WO2021209843A1 - Geo-fencing enforcement for user equipment - Google Patents

Geo-fencing enforcement for user equipment Download PDF

Info

Publication number
WO2021209843A1
WO2021209843A1 PCT/IB2021/052446 IB2021052446W WO2021209843A1 WO 2021209843 A1 WO2021209843 A1 WO 2021209843A1 IB 2021052446 W IB2021052446 W IB 2021052446W WO 2021209843 A1 WO2021209843 A1 WO 2021209843A1
Authority
WO
WIPO (PCT)
Prior art keywords
geo
fencing
restrictions
parameters
user equipment
Prior art date
Application number
PCT/IB2021/052446
Other languages
French (fr)
Inventor
Navin Hathiramani
Devaki Chandramouli
Original Assignee
Nokia Technologies Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Technologies Oy filed Critical Nokia Technologies Oy
Publication of WO2021209843A1 publication Critical patent/WO2021209843A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Definitions

  • Some example embodiments may generally relate to mobile or wireless telecommunication systems, such as Long Term Evolution (LTE) or fifth generation (5G) radio access technology or new radio (NR) access technology, or other communications systems.
  • LTE Long Term Evolution
  • 5G fifth generation
  • NR new radio
  • certain example embodiments may relate to apparatuses, systems, and/or methods for geo-fencing enforcement for user equipment.
  • certain example embodiments may relate to cell broadcast entity triggered geo-fencing enforcement for idle and connected mode user equipment operational restrictions.
  • Examples of mobile or wireless telecommunication systems may include the Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN), Long Term Evolution (LTE) Evolved UTRAN (E-UTRAN), LTE- Advanced (LTE- A), MulteFire, LTE- A Pro, and/or fifth generation (5G) radio access technology or new radio (NR) access technology.
  • UMTS Universal Mobile Telecommunications System
  • UTRAN Long Term Evolution
  • E-UTRAN Evolved UTRAN
  • LTE- A LTE- Advanced
  • MulteFire LTE- A Pro
  • LTE- A Pro new radio
  • Fifth generation (5G) wireless systems refer to the next generation (NG) of radio systems and network architecture. 5G is mostly built on a new radio (NR), but the 5G (or NG) network can also build on E-UTRAN radio.
  • NR will provide bitrates on the order of 10-20 Gbit/s or higher, and will support at least enhanced mobile broadband (eMBB) and ultra-reliable low-latency- communication (URLLC) as well as massive machine type communication (mMTC).
  • eMBB enhanced mobile broadband
  • URLLC ultra-reliable low-latency- communication
  • mMTC massive machine type communication
  • NR is expected to deliver extreme broadband and ultra-robust, low latency connectivity and massive networking to support the Internet of Things (IoT).
  • IoT Internet of Things
  • M2M machine-to-machine
  • the nodes that can provide radio access functionality to a user equipment are named gNB when built on NR radio and named NG-eNB when built on E-UTRAN radio.
  • a method comprising: receiving, at a user equipment, at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions; displaying geo fencing message information upon activating the geo-fencing restrictions; and informing a network node of the activation of the geo-fencing restrictions via a measurement report.
  • an apparatus comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to at least: receive at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activate the geo-fencing restrictions; display geo-fencing message information upon activating the geo-fencing restrictions; and inform a network node of the activation of the geo-fencing restrictions via a measurement report.
  • a non-transitory computer storage medium encoded with a computer program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: receiving, at a user equipment, at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions; displaying geo-fencing message information upon activating the geo-fencing restrictions; and informing a network node of the activation of the geo-fencing restrictions via a measurement report.
  • a method comprising: receiving, at a network node, a request message from an access management function; upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforcing the geo-fencing parameters for a user equipment.
  • an apparatus comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to at least: receive a request message from an access management function; upon receiving the request message, employ a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employ an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforce the geo-fencing parameters for a user equipment.
  • a non-transitory computer storage medium encoded with a computer program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: receiving, at a network node, a request message from an access management function; upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforcing the geo-fencing parameters for a user equipment.
  • an apparatus comprising: means for receiving at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo- fenced area with active restrictions, means for activating the geo-fencing restrictions; means for displaying geo-fencing message information upon activating the geo-fencing restrictions; and means for informing a network node of the activation of the geo-fencing restrictions via a measurement report.
  • an apparatus comprising: means for receiving a request message from an access management function; upon receiving the request message, means for employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, means for employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and means for enforcing the geo-fencing parameters for a user equipment.
  • FIG. 1 illustrates a public warning system architecture, according to certain example embodiments.
  • FIG. 2 illustrates an example message sequence for idle/connected mode geo-fencing (ICMG), according to certain example embodiments.
  • FIG. 3 illustrates a user equipment operational mode for idle and connected/inactive states, according to certain example embodiments.
  • FIG. 4 illustrates a flow diagram of a method, according to certain example embodiments.
  • FIG. 5 illustrates a flow diagram of another method, according to certain example embodiments.
  • FIG. 6(a) illustrates an apparatus, according to certain example embodiments.
  • FIG. 6(b) illustrates another apparatus, according to certain example embodiments.
  • CBE cell broadcast entity
  • UE user equipment
  • quiet zones may refer to establishing geographical areas where user equipment (UE) service is not allowed or restricted. This may, for example, may be restricted service (e.g., 911 only) for civilian UEs within Department of Defense premises or specific pockets of a cell’s coverage during disaster recovery.
  • no-fly zones may refer to dynamically establishing common no-fly zones for all unmanned aerial vehicles (UAVs). With a priori knowledge of the restricted air space (no-fly zones) UAVs may better plan their routes in time and energy efficient manners.
  • Network optimization and troubleshooting may refer to enabling network optimization and troubleshooting based on a UEs precise location, not only on received power levels or delay from the serving cell.
  • bandwidth part (BWP) configuration may include certain BWP that are available in certain regions of the cell with potentially different uplink (UL) power transmission levels.
  • random access channel (RACH) parameter configuration may include dividing predicted cell coverage into different regions, which need not be aligned with synchronization signal block (SSB) coverage, and assigning different preamble identities for different regions that would correspond to different geo-fenced areas. This may allow for reduced RACH collision probability for prioritized geo-fenced areas, identifying areas within a single beam where RACH failures are predominant for further troubleshooting, and barring RACH access from areas where RACH predominates to avoid unnecessary use of resources.
  • SSB synchronization signal block
  • Network optimization techniques may be cell or beam-based. With an increase of new verticals deploying wireless services, finer granularity may be required in order to enable location based operational requirements for devices including, Internet of Things (IoT) devices and end user devices.
  • IoT Internet of Things
  • SoA solutions for access restriction and coverage and interference optimization may be based on a cell-level granularity. For example, if cell barring is enabled, it may be active for the entire cell irrespective of the users’ location within the cell. Due to the inherent nature of wireless propagation, the area covered by a cell may vary, and in certain scenarios, it may be desirable to have finer granularity on the exact area where service restrictions should apply. Moreover, certain SoA spectrum sharing methods may be based on time frequency and space. However, the space is criteria is limited to 2D area descriptions.
  • 3GPP supports geo-fencing for public warning service (PWS)/commercial mobile alert system (CMAS) use cases.
  • cell broadcast service (CBS) messages may be sent via the cell broadcast entity (CBE) to next generation-radio access network (NG-RAN) nodes, which may then broadcast system information messages with the warning messages.
  • the broadcast messages may have a geographical scope or geo-fencing data associated with them.
  • geo-fencing data is included as part of the warning broadcast messages, the UE may interpret these to determine whether messages are relevant based on its geographical location.
  • geo-fencing capabilities provided by 3GPP may be directed to displaying warning messages on end users’ devices.
  • 3GPP may provide support of unmanned aerial systems (UAS), and may support enhancements for fly-route authorization or no-fly zones. However, these fly or no-fly routes may be communicated on a per UE or unmanned aerial vehicle (UAV) basis.
  • UAV unmanned aerial vehicle
  • certain example embodiments may provide the ability of establishing no-fly zones for one, more than one, or all UAVs or UEs without the need of dedicated signaling procedures per UAV or UE.
  • certain example embodiments may provide a method for CBE triggered geo-fencing enforcement of UE(s) in idle and connected mode.
  • Certain example embodiments may also enable activation and deactivation of network access, coverage, and interference management in a given area by leveraging unified access control (UAC).
  • UAC leveraging unified access control
  • geo-fencing restrictions may be activated by the UE, and the network may be informed of these restrictions if they impact connected mode operation.
  • a UE-based activation may ensure that an end users’ privacy (e.g., location) is not revealed to the network, and at the same time, the goal of applying location- based optimizations for a population of UEs may be enabled.
  • the go-fenced areas may be defined in terms of 3D polygons. In other words, the geo- fenced areas may be defined in terms of differentiation of network access and operational parameters, which may be established based on the height of the end user device.
  • FIG. 1 illustrates a PWS architecture, according to certain example embodiments.
  • the architecture may be a 3GS PWS architecture.
  • 3GPP radio access technologies may be employed, and the use of CBS architecture may be leveraged.
  • the CBE may enable federal agencies, local/regional/state emergency operation centers, or other users of the band to broadcast messages to all UE’s within a particular region. This region may include on or more cells from one or more public land mobile networks (PLMNs).
  • PLMNs public land mobile networks
  • networks that require geo-fencing capabilities for UE access restriction in idle and/or connected mode may be required to support PWS functionality with connectivity to cell broadcast controllers (CBCs), and one or more CBEs.
  • the geographical scope of idle and/or connected mode restriction may be set in the CBE.
  • the CBC may determine the set of cells to which a CBS message may be broadcast including the geographical scope or geo-fence of each message.
  • the CBC may not be aware of which particular cells are transmitting in the band in which the geo-fencing has been activated.
  • each NG-RAN node may require enhancements to compare the geo-fencing parameterization with its active transmissions prior to taking any further actions.
  • the NG-RAN node may broadcast the idle/connected mode geo-fencing (ICMG) parameters on the bands instructed by the CBE, and the UE may store and comply with the geo-fencing requirements based on its geographical location.
  • ICMG idle/connected mode geo-fencing
  • complex geo-fencing zones may stem into requirements to transmit high payloads over the air interface.
  • message segmentation may be employed in order not to trade-off decoding reliability of the broadcast messages.
  • the ICMG capability may be enacted by enhancing the emergency broadcast request message with certain parameters (e.g., ICMG activation parameters).
  • the parameters may include a unique ID such as a unique network wide identifier for active geo-fencing restrictions.
  • Another parameter may define a duration of the restrictions, which may establish the validity and the time the UEs may store the broadcasted ICMG information.
  • a further parameter may define the geographical scope of the ICMG restrictions.
  • the geo-fenced area may be specified as 2D or 3D polygons.
  • Another parameter may define the channels that are impacted.
  • the parameter may define a list of the frequency channels impacted by the ICMG.
  • the parameter may relate to emission limits for downlink (DL) power transmission defined in terms of effective isotropic radiated power (EIRP) (e.g., dBm/MHz).
  • EIRP effective isotropic radiated power
  • different geographical zones or polygons may be defined per emission limit.
  • the parameter may relate to emission limits for UL power transmission defined in terms of EIRP (e.g., dBm/MHz).
  • EIRP effective isotropic radiated power
  • different geographical zones or polygons may be defined per emission limit.
  • the emergency broadcast request message may also be enhanced with a parameter that defines required service/access class barring parameters.
  • the required service/access class barring parameters may include access class (AC) for the device if it is AC 11 to 15.
  • the parameters may include access identity for the device.
  • the required service/access class barring parameters may include a type of access attempt that should be barred - mobile originated (MO) data, MO signaling, mobile terminated (MT) service, multimedia priority services (MPS), and mission critical services (MCS).
  • the emergency broadcast request message may be enhanced with other operational parameter restrictions for the geo-fenced area such as BWP, random access channel RACH configuration, call re-selection criteria, etc.
  • the emergency broadcast request message may be enhanced with a description of the nature of the geo-fencing limitations. For instance, a message may be displayed to the end user upon entry in a geo-fenced area where restrictions apply. In addition to the message, this may trigger an icon on the end user device (e.g., phone).
  • the modification and/or de-activation of the parameterization of an ICMG may include re-broadcasting the impacted geo-fenced areas with the updated information.
  • the duration of a restriction’s timer included in the ICMG activation parameters may be employed for the UE and NG-RAN autonomous deactivation of ICMG areas to avoid excessive broadcasting traffic.
  • Certain example embodiments may enhance pre-existing 3GPP procedures for warning messages between the CBC, RAN nodes, and the UE(s). For instance, certain existing information elements (IEs) may need to be expanded to include new warning types. In addition, new IEs may need to be defined to ensure the activation/modification/de-activation via the required ICMG parameters stated above.
  • IEs information elements
  • new IEs may need to be defined to ensure the activation/modification/de-activation via the required ICMG parameters stated above.
