Femtocell location
First Claim
1. In a telecommunications system including at least one macro base station and at least one micro base station, each for wirelessly communicating with mobile terminals, a method of identifying movement of a particular micro base station from an expected location comprising:
- identifying a first communication of a given mobile terminal through the particular micro base station at a first point in time;
identifying a first location relating to the first communication;
identifying a second communication of the given mobile terminal through a first macro base station at a second point in time;
identifying a second location relating to the second communication;
performing a velocity check for the given mobile terminal between the first point in time and the second point in time using the first and second locations, wherein the velocity check includes calculating a speed or velocity result for the given mobile terminal from a distance between the particular micro base station and the first macro base station, determined using the first location and the second location, and a time period between the first and second points in time;
comparing the calculated speed or velocity result with a speed or velocity threshold; and
using a result of the velocity check relating to the given mobile terminal to determine whether the particular micro base station is located at the expected location, wherein, when the particular micro base station is not located at the expected location, the particular micro base station is determined as being at an unauthorized location.
1 Assignment
0 Petitions
Accused Products
Abstract
In a telecommunications network a technique of identifying unauthorised movement of an Access Point, also often described as a micro base station or a femto-cell, uses a velocity check to determine if the Access Point has been moved from its intended location to a remote, unauthorised location. In an embodiment, the system described herein determines the cell ID of the cell used before the access point was used and/or after the access point is used. The differences in location between the cell IDs and the expected location of the Access Point is then determined to see if the Access Point is in its correct position.
20 Citations
18 Claims
-
1. In a telecommunications system including at least one macro base station and at least one micro base station, each for wirelessly communicating with mobile terminals, a method of identifying movement of a particular micro base station from an expected location comprising:
-
identifying a first communication of a given mobile terminal through the particular micro base station at a first point in time; identifying a first location relating to the first communication; identifying a second communication of the given mobile terminal through a first macro base station at a second point in time; identifying a second location relating to the second communication; performing a velocity check for the given mobile terminal between the first point in time and the second point in time using the first and second locations, wherein the velocity check includes calculating a speed or velocity result for the given mobile terminal from a distance between the particular micro base station and the first macro base station, determined using the first location and the second location, and a time period between the first and second points in time; comparing the calculated speed or velocity result with a speed or velocity threshold; and using a result of the velocity check relating to the given mobile terminal to determine whether the particular micro base station is located at the expected location, wherein, when the particular micro base station is not located at the expected location, the particular micro base station is determined as being at an unauthorized location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network analysis engine configured for use in a telecommunications system, the telecommunications system including at least one macro base station and at least one micro base station, each for wirelessly communicating with mobile terminals, the network analysis engine comprising:
-
a first communication identifier for identifying a first communication through a particular micro base station relating to a given mobile terminal; a first time identifier for identifying a first point in time relating to the first communication; a first location identifier for identifying a first location relating to the first communication; a second communication identifier for identifying a second communication relating to the given mobile terminal through a first macro base station; a second time identifier for identifying a second point in time relating to the second communication; and a second location identifier for identifying a second location relating to the second communication; an analyzer configured to; use the first and second locations and the first and second points in time to perform a velocity check for the given mobile terminal between the first and second points in time; and use a result of the velocity check relating to the given mobile terminal to determine whether the particular micro base station is located at an expected location, wherein, when the particular micro base station is not located at the expected location, the particular micro base station is determined as being at an unauthorized location, wherein the velocity check, that the analyzer is configured to perform, includes calculating a speed or velocity result for the given mobile terminal from a distance between the particular micro base station and the first macro base station, determined using the first location and the second location, and a time period between the first and second points in time; and a comparing device for comparing the calculated speed or velocity with a speed or velocity threshold. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification