[go: up one dir, main page]

WO2020049342A1 - Identification et suivi de dispositif sans fil - Google Patents

Identification et suivi de dispositif sans fil Download PDF

Info

Publication number
WO2020049342A1
WO2020049342A1 PCT/IB2018/056819 IB2018056819W WO2020049342A1 WO 2020049342 A1 WO2020049342 A1 WO 2020049342A1 IB 2018056819 W IB2018056819 W IB 2018056819W WO 2020049342 A1 WO2020049342 A1 WO 2020049342A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless device
unregistered
management node
node
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2018/056819
Other languages
English (en)
Inventor
Reza FARRAHI MOGHADDAM
Fereydoun FARRAHI MOGHADDAM
Adriano MATOS PINHEIRO
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Priority to PCT/IB2018/056819 priority Critical patent/WO2020049342A1/fr
Publication of WO2020049342A1 publication Critical patent/WO2020049342A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0278Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves involving statistical or probabilistic considerations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0294Trajectory determination or predictive filtering, e.g. target tracking or Kalman filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Definitions

  • 5G wireless communication standard also referred to as new radio (NR)
  • 5G wireless communication standard also referred to as new radio (NR)
  • NR new radio
  • On-demand prioritization of resources e.g., network, computing and/or storage resources, among others
  • resources e.g., network, computing and/or storage resources, among others
  • FIG. 1 is a diagram of example non-roaming Next Generation (NextGen or “NG”) reference architecture described in Third Generation Partnership Project (3 GPP) Technical Report (TR) 23.799 (3 GPP TR 23.799).
  • the NG architecture includes several network functions and several reference points (NG1-NG15), which may indicate interfaces between the network functions.
  • the NG architecture shown in FIG. 1 includes:
  • AMF Core Access and Mobility Management Function: This function handles the mobility management.
  • SMF Session Management Control Function: This function handles the session management. SMF interacts via NG4 with the User Plane Function (UPF).
  • UPF User Plane Function
  • AMF and SMF work under, via NG8, NG10, and NG12, the Authentication Server Function (AUSF) and the Unified Data Management (UDM).
  • UDM supports the Authentication Credential Repository and Processing Function (ARPF), which stores the long-term security credentials.
  • PCF Policy Control Function: This function is responsible for policy control in order to support Quality of Service (QoS).
  • QoS Quality of Service
  • AF Application Function: This function provides information on packet flow to the PCF.
  • AUSF Authentication Server Function: This function stores data for authentication of the wireless device (WD).
  • UPF User Plane Function: This function supports user plane operations.
  • UDM User Data Management
  • AF Application Function: This function may provide session related information to the PCF.
  • DN Data Network: may identify service provider services, Internet access or third-party services.
  • RAN may be a network node using one or more radio access
  • UTM Universal Traffic Management
  • Some embodiments advantageously provide methods and apparatuses for a wireless communication network to identify and/or track unregistered wireless devices, such as unregistered UASs.
  • the methods and apparatuses disclosed herein provide for a management node in the control plane of a wireless communication network that facilitates identifying and tracking unregistered wireless devices detected in the network coverage area based on, for example, analysis of spectral characteristics of signals received from the unregistered wireless device or other techniques.
  • a management node configured to operate in a control plane of a wireless communication network.
  • the management node includes processing circuitry configured to: if registration of an unregistered wireless device fails, initiate collection of data associated with the unregistered wireless device; determine a virtual identifier for the unregistered wireless device based on the collected data; and initiate tracking of a spatial location of the unregistered wireless device using the virtual identifier.
  • the management node is configured to provide one of a plurality of network functions operating in the control plane of a wireless communication architecture of the wireless communication network. In some embodiments of this aspect, the management node is configured to
  • the processing circuitry is further configured to receive an indication that the unregistered wireless device has been detected in a cell coverage area of a network node; and receive an indication that registration of the unregistered wireless device with a network node has failed.
  • the initiating of the collection of data includes requesting a network node to collect data associated with transmissions from the unregistered wireless device.
  • the collected data is based on one of a radio frequency beacon from the unregistered wireless device and transmissions from the unregistered wireless device that is addressed to another wireless device.
  • the processing circuitry is further configured to generate a plurality of signal
  • the virtual identifier is based on the plurality of signal characteristics.
  • the wireless device is an unmanned vehicle.
  • the processing circuitry is further configured to transmit the virtual identifier of the unregistered wireless device to at least one other management node operating in the control plane of the wireless communication network for tracking of the unregistered wireless device in at least one cell.
  • the processing circuitry is further configured to train a state machine using the collected data, the determination of the virtual identifier for the unregistered wireless device being based on the trained state machine.
  • a method for a management node configured to operate in a control plane of a wireless communication network. The method includes, if registration of an unregistered wireless device fails, initiating collection of data associated with the unregistered wireless device; generating a virtual identifier for the unregistered wireless device based on the collected data; and initiating tracking of a spatial location of the unregistered wireless device using the virtual identifier.
  • the management node is configured to provide one of a plurality of network functions operating in the control plane of a wireless communication architecture of the wireless communication network. In some embodiments of this aspect, the management node is configured to
  • the method further includes receiving an indication that the unregistered wireless device has been detected in a cell coverage area of a network node; and receiving an indication that registration of the unregistered wireless device with a network node has failed.
  • the initiating of the collection of data includes requesting a network node to collect data associated with transmissions from the unregistered wireless device.
  • the collected data is based on one of a radio frequency beacon from the unregistered wireless device and transmissions from the unregistered wireless device that is addressed to another wireless device.
  • the method includes generating a plurality of signal characteristics associated with the transmissions based on the collected data, the virtual identifier is based on the plurality of signal characteristics.
  • the wireless device is an unmanned vehicle.
  • the method further includes transmitting the virtual identifier of the unregistered wireless device to at least one other management node operating in the control plane of the wireless communication network for tracking of the unregistered wireless device in at least one cell.
