CN116458174A - Apparatus, method, device and computer readable medium for performing monitoring - Google Patents

Apparatus, method, device and computer readable medium for performing monitoring Download PDF

Info

Publication number
CN116458174A
CN116458174A CN202080107167.1A CN202080107167A CN116458174A CN 116458174 A CN116458174 A CN 116458174A CN 202080107167 A CN202080107167 A CN 202080107167A CN 116458174 A CN116458174 A CN 116458174A
Authority
CN
China
Prior art keywords
monitoring
request
response
receiving
accepts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080107167.1A
Other languages
Chinese (zh)
Inventor
李莉
沈钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Shanghai Bell Co Ltd
Nokia Solutions and Networks Oy
Original Assignee
Nokia Shanghai Bell Co Ltd
Nokia Solutions and Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Shanghai Bell Co Ltd, Nokia Solutions and Networks Oy filed Critical Nokia Shanghai Bell Co Ltd
Publication of CN116458174A publication Critical patent/CN116458174A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0205Details

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present disclosure relate to monitoring execution. The first device sends a request for monitoring of the second device to the second device. The first device receives a response to the request from the second device. If the first device determines that the response indicates that the second device is subject to monitoring, the first device performs monitoring of the second device. With the present disclosure, monitoring can be performed without pre-establishing a data association or any other association.

Description

Apparatus, method, device and computer readable medium for performing monitoring
Technical Field
Embodiments of the present disclosure relate generally to the field of communications and, more particularly, relate to an apparatus, method, device, and computer readable medium for performing monitoring.
Background
Over the last decade, many studies have helped to make indoor positioning of Wi-Fi devices accurate and practically useful for emerging applications where GPS becomes disabled. Because of the minimal deployment complexity and cost of Wi-Fi technology, the research community has put significant interest and effort in indoor positioning using Wi-Fi technology. Furthermore, wi-Fi capability in almost every electronic device makes it a promising technology for indoor positioning.
The current indoor positioning of the target device is performed without being perceived by the carrier of the target device. Security and privacy issues can arise if the location of the target device is used for illegal or profitable business purposes.
Disclosure of Invention
In general, example embodiments of the present disclosure provide a scheme for performing monitoring.
In a first aspect, a first device is provided. The first device includes at least one processor; at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the first device to: sending a request for monitoring of the second device to the second device; receiving a response to the request from the second device; and if the response is determined to indicate that the second device is subject to monitoring, performing monitoring of the second device.
In a second aspect, a second device is provided. The second device includes at least one processor; at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the second device to: receiving a request from a first device for monitoring of a second device; determining whether to accept or reject the monitoring; and sending a response to the request to the first device, the response indicating whether the second device accepts or rejects the monitoring.
In a third aspect, a fourth apparatus is provided. The fourth device includes at least one processor; at least one memory including computer program code; the at least one memory and the computer program code are configured to, with the at least one processor, cause the fourth device to: an indication is received from the first device that the second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
In a fourth aspect, a method implemented at a device is provided. The method comprises the following steps: transmitting a request for monitoring of the second device from the first device to the second device; receiving a response to the request from the second device; and if the response is determined to indicate that the second device is subject to monitoring, performing monitoring of the second device.
In a fifth aspect, a method implemented at a device is provided. The method comprises the following steps: receiving, at the second device, a request from the first device for monitoring of the second device; determining whether to accept or reject the monitoring; and sending a response to the request to the first device, the response indicating whether the second device accepts or rejects the monitoring.
In a sixth aspect, a method implemented at a device is provided. The method comprises the following steps: an indication is received at the fourth device from the first device that the second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
In a seventh aspect, there is provided an apparatus comprising: means for sending a request from the first device to the second device for monitoring of the second device; means for receiving a response to the request from the second device; and means for performing monitoring of the second device if the response is determined to indicate that the second device is subject to monitoring.
In an eighth aspect, there is provided an apparatus comprising: means for receiving, at the second device, a request from the first device for monitoring of the second device; means for determining whether to accept or reject the monitoring; and means for sending a response to the request to the first device, the response indicating whether the second device accepts or rejects the monitoring.
