WO2017005502A1 - Règles d'accès à des services basés sur la position - Google Patents

Règles d'accès à des services basés sur la position Download PDF

Info

Publication number
WO2017005502A1
WO2017005502A1 PCT/EP2016/064594 EP2016064594W WO2017005502A1 WO 2017005502 A1 WO2017005502 A1 WO 2017005502A1 EP 2016064594 W EP2016064594 W EP 2016064594W WO 2017005502 A1 WO2017005502 A1 WO 2017005502A1
Authority
WO
WIPO (PCT)
Prior art keywords
location
user
error
zone
access
Prior art date
Application number
PCT/EP2016/064594
Other languages
English (en)
Inventor
Sandeep Shankaran KUMAR
Ashish Vijay Pandharipande
Original Assignee
Philips Lighting Holding B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Lighting Holding B.V. filed Critical Philips Lighting Holding B.V.
Publication of WO2017005502A1 publication Critical patent/WO2017005502A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/01Determining conditions which influence positioning, e.g. radio environment, state of motion or energy consumption
    • G01S5/013Identifying areas in a building
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0205Details
    • G01S5/0244Accuracy or reliability of position solution or of measurements contributing thereto
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Definitions

  • the present disclosure relates to localization, i.e. the process of determining the location of a mobile device or user. Particularly, the present disclosure relates to the defining of policies specifying when a user or user device is allowed access to a location- based service.
  • the location of a wireless device such as a mobile user terminal can be determined with respect to a location network comprising a plurality of wireless reference nodes, in some cases also referred to as anchor nodes.
  • anchor nodes are wireless nodes whose locations are known a priori, typically being recorded in a location database which can be queried to look up the location of a node.
  • the anchor nodes thus act as reference nodes for localization. Measurements are taken of the signals transmitted between the mobile device and a plurality of anchor nodes, for instance the RSSI (receiver signal strength indicator), ToA (time of arrival) and/or AoA (angle of arrival) of the respective signal.
  • RSSI received signal strength indicator
  • ToA time of arrival
  • AoA angle of arrival
  • the location of the mobile terminal may then be determined relative to the location network using techniques such as trilateration, multilateration or triangulation. Given the relative location of the mobile terminal and the known locations of the anchor nodes, this in turn allows the location of the mobile device to be determined in more absolute terms, e.g. relative to the globe or a map or floorplan.
  • Another localization technique is to determine the location of mobile device based on a "fingerprint" of a known environment.
  • the fingerprint comprises a set of data points each corresponding to a respective one of a plurality of locations throughout the environment in question.
  • Each data point is generated during a training phase by placing a wireless device at the respective location, taking a measurement of the signals received from or by any reference nodes within range at the respective location (e.g. a measure of signal strength such as RSSI), and storing these measurements in a location server along with the coordinates of the respective location.
  • the data point is stored along with other such data points in order to build up a fingerprint of the signal measurements as experienced at various locations within the environment.
  • the signal measurements stored in the fingerprint can then be compared with signal measurements currently experienced by a mobile device whose location is desired to be known, in order to estimate the location of the mobile device relative to the corresponding coordinates of the points in the fingerprint. For example this may be done by approximating that the device is located at the coordinates of the data point having the closest matching signal measurements, or by interpolating between the coordinates of a subset of the data points having signal measurements most closely matching those currently experienced by the device.
  • the fingerprint can be pre-trained in a dedicated training phase before the fingerprint is deployed by systematically placing a test device at various different locations in the environment. Alternatively or additionally, the fingerprint can built up dynamically by receiving submissions of signal measurements experienced by the actual devices of actual users in an ongoing training phase.
  • the determination of the mobile device's location may be performed according to a "device-centric" approach or a "network-centric” approach.
  • each anchor or reference node emits a respective beacon signal.
  • the mobile device takes measurements of beacon signals it receives from the reference nodes, obtains the locations of those nodes from the location server, and performs the calculation to determine its own location at the mobile device itself.
  • the reference nodes are used to take measurements of beacon signals received from the mobile device, and an element of the network such as the location server performs the calculation to determine the mobile device's location.
  • Hybrid approaches are also possible, e.g. where the mobile device takes the raw measurements but forwards them to the location server to calculate its location.
  • a positioning system is to automatically provide a wireless mobile device with access to control of a utility such as a lighting system, on condition that the mobile device is found to be located in a particular spatial region or zone associated with the lighting or other utility.
  • access to control of the lighting in a room may be provided to a wireless user device on condition that the device is found to be located within that room and requests access.
  • location based services include location-based advertising, service alerts or provision of other location-related information, or taking payment of road tolls or other location dependent payments.
  • the position information should preferably be as reliable and stable as possible, especially at the borders of authorization domains.
  • the randomness in the estimate will mean that at times the estimated location will be detected as inside the authorization zone and at other times it will be detected to be outside, leading the system to "flit" back and forth between a state in which the devices is authorized to access the resourced and a state in which it is not.
  • a threshold which is the amount of error the service will accept while still counting a device or user whose error footprint straddles the zone boundary as being inside the zone despite the fact that its point location estimate is outside the zone (e.g. see position estimate p2 in Figure 3 for an illustration, which will be discussed in more detail later).
  • the estimation is based on knowledge of the positioning system being used and/or the environmental conditions, which may either known be implicitly or detected explicitly using sensors.
  • the thresholds can be fine-tuned for policies related to sensitive application might favour higher false negatives (or vice versa).
  • a method comprising: using a localization system to obtain a location estimate which estimates a location of a user or user device within an environment; obtaining an estimated error associated with the location estimate; and providing a location-based service whereby the user or user device is allowed access to the service on condition of said location estimate being within a predefined zone (a certain spatial region or domain).
  • a predefined zone a certain spatial region or domain.
  • the method further comprises, for one or more factors indicative of a susceptibility of said environment and/or localization system to error, performing one or both of: a) determining a spatial variation of said one or more factors inside said zone, and based thereon adapting the error threshold to take different values at different places around said zone, and/or b) determining a temporal variation of said one or more factors over time, and based thereon adapting the error threshold to take different values over time.
  • said one or more factors may comprise any one or more of the following: (i) a density and/or topology of the reference nodes; (ii) a topology of objects in the environment which reflect and/or attenuate said signals; (iii) a type of medium used for the transmission of said signals (from amongst two or more available types such as radio, visible light, infrared and/or ultrasound); (iv) a type of calculation used to perform said