  • the method further includes training a state machine using the collected data, the determination of the virtual identifier for the unregistered wireless device being based on the trained state machine.
  • a computer storage device storing a computer program that, when executed by at least one processor of a management node, causes the management node to perform any of the methods for the management node.
  • FIG. 1 is a block diagram of example non-roaming NG reference architecture
  • FIG. 2 is a schematic diagram illustrating wireless devices in a cell coverage area without communication with the cell tower;
  • FIG. 3 is a schematic diagram illustrating that a UTM is aware of the identity (ID) of a green drone wireless device and its location via the service provided by the operator of the cell tower and also the database of registered drones;
  • ID identity
  • FIG. 4 is a schematic diagram of an example network architecture illustrating a communication system connected according to the principles in the present disclosure
  • FIG. 5 is a block diagram of a network node in communication with a management node over a connection according to some embodiments of the present disclosure
  • FIG. 6 is a block diagram illustrating example placement of a management node, such as, a UIMF in the reference architecture according to the principles of the present disclosure
  • FIG. 7 is a flowchart of an example process in a management node for identity management according to some embodiments of the present disclosure
  • FIG. 8 is a flowchart of an example process in a network node for data collection according to some embodiments of the present disclosure
  • FIG. 9 is a flow diagram illustrating example interactions among a network node, management node, UIMA and an unregistered wireless device according to some embodiments of the present disclosure
  • FIG. 10 is a schematic diagram illustrating the establishment of an involuntary link (IL) between the network node and an unregistered wireless device in a cell coverage area according to at least some of the principles of the present disclosure
  • FIG. 11 is a schematic diagram illustrating the management node utilizing data from the IL to provide a virtual identity for the unregistered wireless device, which can allow a UTM and UIMA to identify and track the unregistered wireless device according to at least some of the principles of the present disclosure;
  • FIG. 12 is a schematic diagram illustrating hidden and visible (collectable) data from the IL according to some embodiments of the present disclosure
  • FIG. 13 is a schematic diagram illustrating state machine training using data collected from the IL according to some embodiments of the present disclosure
  • FIG. 14 is a schematic diagram illustrating state machine training using data collected from the IL as well as data“generated” using a controlled green drone according to some embodiments of the present disclosure
  • FIG. 15 is a schematic diagram illustrating state machine training using data collected from the IL as well as an additional fuzzy parameter according to some embodiments of the present disclosure
  • FIG. 16 is a schematic diagram illustrating an example process for
  • FIG. 17 is a schematic diagram illustrating state machine training using data collected from the IL as well as an additional temporal“sentence” according to some embodiments of the present disclosure
  • FIG. 18 is a schematic diagram illustrating an example process for calculating the temporal sentence according to some embodiments of the present disclosure
  • FIG. 19 is a block diagram illustrating geographically distributed management nodes and their interactions with UIMA according to some embodiments of the present disclosure.
  • FIG. 20 is a block diagram illustrating an example UTM architecture utilizing network operators associated with a wireless communication network to track unregistered UASs in cooperation with multiple actors according to at least some of the principles of the present disclosure.
  • 5G 5 th Generation
  • UDM Universal Traffic Management
  • the existing business-as-usual offerings are more in the form of a denial-of-service perspective, which means that if there is no subscription to“a” carrier or a service provider, there will be no service provided (with exception of emergency calls, for example) to the wireless device.
  • a carrier a home network
  • FIG. 2 illustrates a“red drone” in a coverage area of a cell tower/network node but without communicating with the network node. Instead, there is a direct link (DL) between the red drone and a controller (e.g., remote control (RC)) of a red actor. This is illustrated in FIG. 2 in contrast with the green drone that is shown directly communicating with the network node over a direct link (DL).
  • a controller e.g., remote control (RC)
  • RC remote control
  • the term“red drone” refers to a wireless device, such as a drone, that is within a coverage area but is not communicating with a network node in that coverage area, i.e., an unregistered/unauthenticated wireless device.
  • A“red actor” refers to the operator of a“red drone”.
  • a“red drone” may also be referred to as a “rogue drone”, and the operator of a rogue drone may be referred to as a“rogue actor” or a“rogue operator”.
  • the term“green drone” refers to a wireless device, such as a drone, that is within a coverage area and is communicating with a network node in that coverage area.
  • FIG. 3 illustrates the identity (ID) and location of the green drone being registered with the UTM via the network node; yet an ID and location of the red drone is unknown to the UTM.
  • the red drone/UAS may need to be forced, in some cases, to involuntarily“provide” the information in these use cases.
  • These uses cases could have a large variety of interactions, including avoidance of a geo-defined region of interest, avoidance of a moving object (airplane), self-identification, among others.
  • tracking of wireless devices such as drones/UASs may be a critical function for many third-party actors, including public safety actors and/or
  • a universal function connected to global actors may reduce the burden on network operators in order to fulfill their responsibilities, but such functionality is not provided in existing architectures.
  • UIMA Universal Identity Management Authority
  • One example use case is the case of“fly away drones” where a user loses control of a drone. These drones may fly for hundreds of kilometers, and cross the boundaries of states/provinces/countries, passing by multiple points-of-presences (PoPs) without being noticed. Unfortunately, such fly away drones can present a danger and cause physical damage.
  • Applicant’s disclosure provides a solution to solve at least part of the one or more problems with existing systems by modifying existing reference architecture to includes new network function(s) for handling unauthenticated/unregistered wireless devices such as drones/UASs.
  • some embodiments of this disclosure provide a function which may be implemented in a management node in a wireless communications network.
  • This function may be referred to herein as a Universal Identity Management Function (UIMF), however, such function may be referred to by other names outside of this disclosure.
  • the UIMF may be added to the reference architecture in close relation with the AMF (see e.g., FIG. 6).
  • the UIMF may provide various functions to handle the case of identification and then tracking of an uncooperative drone, which may be referred to as a“red drone”.
  • the UIMF may sense and“virtually” identify drones (or other WDs) without requiring any direct connection between the drone and the network node.
  • a Universal Identity Management Authority UIMA
  • UIMA Universal Identity Management Authority
