WO2016199158A1 - Gestion de ressources dans un réseau de communication radio - Google Patents

Gestion de ressources dans un réseau de communication radio Download PDF

Info

Publication number
WO2016199158A1
WO2016199158A1 PCT/IN2015/050045 IN2015050045W WO2016199158A1 WO 2016199158 A1 WO2016199158 A1 WO 2016199158A1 IN 2015050045 W IN2015050045 W IN 2015050045W WO 2016199158 A1 WO2016199158 A1 WO 2016199158A1
Authority
WO
WIPO (PCT)
Prior art keywords
vehicle
network
location
stationary
security
Prior art date
Application number
PCT/IN2015/050045
Other languages
English (en)
Inventor
Ankur DAUNERIA
Saravanan Mohan
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to PCT/IN2015/050045 priority Critical patent/WO2016199158A1/fr
Publication of WO2016199158A1 publication Critical patent/WO2016199158A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0108Measuring and analyzing of parameters relative to traffic conditions based on the source of data
    • G08G1/0112Measuring and analyzing of parameters relative to traffic conditions based on the source of data from the vehicle, e.g. floating car data [FCD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0108Measuring and analyzing of parameters relative to traffic conditions based on the source of data
    • G08G1/012Measuring and analyzing of parameters relative to traffic conditions based on the source of data from other sources than vehicle or roadside beacons, e.g. mobile networks
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • G08G1/0129Traffic data processing for creating historical data or processing based on historical data
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • G08G1/0133Traffic data processing for classifying traffic situation
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/20Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
    • G08G1/205Indicating the location of the monitored vehicles as destination, e.g. accidents, stolen, rental
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1403Architecture for metering, charging or billing
    • H04L12/1407Policy-and-charging control [PCC] architecture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/66Policy and charging system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • H04M15/8016Rating or billing plans; Tariff determination aspects based on quality of service [QoS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/51Allocation or scheduling criteria for wireless resources based on terminal or device properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/80Rating or billing plans; Tariff determination aspects
    • H04M15/8083Rating or billing plans; Tariff determination aspects involving reduced rates or discounts, e.g. time-of-day reductions or volume discounts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Definitions

