WO2022056688A1 - Devices, methods, apparatuses and computer readable media for performing surveillance - Google Patents
Devices, methods, apparatuses and computer readable media for performing surveillance Download PDFInfo
- Publication number
- WO2022056688A1 WO2022056688A1 PCT/CN2020/115402 CN2020115402W WO2022056688A1 WO 2022056688 A1 WO2022056688 A1 WO 2022056688A1 CN 2020115402 W CN2020115402 W CN 2020115402W WO 2022056688 A1 WO2022056688 A1 WO 2022056688A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- surveillance
- request
- response
- accepts
- example embodiments
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 71
- 230000004044 response Effects 0.000 claims abstract description 73
- 230000015654 memory Effects 0.000 claims description 29
- 239000000523 sample Substances 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 23
- 230000006399 behavior Effects 0.000 claims description 15
- 230000006854 communication Effects 0.000 description 35
- 238000004891 communication Methods 0.000 description 35
- 230000008569 process Effects 0.000 description 20
- 230000004807 localization Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000005259 measurement Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 241001465754 Metazoa Species 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 102100022734 Acyl carrier protein, mitochondrial Human genes 0.000 description 1
- 101000678845 Homo sapiens Acyl carrier protein, mitochondrial Proteins 0.000 description 1
- 208000003443 Unconsciousness Diseases 0.000 description 1
- 238000004873 anchoring Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000012517 data analytics Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0205—Details
Definitions
- Embodiments of the present disclosure generally relate to the field of telecommunication and in particular, to devices, methods, apparatuses and computer readable media for performing surveillance.
- the current indoor localization for the target device is performed without being perceived by a carrier of the target device. If the location of the target device was used for illegal or profitable business purpose, there would cause problems of security and privacy.
- example embodiments of the present disclosure provide a solution for performing surveillance.
- a first device comprising at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the first device to: transmit to a second device a request for surveillance of the second device; receive a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, perform the surveillance of the second device.
- a second device comprising at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the second device to: receive from a first device a request for surveillance of the second device; determine whether to accept or reject the surveillance; and transmit to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- a fourth device comprises at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the fourth device to: receive from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- a method implemented at a device comprises: transmitting from a first device to a second device a request for surveillance of the second device; receiving a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
- a method implemented at a device comprises: receiving at a second device from a first device a request for surveillance of the second device; determining whether to accept or reject the surveillance; and transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- a method implemented at a device comprises: receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- an apparatus comprises: means for transmitting from a first device to a second device a request for surveillance of the second device; means for receiving a response to the request from the second device; and means for in accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
- an apparatus comprises: means for receiving at a second device from a first device a request for surveillance of the second device; means for determining whether to accept or reject the surveillance; and means for transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- an apparatus comprises: means for receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above fourth aspect.
- a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above fifth aspect.
- a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above sixth aspect.
- Fig. 1 shows an example communication network in which embodiments of the present disclosure may be implemented
- Fig. 2 shows a signaling chart illustrating a process for performing surveillance in accordance with some example embodiments of the present disclosure
- FIG. 3 shows a flowchart of a method implemented at a first device in accordance with some example embodiments of the present disclosure
- Fig. 4 shows a flowchart of a method implemented at a second device in accordance with some example embodiments of the present disclosure
- Fig. 5 shows a flowchart of a method implemented at a fourth device in accordance with some example embodiments of the present disclosure
- Fig. 6 shows a simplified block diagram of an apparatus that is suitable for implementing some other embodiments of the present disclosure.
- Fig. 7 shows a block diagram of an example computer readable medium in accordance with some example embodiments of the present disclosure.
- references in the present disclosure to “one embodiment, ” “an embodiment, ” “an example embodiment, ” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an example embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
- first and second etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments.
- the term “and/or” includes any and all combinations of one or more of the listed terms.
- circuitry may refer to one or more or all of the following:
- circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware.
- circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
- the term “communication network” refers to a network following any suitable communication standards, such as fifth generation (5G) systems, Long Term Evolution (LTE) , LTE-Advanced (LTE-A) , Wideband Code Division Multiple Access (WCDMA) , High-Speed Packet Access (HSPA) , Narrow Band Internet of Things (NB-IoT) and so on.
- 5G fifth generation
- LTE Long Term Evolution
- LTE-A LTE-Advanced
- WCDMA Wideband Code Division Multiple Access
- HSPA High-Speed Packet Access
- NB-IoT Narrow Band Internet of Things
- the communications between a mobile device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the future fifth generation (5G) new radio (NR) communication protocols, and/or any other protocols either currently known or to be developed in the future.
- any suitable generation communication protocols including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the future fifth generation (5G) new radio (NR) communication protocols, and/or any other protocols either currently known or to be developed in the future.
- Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting
- the term “network device” refers to a node in a communication network via which a mobile device accesses the network and receives services therefrom.
- the network device may refer to a base station (BS) or an access point (AP) , for example, a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , a NR Next Generation NodeB (gNB) , a Remote Radio Unit (RRU) , a radio header (RH) , a remote radio head (RRH) , a relay, a low power node such as a femto, a pico, and so forth, depending on the applied terminology and technology.
- An RAN split architecture comprises a gNB-CU (Centralized unit, hosting RRC, SDAP and PDCP) controlling a plurality of gNB-DUs (Distributed unit, hosting RLC, MAC and PHY) .
- gNB-CU Centralized unit, hosting
- mobile device refers to any end device that may be capable of wireless communication.
- a mobile device may also be referred to as a communication device, user equipment (UE) , a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) .
- UE user equipment
- SS Subscriber Station
- MS Mobile Station
- AT Access Terminal
- the mobile device may include, but not limited to, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable mobile device, a personal digital assistant (PDA) , portable computers, desktop computer, image capture mobile devices such as digital cameras, gaming mobile devices, music storage and playback appliances, vehicle-mounted wireless mobile devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , USB dongles, smart devices, wireless customer-premises equipment (CPE) , an Internet of Things (IoT) device, a watch or other wearable, a head-mounted display (HMD) , a vehicle, a drone, a medical device and applications (e.g., remote surgery) , an industrial device and applications (e.g., a robot and/or other wireless devices operating in an industrial and/or an automated processing chain contexts) , a consumer electronics device, a device operating on commercial and/
- a user equipment apparatus such as a cell phone or tablet computer or laptop computer or desktop computer or mobile IoT device or fixed IoT device
- This user equipment apparatus can, for example, be furnished with corresponding capabilities as described in connection with the fixed and/or the wireless network node (s) , as appropriate.
- the user equipment apparatus may be the user equipment and/or or a control device, such as a chipset or processor, configured to control the user equipment when installed therein. Examples of such functionalities include the bootstrapping server function and/or the home subscriber server, which may be implemented in the user equipment apparatus by providing the user equipment apparatus with software configured to cause the user equipment apparatus to perform from the point of view of these functions/nodes.
- Fig. 1 shows an example communication network 100 in which embodiments of the present disclosure can be implemented.
- the communication network 100 includes a first device 110, a second device 120, a third device 130, a fourth device 140, and a fifth device 150.
- At least one of the first device 110, the third device 130 and the fifth device 150 may transmit to the second device 120 a request for surveillance of the second device 120.
- the second device 120 may determine whether to accept or reject the surveillance.
- the second device 120 may transmit a response to the request to the at least one of the first device 110, the third device 130 and the fifth device 150. The response indicates that the second device 120 accepts or rejects the surveillance. If the second device 120 accepts or rejects the surveillance, at least one of the first device 110, the third device 130 and the fifth device 150 may perform surveillance of the second device 120.
- the first device 110, the third device 130 and the fifth device 150 may set up surveillance service connections 114, 134 and 154 with the second device 120, respectively.
- the first device 110, the second device 120, the third device 130 and the fifth device 150 are managed by (e.g., at least partially controlled by, and/or otherwise in operative communication with) the fourth device 140.
- the fourth device 140 may collect information concerning the surveillance of the second device 120 performed by the first device 110, the third device 130 and the fifth device 150 via surveillance service connections 112, 132 and 152 therebetween.
- the fourth device 140 may update results of surveillance of the second device 120 performed by at least one of the first device 110, the third device 130 and the fifth device 150 based on the collected information.
- the fourth device 140 may transmit the updated results to at least one of the first device 110, the third device 130 and the fifth device 150.
- the first device 110 may provide data services for the second device 120.
- the first device 110 may set up a data service connection 116 with the second device 120.
- each of the first device 110, the third device 130 and the fifth device 150 are illustrated as an Access Point (AP)
- the second device 120 is illustrated as a mobile device
- the fourth device 140 is illustrated a Perception Gateway.
- the communication network 100 may include any suitable number of the first, second, third, fourth, and fifth devices adapted for implementing implementations of the present disclosure.
- Communications in the communication network 100 may be implemented according to any proper communication protocol (s) , comprising, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- s cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future.
- IEEE Institute for Electrical and Electronics Engineers
- the communication may utilize any proper wireless communication technology, comprising but not limited to: Code Divided Multiple Address (CDMA) , Frequency Divided Multiple Address (FDMA) , Time Divided Multiple Address (TDMA) , Frequency Divided Duplexer (FDD) , Time Divided Duplexer (TDD) , Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Divided Multiple Access (OFDMA) and/or any other technologies currently known or to be developed in the future.
- CDMA Code Divided Multiple Address
- FDMA Frequency Divided Multiple Address
- TDMA Time Divided Multiple Address
- FDD Frequency Divided Duplexer
- TDD Time Divided Duplexer
- MIMO Multiple-Input Multiple-Output
- OFDMA Orthogonal Frequency Divided Multiple Access
- AP Access Point
- the current association setup process will be described as below.