  • the functions that the UIMA provides may include centrally (but also in a distributed manner) collecting and distributing data from all instances of UIMFs.
  • some embodiments of this disclosure provide a standard and universal method and apparatus for handling of unauthenticated/red WDs (including unauthenticated drones/UASs).
  • unauthenticated/red WDs including unauthenticated drones/UASs.
  • application of the UIMF functions in this disclosure for authenticated WDs may also be considered.
  • the UIMF may provide functionalities to handle those WDs that do not authenticate (and probably are not registered anywhere).
  • the principles of the disclosure may address how to handle these unregistered WDs because they may impose a physical danger.
  • the UIMF allows for tracking of these WDs (and, in some embodiments, also registered WDs) with or without collaboration from the WD itself.
  • Some embodiments of this disclosure advantageously provide a new reference architecture for handling use cases that do not currently exist.
  • Some embodiments of this disclosure provide methods and apparatuses for large scale (in space and time) govemance/tracking of wireless devices such as drones/UASs using 5G resources, without requiring a large amount of additional resource allocation and investment. Some embodiments of this disclosure provide a roadmap and integration of a UTM in the 5G solution in the future, which accelerates such integration and at the same time makes 5G an element of UTMs.
  • Some revenue advantages associated with the principles in this disclosure could include opening a standardized approach to commercialization of drone/UAS applications. It is possible identifying/tracking drones may become a requirement by the government (enforced). Therefore, a standard approach according to the principles of this disclosure could reduce the burden on the telecom operators. Furthermore, customers (e.g., drone operators) may benefit from increased commercialization of drone/UAS applications. Also, customers (e.g., general public) may benefit from a lower rate of abusive cases of using drones.
  • relational terms such as“first” and“second,”“top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
  • the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the concepts described herein.
  • the singular forms“a”,“an” and“the” are intended to include the plural forms as well, unless the context clearly indicates otherwise.
  • the joining term,“in communication with” and the like may be used to indicate electrical or data communication, which may be accomplished by physical contact, induction, electromagnetic radiation, radio signaling, infrared signaling or optical signaling, for example.
  • electrical or data communication which may be accomplished by physical contact, induction, electromagnetic radiation, radio signaling, infrared signaling or optical signaling, for example.
  • the term“coupled,”“connected,” and the like may be used herein to indicate a connection, although not necessarily directly, and may include wired and/or wireless connections.
  • network node can be any kind of network node comprised in a radio network which may further comprise any of base station (BS), radio base station, base transceiver station (BTS), base station controller (BSC), radio network controller (RNC), g Node B (gNB), evolved Node B (eNB or eNodeB), Node B, multi-standard radio (MSR) radio node such as MSR BS, multi-cell/multicast coordination entity (MCE), relay node, donor node controlling relay, radio access point (AP), transmission points, transmission nodes, Remote Radio Unit (RRU) Remote Radio Head (RRH), a core network node (e.g., mobile management entity (MME), self-organizing network (SON) node, a coordinating node, positioning node, MDT node, etc.), an external node (e.g., 3rd party node, a node external to the current network), nodes in distributed antenna system (DAS), a spectrum access system (SAS) no
  • BS base station
  • wireless device or a user equipment (UE) are used interchangeably.
  • the WD herein can be any type of wireless device capable of communicating with a network node or another WD over radio signals, such as wireless device (WD), a UAS, a UAV, or a drone.
  • the WD may also be a radio communication device, target device, device to device (D2D) WD, machine type WD or WD capable of machine to machine communication (M2M), low-cost and/or low-complexity WD, a sensor equipped with WD, Tablet, mobile terminals, smart phone, laptop embedded equipped (LEE), laptop mounted equipment (LME), USB dongles, Customer Premises Equipment (CPE), an Internet of Things (IoT) device, or a Narrowband IoT (NB-IOT) device, etc.
  • the WD may be a drone or UAS.
  • the generic term“radio network node” is used. It can be any kind of a radio network node which may comprise any of base station, radio base station, base transceiver station, base station controller, network controller, RNC, evolved Node B (eNB), Node B, gNB, Multi-cell/multicast Coordination Entity (MCE), relay node, access point, radio access point, Remote Radio Unit (RRU) Remote Radio Head (RRH).
  • RNC evolved Node B
  • MCE Multi-cell/multicast Coordination Entity
  • RRU Remote Radio Unit
  • RRH Remote Radio Head
  • the terms“virtual identifier” and“virtual identity” and “virtual ID” are used interchangeably.
  • the virtual ID may be based on a plurality of unique or distinguishable signal characteristics (e.g., radio frequency (RF) transmission characteristics or optical transmissions, etc.) associated with a WD.
  • the virtual ID may be a UAV RF fingerprint based on spectral analysis.
  • the virtual ID may be obtained from a beacon signal from the WD (e.g., collision avoidance signals).
  • the virtual ID may be based on other identifying characteristics of the WD.
  • the virtual ID may be considered to uniquely identify the WD.
  • the virtual ID may not be globally unique, but be sufficiently distinct for tracking a WD across one or more cells over a reasonable or useful time period.
  • WCDMA Wide Band Code Division Multiple Access
  • WiMax Worldwide Interoperability for Microwave Access
  • UMB Ultra Mobile Broadband
  • GSM Global System for Mobile Communications
  • functions described herein as being performed by a management node or a network node may be distributed over a plurality of management nodes and/or network nodes.
  • the functions of the network node and management node described herein are not limited to performance by a single physical device and, in fact, can be distributed among several physical devices.
  • the functions performed by the management node and by the network node can be implemented together in a single physical node.
  • FIG. 4 a schematic diagram of a communication system 10, according to an embodiment, such as a 3GPP-type cellular network that may support standards such as LTE, 5G and/or NR (5G), which comprises an access network 12, such as a radio access network, and a core network 14.
  • the access network 12 comprises a plurality of network nodes l6a, l6b, l6c (referred to collectively as network nodes 16), such as NBs, eNBs, gNBs or other types of wireless access points, each defining a corresponding coverage area l8a, l8b, l8c (referred to collectively as coverage areas 18).
  • Each network node l6a, l6b, l6c is connectable to the core network 14 over a wired and/or wireless connection 20.
  • a first wireless device (WD) 22a which may be a UAS, is located in coverage area l8a served by the corresponding network node l6c.
  • a second WD 22b is in coverage area l8b and is configured to wirelessly connect to, or be paged by, the corresponding network node l6a. While a plurality of WDs 22a, 22b (collectively referred to as wireless devices 22) are illustrated in this example, the disclosed embodiments are equally applicable to a situation where a sole WD is in the coverage area or where a sole WD is connecting to the corresponding network node 16.