  • determination of the location estimate is based on said signals (from amongst two or more available types such as trilateration, multilateration, triangulation and/or fingerprinting); (v) a type of measurement taken of said signals in order to perform the location estimate (from amongst two or more available types such as angle of arrival of said signals, time of flight of said signals, and/or received signal strength of said signals); (vi) a humidity air in the environment through which said signals travel; and/or (vii) a degree of non-locomotive motion of the user, or of a user of the mobile device (motion such as fidgeting or waving that does not move the overall position of the user's body, as opposed to locomotive motion such as walking, running, crawling, etc.); (viii) an orientation of the user, or an orientation of a user of the mobile device, or an orientation of a user of the mobile device relative to the mobile device; and/or (iv) a strength and/or topology of one or more interfering sources that interfere with one or more of said signals
  • the method may comprise using one or more sensors to detect the temporal variation in said one or more factors, and automatically performing the adaptation of the error threshold over time based on the temporal variation as detected using said one or more sensors.
  • At least one of said one or more sensors may be used to detect the temporal variation in the strength of the one or more interfering sources.
  • the at least one sensor may comprise a light sensor.
  • the interfering source may comprise a source of daylight (such as a window), and the light sensor may comprise an ambient light sensor or daylight sensor.
  • the at least one sensor may comprise a radio sensor arranged to detect the strength of the interfering radio.
  • the method may further comprise: receiving feedback from said user, or a user of the user device, as to whether access was allowed as expected; and based on said feedback, adjusting an adaptation process according to which the adaptation of the error threshold is performed. Said adjustment may be performed automatically using a machine learning technique.
  • the error threshold may be additionally controlled based on a user input from a policy administrator of the location based service.
  • a computer program product embodied on a computer readable storage medium and/or downloadable therefrom, configured so as when run on an application server to perform operations of: interacting with a localization system to obtain a location estimate which estimates a location of a user or user device within an environment; obtaining an error associated with the location estimate; providing a location-based service whereby the user or user device is allowed access to the service on condition of said location estimate being within a predefined zone, subject to an error threshold whereby if the location estimate is outside said zone, but according to the estimated error the user or user device might in fact be inside the zone, and the location estimate is not farther from said zone than the error threshold, then the user or user device is still allowed access to the service; and for one or more factors indicative of a susceptibility of said environment and/or localization system to error, performing one or both of: (a) determining a spatial variation of said one or more factors inside said zone, and based thereon adapting the error threshold to take different values at different places
  • the computer program product may be further configured to perform operations in accordance with any of the system features disclosed herein.
  • an application server configured to perform operations of: interacting with a localization system to obtain a location estimate which estimates a location of a user or user device within an environment; obtaining an error associated with the location estimate; providing a location- based service whereby the user or user device is allowed access to the service on condition of said location estimate being within a predefined zone, subject to an error threshold whereby if the location estimate is outside said zone, but according to the estimated error the user or user device might in fact be inside the zone, and the location estimate is not farther from said zone than the error threshold, then the user or user device is still allowed access to the service; and for one or more factors indicative of a susceptibility of said environment and/or localization system to error, performing one or both of: (a) determining a spatial variation of said one or more factors inside said zone, and based thereon adapting the error threshold to take different values at different places around said zone, and/or (b) determining a temporal variation of said one or more factors over time, and
  • the application server may further be configured to perform operations in accordance with any of the relevant method steps disclosed herein.
  • Figure 1 is a schematic representation of an environment comprising a localization system in the form of an indoor positioning system
  • Figure 2 is a schematic block diagram of a system for providing a location based service
  • Figure 3 is a schematic top-down view of an access zone, illustrating a corresponding access policy
  • Figure 4 is a schematic representation of a location-based access policy
  • Figure 5 is a schematic top-down view of an access zone and illustrates another access policy
  • Figure 6 is a schematic top-down view of an access zone and illustrates another access policy.
  • Figure 1 illustrates an example of a positioning system (localization system) installed in an environment 2 according to embodiments of the present disclosure.
  • the environment 2 may comprise an indoor space comprising one or more rooms, corridors or halls, e.g. of a home, office, shop floor, mall, restaurant, bar, warehouse, airport, station or the like; or an outdoor space such as a garden, park, street, or stadium; or a covered space such as a gazebo, pagoda or marquee; or any other type of enclosed, open or partially enclosed space such as the interior of a vehicle.
  • the environment 2 in question comprises an interior space of a building.
  • the positioning system comprises a location network 4, comprising multiple reference nodes in the form of anchor nodes 6 each installed at a different respective fixed location within the environment 2 where the positioning system is to operate.
  • a location network 4 comprising multiple reference nodes in the form of anchor nodes 6 each installed at a different respective fixed location within the environment 2 where the positioning system is to operate.
  • the network 4 may for example extend further throughout a building or complex, or across multiple buildings or complexes.
  • the positioning system is an indoor positioning system comprising at least some anchor nodes 6 situated indoors (within one or more buildings), and in embodiments this may be a purely indoor positioning system in which the anchor nodes 6 are only situated indoors. Though in other embodiments it is not excluded that the network 4 extends indoors and/or outdoors, e.g.
  • anchor nodes 6 situated across an outdoor space such as a campus, street or plaza covering the spaces between buildings.
  • the following will be described in terms of the reference nodes 6 being anchor nodes of an indoor positioning system or the like, but it will be appreciated this is not necessarily the case in all possible embodiments.
  • the environment 2 is occupied by a user 10 having a wireless device 8 disposed about his or her person (e.g. carried by hand, or in a bag or pocket).
  • the wireless device 8 takes the form of a mobile user terminal such as a smart phone or other mobile phone, a tablet, or a laptop computer.
  • the mobile device 8 has a current physical location which may be determined using the location network 4.
  • Another example would be a mobile tracking device disposed about a being or object to be tracked, e.g. attached to the object or placed within it.
  • Examples would be a car or other vehicle, or a packing crate, box or other container.
  • the device 8 may be any wireless device having the potential to be found at different locations or an as-yet unknown location to be determined. Further, the location of the mobile device 8 may be referred to interchangeably with the location of the associated user 10, being or object about which it is disposed.
  • the environment 2 also comprises at least one wireless access point or router 12 enabling communication with a location server 14
  • the one or more wireless access points 12 are placed such that each of the anchor nodes 6 is within wireless communication range of at least one such access point 12.
  • the following will be described in terms of one access point 12, but it will be appreciated that in embodiments the same function may be implemented using one or more access points 12 and/or wireless routers distributed throughout the environment 2.