In a ninth aspect, there is provided an apparatus comprising: means for receiving, at the fourth device, from the first device, an indication that the second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
In a tenth aspect, there is provided a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the fourth aspect described above.
In an eleventh aspect, there is provided a computer readable medium comprising a computer program for causing a device to perform at least the method according to the fifth aspect described above.
In a twelfth aspect, there is provided a computer readable medium comprising a computer program for causing an apparatus to perform at least the method according to the sixth aspect described above.
It should be understood that the summary is not intended to identify key or essential features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
Some example embodiments will now be described with reference to the accompanying drawings, in which:
FIG. 1 illustrates an example communication network in which embodiments of the present disclosure may be implemented;
fig. 2 shows a signaling diagram illustrating a process for performing monitoring according to some example embodiments of the present disclosure;
fig. 3 illustrates a flowchart of a method implemented at a first device according to some example embodiments of the present disclosure;
fig. 4 illustrates a flowchart of a method implemented at a second device, according to some example embodiments of the present disclosure;
fig. 5 illustrates a flowchart of a method implemented at a fourth device according to some example embodiments of the present disclosure;
FIG. 6 shows a simplified block diagram of an apparatus suitable for practicing some other embodiments of the present disclosure; and
Fig. 7 illustrates a block diagram of an example computer-readable medium, according to some example embodiments of the present disclosure.
The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements.
Detailed Description
Principles of the present disclosure will now be described with reference to some example embodiments. It should be understood that these embodiments are described for illustrative purposes only and to assist those skilled in the art in understanding and practicing the present disclosure without implying any limitation on the scope of the present disclosure. The disclosure described herein may be implemented in various ways other than those described below.
In the following description and claims, unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
References in the present disclosure to "one embodiment," "an example embodiment," etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Furthermore, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
It will be understood that, although the terms "first" and "second," etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, and, unlike a second element, a second element could be termed a first element. As used herein, the term "and/or" includes any and all combinations of one or more of the listed terms.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," "including," "having," "containing," and/or "including" when used herein, specify the presence of stated features, elements, and/or components, but do not preclude the presence or addition of one or more other features, elements, components, and/or groups thereof.
As used in this application, the term "circuit" may refer to one or more or all of the following:
(a) Hardware-only circuit implementations (e.g., implementations in analog and/or digital circuits only); and
(b) A combination of hardware circuitry and software, for example (as applicable):
(i) Combination of analog and/or digital hardware circuitry and software/firmware
(ii) A hardware processor (including a digital signal processor) having software, any portion of the software and memory that work together to cause a device such as a mobile phone or server to perform various functions; and
(c) Hardware circuitry and/or a processor (e.g., a microprocessor or a portion of a microprocessor) that requires software (e.g., firmware) to operate, but when software is not required to operate, the software may not be present.
This definition of circuit applies to all uses of this term in this application, including in any claims. As another example, as used in this application, the term circuit also encompasses an implementation of only a hardware circuit or processor (or multiple processors) or a portion of a hardware circuit or processor and its (or its) accompanying software and/or firmware. The term circuitry also encompasses, for example and if applicable to the particular claim element, a baseband integrated circuit or processor integrated circuit for a mobile device or a similar integrated circuit in a server, a cellular network device, or other computing or network device.
As used herein, the term "communication network" refers to a network that conforms to any suitable communication standard, such as a fifth generation (5G) system, long Term Evolution (LTE), LTE-advanced (LTE-a), wideband Code Division Multiple Access (WCDMA), high Speed Packet Access (HSPA), narrowband internet of things (NB-IoT), and so forth. Furthermore, communication between a mobile device and a network device in a communication network may be performed according to any suitable generation communication protocol, including, but not limited to, first generation (1G), second generation (2G), 2.5G,2.75G, third generation (3G), fourth generation (4G), 4.5G, future fifth generation (5G) New Radio (NR) communication protocols, and/or any other protocol currently known or to be developed in the future. Embodiments of the present disclosure may be applied in various communication systems. In view of the rapid development of communications, there are of course future types of communication technologies and systems with which the present disclosure may be implemented. It should not be taken as limiting the scope of the invention to only the above-described systems.