  • FIG. 2 illustrates an example message sequence for ICMG, according to certain example embodiments.
  • FIG. 2 illustrates a messaging procedure for an NG-RAN node ICMG activation.
  • the CBE may send an emergency request to the cell broadcaster center function (CBCF)/PWS-interworking function (IWF).
  • the CBCF/PWS-IWF may send a write -replace warning request message to the AMF, and at 210, the AMF may send a write -replace warning confirmation to the CBCF/PWS-IWF in response to the request.
  • the CBCF/PWS-IWF may send an emergency broadcast response to the CBE.
  • the AMF may send the write- replace warning request from the CBCF/PWS-IWF to the NG-RAN node, after which, at 225, the NG-RAN node may send a write-replace warning response to the AMF.
  • the NG-RAN node may also store all valid ICMG restrictions and their identities.
  • the NG-RAN node may send a cell broadcast delivery message to the UE, which may include the ICMG parameters. After receiving the ICMG parameters, the UE may, at 240, store all valid ICMG areas and restrictions.
  • the AMF may send a write-replace warning indication to the CBCF/PWS-IWF.
  • the UE may enter a geo-fenced area with active restrictions, and may display geo-fencing message information.
  • the UE may send a measurement report to the NG-RAN node, which may include activated geo-fencing restrictions and optionally a field informing the NG- RAN node to initiate radio resource control (RRC) release procedure.
  • RRC radio resource control
  • the NG-RAN node and UE may send and receive RRC release procedures.
  • the CBE may trigger an emergency broadcast request to the CBC/PWS-IWF.
  • the emergency broadcast request may be enhanced to include the ICMG activation parameters, and additional values for the warning type.
  • 3GPP defines certain permitted values, which are shown in Table 1, and may be extended to include, for example, 2D geo-fenced area for restricted operation, and 3D geo-fenced area for restricted operation.
  • the access management function may have the ability to store active write-replace warning requests for ICMG enablement.
  • the warning request may include ICMG parameters for the NG- RAN node for further processing.
  • the AMF may also have the ability to activate overload control that includes ICMG parameters and send it to NG-RAN for further processing.
  • the NG- RAN nodes may have the ability to process ICMG parameterization either within write-replace warning request or overload/access control and generate the appropriate broadcast messages as per the bands for which ICMG restrictions have been enabled/modified/disabled.
  • the NG- RAN nodes may also have the ability to broadcast geo-fencing parameters as part of the UAC in order to activate access control only in a certain region. Further, the NG-RAN nodes may have the ability to store the parameterization of all active ICMGs and their identifiers. In certain example embodiments, the UAC parameters broadcasted by the cell for which ICMG has been activated need not be the same as the ones broadcasted by the cell for non-restricted areas.
  • the UE may have the ability to acquire, decode, store, and/or enable, modify, disable access restriction for idle mode state, and operational restrictions for connected mode state based on the broadcasted geographical scope and the UE’s current location.
  • the UE may also have the ability to update its geo-fencing restrictions based on active ICMG parameters based on the UE’s position. For instance, if the UE is outside the geo-fenced area, then it may access the network (i.e., it is not considered restricted). However, if the UE is within the geo-fenced area, then it may be considered restricted.
  • the UE when the UE is in connected mode, it may have the ability to inform the network of the change in operational parameters due to entering or exiting an ICMG area. Network may also have the ability to perform graceful release of the UE’s resources due to access restrictions imposed by the ICMG area. Furthermore, in connected mode, the UE may have the ability to inform the network to trigger the graceful release of the UE’s resources due to access restrictions imposed by the ICMG area. In other example embodiments, the UE may have the ability to display the message associated with the nature of the geo-fenced restrictions, and activate an icon on the UE screen to inform end users of the reason of their potential degraded service levels.
  • the 3GPP specified write -replace warning request message may be extended to incorporate the ICMG activation parameters.
  • the CBCF using the geographical scope polygon provided by the CBE may identify which AMFs need to be contacted, and initiate the write-replace warning procedure including the list of impacted NG- RAN tracking area identities (TAI).
  • the AMF may use the list of NG-RAN TAIs to select which NG-RAN nodes the write-replace warning needs to be forwarded to.
  • the NG-RAN nodes upon receipt of these messages may employ the warning type value together with the bands for which the ICMG has been activated to determine which of its active cells are impacted.
  • the AMF may store all active write-replace requests for ICMG enablement in order to provide the geo-fencing restrictions to any cell that is operationally turned on after an emergency broadcast request procedure has concluded.
  • the AMF may provide the ICMG activation parameters during the NG setup procedure.
  • upon UE activation of the ICMG restrictions may display the message received from the CBE.
  • the displayed message may be a notification to inform the user of the nature of the geo-fencing restriction (e.g., “Commercial service is restricted in federal premises. Only emergency calls are allowed”).
  • the UE may inform the serving NG-RAN node of the activation of its restrictions via a measurement report.
  • the measurement report may include the unique network wide identifier for the activated geo-fencing restrictions. If the UE considers that the operational restrictions mandated in the geo-fenced area are unsustainable for its proper operation, the UE may inform its serving NG-RAN cell of this situation via a measurement report, and the serving cell may proceed with a handover to a more suitable target cell or a RRC release procedure.
  • FIG. 3 illustrates UE operational mode for idle and connected/inactive states, according to certain example embodiments.
  • the UE may power on. After powering on, at 305, the UE may acquire system information and PLMN and cell selection.
  • the UE may enter RRC idle mode under normal or operator service.
  • the UE may acquire system information block(s) related to the ICMG.
  • the UE may determine if mobility within the same cell and geo-fenced area is permitted. If yes, at 325, the UE may apply operational restrictions as per acquired signal information blocks (SIBs), and display a notification to the end user.
  • SIBs acquired signal information blocks
  • the procedure may return to 315 with cell reselection.
  • the UE may, at 330, enter RRC connected mode or RRC inactive mode. Further, at 335, the UE may enter a new cell with ICMG. In addition, the UE may acquire system information blocks related to the ICMG.
  • the UE may determine if mobility within the same cell and geo-fenced area is permitted. If yes, then, at 345, the UE may apply operational restrictions as per the acquired SIBs. The UE may also display a notification to the end user, and inform the serving NG-RAN cell.
  • the procedure may return to 335 with a selection of a new serving cell.
  • the UE may apply any ICMG active during the idle mode, and during transition to connected mode.
  • FIG. 3 illustrates that the UE may apply any ICMG active during connected/inactive mode, and during transition to idle mode.
  • geo-fencing enforcement for UEs may be enabled in idle and connected mode without violating end users’ privacy.
  • the restrictions may be UE triggered and apply to idle and/or connected mode.
  • Certain example embodiments may also provide means for the UEs to inform the network of the imposed restrictions that they have enabled doing to being present in a geo-fenced area, and allow for release of connections when required by the ICMG area.
  • the geo- fenced areas may be defined in terms of 3D polygons (i.e., differentiation of network access and operational parameters may be established based on the height of the end user device).
  • FIG. 4 illustrates a flow diagram of a method, according to an example embodiment.
  • the flow diagram of FIG. 4 may be performed by a mobile station and/or UE, for instance similar to apparatus 10 illustrated in FIG. 6(a).
  • the method of FIG. 4 may include, at 400, receiving, from a network node, a geo fencing parameter defining geo-fencing restrictions. Further, the method may include, at 405, upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions. In addition, the method may include, at 410, displaying geo-fencing message information upon activating the geo-fencing restrictions. Further, the method may include, at 415, informing a network node of the activation of the geo-fencing restrictions via a measurement report.
  • the geo-fencing restrictions may include access or operational restrictions of the user equipment.
  • the method may include updating the geo-fencing parameter based on a location of the user equipment.
  • the geo-fencing parameter may include at least one enhanced parameter.
  • the at least one enhanced parameter may include at least one of a unique network wide identifier for active geo-fencing restrictions, a duration of the active geo-fencing restrictions, geographical scope of the active geo-fencing restrictions, an identification of impacted channels, emission limits for downlink, emission limits for uplink, required service or access class barring parameters, operational parameter restrictions for a geo- fenced area, or a description of geo-fencing limitations.
  • the user equipment may be under an idle operation mode, a connected operation mode, or an inactive operation mode.
  • the measurement report may include a unique network wide identifier for the activated geo-fencing restrictions.
  • the method may include informing the network node of the unsustainability of the operational restrictions via the measurement report.
  • the measurement report may include a field instructing the network node to initiate radio resource control release procedure.
  • the method may include instructing the network node to change operational parameters based on a location of the user equipment.
  • FIG. 5 illustrates a flow diagram of another method, according to an example embodiment.
  • the method of FIG. 5 may be performed by a network entity or network node in a 3GPP system, such as LTE, 5G-NR or NR-U.
  • the method of FIG. 5 may be performed by a NG-RAN node, base station, eNB, or gNB for instance similar to apparatus 20 illustrated in FIG. 6(b).
  • the method of FIG. 5 may include, at 500, receiving, at a network node, a request message from an access management function.
  • the method may also include, at 505, upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated.
  • the method may further include, at 510, upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated.
  • the method may include, at 515, enforcing the geo-fencing parameter for a user equipment.
  • enforcing the geo-fencing parameter may include broadcasting the geo-fencing parameter to the user equipment on the bands.
  • the method may also include determining, based on employing the warning type value together with the bands, which radio cells are impacted by the geo-fencing parameter.
  • the method may include storing the geo-fencing parameter.
  • the method may also include receiving a measurement report from the user equipment including information of activation of geo fencing restrictions.
  • the measurement report may include a unique network wide identifier for the activated geo-fencing parameter.
  • the measurement report may include a message with update information of a change in operational parameters due to a location change of the user equipment.
  • the enforcing the geo-fencing parameter may include rejecting or releasing active connections that do not comply with the geo-fencing restrictions.
  • the geo-fencing parameter may include at least one enhanced parameter.
  • the at least one enhanced parameter may include at least one of a unique network wide identifier for active geo-fencing restrictions, a duration of the active geo-fencing restrictions, geographical scope of the active geo-fencing restrictions, an identification of impacted channels, emission limits for downlink, emission limits for uplink, required service or access class barring parameters, operational parameter restrictions for a geo- fenced area, or a description of geo-fencing limitations.
  • FIG. 6(a) illustrates an apparatus 10 according to an example embodiment.
  • apparatus 10 may be an element in a communications network or associated with such a network, such as a UE, mobile equipment (ME), mobile station, mobile device, stationary device, IoT device, or other device.
  • UE may alternatively be referred to as, for example, a mobile station, mobile equipment, mobile unit, mobile device, user device, subscriber station, wireless terminal, tablet, smart phone, IoT device, sensor or NB-IoT device, or the like.
  • apparatus 10 may be implemented in, for instance, a wireless handheld device, a wireless plug-in accessory, or the like.
  • apparatus 10 may include one or more processors, one or more computer-readable storage medium (for example, memory, storage, or the like), one or more radio access components (for example, a modem, a transceiver, or the like), and/or a user interface.
  • apparatus 10 may be configured to operate using one or more radio access technologies, such as GSM, LTE, LTE-A, NR, 5G, WLAN, WiFi, NB-IoT, Bluetooth, NFC, MulteFire, and/or any other radio access technologies. It should be noted that one of ordinary skill in the art would understand that apparatus 10 may include components or features not shown in FIG. 6(a).
  • apparatus 10 may include or be coupled to a processor 12 for processing information and executing instructions or operations.
  • processor 12 may be any type of general or specific purpose processor.
  • processor 12 may include one or more of general-purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), and processors based on a multi-core processor architecture, as examples. While a single processor 12 is shown in FIG. 6(a), multiple processors may be utilized according to other embodiments.
  • apparatus 10 may include two or more processors that may form a multiprocessor system (e.g., in this case processor 12 may represent a multiprocessor) that may support multiprocessing.
  • the multiprocessor system may be tightly coupled or loosely coupled (e.g., to form a computer cluster).
  • Processor 12 may perform functions associated with the operation of apparatus 10 including, as some examples, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 10, including processes illustrated in FIGs. 1-4.
  • Apparatus 10 may further include or be coupled to a memory 14 (internal or external), which may be coupled to processor 12, for storing information and instructions that may be executed by processor 12.
  • Memory 14 may be one or more memories and of any type suitable to the local application environment, and may be implemented using any suitable volatile or nonvolatile data storage technology such as a semiconductor-based memory device, a magnetic memory device and system, an optical memory device and system, fixed memory, and/or removable memory.
  • memory 14 can be comprised of any combination of random access memory (RAM), read only memory (ROM), static storage such as a magnetic or optical disk, hard disk drive (HDD), or any other type of non-transitory machine or computer readable media.
  • the instructions stored in memory 14 may include program instructions or computer program code that, when executed by processor 12, enable the apparatus 10 to perform tasks as described herein.
