculate fingerprint data for each of the signals provided with the input 404 or to a selected subset of the input signals corresponding to the input 404, For instance, a selected subset of a portion of the plurality of received signals can be identified based on the received signal strength (RSSI value) exceeding the threshold.
  • the RSS! value for instance can also be calculated by the calculator 428 to an appropriate scale (e.g., dBm, a predefined scale of 1 to 100 or the like).
  • the calculator 428 can perform calculations as a function of the signal values that may be calculated as well as the signal values defined by the fingerprint data 408,
  • the comparator 430 can compare the calculated results relative to a threshold to determine if a match exists.
  • the threshold for example, may correspond to a histogram of fingerprint data or statistical methods may be employed to determine the likelihood of a match.
  • the results of the evaluation are provided to a handofF trigger generator 432 that is configured to generate a trigger signal at 434 if the results of the evaluation indicate that the mobility fingerprints of the mobile unit matches the mobility fingerprint defined by any of the fingerprint data 408,
  • the evaluator 424 may also employ one or more discriminators 436 that can be utilized as part of the fingerprint data to help confirm the occurrence of a positive match between fingerprint data 408 and the inputs 404.
  • suitable discriminators 436 may include the RSSl for a given cell power, location information ⁇ e.g., location within a network or a global position), receiving a signal from a beacon or the strongest access point corresponding to the primary identifier to which the mobile unit has connected. These and other discriminators thus can be aggregated with the results of the calculator 428 to mitigate the likelihood of false positive matches.
  • the evaluator 424 requires an evaluation algorithm that can provide a metric to maximize accurate roam zone detection arid minimize false positives, (n this example, it is further assumed in the fingerprint data set 406 that nothing is known about the overall coverage area other than the number of APs in a given fingerprint data set and the corresponding RSSL Because of the lack, of a complete data set for the entire coverage area, the approach that will be described is a deterministic approach to evaluate against the small set of roaming zone fingerprint locations.
  • fingerprint evaluation schemes may be utilized, such as a probabilistic approach (e.g., employing Bayes theorem ⁇ where the probability of being at the fingerprint location is evaluated. Additional discriminators may also be applied to help reduce the occurrence of false positive matches. [0089]
  • the overall detection algorithm performed by the e ⁇ aluator 424 can use a standard constraint -handling technique of evaluating both the feasible solution and an infeasibie solution.
  • the basic algorithm operates on a fingerprint data set 406 that defines the possible roaming zones generally in range of the client's current location.
  • ThK set of fingerprint data set 406 can be represented as follows'
  • n is the total number of entries of fingerprint data 408 m the data set 406,
  • FPi is the i* fingerprint data entr> .
  • Each fingerprint data 408 has a specific fingerprint t ⁇ pe, _,uch aj> described herein.
  • fingerprint data 408 minima! ⁇ contains a list of detected APs and corresponding received signal strength values, such as follow s:
  • FPs ((FP_AP1, FP RSSl), (FP_AP2, FP_RSS2),...,(H> APk, FPJRSSk)) Eq. 9 where k is the total number of detected APs for a given entry of fingerpiint data 408.
  • the wireless adapter can perform a periodic scan to generate an instantaneous nearest neighbor I hi.
  • This instantaneous neighbor list can contain a list of detected APs and corresponding received ⁇ Igrsal strength (RSS) values, such as can be represented as foiluws;
  • S RSSi is the corresponding measured receive signal strength.
  • Two genera] classes of fingerprint detection algorithms include an effort lo identify a well bounded area, such as an area supported by a wireless network. The output of this type of algorithm thus can be used as an indication that a mobile unit is current! ⁇ ' located in that well bounded region.
  • Another class of algorithm seeks io identify a boundary region. The output of this second type of algorithm can be used as an indication that a mobile unit is somewhere outside the boundary region (i.e. a much larger area ⁇ .
  • the boundary can correspond to a physical boundary or an RF boundary (e.g., based on signal strength for one or more signal, quality of connection and the like).
  • a distance vector algorithm is one example of an algorithm that can be implemented for the first category of fingerprint detection algorithm.
  • the evaluator 424 can implement a distance vector algorithm to identify a well bounded area in the network, such as by the calculator 428 computing the sum of the differences of the distance from each AP during the instantaneous scan and the distance from each AP in the fingerprint.
  • the comparator 430 can then compare the sum against an acceptable total allowed difference.
  • the calculator 428 can employ s weighted nearest neighbor algorithm to determine if any fingerprint matches exist.
  • the nearest neighbor can be determined by calculating an appropriate distance metric, such as a Manhattan distance calculation, an Euclidean distance calculation, or a Chebyshev distance calculation to name a few.
  • the overall distance calculation can be scaled to accommodate the variation in antenna gain for each mobile client in the network, [0094]
  • a feasible solution using the weighted nearest neighbor method exists only if the number of neighbors is three or greater. When the number of neighbors is less than three then the minimum signal strength method should be used, for instance, the calculator 428 can evaluate the minimum signal strength for the feasible solution, such as follows; For a va ⁇ d feasible solution to exist, the result of Eq. 1 1 should be less than the worst case allowed differential from the fingerprint data.
  • the worst case allowed differential can be calculated b> the calculator 428 a*> follows: where cri is the allowed RSSl variance for the ith AP,
  • RSS values in both Eqs. 1 1 and 12 can be scaled values, such a ⁇ described herein.
  • I he infcasible solution evaluation from Eq. 7 can be utilised to incorporate some of the possible discriminators prex iousl) described. As described herein, the discriminators help reduce an> false posithes that ma> occur, such as b ⁇ confirming the ⁇ alidity of the match provided by the feasible solution.
  • the in feasible solution can evaluate missing APs in the instantaneous scan AF list and APs with high RSS in the instantaneous scan AP list that arc not part of the fingerprint. I'he presence ot other discriminators can aiso form part of the in feasible solution.
  • the evaluaior 424 can employ a distance ⁇ ector individual algorithm that is capable of identifying a bounded area. Rather than examining the sum of the diff ⁇ ncei, as in the preceding example, this algorithm compare* the distance from each AP from the instantaneous scan and the distance from each AP in the fingerprint on an AP per AF basis, AP comparisons that are a match contribute to the feasible pan of the evaluation while AP comparisons that do not match contribute to the ⁇ nleasible part of the evaluation.
  • the calculator 428 can employ an evaluation algorithm 429 that can be represented as follows:
  • the resulting evaluation produces a sum of matches from the feasible solution minus mismatches from the infeasiblc solution.
  • the comparator 430 can compare the E ⁇ al value against the total number of APs in the FPset to determine if a valid match exists.
  • the percentage of matching APs is a configurable value
  • the calculator 428 can compute a difference of RSS values is compared agaatst the allowed variance. This computation can be represented as follows: where; S RSSm is the scanned RSS vai ⁇ e for a given AP,
  • FPJtSSn is the RSS value from the fingerprint data 208, and ⁇ n is the allowed variance for the RSS value associated with the given AP.
  • the result of Eq. 14 thus corresponds to a tola! count of SCANset measurement vectors that are within the allowed variance of the corresponding RSS value in the FPsct.
  • the RSS values can be scaled values.
  • the calculator 428 can compute a difference of RSS ⁇ aiues that is compared against the allowed variance. This computation can be represented as follows:
  • the result of Hq. 15 is the total count of SCANset measurement vectors that are outside the allowed variance of the corresponding RSS value in the f Pset. NoU* that the RSS values in Fq. 15 can be scaled. Additional! ⁇ , the allowed variance for Eqs. 14 and 15 may be the same or different variance values may be utilized for the feasible and tnfeasibie solutions.
  • the evaluator 424 can employ an algorithm 429 that is referred to as the strongest AP set algorithm.
  • the strongest AP set algorithm fails into the category of algorithms that are capable of determining if a mobile unit is outside of a boundary region.
  • the primary principle of this algorithm Is that some portion of the AP's measured during the neighbor scan has a measured RSS that is less than the corresponding RSS value in the fingerprint data set 406, This genera! AP comparison is aiso governed by the strongest AP in the SCANset which must meet the criteria above.
  • the evaluation algorithm cart have the form of Eq. 13.
  • the calculator 428 is programmed to produce ⁇ sum of matches (forming the feasible solution) minus mismatches ⁇ forming the infeasible solution).
  • the comparator 430 compares the Eval value against the total number of APs in the fingerprint data set 406 to determine if a valid match exists.
  • the percentage of matching APs can be a configurable [00100]
  • the algorithm 429 of the calculator 428 computes the Oval f() value as a function of the SCANset RSS values and the RSS values in the fingerprint data set 406. Tins evaluation can be expressed as follows:
  • Eq, 16 is the total count of SCANset measurement vectors that are less than the corresponding RSS value in the fingerprint data set 406.
  • the calculator 428 can determine the infeasible solution component of Eq. 13 by evaluating the SCANset RSS values relative to the FPset RSS values. This comparison can be represented as follows:
  • the result of Eq. 17 is an infeasible solution that represents the total count of SCANset measurement vectors that are greater than or equal to the RSS value in the FPset It will be appreciated that the RSS values in Eqs, 16 and i 7 can be scaled.
  • the calculator 428 can compute the results of Eq, 13 as ihe difference between the count values produced by Eqs. 16 and 17 to identify whether a valid fingerprint match exis ⁇ s.
  • Yet another algorithm that can be implemented to detect (or enhance detection of) a mobility fingerprint is a strong cell weak AP algorithm.
  • the strong cell weak AP algorithm operates on the principal that at many roam zone locations the cellular radio signal becomes stronger while the AP signal becomes weaker. For example, this set of conditions can often be detected initially at the entrance and exit points of a building.
  • FfG. 10 shows a plot, indicated at 450, of cellular signal strength and WiFi signal strength for data gathered for a typical enterprise building in which a WiFi wireless network is implemented.
  • the diamonds represent measurements taken inside the building and squares represent measurements taken outside the building.
  • This plot 450 demonstrates a distinct change in the relative signal strengths when inside the building versus when outside the building.
  • the calculator 428 thus may evaluate the relative signal strengths as part of feasible solution EvaMO that can be represented as follows: where: co ⁇ AP_RSS is the RSS value for the connected AP, regCeU_RSS is the RSS value for the cellular station to which the client is connected, and
  • FP _Cell_RSS is the RSS value defined by the Fingerprint data 208
  • the RSS values can be scaled values.
  • the fingerprint evaluator 424 can include a prequa ⁇ ficatio ⁇ block 426.
  • the prequaiificatlon block 426 can include logic programmed to help reduce the amount of time the fingerprint detection algorithm requires for scanning.
  • the prequai ⁇ ficari ⁇ n block 426 can operate to determine if an expected received signal is absent from the mobility fingerprint for the fingerprint data 408. Fingerprint prequaiiftcatio ⁇ can leverage the fact that there is very little penalty for monitoring the RSSl of the currently connected AP or other base station.
  • the prequaiification block 426 can perform prequaUfication based on signal characteristics of one or more other received signal or on any combination of signals.
  • the fingerprint detector 402 can cause the measurement system 412 or other associated circuitry " to initiate appropriate scanning so that appropriate signals can be acquired for performing fingerprint detection.
  • the fingerprint detector 402 can provide a control signal to the measurement system 412 directly or it can be provided to higher level conirol functions to enable the scanning.
  • the prequaUfication block 426 may also be utilized to reduce the subset of fingerprint data such that, if there is no possibility of a match with a given fingerprint, additional calculations are not performed.
  • the nrequahficatio ⁇ block 426 can help reduce the time and amount of processing required to evaluate mobility fingerprint for a mobile device.
  • Prequaiif ⁇ cation can vary depending on the particular fingerp ⁇ mi detection algorithm used. For example, some fingerprint detection algorithms, such as distance vector indr ⁇ duai algorithm, can prequahfy by testing if the connected AP's RS ⁇ l is substantially equal to the corresponding RSSI in the fingerprint data 408, Other fingerprint detection algorithms, such a ⁇ > the strongest AP set may prequalifj by testing if the connected AP's RSSI is less than the corresponding RSSl in the fingerprint.
  • Mobility fingerprinting pro ⁇ ides a mechanism that enables a communication session ⁇ e g , a voice call usmg VoIP) to be kept ⁇ n a first wueies*. technology ( ⁇ ? g . WI AK) until the mobile unit enters a roaming zone defined b> pie-determined fingerprint data. There may be times where the system does not detect that the mobile unit resides m the roaming ZORe, hot nonc-the-jejss has entered an area where a handof ⁇ to a second radio technology ⁇ £ g . cellular) is required. For this case, the use of minimum signal strength can b ⁇ employed in conjunction with mobility fingerprinting to ensure a handoff to cellular (or other radio technology) occurs.
  • J00107J ⁇ he concept of minimum signal strength is that at an> ghen time the client must maintain a minimum level of signal to keep the voice call operating on the WLAN. If a client detects signal strength below the minimum le ⁇ el then it should transition to another available radio technology.
  • Two methods of handling minimum signal sttcngth can include a S) stem wide minimum signal strength and an AP specific minimum signal strength.
  • Most voice enabled WLAKs are configured to assure a minimum signal strength ⁇ alue in order to reltdbh provide a high level of service that is usually required to support a ⁇ oice call.
  • a catch-all solution would be to provide a s ⁇ stern level setting slightly less than this range to trigge ⁇ roaming.
  • I his system level value can be distributed to the mobile units ⁇ e # , v ⁇ n elesA clients) connected to the R A serv ei , 1 he drawback to this approach is that the client ma> roam to cellular (or other supported radiu technology) more often than is needed. Alternatively, it is possible that the client may not roam to cellular when it should. An example of this is when the wireless coverage leaks far outside of the desired coverage area, which is ver> common in toda> ⁇ networks.
  • I i ma> be required to implement a method according to the subject invention, it is to be further understood that the follow ing methodology can be implemented m hardware (e g , one or more processors, such as in a computer or a processor based device), software (e. ⁇ e, stored in a computer readable medium or as executable instructions running on one or more processors K or as a combination of hardware and software,
  • m hardware e g , one or more processors, such as in a computer or a processor based device
  • software e. ⁇ e, stored in a computer readable medium or as executable instructions running on one or more processors K or as a combination of hardware and software
  • FIG. 1 I is a flow diagram depicting an example method 500 that can be emplo y ed to trigger a handover event according to an aspect of the invention.
  • the method cm ⁇ be Implemented by a mobile unit, by a network infrastructure or a combination thereof.
  • the method begins, at 502 in which a fingerprint data is provided.
  • the fingerprint data defines at least one mobility fingerprint, such as can be generated from one or more signals associated with a predetermined roam zone where the handover event may need to occur
  • Bach mobility fingerprint can be generated based on signals collected during a fingerprint gathering phase, such as described herein.
  • the signals used to generate the mobility fingerprint can originate from different signal sources, which further ma> be different t j pes. of radio technologies.
  • scanning is performed to acquire a set of scan data.
  • the scan data can include signal characteristics for any number of one or more signals, such as described herein.
  • the set of scan data can be processed by a fingerprint evaluation algorithm, which processing can be performed by the mobile unit, b> the network To which the mobile unit is connected or by a combination thereof.
  • the scan data is evaluated to determine whether the scan data substantial!) matches a mobiiit> fingerprint defined by the fingerprint data.
  • the evaluation at 506 can include evaluation of a feasible solution and an snfeassb ⁇ e solution, such as described herein.
  • ⁇ match indicates that a mobile unit resides ft ith ⁇ n a predetermined roam /om.
  • a trigger signal can be generated to indicate a handover event from a first radio technolog) to a second radio technology may need to occur. That is, the trigger signs! can be generated based ⁇ n determining the set of scan data substantial! ⁇ matches a mobility fingerprint defined b> the fingerprint data.
  • a handov cr c ⁇ e ⁇ t for the mobile unit from the first radio technology to the second radio technolog ⁇ can be initiated in response to the trigger signal being generated at 508.
  • the deierminatior of whether to actually perform the handover event can he performed b> higher level functions ⁇ uch as described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method (500) to facilitate handover includes detecting (506) that a mobile unit resides within at least one predetermined zone where a handover event from a first radio technology to a second radio technology may need to occur, the second radio technology being different from the first radio technology.