As used herein, the term "network device" refers to a node in a communication network via which a mobile device accesses the network and receives services therefrom. Depending on the terminology and technology applied, a network device may refer to a Base Station (BS) or Access Point (AP), e.g., a node B (NodeB or NB), an evolved node B (eNodeB or eNB), an NR next generation node B (gNB), a Remote Radio Unit (RRU), a Radio Head (RH), a Remote Radio Head (RRH), a relay, a low power node such as a femto base station, pico base station, etc. The RAN split architecture includes a gNB-CU (centralized unit, master RRC, SDAP and PDCP) that controls multiple gNB-DUs (distributed units, master RLC, MAC and PHY).
The term "mobile device" refers to any terminal device capable of wireless communication. By way of example and not limitation, a mobile device may also be referred to as a communication device, user Equipment (UE), subscriber Station (SS), portable subscriber station, mobile Station (MS), or Access Terminal (AT). Mobile devices may include, but are not limited to, mobile phones, cellular phones, smart phones, voice over IP (VoIP) phones, wireless local loop phones, tablet computers, wearable mobile devices, personal Digital Assistants (PDAs), portable computers, desktop computers, image capture mobile devices such as digital cameras, gaming mobile devices, music storage and playback appliances, in-vehicle wireless mobile devices, wireless endpoints, mobile stations, laptop embedded devices (LEEs), laptop mounted devices (LMEs), USB dongles, smart devices, wireless client devices (CPE), internet of things (IoT) devices, watches or other wearable devices, head Mounted Displays (HMDs), vehicles, targets, medical devices and applications (e.g., tele-surgery), industrial devices and applications (e.g., mobile phones, portable computers, etc.). Robots and/or other wireless devices operating in an industrial and/or automated processing chain environment, consumer electronics devices, devices operating on a commercial and/or industrial wireless network, and the like. In the following description, the terms "mobile device", "communication device", "terminal device", "user equipment" and "UE" may be used interchangeably.
While in various example embodiments, the functionality described herein may be performed in fixed and/or wireless network nodes, in other example embodiments, the functionality may be implemented in user equipment devices such as cellular telephones or tablet or laptop or desktop or mobile or fixed devices. The user equipment device may for example be suitably equipped with the corresponding capabilities described in connection with the fixed and/or radio network nodes. The user equipment device may be a user equipment and/or a control device, such as a chipset or processor, configured to control the user equipment when installed therein. Examples of such functions include a bootstrapping server function and/or a home subscriber server, which may be implemented in a user equipment device by providing the user equipment device with software configured to cause the user equipment device to execute from the point of view of these functions/nodes.
Fig. 1 illustrates an example communication network 100 in which embodiments of the present disclosure may be implemented. The communication network 100 includes a first device 110, a second device 120, a third device 130, a fourth device 140, and a fifth device 150.
At least one of the first device 110, the third device 130, and the fifth device 150 may send a request to the second device 120 to monitor the second device 120. Upon receiving the request, the second device 120 may determine whether to accept or reject the monitoring. The second device 120 may in turn send a response to the request to at least one of the first device 110, the third device 130, and the fifth device 150. The response indicates that the second device 120 accepts or rejects the monitoring. At least one of the first device 110, the third device 130, and the fifth device 150 may perform monitoring of the second device 120 if the second device 120 accepts or rejects the monitoring.
To perform monitoring of the second device 120, the first device 110, the third device 130, and the fifth device 150 may establish monitoring service connections 114, 134, and 154, respectively, with the second device 120.
The first device 110, the second device 120, the third device 130, and the fifth device 150 are managed by the fourth device 140 (e.g., controlled at least in part by the fourth device 140 and/or in operable communication with the fourth device 140). In some embodiments, the fourth device 140 may collect information about the monitoring of the second device 120 performed by the first device 110, the third device 130, and the fifth device 150 via the monitoring service connections 112, 132, and 152 with the first device 110, the third device 130, and the fifth device 150. The fourth device 140 may update the result of the monitoring of the second device 120 performed by at least one of the first device 110, the third device 130, and the fifth device 150 based on the collected information. Further, the fourth device 140 may transmit the updated result to at least one of the first device 110, the third device 130, and the fifth device 150.