  • the wireless access point 12 is coupled to the location server 14, whether via a local connection such as via a local wired or wireless network, or via a wide area network or internetwork such as the Internet.
  • the wireless access point 12 is configured to operate according to a short-range radio access technology such as Wi-Fi, ZigBee or Bluetooth, using which each of the anchor nodes 6 is able to wirelessly communicate via the access point 12 and therefore with the location server 14.
  • a short-range radio access technology such as Wi-Fi, ZigBee or Bluetooth
  • each of the anchor nodes 6 could be provided with a wired connection to the location server 14, or one or more of the anchor nodes 6 could be arranged to act as an access point for the others.
  • the following may be described in terms of a wireless connection via an access point 12 or the like, but it will be appreciated that this is not limiting to all possible embodiments.
  • the mobile device 8 is also able to communicate via the wireless access point 12 using the relevant radio access technology, e.g. Wi-Fi, ZigBee or Bluetooth, and thereby to communicate with the location server 14.
  • the mobile device 8 may be configured to communicate with the location server 14 via other means such as a wireless cellular network such as a network operating in accordance with one or more 3 GPP standards.
  • the mobile device 8 is able to wirelessly receive beacon signals from, or transmit beacon signals to, any of the anchor nodes 6 that happen to be in range. In embodiments this communication may be implemented via the same radio access technology as used to communicate with the access point 12, e.g. Wi-Fi, ZigBee or Bluetooth, though that is not necessarily the case in all possible embodiments.
  • any of the communications described in the following may be implemented using any of the above options or others for communicating between the respective entities 6, 8, 12, 14 and for conciseness the various possibilities will not necessarily be repeated each time.
  • the beacon signals between the anchor nodes 6 and the mobile device 8 are the signals whose measurements are used to determine the location of the mobile device 8.
  • the anchor nodes 6 each broadcast a signal and the mobile device 8 listens, detecting one or more of those that are currently found in range and taking a respective signal measurement of each.
  • Each anchor node 6 may be configured to broadcast its beacon signal repeatedly.
  • the respective measurement taken of the respective beacon signal from each detected anchor node 6 may for example comprise a measurement of signal strength (e.g. RSSI), time of flight (ToF), angle of arrival (AoA), and/or any other property that varies with distance or location.
  • the mobile device 8 broadcasts a beacon signal and the anchor nodes 6 listen, detecting an instance of the signal at one or more of those nodes 6 that are currently in range.
  • the mobile device 8 may broadcast its beacon signal repeatedly.
  • the respective measurement taken of each instance of the beacon signal from the mobile device 8 may comprise a measure of signal strength (e.g. RSSI) or time of flight (ToF), angle of arrival (AoA), and/or any other property that varies with distance or location.
  • the nodes 6 may take the measurements but then send them to the mobile device 8, or the mobile device 8 may take the measurements but send them to the location server 14.
  • Time-of- flight measurements can be obtained by establishing either a one way transmission delay or a two-way transmission delay (round trip time, RTT).
  • RTT round trip time
  • a measurement of one-way delay can suffice if all relevant elements in the network have a synchronized clock or can reference a common clock.
  • the mobile device 8 may initiate the measurement with a single message transmission, adding a timestamp (e.g. time or time+date) of transmission to the message.
  • the anchor or reference nodes 6 can still perform a measurement by bouncing individual messages back from the mobile device 8 and determining the round-trip time-of-flight. The latter may involve coordination from the nodes attempting to measure.
  • the determination of distance from signal strength is based on the diminishment of the signal strength over space between source and destination, in this case between the mobile device 8 and anchor or reference node 6. This may for example be based on a comparison of the received signal strength with a-prior knowledge of the transmitted signal strength (i.e. if the nodes 6 or mobile device 8 are known or assumed to always transmit with a given strength), or with an indication of the transmitted signal strength embedded in the signal itself, or with the transmitted signal strength being communicated to the node 6 or device 8 taking the measurement via another channel (e.g. via location server 14).
  • beacon signal measurement is available from or at each of a plurality of the anchor nodes 6, it is then possible to determine the location of the mobile device 8 relative to the location network 4 using a technique such as trilateration, multilateration, triangulation and/or a fingerprint based technique.
  • the "absolute" locations of the anchor nodes 6 are known, for example from a location database maintained by the location server 14, or by the respective location of each anchor node 6 being stored at the node itself (e.g. and communicated from each relevant nodes to the mobile device 8 in a device centric approach).
  • the absolute location is a physical location of the node in a physical environment or framework, being known for example in terms of a geographic location such as the location on a globe or a map, or a location on a floorplan of a building or complex, or any real-world frame of reference.
  • the absolute location is a physical location of the device in a physical environment or framework, for example a geographic location in terms of the location on a globe or a map, or a location on a floorplan of a building or complex, or any more meaningful real- world frame of reference having a wider meaning than simply knowing the location relative to the location network 4 alone.
  • the absolute location of the nodes 6 may be stored in a human understandable form and/or the absolute location of the mobile device 8 may be output in a human understandable form. For example, this may enable the user 10 to be provided with a meaningful indication of his or her location, and/or may enable the administrator of a location-based service to define rules for granting or prohibiting access to the service or aspects of the service. Alternatively it is possible for the location of the nodes 6 and/or mobile device 8 to only ever be expressed in computer-readable form, e.g. to be used internally within the logic of the location based service.
  • the location is only ever expressed relative to the location network 4, 6 and not as a more meaningful "absolute" location.
  • each anchor node 6 is integrated with a respective luminaire (see below) and the location is being determined for the purpose of controlling those luminaires, then in some embodiments it may only be necessary to determine the user's location relative to the framework of points defined by the anchor nodes of these luminaires (though in other similar arrangements it may still be desired to define lighting control regions relative to the floorplan of a building or the like).
  • the beacon signal from each anchor node 6 comprises an ID of the respective anchor node.
  • the mobile device 8 uses these IDs to look up the locations of the relevant nodes 6 by querying the location server 14 (e.g. via the wireless access point 12).
  • the beacon signal from each node 6 could even comprise an explicit indication of the respective location. Either way, the mobile device 8 can then perform the calculation to determine its own location at the device 8 itself (relative to the location network 4 and/or in absolute terms).
  • the beacon signal comprise an ID of the mobile device 8, and the anchor nodes 6 submit the beacon signal measurements they took to the location server 14 along with the mobile device's ID (e.g. via the wireless access point 12).
  • the location server 14 then performs the calculation of the device's location at the server 14 (again relative to the location network 4 and/or in absolute terms).
  • the mobile device 8 may take the measurements of the beacon signals from the nodes 6, but submit them along with the respective received IDs to the location server 14 in a raw or partially processed form for the calculation to be performed or completed there.