- the mobile device scans all the channels until the mobile device gets authentication from an available AP.
- the association is set up between the mobile device and the AP.
- the AP starts to provide data connection and services to the mobile device.
- the AP can resolve information of the mobile device during measurement of signals of the mobile device, track the moving trajectory of the mobile device, or even capture the gesture or behavior of a carrier of the mobile device. All these operations can be performed without being perceived by the carrier of the mobile device.
- example embodiments of the present disclosure provide a solution for performing surveillance.
- a first device transmits to a second device a request for surveillance of the second device.
- the second device may determine whether to accept or reject the surveillance.
- the second device may transmit a response to the request to the first device. If the response indicates that the second device accepts the surveillance, the first device performs surveillance of the second device. In this way, the second device can decide whether to allow the surveillance performed by the first device.
- the privacy protection can be realized.
- FIG. 2 shows a signaling chart illustrating a process 200 for performing surveillance according to some example embodiments of the present disclosure.
- the process 200 may involve the first device 110, the second device 120, and the fourth device 140 as illustrated in Fig. 1. It would be appreciated that although the process 200 has been described in the communication network 100 of Fig. 1, this process may be likewise applied to other communication scenarios.
- the first device 110 transmits (203) to the second device 120 a request for surveillance of the second device 120. Accordingly, the second device 120 receives (204) the request from the first device 110.
- the request may comprise a predefined field.
- the predefined field set to be a predetermined value may indicate that the first device 110 requests to perform surveillance of the second device 120.
- the predetermined value may be 1 or 0.
- the second device 120 Upon receiving the request, the second device 120 determines (205) whether to accept the surveillance. In turn, the second device 120 transmits (206) to the first device 110 a response to the request. Accordingly, the first device 110 receives (207) the response from the second device 120.
- the first device 110 determines (208) whether the response indicates that the second device 120 accepts or rejects the surveillance. If it is determined that the response indicates that the second device 120 accepts the surveillance, the first device 110 performs (209) the surveillance of the second device 120.
- the first device 110 may perform the surveillance by determining a location of the second device 120, or capturing a gesture or behaviour of a carrier of the second device 120.
- the second device 120 can decide whether to allow the surveillance performed by the first device.
- the second device 120 may know whether the location of the second device, gesture or behaviour information of the carrier of the second device 120 would be used for illegal or profitable business purpose.
- the location of the second device is taken as privacy.
- the present disclosure only allows the second device to initialize the surveillance service (such as localization service) and avoids the abuse of location privacy.
- the first device can only serve for the authorized second device with simple data exchange.
- the location, gesture or behaviour information may be a source of big raw data base to analyze behavior and habits of a moving stuff, to track and monitor goods during its transportation or storage.
- the response to the request for surveillance of the second device 120 may comprise an identity of the second device 120.
- the first device 110 may obtain the identity of the second device 120 from the response.
- the first device 110 may sense radio frequency signals transmitted from the second device 120 based on the identity of the second device 120.
- sensing the radio frequency signals transmitted from the second device 120 may comprise measurement of Channel State Information (CSI) between the first device 110 and the second device 120.
- the CSI may include, but is not limited to, Angle of Arrival (AoA) , strength, or Round Trip Time (RTT) of the radio frequency signals transmitted from the second device 120.
- AoA Angle of Arrival
- RTT Round Trip Time
- the first device 110 may perform the surveillance in absence of a data connection between the first device 110 and the second device 120.
- the surveillance may be performed by an AP which has no data connection with the second device 120.
- the surveillance may be performed by a non-associated AP. This allows the second device 120 to be served by multiple APs simultaneously, and value-added services may be decoupled from the data service based on data service connection. In addition, this ensures a stable tracking on the second device 120 as well as avoids interference on the quality of data service.
- the second device 120 may transmit (201) a probe request to the first device so as to scan for an available signal channel.
- the first device 110 transmits a probe response to the second device 120.
- the probe response comprises the request for surveillance of the second device 120.
- the probe response may also comprise information required for setup of data service connection with the first device 110.
- the information may comprise at least one of the following: a Service Set Identifier (SSID) , a Basic Service Set Identifier (BSSID) , strength of signals received by the first device 110 from the second device 120, or authentication information of the first device 110.
- SSID Service Set Identifier
- BSSID Basic Service Set Identifier
- the second device 120 may initiate a normal data service connection process to select a serving device for data services. For example, the second device 120 may select one of the first device 110, the third device 130 and the fifth device 150 as the serving device based on strength of signals received from the first device 110, the third device 130 and the fifth device 150.
- an AP providing data services for the second device 120 is also referred to as a serving AP.
- the first device 110 may transmit (210) an indication that the second device 120 accepts the surveillance to the fourth device 140 for storage and management. Accordingly, the fourth device 140 receives (211) the indication from the first device 110.
- the process 200 may be performed among the second device 120, the fourth device 140 and other devices than the first device 110.
- the process 200 may be performed among the second device 120, the fourth device 140 and the third device 130 or the fifth device 150.
- the third device 130 or the fifth device 150 may perform the surveillance of the second device 120.
- an AP providing surveillance services for the second device 120 is also referred to as a guarding AP.
- the second device 120 may be monitored by multi-anchoring points.
- the serving AP and at least one additional guarding AP may provide surveillance services for the second device 120.
- the Aps that can all be guarding APs may provide surveillance services for the second device 120, too.
- two APs may be used to realize the triangle location of the second device 120. In such example embodiments, more than two APs may be used to enhance the localization accuracy.
- the first device 110, the third device 130 and the fifth device 150 can use the results of surveillance for different purpose or integrate them together to achieve better accuracy.
- the first device 110 may receive from the third device 130 second information concerning further surveillance of the second device 120 performed by the third device 130 and update a result of the surveillance performed by the first device 110 based on the second information.
- the information concerning further surveillance of the second device 120 may comprise a result of the surveillance performed by the third device 130, or measurement of radio frequency signals transmitted from the second device 120, or information obtained based on the measurement of the radio frequency signals.
- the fourth device 140 may actively assign a plurality of devices to join or quit surveillance service towards the second device 120. For example, the fourth device 140 may gather the first device 110, the third device 130 and the fifth device 150 into a surveillance service pool. In this way, the first device 110, the third device 130 and the fifth device 150 may co-work with the fourth device 140 to provide a better surveillance service.
- the fourth device 140 may collect information concerning surveillance of the second device 120 performed by the first device 110, the third device 130 and the fifth device 150, respectively for further processing. For example, the fourth device 140 may update a result of surveillance of the second device 120 based on the collected information so as to obtain a result of surveillance with better accuracy. In some example embodiments, the fourth device 140 may transmit the obtained result of surveillance with better accuracy to at least one of the first device 110, the third device 130 and the fifth device 150. Normally, such iteration would be helpful to increase the accuracy and efficiency for surveillance, such as localization.
- the fourth device 140 may provide value-added services for the second device 120 based on the updated result of surveillance.
- some parameters may be configured on the device performing the surveillance, such as the first device 110, the third device 130 or the fifth device 150.
- a predetermined period also referred to as Hibernating Time
- a predetermined frequency also referred to as Checking Frequency
- the first device 110 may perform the surveillance in the predetermined frequency.
- the first device 110 may be free to leave or to jump into the same surveillance pool considering the signal strength, computation resource limitation or even other business purpose.
- the second device 120 can also set other parameters to define the strategy of how to be sensed. For instance, how often to resend the Probe Request to refresh the first device 110, or what kind of devices can perform surveillance of the the second device 120, or even if it is to be charged during the surveillance.
- the present disclosure may be widely used in all device communication with APs, with tiny changes on the current working procedure. It can realize the surveillance with lower cost, fast response and massive connection, without being necessary to have expensive video cameras nor complicated network systems;
- the present disclosure may be used in Logistics Industry. Ubiquitous localization and tracking of goods can be realized without requiring massive scale ecosystem deployment but by embedding a tiny mobile device together with the delivery goods. Once the mobile device is under the wireless coverage, the radio emission can be collected and measured by Guarding APs together, with deploying AI/ML and other localization algorithms on the APs or the Perception Gateway in the edge cloud, the real-time tracking can be realized in a very low cost. Furthermore, the APs can be used to search for the dedicated goods if the information of the mobile device is foreknown.
- the present disclosure may be used in Smart Home. Pre-registered handset or other wearable devices can be monitored by the home Wi-Fi system, the RF-Sensing function from the Wi-Fi system will be aware of the family member’s movement or security situation (e.g. fall down to the floor) . All such signal capture, data analytic result will be integrated together with other intelligent equipment in the home, such as TV, air-condition system, windows, water-heating system, emergency call etc. This makes the intelligent decision and serving for the family members better.
- the present disclosure can ensure the Guarding AP (normally the family Wi-Fi) aware of the mobile device once it is power-on, no matter if it is connecting with wireless network or other Wi-Fi APs. What is important is that, such a system has no need to use camera for monitoring and image recognition for further calculation so that the privacy can be protected better.
- the present disclosure may be used in Smart Factory and Lab.
- the handset carried by the visitors can be registered at the front-desk before they’re guided into the controlled areas.
- the registration would be much easier and faster.
- the security management in the factory or the lab it is enough to use the existing Wi-Fi system to monitor and recognize visitors without using cameras nor complicated recognition actions.
- the present disclosure may be used in Smart Husbandry.
- Small devices can be developed for animals wearing, which can save much cost. Because it does not need to “really” connect into the network, but only regularly transmit a small amount of information to the Guarding APs, which can enable the RF-Sensing capability to aware of animals’ movement trajectory as well as their behavior (such as suddenly bite or fight with each other) . It can also save the bandwidth and power of the whole wireless system in the massive connection and wide coverage pasture area.