  • the system 10 may also include a plurality of management nodes 23a, 23b, 23c, 23d, which may be associated with corresponding network nodes l6a, l6b, l6c.
  • the management nodes 23a, 23b, 23b, 23d (collectively referred to as management node 23) may be configured to facilitate identifying and/or tracking unregistered WDs 22 traveling through the corresponding coverage areas l8a, l8b, l8c, respectively, according to at least some of the principles of this disclosure.
  • the management nodes 23a, 23b, 23b, 23d may be configured to facilitate identifying and/or tracking unregistered WDs 22 traveling through the corresponding coverage areas l8a, l8b, l8c, respectively, according to at least some of the principles of this disclosure.
  • the management nodes 23a, 23b, 23c, 23d may be configured to facilitate identifying and/or tracking unregistered WDs 22 traveling through the corresponding coverage areas l8a
  • management node 23 may also be configured to identify and/or track registered WDs 22, as well. Note that although only two WDs 22, four management nodes 23 and three network nodes 16 are shown for convenience, the communication system 10 may include many more WDs 22, management nodes 23 and network nodes 16.
  • a WD 22 can be in simultaneous communication and/or configured to separately communicate with more than network node 16 and more than one type of network node 16.
  • a WD 22 can have dual connectivity with a network node 16 that supports LTE and the same or a different network node 16 that supports NR.
  • the WD 22 can be in
  • eNB for LTE/E-UTRAN and a gNB for NR/NG-RAN.
  • a network node 16 is configured to include a data collection unit 32 which is configured to detect an unregistered WD 22 in a cell coverage area 18 and determine whether registration of the WD 22 failed.
  • the data collection unit 32 may cause the network node 16 to transmit an indication that registration of the unregistered WD 22 failed, report collected data associated with the unregistered WD 22, and monitor the unregistered WD 22 using a virtual identity, the virtual identity being based on the collected data.
  • a management node 23 is configured to include an identity management unit 34 which is configured to, if registration of an unregistered wireless device 22 fails, initiate collection of data associated with the unregistered wireless device 22; determine a virtual identifier for the unregistered wireless device 22 based on the collected data; and initiate tracking of a spatial location of the unregistered wireless device 22 using the virtual identifier.
  • a network node 16 comprises hardware 40 enabling it to communicate with the WD 22 and/or the management node 23 via a connection 42.
  • control plane communications may be performed over the connection 42 between the network node 16 and the management node 23 according to the principles of this disclosure.
  • the hardware 40 may include a communication interface 44.
  • the communication interface 44 may be configured for setting up and maintaining a wired connection with an interface of a different communication device of the communication system 10.
  • the communication interface 44 may include a radio interface for setting up and maintaining at least a wireless connection with a WD 22 located in a coverage area 18 served by the network node 16.
  • the radio interface may be formed as or may include, for example, one or more RF transmitters, one or more RF receivers, and/or one or more RF transceivers.
  • the hardware 40 of the network node 16 further includes processing circuitry 46.
  • the processing circuitry 46 may include a processor 48 and a memory 50.
  • the processing circuitry 46 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry) adapted to execute instructions.
  • the processor 48 may be configured to access (e.g., write to and/or read from) the memory 50, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
  • volatile and/or nonvolatile memory e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
  • the network node 16 further has software 52 stored internally in, for example, memory 50, or stored in external memory (e.g., database, storage array, network storage device, etc.) accessible by the network node 16 via an external connection.
  • the software 52 may be executable by the processing circuitry 46.
  • the processing circuitry 46 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by network node 16.
  • Processor 48 corresponds to one or more processors 48 for performing network node 16 functions described herein.
  • the memory 50 is configured to store data, programmatic software code and/or other information described herein.
  • the software 52 may include instructions that, when executed by the processor 48 and/or processing circuitry 46, causes the processor 48 and/or processing circuitry 46 to perform the processes described herein with respect to network node 16.
  • processing circuitry 46 of the network node 16 may include the data collection unit 32 configured to configured to detect an unregistered WD 22 in a cell coverage area 18 and determine whether registration of the WD 22 failed.
  • the data collection unit 32 may cause the network node 16 to transmit an indication that registration of the unregistered WD 22 failed, report collected data associated with the unregistered WD 22, and monitor the unregistered WD 22 using a virtual identity, the virtual identity being based on the collected data.
  • the communication system 10 further includes the management node 23 already referred to.
  • the management node 23 may have hardware 60 that may include a communication interface 62.
  • the communication interface 62 may be configured to set up and maintain a connection 42 with a network node 16. In some embodiments, control plane communications may be performed over the connection 42 between the network node 16 and the management node 23 according to the principles of this disclosure.
  • the communication interface 62 may be configured for setting up and maintaining a wired connection with an interface of a different communication device of the communication system 10.
  • the communication interface 62 may include a radio interface that may be formed as or may include, for example, one or more RF transmitters, one or more RF receivers, and/or one or more RF transceivers.
  • the hardware 60 of the management node 23 further includes processing circuitry 64.
  • the processing circuitry 64 may include a processor 66 and memory 68.
  • the processing circuitry 64 may comprise integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry) adapted to execute instructions.
  • the processor 66 may be configured to access (e.g., write to and/or read from) memory 68, which may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only
  • memory 68 may comprise any kind of volatile and/or nonvolatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only
  • the management node 23 may further comprise software 70, which is stored in, for example, memory 68 at the management node 23, or stored in external memory (e.g., database, storage array, network storage device, etc.) accessible by the management node 23.
  • the software 70 may be executable by the processing circuitry 64.
  • the processing circuitry 64 may be configured to control any of the methods and/or processes described herein and/or to cause such methods, and/or processes to be performed, e.g., by management node 23.
  • the processor 66 corresponds to one or more processors 66 for performing management node 23 functions described herein.
  • the management node 23 includes memory 68 that is configured to store data, programmatic software code and/or other information described herein.
  • the software 70 may include instructions that, when executed by the processor 66 and/or processing circuitry 64, causes the processor 66 and/or processing circuitry 64 to perform the processes described herein with respect to management node 23.