  • the present disclosure relates to a method and devices for resource management in a communication network of signalling relating to vehicles which are connected to the network.
  • ETSI European Telecommunications Standards Institute
  • M2M machine-to- machine
  • TS Technical Specification
  • a connected smart vehicle comprises of group of sensors including security sensors. Some sensors can work on battery while others run when the engine is running. Security sensors of vehicles can be active even when the vehicle is parked (or is in a stationary state) and engine is switched off.
  • Security sensors can alarm the users about inception of security events relating the vehicle.
  • Security sensors traditionally involves short range communication technologies and alerts user via sounds, but in connected vehicle ecosystem, operators can play a role to help the user initiate contact with the parked (stationary, engine off) vehicle or vice versa using Third Generation Partnership Project (3GPP) network technologies.
  • 3GPP Third Generation Partnership Project
  • the number of active sensors can change in various states of the vehicle, for instance a security sensor might be more active during a vehicle's stationary and switched off state, while the speed sensors are found active when the vehicle has a particular speed i.e. while running on a road and the engine is on.
  • Security sensors are part of a vehicle as they help the owner or parking manager to rest assured that the vehicle is safe. It is quite possible in connected vehicle ecosystem, that telecommunications operators are connected to and can access security sensors, thereby enabling security related services in the vehicles remotely by activating one or more sensors or enable using 3GPP network intelligence to activate one or more sensors in a vehicle relating to security at a locations or street using 3GPP network technologies.
  • Designated car-parking locations such as a car part or garage, including multi-level parking, parking lots at malls, offices, cinema, etc., are the officially marked parking locations.
  • Vehicles come and get parked at designated parking locations.
  • one or more security sensors are active and may be triggered based on some local security hazard events, alert the users (owner, parking manager) via some network communication platform, e.g. smart-phone, interactive voice response (IVR), Short Messaging Service (SMS), Unstructured Supplementary Service Data (USSD), Interactive Messaging (IM) etc.
  • IVR interactive voice response
  • SMS Short Messaging Service
  • USSD Unstructured Supplementary Service Data
  • IM Interactive Messaging
  • Sensor activation can be programmed inside the vehicle based on the state of the vehicle (e.g. stationary, locked and engine off) or can be triggered by a 3GPP operator using network technologies when it detects some criteria e.g. a security issue.
  • Non-designated car parking locations includes parking near roadsides or at any place not officially marked as an official parking location.
  • security related location based information such as accident related location information available in the Intelligent Transportation System (ITS) databases , e-Call databases, or at network operator domain using Global Positioning System (GPS) maps or the like, vehicle cloud, that would help operators are used to activate/ trigger one or more security sensors (in one or more parked vehicles at unofficial locations, e.g. streets) so as to enable alerting the user/driver on some network communication platform, e.g. smart-phone, interactive voice response (IVR), Short Messaging Service (SMS), Unstructured Supplementary Service Data (USSD), Interactive Messaging (IM) etc., when some incident is detected by these sensors which are activated / auto triggered by an operator in the vehicle.
  • IVR interactive voice response
  • SMS Short Messaging Service
  • USSD Unstructured Supplementary Service Data
  • IM Interactive Messaging
  • Sensor activation maybe pre-programmed in the vehicle based on state of the vehicle (vehicle stationary, locked and engine off) or may be triggered by the 3GPP operator externally using network technologies based on some criteria like subscriptions type, street analysis, vehicle type (motorcycle, bicycle, car, luxury vehicle, Sport Utility Vehicle (SUV), traveller, truck etc.) in the stationary (stopped or parked) vehicle.
  • vehicle stationary, locked and engine off or may be triggered by the 3GPP operator externally using network technologies based on some criteria like subscriptions type, street analysis, vehicle type (motorcycle, bicycle, car, luxury vehicle, Sport Utility Vehicle (SUV), traveller, truck etc.) in the stationary (stopped or parked) vehicle.
  • SUV Sport Utility Vehicle
  • Security sensors may be active in the stationary vehicles, at parking locations and/or in the surrounding infrastructure near roads or parking lots/garages in smart cities, such that even during no risk situations one or more sensors may capture and send security metrics data periodically over to user or servers, further allowing a stationary vehicle-to-user and vice versa communication.
  • a method performed in a communication network comprising a Radio Access Network (RAN) for facilitating resource management in the communication network of signalling relating to vehicles which are connected to the network via the RAN.
  • the method comprises detecting that a connected vehicle is stationary.
  • the method also comprises obtaining location information about in which location the vehicle is stationary.
  • the method also comprises correlating the location information with security information.
  • the method also comprises determining number and type(s) of sensors in the vehicle which connect to the communication network when the vehicle is stationary in the location.
  • the method also comprises allocating network resources to the vehicle based on the determining and on the correlated security information.
  • a computer program product comprising computer-executable components for causing a network arrangement of (e.g. forming a part of) the communication network to perform an embodiment of the method of the present disclosure when the computer-executable components are run on processor circuitry comprised in the network arrangement.
  • a network arrangement for (e.g. for being comprised in) a communication network comprising a RAN, and for facilitating resource management in the communication network of signalling relating to vehicles which are connected to the network via the RAN.
  • the network arrangement comprises processor circuitry, and storage storing instructions executable by said processor circuitry whereby said network arrangement is operative to detect that a connected vehicle is stationary.
  • the network arrangement is also operative to obtain location information about in which location the vehicle is stationary.
  • the network arrangement is also operative to correlate the location information with security information.
  • the network arrangement is also operative to determine number and type(s) of sensors in the vehicle which connect to the communication network when the vehicle is stationary in the location.