  • apparatus 10 may further include or be coupled to (internal or external) a drive or port that is configured to accept and read an external computer readable storage medium, such as an optical disc, USB drive, flash drive, or any other storage medium.
  • an external computer readable storage medium such as an optical disc, USB drive, flash drive, or any other storage medium.
  • the external computer readable storage medium may store a computer program or software for execution by processor 12 and or apparatus 10 to perform any of the methods illustrated in FIGs. 1-4.
  • apparatus 10 may also include or be coupled to one or more antennas 15 for receiving a downlink signal and for transmitting via an uplink from apparatus 10.
  • Apparatus 10 may further include a transceiver 18 configured to transmit and receive information.
  • the transceiver 18 may also include a radio interface (e.g., a modem) coupled to the antenna 15.
  • the radio interface may correspond to a plurality of radio access technologies including one or more of GSM, LTE, LTE-A, 5G, NR, WLAN, NB-IoT, Bluetooth, BT-LE, NFC, RFID, UWB, and the like.
  • the radio interface may include other components, such as filters, converters (for example, digital- to-analog converters and the like), symbol demappers, signal shaping components, an Inverse Fast Fourier Transform (IFFT) module, and the like, to process symbols, such as OFDMA symbols, carried by a downlink or an uplink.
  • filters for example, digital- to-analog converters and the like
  • symbol demappers for example, digital- to-analog converters and the like
  • signal shaping components for example, an Inverse Fast Fourier Transform (IFFT) module, and the like
  • IFFT Inverse Fast Fourier Transform
  • transceiver 18 may be configured to modulate information on to a carrier waveform for transmission by the antenna(s) 15 and demodulate information received via the antenna(s) 15 for further processing by other elements of apparatus 10.
  • transceiver 18 may be capable of transmitting and receiving signals or data directly.
  • apparatus 10 may include an input and or output device (I/O device).
  • apparatus 10 may further include a user interface, such as a graphical user interface or touchscreen.
  • memory 14 stores software modules that provide functionality when executed by processor 12. The modules may include, for example, an operating system that provides operating system functionality for apparatus 10.
  • the memory may also store one or more functional modules, such as an application or program, to provide additional functionality for apparatus 10.
  • the components of apparatus 10 may be implemented in hardware, or as any suitable combination of hardware and software. According to an example embodiment, apparatus 10 may optionally be configured to communicate with apparatus 20 via a wireless or wired communications link 70 according to any radio access technology, such as NR.
  • processor 12 and memory 14 may be included in or may form a part of processing circuitry or control circuitry.
  • transceiver 18 may be included in or may form a part of transceiving circuitry.
  • apparatus 10 may be a UE for example.
  • apparatus 10 may be controlled by memory 14 and processor 12 to perform the functions associated with example embodiments described herein.
  • apparatus 10 may be controlled by memory 14 and processor 12 to receive a geo-fencing parameter defining geo-fencing restrictions.
  • Apparatus 10 may also be controlled by memory 14 and processor 12 to, upon entering a geo-fenced area with active restrictions, activate the geo-fencing restrictions.
  • Apparatus 10 may further be controlled by memory 14 and processor 12 to display geo-fencing message information upon activating the geo-fencing restrictions.
  • Apparatus 10 may also be controlled by memory 14 and processor 12 to inform a network node of the activation of the geo-fencing restrictions via a measurement report.
  • FIG. 6(b) illustrates an apparatus 20 according to an example embodiment.
  • the apparatus 20 may be a network element, node, host, or server in a communication network or serving such a network.
  • apparatus 20 may be a NG-RAN node, base station, a Node B, an evolved Node B (eNB), 5G Node B or access point, next generation Node B (NG-NB or gNB), and/or WLAN access point, associated with a radio access network (RAN), such as an LTE network, 5G or NR.
  • RAN radio access network
  • apparatus 20 may include components or features not shown in FIG. 6(b).
  • apparatus 20 may include a processor 22 for processing information and executing instructions or operations.
  • processor 22 may be any type of general or specific purpose processor.
  • processor 22 may include one or more of general-purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), and processors based on a multi-core processor architecture, as examples. While a single processor 22 is shown in FIG. 6(b), multiple processors may be utilized according to other embodiments.
  • apparatus 20 may include two or more processors that may form a multiprocessor system (e.g., in this case processor 22 may represent a multiprocessor) that may support multiprocessing.
  • processor 22 may represent a multiprocessor
  • the multiprocessor system may be tightly coupled or loosely coupled (e.g., to form a computer cluster.
  • processor 22 may perform functions associated with the operation of apparatus 20, which may include, for example, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 20, including processes illustrated in FIGS. 1-3 and 5.
  • Apparatus 20 may further include or be coupled to a memory 24 (internal or external), which may be coupled to processor 22, for storing information and instructions that may be executed by processor 22.
  • Memory 24 may be one or more memories and of any type suitable to the local application environment, and may be implemented using any suitable volatile or nonvolatile data storage technology such as a semiconductor-based memory device, a magnetic memory device and system, an optical memory device and system, fixed memory, and/or removable memory.
  • memory 24 can be comprised of any combination of random access memory (RAM), read only memory (ROM), static storage such as a magnetic or optical disk, hard disk drive (HDD), or any other type of non-transitory machine or computer readable media.
  • the instructions stored in memory 24 may include program instructions or computer program code that, when executed by processor 22, enable the apparatus 20 to perform tasks as described herein.
  • apparatus 20 may further include or be coupled to (internal or external) a drive or port that is configured to accept and read an external computer readable storage medium, such as an optical disc, USB drive, flash drive, or any other storage medium.
  • an external computer readable storage medium such as an optical disc, USB drive, flash drive, or any other storage medium.
  • the external computer readable storage medium may store a computer program or software for execution by processor 22 and/or apparatus 20 to perform the methods illustrated in FIGS. 1-3 and 5.
  • apparatus 20 may also include or be coupled to one or more antennas 25 for transmitting and receiving signals and/or data to and from apparatus 20.
  • Apparatus 20 may further include or be coupled to a transceiver 28 configured to transmit and receive information.
  • the transceiver 28 may include, for example, a plurality of radio interfaces that may be coupled to the antenna(s) 25.
  • the radio interfaces may correspond to a plurality of radio access technologies including one or more of GSM, NB-IoT, LTE, 5G, WLAN, Bluetooth, BT-LE, NFC, radio frequency identifier (RFID), ultra wideband (UWB), MulteFire, and the like.
  • the radio interface may include components, such as filters, converters (for example, digital-to-analog converters and the like), mappers, a Fast Fourier Transform (FFT) module, and the like, to generate symbols for a transmission via one or more downlinks and to receive symbols (for example, via an uplink).
  • transceiver 28 may be configured to modulate information on to a carrier waveform for transmission by the antenna(s) 25 and demodulate information received via the antenna(s) 25 for further processing by other elements of apparatus 20.
  • transceiver 18 may be capable of transmitting and receiving signals or data directly.
  • apparatus 20 may include an input and/or output device (I/O device).
  • memory 24 may store software modules that provide functionality when executed by processor 22.
  • the modules may include, for example, an operating system that provides operating system functionality for apparatus 20.
  • the memory may also store one or more functional modules, such as an application or program, to provide additional functionality for apparatus 20.
  • the components of apparatus 20 may be implemented in hardware, or as any suitable combination of hardware and software.
  • processor 22 and memory 24 may be included in or may form a part of processing circuitry or control circuitry.
  • transceiver 28 may be included in or may form a part of transceiving circuitry.
  • circuitry may refer to hardware-only circuitry implementations (e.g., analog and/or digital circuitry), combinations of hardware circuits and software, combinations of analog and/or digital hardware circuits with software/firmware, any portions of hardware processor(s) with software (including digital signal processors) that work together to cause an apparatus (e.g., apparatus 10 and 20) to perform various functions, and/or hardware circuit(s) and/or processor(s), or portions thereof, that use software for operation but where the software may not be present when it is not needed for operation.
  • an apparatus e.g., apparatus 10 and 20
  • circuitry may also cover an implementation of merely a hardware circuit or processor (or multiple processors), or portion of a hardware circuit or processor, and its accompanying software and/or firmware.
  • the term circuitry may also cover, for example, a baseband integrated circuit in a server, cellular network node or device, or other computing or network device.
  • apparatus 20 may be a network element, node, host, or server in a communication network or serving such a network.
  • apparatus 20 may be a satellite, base station, a Node B, an evolved Node B (eNB), 5G Node B or access point, next generation Node B (NG-NB or gNB), and/or WLAN access point, associated with a radio access network (RAN), such as an LTE network, 5G or NR.
  • RAN radio access network
  • apparatus 20 may be controlled by memory 24 and processor 22 to perform the functions associated with any of the embodiments described herein.
  • apparatus 20 may be controlled by memory 24 and processor 22 to receive a request message from an access management function.
  • Apparatus 20 may also be controlled by memory 24 and processor 22 to, upon receiving the request message, employ a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated.
  • Apparatus 20 may further be controlled by memory 24 and processor 22 to, upon receiving the request message, employ an access restriction for which geo fencing parameters that define geo-fencing restrictions have been activated.
  • apparatus 20 may be controlled by memory 24 and processor 22 to enforce the geo-fencing parameter for a user equipment.
  • one example embodiment may be directed to an apparatus that includes means for receiving, at a user equipment, a geo-fencing parameter defining geo-fencing restrictions.
  • the apparatus may further include means for, upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions.
  • the apparatus may include means for displaying geo-fencing message information upon activating the geo-fencing restrictions.
  • the apparatus may include means for informing a network node of the activation of the geo-fencing restrictions via a measurement report.
  • Another example embodiment may be directed to an apparatus that includes means for receiving a request message from an access management function.
  • the apparatus may also include means for, upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated.
  • the apparatus may include means for, upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated.
  • the apparatus may include means for enforcing the geo-fencing parameter for a user equipment.
  • TDD time division duplex
  • MNO outdoor mobile network operator
  • CLI crosslink interference
  • BTSs private enterprise indoor base station transceivers
  • BTSs outdoor mobile network operator
  • other CLI scenarios may be more difficult to control since they may depend on the location of the end user devices camping on the private and MNO network.
  • an MNO end user device located indoors within the coverage of the private enterprise network may be transmitting in the UL at higher power levels to overcome the building penetration losses. These high power transmissions may potentially interfere with DL transmissions from the indoor BTSs, and block UL transmission of the indoor network devices.
  • a geo-fenced area may be established in the MNO network to restrict the UL transmission power of UEs and/or redirect these MNO UEs.
  • Certain example embodiments may also allow for establishing 3d geo-fenced areas that enable, for example, UL power restrictions for indoor MNO UEs below a certain floor where MNO UEs are not power limited. This may protect all lower floors of a building from CLI.
  • a computer program product may include one or more computer-executable components which, when the program is run, are configured to carry out some example embodiments.
  • the one or more computer-executable components may be at least one software code or portions of it. Modifications and configurations required for implementing functionality of an example embodiment may be performed as routine(s), which may be implemented as added or updated software routine(s). Software routine(s) may be downloaded into the apparatus.
  • software or a computer program code or portions of it may be in a source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, distribution medium, or computer readable medium, which may be any entity or device capable of carrying the program.
  • carrier may include a record medium, computer memory, read-only memory, photoelectrical and/or electrical carrier signal, telecommunications signal, and software distribution package, for example.
  • the computer program may be executed in a single electronic digital computer or it may be distributed amongst a number of computers.
  • the computer readable medium or computer readable storage medium may be a non-transitory medium.
  • the functionality may be performed by hardware or circuitry included in an apparatus (e.g., apparatus 10 or apparatus 20), for example through the use of an application specific integrated circuit (ASIC), a programmable gate array (PGA), a field programmable gate array (FPGA), or any other combination of hardware and software.
  • ASIC application specific integrated circuit
  • PGA programmable gate array
  • FPGA field programmable gate array
  • the functionality may be implemented as a signal, a non-tangible means that can be carried by an electromagnetic signal downloaded from the Internet or other network.
  • an apparatus such as a node, device, or a corresponding component, may be configured as circuitry, a computer or a microprocessor, such as single-chip computer element, or as a chipset, including at least a memory for providing storage capacity used for arithmetic operation and an operation processor for executing the arithmetic operation.
  • DL Downlink [0096] EIRP Effective Isotropic Radiated Power [0097] eNB Enhanced Node B [0098] gNB 5G or Next Generation NodeB [0099] ICMG Idle/Connected Mode Geo-fencing [00100] IoT Internet of Things [00101] IWF Inter- Working Function [00102] LTE Long Term Evolution [00103] MCS Mission Critical Services [00104] MO Mobile Originated [0105] MPS Multimedia Priority Services [0106] MT Mobile Terminated [0107] NG-RAN Next Generation-Radio Access Network [0108] NR New Radio
  • PLMN Public Land Mobile Network [0110] PWS Public Warning System