Description

TITLE; SYSTEM AND METHOD TO FACILITATE HANDOVER
REtATEU APPLICATION
[0001] The present application claims the benefit of U.S. Provisional Patent
Application No. 60/820,896, which was filed on July 31 , 2006, and entitled "Mobility Fingerprinting," the entire contents of which are incorporated herein by reference.
TECHNICAL FIFXD
[0002] The present invention relates generally to communications and, more particularly, to a system and method to facilitate handover.
BACKGROUND
[0003] Various types of wireless technologies have been developed for communication of voice, data and a combination of voice and data. Many wireless devices are being manufactured to enable operabilϊty in more than one type of technology. For example, portable electronic devices, such as cellular telephones and persona! digital assistants, can include interfaces that enable operation using cellular technologies, wireless local area network (Wl. AN) technologies, and/or Bluetooth technologies to name a few. [0004] As a further example, many enterprise networks support voice over internet protocol (VoIP) (hat can run over one or more wireless network. For instance, WiFi voice networks currently support VoIP and, with little integration, with a wider area voice network, such as cellular networks. Dual mode phones, which have both an 802.1 1 interface and a cellular interface, are emerging in the marketplace.
SUMMARY
[0005] The invention relates generally to a system and method to facilitate handover fora mobile unit between radio technologies, As a further example, the invention enables a determination to be made whether a mobile unit resides in an area where a handoff from a first radio technology to a second radio technology may be desired. The area or location where the handoff may be needed is predetermined such as to provide sufficient time to enable the system to set up the call on a new interface prior to the old interface becoming unusable. The result of this evaluation can then be made available for a higher level mobility functions that determine on which radio techno Iog\ interface communication should lake place.
|00061 One aspect of the invention provides a method to facilitate handover that includes detecting that a mobile unit resides within at least one predetermined location where a handover event from a first radio techaolog) to a second radio technology may need io occur, the second radio technology being different from the first radio tech«oϊog> , |Q007f Another aspect of the invention pro\ ides s> stem to facilitate handover. The ostein includes a mobile unit configured to operate according to at least first and second radio technologies. A fingerprint detector evaluates input data {e g... corresponding ic scanned signals) relative to mobility fingerprint data that defines at least one predetermined roam zone to determine whether a handover between the f fot and second radio technologies should Q)ccur for the mobile unit,
[0008] Yet another aspect of the invention provides a system to facilitate handover for a mobile unit. The yvstem includes means for storing fingerprint data that define a mobility fingerprint for at least one predetermined roam zone. The sjstem also includes means for evaluating whether to trigger a handoCT for the mobile unit from a first (e a: , current!) connected) radio technology to a second radio technology based on at least one recehed signal relative to the stored fingerprint data.
BRIEF DESCRIPTION OF THE DRAWINGS
[000S] FlG, 1 depicts an example of a sjstcm that can be implemented according to an aspect of the invention.
[0010] FIG. 2 depicts an example of a mobile unit that can be implemented according to an aspect of the invention.
[0011] FlG. 3 depicts an example of a radio system that can he implemented in accordance with an aspect of the invention.
[0012] FlG. 4 depicts an example of a \x ireless network implementing mobilit> flπg€rprifϊting in accordance with an aspect of the invention.
[0013] FlG. 5 depicts an example of a floor plan for part of a w ireless network demonstrating calibration that can be utilized to establish a mobility fingerprϊni for a roam zone in accordance with an aspect of the {mention.
[0014] FIG. D depicts an example of a technique that can be utilized to establish a static mobilit) fingerprint for a roam ^onε in accordance with an aspect of the invention. [0015] TIG. 7 depicts an example of a s>\lem m which a mobility fingerprint is defined by information from different radio technologies,
£0016] FlG. 8 depicts an example of a vector fingerprint that can be determined for a roam zone according to an aspect of the imention.
[0017] FIG. 9 depicts an example of a mobility fingerprint detection system that can be implemented according to an aspect of the invention.
[0018] FlG. 10 is a graph plotting cellular received signal strength verses ViFi received signal strength that can be utilized to facilitate mobility fingerprint detection in accordance v. ith an aspect of the invention
[0019] FIG. 11 is a flow diagram depicting a method in accordance with an aspect of the invention
DETAILED DESCRIPTION
[0020| The invention relates general!) to a s> stem and method to facilitate handover between different radio technologies The invention facilitates handover by enabling a location to be detected where such hando\er may need Io occur, For instance, one or more signals can be detected to identify the location, and a trigger signal can be generated to enable handover to occur in response to identifying the location.
|0021] As will be appreciated b> those skilled in the art, portions of the invention may be embodied as a method, data processing system, or computer program product, Accordingly, these portions of the present invention may take the furrn of an entire!}' hardware embodiment an entire!} software embodiment, or an embodiment combining software and hardware. Furthermore, portions of the invention may be a computer program product on a computer-usable storage medium ha\ ing computer readable program code on the medium. Any suitable computer-readable medium man be utilized including, but not limited to, static and dynamic dotage de\ice&, hard disks, optical storage devices, and magnetic storage devices
[0022] Certain embodiments of the invention arc described herein with reference to flowchart illustrations of methods, systems, and computer program products. It v, ill be understood that blocks of the Illustrations, and combinations υf blocks in the illustrations, can be implemented by computer-executable instructions. These computer-executable instructions may be provided to one or more processor of a general put pose computer, special purpose computer, or other programmable data processing apparatus (or a combination of devices and circuits) to produce a machine, such that the instructions, which execute via the processor, implement the functions specified in the block or blocks. [0023] These computer-executable instructions may also be stored in computer- readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture including instructions which implement the function specified In the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
[0024] The invention relates to a system and method to facilitate handover for a mobile unit between different radio technologies. As used herein, the term "radio technology" and variations of this term are intended to encompass any form of wireless communication that mas be utilized to send, to receive or to send and receive audio signals (including voice signals), data signals or a combination of voice and data signals without requiring a hard-wired connection. Examples of different radio technologies include cellular telephones (e.g., 2G, 3G or 4G technologies), wireless networks, (e.g., wireless local area networks (WLAN), &uch as WiFi; wireless metropolitan area networks (WirelessMAN), such as WiMax; and any variation and improvements thereof), satellites, Bluetooth, two-way (or half-duplex) radio, and any combinations thereof. Those skilled in the art will understand and appreciate that various standards and protocols exist and have yet to be developed to enable communication via these and other radio technologies, for example, the mobile unit can be implemented in any form of wireless technology, such as including a cellular telephone, personal digital assistant (PDA), a portable computer (e.g., a laptop computer, or tablet computer) and the like. In the following example, it is assumed that the mobile unit is configured to enable operation using at least two different radio technologies. [0025] The approach described herein enables a determination to be made that a mobile unit resides m an area where a handoff from a first radio technology to a second radio technology may be desired. The area or location where the handoff may be needed is predetermined such as to provide sufficient time to enable the system to set up the call on a new interface prior to the old interface becoming unusable. The predetermined location where handoffmay be needed is referred to herein as mobility fingerprint. As used herein. the general terra "mobility fingerprint" can correspond to any method used to identify a roam zone where handoff may be required. The mobility ftngeφriπt can be evaluated by a fingerprint detection algorithm, such as based on periodic or intermittent monitoring of one or more inputs. Fingerprint evaluation is a generic technique that may be applied from either the client device or the network infrastructure. The result of this evaluation can then be made available for a higher level mobility functions that determine on which radio technology interface communication should take piaee,
[0026J Turning to FIG. 1 , a schematic block diagram of a system 10 that can implement mobility fingerprinting is depicted. The system 10 includes a mobile unit S 2, a first radio system 14 and a second radio system 16. Typically the system 10 can include a plurality of mobile units. Each of the first radio system 14 and second radio system 16 employs a different radio technology, The mobile unit 12 includes circuitry configured to interface with at least the radio technologies implemented by the first and second radio systems. The mobile unit 12 may be configured to communicate using any number of radio technologies in addition to those of the depicted radio systems 14 and 16. [0027] As one example, the first radio system S 4 can employ a wireless network, such as WiFi or WIMAX. For instance, the first radio system 14 can include any number of access points that cooperate to form the wireless network. The second radio system 16 may operate using a cellular technology- and thus include a plurality of cell base stations for communication over a corresponding coverage area.
[0028] The mobile unit 12 is portable and thus can be carried or otherwise transported in space, such as by a user, within the system Id. In the system 30. at least one predetermined location is pre- identified as a roam zone 1 S where it has been ascertained that a handoff from a first radio technology to a second radio technology may need to occur. The roam zone 18 can be defined by a mobility fingerprint. The roam zone ϊ 8 can have dimensions in two-dimensional space or three-dimensional space depending upon the direction of travel of the mobile unit relative to the location. For example, a user can carry a mobile unit across the floor or ground as well as transport the mobile unit 12 between floors of a multi-floor building or dwelling.
[0029J One difficulty associated with a device that can operate according to multiple radio technologies is being able to determine when to transition from a first radio technology to a second radio technology such that the user does not detect a disturbance in the continuity of the communication. For example, when transitioning from communication over a wireless network (e.g., voice over internet protocol (VoIP)) to cellular, it may often take several seconds to setup the cellular call This long cail setup time means that any monitoring on the wireless network should assure that the call does not degrade beyond acceptable call quality before the cellular cail is ready. Since the roam zones are established before handover Is to occur (e.g.. a priori), each roam 2one can be established at a predetermined location to provide the mobile unit 12 with ample time to setup the call on the interface for the new radio technology before the signs! on the old (pre-handover) radio technology degrades to an unusable level
[0030] A variety of mechanisms can be utilized to gather mobility fingerprint data to identify each of the one or more roam zones 18 in the system 10. Examples of data that can be collected to provide a mobility fingerprint for a given roam zone 18 include: received signal strength indicator (RSSI) measurements, transmit power of detected transmitters, physical coordinates of measurements, the identity of transceivers from which signals are detected. Additionally, beacons or other forms of signaling (e.g., RFiD fags) can be provided at a desired roam zone !8 in conjunction with other signals in the system 10 to provide the mobility fingerprints for respective roam zones. Alternatively, the beacons or other signaling {individually or in any combination thereof) can be provided at the roam zones to establish mobility fingerprints. The one or more signals utilized to define the mobility fingerprint for the each roam zone 18 can be a wireless signal propagating according to the first radio technology (e.g., utilized by the first radio system 14), the second radio technology (e.g., utilized by the second radio system 16), another radio technology with which the mobile unit 12 can interface, or one or more signals according to any combination of radio technologies. The particular types of information and signals utilized to provide the mobility fingerprint can vary for a given location according to the type of radio technologies and the technologies supported by the mobile unit 12, for example.
[0031 J A trigger signal can be generated in response to detecting that the mobile unit
12 resides in the predetermined roam zone 18. The trigger signal can be utilized to initiate a handoff event by higher level control functions implemented within the system 10. The higher level control may evaluate other conditions associated with the communication and resources to determine whether the handover event should occur. The detection that the mobile unit resides within the roam iona 18 can be performed by the mobile unit 12, by the first radio system 14, by the second radio system 16, or by a combination of the mobile unit and the first and second radio systems,
[0032] In the example where the determination that the mobile unit resides within the roam zone ϊs performed at the mobile unit, fingerprint data can be stored in memory of the mobile unit. Alternatively, the mobility fingerprint data can be stored in management software associated with the first radio system, the second radio system or for each of the first and second radio systems. As a further example, depending upon memory storage capabilities of the mobile unit, mobility fingerprint data can be loaded into memory of the mobile unit 12, such as in response to detecting that the mobile unit has entered a bounded area. The bounded area can be defined as including any number of one or more base stations or access points, such as may be associated with a floor, building or campus, or another physical structure or defined area that may provide wireless coverage according to a given radio technology,
[0033] By way of further example, one or both of the first radio system i 4 and the second radio system 16 may include any number of one or more such bounded areas spaced apart from each other to define an enterprise. The bounded area can include a boundary, which may be a physical boundary, an RF boundary or a combination thereof. The same or different algorithms can be employed for the respective bounded areas for the radio systems 14 and 16 to detect whether a mobile unit resides in one of the predetermined roam zones 18. The differences in the algorithms may vary based upon the radio technology as well as based on the type of mobile unit 12 as well as other parameters that may be utilized to establish the predetermined roam zones. Advantageously, each of the predetermined roam zones can be established for predetermined locations as to maintain adequate signs! strength to allow sufficient time to enable the call to be set up on the second radio technology before the current connection on the first radio technology becomes unusable. [0034J FIG. 2 depicts an example of a mobile unit 50 that can be implemented according to an aspect of the invention. The mobile unit 50 is a wireless device that includes at least two wireless transceivers 52, indicated as first, second and Nth wireless transceiver, where N is a positive integer denoting the number of wireless transceivers. Each of the wireless transceivers 52 is operative to send and receive wireless signals via corresponding antennas 54. For receiving signals, each wireless transceiver 52 includes circuitry' for demodulating and converting the received signals to an appropriate digital format for processing at the receiver as is known in the art. Each transceiver 52 may also include circuitry for converting data being provided from the mobile unit and from modulating and performing frequency conversion of such data and for sending such data out via the antenna 54.