- Fig. 3 shows a flowchart of an example method 300 implemented at a device in accordance with some example embodiments of the present disclosure.
- the method 300 will be described from the perspective of the first device 110 with reference to Fig. 1. It would be appreciated that the method 300 may also be implemented at the third device 130 or the fifth device 150 in Fig. 1.
- the first device 110 transmits to the second device a request for surveillance of the second device.
- the first device 110 receives a response to the request from the second device.
- the first device 110 determines that the response indicates that the second device accepts the surveillance, the first device 110 performs the surveillance of the second device.
- the first device performs the surveillance in absence of a data connection between the first device and the second device.
- the method 300 further comprises obtaining an identity of the second device from the response and performing the surveillance comprises sensing radio frequency signals transmitted from the second device based on the identity of the second device.
- the method 300 further comprises receiving from a third device information concerning further surveillance of the second device performed by the third device; and updating a result of the surveillance based on the information.
- transmitting to the second device the request for surveillance of the second device comprises: in response to reception of a probe request from the second device, transmitting a probe response to the second device, the probe response comprising the request for surveillance of the second device.
- the method 300 further comprises transmitting an indication that the second device accepts the surveillance to a fourth device, the fourth device managing the first device and the second device.
- the method 300 further comprises transmitting to the fourth device information concerning the surveillance performed by the first device for update of a result of the surveillance.
- the method 300 further comprises receiving the updated result of the surveillance from the fourth device.
- the method 300 further comprises maintaining a result of the surveillance of the second device within a predetermined period.
- performing the surveillance comprises performing the surveillance in a predetermined frequency.
- performing the surveillance comprises at least one of the following: determining a location of the second device, capturing a gesture of a carrier of the second device, or capturing a behaviour of the carrier of the second device.
- Fig. 4 shows a flowchart of an example method 400 implemented at a device in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 400 will be described from the perspective of the second device 120 with reference to Fig. 1.
- the second device 120 receives from the first device a request for surveillance of the second device 120.
- the second device 120 determines whether to accept or reject the surveillance.
- the second device 120 transmits to the first device a response to the request, the response indicating that the second device 120 accepts or rejects the surveillance.
- the surveillance is performed in absence of a data connection between the first device and the second device.
- the method 400 further comprises: providing an identity of the second device in the response; and transmitting to the first device radio frequency signals in association with the identity of the second device.
- the method 400 further comprises transmitting a probe request to the first device; and receiving the request for surveillance of the second device comprises: receiving a probe response from the first device, the probe response comprising the request for surveillance of the second device.
- the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
- Fig. 5 shows a flowchart of an example method 500 implemented at a device in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 500 will be described from the perspective of the fourth device 140 with reference to Fig. 1.
- the fourth device 140 receives from the first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device 140.
- the method 500 further comprises: receiving from the first device first information concerning the surveillance of the second device performed by the first device; receiving from a third device second information concerning further surveillance of the second device performed by the third device; and updating a result of surveillance of the second device based on the first information and the second information.
- the method 500 further comprises: transmitting the updated result of surveillance to at least one of the first device and the third device.
- the method 500 further comprises: providing value-added services for the second device based on the updated result of surveillance
- the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
- an apparatus capable of performing any of the method 300 may comprise means for performing the respective steps of the method 300.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the apparatus comprises: means for transmitting from a first device to a second device a request for surveillance of the second device; means for receiving a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, means for performing the surveillance of the second device.
- means for performing the surveillance comprises means for performing the surveillance in absence of a data connection between the first device and the second device.
- the apparatus further comprises means for obtaining an identity of the second device from the response and means for performing the surveillance comprises means for sensing radio frequency signals transmitted from the second device based on the identity of the second device.
- the apparatus further comprises means for receiving from a third device information concerning further surveillance of the second device performed by the third device; and means for updating a result of the surveillance based on the information.
- means for transmitting to the second device the request for surveillance of the second device comprises: in response to reception of a probe request from the second device, means for transmitting a probe response to the second device, the probe response comprising the request for surveillance of the second device.
- the apparatus further comprises means for transmitting an indication that the second device accepts the surveillance to a fourth device, the fourth device managing the first device and the second device.
- the apparatus further comprises means for transmitting to the fourth device information concerning the surveillance performed by the first device for update of a result of the surveillance.
- the apparatus further comprises means for receiving the updated result of the surveillance from the fourth device.
- the apparatus further comprises means for maintaining a result of the surveillance of the second device within a predetermined period.
- means for performing the surveillance comprises means for performing the surveillance in a predetermined frequency.
- means for performing the surveillance comprises at least one of the following: means for determining a location of the second device, means for capturing a gesture of a carrier of the second device, or means for capturing a behaviour of the carrier of the second device.
- an apparatus capable of performing any of the method 400 may comprise means for performing the respective steps of the method 400.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the apparatus comprises: means for receiving at a second device from a first device a request for surveillance of the second device; means for determining whether to accept or reject the surveillance; and means for transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- the surveillance is performed in absence of a data connection between the first device and the second device.
- the apparatus further comprises: means for providing an identity of the second device in the response; and means for transmitting to the first device radio frequency signals in association with the identity of the second device.
- the apparatus further comprises means for transmitting a probe request to the first device; and means for receiving the request for surveillance of the second device comprises: means for receiving a probe response from the first device, the probe response comprising the request for surveillance of the second device.
- the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
- an apparatus capable of performing any of the method 500 may comprise means for performing the respective steps of the method 500.
- the means may be implemented in any suitable form.
- the means may be implemented in a circuitry or software module.
- the apparatus further comprises: means for receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- the apparatus further comprises: means for receiving from the first device first information concerning the surveillance of the second device performed by the first device; means for receiving from a third device second information concerning further surveillance of the second device performed by the third device; and means for updating a result of surveillance of the second device based on the first information and the second information.
- the apparatus further comprises: means for transmitting the updated result of surveillance to at least one of the first device and the third device.
- the apparatus further comprises: means for providing value-added services for the second device based on the updated result of surveillance
- the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
- Fig. 6 is a simplified block diagram of a device 600 that is suitable for implementing embodiments of the present disclosure.
- the device 600 may be provided to implement the communication device, for example the first device 110, the second device 120, the third device 130, the fourth device 140 or the fifth device 150.
- the device 600 includes one or more processors 610, one or more memories 620 coupled to the processor 610, and one or more communication modules 640 coupled to the processor 610.
- the communication module 640 is for bidirectional communications.
- the communication module 640 has at least one antenna to facilitate communication.
- the communication interface may represent any interface that is necessary for communication with other network elements.
- the processor 610 may be of any type suitable to the local technical network and may include one or more of the following: general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples.
- the device 600 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
- the memory 620 may include one or more non-volatile memories and one or more volatile memories.
- the non-volatile memories include, but are not limited to, a Read Only Memory (ROM) 624, an electrically programmable read only memory (EPROM) , a flash memory, a hard disk, a compact disc (CD) , a digital video disk (DVD) , and other magnetic storage and/or optical storage.
- the volatile memories include, but are not limited to, a random access memory (RAM) 622 and other volatile memories that will not last in the power-down duration.
- a computer program 630 includes computer executable instructions that are executed by the associated processor 610.
- the program 630 may be stored in the ROM 620.
- the processor 610 may perform any suitable actions and processing by loading the program 630 into the RAM 620.
- the embodiments of the present disclosure may be implemented by means of the program 630 so that the device 600 may perform any process of the disclosure as discussed with reference to Figs. 3 to 5.
- the embodiments of the present disclosure may also be implemented by hardware or by a combination of software and hardware.
- the program 630 may be tangibly contained in a computer readable medium which may be included in the device 600 (such as in the memory 620) or other storage devices that are accessible by the device 600.
- the device 600 may load the program 630 from the computer readable medium to the RAM 622 for execution.
- the computer readable medium may include any types of tangible non-volatile storage, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like.
- Fig. 7 shows an example of the computer readable medium 700 in form of CD or DVD.
- the computer readable medium has the program 630 stored thereon.
- NFV network functions virtualization
- a virtualized network function may comprise one or more virtual machines running computer program codes using standard or general type servers instead of customized hardware. Cloud computing or data storage may also be utilized.
- radio communications this may mean node operations to be carried out, at least partly, in a central/centralized unit, CU, (e.g. server, host or node) operationally coupled to distributed unit, DU, (e.g. a radio head/node) . It is also possible that node operations will be distributed among a plurality of servers, nodes or hosts. It should also be understood that the distribution of labour between core network operations and base station operations may vary depending on implementation.
- the server may generate a virtual network through which the server communicates with the distributed unit.
- virtual networking may involve a process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network.
- Such virtual network may provide flexible distribution of operations between the server and the radio head/node.
- any digital signal processing task may be performed in either the CU or the DU and the boundary where the responsibility is shifted between the CU and the DU may be selected according to implementation.
- a CU-DU architecture is implemented.
- the device 600 may be comprised in a central unit (e.g. a control unit, an edge cloud server, a server) operatively coupled (e.g. via a wireless or wired network) to a distributed unit (e.g. a remote radio head/node) .
- the central unit e.g. an edge cloud server
- the distributed unit may be stand-alone apparatuses communicating with each other via a radio path or via a wired connection. Alternatively, they may be in a same entity communicating via a wired connection, etc.
- the edge cloud or edge cloud server may serve a plurality of distributed units or a radio access networks.
- at least some of the described processes may be performed by the central unit.
- the device 600 may be instead comprised in the distributed unit, and at least some of the described processes may be performed by the distributed unit.
- the execution of at least some of the functionalities of the device 600 may be shared between two physically separate devices (DU and CU) forming one operational entity. Therefore, the apparatus may be seen to depict the operational entity comprising one or more physically separate devices for executing at least some of the described processes.