  • the network arrangement is also operative to allocate network resources to the vehicle based on the determining and on the correlated security information.
  • a computer program for facilitating resource management in a communication network of signalling relating to vehicles which are connected to the network via a RAN.
  • the computer program comprises computer program code which is able to, when run on processor circuitry of a network arrangement of the communication network, cause the network arrangement to detect that a connected vehicle is stationary.
  • the code is also able to cause the network arrangement to obtain location information about in which location the vehicle is stationary.
  • the code is also able to cause the network arrangement to correlate the location information with security information.
  • the code is also able to cause the network arrangement to determine number and type(s) of sensors in the vehicle which connect to the communication network when the vehicle is stationary in the location.
  • the code is also able to cause the network arrangement to allocate network resources to the vehicle based on the determining and on the correlated security information.
  • a computer program product comprising an embodiment of the computer program of the present disclosure and a computer readable means on which the computer program is stored.
  • the network resources may be allocated to sensors of a connected vehicle based on security information relating to the location where the vehicle is stationary and on how many sensors are active (i.e. connected to the network) in the vehicle as well as the type or types of said active sensors.
  • additional resources may be allocated e.g. to a vehicle which is determined to be stationary in an unsafe environment while less resources may be allocated (and fewer sensors may be activated) in a vehicle which is stationary in e.g. a designated and monitored parking lot or garage.
  • any feature of any of the aspects may be applied to any other aspect, wherever appropriate.
  • any advantage of any of the aspects may apply to any of the other aspects.
  • Other objectives, features and advantages of the enclosed embodiments will be apparent from the following detailed disclosure, from the attached dependent claims as well as from the drawings.
  • Fig l is a schematic block diagram of a standard M2M network architecture.
  • Fig 2 is a schematic diagram of an embodiment of a communication network in accordance with the present disclosure.
  • Fig 3a is a schematic block diagram of an embodiment of a network arrangement in accordance with the present disclosure.
  • Fig 3b is a schematic functional block diagram of an embodiment of a network arrangement in accordance with the present disclosure.
  • Fig 4 is a schematic illustration of an embodiment of a computer program product in accordance with the present disclosure.
  • Fig 5 is a schematic flow chart of an embodiment of the method of the present disclosure.
  • Fig 6 is a schematic diagram of system feed-back to policy nodes in accordance with an example embodiment of the present disclosure.
  • Fig 7a is a schematic diagram illustrating movements and stops of a vehicle in accordance with an example embodiment of the present disclosure.
  • Fig 7b is an example origin-destination (OD) matrix in accordance with an example embodiment of the present disclosure.
  • Fig 7c is an example security matrix in accordance with an example embodiment of the present disclosure.
  • Fig 8 is a schematic block diagram of the policy control network of an operator. DETAILED DESCRIPTION
  • Figure 2 is a schematic block diagram of one or a plurality of sensor(s) (could alternatively be called detector) 5 in a vehicle 4 (e.g. a car as illustrated in the figure) connected to a communication network 1 run/controlled by a telecommunications network operator.
  • the communication network 1 comprises a RAN 2, typically a cellular RAN in accordance with a 3GPP standard, comprising one or a plurality of RAN nodes 3, e.g. evolved Node B (eNB) or Node B in combination with Radio Network Controller (RNC).
  • eNB evolved Node B
  • RNC Radio Network Controller
  • the communication network 1 also comprises a Core Network (CN) 12 comprising an serving gateway (SGW) 7 and a packet data network (PDN) gateway (PGW) 8 as well as a mobility management entity (MME) 6 and a policy and charging rules function (PCRF) 11, and any other standard CN nodes needed.
  • the communication network 1 comprises a network arrangement 13 which may be comprised in the RAN 2 or the CN 12 or comprise parts of both the RAN and the CN, and may additionally comprise other parts of the communication network 1 such as cloud resources.
  • the network arrangement 13 may comprise one or more nodes or elements of communication network 13 such as one or more nodes or elements of the RAN and/or of the CN and/or of other parts of the communication network e.g.
  • the communication network is connected to the PDN 9, e.g. the Internet, in which a service provider (SP) 10 resides with one or a plurality of servers e.g. Content Delivery Network (CDN) servers, for providing a service to a service client e.g. in the vehicle 4 or in a smartphone or other computer hardware of a user/driver of the vehicle 4 or of personnel monitoring the stationary vehicle 4 e.g. in a parking lot/garage, or in a network operator server.
  • the sensor 5 may be any radio device or user equipment (UE), mobile or stationary, enabled to communicate over a radio channel in a communication network 1, for instance but not limited to e.g.
  • FIG. 3a schematically illustrates a network arrangement (e.g. one or more network nodes in the communication network 1) 13 of the present disclosure.
  • the network arrangement 13 comprises processor circuitry 31 e.g. a central processing unit (CPU).
  • the processor circuitry 31 may comprise one or a plurality of processing units in the form of microprocessor(s).
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • CPLD complex programmable logic device
  • the processor circuitry 31 is configured to run one or several computer program(s) or software (SW) 41 (see also figure 4) stored in a storage 32 of one or several storage unit(s) e.g. a memory.
  • the storage unit is regarded as a computer readable means 42 (see figure 4) as discussed herein and may e.g. be in the form of a Random Access Memory (RAM), a Flash memory or other solid state memory, or a hard disk, or be a combination thereof.
  • the processor circuitry 31 may also be configured to store data in the storage 32, as needed.
  • the network arrangement 13 also comprises a communication interface 33 for communication with other parts (e.g. nodes or elements) in the communication network 1 as well as with the sensor 5 over a radio interface.
  • a network arrangement 13 for a communication network 1 comprising a RAN 2 and for facilitating resource management in the communication network of signalling relating to vehicles 4 which are connected to the network via the RAN.
  • the arrangement 13 comprises processor circuitry 31, and storage 32 storing instructions 41 executable by said processor circuitry whereby said arrangement is operative to detect that a connected vehicle 4 is stationary.