[0035] The mobile unit 50 also includes a processor 56 that is programmed and configured to control operation of the mobile unit based upon executable instructions stored in associated memory 58. The memory can include random access memory (RAM), read only memory (ROM), flash memory, or other type of memory device. The processor 56 can communicate with each of the transceivers 52 via a bus 60. The processor 56 can also retrieve and store data and instructions relative to the memory 58 over the bos. Alternatively or additionally, the processor 56 may include cache or access other associated memory (not shown) directly. The mobile unit 50 may also include a user interface 64 that can be employed by a user for interacting with the mobile unit 50. The user interface 64 can include an arrangement of graphical interface elements as well as buttons and other controls (e.g., knobs, dials and touch screen controls and the like) for implementing the various functions of the mobile unit 50.
[0036] According to one embodiment, the processor 56 can execute instructions, corresponding to a fingerprint detection algorithm 62. for detecting that the mobile unit 50 resides within a predetermined roam zone. For example, the detection algorithm 62 can enable an evaluation of one or more signals relative to predefined fingerprint data (e.g., also stored in the memory 58) associated with the one or more roam zones to ascertain whether the mobile unit resides within a roam zone. In response to detecting that the mobile unit resides in a roam zone, a trigger signal can be generated for initiating handover from a first radio technology in which the mobile unit is current!}' operating to a second, different radio technology.
[0037] FlG. 3 depicts a schematic block diagram of a radio system 100 that operates according to a given radio technology. For the example of FlG. 35 the radio system 100 is intended to provide an overview for any radio technology that can be implemented including, for example, cellular and wireless networks (e.g., VViFi, WlMAX) to name a few. The system 100 includes a plurality of base stations, indicated at base station I (BSl), BS2, BS3 through BSP, where P is a positive integer indicating the number of base stations in the system 100 or a portion of the system. For instance, for a cellular network, each of the base stations 102, 104, 106 and 1OS may correspond to a cellular base station. For the example of a wireless local area network (WLAN), each of the base stations 102, S 04, 106 and 108 may correspond to ars access point. That is, the term base station is not intended to denote any particular radio technology, but is intended as a generic term that can be utilized to implement a given radio technology for a geographical area,
[003SJ Each of the base stations 102, 104, 106 and 108 includes a coverage area indicated schematically at dashed lines 1 10, 1 12, 114 and 1 16, respectively. Depending upon the type of radio technology, each of the base stations can be positioned strategically according to a plan to provide a substantially continuous coverage according to the overlapping coverage areas 1 10, 112, 1 14, and 1 16 provided by the respective base stations. Each of the base stations 102, 104 and 106 and 108 can be connected to each other such as over a network (e.g., a iocal or wide area network or the public telephone switch network) to coordinate operation between the respective base stations.
[0039] The system 100 can also include a system control ! 18 that is programmed and/or configured to control operation and manage resources in the system 100. For example the system control 1 18 can include a mobility manager 120 that is utilized to control higher level functions associated with handover events for a mobile unit between fee respective base stations as well as to control handover from the radio technology implemented by the system 100 to a different radio technology in which the mobile unit may operate. For example, the mobility manager 120 may condition the handover event on a variety of factors, such as capacity of the respective networks, available connection quality, estimate battery life of the mobile unit, the type of cad. Additionally or alternatively, (he mobility manage? 120 may also apply a cost algorithm u> determine which radio technology would provide the lowest cost for handling the call. Those skilled in the art will appreciate other factors thai may be evaluated to determine whether to complete the handoff.
[004G] The base station 102 is depicted as including at least one wireless transceiver
122 that is operable to send and receive wireless signals within its coverage area. The wireless transceiver 122 thus includes appropriate circuitry for sending and receiving signals via its one or more antennas 124. The base station 102 also inc ludes a control ier 126 that is coupled to the wireless transceiver 122. The controller 126 controls the operation of the transceiver 122. The controller 126 can include appropriate hardware and software that is programmed and/or configured to perform the functions associated with the base stations. The executable instructions can be stored in memory 128» which can be part of the controller or separate memory from the controller,
Ϊ0041Ϊ In one embodiment, one or more of the respective base stations 102, 104, 106 and 108 can be programmed to detect that a mobile unit resides in a predetermined roam zone. The determination can be made based on signals received from the mobile unit at the respective base stations as well as from a combination of signals from neighboring base stations, based on which signals a determination can be made that the mobile unit resides in the roam zone. A base station can also include additional transceivers or receivers that can receive one or more signals, in the same or a different radio technology, which can be utilized to determine if the mobile unit resides within the predetermined roam zone. In response to determining that the mobile unit reside^ within the roam zone, a trigger signal can be generated. For instance, the trigger signal can be generated b> a base station or b> the mobility manager 120 in the system 100, The trigger signal ears in turn be utilised to initiate a handover event. The handover event further can take into consideration a varien of other factors in the sv stem 100 as well as those associated with the mobile unit to determine whether to complete the handover from the radio technology of the s>stcm 100 to a different radio teehnolog> .
[0042] In accordance with another embodiment, the system 100 may be programmed to send fingerprint data to a mobile unsl For example, in response to detecting that the mobile unit lias entered a coverage area provided by the system 100. the bas>e station to which the mobile unit is connected can send a set of fingerprint data to enable detection of a mohiliu fingerprint for a selected portion or for the entire bounded area in which coverage is provided b} the s>stem 100. Additionally since it is possible that fingerprint data may \αx\ over time, updated fingerprint data ma> be transmitted to or from one or mors of the base stations 102, 104. 106 and i OS so that current fingerprint data cat) he maintained w ithin the system 300,
[0043} Various embodiments for gathering fingerprint data will be better appreciated with reference to the examples of I1IGS, 4-8, In the examples of FiGS. 4-8, it is assumed that the systems implement at least two different radio technologies, SLSCII as including cellular (e g , 3G or higher) and a w ireiεss network {e g , WiFi or NV iMaxV Thus, the base stations in fee examples of FIGS 4-8 are referred to as access points, although it will be appreciated that base stations could be other tj pes of de\ ices. Additional!} , v> hile the examples of FIGS. 4-8 primarily describe the use of fingerprinting from the client side, the techniques described herein apply equally as well to the network side (e g , 802.1 1 Access Points). [0044] FiG. 4 depicts an example of a wireless network 300 associated with a given area (e g., a floor oi building, a campus or other area) 302. I he w neiess network 300 includes a plurality of access points APL ΛP2, AP3. AP4 and \P5 to provide coverage within or around the structure according a given radio technology (e.g . W iFϊ or WiMax). Fhe area 302 can include one or more points of entr> or egress, indicated at 304, 306 and 308 through which mobile units may pass. It is associated w ith one or more of these points of entry or egress 304, 306 and 308 that respective roam zones 310, 312 and 314 can be established. In particular, a mobility fingerprint for the point of egress 304, indicated at FPl, can be defined for each of the roam /one 310 to facilitate handover according to an aspect of the invention. Mobility fingerprints FP2 arid FP3 can also be determined for roam zones 312 and 314, respectively, associated with points of egress 306 and 3OS, [0045J In the example, of FIG 4, FPl can be defined as a function of RSSI vectors
R 1 1. R31 and R21. For example, R 1 ] is the RSS { \ ector from API to the roam zone 310, R3 i is the RSSi vector from AP3 to roam zone 310, and R21 is the RSSI vector from AP2 to roam zone 310. Similar mobility fingerprints FP2 and FP3 can be established as including RSSI vectors for each of the other roam /ones 312 and 314, respectively, as depicted In FIG. 4. Those skilled in the art will understand and appreciate various approaches that can be utilized to gather data for generating mobility fingerprints l-or evampfe, the fingerprint data gathering can be performed by fingerprint calibration data collection, adaptive fingerprint data collection, predicted fingerprint data collection or by an> combination of two or more such approaches.
[0046] For fingerprint calibration data collection, the RSSI vectors ran include raw data marnsailv collected during calibration b> circuitry of a mobile device that can operate according to the radio technology of the wireless network. 300. The raobiϋt} fingerprint for a given roam zone further may be calculated based on the raw collected data (e g , RSSl measurements) as well as the additional information that can be gathered during calibration. For example, the calibration phase can also collect transmit power of the detected APs. physical coordinates of the measurement locations and the RSS! and identify of one or more cellular base stations that provide coverage in the area in which the roam zones 310. 312 and 314 are located. The physical coordinate* can be generated b> the network 300 or another system, such as a GPS.
|0047j As an alternative to emploj ing RSSl measurements to pro\ ide fingerprint data, the approach described herein supports using path loss as a metric. The path loss from a gh en AP is independent of the transmit power, but requires that ihε transmit power of the AP be known. By knowing the transmit power of the AP. ail trianguiation calculations can be made b} converting a received signal strength into a corresponding path loss value. [0048] 1 here are several wa\ s that the transmit power may be determined. Fυr example, in a WLAK, tools of the WLAN management s> stem may be accessed to obtain an indication of the transmit power. Where the mobile unit operates a^ a wireless client in WTAN, those skilled in the art w ill understand that various sen ices can interface with the WLAN management system to support intra-network roaming as the mobile unit roams within the coverage area(s) supported by the WLAN. For instance, a Roam An> where (RA) server running within the WLAN can support such roaming as well as be programmed to access a WLAN management system and gather data that describes the current transmit power settings of the APs. Additionally, any subsequent changes in power can be detected by the RA server for providing an updated indication of the transmit power. With this transmit power data any signal measurement from the client may be easily converted into a path loss. Otie example of a WLAN management system that could provide such information is the Wireless LAN Solution Engine (WLSE) available from Cisco Systems, Inc. of San Jose, California. The WLSE provides a programmatic SOAP XML interface that would allow the RA Server (or other service) to access the desired transmit power information, [0049] Additionally or alternatively, there are various information elements in the
802.1 ! Beacon or probe response frames provided by an access point. These information elements can be evaluated to provide an indication of transmit power for an access point, For example, the Compatibility Extensions (CCX) program, which is available from Cisco Systems, Inc., provides elements that indicate the AP's current transmit power. Additionally, the IEEE is developing standards for doing the very same. These additions to the standard can be found in the current TGk draft. Those skilled in the art may understand and appreciate other methods that can be employed to provide an indication of transmit power for various types of wireless transmitters, which can be leveraged to determine path loss value. [0050] FIG. 5 demonstrates an example of some calibration data that may be gathered near roam zone 310 for FPl for the wireless network 300 shown and described in FlG 4, As an example, several data points are gathered for a plurality of respective locations 320 adjacent the egress point 304, which may reside both inside and outside the area (e.g., building) 302. This data represents the raw data collected by a mobile unit 322, such as a reference data collection device, which can operates as a client within the wireless network 300. For example, a data collection device (e.g., a mobile unit) 322 can be positioned at each of the data collection locations 320 and a plurality of samples obtained for each point. This raw collected data can be processed into a mobility fingerprint (e.g., FPi of FlG. 4). J0051] By way of example, the mobility fingerprint calibration data may be collected and stored locally on the collection device and then transmitted to a management server (e.g., a roam anywhere (RA) server) for processing into a corresponding mobility fingerprint. Alternatively, the collected data can be transmitted in real time to the roam anywhere (RA) server, As yet another alternative, a portion or all such processing may be performed locally by the data collection device. A strategic consideration is to not tose any of the collected data regardless of whether the device is connected to the wireless network 300. as such data can enhance the resulting mobility fingerprint. Another consideration during the gathering of the calibration data is to ensure the APs used for the fingerprint generation belong to the desired wireless network 300 and not a rogue or neighboring network. Using signals from other AP's. such as rogues or neighboring AFs, may result in inaccuracies. The filtering of extraneous APs and associated raw data can be done at any point, such as during the collection of the data or while the data is being processed for generating the mobility fingerprint.
|0052] Fingerprint calibration data collection generally requires thai an administrator or other person physically gather the data for the roaming zones. However, it is possible that the administrator may not know where all the roaming zones are in a given building. For example, there can be areas In the wireless network that are not exit points but do demonstrate weak or unusable wireless connectivity for communication purposes. Irs this case, without mobility fingerprint data for such locations, the roaming algorithm would need to fall back to simple signal strength and quality mechanisms for roaming such as described herein.
[0053] Adaptive fingerprint data collection provides a substantially automatic approach that can be utilized to gather fingerprint data. Adaptive fingerprint collection is a mechanism where the mobile unit in the wireless network 300 derives fingerprint data as a result of its norma! operation, In this situation the gathered data can be the same data that is gathered during calibration, except that it is unlikely that the client will have physical coordinates. However, those skilled In the art v. ill appreciate that approaches exist and may be developed in the future to enable an accurate determination of the mobile unit's location, such as through new additions in the standards related to location. For example, in the IEEE, the TGv task group has defined mechanisms that allow a client to periodical!} generate its own location or receive its location from the WLAlS. Additionally or alternative, other methods, such as GPS or assisted GPS techniques, can be employed to generate location information.