  • a beacon signal measurement is needed from at least three reference nodes, though if other information is taken into account then it is sometimes possible to eliminate impossible or unlikely solutions based on two nodes. For example, if the location is assumed to be constrained to a single level (e.g. ground level or a given floor of a building), the measurement from any one given node 6 defines a circle of points at which the mobile device 8 could be located. Two nodes give two circles, the intersection of which gives two possible points at which the mobile device 8 may be located. Three nodes and three circles are enough to give an unambiguous solution at the intersection of the three circles (though more may be used to improve precision).
  • this location may then be used to assess whether the mobile device 8 is granted access to some location-based service (LBS).
  • LBS location-based service
  • a service access system 16 in the form of an LBS server, configured to conditionally grant access to the service in dependence on the absolute location of the mobile device 8.
  • the mobile device 8 submits its determined absolute location (e.g. in terms of global coordinates, map coordinates or coordinates on a floor plan) to the service access system 16 over a connection via the wireless access point 12 or other means such as a cellular connection.
  • the service access system 16 assesses this location and grants the mobile device 8 with access to the service on condition that the location is consistent with provision of the service (and any other access rules that happens to be implemented, e.g. also verifying the identity of the user 10).
  • the location server 14 submits the determined absolute location of the mobile device 8 to the service access system 16, e.g. via a connection over a local wired or wireless network and/or over a wide area network or internetwork such as the Internet.
  • the location server 14 may send the absolute location to the mobile device 8, and the mobile device may then forward it on to the service access system 16.
  • the service could be provided directly from the location server 14, or could even be implemented on an application running on the mobile device 8 itself.
  • providing a navigation service such as an indoor navigation service to the mobile device 8 (in which case the location-related function comprises at least providing the device's absolute location to an application running on the mobile device 8, e.g. which the application may then use to display the user's location on a floor plan or map);
  • providing access to medical data to a mobile device 8 on condition that the device 8 is detected to be within a hospital or other such medical facility;
  • Figure 2 shows arrows in all directions to illustrate the possibility of either device centric or network centric approaches, but in any given implementation not all the communications shown need be bidirectional or indeed present at all.
  • each of the anchor nodes 6 does not take the form of a dedicated, stand-alone anchor node, but rather a unit of another utility that is present in the environment 2 for another purpose, and which is exploited in order to incorporate the additional functionality of an anchor node.
  • the luminaires 6 may for example be installed in the ceiling and/or walls, and/or may comprise one or more free standing units.
  • each of the anchor nodes 6 is incorporated into a respective "smart luminaire" having an RF transceiver such as a Wi-Fi, ZigBee or Bluetooth transceiver for facilitating wireless control of the lighting in the environment 2 (as discussed in more detail later), and the anchor node functionality 6 is incorporated by exploiting the existence of this RF transceiver to additionally broadcast and/or receive localization beacon signals for an additional purpose of locating a mobile device 8.
  • the beacon signal could be a coded light signal embedded in the visible illumination emitted by the luminaire (preferably at a high enough frequency to be imperceptible to the human eye).
  • the illumination has a primary function of illuminating the environment 2
  • the anchor node functionality 6 is incorporated as a secondary by exploiting the possibility of modulating the illumination at high frequency in order to embed data, such as a unique ID of each anchor 6.
  • each of the anchor nodes 6 need not be incorporated into a luminaire but rather may be incorporated into another unit such as a smoke alarm, a presence sensor and/or light sensor unit, a security alarm, an air-conditioning unit, a ventilation unit, or a heating unit (and each anchor node 6 does not necessarily have to be incorporated into the same type of unit, though they may be).
  • the anchor nodes 6 may be dedicated anchor nodes 6 having no other function than localization.
  • the service access system 16 may be configured to control access to the control of the lighting 6.
  • the access system 16 of the lighting controller is configured with one or more location dependent control policies.
  • a control policy may define that a user 10 can only use his or her mobile device 8 to control the lights in certain region such as a room only when found within that region or within a certain defined nearby region.
  • the mobile device 8 only controls those luminaires within a certain vicinity of the user's current location.
  • the control of the lighting could be unrelated to the localization in terms of its user- facing function, and instead the location-based service could be something else such as control of another utility such as heating or air conditioning; or the provision of location-based advertising, map data or other location-based information; or the taking of location-dependent payments; etc.
  • Location based policies are increasingly used to automatically enforce access to various resources based on the current position of the accessing device.
  • the resource in question could be the control of one or more devices in a room, access to the map data, etc.
  • a person may be allowed to control lighting in a particular room with a mobile device if the person's mobile device is physically present inside that room.
  • almost all positioning techniques have a certain amount of randomness in the calculated position. Randomness here refers to the amount by which the position estimate may be expected to vary, i.e. the typical amount of error or the degree of unpredictability in the estimate, e.g. measured in terms variance or standard deviation.
  • the actual error for any given position estimate is the difference between the true (actual) position of the mobile device 8 and the estimated position as output by the positioning algorithm.
  • the position error is p-q
  • the variance is E[ ⁇ p-q ⁇ A 2], where E[.] denotes the mathematical expectation operator.
  • E[.] denotes the mathematical expectation operator.
  • the actual error in any given instance is impossible to know.
  • it is possible to put an estimate e on the expected amount error For instance the standard deviation, which is the square root of the variance, may be used as an estimate e of the expected magnitude of the error p-q.
  • Other ways of estimating amount of expected, typical or representative error may also be familiar to a person skilled on the art.
  • the randomness distribution is dependent on multiple factors, some static and others dynamic.
  • the static component may result from one or more of: the density and/or topology of the anchor nodes 6 in the localization network 4, the density and/or topology of obstacles in the environment, the inherent precision in the location estimate computation, and/or the type of positioning technology being used.
  • the type of positing technology may include factors such as the type of positioning calculation being used (e.g. is it based on received signal strength or angular measurements), and/or the type of medium being used to transmit the beacon signals (e.g. radio is typically more precise than coded light).
  • the dynamic component of the randomness may result from: time varying environmental factors that affect how signals propagate (like humidity, shifting of the metallic objects), as well as any non- locomotive movements of the user (e.g. the user fidgeting or waving his or her arms with the tracked device 8 in hand, but while still standing at the same spot).
  • one approach is to tolerate a certain degree of randomness in the estimated position when deciding if the device is granted access to a location based service, as long as this is known to the policy evaluation engine and still within a certain threshold.
  • Figure 3 illustrates an example access zone 17, which could be the bounds of the environment 2 (edges of a room), or a certain sub-region within the environment (e.g. sub-region of a room).
  • the LBS server 16 is configured so that if the estimated position of a mobile device 8 (as estimated by the localization system 4, 14 and reported to the LBS server 16) is inside the access zone 17, then the LBS server 16 will grant the mobile device 8 access to the service (assuming the device 8 requests it, and any other criteria such as authorization of the user 10 and arbitration are met).