In the example of fig. 1, in addition to monitoring the second device 120, the first device 110 may provide data services for the second device 120. To provide data services, the first device 110 may establish a data service connection 116 with the second device 120.
In this example, each of the first device 110, the third device 130, and the fifth device 150 is shown as an Access Point (AP), the second device 120 is shown as a mobile device, and the fourth device 140 is shown as a aware gateway. It should also be understood that the number of first, second, third, fourth, and fifth devices is given for illustration purposes and does not imply any limitation to the disclosure. The communication network 100 may include any suitable number of first, second, third, fourth, and fifth devices suitable for implementing implementations of the present disclosure.
Communication in communication network 100 may be implemented in accordance with any suitable communication protocol including, but not limited to, first generation (1G), second generation (2G), third generation (3G), fourth generation (4G), fifth generation (5G), etc. cellular communication protocols, wireless local area network communication protocols such as Institute of Electrical and Electronics Engineers (IEEE) 802.11, etc., and/or any other protocol currently known or developed in the future. Further, the communication may utilize any suitable wireless communication technology including, but not limited to: code Division Multiple Access (CDMA), frequency Division Multiple Access (FDMA), time Division Multiple Access (TDMA), frequency Division Duplex (FDD), time Division Duplex (TDD), multiple Input Multiple Output (MIMO), orthogonal Frequency Division Multiple Access (OFDMA), and/or any other technique currently known or to be developed in the future.
Conventionally, monitoring of a mobile device can only be performed by an Access Point (AP) associated with the mobile device. The current association establishment procedure will be described below. First, the mobile device scans all channels until the mobile device obtains authentication from an available AP. Then, an association is established between the mobile device and the AP. The AP begins to provide data connections and services to the mobile device.
Once the association is established, the AP may parse the information of the mobile device during measurement of the signal of the mobile device, track the movement trajectory of the mobile device, or even capture the pose or behavior of the carrier of the mobile device. All of these operations may be performed without being perceived by the operator of the mobile device.
In the above method, there are two problems. First, for a mobile device, it may unconsciously sense or measure signals performed by an AP to which the AP is considered to be connected for data services only. Security and privacy concerns arise if the location or pose information of the mobile device is used for illicit or profitable business purposes. Second, for an AP that was originally supposed to provide data services, it needs to share the workload and calculate the power for measurement and other localization related operations of signals from the mobile device, which would reduce system performance. In practice, more APs are required to participate in the location services of the same mobile device, which will help to improve location accuracy and efficiency.
To at least partially address the above and other potential problems, example embodiments of the present disclosure provide a solution for performing monitoring. In this scheme, the first device sends a request for monitoring of the second device to the second device. Upon receiving the request, the second device may determine whether to accept or reject the monitoring. The second device may in turn send a response to the request to the first device. If the response indicates that the second device is monitored, the first device performs monitoring of the second device. In this way, the second device may decide whether to allow the first device to perform monitoring. Thus, privacy protection can be achieved.
The principles and implementations of the present disclosure will be described in detail below with reference to fig. 2 through 5. Fig. 2 shows a signaling diagram illustrating a process 200 for performing monitoring according to some example embodiments of the present disclosure. For discussion purposes, process 200 will be described with reference to FIG. 1. The process 200 may include the first device 110, the second device 120, and the fourth device 140 as shown in fig. 1. It should be appreciated that although the process 200 has been described in the communication network 100 of fig. 1, the process is equally applicable to other communication scenarios.
As shown in fig. 2, the first device 110 sends (203) a monitoring request for the second device 120 to the second device 120. Accordingly, the second device 120 receives (204) the request from the first device 110.
In some example embodiments, the request may include a predefined field. The predefined field set to the predetermined value may indicate that the first device 110 requests to perform monitoring of the second device 120. For example, the predetermined value may be 1 or 0.
Upon receiving the request, the second device 120 determines (205) whether to accept the monitoring. The second device 120 in turn sends (206) a response to the request to the first device 110. Accordingly, the first device 110 receives (207) the response from the second device 120.