  • the arrangement 13 is also operative to obtain location information about in which location the vehicle 4 is stationary.
  • the arrangement 13 is also operative to correlate the location information with security information.
  • the arrangement 13 is also operative to determine number and type of sensors 5 in the vehicle 4 which connect to the communication network 1 when the vehicle is stationary in the location.
  • the arrangement 13 is also operative to allocate network resources to the vehicle 4 based on the determining and on the correlated security information.
  • Figure 3b is a schematic block diagram functionally illustrating an embodiment of the network arrangement 13 in figure 3a.
  • the processor circuitry 31 may run software 41 for enabling the network arrangement 13 to perform an embodiment of the method of the present disclosure, whereby functional modules may be formed in the network arrangement 13 e.g. in the processor circuitry 31 for performing the different steps of the method. These modules are in the figure schematically illustrated as blocks within the network arrangement 13.
  • a network arrangement 13 for a communication network 1 comprising a RAN 2 and for facilitating resource management in the communication network of signalling relating to vehicles 4 which are connected to the network via the RAN.
  • the arrangement 13 comprises means (e.g.
  • the arrangement 13 also comprises means (e.g. the obtaining module 35) for obtaining location information about in which location the vehicle 4 is stationary.
  • the arrangement 13 also comprises means (e.g. the correlation module 36) for correlating the location information with security information.
  • the arrangement 13 also comprises means (e.g. the determining module 37) for determining number and type of sensors 5 in the vehicle 4 which connect to the communication network 1 when the vehicle is stationary in the location.
  • the arrangement 13 also comprises means (e.g. the allocation module 38) for allocating network resources to the vehicle 4 based on the determining and on the correlated security information.
  • Figure 4 illustrates a computer program product 40.
  • the computer program product 40 comprises a computer readable (e.g. non-volatile and/or non- transitory) medium 42 comprising a computer program 41 in the form of computer-executable components 41.
  • the computer program/ computer- executable components 41 may be configured to cause a network arrangement 13, e.g. as discussed herein, to perform an embodiment of the method of the present disclosure.
  • the computer program/computer- executable components may be run on the processor circuitry 31 of the network arrangement 13 for causing it to perform the method.
  • the computer program product 40 may e.g. be comprised in a storage unit or memory 32 comprised in the network arrangement 13 and associated with the processor circuitry 31.
  • the computer program product 40 may be, or be part of, a separate, e.g. mobile, storage means/medium, such as a computer readable disc, e.g. CD or DVD or hard disc/drive, or a solid state storage medium, e.g. a RAM or Flash memory.
  • a storage medium 42 can include, but are not limited to, any type of disk including floppy disks, optical discs, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
  • Embodiments of the present disclosure may be conveniently implemented using one or more conventional general purpose or specialized digital computer, computing device, machine, or microprocessor, including one or more processors, memory and/or computer readable storage media programmed according to the teachings of the present disclosure.
  • Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art.
  • a computer program product 40 comprising computer-executable components 41 for causing a network arrangement 13 of the communication network 1 to perform an embodiment of the method of the present disclosure when the computer-executable components are run on processor circuitry 31 comprised in the arrangement 13.
  • a computer program 41 for facilitating resource management in a communication network 1 of signalling relating to vehicles 4 which are connected to the network via a RAN 2.
  • the computer program comprises computer program code which is able to, when run on processor circuitry 31 of a network arrangement 13 of the communication network, cause the network arrangement to detect that a connected vehicle 4 is stationary.
  • the code is also able to cause the network arrangement 13 to obtain location information about in which location the vehicle 4 is stationary.
  • the code is also able to cause the network arrangement 13 to correlate the location information with security information.
  • the code is also able to cause the network arrangement 13 to determine number and type of sensors 5 in the vehicle 4 which connect to the communication network 1 when the vehicle is stationary in the location.
  • the code is also able to cause the network arrangement 13 to allocate network resources to the vehicle 4 based on the determining and on the correlated security information.
  • a computer program product 40 comprising an embodiment of the computer program 41 of the present disclosure and a computer readable means 42 on which the computer program is stored.
  • FIG. 5 is a schematic flow chart of an embodiment of the method of the present disclosure.
  • the method is performed in a communication network 1 comprising a RAN 2 and the method is for facilitating resource management in the communication network of signalling relating to vehicles 4 which are connected to the network via the RAN.
  • vehicles 4 may be connected to/via the network 1 by means of one or a plurality of sensors 4 which may or may not be active and signalling at any certain time (e.g. when the vehicle is stationary).
  • the method may be performed by a network arrangement 13 comprised in the communication network 1.
  • the detecting Si comprises receiving signalling from a sensor 5 in the vehicle 4, the signalling indicating that the vehicle is stationary, which sensor is only activated when the vehicle is stationary or which sensor provides mobility and/or location information.
  • the sensor(s) 5 may e.g. be activated automatically when the vehicle is stationary, thus indicating to the network arrangement 13 that the vehicle is stationary, and/or the sensor(s) may be activated by the network operator in response to observing that the vehicle is stationary within the communication network 1, and/or the sensor(s) may be activated manually by the user/driver of the vehicle when parking.
  • the detecting Si comprises determining that the vehicle 4 is stationary based on its mobility within the RAN 2, e.g.
  • the obtaining S2 location information comprises receiving signalling from a location sensor 5 in the vehicle 4, e.g. a satellite navigation sensor such as a Global Positioning System (GPS), Global Navigation Satellite System (GLONASS) and/or Galileo satellite navigation sensor, or comprises obtaining S2 the location information by means of a positioning process in the RAN 2 e.g. triangulation.
  • the obtaining S2 location information comprises obtaining information about whether the location corresponds to a designated parking location e.g.