  • the LBS server 16 defines an error threshold T being a contour a certain defined distance beyond the border of the access region 17. This works as follows.
  • Figure 3 illustrates the fact that each position estimate p will have some estimated error e associated with it.
  • This error e corresponds to a radius defining a circle or "error footprint" drawn around the estimated location p.
  • the centre point p of that device's estimated location may fall outside the zone 17, but the error on the estimate may mean that the user device 8 could actually just about be inside the zone 17. Therefore without taking further measures, a policy evaluation engine on the LBS server 16 cannot make consistent decisions about whether the device's location 8 fulfils the location based policy, especially at the border of such authorization domains 17 where the apparent position might be considered to be constantly shifting from inside to outside the access zone 17 and vice versa.
  • jerky behaviour leads to continual change in the access to the resource, making it a nuisance for the user 10.
  • a user's access to controlling the lighting in a room may change constantly if he is close to a wall on a room boundary, and the system might change the lighting to default every time the user device 8 is estimated to be outside the room.
  • the approach illustrated in Figure 3 is to receive an estimate e of the error on the position estimate p, and to allow a user device 8 to still obtain access to the service despite having a position estimate p outside the access zone 17, but only on condition that both: (I) the position estimate p is still inside the threshold region T; and (II) the error estimate e (e.g. standard deviation) is such that then the true position of the device 10 could in fact fall within the access zone 17 (assuming as an approximation that the error e is the maximum extent of possible positions).
  • the error estimate e e.g. standard deviation
  • the user device 8 is still granted access (assuming the device 8 requests it, and any other criteria such as authorization of the user 10 and arbitration are met); but otherwise the user device 8 will not be granted access.
  • the threshold T specifies how much error is acceptable to make a positive decision or a negative decision as to access.
  • the above additions to the location-based policy in themselves provides some degree of protection of against the above-mentioned jerkiness or "flitting" in the access decision.
  • the only knowledge of the estimated error that location based policy decision engines receive is a current estimate of the computational error in the position caused due to the measurement errors. Often this is insufficient to make a reliable and stable decision especially at the borders of the authorization domain.
  • the policy evaluation engine is unaware of the current positioning technique being used or the amount of randomness (e.g. its error variance) that might be associated with the positioning algorithm. Further, the policy engine may not be aware of the changing environmental factors that might deteriorate the positioning information that is being presented. Therefore the policy evaluation engine still cannot make consistent decisions on a location based policy, especially at the border of authorization domains.
  • a policy decision engine which adapts error threshold T to take different values at different positions and/or different times depending on one or more factors that are functions of space and/or time. That is, it adapts the maximum size of error radius (the error threshold) for which, if its circumference just falls inside the zone, access is still granted.
  • the policy decision engine receives three additional inputs: a static error estimate, a dynamic error estimate, and a threshold to be used during the decision. These additional inputs are generated by additional components based on: location based data, sensor data, user input, and/or feedback from the application.
  • FIG. 4 illustrates more detail of a location based service (LBS) server 16 configured in accordance with embodiments of the present disclosure.
  • LBS location based service
  • the LBS server 16 comprises a location-based application 18 providing the location based service, and a policy evaluation engine 20 configured to decide access to the service 18 based on the current position p of a requesting user device 8 and its estimated error e, this being an estimate of the amount of error that is expected based on one or more factors.
  • the LBS server 16 also comprises a static error estimator 22 configured to estimate positioning error based on pre-existing knowledge of the positioning system, and a dynamic error estimator 24 configured to estimate positioning errors based on the current environmental factors or due to user movement.
  • the LBS server 16 also comprises a policy admin module 26 for receiving a user input from an administrator of the location-based policy.
  • the policy decision engine 20 is configured to determine a combined estimation of error combining the static and dynamic errors provided by the estimators 22, 24. It then fine tunes the error threshold T based on the combined estimate, and optionally also based on the security requirements of the application 18 as specified by the administrator via the policy admin input 26. In embodiments, the policy decision engine 20 is also arranged to receive feedback information regarding failed access requests (false negatives), which are used to learn and correct the combined estimations.
  • the policy admin block 26 receives a user input from the policy administrator specifying a location-based access policy for the location based service provided by the application 18, including an access zone 17 and a nominal value for the error threshold T.
  • the policy admin block 26 provides the nominal threshold value to the policy decision engine 20.
  • the location based application 18 optionally provides an indication of its own security requirements (e.g. a security
  • the location server 104 provides an estimate of the current location of the mobile device 8 to the policy decision engine 20, along with an estimate of the inherent computational error associated with the computation it uses to arrive at this estimate.
  • the static error estimator 22 receives information about the localization system 4, 14 from the location server 14 (e.g. about its topology) and uses this to determine an estimate of the static error on the location estimate due to such factors (these not being taken into account in the computational error 112).
  • the static error estimator 22 provides the estimated static error to the policy decision engine 20.
  • the dynamic error estimator provides an estimate of the dynamic error in the location estimate due to one or more time-varying environmental factors (e.g. strength of an interfering source). In embodiments, this is generated based on sensor input received by the dynamic error estimator 24 at step 104.
  • time-varying environmental factors e.g. strength of an interfering source
  • steps 100, 101, 102, 104, 106, 110 and 112 do not necessarily have to occur in any particular order (except that step 100 must come before step 100, step 108 must come before 110, and if sensor input is used step 104 must come before 106).
  • the policy decision engine 20 then calculates a combined error estimate e based on a combination of two or three of: the static error estimate 110, and dynamic error estimate 106, and the computational error 112. Alternatively the policy decision engine may 20 simply take just one of these as the error estimate e. Either way, the estimated error e along with the estimated position p itself are used by the policy decision engine 20 to assess whether the mobile device 8 is granted access to the location based service provided by the application 18, according to the principle discussed above in relation to Figure 3. At step 114 the policy decision engine 20 issues its decision to the application 18, which then provides the service accordingly to the mobile user device 8.
  • the static and/or dynamic error estimators 22, 24 are also arranged to provide the policy decision engine 20 with an indication of the susceptibility of the system and environment to their respective kinds of error - i.e. a measure of how error- prone the localization system 4, 14 and/or environment 2 is. Based on one or both of these, the policy decision engine 20 then automatically adapts the error threshold T so as to adapt to the localization system 4, 14 and/or the environment 2.
  • the error threshold T so as to adapt to the localization system 4, 14 and/or the environment 2.