- CU-DU architecture may provide flexible distribution of operations between the CU and the DU. In practice, any digital signal processing task may be performed in either the CU or the DU and the boundary where the responsibility is shifted between the CU and the DU may be selected according to implementation.
- the device 600 controls the execution of the processes, regardless of the location of the apparatus and regardless of where the processes/functions are carried out.
- various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of embodiments of the present disclosure are illustrated and described as block diagrams, flowcharts, or using some other pictorial representations, it is to be understood that the block, apparatus, system, technique or method described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
- the present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer readable storage medium.
- the computer program product includes computer-executable instructions, such as those included in program modules, being executed in a device on a target real or virtual processor, to carry out the method 300, 400 or 500 as described above with reference to Figs. 3-5.
- program modules include routines, programs, libraries, objects, classes, components, data structures, or the like that perform particular tasks or implement particular abstract data types.
- the functionality of the program modules may be combined or split between program modules as desired in various embodiments.
- Machine-executable instructions for program modules may be executed within a local or distributed device. In a distributed device, program modules may be located in both local and remote storage media.
- Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagrams to be implemented.
- the program code may execute entirely on a machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
- the computer program codes or related data may be carried by any suitable carrier to enable the device, apparatus or processor to perform various processes and operations as described above.
- Examples of the carrier include a signal, computer readable medium, and the like.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable medium may include but not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of the computer readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM) , a read-only memory (ROM) , an erasable programmable read-only memory (EPROM or Flash memory) , an optical fiber, a portable compact disc read-only memory (CD-ROM) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments of the present disclosure relate to surveillance performing. A first device transmits a request for surveillance of the second device to a second device. The first device receives a response from the second device. If the first device determines that the response indicates that the second device accepts the surveillance, the first device performs the surveillance of the second device. With this present disclosure, the surveillance may be performed without necessary to set up a data association or any other association beforehand.
Description
Embodiments of the present disclosure generally relate to the field of telecommunication and in particular, to devices, methods, apparatuses and computer readable media for performing surveillance.
Over the past decade, many research studies have contributed to making indoor localization of Wi-Fi devices accurate and practically useful for emerging applications wherein GPS becomes incompetent. Significant interest is shown and efforts have been put by the research community on using Wi-Fi technology for indoor localization because of its minimal deployment complexity and cost. In addition, the Wi-Fi capability in almost every electronic device makes it a promising technology for indoor localization.
The current indoor localization for the target device is performed without being perceived by a carrier of the target device. If the location of the target device was used for illegal or profitable business purpose, there would cause problems of security and privacy.
SUMMARY
In general, example embodiments of the present disclosure provide a solution for performing surveillance.
In a first aspect, there is provided a first device. The first device comprises at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the first device to: transmit to a second device a request for surveillance of the second device; receive a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, perform the surveillance of the second device.
In a second aspect, there is provided a second device. The second device comprises at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the second device to: receive from a first device a request for surveillance of the second device; determine whether to accept or reject the surveillance; and transmit to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
In a third aspect, there is provided a fourth device. The fourth device comprises at least one processor; and at least one memory including computer program codes; the at least one memory and the computer program codes are configured to, with the at least one processor, cause the fourth device to: receive from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
In a fourth aspect, there is provided a method implemented at a device. The method comprises: transmitting from a first device to a second device a request for surveillance of the second device; receiving a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
In a fifth aspect, there is provided a method implemented at a device. The method comprises: receiving at a second device from a first device a request for surveillance of the second device; determining whether to accept or reject the surveillance; and transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
In a sixth aspect, there is provided a method implemented at a device. The method comprises: receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
In a seventh aspect, there is provided an apparatus comprises: means for transmitting from a first device to a second device a request for surveillance of the second device; means for receiving a response to the request from the second device; and means for in accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
In an eighth aspect, there is provided an apparatus comprises: means for receiving at a second device from a first device a request for surveillance of the second device; means for determining whether to accept or reject the surveillance; and means for transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
In a ninth aspect, there is provided an apparatus comprises: means for receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
In a tenth aspect, there is provided a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above fourth aspect.
In an eleventh aspect, there is provided a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above fifth aspect.
In a twelfth aspect, there is provided a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the above sixth aspect.
It is to be understood that the summary section is not intended to identify key or essential features of embodiments of the present disclosure, nor is it intended to be used to limit the scope of the present disclosure. Other features of the present disclosure will become easily comprehensible through the following description.
Some example embodiments will now be described with reference to the accompanying drawings, where:
Fig. 1 shows an example communication network in which embodiments of the present disclosure may be implemented;
Fig. 2 shows a signaling chart illustrating a process for performing surveillance in accordance with some example embodiments of the present disclosure;
Fig. 3 shows a flowchart of a method implemented at a first device in accordance with some example embodiments of the present disclosure;
Fig. 4 shows a flowchart of a method implemented at a second device in accordance with some example embodiments of the present disclosure;
Fig. 5 shows a flowchart of a method implemented at a fourth device in accordance with some example embodiments of the present disclosure;
Fig. 6 shows a simplified block diagram of an apparatus that is suitable for implementing some other embodiments of the present disclosure; and
Fig. 7 shows a block diagram of an example computer readable medium in accordance with some example embodiments of the present disclosure.
Throughout the drawings, the same or similar reference numerals represent the same or similar element.
Principle of the present disclosure will now be described with reference to some example embodiments. It is to be understood that these embodiments are described only for the purpose of illustration and help those skilled in the art to understand and implement the present disclosure, without suggesting any limitation as to the scope of the disclosure. The disclosure described herein can be implemented in various manners other than the ones described below.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skills in the art to which this disclosure belongs.
References in the present disclosure to “one embodiment, ” “an embodiment, ” “an example embodiment, ” and the like indicate that the embodiment described may include a particular feature, structure, or characteristic, but it is not necessary that every embodiment includes the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an example embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It shall be understood that although the terms “first” and “second” etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or” includes any and all combinations of one or more of the listed terms.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a” , “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” , “comprising” , “has” , “having” , “includes” and/or “including” , when used herein, specify the presence of stated features, elements, and/or components etc., but do not preclude the presence or addition of one or more other features, elements, components and/or combinations thereof.
As used in this application, the term “circuitry” may refer to one or more or all of the following:
(a) hardware-only circuit implementations (such as implementations in only analog and/or digital circuitry) and
(b) combinations of hardware circuits and software, such as (as applicable) :
(i) a combination of analog and/or digital hardware circuit (s) with software/firmware and
(ii) any portions of hardware processor (s) with software (including digital signal processor (s) ) , software, and memory (ies) that work together to cause an apparatus, such as a mobile phone or server, to perform various functions) and
(c) hardware circuit (s) and or processor (s) , such as a microprocessor (s) or a portion of a microprocessor (s) , that requires software (e.g., firmware) for operation, but the software may not be present when it is not needed for operation.
This definition of circuitry applies to all uses of this term in this application, including in any claims. As a further example, as used in this application, the term circuitry also covers an implementation of merely a hardware circuit or processor (or multiple processors) or portion of a hardware circuit or processor and its (or their) accompanying software and/or firmware. The term circuitry also covers, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in server, a cellular network device, or other computing or network device.
As used herein, the term “communication network” refers to a network following any suitable communication standards, such as fifth generation (5G) systems, Long Term Evolution (LTE) , LTE-Advanced (LTE-A) , Wideband Code Division Multiple Access (WCDMA) , High-Speed Packet Access (HSPA) , Narrow Band Internet of Things (NB-IoT) and so on. Furthermore, the communications between a mobile device and a network device in the communication network may be performed according to any suitable generation communication protocols, including, but not limited to, the first generation (1G) , the second generation (2G) , 2.5G, 2.75G, the third generation (3G) , the fourth generation (4G) , 4.5G, the future fifth generation (5G) new radio (NR) communication protocols, and/or any other protocols either currently known or to be developed in the future. Embodiments of the present disclosure may be applied in various communication systems. Given the rapid development in communications, there will of course also be future type communication technologies and systems with which the present disclosure may be embodied. It should not be seen as limiting the scope of the present disclosure to only the aforementioned system.
As used herein, the term “network device” refers to a node in a communication network via which a mobile device accesses the network and receives services therefrom. The network device may refer to a base station (BS) or an access point (AP) , for example, a node B (NodeB or NB) , an evolved NodeB (eNodeB or eNB) , a NR Next Generation NodeB (gNB) , a Remote Radio Unit (RRU) , a radio header (RH) , a remote radio head (RRH) , a relay, a low power node such as a femto, a pico, and so forth, depending on the applied terminology and technology. An RAN split architecture comprises a gNB-CU (Centralized unit, hosting RRC, SDAP and PDCP) controlling a plurality of gNB-DUs (Distributed unit, hosting RLC, MAC and PHY) .
The term “mobile device” refers to any end device that may be capable of wireless communication. By way of example rather than limitation, a mobile device may also be referred to as a communication device, user equipment (UE) , a Subscriber Station (SS) , a Portable Subscriber Station, a Mobile Station (MS) , or an Access Terminal (AT) . The mobile device may include, but not limited to, a mobile phone, a cellular phone, a smart phone, voice over IP (VoIP) phones, wireless local loop phones, a tablet, a wearable mobile device, a personal digital assistant (PDA) , portable computers, desktop computer, image capture mobile devices such as digital cameras, gaming mobile devices, music storage and playback appliances, vehicle-mounted wireless mobile devices, wireless endpoints, mobile stations, laptop-embedded equipment (LEE) , laptop-mounted equipment (LME) , USB dongles, smart devices, wireless customer-premises equipment (CPE) , an Internet of Things (IoT) device, a watch or other wearable, a head-mounted display (HMD) , a vehicle, a drone, a medical device and applications (e.g., remote surgery) , an industrial device and applications (e.g., a robot and/or other wireless devices operating in an industrial and/or an automated processing chain contexts) , a consumer electronics device, a device operating on commercial and/or industrial wireless networks, and the like. In the following description, the terms “mobile device” , “communication device” , “terminal device” , “user equipment” and “UE” may be used interchangeably.