  • a garage or parking lot or an undesignated parking location e.g. at a roadside.
  • This information may indicate whether the location in which the vehicle is stationary is potentially unsafe or relatively safe (e.g. in a security monitored designated parking).
  • the location information is correlated S3 with security information.
  • This security information may e.g. be provided for different positions (e.g. designated and/or undesignated parking locations) in a grid over a smart city, town, village or part thereof, or the like.
  • the security information may be provided before or concurrently with the obtaining S2 of the location information but may also be continuously updated.
  • the correlating S3 comprises correlating the location information with information about historical and/or projected future movements of the vehicle 4.
  • the network arrangement 13 may thus have information about e.g. where the vehicle 4 is regularly parked and at which times and for how long, as well as the route the vehicle may take between the parking locations, and may from this information project future sensor signalling resources that will likely need to be allocated for the vehicle.
  • the number and type/types of sensor(s) 5 in the vehicle 4 which connect (will be connecting, are in the process of connecting or have connected) to the communication network 1 when the vehicle is stationary in the location is determined S4.
  • the network arrangement 13 may e.g. in real time detect how many and which sensors 5 of the vehicle 4 are connecting to the network 1, or the network arrangement 13 may project future sensor connections e.g. based on the correlating S3 of security information and/or historical and/or projected future movements or parking locations of the vehicle 4.
  • Network resources are allocated S5 to the vehicle 4 (e.g. to the signalling to/from sensors 5 of the vehicle) based on the determining S4 and on the correlated S3 security information.
  • the allocating S5 comprises setting a priority for at least some of the network resources based on the security information. For instance, if the security information indicates that the location the vehicle is stationary in is unsafe, a higher priority may be awarded to sensors (e.g. security sensors such as movement alarm, break-in alarm, sensor detecting that a wheel or hub cap is being removed, etc.) of that vehicle. With a higher priority, sensor signals may be allowed also in case of congestion in the communication network.
  • the allocating S5 comprises sending a notification to a driver/user or other personnel of the vehicle 4, e.g. to a smartphone of the driver or to a display of the vehicle, warning the driver that the location is unsafe and/or suggesting another location for parking the vehicle. The driver may thus activate additional security sensors 5 or move to another parking location.
  • the allocating S5 comprises allocating S5 the network resources, e.g. for modifying traffic flows, based on net uplink (UL) and downlink (DL) traffic, respectively, generated by the determined S4 number and type of sensors 5.
  • the number of sensors e.g.
  • heterogeneous security sensors activating, deactivating, connecting, disconnecting leads to modification in net UL or DL traffic (per vehicle, or group of vehicles) flows as per different security applications, services, traffic classes etc. This is referred to as modification in traffic (uplink or downlink) flows.
  • the network resources being allocated S5 comprise RAN resources, operator network resources and/or cloud communication resources.
  • the vehicle is a truck, car, motorcycle or bicycle.
  • the vehicle may be any other type of vehicle.
  • the method is performed in a telecommunications operator network or in a cloud communication network comprised in the communication network 1.
  • the detection module 34 may be configured for detecting whether one or more connected vehicles 4 are stationary in one or more locations.
  • Connected vehicles may include any network connected smart vehicle, like connected cycles, connected bikes, connected cars, connected SUV, connected trucks, connected buses, connected travellers, connected wagons etc.
  • the obtaining module 35 may locate the connected vehicle using standard telecom localization procedures used for locating a User equipment (UE) inside the communication network 1. Telecom operators may easily determine if a connected vehicle 4/sensor 5 is changing its location in the network from one cell to another cell.
  • the connected vehicle may be connected to a vehicle cloud, application and services through the 3GPP communication network 1.
  • the two following supporting matrixes are obtained and correlated with the location of the vehicle 4.
  • Origin-Destination (OD) connected vehicle matrix helps in understanding the commuting pattern of the connected vehicle 4 (or mobile M2M vehicle based sensors 5 whose locations also changes with vehicles).
  • OD matrix helps in understanding the commuting pattern of the connected vehicle 4 (or mobile M2M vehicle based sensors 5 whose locations also changes with vehicles).
  • the security matrix may be a bit-matrix with binary o or 1 which helps with understanding the location based security hazards reported in the past.
  • the matrices help understand if the vehicle is stationary at a designated parking location likes at offices, multi-level parking garages, or at a non- designated parking like near a roadside. Matrix values would tell about vehicle mobility at a location (like multi level parking) and location based security assessment based on reported data in the security matrix. Vehicle commuting patterns in the OD matrix will help with understanding whether the vehicle 4 will be parked for at least a few hours (like during night at home, visiting office during day etc.). Security incidents may be indirectly captured by analyzing the number of users or callers to police telephone number, fire brigade telephone number, Interactive voice response (IVR) etc. from one or more locations or a street asking for help. This would help in estimating the number of security/fire safety calls received on helpline numbers per street or location in a city.
  • IVR Interactive voice response
  • Sample matrices for two locations A and B such that the OD matrix tells that a vehicle 4 travels from A to B, while security matrix information for the B to A path has faced security issues in the past.
  • Quantifying the metrics such as number and type of sensors in a vehicle, as per mobility patterns of the OD matrix involving a origin and destination, for understanding the number of connected vehicle based sensors 5 (or vehicle security sensor devices) connected, disconnected or reconnected per locations. Connection, disconnection and reconnection of sensor devices from the network 1, can be based on user driven, operator driven or service client driven actions which may be activated per location by operators, clents or by the user. Quantifying the number of devices would help in understanding sensor devices 5 connected, disconnected or reconnected from the network l to understand the traffic (uplink, downlink) modification induced by those sensor devices.