  • a certain localization system 4, 14 may be more error-prone than another because it has a lower the density of anchor nodes 6, or because it uses a less precise signalling medium (e.g. coded light as opposed to radio).
  • a certain environment 2 may be more error-prone than another because it contains more obstacles or more interference. Examples will be discussed in more detail shortly in relation to Figures 5 and 6.
  • the error threshold T may also be set based on the application-specific security requirements 102, and/or the nominal value 101 of the threshold T set by the administrator.
  • the policy decision engine 20 determines the error threshold T based on a combination of: one or both of the susceptibility static and/or dynamic error 106, 110, combined with one or both of the administrator-defined nominal threshold 101 and/or the application-specific security requirements 102.
  • the application-specific security requirements 102, and/or the nominal threshold value 101 may be used to determine a basic default or reference value of the threshold T, and then the policy decision engine 20 then automatically adapts the threshold T relative to this by an amount dependent on the determined susceptibility to the static and/or dynamic errors.
  • the reference threshold is used, but for a more error-prone environment a wider (more forgiving) threshold may be selected, whilst for less error-prone environment or location system a narrower (stricter) threshold may be selected.
  • the application 18 and/or administrator may have the option to override the threshold set automatically by the policy decision engine 20 based on the static and/or dynamic error susceptibility.
  • the adaptation of the threshold T to static error-affecting properties of the location system 4, 14 and/or dynamic error-affecting properties of the environment 2 need not be automatic. In embodiments, this adaptation could be automatic or manual. In the latter case, the information (optionally along with the application-specific requirements) is provided to the policy administrator via the policy admin module 26, and the administrator uses this information in conjunction with his or her judgement in order to select the desired threshold T.
  • the static error estimate, and/or the susceptibility of the localization system 4, 14 to error due to static factors can be derived by using the knowledge from the location server 14 of the positioning system 4, 14 in use, and/or from measurements taken during an initial commissioning phase, and/or from pre-existing data of similar systems that were calibrated.
  • Such information may comprise one or more of various factors. For instance, this may comprise information on the spatial density and/or topology of the anchor nodes 6 (topology herein means the spatial layout or distribution of the anchor nodes 6, i.e. the positions at which they are deployed). E.g. a location network 4 with a higher density of anchor nodes 6 will produce more fine-grained results than a sparser installation.
  • the static error the error due to the intrinsic properties of the location system 4, 14 itself
  • factors that affect the static error include the type of medium used to convey the beacon signals. E.g. if a coded-light positioning system is being used, then this can indicate that this position estimate is less precise than when it switches to radio based positioning.
  • the static error may be affected by the type of location calculation performed: e.g. trilateration, multilateration, triangulation and fingerprinting may all result in slightly different errors.
  • the type of measurement taken e.g. received signal strength, time of flight and angle of arrival based techniques may all have different errors associated with them.
  • various factors such as those discussed above can provide an estimate of the error distribution (including a maximum expected error) that can happen when using a particular positioning system.
  • the dynamic error estimate, and/or the susceptibility of the environment 2 to error due to dynamic factors can be derived by measuring the time varying environmental factors.
  • the measurement can be determined explicitly by use of one or more sensors on the localized device or elsewhere, or by other means such as by crowdsourcing from devices in the vicinity, or implicitly based on calibrating signal measurements.
  • Such information may again comprise one or more of various factors. For instance, this may comprise a strength and/or topology of one or more interfering sources (topology here meaning the spatial layout, distribution or positions of the interfering source(s)).
  • topology here meaning the spatial layout, distribution or positions of the interfering source(s)
  • the humidity of the air in the environment 2, through which the beacon signals must travel can also effect the error.
  • the non- locomotive movement of the user 10 can be measured using accelerometers on the mobile device 8 and/or worn about the user's person 10, and fed as additional error-causing factors based on the how fast the user moves. That is to say, movement whereby the user 10 is not intentionally moving his or her whole body to a different location, but rather is staying on the same spot and simply moving some constituent parts of his her body, will not be considered by the user 10 as moving to a new location but may still result in a variation in the location estimate (e.g. because the user is moving his or her arm while holding the device 8 being localized).
  • the orientation of the mobile device 8 may affect the error experienced - e.g. a device 8 may experience more or less interference depending on its orientation relative to one or more interfering sources, or the user's body may act as an obstacle such that the orientation of the user 10 relative to his or her mobile device 8 has an effect on the amount of error.
  • a third input to the policy decision engine 20 affecting the threshold T is the input 100 from the policy administrator (a person, but not the user 10 being localized), and/or the application- specific requirements of the application 18. This then allows some flexibility on behalf of the administrator and/or application as to the decision point and prevent spurious changes between positive and negative decision due to small errors - i.e. it allows the policy decision engine 20 to take the static and dynamic error estimates and fine tune to decide when a change in decision should be performed.
  • the application and/or administrator also has the option to override the automated adjustment, especially in cases where secure requirements are high, by providing their own requirements to the policy decision engine 20.
  • the application 18 may provide feedback to the policy admin module 26, to inform the administrator.
  • the feedback originates from the end-user 10: if the user experiences a false positive (i.e. a situation where he or she expected to be granted access to the service due to knowing him or herself to be in the access zone, but was denied access due to positioning error), then the user 10 has the opportunity to provide feedback through his or her mobile device 8 to the location-based application 18, and hence onwards to the administrator.
  • the administrator can then adjust the policy based on this feedback, e.g. to increase the threshold T.
  • the feedback 118 may be provided to the policy decision engine in order to adapt the policy automatically.
  • the policy decision engine 20 may apply a machine learning technique to adapt the algorithm it uses to set the threshold T, i.e. to adapt the way in which it selects the threshold from the various inputs 101, 102, 106, 110, 112.
  • the policy decision engine As mentioned, according to the present disclosure the policy decision engine
  • the 20 on the application server 16 selects the error threshold T in dependence on how error- prone the environment and/or localization system is (which could be an in-built, static property of the system or environment, or could be a time-varying, dynamic property).
  • the environment will be more noisy and so it will be useful to allow for more error in localization.
  • the density of anchor nodes will affect the localization accuracy, and therefore a different policy may need to be set for high density networks than low density networks.
  • the threshold policy need not be the same throughout a given access zone 17 (e.g. need not be the same for the whole room). Instead it is possible to define an error threshold map within the zone in question (e.g. within a room), e.g. with strict error thresholds at one end of the zone where there is a denser cluster of anchor nodes 6, and looser error thresholds at another end of the room where anchor nodes are sparser. And/or, the threshold can adapt over time, e.g. for coded-light positioning, the policy could be loosened in the daytime when there is a lot of interfering daylight, but could be stricter at night.