  • the processing circuitry 64 of the wireless device 22 may include an identity management unit 34 configured to, if registration of an
  • unregistered wireless device 22 fails, initiate collection of data associated with the unregistered wireless device 22; determine a virtual identifier for the unregistered wireless device 22 based on the collected data; and initiate tracking of a spatial location of the unregistered wireless device 22 using the virtual identifier.
  • the management node 23 is configured to provide one of a plurality of network functions operating in the control plane of a wireless communication architecture of the wireless communication network. In some embodiments, the management node 23 is configured to communicate with a core Access and Mobility Management Function (AMF) of a wireless communication architecture and a network node 16 using the control plane of the wireless
  • AMF Access and Mobility Management Function
  • the processing circuitry 64 is further configured to receive an indication that the unregistered wireless device 22 has been detected in a cell coverage area 18 of a network node 16; and receive an indication that registration of the unregistered wireless device 22 with a network node 16 has failed.
  • the initiating of the collection of data includes requesting a network node 16 to collect data associated with transmissions from the unregistered wireless device 22.
  • the collected data is based on one of a radio frequency beacon (e.g., Automatic Dependent Surveillance - Broadcast (ADS-B) system) from the unregistered wireless device 22 and transmissions from the unregistered wireless device 22 that is addressed to another wireless device 22 (e.g., collision avoidance signal).
  • ADS-B Automatic Dependent Surveillance - Broadcast
  • the processing circuitry 64 is further configured to generate a plurality of signal characteristics associated with the transmissions based on the collected data, the virtual identifier is based on the plurality of signal characteristics.
  • the wireless device 22 is an unmanned vehicle.
  • the processing circuitry 64 is further configured to transmit the virtual identifier of the unregistered wireless device 22 to at least one other management node 23 operating in the control plane of the wireless communication network for tracking of the unregistered wireless device 22 in at least one cell. In some embodiments, the processing circuitry 64 is further configured to train a state machine using the collected data, the determination of the virtual identifier for the unregistered wireless device 22 being based on the trained state machine.
  • the inner workings of the network node 16 and management node 23 may be as shown in FIG. 5 and independently, the surrounding network topology may be that of FIG. 4.
  • connection 42 between the management node 23 and the network node 16 is shown, which may include a wired and/or wireless connection, in accordance with the teachings of the embodiments described throughout this disclosure.
  • FIGS. 4 and 5 illustrate the network node 16 and the management node 23 being separate, it is contemplated that, in some embodiments, the network node 16 and the management node 23 may be implemented in the same node or device. In other words, in some embodiments, the functions of the network node 16 and the management node 23 discussed herein may be implemented in the same node.
  • FIGS. 4 and 5 show various“units” such as the data collection unit 32, and identity management unit 34 as being within a respective processor, it is contemplated that these units may be implemented such that a portion of the unit is stored in a corresponding memory within the processing circuitry. In other words, the units may be implemented in hardware or in a combination of hardware and software within the processing circuitry.
  • FIG. 6 illustrates example placement of a management node 23, such as, a Universal Identity Management Function (UIMF) in a reference architecture according to the principles of the present disclosure.
  • the management node 23 may be connected to the AMF and the network node 16, which may communicate with one another using, for example a control plane of the wireless communication network.
  • UIMF Universal Identity Management Function
  • UDM-Universal Identity Management may also be placed in the reference architecture in
  • the management node 23 may include the UIMF and, in some embodiments, the UIMF may be co-located with the AMF.
  • FIG. 7 is a flowchart of an example process in a management node 23 configured to operate in a control plane of a wireless communication network.
  • the method includes, if registration of an unregistered wireless device 22 fails, initiating collection of data associated with the unregistered wireless device 22 (block S100).
  • the method includes generating a virtual identifier for the unregistered wireless device 22 based on the collected data (block S102).
  • the method includes initiating tracking of a spatial location of the unregistered wireless device 22 using the virtual identifier (block S104).
  • the management node 23 is configured to provide one of a plurality of network functions operating in the control plane of a wireless communication architecture of the wireless communication network.
  • the management node 23 is configured to
  • the method includes receiving an indication that the unregistered wireless device 22 has been detected in a cell coverage area 18 of a network node 16; and receiving an indication that registration of the unregistered wireless device 22 with a network node 16 has failed.
  • AMF Access and Mobility Management Function
  • the initiating of the collection of data includes requesting a network node 16 to collect data associated with transmissions from the unregistered wireless device 22.
  • the collected data is based on one of a radio frequency beacon from the unregistered wireless device 22 and transmissions from the unregistered wireless device 22 that is addressed to another wireless device 22.
  • the method further includes generating a plurality of signal characteristics associated with the transmissions based on the collected data, the virtual identifier is based on the plurality of signal characteristics.
  • the wireless device 22 is an unmanned vehicle.
  • the method further includes transmitting the virtual identifier of the unregistered wireless device 22 to at least one other management node 23 operating in the control plane of the wireless communication network for tracking of the unregistered wireless device 22 in at least one cell.
  • the method further includes training a state machine using the collected data, the determination of the virtual identifier for the unregistered wireless device 22 being based on the trained state machine.
  • FIG. 8 is a flowchart of an example process in a network node 16 according to some embodiments of the present disclosure.
  • the process may include the network node 16 detecting an unregistered wireless device 22 in a cell coverage area 18 (block S 106).
  • the process may include determining whether registration of the wireless device 22 failed (block S 108). If the registration is successful, the process may return S106 where the network node 16 continues to detect unregistered wireless devices 22 in the cell coverage area 18. On the other hand, if the registration failed, the network node 16 may transmit an indication that registration of the unregistered wireless device 22 failed (block S 110). In some embodiments, such transmission may be to the management node 23.
  • the network node 16 may report collected data associated with the unregistered wireless device 22 (block S 112). In some embodiments, the report may be sent to the management node 23.