[0054] Some of the methods that can be used to adaptive!}' gather fingerprint data include Post RF failure scanning data examination (time based) and initial WLAN access scanning data examination. By way of example, when the mobile client is in an active session within a WLAN, such as a voice, call data will be collected for the purpose of searching for fingerprint match. Some amount of the past collected data (e.g., about 5 to about IO seconds worth of data) can be saved in memory of the mobile client during this time. When either a session failure occurs or a roam due to minimum signal strength occurs the past data can be examined, it has been determined that the data collected within the last 5 to 10 seconds iikely contains data that identifies the zone where a handoff should be initiated. The stored data can be transmitted to a roam anywhere (RA) server or other service for processing. Similar data can be collected by a plurality of mobile units operating in the wireless network, which data can be aggregated and processed to generate the mobility fingerprint for each identified roam zone. Other techniques cart be utilized to determine a common point of egress for a facility or building, for instance, data collected from multiple mobile devices can be examined to identify a common location where such devices exhibit substantially the same handover event according to a minimum signal strength criterion. The set of measurement data associated with Che handover events can be utilized to define a mobility fingerprint for the common point of egress. This common set of measurements should exist for the mobile unit regardless of the direction of travel after exiting the building. |Q055] Another method of collecting adaptive data Is to examine scanning data collected by mobile units upon initial association with a wireless network. By tracking the time when the wireless network first becomes visible to the wireless adapter of the mobile unit, it is possible to identify the mobility fingerprint at this location. It should be noted that the fingerprint data collection method may require some amount of speculation as to where the client Is at the time of this normal wireless event. To improve the accuracy of this approach, the data collected in connection with such initial association by the mobile units can be collected over an extended period of time before using such collected data to generate a corresponding mobility fingerprint. For example, if the RA server can determine that several clients are seeing similar data at tJhe same RF locations then the data can be deemed statistically significant and, therefore, processed into a mobility fingerprint for such locations. [0056] The predicted fingerprint data collection approach lies somewhere in between the former two methods of calibration and adaptive fingerprint data collection. There are several tools available today that can be used to predict WLAN coverage. Some examples of these tools include: the Wireless LAN Solution Engine (WLSE) available from Cisco Systems, Inc. of San Jose, California; the Wireless LAM Control System (WLC) available from Cisco Systems, Inc.; the Surveyor tool from AirMagnet, Inc. of Sunnyvale, California; and the Wireless Valley software planning tool available from Motorola, Inc. [0057] For the predicted fingerprint data collection method, the RA server imports signal strength information from one or more toois that support WLAN coverage prediction. An administrator can then identify the targeted roaming zones and the mobility fingerprint data would be generated for those identified locations. Once again the generated data can be substantially same as mentioned above with respect to the calibration data collection method. For instance, a main portion of the predicted data acquired from such tools is the expected RSSi to each AP. For the particular example of the Surveyor tool from AirMagnet Inc., it is possible for the RA server to utilize the surveyed data directlv. AirMagnet Surveyor tool requires a user to walk around and collect data for the purpose of predicting coverage. This data is in the format of a Hie with measured RSSl and other information. It is possible that this file may be directly imported by the RA server or other processing device to generate fϊngerprini data for one or more roaming zones,
JQ058J Regardless of the method or methods utilized to collect data> the collected data can be processed io generate a mobility fingerprint for each identified roaming zone. Those skilled in the art will understand and appreciate various ways that the collected data can be used to generate fingerprint data. Referring back to FIG.4, one approach is triangulation of a static, fingerprint based on the collected data. Static Fingerprinting operates on the concept of defining one physical area by a range of signal strength values seen from multiple transmitters. The size of the area can be defined by the overall allowed signal strength range from each of the transmitters. Static Fingerprint FPi can be located by the evaluating of RSSI vectors Rl 1 , R21 and R31. ϊt is possible to identify this specific location by finding the cross section of the signal received from each of the APs detected at the location. [0059] FIG, 6 demonstrates an example of how FPI associated with the roam zone
310 can be identified, Irs the example of FIG. 6, FPl can be determined by finding the cross section where signal strength values RI l, R2! and R31 intersect. It will be appreciated that, in practice, the signals from the radios will not radiate uniformly (due to antennas, reflections, walls, interference, etc.) as shown in the example of FIG. 6: however, the concept being applied can work in practical scenarios.
SOQ6QJ By way of further example, Table 1 lists some example data thai can be used to define FPI for the roaming zone 310 in the example of FIG. 6. In Table 1, the RSSl values are ordered in order from strongest to weakest, narneiy in descending order AP2, API and AP3. One of the identifying factors of a static fingerprint can be the strength of the signal received from the APs. For example, the RSSI vector having the highest RSSl value can be considered a primary identifier for the fingerprint with the other RSSS vectors being secondary identifiers. The RSS! Variance in Table S indicates the allowed range of signal strength that defines the size of the roaming zone 3 SO for each AP.
Figure imgf000016_0001
Figure imgf000017_0001
|0061] As described above, a mobility fingerprint can be generated based on signal characteristics from signals transmitted according to more than one type of radio technology Signal characteristics can include attributes or properties, such as can be measured or calculated from the received signal, information carried by the signal as well a combination of attributes or properties and information. Thus, while it is possible to generate static fingerprints that include only signal generated in one type of radio lechnologv (e.g., WiFi radio signals in a WLAM). static fingerprints can also include information from other radio technologies.
[0062| By way of example, FIG. 7 expands on the static fingerprint FPl to include information relating to signals from multiple radio technologies. In FlG. 7, the communication system 300 can also include one or more base stations 330, indicated at SS_1 through BS P, where P is a posithe integer denoting the number of base stations with which a mobile unit may be able to connect at the roaming *one 310. The base stations 330, for example, can correspond to cellular base stations, satellites, two-radio routers and the like. For purpose of brevity, the base stations in FlG. 7 are assumed to be cellular base stetsons that provide cellular information. A given location is often covered b> one or more cellular base station,
£0063] The static fingerprint FPl might be captured for predetermined location 304 to that include both WiFI radio information and cellular tower information. For the example of a global system for mobile (GSM) cellular network, the following information may be captured; Mobile Country Code (MCC); Mobile Network Code (MNC); Location Area Code (LAC); Cell Id: and Received Signal Strength Indicator (RSSI). B) way of further example. Table 2 demonstrates an example of data that can be measured in the predetermined location for generating a static fingerprint FPi that includes both WiFi and cellular data.
Figure imgf000018_0001
£0064] Another approach that can be employed to generate a mobility fingerprint relates to vector mobility fingerprinting. Vector mobility fingerprinting builds on the concept of the static fingerprint by combining several static fingerprints together. As a result, a vector fingerprint can provide an indication of direction of movement within a location. Since vector fingerprinting provides an additional movement component, vector fingerprinting can operate as a discriminator to help reduce false fingerprint detections or missed detections, [QQSSj By way of example, FlG, S demonstrates an example of a vector fingerprint
VFPl that includes a combination of four static fingerprints FPIA. FPI B, FPl C and FPlD associated with the egress 304 of egress point 304 in the wireless network 300, Each static fingerprint may include signal characteristics from the same set of APs {e.g.* API, AP2 and AP3) or the static fingerprints can include one or more different APs. In addition to the signals from APs5 signals from other radio technologies can also be utilized to form the static fingerprints that combine to define the vector fingerprint VFP], such as described herein. [0068] Table 3 lists an example of sample values that might be included in a vector fingerprint VFPI of FlG. S. By evaluating the changing RSSl values it is possible to determine that the direction of motion is towards the roaming zone.
Figure imgf000018_0002
Figure imgf000019_0001
f0067] There may be situations where certain mobility fingerprint methods can yield false positive results. A false positive result can occur when a roaming ?øne is falsely detected such that is causes an unwanted move from the current network to (he next network. For example, a false positive result can be the result of inaccurate measurements, environmental changes affecting the measurements, or incomplete measurements. One way to mitigate false positives is to add one or more additional discriminators to the fingerprint detection algorithm, As used herein, a discriminator corresponds to an additional condition or criteria having a value that can prevent a fingerprint from becoming a positive match. A discriminator thus can nullify an otherwise possthe fingerprint match if the discriminator has a predetermined value (or is within a predefined range of values), [0068] As one example, one or more exclusion area* can be created to operate as discriminators. An exclusion area can be detected by examining the complete set of signals received in a measurement, if a signal is received from an AP that is not in the fingerprint set or has a signal strength that is significantly different than what is expected for the fingerprint, then the area defined by the measurement can be considered excluded, Referring back to FlG. 6, an area or region 350 is shown that could cause a possible fake positive match, such as for the fingerprint FPI associated with the egress 304, In this case, if scanning for a mobile unit within the network 300 produces a measurement set that onlj includes \aϋd signals for API, AP3 and AP4 then a false positive could occur, for this situation to occur, however, the fingerprint algorithm would need to be configured to support mobility fingerprint detection w ith partial matches. In this case, by evaluating the inclusion of the AP4 RSSl vector we can conclude that this is not a fingerprint match for FP I , Similar exclusion conditions can be established for other mobility fingerprints. As one example, data that defines exclusion areas can be provided with the fingerprint data in a fingerprint data set. |0069] As another example, if a mobility fingerprint includes radio information from a different radio technology than the current connection (see, e.g., FlG. 7), it is possible to use the different radio technology information as a discriminator. Assuming a mobile unit is currently connected with a WiFi wireless network 300, for example, cellular tower information, W'iMax information, Bluetooth information, an RFID tag or another radio technology can operate (individually or collectively) as a discriminator. Once a match has
I g been made using the WiFi radio information, for example, the celiular tower information may be used to confirm the overall fingerprint match as being a valid match. [0070] By way of further example, the cellular tower information can be used as a discriminator in one or more ways. A radio lower can be delected by matching one or more radio tower identifiers, such as MCC, M-NC, LAC, and/or Cell id. The tower information can be detected as a discriminator if the measured RSSI matches the RSSI value defined by the mobility fingerprint. Additionally or alternatively, the tower information might indicate that the measured RSSI is less than fingerprint RSSI or if the measured RSSl is stronger than fingerprint RSSl. It will be understood and appreciated that the particular application of the radio tower information may vary according to the fingerprint method being used. [0071] FlG. 9 depicts an example of a system 400 that can be utilized to detect a mobility fingerprint according to an aspect of the invention. The system 400 includes a fingerprint detector 402 that is programmed and/or configured to determine if a mobile unit resides within a predetermined roam zone. The fingerprint detector 402 can be programmed with one or more fingerprint evaluation algorithms according to the type and content of the fingerprint data and based on where (what part of the system) the evaluation is performed. The mobility fingerprint detector 402 thus can determine a fingerprint match based on a set of one or more inputs 404 and a predetermined fingerprint data set 406 that includes fingerprint data 408. This particular type of input 404 can vary depending upon the type of signals and the sources of the signals that are utilized to generate the fingerprint date set 406. The fingerprint detector 402 processes the inputs at 404 and compares the processed results relative to the set of fingerprint data 406. The fingerprint detector 402 can be implemented in a mobile unit (e.g., a wireless client), a network infrastructure (such as a server associated with cellular base station or an access point), or may he distributed across a mobile unit and network.
[0072] In the example of F3G. 9. the set of fingerprint data includes fingerprint data
408, indicated at FP_l and FPJ, where i is a positive integer (i>l) denoting the number of mobility fingerprints represented by the fingerprint data set 406. As described herein, the fingerprint data set 406 can include fingerprint data 408 for a group of roam zones as such as may be associated with a bounded area or other desired location or group oflocations. The fingerprint data set 406 can be programmed by a fingerprint program signal indicated at 410. Depending upon the type of radio technology and the types of signals utilized to generate die fingerprint data 408, the fingerprint data set may be fixed or n may be updated over time such is based on the program signal 410. Additionally, the program signal 410 can be provided to modify the fingerprint data 408 in the fingerprint data set such as to reflect changes in the roam zone. The changes to roam zone can include adding a new roam 2oee, beϋe\ ing in an existing roam zone or changing the fingerprint data associated with a given roam zone. The fingerprint data 408 thus can be provided to the fingerprint detector 402 for performing ami identifying mobility fingerprints.
[00731 As described herein, the fingerprint detection system 400 can be implemented in a mobile unit. Due to the size of many enterprise systems, it would not be acceptable to configure the data for ail locations on the mobile unit - the amount of data could prove to be excessive and possible exhaust the memorj on the device. According!), roam zones can be organized into manageable groups or sets. The mobility fingerprint data set 406 associated with each roam zone in a given group can be distributed to the mobile unit in the form of the fingerprint data set 406 as needed.
[0074] For example, one possible grouping for enterprise customers is to segment the data into selected areas, such as campus, building, and floor. Each floor may contain multiple roam zones, typically at the points of entry and exit of the building. In any grouping, means are required to identify which fingerprint data sat the mobile unit currently needs. This means can be in the form of key data provided by the mobile unit to the network, which can be evaluated by corresponding executable instructions. Alternatively, the key can be generated by the network based on a connection the mobile unit being connected to a particular portion or portions in the network. The type of key data can vary depending on the type of mobility fingerprints being employed. Examples of possible key data include Access Point BSSlD, GSM Cell Id, and GSM Location Area Code (LACj to name a few. Other identifiers or RF tags associated with a particular location can also be utilized as key data to identify a set of fingerprint data that Ls needed for the mobile unit.