Upon receiving the response, the first device 110 determines (208) whether the response indicates that the second device 120 accepts or rejects the monitoring. If it is determined that the response indicates that the second device 120 is subject to monitoring, the first device 110 performs (209) monitoring of the second device 120.
In some example embodiments, the first device 110 may perform monitoring by determining a location of the second device 120, or capturing a pose or behavior of a carrier of the second device 120.
In accordance with the present disclosure, the second device 120 may decide whether to allow monitoring performed by the first device. Thus, the second device 120 may know whether the position, posture or behavior information of the carrier of the second device 120 is to be used for illicit or profitable business purposes. The location of the second device is treated as privacy. The present disclosure allows only the second device to initialize monitoring services (e.g., location services) and avoid misuse of location privacy. With a simple data exchange, the first device can only serve authorized second devices.
In some example embodiments, the location, gesture, or behavioral information may be a source of a large raw database to analyze the behavior and habit of the moving item to track and monitor the cargo during its transportation or storage.
In some example embodiments, the response to the request for monitoring of the second device 120 may include an identification of the second device 120. Thus, the first device 110 may obtain the identity of the second device 120 from the response. The first device 110 may in turn sense the radio frequency signal transmitted from the second device 120 based on the identification of the second device 120.
In some example embodiments, sensing the radio frequency signal transmitted from the second device 120 may include measuring Channel State Information (CSI) between the first device 110 and the second device 120. The CSI may include, but is not limited to, an angle of arrival (AoA), strength, or Round Trip Time (RTT) of a radio frequency signal transmitted from the second device 120.
In some example embodiments, the first device 110 may perform the monitoring without a data connection between the first device 110 and the second device 120. In this way, the function of monitoring will not depend on the normal association procedure for the data connection and monitoring can be performed without pre-establishing a data association or any other association. In this way, monitoring may be performed by an AP that has no data connection with the second device 120. In other words, the monitoring may be performed by non-associated APs, which allows the second device 120 to be served by multiple APs simultaneously, and the value added service may be decoupled from the data service based on the data service connection. Furthermore, this ensures a stable tracking on the second device 120 and avoids interference with the data quality of service.
In some example embodiments, before the first device 110 sends a request to the second device 120 for monitoring of the second device 120, the second device 120 may send (201) a probe request to the first device to scan for available signal channels. In response to receiving (202) the probe request from the second device 120, the first device 110 sends a probe response to the second device 120. The probe response includes a monitoring request to the second device 120. In such an example embodiment, the probe response may also include information required to establish a data service connection with the first device 110. For example, the information may include at least one of: a Service Set Identifier (SSID), a Basic Service Set Identifier (BSSID), a signal strength received by the first device 110 from the second device 120, or authentication information of the first device 110.
In some example embodiments, upon receiving the probe response from the first device 110, the second device 120 may initiate a normal data service connection procedure to select a serving device for the data service. For example, the second device 120 may select one of the first device 110, the third device 130, and the fifth device 150 as a serving device based on the strength of signals received from the first device 110, the third device 130, and the fifth device 150. Hereinafter, an AP providing a data service for the second device 120 is also referred to as a serving AP.
In some example embodiments, upon receiving a response indicating that the second device 120 is monitored, the first device 110 may send (210) an indication that the second device 120 is monitored to the fourth device 140 for storage and management. Accordingly, the fourth device 140 receives (211) the indication from the first device 110.
In some example embodiments, the process 200 may be performed between the second device 120, the fourth device 140, and other devices in addition to the first device 110. For example, the process 200 may be performed between the second device 120, the fourth device 140, and the third device 130 or the fifth device 150. With process 200, third device 130 or fifth device 150 may perform monitoring of second device 120. Hereinafter, an AP providing the monitoring service for the second device 120 is also referred to as a protection AP. In this way, the second device 120 may be monitored by multiple anchor points. For example, the serving AP and at least one additional protection AP may provide monitoring services for the second device 120. Alternatively, the APs that provide the monitoring service for the second device 120 may all be protection APs. In such an example embodiment, the triangulation of the second device 120 may be achieved using two APs. In such an example embodiment, more than two APs may be used to enhance positioning accuracy.