  • Quantification criteria may further include security client type, security service type, service provider type, security sensor device type, subscriptions type etc.
  • the allocation module 38 is the allocation module 38
  • the allocation module may first activate resource consumption rules (security sensor related policy rules).
  • a resource consumption rule may be attached with the sensors 5 of a vehicle.
  • Resource consumption rules may relate to e.g.: allocation, de-allocation, 0 prioritization, de-prioritization of network and cloud resources of the communication network 1 that can be used toward providing services to the user or system administrator.
  • Resource consumption may use feedback from the determining module 37 to policy control and charging (PCC) nodes as well as to any device connection platform (if used by an operator).
  • Feedback may comprise of %connect, %disconnect, %reconnect sensor devices in accordance with a criteria or profile as illustrated in figure 6.
  • Network resource consumption may involve Quality of Service (QoS), bandwidth and charging policy in accordance with the operator priorities (like subscription type, vehicle type, location type, street type, service provider 10 type, application type, service type, security priorities types).
  • Cloud resources may include storage, processing power, memory, and databases which maybe redistributed depending on operator priorities.
  • the network impact type and magnitude of the connected sensors 5 may relate to connection, disconnection of sensor devices and traffic (uplink and downlink) modification involving one or more vehicle based sensor devices activated on its own when vehicle stops or activated by operator upon identifying a stopped (or parked) vehicle 4 in a connected vehicle ecosystem. To know how many sensors are coming on-line or going off-line at a time would help an operator to provide optimum resources to the involved security sensors devices in various communication scenarios.
  • Attaching a resource consumption rule helps in optimizing the network resources as well prioritizing vehicle security based communication involving one or more sensor devices 5 throughout the 3GPP network 1. Thus, enabling better Quality of Experience (QoE) in security based communication involving one or more sensors devices 5.
  • QoE Quality of Experience
  • Sensor communication scenarios may include: sensor 5 to sensor 5 communication, 0 sensor 5 to network 1 communication, sensor 5 to infrastructure (e.g. roadside units, traffic lights, sensors in buildings e.g. in a parking garage) communication, infrastructure to sensor 5 communication, sensor 5 to user/ driver communication, 0 user/ driver to sensor 5 communication, sensor 5 to infrastructure to user/driver communication (e.g. a sensor alerts a parking garage device about an issue, whereby the parking garage device contacts the driver of the vehicle which comprises the sensor), user/ driver to infrastructure to sensor 5 communication, etc.
  • the consumption rules may then be enforced. Attaching the consumption rules may enforce some decision as per rule policy. These decision may help in enforcing the optimization, security, and legality policies in the network 1.
  • a connected vehicle e.g. a car going from a location to another location, such that it is parked near a roadside (non-designated parking location) a few times during the journey, besides being also parked in multi-level parking garages (designated parking location) a few times for varying time durations.
  • a smart city with connected vehicles 4 would be such that parking locations, parking infrastructure, road infrastructure (street lights, traffic lights, roadside units), cars and other vehicles, road sensors, parking sensors etc. may be smart enough to provide valuable information to a driver on the road.
  • road, location, vehicles, road and parking infrastructure may be smart enough to provide value based security services to vehicle owners or parking managers so as to provide a safe and secure parking environment.
  • location based security driven analytics induces the activation of one or more heterogeneous sensors in a vehicle 5 or in the infrastructure surrounding the vehicle by the 3GPP operators or by the vehicle processing components itself.
  • 3GPP operators may be connectivity providers or perform the connection management via a device connectivity platform.
  • the vehicle may be moving between eight locations as illustrated in figure 7a, such that it is stationary at these locations (including both designated and non-designated parking locations) for parking.
  • the network arrangement would fetch the OD matrix and security matrix.
  • the OD matrix of figure 7b includes a "1" for every location visited by the vehicle.
  • a security based latitude-longitude bit-matrix in figure 7c includes a "o" for any location without security concerns and a "1" for any locations with a recorded security concern or accidents in the past.
  • paths (Location 3 to Location 4), (Location 7 to Location 8), (Location 8 to Location 1) are un-secure paths.
  • a number of security sensors 5 are activated in parked vehicles 4, infrastructure, parking locations etc., such that activated sensors connects, disconnects or reconnects to the communication network 1 on inception or detection of an event or the sensors are activated by 3GPP operator at a location.
  • Sensor activation may be event detection driven logic present in vehicles using short range communication technologies or by 3GPP operator using 3GPP network technologies towards connected vehicles subscriptions based on security analytics performed in connected vehicle cloud or for locations or for streets by operators using network data, e.g. GPS data.
  • Security sensors 5 may be triggered in the surrounding of the parked vehicle or in the vehicle itself for the location coordinates like multi-level parking locations, any roadside locations or they may be active for the complete journey of the unsafe paths (3-4), (7-8) and (8-1) of figure 7a. Studying frequent commuting patterns of parked vehicles through secure and insecure locations would help in understanding the scope of security sensor based communication possibilities for a connected vehicle in the smart city network. These sensors 5 may communicate in various cases, even when no security issue is present so as to timely inform a user or parking attendant about parked vehicles' status by collecting data from security sensors of the vehicles and doing some analytics on the same in the parking locations.
  • the large number of sensor devices 5, in vehicles, infrastructure, parking and near roadside infrastructure etc. may be activated (connected, disconnected, reconnected) in accordance with internal logic or by external triggering, and tries to communicate among each other, with users or parking attendants in varying mentioned ways.
  • Remotely via a communication channel, e.g. a 3GPP operator triggers one or more sensors in the vehicle or in surrounding infrastructure, see remote_disconnect, remote_reconnect in figure 8;
  • a communication channel e.g. a 3GPP operator triggers one or more sensors in the vehicle or in surrounding infrastructure, see remote_disconnect, remote_reconnect in figure 8;