Although functionalities described herein can be performed, in various example embodiments, in a fixed and/or a wireless network node, in other example embodiments, functionalities may be implemented in a user equipment apparatus (such as a cell phone or tablet computer or laptop computer or desktop computer or mobile IoT device or fixed IoT device) . This user equipment apparatus can, for example, be furnished with corresponding capabilities as described in connection with the fixed and/or the wireless network node (s) , as appropriate. The user equipment apparatus may be the user equipment and/or or a control device, such as a chipset or processor, configured to control the user equipment when installed therein. Examples of such functionalities include the bootstrapping server function and/or the home subscriber server, which may be implemented in the user equipment apparatus by providing the user equipment apparatus with software configured to cause the user equipment apparatus to perform from the point of view of these functions/nodes.
Fig. 1 shows an example communication network 100 in which embodiments of the present disclosure can be implemented. The communication network 100 includes a first device 110, a second device 120, a third device 130, a fourth device 140, and a fifth device 150.
At least one of the first device 110, the third device 130 and the fifth device 150 may transmit to the second device 120 a request for surveillance of the second device 120. Upon receiving the request, the second device 120 may determine whether to accept or reject the surveillance. In turn, the second device 120 may transmit a response to the request to the at least one of the first device 110, the third device 130 and the fifth device 150. The response indicates that the second device 120 accepts or rejects the surveillance. If the second device 120 accepts or rejects the surveillance, at least one of the first device 110, the third device 130 and the fifth device 150 may perform surveillance of the second device 120.
In order to perform surveillance of the second device 120, the first device 110, the third device 130 and the fifth device 150 may set up surveillance service connections 114, 134 and 154 with the second device 120, respectively.
The first device 110, the second device 120, the third device 130 and the fifth device 150 are managed by (e.g., at least partially controlled by, and/or otherwise in operative communication with) the fourth device 140. In some embodiments, the fourth device 140 may collect information concerning the surveillance of the second device 120 performed by the first device 110, the third device 130 and the fifth device 150 via surveillance service connections 112, 132 and 152 therebetween. The fourth device 140 may update results of surveillance of the second device 120 performed by at least one of the first device 110, the third device 130 and the fifth device 150 based on the collected information. In turn, the fourth device 140 may transmit the updated results to at least one of the first device 110, the third device 130 and the fifth device 150.
In the example of Fig. 1, in addition to surveillance of the second device 120, the first device 110 may provide data services for the second device 120. In order to provide the data services, the first device 110 may set up a data service connection 116 with the second device 120.
In this example, each of the first device 110, the third device 130 and the fifth device 150 are illustrated as an Access Point (AP) , the second device 120 is illustrated as a mobile device, and the fourth device 140 is illustrated a Perception Gateway. It is also to be understood that the number of the first, second, third, fourth, and fifth devices is given for the purpose of illustration without suggesting any limitations to the present disclosure. The communication network 100 may include any suitable number of the first, second, third, fourth, and fifth devices adapted for implementing implementations of the present disclosure.
Communications in the communication network 100 may be implemented according to any proper communication protocol (s) , comprising, but not limited to, cellular communication protocols of the first generation (1G) , the second generation (2G) , the third generation (3G) , the fourth generation (4G) and the fifth generation (5G) and on the like, wireless local network communication protocols such as Institute for Electrical and Electronics Engineers (IEEE) 802.11 and the like, and/or any other protocols currently known or to be developed in the future. Moreover, the communication may utilize any proper wireless communication technology, comprising but not limited to: Code Divided Multiple Address (CDMA) , Frequency Divided Multiple Address (FDMA) , Time Divided Multiple Address (TDMA) , Frequency Divided Duplexer (FDD) , Time Divided Duplexer (TDD) , Multiple-Input Multiple-Output (MIMO) , Orthogonal Frequency Divided Multiple Access (OFDMA) and/or any other technologies currently known or to be developed in the future.
Conventionally, surveillance of a mobile device can only be performed by an Access Point (AP) associated with the mobile device. The current association setup process will be described as below. First, the mobile device scans all the channels until the mobile device gets authentication from an available AP. Then, the association is set up between the mobile device and the AP. The AP starts to provide data connection and services to the mobile device.
Once the association is set up, the AP can resolve information of the mobile device during measurement of signals of the mobile device, track the moving trajectory of the mobile device, or even capture the gesture or behavior of a carrier of the mobile device. All these operations can be performed without being perceived by the carrier of the mobile device.
In the process as described above, there are two problems. First, for the mobile device, it is unconscious of possible sensing or measurement of signals performed by the AP which it is supposed to connect with for data service only. If the location or gesture information of the mobile device was used for illegal or profitable business purpose, there would cause problems of security and privacy. Second, for the AP originally supposed to provide data service, it needs to share working load and calculating power for measurement of signals from the mobile device and other localization related operations, which would decrease the system performance. Indeed, it is needed for more APs to be involved into the localization service for the same mobile device, which would be helpful to enhance the localization accuracy and efficiency.
In order to at least in part solve above and other potential problems, example embodiments of the present disclosure provide a solution for performing surveillance. In the solution, a first device transmits to a second device a request for surveillance of the second device. Upon receiving the request, the second device may determine whether to accept or reject the surveillance. In turn, the second device may transmit a response to the request to the first device. If the response indicates that the second device accepts the surveillance, the first device performs surveillance of the second device. In this way, the second device can decide whether to allow the surveillance performed by the first device. Thus, the privacy protection can be realized.
Principle and implementations of the present disclosure will be described in detail below with reference to Figs. 2 to 5. Fig. 2 shows a signaling chart illustrating a process 200 for performing surveillance according to some example embodiments of the present disclosure. For the purpose of discussion, the process 200 will be described with reference to Fig. 1. The process 200 may involve the first device 110, the second device 120, and the fourth device 140 as illustrated in Fig. 1. It would be appreciated that although the process 200 has been described in the communication network 100 of Fig. 1, this process may be likewise applied to other communication scenarios.
As shown in Fig. 2, the first device 110 transmits (203) to the second device 120 a request for surveillance of the second device 120. Accordingly, the second device 120 receives (204) the request from the first device 110.
In some example embodiments, the request may comprise a predefined field. The predefined field set to be a predetermined value may indicate that the first device 110 requests to perform surveillance of the second device 120. For example, the predetermined value may be 1 or 0.
Upon receiving the request, the second device 120 determines (205) whether to accept the surveillance. In turn, the second device 120 transmits (206) to the first device 110 a response to the request. Accordingly, the first device 110 receives (207) the response from the second device 120.
Upon receiving the response, the first device 110 determines (208) whether the response indicates that the second device 120 accepts or rejects the surveillance. If it is determined that the response indicates that the second device 120 accepts the surveillance, the first device 110 performs (209) the surveillance of the second device 120.
In some example embodiments, the first device 110 may perform the surveillance by determining a location of the second device 120, or capturing a gesture or behaviour of a carrier of the second device 120.
In accordance with the present disclosure, the second device 120 can decide whether to allow the surveillance performed by the first device. Thus, the second device 120 may know whether the location of the second device, gesture or behaviour information of the carrier of the second device 120 would be used for illegal or profitable business purpose. The location of the second device is taken as privacy. The present disclosure only allows the second device to initialize the surveillance service (such as localization service) and avoids the abuse of location privacy. The first device can only serve for the authorized second device with simple data exchange.
In some example embodiments, the location, gesture or behaviour information may be a source of big raw data base to analyze behavior and habits of a moving stuff, to track and monitor goods during its transportation or storage.
In some example embodiments, the response to the request for surveillance of the second device 120 may comprise an identity of the second device 120. Thus, the first device 110 may obtain the identity of the second device 120 from the response. In turn, the first device 110 may sense radio frequency signals transmitted from the second device 120 based on the identity of the second device 120.
In some example embodiments, sensing the radio frequency signals transmitted from the second device 120 may comprise measurement of Channel State Information (CSI) between the first device 110 and the second device 120. The CSI may include, but is not limited to, Angle of Arrival (AoA) , strength, or Round Trip Time (RTT) of the radio frequency signals transmitted from the second device 120.
In some example embodiments, the first device 110 may perform the surveillance in absence of a data connection between the first device 110 and the second device 120. In this way, the function of surveillance will not rely on the normal association procedure for data connections and the surveillance may be performed without necessary to set up a data association or any other association beforehand. As such, the surveillance may be performed by an AP which has no data connection with the second device 120. In other words, the surveillance may be performed by a non-associated AP. This allows the second device 120 to be served by multiple APs simultaneously, and value-added services may be decoupled from the data service based on data service connection. In addition, this ensures a stable tracking on the second device 120 as well as avoids interference on the quality of data service.
In some example embodiments, before the first device 110 transmits to the second device 120 the request for surveillance of the second device 120, the second device 120 may transmit (201) a probe request to the first device so as to scan for an available signal channel. In response to reception (202) of the probe request from the second device 120, the first device 110 transmits a probe response to the second device 120. The probe response comprises the request for surveillance of the second device 120. In such example embodiments, the probe response may also comprise information required for setup of data service connection with the first device 110. For example, the information may comprise at least one of the following: a Service Set Identifier (SSID) , a Basic Service Set Identifier (BSSID) , strength of signals received by the first device 110 from the second device 120, or authentication information of the first device 110.