  • the network node 16 may monitor the unregistered wireless device 22 using a virtual identity, the virtual identity being based on the collected data (block S 114). In some embodiments, the network node 16 may receive this virtual identity from the management node 23.
  • FIG. 9 is a flow diagram illustrating an example process for identifying and tracking an unregistered WD 22 such as a drone/UAS according to the present disclosure.
  • the process may include communications and/or interactions between the network node 16, a radio associated with the network node 16, the management node 23, the WD 22 and the UIMA.
  • the UIMF may be collocated with the AMF in the management node 23.
  • the management node 23 may be located at the cell tower.
  • the network node 16 (e.g., eNB) may be in constant contact with the management node 23 (e.g., UIMF) in order to detect the presence of a drone in the cell coverage area 18. For example, in step S120, the network node 16 may continuously or periodically monitor the radio to detect unregistered WDs 22.
  • the management node 23 e.g., UIMF
  • step S122 the WD 22 enters the cell tower coverage and the radio may detect transmissions associated with the WD 22.
  • the radio may detect transmissions associated with the WD 22.
  • transmissions may be radio transmissions from the WD 22, such as, for example active transmissions or even passive reflection/deflection or other spectral
  • the WD 22 characteristics of a transceiver at the WD 22.
  • the WD 22 characteristics of a transceiver at the WD 22.
  • transmissions may be radio transmissions from a radio frequency beacon at the WD 22.
  • the transmissions may be optical transmissions.
  • the transmissions associated with the WD 22 may be any feature from the WD 22 that is detectable by the radio and/or the network node 16.
  • the management node 23 may start the process of identifying the red drone.
  • the radio may report the detection of the drone/WD 22 to the network node 16 and, in step S126, the network node 16 may activate the management node 23 (e.g., via a control plane message from the network node 16 to the management node 23).
  • the management node 23 may send a message to the network node 16 to request“collected data” X of an instance.
  • the network node 16 may approve and execute the request for collected data X.
  • the radio may then establish an involuntary link (IL) with the unregistered WD 22 and collect the data associated with the WD 22 in step S132.
  • IL involuntary link
  • FIG. 10 illustrates the establishment of an IL between the unregistered WD 22 (i.e., red drone) and the radio of the network node 16.
  • the radio may report the collected data X to the network node 16 in step S134.
  • the network node 16 may compile the collected data X and then send the
  • the management node 23 may perform an initial analysis of the collected data and generate and train a state machine using the collected data in step S138.
  • the management node 23 may generate a virtual identifier (ID) based on the collected data and/or the trained state machine.
  • ID virtual identifier
  • the final outcome of the training may be considered as the“virtual” ID of the WD 22.
  • the virtual identifier may be a kind of bio-metrics for the particular WD 22 that is not generally cloneable.
  • the virtual identifier may be based on a plurality of unique or distinguishable signal characteristics (e.g., radio frequency (RF) fingerprints based on variations or imperfections in the analog components of a radio transmitter at the WD 22) that may be caused by radio wave transmissions from hardware in the WD 22.
  • RF radio frequency
  • the virtual identifier may be based on other identifying characteristics of the WD 22.
  • RF radio frequency
  • the virtual ID may be obtained in other ways.
  • the management node 23 may obtain a virtual ID from an Automatic Dependent Surveillance - Broadcast (ADS-B) system on the WD 22, or a wireless protocol for UAVs, where the unregistered WD 22 would transmit its ID to another device (e.g., collision avoidance signals).
  • ADS-B Automatic Dependent Surveillance - Broadcast
  • the management node 23 may obtain the ID by reading the ID or looking-up the ID by for example a network lookup.
  • the management node 23 may, for example, actively cause the unregistered WD 22 to transmit an ID or some other identifying signal, or the management node 23 may passively detect an ID or some other identifying signal transmitted by the WD 22.
  • the management node 23 may exchange the“virtual” ID with other management nodes 23 and/or the UIMA.
  • the exchange may be performed systematically via the UIMA that also handles the exchange with various public safety actors, among other officials/bodies (e.g., see FIG. 20).
  • the management node 23 may exchange the“virtual” ID with other management nodes 23 and/or the UIMA.
  • the exchange may be performed systematically via the UIMA that also handles the exchange with various public safety actors, among other officials/bodies (e.g., see FIG. 20).
  • the management node 23 may report the state machine to the UIMA and request records associated with this virtual ID at the UIMA.
  • the UIMA may report the state machine to the UIMA and request records associated with this virtual ID at the UIMA.
  • FIG. 11 illustrates the virtual ID and location of the unregistered WD 22 (i.e., red drone) being known to the UTM via the principles of this disclosure.
  • the management node 23 may send a message to the network node 16 related to the unregistered WD 22 based, for example, on the commands from the UIMA.
  • the message could be a request to continue monitoring the unregistered WD 22 associated with the virtual ID.
  • the message could be a request message to discontinue monitoring, or to not monitor the particular WD 22.
  • the management node 23 may transmit the virtual identifier of the unregistered WD 22 to at least one other management node 23 operating in the control plane of the wireless communication network for tracking of the unregistered WD 22 across one or even multiple cells.
  • a request for “collected data” X of an instance is sent by e.g., the management node 23.
  • the management node 23 e.g., UIMF
  • the management node 23 (or UIMA) may determine that the instance is an instance-of-interest.
  • the management node 23 (e.g., UIMF) may send a request to the AMF or network node 16 for “collected data” X.
  • the data X may be a series of data points associated with signal characteristics of the WD 22.
  • Each data point may describe or represent the spectral features of the WD 22 observed by the network node 16 (e.g., eNodeB/(R)AN), as shown for example in FIG. 12.
  • the data points may include but are not limited to: mean frequency (k me an), min frequency (k m in), max frequency (k m ax), power at mean frequency (Pimean), power at min frequency (Pimin), and power at max frequency (Pimax) (see FIG. 13).
  • the values for these data points may be derived from the raw collected data (e.g., in steps S134 and S136 of FIG. 9) over the time period associated to that data point, e.g., from t_n to t_(n+l).
  • the min/max are calculated using a percentage threshold (for example, 5%/95%) imposed on the distribution of data (e.g., the power spectrum) over the time interval.
  • a state machine may be trained on X to get the“virtual” ID, as shown, for example in FIG. 13.
  • the state machine training may be performed for example, by the management node 23 in step S138 of FIG. 9.
  • the data points may be used to train a state machine to obtain the virtual ID, which may be sent to the UIMA e.g., in step S140 of FIG. 9.
  • an initialized machine is used. If the initialized machine is used (for example, when a trained machine from a green drone is used as the initial machine), the configuration/parameters of the state machine are initially set to those of the given machine. In an alternative embodiment (without an initialized machine), hyper-parameters of the machine may be provided (the number of states, for example).
  • a template state machine can be generated based on the hyper-parameters, and then the parameters may be set randomly, considering best practices known.
  • default hyper-parameters for example, the number of states equal to a predetermined number, such as five (5)
  • a template state machine may be generated based on those hyper
  • parameters may be set randomly, considering best known practices.
  • the whole X series of data points may be used to train the state machine, or a set of sub-series sampled from X may be used.
  • subsampled X series may be continuous within themselves, i.e., the data points of each of them may have the same index in the original X series.
  • the following optimization problems may be solved:
  • Algorithms such as Viterbi Algorithm and the Expectation- Maximization (EM) Algorithm can be used to find the optimal state sequences and also the optimal parameter values of this
  • mhsmm (Inference for Hidden Markov and Semi-Markov Models) for example is an R language package that can be used for the purpose of solving the optimization problem.
  • the trained machine for each series may be combined into a single machine, for example using a‘mean’ method.
  • the trained state machine may be returned (i.e., the set of hyper parameters and the parameters of the machine optimized, as in the processes described above) as the“virtual” ID of the WD 22.
  • FIG. 13 illustrates that the collected data X is fed into a training process to build a“state machine” associated to the source of that data.
  • the state machine then can predict the state of the source (S).
  • Hidden Markov Machines (hmm) or Hidden Semi-Markov Machines (hsmm) are the basic choices for the state machine; however, this disclosure is not limited to them, as other known techniques for the state machine may be used.
  • the training of the state machine can be: 1) unsupervised (e.g., only relying on the collected data), or 2) initiated from a supervised-trained machine then fine-tuned with the collected data.
  • FIG. 14 is a schematic diagram illustrating a mechanism to train a state machine using the data from a“green drone” in a supervised manner.
  • the collected data (X) is not accompanied with the true technology type used for the
  • the state machine is then trained using both these data sets.
  • the generating of an (X, T) tuple could be with a predefined scenario (e.g., when and to what technology it switches), or by observing a dgreen drone while performing other operations (e.g., unplanned sequences).
  • FIG. 15 illustrates that, in addition to the basic data, another field may be added to the basic data set, for example, a Pfuzzy field.
  • Pfuzzy may be considered a numeric (or other) representation of the whole spectrum power profile.
  • FIG. 16 illustrates details for how the Pfuzzy may be calculated. For example, to calculate the Pfuzzy, for every observed power spectrum profile within a time interval t_(n, n-l), i.e., from t_(n-l) to t_n, the distance between that profile and those in a fuzzy dictionary may be calculated and then based on a threshold (or other measures) a match is decided. If there is no match, the profile is added to the dictionary.
  • the collected data (X) with the additional Pfuzzy parameter may be considered an extended X, which is the basic X augmented with the“Pfuzzy” representation of the power spectrum.
  • the Pfuzzy could be an“index” from the dictionary of the“Pfuzzy” representations.
  • an extended X could include the basic X augmented with temporal“sentence” representations of the signal over the involuntary link (IL), as shown in FIG. 17.
  • The“sentence” is a numeric (or other) representation of temporal behavior of the radio frequency (RF) signal on the IL.
  • FIG. 18 illustrates some of the details for the calculations of the sentence.
  • The“temporal power spectrum profile” is calculated.
  • the temporal profile is a locally averaged profile with a time averaging window of much less than the actual t_(n, n-l) time interval.
  • a dictionary of“sentences” may be provided. Any new temporal profile is matched against the dictionary (using thresholding or any other method).
  • the index of the matching sentence in the dictionary is used as the“sentence” feature in X.
  • the temporal“sentence” could be an index from the dictionary of the“sentence” representations If there is not a match, the new temporal profile is added to the dictionary as a new dictionary sentence.
  • FIG. 19 is a block diagram illustrating geographically distributed UDM-UIMA instances and their interactions with UDM-UIM instances and their corresponding management nodes 23 (e.g., UIMF instances). Accordingly, the virtual IDs for unregistered WDs 22 can be communicated to and/or managed by the UIMA for e.g., tracking the movement of the unregistered WDs 22 across the network over multiple cell coverage areas 18 via multiple geographically distributed cell towers.
  • FIG. 20 illustrates an example UTM architecture including infrastructure from multiple third-party actors, such as, for example the FAA and public safety actors.
  • the USS entities shown in the diagram can be the telecom operators associated with the new reference architecture discussed in this disclosure.
  • the management node may be added to the reference architecture in close relation with the AMF.
  • the management node may provide various functions to handle the case of identification and then tracking of an uncooperative WD (e.g., red drone) moving through cell coverage areas.
  • the management node may facilitate sensing and“virtually” identifying drones (or other WDs) without requiring any direct connection between the drone and the network node.
  • a Universal Identity Management Authority UIMA
  • the concepts described herein may be embodied as a method, data processing system, and/or computer program product. Accordingly, the concepts described herein may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit” or“module.” Furthermore, the disclosure may take the form of a computer program product on a tangible computer usable storage medium having computer program code embodied in the medium that can be executed by a computer. Any suitable tangible computer readable medium may be utilized including hard disks, CD-ROMs, electronic storage devices, optical storage devices, or magnetic storage devices.
  • These computer program instructions may also be stored in a computer readable memory or storage medium that can direct a computer or other
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • Computer program code for carrying out operations of the concepts described herein may be written in an object oriented programming language such as Java® or C++.
  • the computer program code for carrying out operations of the disclosure may also be written in conventional procedural programming languages, such as the "C" programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer.
  • the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne des appareils et des procédés d'identification et/ou de suivi de drones non enregistrés. Dans un mode de réalisation, un procédé dans un mode de gestion fonctionnant dans un plan de commande d'un réseau de communication sans fil consiste, si l'enregistrement d'un dispositif sans fil non enregistré échoue, à lancer une collecte de données associées au dispositif sans fil non enregistré. Un identifiant virtuel est généré pour le dispositif sans fil non enregistré sur la base des données collectées, et le suivi d'un emplacement spatial du dispositif sans fil non enregistré est lancé à l'aide de l'identifiant virtuel.
PCT/IB2018/056819 2018-09-06 2018-09-06 Identification et suivi de dispositif sans fil Ceased WO2020049342A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2018/056819 WO2020049342A1 (fr) 2018-09-06 2018-09-06 Identification et suivi de dispositif sans fil