  • Locally (automatically by the sensor or vehicle itself), by a function or internal logic, e.g. event detection by internal security sensor of a vehicle, see local_disconnect, local_reconnect in figure 8.
  • %connected, %disconnected and %reconnected sensor devices 5 for parked vehicles 4 may be understood by operators using above formulas to help understand the type or number of security sensor devices activated in the network 1. Quantification of the magnitude in term of e.g. number, type, percentage, proportion, fraction etc. of security-based sensor devices in vehicles 4, infrastructure and/or surroundings which are connecting, disconnecting or reconnecting to the network 1 for the parked vehicles, would help understanding the number of heterogeneous devices pushing or downloading data (as per different traffic class) from the network in accordance with for instance: security service client (herein alternatively called application) type, security service type, service provider type, ⁇ sensor type, subscription type etc.
  • application security service client
  • Quantification of impact on/magnitude of required network resources may be studied in accordance with e.g. the following view points: (a) Uplink and downlink communication traffic modification (increase or decreases) due to these heterogeneous sensors based communication in the network in various use cases. Since the sensors are activated, they start pushing or downloading data from the network as per application, services, service provider, device type, subscriptions types etc. It is possible they start setting up one or more communication scenarios mentioned above to request or respond to changes.
  • Network resources includes QoS, bandwidth and charging and Cloud resources includes memory, processing power, storages etc. Allocation or de-allocation of various resources in relation to security application and services.
  • Legal policies may be answered by PCRF policy control mechanisms by enforcing one or more security-based sensor communication formats like modifying the time period or frequency when pinging to a server (relating to a security function, logging) if a vehicle 4 has just detected that it is party to an accident on road.
  • Insurance companies can request enforcing legal policies on the communication format of the security- based sensors to the server in both self triggering or external triggering relating of one or more sensors in one or more environmental conditions.
  • a parking attendant can enforce changing of communication format of one or more types of security-based sensors (in vehicle, in parking location, in infrastructure) so to be legally complaint with the insurance agencies requirement if a security hazard takes place inside the official parking locations.
  • the feedback comprising of impact type, magnitude and criteria may be shared with PCC and DCP nodes to help prioritize, prioritize, allocate or de- allocate resources using the feedback, as shown in figure 6.
  • PCC may use the feedback to develop policy profiles relating QoS, bandwidth and charging as per the impact feedback, which activates in accordance with the conditions which are found true and decision of resource management are enforced upon the security communications relating the parked vehicle. For example:
  • PCC Policy profile 1 Prioritization of security-based sensor communication traffic (Uplink and Downlink) as per traffic classes relating gold category subscription based luxury vehicles at a location or per mobility pattern between origin and destination, over silver categories subscriptions based connected vehicles.
  • PCC Policy Profile 2 QoS and charging differentiations of different security- based sensor communication scenarios involving smart vehicle, parking, infra-structures, user and the network in a smart city use cases.
  • Location or journey route based security traffic prioritizations / de- prioritization may be targeted for the parked vehicles at one or more locations.
  • a recommendation for a more secure location may be provided.
  • Step 1 The user drives in and tries to park his vehicle 4.
  • the vehicle is detected by the operator using standard procedures like network data, location based data, M2M data etc., relating 3GPP subscriber identity module (SIM).
  • SIM 3GPP subscriber identity module
  • Step 2 The network arrangement obtains the matrices - OD and security matrices for the location. These matrices are maintained at the operator as per locations with crime rate per location etc., to mark a location as secure or unsecured. Matrix cell values shows secure and unsecured locations.
  • location B (Cell [1,2]) is an unsecure location
  • location C (Cell [1,3]) (column 3) is a secure parking location available near to the vehicle 4.
  • Step 3 As per cell value from the security matrices, the operator sends the recommendation to the user to go back to his vehicle, recommending him to use another parking C a few meters away since this location B is an unsecure location. Further, the operator may also recommend him that a designated parking location has a few vacant parking slots at this time.
  • an operator may quantify a set of vehicles parked at different places as per OD and security matrices, and quantifying using filled lists of vehicle/devices as per the service type (like SMS), application type (like twitter updates), UL/DL communication traffic modification per vehicles gateways, when vehicle is triggered (sensor actuated) as per location to communicate to the user its current state or vital parameters using different communication methods possible at its end.
  • service type like SMS
  • application type like twitter updates
  • UL/DL communication traffic modification per vehicles gateways when vehicle is triggered (sensor actuated) as per location to communicate to the user its current state or vital parameters using different communication methods possible at its end.
  • Step 4 Attach a resource consumption rule e.g. in accordance with security traffic class, vehicle type, application type, service type or as per a criteria set by the operator to differentiate different categories so to sub divide different list of devices 5. Filled lists show the quantified data. It may be represented/ sub-divided as per the % change discussed herein.
  • this step may allocate resources to all such vehicles 4 parked in unsecured locations taking suitable network action (i.e. making a Wi-Fi call, or SMS, twitter updates) to talk/update its user regarding the network service action taken.
  • suitable network action i.e. making a Wi-Fi call, or SMS, twitter updates
  • Step 5 Activate resource consumption rule as per operator criteria and enforce the decisions so as to enable optimized security communication.
  • sensor communication for stationary vehicles may be optimized for different use cases (including security and legal) and different stakeholders (business partners, subscribers, operators) in designated or non-designed parking locations in smart cities.
  • the present disclosure has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the present disclosure, as defined by the appended claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Traffic Control Systems (AREA)