  • Figure 5 illustrates an example in which at least one sensor 30 is disposed in the environment 2 and arranged to detect interference from of at least one interfering source 28 (or e.g. multiple sensors 30 could each be arranged to detect interference from a respective one of multiple interfering sources 28).
  • the sensor 30 may be arranged to detect the interference for example by being placed in the vicinity of the interfering source 28, or could be a directional sensor arranged so as to be directed towards the source 28.
  • the sensor 30 itself may be implemented as a stand-alone sensor installed or otherwise disposed in the environment 2, or a sensor integrated into another unit such as a luminaire, smoke alarm, air conditioning unit, etc.
  • the sensor 30 could be a sensor incorporated into the mobile device 8 so as to be arranged to detect interference in the vicinity of the current location of the mobile deice 8.
  • the sensor 30 is operative ly coupled to the dynamic error estimator 24 on the application server 16 (connection not shown - but could be by any means, e.g. a local wireless technology such as Wi-Fi, ZigBee, Bluetooth, etc. or other wireless technology such as a cellular connection; and/or a wired connection such as an Ethernet or internet connection).
  • the sensor 30 is configured to measure the current strength of interference from the interfering source 28, and to report this to the dynamic error estimator 24 to use to inform the determination as to how error-prone the environment 2 currently is.
  • the policy decision engine 20 receives an indication of this from the dynamic error estimator 24, and based on this dynamically adapts the error threshold T in accordance with the amount of interference currently being experienced from the interfering source. If the interference is high, the policy decision engine 22 selects a threshold T2 that is farther out from the boundary of the authorization zone 17 (and therefore more forgiving of error);
  • the policy decision engine 20 selects a threshold Tl that is closer in to the boundary of the authorization zone 17 (and therefore less forgiving of error).
  • the interfering source 28 may comprise a source of daylight, such as a window or other opening in the room 2.
  • the sensor 30 may comprise a daylight sensor or ambient light sensor placed by the window. It may be assumed that the reading given by the sensor 30 is indicative of the amount of interfering daylight due to its placement by the window. And/or, daylight estimation can be achieved using the same sensors as used for coded light reception, since daylight is not modulated and so the unmodulated component can be estimated. By whatever means the daylight is estimated, the policy decision engine 20 then adapts the threshold T based on the reading from the sensor 30.
  • a wider error threshold T2 will be selected, but during the night a stricter error threshold Tl will be selected (N.B. the selection does not have to be between just two discrete values - this is just for illustration, and the decision engine 20 could instead adapt between three or more discrete values or a continuous range of values).
  • An analogous can also be used in the case where radio is the medium by which the beacon signals are transmitted. For example, this may be relevant if the beaconing occurs on the ISM (industrial, scientific and medical) band -e.g. using a popular short-range radio access technology such as Wi-Fi.
  • the error threshold T that will be tolerated by the location-based service 16 may be automatically adapted based on detecting the current strength of radio interference.
  • radio interference such as ISM band interference may be detected by detecting specific signal characteristics of certain interference sources. As example, see the paper "iSCISM: Interference Sensing and
  • the threshold T is basically a distance measured radially outwards (perpendicular to the tangential direction) from the edge of the authorization zone 17. In the above example, it has been assumed that the threshold T is the same all the way around the perimeter of the authorization zone 17. In embodiments, that is indeed the case, but it is also recognized herein that it need not necessarily be so. Rather, the susceptibility of the environment 2 to error may be a function of spatial position, and may vary between different positions even within a given access zone 17 (e.g. within a given room). For example, there could be more interfering sources 28 at one end of a room than another, or a lower density of anchor nodes 6, or more obstacles affecting the propagation of beacon signals.
  • the threshold T may be adapted to take different values at different positions around the perimeter of the access one 17, in dependence on the measure of the susceptibility of the location system 4, 14 and/or environment 2 to error as a function of space - either automatically by the policy decision engine 20 or manually by an administrator.
  • Figure 6 illustrates one example, in which an uneven distribution (topology) of interfering sources 28 is found throughout the room.
  • four sources 28a, 28b, 28c, 28d are shown, but it will be appreciated.
  • the strengths and/or positions of the interference sources 28 may be determined in an initial commissioning phase, or may be measured during ongoing operation be means of one or more sensors 30.
  • the threshold T is then adjusted to accommodate different strength interference sources 28a-28d and/or interference sources 28a-28b that are found at different, unevenly distributed positions throughout the environment 2.
  • the threshold T will be further from the edge of the access zone 17 around that edge (compared to other edges where the strength and/or density of interfering sources 28a is less).
  • a similar idea could also be applied in relation to obstacles that affect the propagation of the beacons signals (the more obstacles nearby, the greater the error threshold).
  • the above process may for example be performed manually by an administrator based on information on the strengths and/or positions of interference sources, and/or positions of obstacles, as determined during an initial commissioning phase.
  • the process may be performed automatically and dynamically by the policy decision engine 20, based on sensor readings 104 received from one or more sensors 30 disposed in the environment 2.
  • the time-varying and spatially- varying adaptation of the threshold T may also be used together, e.g. to adapt to moving interference sources 28 and/or moving obstacles.
  • the environment 2 could be equipped with a network of multiple interference sensors 30, which may be used to track where and when interference is occurring and to dynamically adapt the threshold T accordingly.
  • beacon signals e.g. infrared or ultrasound.
  • an alternative or additional approach is to use one or more technologies capable of detecting the location of the user 10 him or herself directly (i.e. detecting the actual person).
  • An example is to use presence sensors such as passive infrared or active ultrasound sensors.
  • Another example is to use one or more cameras (either 2D cameras or depth aware cameras) plus an image recognition algorithm in order to detect the position of a user 10. In such cases, any of the teachings above may equally apply to the error in the position of the user 10.
  • a computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems. Any reference signs in the claims should not be construed as limiting the scope.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système de localisation qui sert à obtenir une estimation de position pour un utilisateur ou un dispositif d'utilisateur, et une erreur estimée associée à l'estimation de position est également obtenue. L'invention concerne un service basé sur la position tel que l'utilisateur ou le dispositif d'utilisateur est autorisé à accéder au service à condition que l'estimation de position (p1, p2, p3, p4, p5) se trouve dans une zone prédéfinie (17), soumise à un seuil d'erreur (T) tel que si l'estimation de position est extérieure à cette zone, mais que selon l'erreur estimée (e1, e4, e5) l'utilisateur ou le dispositif peuvent ou non se trouver en réalité dans la zone, et que l'estimation n'est pas plus éloignée de la zone que le seuil d'erreur, alors l'utilisateur ou le dispositif est tout de même autorisé à accéder au service. En outre, une variation spatiale et/ou temporelle est déterminée dans un ou plusieurs facteurs indicatifs d'une susceptibilité de l'environnement et/ou du système de localisation à l'erreur, et le seuil d'erreur est adapté sur la base de ces facteurs.
PCT/EP2016/064594 2015-07-03 2016-06-23 Règles d'accès à des services basés sur la position WO2017005502A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP15175183.1 2015-07-03
EP15175183 2015-07-03