J0075] As a further example, for an 802.1 1 wireless network, the key data can include the BSSΪD of one or more AP, Irs this, case, the mobile unit can pass the BSSID of the \P to which it h currently connected to a higher level function (e.g., a mobility manager). The higher level function cars cause the appropriate fingerprint data set to be loaded onto the mobile device based on the BSSID of the connected AP. As the mobile de\ice moves from AP to AP it may receive a new data set based on the key data. If the data set has been segmented b> floors, the mobile device can receive a new data set as it moves to each new floor in a building or possible as it moves to a new building. ThoM? skilled in the art w ill understand and appreciate various ways to segment the data and corresponding keys that can be employed to load the appropriate fingerprint data sets. [0076] As described herein, the one or more input 404 to the fingerprint detector 402 can include signal measurements by a device or devices implementing the system 400. By way of example, a measurement system 412 can receive one or more signals from a transceiver or from a plurality of different transceivers or receivers to provide measurements or other signal characteristics of the one or more received signals. For instance, the measurements ma}' include a received signal strength (RSS!) measurements from a detected base station as well (e.g., on AP or a ceil tower) as information identifying the detected base station. The base station can include an access point, such as for WiFi and WϊMax wireless network as well as a cellular base station, for example, a data extractor 414 can be programmed and/or configured to extract predetermined data from a data signal 416. [0077] The data signal 416 can be received over a wireless communication link after appropriate preprocessing and removal of the physical layer. For example, the data extractor 414 can extract predetermined information elements from the media access control (MAC) layer of an associated protocol stack over which Information is being communicated. The information elements, for example, can include the transmit power associated with the detected base station (e.g., access point). The input 404 can also include physical location coordinates for where the measurements are taken. Those skilled in the art will understand and appreciate that the input 404 to the fingerprint detector 402 can include a variety of other information derived from one or more signals that can be received by or transmitted from a mobile unit. Examples of such other signals include GFS information, beacon signals (e.g., from a Bluetooth beacon located adjacent or at the roam zone) as well as other signal transmitters and transceivers that may be operating within the muitimode wireless communication system.
|0078] The fingerprint detector 402 can Include a preprocessing block 420 that is programmed and/or configured to implement preprocessing on the input 404, The preprocessing 420 can include filtering or extraction of extraneous data from the input 404 to enable appropriate processing of the relevant input data, For example, the preprocessing 420 can arrange the input data into an appropriate format (e.g., array, table, linked lists, or other data structures) to facilitate processing thereof.
[0079] When measurements are taken for the purpose of fingerprint evaluation it may be necessary to scale the measurements. The preprocessed data thus can be provided to a scaling component 422. The scaling component 422 can perform appropriate scaling to eliminate (or reduce) variations in the hardware and software used to make the measurements. That is, the scaling component 422 can scale signal characteristics or parameters from a scan set to be consistent with signal characteristics defined by the mobility fingerprint data. For instance, the use of a path loss for measurements can correspond to one type of scaling to help eliminate the absolute value problem thai can arise from RSSI measurements. However, the use of path loss does not solve receiver and transmitter gain differences that may also be present. For example, it is likely that two different mobile units from two different manufacturers have antennas with different receiver gain characteristics. There are many other factors as well that can cause a skewing of the signal strength measurements. For the purpose of fingerprint evaluation described herein, it may be assumed that the transmissions from the APs remain consistent but that the mobile unit's receiver gain may vary. This assumption allows ibr the possibility to scale the measurements such that proportional!) the data 208 from the fingerprint data set 406 can match the data from the SCANSet if they sre proportionally equal.
[0080] As one example, the scaling component 422 may implement a sum scaling algorithm that works on the principle of converting each individual AP measurement into a weighted proportion of sum of all measurements. The scaling component can scale both the fingerprint RSS values and the measured RSS values so that they are evaluated to be a proportional match rather than an absolute match, The scaling component 422 thus can apply weighting to the scanned RSS values corresponding to the inverse of the scaled measured received signal strength. For instance, the scaling component 422 can scale each scanned RSS value (S- RSSi) in the SCANset to provide a Scaled SJRSS(i) as follows:
Figure imgf000023_0001
where nr=1 ...j.
For the fingerprint RSS values found in the FPset can be scaled according to:
Figure imgf000023_0002
where m=1 ., .j ft will be appreciated that the scaling should only be applied to the set of APs that are included in both the SCANset and the fingerprint data set 406.
[Q081] The scaling component 422 may also utilize a strongest AP scaling algorithm to scale the measured data provided by the measurements system 412. The strongest AP Scaling algorithm assumes that when any measurement scanning takes place, the resulting SCANset is a match to the fingerprint data 208 that is under evaluation. If the SCANset is a match, the strongest AP in the SCANset would also be a match. AH other RSSl values in the SCANset can be sealed by the difference of the strongest RSSl value in the SCANset and the corresponding RSSI value in the FPset. For example, the scaling component can determine a scale value to apply as follows;
Figure imgf000024_0001
where: APm is the strongest AP in SCANset, atid
FP_APπ is the corresponding RSSI value from the FPset.
From Eq. 3, it follows that the scaling component 422 can scale each S_RSS{i) value, such as follows;
Figure imgf000024_0002
[0082J As further example, die scaling component 422 can also determine a scaling value for each device by measuring a constant source and taking the difference between a reference device and the test device. For instance, the fingerprint data set 406 can be generated when signals (defining a mobility fingerprint) are sampled at the roam zone by a given reference device having particular operating parameters. The mobile unit mov ing within the system or enterprise may be a different type of device than the reference device, such that certain parameters of the input 404 to the fingerprint detector 402 may require device scaling. For example, the scaling value for a given scanning device (or mobile unit) can be expressed as follows:
Figure imgf000024_0003
where; RSSIRB is the measurement with the reference device, and
RSSITEST is the same measurement for the test device (mobile unit)
From Eq. 5, the scaled value of the scanned RSS! value (S_RSSϊ(i)) can be represented as follows:
Figure imgf000024_0004
In this approach, each supported device may either be configured with its measured scale value to be delivered with the fingerprint data 408. [0083] Those skilled In the ait will understand and appreciate other algorithms that may be utilized to perform scaling of measured parameters based on the teachings contained herein. Additionally or alternatively, scaling ears be performed at the measurement system 412. Since fingerprint data can be associated with different roam ?.ones, different scaling may be applied for different groups of the fingerprint data. The scaling component 422 provides the scaled input data to an evaluate* 424.
[0084] The evaiuator 424 is programmed and/or configured to determine if the mobility fingerprint defined by the input data at 404 substantially matches any of the fingerprint data 408. As used herein, the term "substantially" is intended to Include minor variations or deviations in the associated term that is being modified, such as within a detemύnable variance. The evaiuator 424 employs an evaluation algorithm that compares the Instantaneous sampled data from inputs at 404 relative to the fingerprint data 408. The evaluation algorithm performed by the evaiuator 424 can be implemented as logic on the mobile unit, logic in the network or as a combination of logic on the mobile unit and the network. Such logic further can be provided In the form of hardware (e.g., field programmable gate array (FPGA) or other logic structure), software {e.g.. executable instructions stored in memory or running on a processor) or as a combination of hardware and software. The algorithm that is utilized can vary significantly depending on the data that was available at the time of generating the mobility fingerprint data 408, For example, different algorithms would likely ho needed depending on whether the fingerprint information available is only data with respect to the roaming zones or whether the data covers the entire coverage area. This is because having a complete coverage data set allows the possibility to more accurately define the probability that a given roaming zone is detected against the total coverage area available.
[0085] The evaiuator 424 can also include a calculator 428 programmed to calculate fingerprint parameters based on the input received at 404. The calculator 428 can be programmed with one or more algorithms 429 to compute the values consistent with the fingerprint date collection approached utilized to gather the fingerprint data 408. Examples of the types of algorithms that can be employed b> the evaiuator 424 and the calculator 428 are described below with respect to certain example embodiments. The calculator 42S can calculate fingerprint data for each of the signals provided with the input 404 or to a selected subset of the input signals corresponding to the input 404, For instance, a selected subset of a portion of the plurality of received signals can be identified based on the received signal strength (RSSI value) exceeding the threshold. The RSS! value, for instance can also be calculated by the calculator 428 to an appropriate scale (e.g., dBm, a predefined scale of 1 to 100 or the like).
{OOSβJ Those skilled in the art will understand and appreciate various types of algorithms 429 that cars be performed by the calculator 428 for use in evaluating the mobility fingerprint for a given mobile unit. The calculator 428 can perform calculations as a function of the signal values that may be calculated as well as the signal values defined by the fingerprint data 408, The comparator 430 can compare the calculated results relative to a threshold to determine if a match exists. The threshold, for example, may correspond to a histogram of fingerprint data or statistical methods may be employed to determine the likelihood of a match. The results of the evaluation are provided to a handofF trigger generator 432 that is configured to generate a trigger signal at 434 if the results of the evaluation indicate that the mobility fingerprints of the mobile unit matches the mobility fingerprint defined by any of the fingerprint data 408,
[0087] The evaluator 424 may also employ one or more discriminators 436 that can be utilized as part of the fingerprint data to help confirm the occurrence of a positive match between fingerprint data 408 and the inputs 404. For example, suitable discriminators 436 may include the RSSl for a given cell power, location information {e.g., location within a network or a global position), receiving a signal from a beacon or the strongest access point corresponding to the primary identifier to which the mobile unit has connected. These and other discriminators thus can be aggregated with the results of the calculator 428 to mitigate the likelihood of false positive matches.
[0088] The following example describes an approach where the fingerprint detector
402 is implemented on a mobile unit (e.g.. a wireless client) when only the data for the roaming zones are available for a wireless network, In such an approach, the evaluator 424 requires an evaluation algorithm that can provide a metric to maximize accurate roam zone detection arid minimize false positives, (n this example, it is further assumed in the fingerprint data set 406 that nothing is known about the overall coverage area other than the number of APs in a given fingerprint data set and the corresponding RSSL Because of the lack, of a complete data set for the entire coverage area, the approach that will be described is a deterministic approach to evaluate against the small set of roaming zone fingerprint locations. Other fingerprint evaluation schemes may be utilized, such as a probabilistic approach (e.g., employing Bayes theorem} where the probability of being at the fingerprint location is evaluated. Additional discriminators may also be applied to help reduce the occurrence of false positive matches. [0089] In order to accommodate the application of the deterministic evaluation to identify the potential match, plus the penalty of discriminators, the overall detection algorithm performed by the e\aluator 424 can use a standard constraint -handling technique of evaluating both the feasible solution and an infeasibie solution.
Match - e val_fθ + eva!_i( ) Eq . 7 where: eval__f is the evaluation of the feasible solution, and cval_i{) is the evaluation of the infeasibie solution.
The basic algorithm operates on a fingerprint data set 406 that defines the possible roaming zones generally in range of the client's current location. ThK set of fingerprint data set 406 can be represented as follows'
FPsei " (FP 1. FP2 FPn) Hq, 8
where n is the total number of entries of fingerprint data 408 m the data set 406, and
FPi is the i* fingerprint data entr> .
P309O] Each fingerprint data 408 has a specific fingerprint t\pe, _,uch aj> described herein. For the example of a fingerprint for a v, ireiess network, fingerprint data 408 minima!!} contains a list of detected APs and corresponding received signal strength values, such as follow s:
FPs = ((FP_AP1, FP RSSl), (FP_AP2, FP_RSS2),...,(H> APk, FPJRSSk)) Eq. 9 where k is the total number of detected APs for a given entry of fingerpiint data 408.
[0091] Fdr example, v\hen the wireless client is in a state where roaming might be needed (e g , during an active communication, ^uch as a voice call), the wireless adapter can perform a periodic scan to generate an instantaneous nearest neighbor I hi. This instantaneous neighbor list (SCANset) can contain a list of detected APs and corresponding received ^Igrsal strength (RSS) values, such as can be represented as foiluws;
SCANset « ((S_AP1, S RSSl), (S AP2, S RSS2)....,(S_APj. S. RSSj)) Eq. 10 where: j is the total number of detected APs for the instantaneous scan. S_APi is a single AP in the scan list, and
S RSSi is the corresponding measured receive signal strength.
These two sets of data, PPset and SCANset, can define the primary inputs 404 provided to the fingerprint detector 402 and employed by the various algorithms to decide whether to trigger a handoff, for example, from the WiFi network to the cellular network (or vice versa). Two genera] classes of fingerprint detection algorithms include an effort lo identify a well bounded area, such as an area supported by a wireless network. The output of this type of algorithm thus can be used as an indication that a mobile unit is current!}' located in that well bounded region. Another class of algorithm seeks io identify a boundary region. The output of this second type of algorithm can be used as an indication that a mobile unit is somewhere outside the boundary region (i.e. a much larger area}. The boundary can correspond to a physical boundary or an RF boundary (e.g., based on signal strength for one or more signal, quality of connection and the like).
[0092] A distance vector algorithm is one example of an algorithm that can be implemented for the first category of fingerprint detection algorithm. The evaluator 424 can implement a distance vector algorithm to identify a well bounded area in the network, such as by the calculator 428 computing the sum of the differences of the distance from each AP during the instantaneous scan and the distance from each AP in the fingerprint. The comparator 430 can then compare the sum against an acceptable total allowed difference. [0093] For the feasible solution component of Eq. 7, the calculator 428 can employ s weighted nearest neighbor algorithm to determine if any fingerprint matches exist. The nearest neighbor can be determined by calculating an appropriate distance metric, such as a Manhattan distance calculation, an Euclidean distance calculation, or a Chebyshev distance calculation to name a few. The overall distance calculation can be scaled to accommodate the variation in antenna gain for each mobile client in the network, [0094] A feasible solution using the weighted nearest neighbor method exists only if the number of neighbors is three or greater. When the number of neighbors is less than three then the minimum signal strength method should be used, for instance, the calculator 428 can evaluate the minimum signal strength for the feasible solution, such as follows;