In some example embodiments, upon receiving the probe response from the first device 110, the second device 120 may initiate a normal data service connection process to select a serving device for data services. For example, the second device 120 may select one of the first device 110, the third device 130 and the fifth device 150 as the serving device based on strength of signals received from the first device 110, the third device 130 and the fifth device 150. Hereinafter, an AP providing data services for the second device 120 is also referred to as a serving AP.
In some example embodiments, upon receiving the response indicating that the second device 120 accepts the surveillance, the first device 110 may transmit (210) an indication that the second device 120 accepts the surveillance to the fourth device 140 for storage and management. Accordingly, the fourth device 140 receives (211) the indication from the first device 110.
In some example embodiments, the process 200 may be performed among the second device 120, the fourth device 140 and other devices than the first device 110. For example, the process 200 may be performed among the second device 120, the fourth device 140 and the third device 130 or the fifth device 150. With the process 200, the third device 130 or the fifth device 150 may perform the surveillance of the second device 120. Hereinafter, an AP providing surveillance services for the second device 120 is also referred to as a guarding AP. In this way, the second device 120 may be monitored by multi-anchoring points. For example, the serving AP and at least one additional guarding AP may provide surveillance services for the second device 120. Alternatively, the Aps that can all be guarding APs may provide surveillance services for the second device 120, too. In such example embodiments, two APs may be used to realize the triangle location of the second device 120. In such example embodiments, more than two APs may be used to enhance the localization accuracy.
In such example embodiments, the first device 110, the third device 130 and the fifth device 150 can use the results of surveillance for different purpose or integrate them together to achieve better accuracy. For example, the first device 110 may receive from the third device 130 second information concerning further surveillance of the second device 120 performed by the third device 130 and update a result of the surveillance performed by the first device 110 based on the second information. In some example embodiments, the information concerning further surveillance of the second device 120 may comprise a result of the surveillance performed by the third device 130, or measurement of radio frequency signals transmitted from the second device 120, or information obtained based on the measurement of the radio frequency signals.
In some example embodiments, the fourth device 140 may actively assign a plurality of devices to join or quit surveillance service towards the second device 120. For example, the fourth device 140 may gather the first device 110, the third device 130 and the fifth device 150 into a surveillance service pool. In this way, the first device 110, the third device 130 and the fifth device 150 may co-work with the fourth device 140 to provide a better surveillance service.
In such example embodiments, the fourth device 140 may collect information concerning surveillance of the second device 120 performed by the first device 110, the third device 130 and the fifth device 150, respectively for further processing. For example, the fourth device 140 may update a result of surveillance of the second device 120 based on the collected information so as to obtain a result of surveillance with better accuracy. In some example embodiments, the fourth device 140 may transmit the obtained result of surveillance with better accuracy to at least one of the first device 110, the third device 130 and the fifth device 150. Normally, such iteration would be helpful to increase the accuracy and efficiency for surveillance, such as localization.
In such example embodiments, the fourth device 140 may provide value-added services for the second device 120 based on the updated result of surveillance.
In some example embodiments, some parameters may be configured on the device performing the surveillance, such as the first device 110, the third device 130 or the fifth device 150. For instance, a predetermined period (also referred to as Hibernating Time) may be configured such that the first device 110 may maintain a result of the surveillance of the second device 120 within the predetermined period even when losing the updating from the second device 120. This may avoid the signaling loss when the second device 120 moves to some blinded area of the first device 110. In addition, a predetermined frequency (also referred to as Checking Frequency) may be configured such that the first device 110 may perform the surveillance in the predetermined frequency. Furthermore, the first device 110 may be free to leave or to jump into the same surveillance pool considering the signal strength, computation resource limitation or even other business purpose.
In some example embodiments, the second device 120 can also set other parameters to define the strategy of how to be sensed. For instance, how often to resend the Probe Request to refresh the first device 110, or what kind of devices can perform surveillance of the the second device 120, or even if it is to be charged during the surveillance.
In some example embodiments, the present disclosure may be widely used in all device communication with APs, with tiny changes on the current working procedure. It can realize the surveillance with lower cost, fast response and massive connection, without being necessary to have expensive video cameras nor complicated network systems;
In some example embodiments, the present disclosure may be used in Logistics Industry. Ubiquitous localization and tracking of goods can be realized without requiring massive scale ecosystem deployment but by embedding a tiny mobile device together with the delivery goods. Once the mobile device is under the wireless coverage, the radio emission can be collected and measured by Guarding APs together, with deploying AI/ML and other localization algorithms on the APs or the Perception Gateway in the edge cloud, the real-time tracking can be realized in a very low cost. Furthermore, the APs can be used to search for the dedicated goods if the information of the mobile device is foreknown.
In some example embodiments, the present disclosure may be used in Smart Home. Pre-registered handset or other wearable devices can be monitored by the home Wi-Fi system, the RF-Sensing function from the Wi-Fi system will be aware of the family member’s movement or security situation (e.g. fall down to the floor) . All such signal capture, data analytic result will be integrated together with other intelligent equipment in the home, such as TV, air-condition system, windows, water-heating system, emergency call etc. This makes the intelligent decision and serving for the family members better. the present disclosure can ensure the Guarding AP (normally the family Wi-Fi) aware of the mobile device once it is power-on, no matter if it is connecting with wireless network or other Wi-Fi APs. What is important is that, such a system has no need to use camera for monitoring and image recognition for further calculation so that the privacy can be protected better.
In some example embodiments, the present disclosure may be used in Smart Factory and Lab. The handset carried by the visitors can be registered at the front-desk before they’re guided into the controlled areas. Thus, there is no need for visitors to borrow a visiting badge or anything else, the registration would be much easier and faster. For the security management in the factory or the lab, it is enough to use the existing Wi-Fi system to monitor and recognize visitors without using cameras nor complicated recognition actions.
In some example embodiments, the present disclosure may be used in Smart Husbandry. Small devices can be developed for animals wearing, which can save much cost. Because it does not need to “really” connect into the network, but only regularly transmit a small amount of information to the Guarding APs, which can enable the RF-Sensing capability to aware of animals’ movement trajectory as well as their behavior (such as suddenly bite or fight with each other) . It can also save the bandwidth and power of the whole wireless system in the massive connection and wide coverage pasture area.
Fig. 3 shows a flowchart of an example method 300 implemented at a device in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 300 will be described from the perspective of the first device 110 with reference to Fig. 1. It would be appreciated that the method 300 may also be implemented at the third device 130 or the fifth device 150 in Fig. 1.
At block 310, the first device 110 transmits to the second device a request for surveillance of the second device. At block 320, the first device 110 receives a response to the request from the second device. At block 330, if the first device 110 determines that the response indicates that the second device accepts the surveillance, the first device 110 performs the surveillance of the second device.
In some example embodiments, the first device performs the surveillance in absence of a data connection between the first device and the second device.
In some example embodiments, the method 300 further comprises obtaining an identity of the second device from the response and performing the surveillance comprises sensing radio frequency signals transmitted from the second device based on the identity of the second device.
In some example embodiments, the method 300 further comprises receiving from a third device information concerning further surveillance of the second device performed by the third device; and updating a result of the surveillance based on the information.
In some example embodiments, transmitting to the second device the request for surveillance of the second device comprises: in response to reception of a probe request from the second device, transmitting a probe response to the second device, the probe response comprising the request for surveillance of the second device.
In some example embodiments, the method 300 further comprises transmitting an indication that the second device accepts the surveillance to a fourth device, the fourth device managing the first device and the second device.
In some example embodiments, the method 300 further comprises transmitting to the fourth device information concerning the surveillance performed by the first device for update of a result of the surveillance.
In some example embodiments, the method 300 further comprises receiving the updated result of the surveillance from the fourth device.
In some example embodiments, the method 300 further comprises maintaining a result of the surveillance of the second device within a predetermined period.
In some example embodiments, performing the surveillance comprises performing the surveillance in a predetermined frequency.
In some example embodiments, performing the surveillance comprises at least one of the following: determining a location of the second device, capturing a gesture of a carrier of the second device, or capturing a behaviour of the carrier of the second device.
Fig. 4 shows a flowchart of an example method 400 implemented at a device in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 400 will be described from the perspective of the second device 120 with reference to Fig. 1.
At block 210, the second device 120 receives from the first device a request for surveillance of the second device 120. At block 420, the second device 120 determines whether to accept or reject the surveillance. At block 430, the second device 120 transmits to the first device a response to the request, the response indicating that the second device 120 accepts or rejects the surveillance.
In some example embodiments, the surveillance is performed in absence of a data connection between the first device and the second device.
In some example embodiments, the method 400 further comprises: providing an identity of the second device in the response; and transmitting to the first device radio frequency signals in association with the identity of the second device.
In some example embodiments, the method 400 further comprises transmitting a probe request to the first device; and receiving the request for surveillance of the second device comprises: receiving a probe response from the first device, the probe response comprising the request for surveillance of the second device.
In some example embodiments, the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
Fig. 5 shows a flowchart of an example method 500 implemented at a device in accordance with some example embodiments of the present disclosure. For the purpose of discussion, the method 500 will be described from the perspective of the fourth device 140 with reference to Fig. 1.
At block 510, the fourth device 140 receives from the first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device 140.
In some example embodiments, the method 500 further comprises: receiving from the first device first information concerning the surveillance of the second device performed by the first device; receiving from a third device second information concerning further surveillance of the second device performed by the third device; and updating a result of surveillance of the second device based on the first information and the second information.
In some example embodiments, the method 500 further comprises: transmitting the updated result of surveillance to at least one of the first device and the third device.