Publications (1)

Publication Number Publication Date
WO2017005502A1 true WO2017005502A1 (fr) 2017-01-12

Family

ID=53510752

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2016/064594 WO2017005502A1 (fr) 2015-07-03 2016-06-23 Règles d'accès à des services basés sur la position

Country Status (1)

Country Link
WO (1) WO2017005502A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109900270A (zh) * 2017-12-09 2019-06-18 英业达科技有限公司 以常规与模糊演算结果判断干扰源位置的系统及其方法
US10869292B2 (en) 2017-05-05 2020-12-15 Signify Holding B.V. Conditionally providing location-based functions
US11297068B2 (en) 2018-12-18 2022-04-05 At&T Intellectual Property I, L.P. Anchoring client devices for network service access control
DE102020216166A1 (de) 2020-12-17 2022-06-23 Trumpf Werkzeugmaschinen Gmbh + Co. Kg UWB-Ortungssystem mit parallel übermittelnder Daten-Netzwerk-Verbindungskomponente

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120299702A1 (en) * 2011-05-26 2012-11-29 Caterpillar Inc. Hybrid positioning system
US20130260693A1 (en) * 2012-03-27 2013-10-03 Microsoft Corporation Proximate beacon identification
WO2013191865A1 (fr) * 2012-06-18 2013-12-27 Qualcomm Incorporated Détection de localisation à l'intérieur de zones géographiques prédéfinies identifiables

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120299702A1 (en) * 2011-05-26 2012-11-29 Caterpillar Inc. Hybrid positioning system
US20130260693A1 (en) * 2012-03-27 2013-10-03 Microsoft Corporation Proximate beacon identification
WO2013191865A1 (fr) * 2012-06-18 2013-12-27 Qualcomm Incorporated Détection de localisation à l'intérieur de zones géographiques prédéfinies identifiables

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10869292B2 (en) 2017-05-05 2020-12-15 Signify Holding B.V. Conditionally providing location-based functions
CN109900270A (zh) * 2017-12-09 2019-06-18 英业达科技有限公司 以常规与模糊演算结果判断干扰源位置的系统及其方法
CN109900270B (zh) * 2017-12-09 2023-01-31 英业达科技有限公司 以常规与模糊演算结果判断干扰源位置的系统及其方法
US11297068B2 (en) 2018-12-18 2022-04-05 At&T Intellectual Property I, L.P. Anchoring client devices for network service access control
DE102020216166A1 (de) 2020-12-17 2022-06-23 Trumpf Werkzeugmaschinen Gmbh + Co. Kg UWB-Ortungssystem mit parallel übermittelnder Daten-Netzwerk-Verbindungskomponente

Similar Documents

Publication Publication Date Title
EP3272161B1 (fr) Localisation à l'aide de la détéction du mouvement d'un dispositif mobile
CN107258087B (zh) 位置化信标信号和控制相关信号的时间复用传输
JP6701081B2 (ja) 位置決めシステムにおけるビーコニングの制御
US10681494B2 (en) Controlling localization
EP3155833B1 (fr) Localisation basée sur un réseau de n'uds sans fil
EP3102962B2 (fr) Localisation centrée sur le réseau
JP6275279B2 (ja) ゾーンベースの照明アクセス
EP3354086B1 (fr) Localisation d'un dispositif mobile
JP6180645B2 (ja) 測位システムにおけるフィードバック
WO2015104224A1 (fr) Système de positionnement pour déterminer l'emplacement d'un dispositif
WO2017005502A1 (fr) Règles d'accès à des services basés sur la position

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16731180

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16731180

Country of ref document: EP

Kind code of ref document: A1