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Systems, methods, apparatuses, and computer program products for geo-fending enforcement. A method may include receiving, at a user equipment, a geo-fencing parameter defining geo-fencing restrictions. Further, the method may include, upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions. In addition, the method may include displaying geo-fencing message information upon activating the geo-fencing restrictions. Further, the method may include informing a network node of the activation of the geo-fencing restrictions via a measurement report.

Description

GEO-FENCING ENFORCEMENT FOR USER EQUIPMENT
FIELD:
[0001] Some example embodiments may generally relate to mobile or wireless telecommunication systems, such as Long Term Evolution (LTE) or fifth generation (5G) radio access technology or new radio (NR) access technology, or other communications systems. For example, certain example embodiments may relate to apparatuses, systems, and/or methods for geo-fencing enforcement for user equipment. In particular, certain example embodiments may relate to cell broadcast entity triggered geo-fencing enforcement for idle and connected mode user equipment operational restrictions.
BACKGROUND:
[0002] Examples of mobile or wireless telecommunication systems may include the Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN), Long Term Evolution (LTE) Evolved UTRAN (E-UTRAN), LTE- Advanced (LTE- A), MulteFire, LTE- A Pro, and/or fifth generation (5G) radio access technology or new radio (NR) access technology. Fifth generation (5G) wireless systems refer to the next generation (NG) of radio systems and network architecture. 5G is mostly built on a new radio (NR), but the 5G (or NG) network can also build on E-UTRAN radio. It is estimated that NR will provide bitrates on the order of 10-20 Gbit/s or higher, and will support at least enhanced mobile broadband (eMBB) and ultra-reliable low-latency- communication (URLLC) as well as massive machine type communication (mMTC). NR is expected to deliver extreme broadband and ultra-robust, low latency connectivity and massive networking to support the Internet of Things (IoT). With IoT and machine-to-machine (M2M) communication becoming more widespread, there will be a growing need for networks that meet the needs of lower power, low data rate, and long battery life. It is noted that, in 5G, the nodes that can provide radio access functionality to a user equipment (i.e., similar to Node B in UTRAN or eNB in LTE) are named gNB when built on NR radio and named NG-eNB when built on E-UTRAN radio.
SUMMARY: [0003] Various aspects of examples of the invention are set out in the claims.
[0004] According to a first aspect of the present invention, a method comprising: receiving, at a user equipment, at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions; displaying geo fencing message information upon activating the geo-fencing restrictions; and informing a network node of the activation of the geo-fencing restrictions via a measurement report.
[0005] According to a second aspect of the present invention, an apparatus comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to at least: receive at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activate the geo-fencing restrictions; display geo-fencing message information upon activating the geo-fencing restrictions; and inform a network node of the activation of the geo-fencing restrictions via a measurement report.
[0006] According to a third aspect of the present invention, a non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: receiving, at a user equipment, at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions; displaying geo-fencing message information upon activating the geo-fencing restrictions; and informing a network node of the activation of the geo-fencing restrictions via a measurement report. [0007] According to a fourth aspect of the present invention, a method comprising: receiving, at a network node, a request message from an access management function; upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforcing the geo-fencing parameters for a user equipment. [0008] According to a fifth aspect of the present invention, an apparatus comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to at least: receive a request message from an access management function; upon receiving the request message, employ a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employ an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforce the geo-fencing parameters for a user equipment. [0009] According to a sixth aspect of the present invention, a non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: receiving, at a network node, a request message from an access management function; upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforcing the geo-fencing parameters for a user equipment. [00010] According to a seventh aspect of the present invention, an apparatus comprising: means for receiving at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo- fenced area with active restrictions, means for activating the geo-fencing restrictions; means for displaying geo-fencing message information upon activating the geo-fencing restrictions; and means for informing a network node of the activation of the geo-fencing restrictions via a measurement report.
[00011] According to an eighth aspect of the present invention, an apparatus comprising: means for receiving a request message from an access management function; upon receiving the request message, means for employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, means for employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and means for enforcing the geo-fencing parameters for a user equipment.
BRIEF DESCRIPTION OF THE DRAWINGS:
[00012] For proper understanding of example embodiments, reference should be made to the accompanying drawings, wherein: [00013] FIG. 1 illustrates a public warning system architecture, according to certain example embodiments.
[00014] FIG. 2 illustrates an example message sequence for idle/connected mode geo-fencing (ICMG), according to certain example embodiments.
[00015] FIG. 3 illustrates a user equipment operational mode for idle and connected/inactive states, according to certain example embodiments.
[00016] FIG. 4 illustrates a flow diagram of a method, according to certain example embodiments. [00017] FIG. 5 illustrates a flow diagram of another method, according to certain example embodiments.
[00018] FIG. 6(a) illustrates an apparatus, according to certain example embodiments. [0019] FIG. 6(b) illustrates another apparatus, according to certain example embodiments.
DETAIFED DESCRIPTION:
[0020] It will be readily understood that the components of certain example embodiments, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. The following is a detailed description of some example embodiments of systems, methods, apparatuses, and computer program products for cell broadcast entity (CBE) triggered geo-fencing enforcement for idle and connected mode user equipment (UE) operational restrictions.
[0021] The features, structures, or characteristics of example embodiments described throughout this specification may be combined in any suitable manner in one or more example embodiments. For example, the usage of the phrases “certain embodiments,” “an example embodiment,” “some embodiments,” or other similar language, throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with an embodiment may be included in at least one embodiment. Thus, appearances of the phrases “in certain embodiments,” “an example embodiment,” “in some embodiments,” “in other embodiments,” or other similar language, throughout this specification do not necessarily all refer to the same group of embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more example embodiments.
[0022] Additionally, if desired, the different functions or steps discussed below may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the described functions or steps may be optional or may be combined. As such, the following description should be considered as merely illustrative of the principles and teachings of certain example embodiments, and not in limitation thereof.
[0023] Furthermore, as described herein, “quiet zones” may refer to establishing geographical areas where user equipment (UE) service is not allowed or restricted. This may, for example, may be restricted service (e.g., 911 only) for civilian UEs within Department of Defense premises or specific pockets of a cell’s coverage during disaster recovery. Further, “no-fly zones” may refer to dynamically establishing common no-fly zones for all unmanned aerial vehicles (UAVs). With a priori knowledge of the restricted air space (no-fly zones) UAVs may better plan their routes in time and energy efficient manners. “Network optimization and troubleshooting” may refer to enabling network optimization and troubleshooting based on a UEs precise location, not only on received power levels or delay from the serving cell.
[0024] In addition, spectrum sharing or slicing based on geo-fenced operational restrictions may be based on various factors. For instance, bandwidth part (BWP) configuration may include certain BWP that are available in certain regions of the cell with potentially different uplink (UL) power transmission levels. Furthermore, random access channel (RACH) parameter configuration may include dividing predicted cell coverage into different regions, which need not be aligned with synchronization signal block (SSB) coverage, and assigning different preamble identities for different regions that would correspond to different geo-fenced areas. This may allow for reduced RACH collision probability for prioritized geo-fenced areas, identifying areas within a single beam where RACH failures are predominant for further troubleshooting, and barring RACH access from areas where RACH predominates to avoid unnecessary use of resources.
[0025] Network optimization techniques may be cell or beam-based. With an increase of new verticals deploying wireless services, finer granularity may be required in order to enable location based operational requirements for devices including, Internet of Things (IoT) devices and end user devices.
[0026] Certain State of Art (SoA) solutions for access restriction and coverage and interference optimization may be based on a cell-level granularity. For example, if cell barring is enabled, it may be active for the entire cell irrespective of the users’ location within the cell. Due to the inherent nature of wireless propagation, the area covered by a cell may vary, and in certain scenarios, it may be desirable to have finer granularity on the exact area where service restrictions should apply. Moreover, certain SoA spectrum sharing methods may be based on time frequency and space. However, the space is criteria is limited to 2D area descriptions.
[0027] 3rd Generation Partnership Project (3GPP) supports geo-fencing for public warning service (PWS)/commercial mobile alert system (CMAS) use cases. In these scenarios, cell broadcast service (CBS) messages may be sent via the cell broadcast entity (CBE) to next generation-radio access network (NG-RAN) nodes, which may then broadcast system information messages with the warning messages. The broadcast messages may have a geographical scope or geo-fencing data associated with them. In particular, if geo-fencing data is included as part of the warning broadcast messages, the UE may interpret these to determine whether messages are relevant based on its geographical location. Thus, in certain cases, geo-fencing capabilities provided by 3GPP may be directed to displaying warning messages on end users’ devices. [0028] 3GPP may provide support of unmanned aerial systems (UAS), and may support enhancements for fly-route authorization or no-fly zones. However, these fly or no-fly routes may be communicated on a per UE or unmanned aerial vehicle (UAV) basis. As such, certain example embodiments may provide the ability of establishing no-fly zones for one, more than one, or all UAVs or UEs without the need of dedicated signaling procedures per UAV or UE. For instance, certain example embodiments may provide a method for CBE triggered geo-fencing enforcement of UE(s) in idle and connected mode. Certain example embodiments may also enable activation and deactivation of network access, coverage, and interference management in a given area by leveraging unified access control (UAC). According to certain example embodiments, geo-fencing restrictions may be activated by the UE, and the network may be informed of these restrictions if they impact connected mode operation. In addition, a UE-based activation may ensure that an end users’ privacy (e.g., location) is not revealed to the network, and at the same time, the goal of applying location- based optimizations for a population of UEs may be enabled. According to other example embodiments, the go-fenced areas may be defined in terms of 3D polygons. In other words, the geo- fenced areas may be defined in terms of differentiation of network access and operational parameters, which may be established based on the height of the end user device.