In such an example embodiment, the first device 110, the third device 130, and the fifth device 150 may use the results of the monitoring for different purposes or integrate them together for better accuracy. For example, the first device 110 may receive second information from the third device 130 regarding additional monitoring of the second device 120 performed by the third device 130, and update the result of the monitoring performed by the first device 110 based on the second information. In some example embodiments, the information about the additional monitoring of the second device 120 may include the result of the monitoring performed by the third device 130, or a measurement of the radio frequency signal transmitted from the second device 120, or information obtained based on the measurement of the radio frequency signal.
In some example embodiments, the fourth device 140 may actively assign multiple devices to the second device 120 to join or leave the monitoring service. For example, the fourth device 140 may aggregate the first device 110, the third device 130, and the fifth device 150 into a monitoring service pool. In this way, the first device 110, the third device 130, and the fifth device 150 may work in concert with the fourth device 140 to provide better monitoring services.
In such an example embodiment, the fourth device 140 may collect information regarding the monitoring of the second device 120 performed by the first device 110, the third device 130, and the fifth device 150, respectively, for further processing. For example, the fourth device 140 may update the result of monitoring the second device 120 based on the collected information in order to obtain a monitoring result with better accuracy. In some example embodiments, the fourth device 140 may transmit the obtained monitoring result to at least one of the first device 110, the third device 130, and the fifth device 150 with better accuracy. Typically, such iterations will help to improve the accuracy and efficiency of monitoring (e.g., positioning).
In such an example embodiment, the fourth device 140 may provide value added services to the second device 120 based on the updated results of the monitoring.
In some example embodiments, some parameters may be configured on the device performing the monitoring (e.g., the first device 110, the third device 130, or the fifth device 150). For example, the predetermined period (also referred to as sleep time) may be configured such that the first device 110 may maintain the result of monitoring the second device 120 for the predetermined period even when an update from the second device 120 is lost. This may avoid signaling loss when the second device 120 moves to a certain blind zone of the first device 110. Further, the predetermined frequency (also referred to as a check frequency) may be configured such that the first device 110 may perform monitoring at the predetermined frequency. Furthermore, the first device 110 may be free to leave or jump into the same monitoring pool in view of signal strength, computational resource limitations, or even other commercial objectives.
In some example embodiments, the second device 120 may also set other parameters to define policies of how to sense. For example, what the frequency of probe requests to refresh the first device 110 is, or what type of device may perform the monitoring of the second device 120, or even charge it during monitoring.
In some example embodiments, the present disclosure may be used broadly for all devices communicating with an AP with minor changes to the current operating procedure. The system can realize low-cost, quick response and large-scale connection monitoring without expensive cameras or complex network systems.
In some example embodiments, the present disclosure may be used in the logistics industry. Ubiquitous location and tracking of merchandise can be achieved without the need for extensive ecosystem deployment, but rather by embedding tiny mobile devices with the delivered merchandise. Once the mobile device is under wireless coverage, radio emissions can be collected and measured together by the protecting AP, real-time tracking can be achieved at very low cost by deploying AI/ML and other positioning algorithms on the perceived gateway in the AP or edge cloud. Furthermore, if the information of the mobile device is known, the AP may be used to search for dedicated goods.
In some example embodiments, the present disclosure may be used in a smart home. A pre-registered cell phone or other wearable device may be monitored by the home Wi-Fi system, from which the RF sensing function will sense the movement or security of the family member (e.g., falling to the floor). All such signal capture, data analysis results will be integrated with other intelligent devices in the home (e.g., televisions, air conditioning systems, windows, hot water systems, emergency calls, etc.). This allows intelligent decisions to better serve family members. The present disclosure may ensure that once a mobile device is powered up, a protection AP (typically home Wi-Fi) knows the mobile device, whether or not the mobile device is connected to a wireless network or other Wi-Fi AP. Importantly, such a system does not require the use of cameras for surveillance and image recognition for further computation, so that privacy can be better preserved.