Figure imgf000028_0001
For a vaϋd feasible solution to exist, the result of Eq. 1 1 should be less than the worst case allowed differential from the fingerprint data. If it is not less than the worst case situation, then the Eval_/0 value is infinite and. therefore, cannot produce a match. The worst case allowed differential can be calculated b> the calculator 428 a*> follows:
Figure imgf000029_0001
where cri is the allowed RSSl variance for the ith AP,
It will be appreciated that the RSS values in both Eqs. 1 1 and 12 can be scaled values, such a^ described herein.
[0095] I he infcasible solution evaluation from Eq. 7 can be utilised to incorporate some of the possible discriminators prex iousl) described. As described herein, the discriminators help reduce an> false posithes that ma> occur, such as b\ confirming the \alidity of the match provided by the feasible solution. A variety of factors can be considered as part of the in feasible solution e\ aluation, Bv wa> of example, the in feasible solution can evaluate missing APs in the instantaneous scan AF list and APs with high RSS in the instantaneous scan AP list that arc not part of the fingerprint. I'he presence ot other discriminators can aiso form part of the in feasible solution.
[00S6j As vet another evample, the evaluaior 424 can employ a distance \ ector individual algorithm that is capable of identifying a bounded area. Rather than examining the sum of the diffαεncei, as in the preceding example, this algorithm compare* the distance from each AP from the instantaneous scan and the distance from each AP in the fingerprint on an AP per AF basis, AP comparisons that are a match contribute to the feasible pan of the evaluation while AP comparisons that do not match contribute to the ϊnleasible part of the evaluation. For instance, the calculator 428 can employ an evaluation algorithm 429 that can be represented as follows:
Figure imgf000029_0002
In this case, the resulting evaluation produces a sum of matches from the feasible solution minus mismatches from the infeasiblc solution. The comparator 430 can compare the E\al value against the total number of APs in the FPset to determine if a valid match exists. The percentage of matching APs is a configurable value,
[0097J Bj wa> of example, for the feasible solution component of Eq, 13, the calculator 428 can compute a difference of RSS values is compared agaatst the allowed variance. This computation can be represented as follows:
Figure imgf000030_0002
where; S RSSm is the scanned RSS vaiυe for a given AP,
FPJtSSn is the RSS value from the fingerprint data 208, and σn is the allowed variance for the RSS value associated with the given AP.
The result of Eq. 14 thus corresponds to a tola! count of SCANset measurement vectors that are within the allowed variance of the corresponding RSS value in the FPsct. The RSS values can be scaled values.
[0098] For the infeasible solution component of Eq. 13, the calculator 428 can compute a difference of RSS \ aiues that is compared against the allowed variance. This computation can be represented as follows:
Figure imgf000030_0003
The result of Hq. 15 is the total count of SCANset measurement vectors that are outside the allowed variance of the corresponding RSS value in the f Pset. NoU* that the RSS values in Fq. 15 can be scaled. Additional!}, the allowed variance for Eqs. 14 and 15 may be the same or different variance values may be utilized for the feasible and tnfeasibie solutions.
[0099J As yet a further example, the evaluator 424 can employ an algorithm 429 that is referred to as the strongest AP set algorithm. The strongest AP set algorithm fails into the category of algorithms that are capable of determining if a mobile unit is outside of a boundary region. The primary principle of this algorithm Is that some portion of the AP's measured during the neighbor scan has a measured RSS that is less than the corresponding RSS value in the fingerprint data set 406, This genera! AP comparison is aiso governed by the strongest AP in the SCANset which must meet the criteria above. The evaluation algorithm cart have the form of Eq. 13. In this case, the calculator 428 is programmed to produce Ά sum of matches (forming the feasible solution) minus mismatches {forming the infeasible solution). The comparator 430 then compares the Eval value against the total number of APs in the fingerprint data set 406 to determine if a valid match exists. The percentage of matching APs can be a configurable
Figure imgf000030_0001
[00100] By way of example, for the feasible solution component of Eq. 13, the algorithm 429 of the calculator 428 computes the Oval f() value as a function of the SCANset RSS values and the RSS values in the fingerprint data set 406. Tins evaluation can be expressed as follows:
Figure imgf000031_0001
The result of Eq, 16 is the total count of SCANset measurement vectors that are less than the corresponding RSS value in the fingerprint data set 406.
[00101] By way of further example, the calculator 428 can determine the infeasible solution component of Eq. 13 by evaluating the SCANset RSS values relative to the FPset RSS values. This comparison can be represented as follows:
Figure imgf000031_0002
The result of Eq. 17 is an infeasible solution that represents the total count of SCANset measurement vectors that are greater than or equal to the RSS value in the FPset It will be appreciated that the RSS values in Eqs, 16 and i 7 can be scaled. The calculator 428 can compute the results of Eq, 13 as ihe difference between the count values produced by Eqs. 16 and 17 to identify whether a valid fingerprint match exisέs.
[00102] Yet another algorithm that can be implemented to detect (or enhance detection of) a mobility fingerprint is a strong cell weak AP algorithm. The strong cell weak AP algorithm operates on the principal that at many roam zone locations the cellular radio signal becomes stronger while the AP signal becomes weaker. For example, this set of conditions can often be detected initially at the entrance and exit points of a building. FfG. 10 shows a plot, indicated at 450, of cellular signal strength and WiFi signal strength for data gathered for a typical enterprise building in which a WiFi wireless network is implemented. In FIG. 10, the diamonds represent measurements taken inside the building and squares represent measurements taken outside the building. This plot 450 demonstrates a distinct change in the relative signal strengths when inside the building versus when outside the building. One of the benefits of this algorithm is that no WiFi scanning of neighboring AP's is required since the WiFi evaluation only requires monitoring the connected AP for the mobile unit. For this algorithm, the connected AP RSSI and registered cellular tower RSSI is tracked against the values found in the static fingerprint with cellular tower information. The calculator 428 thus may evaluate the relative signal strengths as part of feasible solution EvaMO that can be represented as follows:
Figure imgf000032_0001
where: coπAP_RSS is the RSS value for the connected AP, regCeU_RSS is the RSS value for the cellular station to which the client is connected, and
FP _Cell_RSS is the RSS value defined by the Fingerprint data 208
It will be appreciated that the RSS values can be scaled values. [00103] Since certain fingerprint detection algorithms may require a scan of neighboring base stations, the fingerprint evaluator 424 can include a prequaϋficatioπ block 426. The prequaiificatlon block 426 can include logic programmed to help reduce the amount of time the fingerprint detection algorithm requires for scanning. The prequaiϋficariαn block 426 can operate to determine if an expected received signal is absent from the mobility fingerprint for the fingerprint data 408. Fingerprint prequaiiftcatioπ can leverage the fact that there is very little penalty for monitoring the RSSl of the currently connected AP or other base station. For example, if a mobile unit is connected to a given AP in a wireless network and the connected AP is not part of any fingerprint, such that there is no possibility of match between the input 404 and the fingerprint data 408, the fingerprint detector has no need to require scanning of the neighboring base stations. If all fingerprints show there is no possibility of a match, then there is no need to perform any scan. As a result of the preqυaliftcation 426, undesirable scanning that may cause a temporary disruption and an overall lower throughput In the detection process can be mitigated. [00104] Additionally, or as an alternative, the prequaiification block 426 can perform prequaUfication based on signal characteristics of one or more other received signal or on any combination of signals. Tn the event that the prequaUtlcation block 426 detects that a match may exist, the fingerprint detector 402 can cause the measurement system 412 or other associated circuitry" to initiate appropriate scanning so that appropriate signals can be acquired for performing fingerprint detection. The fingerprint detector 402 can provide a control signal to the measurement system 412 directly or it can be provided to higher level conirol functions to enable the scanning. The prequaUfication block 426 may also be utilized to reduce the subset of fingerprint data such that, if there is no possibility of a match with a given fingerprint, additional calculations are not performed. Thus, the nrequahficatioπ block 426 can help reduce the time and amount of processing required to evaluate mobility fingerprint for a mobile device.
[00105] Prequaiifϊcation can vary depending on the particular fingerpϊ mi detection algorithm used. For example, some fingerprint detection algorithms, such as distance vector indrύduai algorithm, can prequahfy by testing if the connected AP's RS^l is substantially equal to the corresponding RSSI in the fingerprint data 408, Other fingerprint detection algorithms, such a÷> the strongest AP set may prequalifj by testing if the connected AP's RSSI is less than the corresponding RSSl in the fingerprint.
[001061 Mobility fingerprinting pro\ ides a mechanism that enables a communication session {e g , a voice call usmg VoIP) to be kept υn a first wueies*. technology (έ? g . WI AK) until the mobile unit enters a roaming zone defined b> pie-determined fingerprint data. There may be times where the system does not detect that the mobile unit resides m the roaming ZORe, hot nonc-the-jejss has entered an area where a handofϊ to a second radio technology {£ g . cellular) is required. For this case, the use of minimum signal strength can bε employed in conjunction with mobility fingerprinting to ensure a handoff to cellular (or other radio technology) occurs. Depending on the time it takes to setup the cellular call relative the minimum signal level it is possible that the user may detect a short audio disconnection. The hope ts that mohjlity fingerprinting provides the trigger for the majority of the roams so that this situation can be avoided, however.
J00107J ϊhe concept of minimum signal strength is that at an> ghen time the client must maintain a minimum level of signal to keep the voice call operating on the WLAN. If a client detects signal strength below the minimum le\ el then it should transition to another available radio technology. Two methods of handling minimum signal sttcngth can include a S) stem wide minimum signal strength and an AP specific minimum signal strength. [00108] B\ \va> of example, a worst ease situation would be to appi> system wide minimum signal strength criteria. Most voice enabled WLAKs are configured to assure a minimum signal strength \alue in order to reltdbh provide a high level of service that is usually required to support a \oice call. For instance, fee minimum value Is in the range of - OSdBm to »75dBrn for 802.31 b g networks. A catch-all solution would be to provide a s} stern level setting slightly less than this range to triggeϊ roaming. I his system level value can be distributed to the mobile units {e # , v\n elesA clients) connected to the R A serv ei , 1 he drawback to this approach is that the client ma> roam to cellular (or other supported radiu technology) more often than is needed. Alternatively, it is possible that the client may not roam to cellular when it should. An example of this is when the wireless coverage leaks far outside of the desired coverage area, which is ver> common in toda>\ networks. [00109] An alternate solution to the $5 stem wide setting is to employ AP specific minimum values. B\ evaluating the data collected for mobility fingerprinting it Is possible to determine what the minimum signal value would be for all the APs near roaming zones. The RA Client can use the roaming data to track the minimum value for each AP in which it is communicating and apply that criteria if fingerprinting missed a roaming transition. [O0110J in \itv> of the structural and functional features described above, certain methods will be better appreciated v> ith reference to FIG. i I , It is to he understood and appreciated that the illustrated actions, in other embodiments, ma\ occur in different orders or concurrently with other actions. Moreover, not ail features illustrated in FICi. I i ma> be required to implement a method according to the subject invention, it is to be further understood that the follow ing methodology can be implemented m hardware (e g , one or more processors, such as in a computer or a processor based device), software (e.<e, stored in a computer readable medium or as executable instructions running on one or more processors K or as a combination of hardware and software,
[00111 J FIG. 1 I is a flow diagram depicting an example method 500 that can be employed to trigger a handover event according to an aspect of the invention. The method cm\ be Implemented by a mobile unit, by a network infrastructure or a combination thereof. The method begins, at 502 in which a fingerprint data is provided. The fingerprint data defines at least one mobility fingerprint, such as can be generated from one or more signals associated with a predetermined roam zone where the handover event may need to occur Bach mobility fingerprint can be generated based on signals collected during a fingerprint gathering phase, such as described herein. The signals used to generate the mobility fingerprint can originate from different signal sources, which further ma> be different tj pes. of radio technologies.
|00112] At 504, after optional prequalifϊeation (e g., described herein), scanning is performed to acquire a set of scan data. The scan data can include signal characteristics for any number of one or more signals, such as described herein. The set of scan data can be processed by a fingerprint evaluation algorithm, which processing can be performed by the mobile unit, b> the network To which the mobile unit is connected or by a combination thereof. For example, at 506, the scan data is evaluated to determine whether the scan data substantial!) matches a mobiiit> fingerprint defined by the fingerprint data. The evaluation at 506 can include evaluation of a feasible solution and an snfeassbϊe solution, such as described herein. Λ match indicates that a mobile unit resides ft ithϊn a predetermined roam /om. [00113] If the exaiuatϊon at 506 indicates a match, at 508, a trigger signal can be generated to indicate a handover event from a first radio technolog) to a second radio technology may need to occur. That is, the trigger signs! can be generated based υn determining the set of scan data substantial!} matches a mobility fingerprint defined b> the fingerprint data. At 510, a handov cr c\ eπt for the mobile unit from the first radio technology to the second radio technolog} can be initiated in response to the trigger signal being generated at 508. The deierminatior of whether to actually perform the handover event can he performed b> higher level functions ^uch as described herein.
[00114J In \ jew of the foregoing, those skilled in the art \ull appreciate that systems and methods have been described to provide means for reliably determining when to switch between radio technologies for a mobile device. Various examples have been described that can be utilized to determine whether the device resides in a predetermined location or zone to help determine whether to trigger handoff to a new radio technolog} , Thus, the systems and methods described herein provide an efficient approach that can form part of an enterprise mobility solution.
[00115] What have been described above are examples and embodiments of the invention. It is, υf course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the invention, but one of ordinary skill in the art \\ ill recogni/e that mam further combination* and permutations of the present invention are possible For example, w hue man) examples and algorithms ha\e been described with respect to triggering handover from a WLAN to a cellular network, those skilled in the art will understand that the approaches described herein are eqυallj applicable to handover between any radio technologies. According!}, the invention is mteπdεd to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. In the claims, unless otherwise indicated, the article "a" is to refer to "one or more than one."

