System and method for location reporting in an untrusted network environment
First Claim
1. A method comprising:
- receiving location information for a user equipment (UE), wherein the location information includes, at least in part, a location of the UE, a Media Access Control (MAC) address for a particular access point (AP) to which the UE is connected in an untrusted access network and a cell identifier (ID) for a macro cell;
determining that at least one of the location of the UE or the MAC address included in the location information is potentially invalid;
comparing the cell ID for the macro cell received in the location information to cell IDs previously received for the UE for the location;
determining whether the UE is moving based on the comparison; and
populating a location database with the location information for the UE if the UE is determined to be moving.
0 Assignments
0 Petitions
Accused Products
Abstract
An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the UE is connected; reporting location information for the UE to an evolved Packet Data Gateway over an SWu interface using Internet Key Exchange version 2 (IKEv2) protocol, wherein the location information includes, at least in part, a UE location in GPS coordinates, a service set identifier, the retrieved AP MAC address and cell identity information for the UE; and populating a location database with the location information. The method can include embedding the location information in an identity initiator (Idi) of an IKE Authentication Request (IKE_AUTH_REQ) message using a Network Access Identifier (NAI) and communicating the location information from the ePDG to a PGW over an S2b interface using a private extension information element of GPRS Tunneling Protocol version 2 (GTPv2).
19 Citations
20 Claims
-
1. A method comprising:
-
receiving location information for a user equipment (UE), wherein the location information includes, at least in part, a location of the UE, a Media Access Control (MAC) address for a particular access point (AP) to which the UE is connected in an untrusted access network and a cell identifier (ID) for a macro cell; determining that at least one of the location of the UE or the MAC address included in the location information is potentially invalid; comparing the cell ID for the macro cell received in the location information to cell IDs previously received for the UE for the location; determining whether the UE is moving based on the comparison; and populating a location database with the location information for the UE if the UE is determined to be moving. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more non-transitory tangible media encoding logic that includes instructions for execution that when executed by a processor, is operable to perform operations comprising:
-
receiving location information for a user equipment (UE), wherein the location information includes, at least in part, a location of the UE, a Media Access Control (MAC) address for a particular access point (AP) to which the UE is connected in an untrusted access network and a cell identifier (ID) for a macro cell; determining that at least one of the location of the UE or the MAC address included in the location information is potentially invalid; comparing the cell ID for the macro cell received in the location information to cell IDs previously received for the UE for the location; determining whether the UE is moving based on the comparison; and populating a location database with the location information for the UE if the UE is determined to be moving. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system comprising:
a Policy and Charging Rules Function (PCRF) comprising at least one memory element for storing data and at least one processor that executes instructions associated with the data, the PCRF being adapted when executed by the at least one processor to; receive location information for a user equipment (UE), wherein the location information includes, at least in part, a location of the UE, a Media Access Control (MAC) address for a particular access point (AP) to which the UE is connected in an untrusted access network and a cell identifier (ID) for a macro cell; determine that at least one of the location of the UE or the MAC address included in the location information is potentially invalid; compare the cell ID for the macro cell received in the location information to cell IDs previously received for the UE for the location; determine whether the UE is moving based on the comparison; and populate a location database with the location information for the UE if the UE is determined to be moving. - View Dependent Claims (18, 19, 20)
Specification