[0029] FIG. 1 illustrates a PWS architecture, according to certain example embodiments. According to certain example embodiments, the architecture may be a 3GS PWS architecture. According to other example embodiments, 3GPP radio access technologies may be employed, and the use of CBS architecture may be leveraged. In other example embodiments, the CBE may enable federal agencies, local/regional/state emergency operation centers, or other users of the band to broadcast messages to all UE’s within a particular region. This region may include on or more cells from one or more public land mobile networks (PLMNs). [0030] In certain example embodiments, networks that require geo-fencing capabilities for UE access restriction in idle and/or connected mode may be required to support PWS functionality with connectivity to cell broadcast controllers (CBCs), and one or more CBEs. According to certain example embodiments, the geographical scope of idle and/or connected mode restriction may be set in the CBE. In addition, the CBC may determine the set of cells to which a CBS message may be broadcast including the geographical scope or geo-fence of each message. According to other example embodiments, the CBC may not be aware of which particular cells are transmitting in the band in which the geo-fencing has been activated. As such, each NG-RAN node may require enhancements to compare the geo-fencing parameterization with its active transmissions prior to taking any further actions. Moreover, the NG-RAN node may broadcast the idle/connected mode geo-fencing (ICMG) parameters on the bands instructed by the CBE, and the UE may store and comply with the geo-fencing requirements based on its geographical location.
[0031] According to certain example embodiments, complex geo-fencing zones may stem into requirements to transmit high payloads over the air interface. However, message segmentation may be employed in order not to trade-off decoding reliability of the broadcast messages.
[0032] In certain example embodiments, the ICMG capability may be enacted by enhancing the emergency broadcast request message with certain parameters (e.g., ICMG activation parameters). For instance, according to certain example embodiments, the parameters may include a unique ID such as a unique network wide identifier for active geo-fencing restrictions. Another parameter may define a duration of the restrictions, which may establish the validity and the time the UEs may store the broadcasted ICMG information. A further parameter may define the geographical scope of the ICMG restrictions. For example, the geo-fenced area may be specified as 2D or 3D polygons. Another parameter may define the channels that are impacted. For example, the parameter may define a list of the frequency channels impacted by the ICMG.
[0033] According to certain example embodiments, the parameter may relate to emission limits for downlink (DL) power transmission defined in terms of effective isotropic radiated power (EIRP) (e.g., dBm/MHz). In addition, different geographical zones or polygons may be defined per emission limit. In other example embodiments, the parameter may relate to emission limits for UL power transmission defined in terms of EIRP (e.g., dBm/MHz). For example, different geographical zones or polygons may be defined per emission limit. The emergency broadcast request message may also be enhanced with a parameter that defines required service/access class barring parameters. For instance, the required service/access class barring parameters may include access class (AC) for the device if it is AC 11 to 15. Otherwise, the parameters may include access identity for the device. In addition, the required service/access class barring parameters may include a type of access attempt that should be barred - mobile originated (MO) data, MO signaling, mobile terminated (MT) service, multimedia priority services (MPS), and mission critical services (MCS). [0034] According to other example embodiments, the emergency broadcast request message may be enhanced with other operational parameter restrictions for the geo-fenced area such as BWP, random access channel RACH configuration, call re-selection criteria, etc. According to further example embodiments, the emergency broadcast request message may be enhanced with a description of the nature of the geo-fencing limitations. For instance, a message may be displayed to the end user upon entry in a geo-fenced area where restrictions apply. In addition to the message, this may trigger an icon on the end user device (e.g., phone).
[0035] According to certain example embodiments, the modification and/or de-activation of the parameterization of an ICMG may include re-broadcasting the impacted geo-fenced areas with the updated information. In certain example embodiments, the duration of a restriction’s timer included in the ICMG activation parameters may be employed for the UE and NG-RAN autonomous deactivation of ICMG areas to avoid excessive broadcasting traffic.
[0036] Certain example embodiments may enhance pre-existing 3GPP procedures for warning messages between the CBC, RAN nodes, and the UE(s). For instance, certain existing information elements (IEs) may need to be expanded to include new warning types. In addition, new IEs may need to be defined to ensure the activation/modification/de-activation via the required ICMG parameters stated above.
[0037] FIG. 2 illustrates an example message sequence for ICMG, according to certain example embodiments. In particular, FIG. 2 illustrates a messaging procedure for an NG-RAN node ICMG activation. At 200, the CBE may send an emergency request to the cell broadcaster center function (CBCF)/PWS-interworking function (IWF). At 205, the CBCF/PWS-IWF may send a write -replace warning request message to the AMF, and at 210, the AMF may send a write -replace warning confirmation to the CBCF/PWS-IWF in response to the request. At 215, the CBCF/PWS-IWF may send an emergency broadcast response to the CBE. Further, at 220, the AMF may send the write- replace warning request from the CBCF/PWS-IWF to the NG-RAN node, after which, at 225, the NG-RAN node may send a write-replace warning response to the AMF. At 230, the NG-RAN node may also store all valid ICMG restrictions and their identities. At 235, the NG-RAN node may send a cell broadcast delivery message to the UE, which may include the ICMG parameters. After receiving the ICMG parameters, the UE may, at 240, store all valid ICMG areas and restrictions. At 245, the AMF may send a write-replace warning indication to the CBCF/PWS-IWF.
[0038] Further, at 250, the UE may enter a geo-fenced area with active restrictions, and may display geo-fencing message information. At 255, the UE may send a measurement report to the NG-RAN node, which may include activated geo-fencing restrictions and optionally a field informing the NG- RAN node to initiate radio resource control (RRC) release procedure. At 260, the NG-RAN node and UE may send and receive RRC release procedures.
[0039] As illustrated in FIG. 2, during ICMG activation, the CBE may trigger an emergency broadcast request to the CBC/PWS-IWF. According to certain example embodiments, the emergency broadcast request may be enhanced to include the ICMG activation parameters, and additional values for the warning type. 3GPP defines certain permitted values, which are shown in Table 1, and may be extended to include, for example, 2D geo-fenced area for restricted operation, and 3D geo-fenced area for restricted operation.
Table 1. Warning Type Values
Figure imgf000010_0001
[0040] Certain example embodiments may provide some functional enhancements. For example, the access management function (AMF) may have the ability to store active write-replace warning requests for ICMG enablement. The warning request may include ICMG parameters for the NG- RAN node for further processing. The AMF may also have the ability to activate overload control that includes ICMG parameters and send it to NG-RAN for further processing. Further, the NG- RAN nodes may have the ability to process ICMG parameterization either within write-replace warning request or overload/access control and generate the appropriate broadcast messages as per the bands for which ICMG restrictions have been enabled/modified/disabled. In addition, the NG- RAN nodes may also have the ability to broadcast geo-fencing parameters as part of the UAC in order to activate access control only in a certain region. Further, the NG-RAN nodes may have the ability to store the parameterization of all active ICMGs and their identifiers. In certain example embodiments, the UAC parameters broadcasted by the cell for which ICMG has been activated need not be the same as the ones broadcasted by the cell for non-restricted areas.
[0041] According to certain example embodiments, the UE may have the ability to acquire, decode, store, and/or enable, modify, disable access restriction for idle mode state, and operational restrictions for connected mode state based on the broadcasted geographical scope and the UE’s current location. The UE may also have the ability to update its geo-fencing restrictions based on active ICMG parameters based on the UE’s position. For instance, if the UE is outside the geo-fenced area, then it may access the network (i.e., it is not considered restricted). However, if the UE is within the geo-fenced area, then it may be considered restricted. [0042] In certain example embodiments, when the UE is in connected mode, it may have the ability to inform the network of the change in operational parameters due to entering or exiting an ICMG area. Network may also have the ability to perform graceful release of the UE’s resources due to access restrictions imposed by the ICMG area. Furthermore, in connected mode, the UE may have the ability to inform the network to trigger the graceful release of the UE’s resources due to access restrictions imposed by the ICMG area. In other example embodiments, the UE may have the ability to display the message associated with the nature of the geo-fenced restrictions, and activate an icon on the UE screen to inform end users of the reason of their potential degraded service levels.
[0043] According to certain example embodiments, the 3GPP specified write -replace warning request message may be extended to incorporate the ICMG activation parameters. In addition, the CBCF using the geographical scope polygon provided by the CBE may identify which AMFs need to be contacted, and initiate the write-replace warning procedure including the list of impacted NG- RAN tracking area identities (TAI). The AMF may use the list of NG-RAN TAIs to select which NG-RAN nodes the write-replace warning needs to be forwarded to. In addition, the NG-RAN nodes upon receipt of these messages, may employ the warning type value together with the bands for which the ICMG has been activated to determine which of its active cells are impacted.
[0044] As illustrated in FIG. 2, the AMF may store all active write-replace requests for ICMG enablement in order to provide the geo-fencing restrictions to any cell that is operationally turned on after an emergency broadcast request procedure has concluded. In addition, the AMF may provide the ICMG activation parameters during the NG setup procedure. According to certain example embodiments, upon UE activation of the ICMG restrictions may display the message received from the CBE. In certain example embodiments, the displayed message may be a notification to inform the user of the nature of the geo-fencing restriction (e.g., “Commercial service is restricted in federal premises. Only emergency calls are allowed”). [0045] FIG. 2 further illustrates that for connected mode geo-fencing operational restrictions, the UE may inform the serving NG-RAN node of the activation of its restrictions via a measurement report. In certain example embodiments, the measurement report may include the unique network wide identifier for the activated geo-fencing restrictions. If the UE considers that the operational restrictions mandated in the geo-fenced area are unsustainable for its proper operation, the UE may inform its serving NG-RAN cell of this situation via a measurement report, and the serving cell may proceed with a handover to a more suitable target cell or a RRC release procedure.
[0046] FIG. 3 illustrates UE operational mode for idle and connected/inactive states, according to certain example embodiments. In particular, under the UE RRC idle mode operation, at 330, the UE may power on. After powering on, at 305, the UE may acquire system information and PLMN and cell selection. At 310, the UE may enter RRC idle mode under normal or operator service. Further, at 315, the UE may acquire system information block(s) related to the ICMG. In addition, at 320, the UE may determine if mobility within the same cell and geo-fenced area is permitted. If yes, at 325, the UE may apply operational restrictions as per acquired signal information blocks (SIBs), and display a notification to the end user. If it is determined at 320 that camping or mobility within the same cell and geo-fenced area in idle mode is not permitted, the procedure may return to 315 with cell reselection. [0047] As further illustrated in FIG. 3, the UE may, at 330, enter RRC connected mode or RRC inactive mode. Further, at 335, the UE may enter a new cell with ICMG. In addition, the UE may acquire system information blocks related to the ICMG. At 340, the UE may determine if mobility within the same cell and geo-fenced area is permitted. If yes, then, at 345, the UE may apply operational restrictions as per the acquired SIBs. The UE may also display a notification to the end user, and inform the serving NG-RAN cell. If it is determined at 340 that mobility within the same cell and geo-fenced area is not permitted, the procedure may return to 335 with a selection of a new serving cell. As also illustrated in FIG. 3, the UE may apply any ICMG active during the idle mode, and during transition to connected mode. In addition, FIG. 3 illustrates that the UE may apply any ICMG active during connected/inactive mode, and during transition to idle mode. [0048] According to certain example embodiments, geo-fencing enforcement for UEs may be enabled in idle and connected mode without violating end users’ privacy. In certain example embodiments, the restrictions may be UE triggered and apply to idle and/or connected mode. Certain example embodiments may also provide means for the UEs to inform the network of the imposed restrictions that they have enabled doing to being present in a geo-fenced area, and allow for release of connections when required by the ICMG area. Further, in certain example embodiments, the geo- fenced areas may be defined in terms of 3D polygons (i.e., differentiation of network access and operational parameters may be established based on the height of the end user device).
[0049] FIG. 4 illustrates a flow diagram of a method, according to an example embodiment. In certain example embodiments, the flow diagram of FIG. 4 may be performed by a mobile station and/or UE, for instance similar to apparatus 10 illustrated in FIG. 6(a). According to one example embodiment, the method of FIG. 4 may include, at 400, receiving, from a network node, a geo fencing parameter defining geo-fencing restrictions. Further, the method may include, at 405, upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions. In addition, the method may include, at 410, displaying geo-fencing message information upon activating the geo-fencing restrictions. Further, the method may include, at 415, informing a network node of the activation of the geo-fencing restrictions via a measurement report.
[0050] According to certain example embodiments, the geo-fencing restrictions may include access or operational restrictions of the user equipment. According to other example embodiments, the method may include updating the geo-fencing parameter based on a location of the user equipment. According to further example embodiments, the geo-fencing parameter may include at least one enhanced parameter. In certain example embodiments, the at least one enhanced parameter may include at least one of a unique network wide identifier for active geo-fencing restrictions, a duration of the active geo-fencing restrictions, geographical scope of the active geo-fencing restrictions, an identification of impacted channels, emission limits for downlink, emission limits for uplink, required service or access class barring parameters, operational parameter restrictions for a geo- fenced area, or a description of geo-fencing limitations. [0051] In other example embodiments, the user equipment may be under an idle operation mode, a connected operation mode, or an inactive operation mode. According to certain example embodiments, the measurement report may include a unique network wide identifier for the activated geo-fencing restrictions. According to other example embodiments, when operational restrictions mandated in the geo-fenced area are unsustainable for its proper operation, the method may include informing the network node of the unsustainability of the operational restrictions via the measurement report. According to further example embodiments, the measurement report may include a field instructing the network node to initiate radio resource control release procedure. In certain example embodiments, the method may include instructing the network node to change operational parameters based on a location of the user equipment. [0052] FIG. 5 illustrates a flow diagram of another method, according to an example embodiment. In an example embodiment, the method of FIG. 5 may be performed by a network entity or network node in a 3GPP system, such as LTE, 5G-NR or NR-U. For instance, in an example embodiment, the method of FIG. 5 may be performed by a NG-RAN node, base station, eNB, or gNB for instance similar to apparatus 20 illustrated in FIG. 6(b). [0053] According to an example embodiment, the method of FIG. 5 may include, at 500, receiving, at a network node, a request message from an access management function. The method may also include, at 505, upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated. The method may further include, at 510, upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated. Further, the method may include, at 515, enforcing the geo-fencing parameter for a user equipment. In certain example embodiments, enforcing the geo-fencing parameter may include broadcasting the geo-fencing parameter to the user equipment on the bands.
[0054] According to certain example embodiments, the method may also include determining, based on employing the warning type value together with the bands, which radio cells are impacted by the geo-fencing parameter. According to other example embodiments, the method may include storing the geo-fencing parameter. In certain example embodiments, the method may also include receiving a measurement report from the user equipment including information of activation of geo fencing restrictions. In other example embodiments, the measurement report may include a unique network wide identifier for the activated geo-fencing parameter. In further example embodiments, the measurement report may include a message with update information of a change in operational parameters due to a location change of the user equipment. According to certain example embodiments, the enforcing the geo-fencing parameter may include rejecting or releasing active connections that do not comply with the geo-fencing restrictions.
[0055] According to further example embodiments, the geo-fencing parameter may include at least one enhanced parameter. In certain example embodiments, the at least one enhanced parameter may include at least one of a unique network wide identifier for active geo-fencing restrictions, a duration of the active geo-fencing restrictions, geographical scope of the active geo-fencing restrictions, an identification of impacted channels, emission limits for downlink, emission limits for uplink, required service or access class barring parameters, operational parameter restrictions for a geo- fenced area, or a description of geo-fencing limitations. [0056] FIG. 6(a) illustrates an apparatus 10 according to an example embodiment. In an embodiment, apparatus 10 may be an element in a communications network or associated with such a network, such as a UE, mobile equipment (ME), mobile station, mobile device, stationary device, IoT device, or other device. As described herein, UE may alternatively be referred to as, for example, a mobile station, mobile equipment, mobile unit, mobile device, user device, subscriber station, wireless terminal, tablet, smart phone, IoT device, sensor or NB-IoT device, or the like. As one example, apparatus 10 may be implemented in, for instance, a wireless handheld device, a wireless plug-in accessory, or the like.
[0057] In some example embodiments, apparatus 10 may include one or more processors, one or more computer-readable storage medium (for example, memory, storage, or the like), one or more radio access components (for example, a modem, a transceiver, or the like), and/or a user interface. In some embodiments, apparatus 10 may be configured to operate using one or more radio access technologies, such as GSM, LTE, LTE-A, NR, 5G, WLAN, WiFi, NB-IoT, Bluetooth, NFC, MulteFire, and/or any other radio access technologies. It should be noted that one of ordinary skill in the art would understand that apparatus 10 may include components or features not shown in FIG. 6(a).
[0058] As illustrated in the example of FIG. 6(a), apparatus 10 may include or be coupled to a processor 12 for processing information and executing instructions or operations. Processor 12 may be any type of general or specific purpose processor. In fact, processor 12 may include one or more of general-purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), and processors based on a multi-core processor architecture, as examples. While a single processor 12 is shown in FIG. 6(a), multiple processors may be utilized according to other embodiments. For example, it should be understood that, in certain example embodiments, apparatus 10 may include two or more processors that may form a multiprocessor system (e.g., in this case processor 12 may represent a multiprocessor) that may support multiprocessing. According to certain example embodiments, the multiprocessor system may be tightly coupled or loosely coupled (e.g., to form a computer cluster). [0059] Processor 12 may perform functions associated with the operation of apparatus 10 including, as some examples, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 10, including processes illustrated in FIGs. 1-4. [0060] Apparatus 10 may further include or be coupled to a memory 14 (internal or external), which may be coupled to processor 12, for storing information and instructions that may be executed by processor 12. Memory 14 may be one or more memories and of any type suitable to the local application environment, and may be implemented using any suitable volatile or nonvolatile data storage technology such as a semiconductor-based memory device, a magnetic memory device and system, an optical memory device and system, fixed memory, and/or removable memory. For example, memory 14 can be comprised of any combination of random access memory (RAM), read only memory (ROM), static storage such as a magnetic or optical disk, hard disk drive (HDD), or any other type of non-transitory machine or computer readable media. The instructions stored in memory 14 may include program instructions or computer program code that, when executed by processor 12, enable the apparatus 10 to perform tasks as described herein.
[0061] In an embodiment, apparatus 10 may further include or be coupled to (internal or external) a drive or port that is configured to accept and read an external computer readable storage medium, such as an optical disc, USB drive, flash drive, or any other storage medium. For example, the external computer readable storage medium may store a computer program or software for execution by processor 12 and or apparatus 10 to perform any of the methods illustrated in FIGs. 1-4.
[0062] In some embodiments, apparatus 10 may also include or be coupled to one or more antennas 15 for receiving a downlink signal and for transmitting via an uplink from apparatus 10. Apparatus 10 may further include a transceiver 18 configured to transmit and receive information. The transceiver 18 may also include a radio interface (e.g., a modem) coupled to the antenna 15. The radio interface may correspond to a plurality of radio access technologies including one or more of GSM, LTE, LTE-A, 5G, NR, WLAN, NB-IoT, Bluetooth, BT-LE, NFC, RFID, UWB, and the like. The radio interface may include other components, such as filters, converters (for example, digital- to-analog converters and the like), symbol demappers, signal shaping components, an Inverse Fast Fourier Transform (IFFT) module, and the like, to process symbols, such as OFDMA symbols, carried by a downlink or an uplink.
[0063] For instance, transceiver 18 may be configured to modulate information on to a carrier waveform for transmission by the antenna(s) 15 and demodulate information received via the antenna(s) 15 for further processing by other elements of apparatus 10. In other embodiments, transceiver 18 may be capable of transmitting and receiving signals or data directly. Additionally or alternatively, in some embodiments, apparatus 10 may include an input and or output device (I/O device). In certain embodiments, apparatus 10 may further include a user interface, such as a graphical user interface or touchscreen. [0064] In an embodiment, memory 14 stores software modules that provide functionality when executed by processor 12. The modules may include, for example, an operating system that provides operating system functionality for apparatus 10. The memory may also store one or more functional modules, such as an application or program, to provide additional functionality for apparatus 10. The components of apparatus 10 may be implemented in hardware, or as any suitable combination of hardware and software. According to an example embodiment, apparatus 10 may optionally be configured to communicate with apparatus 20 via a wireless or wired communications link 70 according to any radio access technology, such as NR.
[0065] According to certain example embodiments, processor 12 and memory 14 may be included in or may form a part of processing circuitry or control circuitry. In addition, in some embodiments, transceiver 18 may be included in or may form a part of transceiving circuitry.
[0066] As discussed above, according to certain example embodiments, apparatus 10 may be a UE for example. According to certain embodiments, apparatus 10 may be controlled by memory 14 and processor 12 to perform the functions associated with example embodiments described herein. For instance, in one embodiment, apparatus 10 may be controlled by memory 14 and processor 12 to receive a geo-fencing parameter defining geo-fencing restrictions. Apparatus 10 may also be controlled by memory 14 and processor 12 to, upon entering a geo-fenced area with active restrictions, activate the geo-fencing restrictions. Apparatus 10 may further be controlled by memory 14 and processor 12 to display geo-fencing message information upon activating the geo-fencing restrictions. Apparatus 10 may also be controlled by memory 14 and processor 12 to inform a network node of the activation of the geo-fencing restrictions via a measurement report.
[0067] FIG. 6(b) illustrates an apparatus 20 according to an example embodiment. In an example embodiment, the apparatus 20 may be a network element, node, host, or server in a communication network or serving such a network. For example, apparatus 20 may be a NG-RAN node, base station, a Node B, an evolved Node B (eNB), 5G Node B or access point, next generation Node B (NG-NB or gNB), and/or WLAN access point, associated with a radio access network (RAN), such as an LTE network, 5G or NR. It should be noted that one of ordinary skill in the art would understand that apparatus 20 may include components or features not shown in FIG. 6(b).