In some example embodiments, the method 500 further comprises: providing value-added services for the second device based on the updated result of surveillance
In some example embodiments, the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
In some example embodiments, an apparatus capable of performing any of the method 300 (for example, the first device 110) may comprise means for performing the respective steps of the method 300. The means may be implemented in any suitable form. For example, the means may be implemented in a circuitry or software module.
In some example embodiments, the apparatus comprises: means for transmitting from a first device to a second device a request for surveillance of the second device; means for receiving a response to the request from the second device; and in accordance with a determination that the response indicates that the second device accepts the surveillance, means for performing the surveillance of the second device.
In some example embodiments, means for performing the surveillance comprises means for performing the surveillance in absence of a data connection between the first device and the second device.
In some example embodiments, the apparatus further comprises means for obtaining an identity of the second device from the response and means for performing the surveillance comprises means for sensing radio frequency signals transmitted from the second device based on the identity of the second device.
In some example embodiments, the apparatus further comprises means for receiving from a third device information concerning further surveillance of the second device performed by the third device; and means for updating a result of the surveillance based on the information.
In some example embodiments, means for transmitting to the second device the request for surveillance of the second device comprises: in response to reception of a probe request from the second device, means for transmitting a probe response to the second device, the probe response comprising the request for surveillance of the second device.
In some example embodiments, the apparatus further comprises means for transmitting an indication that the second device accepts the surveillance to a fourth device, the fourth device managing the first device and the second device.
In some example embodiments, the apparatus further comprises means for transmitting to the fourth device information concerning the surveillance performed by the first device for update of a result of the surveillance.
In some example embodiments, the apparatus further comprises means for receiving the updated result of the surveillance from the fourth device.
In some example embodiments, the apparatus further comprises means for maintaining a result of the surveillance of the second device within a predetermined period.
In some example embodiments, means for performing the surveillance comprises means for performing the surveillance in a predetermined frequency.
In some example embodiments, means for performing the surveillance comprises at least one of the following: means for determining a location of the second device, means for capturing a gesture of a carrier of the second device, or means for capturing a behaviour of the carrier of the second device.
In some example embodiments, an apparatus capable of performing any of the method 400 (for example, the second device 120) may comprise means for performing the respective steps of the method 400. The means may be implemented in any suitable form. For example, the means may be implemented in a circuitry or software module.
In some example embodiments, the apparatus comprises: means for receiving at a second device from a first device a request for surveillance of the second device; means for determining whether to accept or reject the surveillance; and means for transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
In some example embodiments, the surveillance is performed in absence of a data connection between the first device and the second device.
In some example embodiments, the apparatus further comprises: means for providing an identity of the second device in the response; and means for transmitting to the first device radio frequency signals in association with the identity of the second device.
In some example embodiments, the apparatus further comprises means for transmitting a probe request to the first device; and means for receiving the request for surveillance of the second device comprises: means for receiving a probe response from the first device, the probe response comprising the request for surveillance of the second device.
In some example embodiments, the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
In some example embodiments, an apparatus capable of performing any of the method 500 (for example, the fourth device 140) may comprise means for performing the respective steps of the method 500. The means may be implemented in any suitable form. For example, the means may be implemented in a circuitry or software module.
In some example embodiments, the apparatus further comprises: means for receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
In some example embodiments, the apparatus further comprises: means for receiving from the first device first information concerning the surveillance of the second device performed by the first device; means for receiving from a third device second information concerning further surveillance of the second device performed by the third device; and means for updating a result of surveillance of the second device based on the first information and the second information.
In some example embodiments, the apparatus further comprises: means for transmitting the updated result of surveillance to at least one of the first device and the third device.
In some example embodiments, the apparatus further comprises: means for providing value-added services for the second device based on the updated result of surveillance
In some example embodiments, the surveillance comprises at least one of the following: a determination of a location of the second device, a capture of a gesture of a carrier of the second device, or a capture of a behaviour of the carrier of the second device.
Fig. 6 is a simplified block diagram of a device 600 that is suitable for implementing embodiments of the present disclosure. The device 600 may be provided to implement the communication device, for example the first device 110, the second device 120, the third device 130, the fourth device 140 or the fifth device 150. As shown, the device 600 includes one or more processors 610, one or more memories 620 coupled to the processor 610, and one or more communication modules 640 coupled to the processor 610.
The communication module 640 is for bidirectional communications. The communication module 640 has at least one antenna to facilitate communication. The communication interface may represent any interface that is necessary for communication with other network elements.
The processor 610 may be of any type suitable to the local technical network and may include one or more of the following: general purpose computers, special purpose computers, microprocessors, digital signal processors (DSPs) and processors based on multicore processor architecture, as non-limiting examples. The device 600 may have multiple processors, such as an application specific integrated circuit chip that is slaved in time to a clock which synchronizes the main processor.
The memory 620 may include one or more non-volatile memories and one or more volatile memories. Examples of the non-volatile memories include, but are not limited to, a Read Only Memory (ROM) 624, an electrically programmable read only memory (EPROM) , a flash memory, a hard disk, a compact disc (CD) , a digital video disk (DVD) , and other magnetic storage and/or optical storage. Examples of the volatile memories include, but are not limited to, a random access memory (RAM) 622 and other volatile memories that will not last in the power-down duration.
A computer program 630 includes computer executable instructions that are executed by the associated processor 610. The program 630 may be stored in the ROM 620. The processor 610 may perform any suitable actions and processing by loading the program 630 into the RAM 620.
The embodiments of the present disclosure may be implemented by means of the program 630 so that the device 600 may perform any process of the disclosure as discussed with reference to Figs. 3 to 5. The embodiments of the present disclosure may also be implemented by hardware or by a combination of software and hardware.
In some embodiments, the program 630 may be tangibly contained in a computer readable medium which may be included in the device 600 (such as in the memory 620) or other storage devices that are accessible by the device 600. The device 600 may load the program 630 from the computer readable medium to the RAM 622 for execution. The computer readable medium may include any types of tangible non-volatile storage, such as ROM, EPROM, a flash memory, a hard disk, CD, DVD, and the like. Fig. 7 shows an example of the computer readable medium 700 in form of CD or DVD. The computer readable medium has the program 630 stored thereon.
It should be appreciated that future networks may utilize network functions virtualization (NFV) which is a network architecture concept that proposes virtualizing network node functions into “building blocks” or entities that may be operationally connected or linked together to provide services. A virtualized network function (VNF) may comprise one or more virtual machines running computer program codes using standard or general type servers instead of customized hardware. Cloud computing or data storage may also be utilized. In radio communications, this may mean node operations to be carried out, at least partly, in a central/centralized unit, CU, (e.g. server, host or node) operationally coupled to distributed unit, DU, (e.g. a radio head/node) . It is also possible that node operations will be distributed among a plurality of servers, nodes or hosts. It should also be understood that the distribution of labour between core network operations and base station operations may vary depending on implementation.
In an embodiment, the server may generate a virtual network through which the server communicates with the distributed unit. In general, virtual networking may involve a process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a virtual network. Such virtual network may provide flexible distribution of operations between the server and the radio head/node. In practice, any digital signal processing task may be performed in either the CU or the DU and the boundary where the responsibility is shifted between the CU and the DU may be selected according to implementation.
Therefore, in an embodiment, a CU-DU architecture is implemented. In such case the device 600 may be comprised in a central unit (e.g. a control unit, an edge cloud server, a server) operatively coupled (e.g. via a wireless or wired network) to a distributed unit (e.g. a remote radio head/node) . That is, the central unit (e.g. an edge cloud server) and the distributed unit may be stand-alone apparatuses communicating with each other via a radio path or via a wired connection. Alternatively, they may be in a same entity communicating via a wired connection, etc. The edge cloud or edge cloud server may serve a plurality of distributed units or a radio access networks. In an embodiment, at least some of the described processes may be performed by the central unit. In another embodiment, the device 600 may be instead comprised in the distributed unit, and at least some of the described processes may be performed by the distributed unit.
In an embodiment, the execution of at least some of the functionalities of the device 600 may be shared between two physically separate devices (DU and CU) forming one operational entity. Therefore, the apparatus may be seen to depict the operational entity comprising one or more physically separate devices for executing at least some of the described processes. In an embodiment, such CU-DU architecture may provide flexible distribution of operations between the CU and the DU. In practice, any digital signal processing task may be performed in either the CU or the DU and the boundary where the responsibility is shifted between the CU and the DU may be selected according to implementation. In an embodiment, the device 600 controls the execution of the processes, regardless of the location of the apparatus and regardless of where the processes/functions are carried out.
Generally, various embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While various aspects of embodiments of the present disclosure are illustrated and described as block diagrams, flowcharts, or using some other pictorial representations, it is to be understood that the block, apparatus, system, technique or method described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
The present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer readable storage medium. The computer program product includes computer-executable instructions, such as those included in program modules, being executed in a device on a target real or virtual processor, to carry out the method 300, 400 or 500 as described above with reference to Figs. 3-5. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, or the like that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Machine-executable instructions for program modules may be executed within a local or distributed device. In a distributed device, program modules may be located in both local and remote storage media.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagrams to be implemented. The program code may execute entirely on a machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present disclosure, the computer program codes or related data may be carried by any suitable carrier to enable the device, apparatus or processor to perform various processes and operations as described above. Examples of the carrier include a signal, computer readable medium, and the like.
The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable medium may include but not limited to an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of the computer readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM) , a read-only memory (ROM) , an erasable programmable read-only memory (EPROM or Flash memory) , an optical fiber, a portable compact disc read-only memory (CD-ROM) , an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are contained in the above discussions, these should not be construed as limitations on the scope of the present disclosure, but rather as descriptions of features that may be specific to particular embodiments. Certain features that are described in the context of separate embodiments may also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment may also be implemented in multiple embodiments separately or in any suitable sub-combination.