Claims

CLAIMS What is claimed is:
1. A method to Sacs IItate handover, comprising: detecting that a mobile unit resides within at least one predetermined zone where a handover event from a first radio technology to a second radio technology may need to occur, the second radio technology being different from the first radio technology.
2. The method of claim J , further comprising generating a trigger signal in response to the detecting that the mobile unit resides within the at least one predetermined /one.
3. The method of claim 2, further comprising initiating a handover event for the mobile unit from the first radio technology to the second radio technology in response to the trigger signal being generated.
4. The method of claim !, wherein the detecting that the mobile unit resides within the at least one predetermined zone is performed by the mobile unit.
5. The method of claim L w herein the detecting that the mobile unit resides within the at least one predetermined zone is performed by a radio system to which the mobile unit is currently connected according to the first radio technology.
6. The method of claim 5. further comprising storing mobility fingerprint data in manor)- of the radio system, the stored fingerprint data representing at least one mobility fingerprint that defines the at least one predetermined zone where the handover event may need to occur, the radio system executing instructions to evaluate the mobility fingerprint data relative to a set of received signals to ascertain whether to trigger a handoff for the mobile unit.
7. The method of claim 1, further comprising defining at least one mobility fingerprint from at least one wireless signal associated with the at least one predetermined zone where the handover event may need to occur.
8. The method of claim 7, wherein the at least one mobility fingerprint comprises a set of signals originating from different signal sources,
9. The method of claim 8. wherein the different signal sources further comprise more than one t>pe of radio technology.
10 The method of claim 7. further comprising storing fingerprint data in memorv representing signal characteristics corresponding to the at lejust one mobility fingerprint.
1 1. The method of claim 10. wherein the fingerprint data further comprises a primary identifier and at least one secondary identifier, the method further comprising aliocatiπg a greater weight to the primary identifier than to the at icast one secondary identifier in evaluating whether the mobile unit resides within the at ieast one predetermined zone.
12. The method of claim 10, further comprising loading a fmgeφiint dam set into memory of the mobile unit for a given area in response to detecting the mobile unit is located within a boundary for the given area, tte fingerprint data set comprising the fingerprint data that defines the at ieast one predetermined zone where the handover may need to occur for the given area,
13. The method of tJaim 12. further comprising specifying ke> data to enable an identification of a group of a plurality of predetermined roam zones associated with the given area, the ke\ data causing the fingerprint data set to be loaded into the memory ofthe mobile unit for the given area,
14. The method of claim 10, forther comprising prequalifymg the detecting by disabling at least a portion of a signal scan if at least one wireless signal does not result in a match with the fingerprint data and enabling at least a portion of the signal scan in response to detecting that the at least one wireless signal is substantia!!)' absent from representation by the fingerprint data.
15 The method of claim 10, wherein the signal characteristics further comprise path loss associated with at least one wireless signal transmitted within a wireless* network with which the mobile unit is connected, the detecting further comprising evaluating path loss from a signal scan relative to the path loss represented by the fingerprint data io determine if the mobile unit resides within the at ieast one predetermined zone.
16. The method of claim 10, wherein the signal characteristics further comprise measured signal strength associated with at ieast one wϊreiess signal transmitted within a wireless network with which the mobile unit is connected, the detecting further comprising evaluating the measured signal strength from a signal scan relative to the signal strength represented by the fingerprint data to determine if a handoff should be triggered for the mobile unit.
17. The method of claim 7, further comprising gathering measurement data associated with the at least one predetermined /one to define the mobility fingerprint.
18. The method of claim 17, w herein the gathering of the measurement data further comprises manual!} positioning a test device within the at least one predetermined /one to acquire a plurality of sample measurements from the at least one wireless signal, the mobility fingerprint for each predetermined zone being generated based on the plurality of sample measurements acquired for each respective predetermined zone,
19. The method of claim 17, wherein the gathering of the measurement data further comprises adaptively collecting a set of measurement data from each of a plurality of mobile units operating near the at least one predetermined zone, the mobility fingerprint for each predetermined zone being generated based on the plurality of sample measurements acquired for each respective predetermined zone.
20. The method of claim 17. wherein the gathering of the measurement data farther comprises: importing a set of measurement data that encompasses the at ieast one predetermined zone; and identifying the at ieast one predetermined zone based on measurement data contained in the set of imported measurement data, the mobility fingerprint for each of the at least one predetermined zone being generated based on the measurement data corresponding the identified at least one predetermined zone.
21. The method of claim 1 , wherein the at ieast one predetermined zone is part of a first substantially bounded area of an enterprise, the enterprise comprising a plurality of substantially bounded areas, each of the plurality of substantially bounded areas including at least one predetermined zone where a handover event may need to occur tor the respective bounded area, wherein different algorithms are employed for at least two of the plurality of substantially bounded areas for evaluating whether the mobile unit resides within the at least one predetermined zone of the respective bounded area.
22. The method of claim 1 , wherein the detecting further comprises calculating at least one feasible solution by evaluating data corresponding to scanned signal characteristics relative to mobility fingerprint data that defines the at least one predetermined zone.
23. The method of claim 22, further comprising evaluating the at least one feasible solution relative to a corresponding iπfeasible solution to confirm the validity of the at least one feasible solution,
24. The method of claim 23, further comprising: collecting the mobility fingerprint data at a plurality of locations proximal to the at least one predetermined zone to define a fingerprint vector; and determining directionality associated with the mobile unit based on the fingerprint vector, the determined directionality defining at least a portion of the corresponding unfeasible solution.
25. A system to facilitate handover, comprising; a mobile unit configured to operate according to at least first radio technology and a second radio technology; and a fingerprint detector that evaluates input data relative to mobility fingerprint data that defines at least one predetermined roam zone to determine whether to trigger a handover between the first and second radio technologies for the mobile unit.
26. The Sj- stem of claim 25, further comprising a fingerprint data set that includes the mobility fingerprint data for an area that includes a piuraiitv. υf roam /ones, the fingerprint detector generating a trigger signal in response to evaluating the input data relative to the mobility fingerprint data in the fingerprint data .set.
27. The system of claim 25, wherein the input data corresponds to scanned signal characteristics, the fingerprint detector further comprising an evaluator that computes at least one feasible solution by evaluating the scanned signal characteristics relative to predefined signal characteristics defined by the mobility fingerprint data,
28. The syύcm of claim 27, wherein the evaiυator further comprises at least one discriminator programmed to confirm the validity of the at least one feasible solution.
29. The system of claim 27, wherein the scanned signal characteristics result from at least one signal scan, wherein the evaluator further comprises prequabTtcation logic operative to control performing the at least one signal scan.
30. The system of claim 25, wherein the input data corresponds to scanned signal characteristics resulting from at least one signal scan, the fingerprint detector further comprising a scaling component configured to scaie the scanned signal characteristics consistent with signal characteristics defined by the mobility fingerprint data.
31. The system of claim 2S5 wherein the fingerprint detector further comprises executable instructions running on a processor of the mobile unit
32. The system of claim 25, wherein the fingerprint detector farther comprises executable instructions running on a computer that ss part of a radio system to which the mobile unit is connected according to the first radio technology,
33. The system of claim 25, further comprising: a wireless network that operates according to the first radio technology: and a cellular system that operates according to the second radio technology ,
34. A system to facilitate handover for a mobile unit comprising; means for storing fingerprint data that defines a mobility fingerprint for at least one predetermined roam zone; and means for evaluating whether to trigger a hancioff for the mobile unit from a first radio technology to a second radio technology based on an evaluation of the stored fingerprint data relative to data corresponding to at least one wireless signal that is associated with the mobile unit.
35, The system of claim 34, farther comprising: means for gathering measurement data associated with the at least one predetermined zone; and means for generating the mobility fingerprint for each of the at least one predetermined zone.
PCT/US2007/073698 2006-07-31 2007-07-17 System and method to facilitate handover WO2008016778A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07840428.2A EP2050286B1 (en) 2006-07-31 2007-07-17 System to facilitate handover

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US82089606P 2006-07-31 2006-07-31
US60/820,896 2006-07-31

Publications (2)

Publication Number Publication Date
WO2008016778A2 true WO2008016778A2 (en) 2008-02-07
WO2008016778A3 WO2008016778A3 (en) 2008-05-22

Family

ID=38997757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/073698 WO2008016778A2 (en) 2006-07-31 2007-07-17 System and method to facilitate handover

Country Status (3)

Country Link
US (2) US8140079B2 (en)
EP (1) EP2050286B1 (en)
WO (1) WO2008016778A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011002607A1 (en) 2009-07-03 2011-01-06 Cisco Technology, Inc. Infrastructure assisted network transition
WO2013164032A1 (en) * 2012-05-03 2013-11-07 Huawei Technologies Sweden Ab Sending access information from physical access control system to user terminal
CN103493544A (en) * 2011-04-20 2014-01-01 诺基亚公司 Method and apparatus for providing a network search function
CN109451530A (en) * 2019-01-03 2019-03-08 中国联合网络通信集团有限公司 Formation gathering method and Information Collection System
CN111698663A (en) * 2019-03-12 2020-09-22 大众汽车有限公司 System, vehicle, apparatus, method and computer program for user equipment and network components in a mobile communication system

Families Citing this family (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070132577A1 (en) * 2005-12-09 2007-06-14 Honeywell International Inc. Method and apparatus for estimating the location of a signal transmitter
US7826862B2 (en) * 2007-06-28 2010-11-02 Symbol Technologies, Inc. Methods and apparatus for improved locationing in a wireless network
US8892112B2 (en) * 2011-07-21 2014-11-18 At&T Mobility Ii Llc Selection of a radio access bearer resource based on radio access bearer resource historical information
TW200926745A (en) * 2007-12-05 2009-06-16 Compal Communications Inc Mobile communication apparatus and operating method thereof
CN101897210B (en) * 2007-12-11 2014-05-28 爱立信电话股份有限公司 Methods and apparatuses generating a radio base station key in a cellular radio system
GB0724904D0 (en) 2007-12-21 2008-01-30 Nortel Networks Ltd Improved soft handover for cellular radio systems
US8886196B2 (en) * 2007-12-24 2014-11-11 Samsung Electronics Co., Ltd. Service connection apparatus and method in portable terminal
US20090279502A1 (en) * 2008-05-09 2009-11-12 Nokia Corporation Internetworking between wman and wlan networks
US8121052B2 (en) * 2008-05-15 2012-02-21 Nokia Siemens Networks Oy Framework for internetworking between WMAN and WLAN networks
CN102625302B (en) * 2008-06-23 2016-03-30 华为技术有限公司 Cipher key derivative method, equipment and system
TWI382197B (en) * 2008-07-15 2013-01-11 Htc Corp Positioning method, apparatus and computer program product using the positioning method
TW201016066A (en) * 2008-10-03 2010-04-16 Kuang Sheng Yun Ltd Method and system for WiFi network high speed mobile voice and multimedia video data communication
US8437313B2 (en) * 2008-12-23 2013-05-07 Research In Motion Limited Scanning methods and apparatus for mobile devices in wireless local area networks for reduced power consumption
US8064910B2 (en) * 2008-12-30 2011-11-22 Verizon Patent And Licensing Inc. Proactive handover policy
US8326319B2 (en) 2009-01-23 2012-12-04 At&T Mobility Ii Llc Compensation of propagation delays of wireless signals
CA2667820C (en) 2009-05-29 2013-10-01 Research In Motion Limited Signal quality determination methods and apparatus suitable for use in wlan-to-wwan transitioning
CN102450056B (en) * 2009-06-04 2015-11-25 黑莓有限公司 Promote using RADIUS compatible protocol to transmit to mobile terminal the method and apparatus used in neighbouring network information
US8891442B2 (en) * 2009-06-30 2014-11-18 Clearwire Ip Holdings Llc Apparatus and method for dual-mode operation
US8489112B2 (en) 2009-07-29 2013-07-16 Shopkick, Inc. Method and system for location-triggered rewards
US8750824B2 (en) 2009-10-30 2014-06-10 International Business Machines Corporation Global mobility infrastructure for user devices
US20110201350A1 (en) * 2009-12-10 2011-08-18 Qualcomm Incorporated Portable electronic device positioning based on identifiable zones presenting reduced wireless communication conditions
US8285291B2 (en) 2010-02-02 2012-10-09 Clearwire Ip Holdings Llc System and method for multimode device handover
US9196157B2 (en) 2010-02-25 2015-11-24 AT&T Mobolity II LLC Transportation analytics employing timed fingerprint location information
US9008684B2 (en) 2010-02-25 2015-04-14 At&T Mobility Ii Llc Sharing timed fingerprint location information
US8224349B2 (en) 2010-02-25 2012-07-17 At&T Mobility Ii Llc Timed fingerprint locating in wireless networks
US9053513B2 (en) 2010-02-25 2015-06-09 At&T Mobility Ii Llc Fraud analysis for a location aware transaction
US8396039B2 (en) 2010-04-15 2013-03-12 Clearwire Ip Holdings Llc Apparatus and method for multimode device handover
US8447328B2 (en) 2010-08-27 2013-05-21 At&T Mobility Ii Llc Location estimation of a mobile device in a UMTS network
JP5281201B2 (en) * 2010-09-07 2013-09-04 エンパイア テクノロジー ディベロップメント エルエルシー Dynamic internetwork load balancing
US20120076107A1 (en) * 2010-09-23 2012-03-29 Avital Shlomo Autonomous scanning and handover
KR101462058B1 (en) * 2010-10-22 2014-11-19 에스케이 텔레콤주식회사 Method for Estimating Access Point Position by Using Log Data, Apparatus And Terminal Therefor
US9009629B2 (en) 2010-12-01 2015-04-14 At&T Mobility Ii Llc Motion-based user interface feature subsets
US9210660B2 (en) * 2011-01-10 2015-12-08 Lg Electronics Inc. Method and device for transceiving data in a radio access system supporting multi-radio access technology
JP5565325B2 (en) * 2011-01-19 2014-08-06 富士通株式会社 Wireless communication apparatus, wireless communication method, and communication control program
KR101565478B1 (en) 2011-04-29 2015-11-03 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 Wireless device handoff between wireless networks
US9462497B2 (en) 2011-07-01 2016-10-04 At&T Mobility Ii Llc Subscriber data analysis and graphical rendering
US8897802B2 (en) 2011-07-21 2014-11-25 At&T Mobility Ii Llc Selection of a radio access technology resource based on radio access technology resource historical information
US9519043B2 (en) 2011-07-21 2016-12-13 At&T Mobility Ii Llc Estimating network based locating error in wireless networks
US8761799B2 (en) 2011-07-21 2014-06-24 At&T Mobility Ii Llc Location analytics employing timed fingerprint location information
US8923134B2 (en) 2011-08-29 2014-12-30 At&T Mobility Ii Llc Prioritizing network failure tickets using mobile location data
CA2847222C (en) 2011-09-23 2020-07-21 Rx Networks Inc. Geo-reference based positioning of a mobile device
CN103037394B (en) 2011-10-02 2017-02-01 华为技术有限公司 Method, device and system for discovering cell
US8762048B2 (en) 2011-10-28 2014-06-24 At&T Mobility Ii Llc Automatic travel time and routing determinations in a wireless network
US8909247B2 (en) 2011-11-08 2014-12-09 At&T Mobility Ii Llc Location based sharing of a network access credential
US8970432B2 (en) 2011-11-28 2015-03-03 At&T Mobility Ii Llc Femtocell calibration for timing based locating systems
US9026133B2 (en) 2011-11-28 2015-05-05 At&T Mobility Ii Llc Handset agent calibration for timing based locating systems
US20130148641A1 (en) * 2011-12-13 2013-06-13 Cisco Technology, Inc. Techniques to achieve zero roaming time for workgroup bridge devices
EP2805544A4 (en) * 2012-01-20 2015-11-25 Nokia Solutions & Networks Oy Cell handovers
US9042907B2 (en) 2012-03-09 2015-05-26 Blackberry Limited Location identification of a portable electronic device based on characteristics of an operating environment of the portable electronic device
US9194934B2 (en) 2012-03-09 2015-11-24 Blackberry Limited Location estimation using radio scene signatures
US8750617B2 (en) 2012-03-09 2014-06-10 Blackberry Limited Signature representation of data having high dimensionality
US8948809B2 (en) * 2012-03-09 2015-02-03 Blackberry Limited Signature based connectivity prediction for portable electronic devices
US9069634B2 (en) 2012-03-09 2015-06-30 Blackberry Limited Signature representation of data with aliasing across synonyms
EP2637460B1 (en) * 2012-03-09 2016-07-06 BlackBerry Limited Radio signature based connectivity prediction for portable electronic devices
WO2013136122A1 (en) * 2012-03-15 2013-09-19 Nokia Corporation Monitoring a quality of a terrestrial radio based positioning system
US8925104B2 (en) 2012-04-13 2014-12-30 At&T Mobility Ii Llc Event driven permissive sharing of information
US9295022B2 (en) * 2012-05-18 2016-03-22 Comcast Cable Communications, LLC. Wireless network supporting extended coverage of service
US9094929B2 (en) 2012-06-12 2015-07-28 At&T Mobility Ii Llc Event tagging for mobile networks
US9326263B2 (en) 2012-06-13 2016-04-26 At&T Mobility Ii Llc Site location determination using crowd sourced propagation delay and location data
US9046592B2 (en) 2012-06-13 2015-06-02 At&T Mobility Ii Llc Timed fingerprint locating at user equipment
US8938258B2 (en) 2012-06-14 2015-01-20 At&T Mobility Ii Llc Reference based location information for a wireless network
US8897805B2 (en) 2012-06-15 2014-11-25 At&T Intellectual Property I, L.P. Geographic redundancy determination for time based location information in a wireless radio network
US9408174B2 (en) 2012-06-19 2016-08-02 At&T Mobility Ii Llc Facilitation of timed fingerprint mobile device locating
US8892054B2 (en) 2012-07-17 2014-11-18 At&T Mobility Ii Llc Facilitation of delay error correction in timing-based location systems
US9439118B2 (en) * 2012-07-23 2016-09-06 Qualcomm Incorporated Systems and methods supporting WLAN-WWAN mobility in devices
US9351223B2 (en) 2012-07-25 2016-05-24 At&T Mobility Ii Llc Assignment of hierarchical cell structures employing geolocation techniques
US8824680B2 (en) * 2012-08-08 2014-09-02 Verizon Patent And Licensing Inc. Centralized key generation
EP2900031B1 (en) 2012-10-18 2018-05-23 Huawei Technologies Co., Ltd. Finding wireless local area network
US9462568B2 (en) * 2013-03-13 2016-10-04 Retail Optimization International, Inc. Systems and methods for indoor location services
US9225376B2 (en) 2013-03-14 2015-12-29 Shoretel, Inc. Communications control between mobile device and peripheral device
US9485626B2 (en) * 2013-03-19 2016-11-01 Intel Corporation Building floor determination for a location based service
JP6185804B2 (en) * 2013-09-20 2017-08-23 Kddi株式会社 Determination device, network node, determination method, and program
US20150215849A1 (en) * 2014-01-24 2015-07-30 Qualcomm Incorporated Systems and methods for accelerated network acquisition
US9712976B1 (en) * 2014-05-12 2017-07-18 Marvell International Ltd. Method and system for position updating using cached radio signal range
US20160150029A1 (en) * 2014-11-26 2016-05-26 Avaya Inc. Service discovery using a location database
US9351111B1 (en) 2015-03-06 2016-05-24 At&T Mobility Ii Llc Access to mobile location related information
US9749783B2 (en) * 2016-01-04 2017-08-29 The Boeing Company System and method for estimating wireless device positions
US9867199B1 (en) * 2016-02-05 2018-01-09 Sprint Spectrum L.P. Dynamic control of air interface capacity
US10165619B2 (en) * 2016-09-30 2018-12-25 Intel Corporation Generation of a fingerprint of an access point
US20180267132A1 (en) * 2017-03-16 2018-09-20 Quantek, Inc. Method of Position and Motion Detection with Packet Communication
CN106922005B (en) * 2017-03-23 2020-06-19 北京小米移动软件有限公司 Method and device for accessing wireless access point and computer readable storage medium
WO2019018618A1 (en) 2017-07-21 2019-01-24 Walmart Apollo, Llc System and method for managing inventory via rfid tags
US10609544B2 (en) * 2017-12-28 2020-03-31 Futurewei Technologies, Inc. Method and apparatus for identifying a target device
US10516972B1 (en) 2018-06-01 2019-12-24 At&T Intellectual Property I, L.P. Employing an alternate identifier for subscription access to mobile location information
US11026082B1 (en) 2019-03-26 2021-06-01 Ubiety Technologies, Inc. Electronic device identification system, apparatuses, and methods
US11751056B2 (en) 2020-08-31 2023-09-05 Oracle International Corporation Methods, systems, and computer readable media for 5G user equipment (UE) historical mobility tracking and security screening using mobility patterns
US11832172B2 (en) 2020-09-25 2023-11-28 Oracle International Corporation Methods, systems, and computer readable media for mitigating spoofing attacks on security edge protection proxy (SEPP) inter-public land mobile network (inter-PLMN) forwarding interface
US11825310B2 (en) 2020-09-25 2023-11-21 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming spoofing attacks
US11622255B2 (en) 2020-10-21 2023-04-04 Oracle International Corporation Methods, systems, and computer readable media for validating a session management function (SMF) registration request
US11770694B2 (en) * 2020-11-16 2023-09-26 Oracle International Corporation Methods, systems, and computer readable media for validating location update messages
US11818570B2 (en) 2020-12-15 2023-11-14 Oracle International Corporation Methods, systems, and computer readable media for message validation in fifth generation (5G) communications networks
US11812271B2 (en) 2020-12-17 2023-11-07 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming attacks for internet of things (IoT) devices based on expected user equipment (UE) behavior patterns
US11700510B2 (en) 2021-02-12 2023-07-11 Oracle International Corporation Methods, systems, and computer readable media for short message delivery status report validation
CN113891408B (en) * 2021-04-20 2022-08-16 荣耀终端有限公司 Method for switching Wi-Fi network and cellular network and electronic equipment
US11689912B2 (en) 2021-05-12 2023-06-27 Oracle International Corporation Methods, systems, and computer readable media for conducting a velocity check for outbound subscribers roaming to neighboring countries