[0068] As illustrated in the example of FIG. 6(b), apparatus 20 may include a processor 22 for processing information and executing instructions or operations. Processor 22 may be any type of general or specific purpose processor. For example, processor 22 may include one or more of general-purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs), field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), and processors based on a multi-core processor architecture, as examples. While a single processor 22 is shown in FIG. 6(b), multiple processors may be utilized according to other embodiments. For example, it should be understood that, in certain embodiments, apparatus 20 may include two or more processors that may form a multiprocessor system (e.g., in this case processor 22 may represent a multiprocessor) that may support multiprocessing. In certain embodiments, the multiprocessor system may be tightly coupled or loosely coupled (e.g., to form a computer cluster.
[0069] According to certain example embodiments, processor 22 may perform functions associated with the operation of apparatus 20, which may include, for example, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 20, including processes illustrated in FIGS. 1-3 and 5.
[0070] Apparatus 20 may further include or be coupled to a memory 24 (internal or external), which may be coupled to processor 22, for storing information and instructions that may be executed by processor 22. Memory 24 may be one or more memories and of any type suitable to the local application environment, and may be implemented using any suitable volatile or nonvolatile data storage technology such as a semiconductor-based memory device, a magnetic memory device and system, an optical memory device and system, fixed memory, and/or removable memory. For example, memory 24 can be comprised of any combination of random access memory (RAM), read only memory (ROM), static storage such as a magnetic or optical disk, hard disk drive (HDD), or any other type of non-transitory machine or computer readable media. The instructions stored in memory 24 may include program instructions or computer program code that, when executed by processor 22, enable the apparatus 20 to perform tasks as described herein.
[0071] In an embodiment, apparatus 20 may further include or be coupled to (internal or external) a drive or port that is configured to accept and read an external computer readable storage medium, such as an optical disc, USB drive, flash drive, or any other storage medium. For example, the external computer readable storage medium may store a computer program or software for execution by processor 22 and/or apparatus 20 to perform the methods illustrated in FIGS. 1-3 and 5.
[0072] In certain example embodiments, apparatus 20 may also include or be coupled to one or more antennas 25 for transmitting and receiving signals and/or data to and from apparatus 20. Apparatus 20 may further include or be coupled to a transceiver 28 configured to transmit and receive information. The transceiver 28 may include, for example, a plurality of radio interfaces that may be coupled to the antenna(s) 25. The radio interfaces may correspond to a plurality of radio access technologies including one or more of GSM, NB-IoT, LTE, 5G, WLAN, Bluetooth, BT-LE, NFC, radio frequency identifier (RFID), ultra wideband (UWB), MulteFire, and the like. The radio interface may include components, such as filters, converters (for example, digital-to-analog converters and the like), mappers, a Fast Fourier Transform (FFT) module, and the like, to generate symbols for a transmission via one or more downlinks and to receive symbols (for example, via an uplink). [0073] As such, transceiver 28 may be configured to modulate information on to a carrier waveform for transmission by the antenna(s) 25 and demodulate information received via the antenna(s) 25 for further processing by other elements of apparatus 20. In other embodiments, transceiver 18 may be capable of transmitting and receiving signals or data directly. Additionally or alternatively, in some embodiments, apparatus 20 may include an input and/or output device (I/O device).
[0074] In an embodiment, memory 24 may store software modules that provide functionality when executed by processor 22. The modules may include, for example, an operating system that provides operating system functionality for apparatus 20. The memory may also store one or more functional modules, such as an application or program, to provide additional functionality for apparatus 20. The components of apparatus 20 may be implemented in hardware, or as any suitable combination of hardware and software.
[0075] According to some embodiments, processor 22 and memory 24 may be included in or may form a part of processing circuitry or control circuitry. In addition, in some embodiments, transceiver 28 may be included in or may form a part of transceiving circuitry.
[0076] As used herein, the term “circuitry” may refer to hardware-only circuitry implementations (e.g., analog and/or digital circuitry), combinations of hardware circuits and software, combinations of analog and/or digital hardware circuits with software/firmware, any portions of hardware processor(s) with software (including digital signal processors) that work together to cause an apparatus (e.g., apparatus 10 and 20) to perform various functions, and/or hardware circuit(s) and/or processor(s), or portions thereof, that use software for operation but where the software may not be present when it is not needed for operation. As a further example, as used herein, the term “circuitry” may also cover an implementation of merely a hardware circuit or processor (or multiple processors), or portion of a hardware circuit or processor, and its accompanying software and/or firmware. The term circuitry may also cover, for example, a baseband integrated circuit in a server, cellular network node or device, or other computing or network device.
[0077] As introduced above, in certain embodiments, apparatus 20 may be a network element, node, host, or server in a communication network or serving such a network. For example, apparatus 20 may be a satellite, base station, a Node B, an evolved Node B (eNB), 5G Node B or access point, next generation Node B (NG-NB or gNB), and/or WLAN access point, associated with a radio access network (RAN), such as an LTE network, 5G or NR. According to certain embodiments, apparatus 20 may be controlled by memory 24 and processor 22 to perform the functions associated with any of the embodiments described herein.
[0078] For instance, in one embodiment, apparatus 20 may be controlled by memory 24 and processor 22 to receive a request message from an access management function. Apparatus 20 may also be controlled by memory 24 and processor 22 to, upon receiving the request message, employ a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated. Apparatus 20 may further be controlled by memory 24 and processor 22 to, upon receiving the request message, employ an access restriction for which geo fencing parameters that define geo-fencing restrictions have been activated. Further, apparatus 20 may be controlled by memory 24 and processor 22 to enforce the geo-fencing parameter for a user equipment.
[0079] Further example embodiments may provide means for performing any of the functions, steps, or procedures described herein. For example, one example embodiment may be directed to an apparatus that includes means for receiving, at a user equipment, a geo-fencing parameter defining geo-fencing restrictions. The apparatus may further include means for, upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions. In addition, the apparatus may include means for displaying geo-fencing message information upon activating the geo-fencing restrictions. Further, the apparatus may include means for informing a network node of the activation of the geo-fencing restrictions via a measurement report.
[0080] Another example embodiment may be directed to an apparatus that includes means for receiving a request message from an access management function. The apparatus may also include means for, upon receiving the request message, employing a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated. In addition, the apparatus may include means for, upon receiving the request message, employing an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated. Further, the apparatus may include means for enforcing the geo-fencing parameter for a user equipment.
[0081] Certain example embodiments described herein provide several technical improvements, enhancements, and /or advantages. In some example embodiments, it may be possible to provide crosslink interference mitigation in indoor scenarios. For instance, time division duplex (TDD) network deployments where different TDD frame configurations are permitted to enable diverse use cases may experience crosslink interference (CLI). Private enterprise indoor networks may require different TDD frame configurations from those of outdoor mobile network operator (MNO) networks some of the CLI scenarios may be controlled or mitigated by ensuring, for example, minimum isolation requirements between the private enterprise indoor base station transceivers (BTSs), and the outdoor MNO BTSs. Further, other CLI scenarios may be more difficult to control since they may depend on the location of the end user devices camping on the private and MNO network.
[0082] According to certain example embodiments, an MNO end user device located indoors within the coverage of the private enterprise network may be transmitting in the UL at higher power levels to overcome the building penetration losses. These high power transmissions may potentially interfere with DL transmissions from the indoor BTSs, and block UL transmission of the indoor network devices. With certain example embodiments, a geo-fenced area may be established in the MNO network to restrict the UL transmission power of UEs and/or redirect these MNO UEs. Certain example embodiments may also allow for establishing 3d geo-fenced areas that enable, for example, UL power restrictions for indoor MNO UEs below a certain floor where MNO UEs are not power limited. This may protect all lower floors of a building from CLI.
[0083] A computer program product may include one or more computer-executable components which, when the program is run, are configured to carry out some example embodiments. The one or more computer-executable components may be at least one software code or portions of it. Modifications and configurations required for implementing functionality of an example embodiment may be performed as routine(s), which may be implemented as added or updated software routine(s). Software routine(s) may be downloaded into the apparatus.
[0084] As an example, software or a computer program code or portions of it may be in a source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, distribution medium, or computer readable medium, which may be any entity or device capable of carrying the program. Such carriers may include a record medium, computer memory, read-only memory, photoelectrical and/or electrical carrier signal, telecommunications signal, and software distribution package, for example. Depending on the processing power needed, the computer program may be executed in a single electronic digital computer or it may be distributed amongst a number of computers. The computer readable medium or computer readable storage medium may be a non-transitory medium.
[0085] In other example embodiments, the functionality may be performed by hardware or circuitry included in an apparatus (e.g., apparatus 10 or apparatus 20), for example through the use of an application specific integrated circuit (ASIC), a programmable gate array (PGA), a field programmable gate array (FPGA), or any other combination of hardware and software. In yet another example embodiment, the functionality may be implemented as a signal, a non-tangible means that can be carried by an electromagnetic signal downloaded from the Internet or other network.
[0086] According to an example embodiment, an apparatus, such as a node, device, or a corresponding component, may be configured as circuitry, a computer or a microprocessor, such as single-chip computer element, or as a chipset, including at least a memory for providing storage capacity used for arithmetic operation and an operation processor for executing the arithmetic operation.
[0087] One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these example embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of example embodiments. Although the above embodiments refer to 5G NR and LTE technology, the above embodiments may also apply to any other present or future 3GPP technology, such as LTE-advanced, and/or fourth generation (4G) technology.
[0088] Partial Glossary [0089] AMF Access Management Function [0090] BTS Base Station Transceiver [0091] CBC Cell Broadcast Controller [0092] CBE Cell Broadcast Entity [0093] CBS Cell Broadcast Service
[0094] CMAS Commercial Mobile Alert System
[0095] DL Downlink [0096] EIRP Effective Isotropic Radiated Power [0097] eNB Enhanced Node B [0098] gNB 5G or Next Generation NodeB [0099] ICMG Idle/Connected Mode Geo-fencing [00100] IoT Internet of Things [00101] IWF Inter- Working Function [00102] LTE Long Term Evolution [00103] MCS Mission Critical Services [00104] MO Mobile Originated [0105] MPS Multimedia Priority Services [0106] MT Mobile Terminated [0107] NG-RAN Next Generation-Radio Access Network [0108] NR New Radio
[0109] PLMN Public Land Mobile Network [0110] PWS Public Warning System
[0111] RACH Random Access Channel
[0112] SSB Synchronization Signal Block [0113] TAI Tracking Area Identity [0114] UAC Unified Access Control [0115] UAS Unmanned Aerial System [0116] UAV Unmanned Aerial vehicle [0117] UE User Equipment [0118] UL Uplink