Although the present disclosure has been described in languages specific to structural features and/or methodological acts, it is to be understood that the present disclosure defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Claims (30)
- A first device, comprising:at least one processor; andat least one memory including computer program code;the at least one memory and the computer program code configured to, with the at least one processor, cause the first device to:transmit to a second device a request for surveillance of the second device;receive a response to the request from the second device; andin accordance with a determination that the response indicates that the second device accepts the surveillance, perform the surveillance of the second device.
- The first device of claim 1, wherein the first device is caused to perform the surveillance in absence of a data connection between the first device and the second device.
- The first device of claim 1, wherein the first device is further caused to obtain an identity of the second device from the response; andwherein the first device is caused to perform the surveillance by:sensing radio frequency signals transmitted from the second device based on the identity of the second device.
- The first device of claim 1, wherein the first device is further caused to:receive from a third device information concerning further surveillance of the second device performed by the third device; andupdate a result of the surveillance based on the information.
- The first device of claim 1, wherein the first device is caused to transmit to the second device the request for surveillance of the second device by:in response to reception of a probe request from the second device, transmitting a probe response to the second device, the probe response comprising the request for surveillance of the second device.
- The first device of claim 1, wherein the first device is further caused to:transmit an indication that the second device accepts the surveillance to a fourth device, the fourth device managing the first device and the second device.
- The first device of claim 6, wherein the first device is further caused to:transmit to the fourth device information concerning the surveillance performed by the first device for update of a result of the surveillance.
- The first device of claim 7, wherein the first device is further caused to:receive the updated result of the surveillance from the fourth device.
- The first device of claim 1, wherein the first device is further caused to:maintain a result of the surveillance of the second device within a predetermined period.
- The first device of claim 1, wherein the first device is caused to perform the surveillance in a predetermined frequency.
- The first device of claim 1, wherein the first device is caused to perform the surveillance based on at least one of the following:a location of the second device,a gesture of a carrier of the second device, ora behaviour of the carrier of the second device.
- A second device, comprising:at least one processor; andat least one memory including computer program code;the at least one memory and the computer program code configured to, with the at least one processor, cause the second device to:receive from a first device a request for surveillance of the second device;determine whether to accept or reject the surveillance; andtransmit to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- The second device of claim 12, wherein the surveillance is performed in absence of a data connection between the first device and the second device.
- The second device of claim 12, wherein the second device is further caused to:provide an identity of the second device in the response; andtransmit to the first device radio frequency signals in association with the identity of the second device.
- The second device of claim 12, wherein the second device is further caused to transmit a probe request to the first device; andwherein the second device is caused to receive the request for surveillance of the second device by:receiving a probe response from the first device, the probe response comprising the request for surveillance of the second device.
- The second device of claim 12, wherein the surveillance comprises at least one of the following:a determination of a location of the second device,a capture of a gesture of a carrier of the second device, ora capture of a behaviour of the carrier of the second device.
- A fourth device, comprising:at least one processor; andat least one memory including computer program code;the at least one memory and the computer program code configured to, with the at least one processor, cause the fourth device to:receive from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- The fourth device of claim 17, wherein the fourth device is further caused to:receive from the first device first information concerning the surveillance of the second device performed by the first device;receive from a third device second information concerning further surveillance of the second device performed by the third device; andupdate a result of surveillance of the second device based on the first information and the second information.
- The fourth device of claim 18, wherein the fourth device is further caused to:transmit the updated result of surveillance to at least one of the first device and the third device.
- The fourth device of claim 18, wherein the fourth device is further caused to:provide value-added services for the second device based on the updated result of surveillance
- The fourth device of claim 18, wherein the surveillance comprises at least one of the following:a determination of a location of the second device,a capture of a gesture of a carrier of the second device, ora capture of a behaviour of the carrier of the second device.
- A method, comprising:transmitting from a first device to a second device a request for surveillance of the second device;receiving a response to the request from the second device; andin accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
- A method, comprising:receiving at a second device from a first device a request for surveillance of the second device;determining whether to accept or reject the surveillance; andtransmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- A method, comprising:receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- An apparatus, comprising:means for transmitting from a first device to a second device a request for surveillance of the second device;means for receiving a response to the request from the second device; andmeans for in accordance with a determination that the response indicates that the second device accepts the surveillance, performing the surveillance of the second device.
- An apparatus, comprising:means for receiving at a second device from a first device a request for surveillance of the second device;means for determining whether to accept or reject the surveillance; andmeans for transmitting to the first device a response to the request, the response indicating that the second device accepts or rejects the surveillance.
- An apparatus, comprising:means for receiving at a fourth device from a first device an indication that the second device accepts surveillance performed by the first device, the first device and the second device managed by the fourth device.
- A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 22.
- A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 23.
- A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 24.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080107167.1A CN116458174A (en) | 2020-09-15 | 2020-09-15 | Apparatus, method, device and computer readable medium for performing monitoring |
PCT/CN2020/115402 WO2022056688A1 (en) | 2020-09-15 | 2020-09-15 | Devices, methods, apparatuses and computer readable media for performing surveillance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/115402 WO2022056688A1 (en) | 2020-09-15 | 2020-09-15 | Devices, methods, apparatuses and computer readable media for performing surveillance |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022056688A1 true WO2022056688A1 (en) | 2022-03-24 |
Family
ID=80777507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/115402 WO2022056688A1 (en) | 2020-09-15 | 2020-09-15 | Devices, methods, apparatuses and computer readable media for performing surveillance |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116458174A (en) |
WO (1) | WO2022056688A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103068035A (en) * | 2011-10-21 | 2013-04-24 | 中国移动通信集团公司 | Wireless network location method, device and system |
EP3082354A1 (en) * | 2013-12-30 | 2016-10-19 | Huawei Device Co., Ltd. | Location privacy protection method, device and system |
US20170094490A1 (en) * | 2015-07-09 | 2017-03-30 | GeoVisible, Inc. | Method and system for wireless communication in emergency situation |
CN111654843A (en) * | 2019-03-04 | 2020-09-11 | 深圳光启空间技术有限公司 | Method and system for automatically updating fingerprint database and wifi positioning method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI111788B (en) * | 2001-01-04 | 2003-09-15 | Nokia Corp | Procedure for creating privacy in a telecommunications network |
CN102236565A (en) * | 2010-04-30 | 2011-11-09 | 国际商业机器公司 | Method and system for cooperatively installing computer application |
CN108112071B (en) * | 2016-11-11 | 2021-07-20 | 中兴通讯股份有限公司 | Positioning method, positioning base station, positioning server and positioning system |
US10708835B2 (en) * | 2017-12-26 | 2020-07-07 | At&T Intellecutual Property I, L.P. | Control of wireless fidelity access for 5G or other next generation network |
WO2019138359A1 (en) * | 2018-01-12 | 2019-07-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Next generation radio access network wireless device rejection indication |
-
2020
- 2020-09-15 WO PCT/CN2020/115402 patent/WO2022056688A1/en active Application Filing
- 2020-09-15 CN CN202080107167.1A patent/CN116458174A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103068035A (en) * | 2011-10-21 | 2013-04-24 | 中国移动通信集团公司 | Wireless network location method, device and system |
EP3082354A1 (en) * | 2013-12-30 | 2016-10-19 | Huawei Device Co., Ltd. | Location privacy protection method, device and system |
US20170094490A1 (en) * | 2015-07-09 | 2017-03-30 | GeoVisible, Inc. | Method and system for wireless communication in emergency situation |
CN111654843A (en) * | 2019-03-04 | 2020-09-11 | 深圳光启空间技术有限公司 | Method and system for automatically updating fingerprint database and wifi positioning method and system |
Also Published As
Publication number | Publication date |
---|---|
CN116458174A (en) | 2023-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200336194A1 (en) | Joint beam reporting for wireless networks | |
CN114287150B (en) | Beam selection during downlink positioning | |
WO2022027186A1 (en) | Positioning reference signal design for low power tracking | |
WO2022047805A1 (en) | Methods, apparatuses and computer readable media for integrated access and backhaul communication | |
WO2022061617A1 (en) | Positioning reference signal transmission triggered by sounding reference signal | |
WO2021253165A1 (en) | Time sensitive communication | |
WO2021159498A1 (en) | Power control of positioning reference signal | |
WO2022056688A1 (en) | Devices, methods, apparatuses and computer readable media for performing surveillance | |
WO2023133892A1 (en) | Enhanced user equipment report | |
CN115053464B (en) | Beam selection at multiple transmission points | |
US20240314557A1 (en) | Network repository function services access authorization | |
WO2024216609A1 (en) | Determination of sensing beam | |
WO2024031457A1 (en) | Resource reservation for a positioning reference signal | |
US20240171642A1 (en) | Enhancement on device detection session | |
JP7545491B2 (en) | COMMUNICATIONS METHOD, DEVICE, AND COMPUTER-READABLE MEDIUM - Patent application | |
WO2024168931A1 (en) | Positioning | |
WO2024119297A1 (en) | Devices, methods, apparatuses and computer readable medium for communications | |
CN115211174B (en) | Measurement reporting in handover | |
US20230107338A1 (en) | Dynamic signaling for measurement gap | |
WO2023024114A1 (en) | Mitigation of performance degradation | |
US20240147254A1 (en) | Positioning beam management | |
WO2024197911A1 (en) | Reference signal configuration for target sensing | |
WO2023108377A1 (en) | Antenna configuration for positioning | |
WO2021142841A1 (en) | Fallback reference signal configuration | |
WO2024026753A1 (en) | Positioning measurement across frequency hops |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20953549 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202080107167.1 Country of ref document: CN |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20953549 Country of ref document: EP Kind code of ref document: A1 |