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2389005A (en) 2002-05-23 2003-11-26 Inc Motorola Enabling cooperation between network kinds such as cellular and wlan
WO2004112317A1 (en) 2003-06-17 2004-12-23 Telefonaktiebolaget Lm Ericsson (Publ) System and method for locating a wireless local area network
WO2006078627A2 (en) 2005-01-18 2006-07-27 Interdigital Technology Corporation Method and system for system discovery and user selection
EP2357865A1 (en) 2005-07-25 2011-08-17 Qualcomm Incorporated Method and apparatus for maintaining a fingerprint for a wireless network

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6915123B1 (en) * 2000-03-02 2005-07-05 Lucent Technologies Inc. Method and system for monitoring an operational area of a subscriber station
US6477372B1 (en) * 2000-11-06 2002-11-05 Motorola, Inc. Method for a radiotelephone to scan for alternate radiotelephone systems
US7039028B2 (en) * 2001-04-04 2006-05-02 Telcordia Technologies, Inc. Packet distribution and selection in soft handoff for IP-based base stations among multiple subnets
KR100510126B1 (en) * 2002-12-23 2005-08-25 삼성전자주식회사 A handover method and mobile node handover device in wireless LAN
US7266101B2 (en) * 2003-06-30 2007-09-04 Motorola, Inc. Fast handover through proactive registration
US20050096052A1 (en) * 2003-10-29 2005-05-05 Samsung Electronics Co., Ltd. System and method for providing reliable hard handoffs between wireless networks
TWI441532B (en) * 2003-11-13 2014-06-11 Interdigital Tech Corp Method and system for facilitating inter-system handover
US20080253329A1 (en) * 2003-12-11 2008-10-16 Matsushita Electric Industrial Co., Ltd. Communication Handover Method, Communication System, Communication Message Processing Method, and Communication Message Processing Program
EP1738538B1 (en) * 2004-01-06 2018-08-08 Vasu Networks Corporation Telephone with automatic switching between cellular and voip networks
US20070217363A1 (en) * 2004-02-25 2007-09-20 Matsushita Electric Industrial Co., Ltd. Communication handover method, communication message processing method, program for causing computer to execute these methods, and communication system
US8145219B2 (en) * 2004-07-28 2012-03-27 Broadcom Corporation Handoff of a multimedia call session using background network scanning
US7917092B2 (en) * 2004-12-14 2011-03-29 Interdigital Technology Corporation Beam selection apparatus and method in voice over internet protocol over switched beam wireless local area network
KR100628325B1 (en) * 2004-12-20 2006-09-27 한국전자통신연구원 Intrusion detection sensor detecting attacks against wireless network and system and method for detecting wireless network intrusion
US20060287003A1 (en) * 2005-06-15 2006-12-21 Kamyar Moinzadeh Concomitant inband signaling for data communications over digital wireless telecommunications network
US20070072610A1 (en) * 2005-09-26 2007-03-29 Yi Qiao Cellular/WLAN hybrid-terminal handover techniques
US20070115899A1 (en) * 2005-11-22 2007-05-24 Shlomo Ovadia Method, apparatus and system architecture for performing handovers between heterogeneous wireless networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2389005A (en) 2002-05-23 2003-11-26 Inc Motorola Enabling cooperation between network kinds such as cellular and wlan
WO2004112317A1 (en) 2003-06-17 2004-12-23 Telefonaktiebolaget Lm Ericsson (Publ) System and method for locating a wireless local area network
WO2006078627A2 (en) 2005-01-18 2006-07-27 Interdigital Technology Corporation Method and system for system discovery and user selection
EP2357865A1 (en) 2005-07-25 2011-08-17 Qualcomm Incorporated Method and apparatus for maintaining a fingerprint for a wireless network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2050286A4

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8897778B2 (en) 2009-07-03 2014-11-25 Cisco Technology, Inc. Infrastructure assisted network transition
CN102474762A (en) * 2009-07-03 2012-05-23 思科技术公司 Infrastructure assisted network transition
CN102474762B (en) * 2009-07-03 2015-12-16 思科技术公司 For the method and apparatus of the network transitions that infrastructure is assisted
WO2011002607A1 (en) 2009-07-03 2011-01-06 Cisco Technology, Inc. Infrastructure assisted network transition
CN103493544A (en) * 2011-04-20 2014-01-01 诺基亚公司 Method and apparatus for providing a network search function
EP2700268A4 (en) * 2011-04-20 2015-09-09 Nokia Technologies Oy Method and apparatus for providing a network search function
WO2013164032A1 (en) * 2012-05-03 2013-11-07 Huawei Technologies Sweden Ab Sending access information from physical access control system to user terminal
US9848363B2 (en) 2012-05-03 2017-12-19 Huawei Technologies Sweden Ab Sending access information from physical access control system to user terminal
CN109451530A (en) * 2019-01-03 2019-03-08 中国联合网络通信集团有限公司 Formation gathering method and Information Collection System
CN109451530B (en) * 2019-01-03 2022-04-22 中国联合网络通信集团有限公司 Information collection method and information collection system
CN111698663A (en) * 2019-03-12 2020-09-22 大众汽车有限公司 System, vehicle, apparatus, method and computer program for user equipment and network components in a mobile communication system
US11503477B2 (en) 2019-03-12 2022-11-15 Volkswagen Aktiengesellschaft System, vehicle, apparatuses, methods, and computer programs for user equipment and for a network component in a mobile communication system
EP3709702B1 (en) * 2019-03-12 2023-06-07 Volkswagen Aktiengesellschaft Vehicle, apparatuses, methods, and computer programs for user equipment and for a network component in a mobile communication system
CN111698663B (en) * 2019-03-12 2023-09-19 大众汽车有限公司 System, vehicle, and apparatus, method for user equipment and network components

Also Published As

Publication number Publication date
US20080076430A1 (en) 2008-03-27
US20120149380A1 (en) 2012-06-14
US8406772B2 (en) 2013-03-26
WO2008016778A3 (en) 2008-05-22
EP2050286B1 (en) 2018-09-05
EP2050286A4 (en) 2013-11-13
EP2050286A2 (en) 2009-04-22
US8140079B2 (en) 2012-03-20

Similar Documents

Publication Publication Date Title
US8140079B2 (en) System and method to facilitate handover
US10588025B2 (en) Method and apparatus for optimizing multi-protocol radio technology using local QOS advertising
US9565609B2 (en) Method and apparatus for triggering handover between access points based on gathered history data of series of access points
US10264428B2 (en) Method and apparatus for optimizing multi-protocol radio technology using device to device spectral coordination with local QOS advertising
US8618984B2 (en) Selecting beacons for location inference
US20110034179A1 (en) Location of wireless mobile terminals
US8532676B1 (en) Estimating whether a wireless terminal is indoors versus outdoors using probabilities and classifications
US8903403B2 (en) Method and apparatus for evaluating cross-cell coverage
CN1972520A (en) Rogue access point detection in wireless networks
EP2617248A1 (en) Method and apparatus for maintaining access pont information
KR20120005193A (en) Method and apparatus for detecting positioning error by using wlan signal
JP2017520975A (en) Use of RF signatures to detect moved radio transmitters
Lemic et al. Location-based discovery and vertical handover in heterogeneous low-power wide-area networks
KR101770136B1 (en) Method And Apparatus for Detecting Positioning Error
Fortes et al. Location-based distributed sleeping cell detection and root cause analysis for 5G ultra-dense networks
JP2015073235A (en) Radio wave condition management device, system and method
JP6025692B2 (en) Area quality degradation estimation apparatus and method
JP6249739B2 (en) Mobile terminal, apparatus, control method, and program
Furfari et al. Radio-frequency handoff strategies to seamlessly integrate indoor localization systems
Gundlegård et al. The smartphone as enabler for road traffic information based on cellular network signalling
KR102057290B1 (en) Method and apparatus for estimating antenna orientation of base station
López et al. Measurement-Based Outage Probability Estimation for Mission-Critical Services
Hiltunen et al. Generic architecture for minimizing drive tests in heterogeneous networks
JP2015064232A (en) Determination device, network node, determination method, and program
Lim et al. Device-Centric Positioning using Radiomap Database on Cellular Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07840428

Country of ref document: EP

Kind code of ref document: A2

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007840428

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: RU

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)