Claims

CLAIMS WE CLAIM:
1. A method, comprising: receiving, at a user equipment, at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activating the geo-fencing restrictions; displaying geo-fencing message information upon activating the geo-fencing restrictions; and informing a network node of the activation of the geo-fencing restrictions via a measurement report.
2. The method according to claim 1, wherein the geo-fencing restrictions comprises access or operational restrictions of the user equipment.
3. The method according to claim 1, further comprising updating the at least one geo-fencing parameter based on a location of the user equipment.
4. The method according to claim 1 , wherein the at least one geo-fencing parameter comprises at least one of: a unique network wide identifier for active geo-fencing restrictions; a duration of the active geo-fencing restrictions; geographical scope of the active geo-fencing restrictions; an identification of impacted channels; emission limits for downlink; emission limits for uplink; required service or access class barring parameters; operational parameter restrictions for a geo-fenced area; or a description of geo-fencing limitations.
5. The method according to claim 1, wherein the user equipment is under an idle operation mode, a connected operation mode, or an inactive operation mode.
6. The method according to claim 1, wherein the measurement report comprises a unique network wide identifier for the activated geo-fencing restrictions.
7. The method according to claim 1, wherein if operational restrictions mandated in the geo- fenced area are unsustainable for its proper operation, the method further comprises informing the network node of this situation via the measurement report.
8. The method according to claim 7, wherein the measurement report comprises a field instructing the network node to initiate radio resource control release procedure.
9. The method according to claim 1 , further comprising instructing the network node to change operational parameters based on a location of the user equipment.
10. An apparatus, comprising: at least one processor; and at least one memory comprising computer program code, the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive at least one geo-fencing parameter defining geo-fencing restrictions; upon entering a geo-fenced area with active restrictions, activate the geo-fencing restrictions; display geo-fencing message information upon activating the geo-fencing restrictions; and inform a network node of the activation of the geo-fencing restrictions via a measurement report.
11. The apparatus according to claim 10, wherein the geo-fencing restrictions comprises access or operational restrictions of the apparatus.
12. The apparatus according to claim 10, wherein the apparatus is further caused to update the at least one geo-fencing parameter based on a location of the apparatus.
13. The apparatus according to claim 10, wherein the at least one geo-fencing parameter comprises at least one of: a unique network wide identifier for active geo-fencing restrictions; a duration of the active geo-fencing restrictions; geographical scope of the active geo-fencing restrictions; an identification of impacted channels; emission limits for downlink; emission limits for uplink; required service or access class barring parameters; operational parameter restrictions for a geo-fenced area; or a description of geo-fencing limitations.
14. The apparatus according to claim 10, wherein the apparatus is under an idle operation mode, a connected operation mode, or an inactive operation mode.
15. The apparatus according to claim 10, wherein the measurement report comprises a unique network wide identifier for the activated geo-fencing restrictions.
16. The apparatus according to claim 10, wherein if operational restrictions mandated in the geo- fenced area are unsustainable for its proper operation, the apparatus is further caused to inform the network node of this situation via the measurement report.
17. The apparatus according to claim 16, wherein the measurement report comprises a field instructing the network node to initiate radio resource control release procedure.
18. The apparatus according to claim 10, wherein the apparatus is further caused to instruct the network node to change operational parameters based on a location of the apparatus.
19. An apparatus, comprising: at least one processor; and at least one memory comprising computer program code, the at least one memory and computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive a request message from an access management function; upon receiving the request message, employ a warning type value together with bands for which geo-fencing parameters that define geo-fencing restrictions have been activated; and upon receiving the request message, employ an access restriction for which geo-fencing parameters that define geo-fencing restrictions have been activated; and enforce the geo-fencing parameters for a user equipment.
20. The apparatus according to claim 19, wherein enforcing the geo-fencing parameters comprises broadcasting the geo-fencing parameters to the user equipment on the bands.
PCT/IB2021/052446 2020-04-15 2021-03-24 Geo-fencing enforcement for user equipment WO2021209843A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202063010506P 2020-04-15 2020-04-15
US63/010,506 2020-04-15

Publications (1)

Publication Number Publication Date
WO2021209843A1 true WO2021209843A1 (en) 2021-10-21

Family

ID=75252598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2021/052446 WO2021209843A1 (en) 2020-04-15 2021-03-24 Geo-fencing enforcement for user equipment

Country Status (1)

Country Link
WO (1) WO2021209843A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023277758A1 (en) * 2021-07-01 2023-01-05 Telefonaktiebolaget Lm Ericsson (Publ) Public warning system (pws) reception by aerial user equipment (ue)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090170528A1 (en) * 2007-12-27 2009-07-02 Trueposition, Inc. Subscriber Selective, Area-based Service Control
US20140302879A1 (en) * 2013-04-08 2014-10-09 Samsung Electronics Co., Ltd. Electronic device and method for receiving geo-fence service with low power consumption
WO2016196496A1 (en) * 2015-06-02 2016-12-08 GeoFrenzy, Inc. Geofence information delivery systems and methods
US9918212B1 (en) * 2015-07-09 2018-03-13 GeoVisible, Inc. Method and system for user equipment identification in a network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090170528A1 (en) * 2007-12-27 2009-07-02 Trueposition, Inc. Subscriber Selective, Area-based Service Control
US20140302879A1 (en) * 2013-04-08 2014-10-09 Samsung Electronics Co., Ltd. Electronic device and method for receiving geo-fence service with low power consumption
WO2016196496A1 (en) * 2015-06-02 2016-12-08 GeoFrenzy, Inc. Geofence information delivery systems and methods
US9918212B1 (en) * 2015-07-09 2018-03-13 GeoVisible, Inc. Method and system for user equipment identification in a network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023277758A1 (en) * 2021-07-01 2023-01-05 Telefonaktiebolaget Lm Ericsson (Publ) Public warning system (pws) reception by aerial user equipment (ue)

Similar Documents

Publication Publication Date Title
US10652757B2 (en) Base station, machine-to-machine (M2M) terminal, method, and computer readable medium
US9516551B2 (en) Interference mitigation of D2D communications in different coverage scenarios
CN111727641A (en) UE, network node and method for handling group paging in a wireless communication network
WO2021063411A1 (en) Methods and apparatuses for sidelink operations
EP3772865A1 (en) Enhanced radio frequency band scanning
EP3753320B1 (en) Electronic device, infrastructure equipment and method to transmit a paging message
EP4335187A1 (en) Efficient registration in an area where a slice service is supported partially
WO2021209843A1 (en) Geo-fencing enforcement for user equipment
US20240188021A1 (en) Simultaneous registration to multiple networks
US11696145B2 (en) Registered and unregistered operation for shared band wireless nodes within wireless networks
US20230033096A1 (en) Systems and methods for supporting multi-usim user equipment
WO2021186057A1 (en) Resource allocation fencing for sidelink transmissions
CN116746234A (en) Configuration indication
KR20210019973A (en) System information request and acquisition in a connected mode
US11943812B2 (en) Determining random access channel (RACH) resources or parameters based on network slice-based resource allocation classes (RACs)
US20220279621A1 (en) Emergency operations slice exchange between entities in mobile networks
US20210321255A1 (en) Method and apparatus for verifying mobile device communications
EP4030812A1 (en) Steering of terminals in case of disaster
WO2018226129A1 (en) Handling access to a wireless communications network
US20220322197A1 (en) Network Based Paging False Alarm Mitigation
CN116250303A (en) Paging false alarm mitigation at user equipment
CN117204047A (en) Adaptive cell selection, reselection and mobility assistance techniques

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21714688

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21714688

Country of ref document: EP

Kind code of ref document: A1