In some example embodiments, the present disclosure may be used in intelligent factories and laboratories. The mobile phone carried by the visitor can be registered in the foreground before being directed to the controlled area. Thus, registration will be easier and faster without requiring the visitor to borrow access to the badge or anything else. For security management in a factory or laboratory, it is sufficient to use existing Wi-Fi systems to monitor and identify visitors without using cameras and without requiring complex identification actions.
In some example embodiments, the present disclosure may be used in intelligent farming. Small devices for animal wear can be developed, which can save a lot of costs. Because it does not need to be "truly" connected into the network, but only regularly transmits small amounts of information to the protecting AP, which may enable the RF sensing capability to perceive the animal's motion trajectories and their behaviors (e.g., suddenly biting or battling each other). This may also save bandwidth and power of the overall wireless system over a large-scale connection and wide coverage area.
Fig. 3 illustrates a flowchart of an example method 300 implemented at a device according to some example embodiments of the present disclosure. For discussion purposes, the method 300 will be described from the perspective of the first device 110 with reference to fig. 1. It should be appreciated that the method 300 may also be implemented at the third device 130 or the fifth device 150 in fig. 1.
At block 310, the first device 110 sends a request for monitoring of the second device to the second device. At block 320, the first device 110 receives a response to the request from the second device. If the first device 110 determines that the response indicates that the second device is monitored, the first device 110 performs monitoring of the second device, block 330.
In some example embodiments, the first device performs the monitoring without a data connection between the first device and the second device.
In some example embodiments, the method 300 further includes obtaining an identification of the second device from the response, and performing monitoring includes sensing a radio frequency signal transmitted from the second device based on the identification of the second device.
In some example embodiments, the method 300 further includes receiving information from the third device regarding additional monitoring of the second device performed by the third device; and updating the result of the monitoring based on the information.
In some example embodiments, sending the monitoring request of the second device to the second device includes: in response to receiving the probe request from the second device, a probe response is sent to the second device, the probe response including a request for monitoring of the second device.
In some example embodiments, the method 300 further includes transmitting an indication that the second device is monitored to a fourth device that manages the first device and the second device.
In some example embodiments, the method 300 further includes transmitting information about the monitoring performed by the first device to the fourth device for updating the results of the monitoring.
In some example embodiments, the method 300 further includes receiving the updated results of the monitoring from the fourth device.
In some example embodiments, the method 300 further includes maintaining the results of the monitoring of the second device for a predetermined period of time.
In some example embodiments, performing the monitoring includes performing the monitoring at a predetermined frequency.
In some example embodiments, performing the monitoring includes at least one of: determining a position of the second device, capturing a pose of the carrier of the second device, or capturing a behavior of the carrier of the second device.
Fig. 4 illustrates a flowchart of an example method 400 implemented at a device according to some example embodiments of the present disclosure. For discussion purposes, the method 400 will be described from the perspective of the second device 120 with reference to fig. 1.
At block 210, the second device 120 receives a request from the first device for monitoring of the second device 120. At block 420, the second device 120 determines whether to accept or reject the monitoring. At block 430, the second device 120 sends a response to the request to the first device, the response indicating whether the second device 120 accepts or rejects the monitoring.
In some example embodiments, the monitoring is performed without a data connection between the first device and the second device.
In some example embodiments, the method 400 further comprises: providing an identification of the second device in the response; and transmitting the radio frequency signal to the first device in association with the identification of the second device.
In some example embodiments, the method 400 further comprises sending a probe request to the first device; and receiving a monitoring request of the second device comprises: a probe response is received from the first device, the probe response including a request for monitoring of the second device.
In some example embodiments, the monitoring includes at least one of: determining a position of the second device, capturing a pose of the carrier of the second device, or capturing a behavior of the carrier of the second device.
Fig. 5 illustrates a flowchart of an example method 500 implemented at a device according to some example embodiments of the present disclosure. For discussion purposes, the method 500 will be described from the perspective of the fourth device 140 with reference to fig. 1.
At block 510, the fourth device 140 receives an indication from the first device that the second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device 140.
In some example embodiments, the method 500 further comprises: receiving, from a first device, first information regarding monitoring of a second device performed by the first device; receiving, from the third device, second information regarding additional monitoring of the second device performed by the third device; and updating a result of monitoring the second device based on the first information and the second information.