Abstract

L'invention concerne un procédé mis en œuvre dans un réseau de communication (1) comprenant un réseau d'accès radio (RAN) (2) destiné à faciliter la gestion de ressources dans le réseau de communication de la signalisation relative à des véhicules (4) qui sont connectés au réseau par l'intermédiaire du RAN. Le procédé consiste à détecter le fait qu'un véhicule connecté est stationnaire. Le procédé consiste également à obtenir des informations d'emplacement concernant l'emplacement dans lequel le véhicule est stationnaire. Le procédé consiste également à mettre en corrélation des informations d'emplacement avec des informations de sécurité. Le procédé consiste également à déterminer un nombre et un type de capteurs (5) dans le véhicule qui se connectent au réseau de communication lorsque le véhicule est stationnaire à l'emplacement. Le procédé consiste également à attribuer des ressources de réseau au véhicule sur la base de la détermination et des informations de sécurité corrélées.
PCT/IN2015/050045 2015-06-10 2015-06-10 Gestion de ressources dans un réseau de communication radio WO2016199158A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IN2015/050045 WO2016199158A1 (fr) 2015-06-10 2015-06-10 Gestion de ressources dans un réseau de communication radio

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IN2015/050045 WO2016199158A1 (fr) 2015-06-10 2015-06-10 Gestion de ressources dans un réseau de communication radio

Publications (1)

Publication Number Publication Date
WO2016199158A1 true WO2016199158A1 (fr) 2016-12-15

Family

ID=57503687

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2015/050045 WO2016199158A1 (fr) 2015-06-10 2015-06-10 Gestion de ressources dans un réseau de communication radio

Country Status (1)

Country Link
WO (1) WO2016199158A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8190356B2 (en) * 2006-03-24 2012-05-29 Pioneer Corporation Navigation apparatus, position registering method, position registering program, and recording medium
US20130073143A1 (en) * 2011-09-06 2013-03-21 Toyota Jidosha Kabushiki Kaisha Vehicle navigation apparatus
US8686864B2 (en) * 2011-01-18 2014-04-01 Marwan Hannon Apparatus, system, and method for detecting the presence of an intoxicated driver and controlling the operation of a vehicle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8190356B2 (en) * 2006-03-24 2012-05-29 Pioneer Corporation Navigation apparatus, position registering method, position registering program, and recording medium
US8686864B2 (en) * 2011-01-18 2014-04-01 Marwan Hannon Apparatus, system, and method for detecting the presence of an intoxicated driver and controlling the operation of a vehicle
US20130073143A1 (en) * 2011-09-06 2013-03-21 Toyota Jidosha Kabushiki Kaisha Vehicle navigation apparatus

Similar Documents

Publication Publication Date Title
US10971007B2 (en) Road condition information sharing method
US10769922B2 (en) Help seeking method, system, and apparatus, and computer storage medium
US11343327B2 (en) Systems and methods for managing vehicle OBD data in a network of moving things, for example including autonomous vehicle data
US9078119B2 (en) Method and system for acquiring information of machine type communication user equipment
US9820317B2 (en) Method, apparatus and system for triggering wireless communication devices to attach to a wireless communications network
US10129816B2 (en) Methods and systems for captive portal operation in a network of moving things
US20170176192A1 (en) Systems and methods to extrapolate high-value data from a network of moving things, for example including a network of autonomous vehicles
US20160142492A1 (en) Methods and devices for controlling vehicular wireless communications
US20130070710A1 (en) Method, system and apparatus of location-based machine-to-machine communication
WO2011129098A1 (fr) Nœuds de communication et nœuds de réseau
US20130052983A1 (en) METHOD BY WHICH PSAPs CAN IDENTIFY AND REQUEST INFORMATION FROM CELLULAR DEVICES THAT ARE NEAR EMERGENT EVENTS
CN110574351A (zh) 用于集成和利用在例如包括自主车辆的网络的移动物体的网络中的多个通信技术的可用性的系统和方法
US9148770B2 (en) Identification of static position witnesses to a PSAP emergency
JP2019517213A (ja) 移動物体のネットワークにおいてダウンロード方向におけるデータのルーティングおよび複製を管理するためのシステムならびに方法
WO2012051890A1 (fr) Procédé et système de limite d'accès de terminal terminal access limit method and system
US20180365983A1 (en) Technique for collecting information related to traffic accidents
US9693356B1 (en) Smart on-demand internet-of-things connections
US10389552B2 (en) Passenger load management based on hotspot utilization
US11743694B2 (en) Vehicle to everything object exchange system
US20190347695A1 (en) Systems and methods for captive portal control and management in a network of moving things that may include, for example, autonomous vehicles
US20180005337A1 (en) Optimized traffic management via an electronic driving pass
US20190305928A1 (en) Systems and methods to improve end-to-end control and management in a network of moving things that may include, for example, autonomous vehicles
US10735984B2 (en) Systems and methods for identifying user density from network data
CN102752828B (zh) 一种实现ue控制的方法和系统
US20180227177A1 (en) Systems and Methods for Real-Time, Selective and Event-Driven Data Model to Feed Services and Applications for Access Points Including Access Points Related to Autonomous and Non-Autonomous Vehicles in a Network of Moving Things

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15894862

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15894862

Country of ref document: EP

Kind code of ref document: A1