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2018/056819 WO2020049342A1 (fr) 2018-09-06 2018-09-06 Identification et suivi de dispositif sans fil

Publications (1)

Publication Number Publication Date
WO2020049342A1 true WO2020049342A1 (fr) 2020-03-12

Family

ID=63878717

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2018/056819 Ceased WO2020049342A1 (fr) 2018-09-06 2018-09-06 Identification et suivi de dispositif sans fil

Country Status (1)

Country Link
WO (1) WO2020049342A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113655811A (zh) * 2021-08-25 2021-11-16 北京理工大学 隐式通信下无人机协同跟踪地面目标的期望队形获得方法
US11659513B2 (en) * 2020-12-08 2023-05-23 International Business Machines Corporation Identifying unregistered devices through wireless behavior

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180027517A9 (en) * 2006-07-14 2018-01-25 Binj Laboratories, Inc. Method and System for Tracking and Determining a Location of a Wireless Transmission

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180027517A9 (en) * 2006-07-14 2018-01-25 Binj Laboratories, Inc. Method and System for Tracking and Determining a Location of a Wireless Transmission

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Remote Identification of Unmanned Aerial Systems; Stage 1 (Release 16)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 22.825, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V1.0.0, 4 September 2018 (2018-09-04), pages 1 - 22, XP051475199 *
HUAWEI ET AL: "Identification of air-borne drones", vol. RAN WG2, no. Hangzhou, CHINA; 20170515 - 20170519, 14 May 2017 (2017-05-14), XP051275503, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/Meetings_3GPP_SYNC/RAN2/Docs/> [retrieved on 20170514] *
LENOVO ET AL: "Consideration for potential mobility enhancement for aerial UE", vol. RAN WG2, no. Reno, USA; 20171127 - 20171201, 17 November 2017 (2017-11-17), XP051372071, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/tsg%5Fran/WG2%5FRL2/TSGR2%5F100/Docs/> [retrieved on 20171117] *
QUALCOMM INCORPORATED: "Identification and certification of Aerial Vehicles", vol. RAN WG2, no. Berlin, Germany; 20170821 - 20170825, 20 August 2017 (2017-08-20), XP051318140, Retrieved from the Internet <URL:http://www.3gpp.org/ftp/Meetings_3GPP_SYNC/RAN2/Docs/> [retrieved on 20170820] *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11659513B2 (en) * 2020-12-08 2023-05-23 International Business Machines Corporation Identifying unregistered devices through wireless behavior
CN113655811A (zh) * 2021-08-25 2021-11-16 北京理工大学 隐式通信下无人机协同跟踪地面目标的期望队形获得方法
CN113655811B (zh) * 2021-08-25 2024-05-07 北京理工大学 隐式通信下无人机协同跟踪地面目标的期望队形获得方法

Similar Documents

Publication Publication Date Title
US20240298225A1 (en) Using ai-based models for network energy savings
US11096070B2 (en) System and method for a usage category specific self-organizing network
CN107683617B (zh) 用于伪基站检测的系统及方法
EP2925036B1 (fr) Appareil et procédé d&#39;authentification dans un système de communication sans fil
WO2020042911A1 (fr) Procédé d&#39;identification de dispositif terminal et dispositif de communication
US12185206B2 (en) Service discovery and session establishment for machine-learning-based beam prediction in wireless communications
US20240107594A1 (en) User equipment pairing and cooperative machine learning inference result sharing
US20240212508A1 (en) Acquisition of Flight Information for UAV Communications
US20250158864A1 (en) Configuration of neighboring rs resource
US12289613B2 (en) In-vehicle machine learning service
WO2025054069A1 (fr) Identification et formation de peloton de véhicules
WO2020049342A1 (fr) Identification et suivi de dispositif sans fil
US20250310797A1 (en) Artificial intelligence-based life cycle management signaling
WO2024040586A1 (fr) Surveillance de qualité de modèle ai/ml et récupération rapide dans une détection de défaillance de modèle
US20250048194A1 (en) Indicating machine learning functionality and model applicability for mobility scenarios
WO2024148533A1 (fr) Intégration de détection locale pour détection et communication intégrées
WO2024174222A1 (fr) Prise en charge de mesure et de mobilité assistée pour dispositifs ambiants
US20250380228A1 (en) Techniques for indicating parameters associated with a synchronization signal block
US12131654B2 (en) Detecting aerial coverage using advanced networking equipment
US20250106801A1 (en) Registration and selection of user equipment for wireless network sensing services
US20250358630A1 (en) Method and apparatus for interference management using interference coordination areas
WO2025081505A1 (fr) Dispositifs et procédés de communication
EP4418722A1 (fr) Communication liée à un rapport d&#39;utilisation
WO2025209461A1 (fr) Procédés et appareils d&#39;enregistrement
WO2026007035A1 (fr) Système de détection, procédé et support lisible par ordinateur pour la détection et communication intégrées

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18788886

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18788886

Country of ref document: EP

Kind code of ref document: A1