In some example embodiments, the method 500 further comprises: and transmitting the updated monitoring result to at least one of the first device and the third device.
In some example embodiments, the method 500 further comprises: providing value-added service for the second device based on the updated monitoring result
In some example embodiments, the monitoring includes at least one of: determining a position of the second device, capturing a pose of the carrier of the second device, or capturing a behavior of the carrier of the second device.
In some example embodiments, an apparatus (e.g., first device 110) capable of performing any of the methods 300 may include means for performing the various steps of the methods 300. The component may be implemented in any suitable form. For example, the components may be implemented in circuitry or software modules.
In some example embodiments, the apparatus includes: means for sending a request from the first device to the second device for monitoring of the second device; means for receiving a response to the request from the second device; and means for performing monitoring of the second device if the response is determined to indicate that the second device is subject to monitoring.
In some example embodiments, the means for performing monitoring includes means for performing monitoring in the absence of a data connection between the first device and the second device.
In some example embodiments, the apparatus further comprises means for obtaining an identification of the second device from the response, and the means for performing monitoring comprises means for sensing a radio frequency signal transmitted from the second device based on the identification of the second device.
In some example embodiments, the apparatus further comprises means for receiving, from the third device, information regarding additional monitoring of the second device performed by the third device; and means for updating the result of the monitoring based on the information.
In some example embodiments, the means for sending a monitoring request to the second device comprises: means for sending a probe response to the second device in response to receiving the probe request from the second device, the probe response comprising a request for monitoring of the second device.
In some example embodiments, the apparatus further includes means for sending an indication that the second device accepts the supervision to a fourth device that manages the first device and the second device.
In some example embodiments, the apparatus further includes means for transmitting information about the monitoring performed by the first device to a fourth device to update the results of the monitoring.
In some example embodiments, the apparatus further comprises means for receiving updated results of the monitoring from the fourth device.
In some example embodiments, the apparatus further comprises means for maintaining results of monitoring the second device for a predetermined period of time.
In some example embodiments, the means for performing monitoring includes means for performing monitoring at a predetermined frequency.
In some example embodiments, the means for performing the monitoring comprises at least one of: means for determining a position of the second device, means for capturing a pose of a carrier of the second device, or means for capturing a behavior of the carrier of the second device.
In some example embodiments, an apparatus (e.g., second device 120) capable of performing any of the methods 400 may include means for performing the various steps of the methods 400. The component may be implemented in any suitable form. For example, the components may be implemented in circuitry or software modules.
In some example embodiments, the apparatus includes: means for receiving, at the second device, a request from the first device for monitoring of the second device; means for determining whether to accept or reject the monitoring; and means for sending a response to the request to the first device, the response indicating that the second device accepts or rejects the monitoring.
In some example embodiments, the monitoring is performed without a data connection between the first device and the second device.
In some example embodiments, the apparatus further comprises: means for providing an identification of the second device in the response; and means for transmitting the radio frequency signal to the first device in association with the identification of the second device.
In some example embodiments, the apparatus further comprises means for sending a probe request to the first apparatus; the means for receiving a monitoring request for the second device comprises: means for receiving a probe response from the first device, the probe response comprising a request for monitoring of the second device.
In some example embodiments, the monitoring includes at least one of: determining a position of the second device, capturing a pose of the carrier of the second device, or capturing a behavior of the carrier of the second device.
In some example embodiments, an apparatus (e.g., fourth device 140) capable of performing any of method 500 may include means for performing the respective steps of method 500. The component may be implemented in any suitable form. For example, the components may be implemented in circuitry or software modules.
In some example embodiments, the apparatus further comprises: means for receiving, at the fourth device, from the first device, an indication that the second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
In some example embodiments, the apparatus further comprises: means for receiving, from a first device, first information regarding monitoring of a second device performed by the first device; means for receiving second information from the third device regarding additional monitoring of the second device performed by the third device; and means for updating a result of monitoring the second device based on the first information and the second information.
In some example embodiments, the apparatus further comprises: and means for transmitting the updated results of the monitoring to at least one of the first device and the third device.
In some example embodiments, the apparatus further comprises: means for providing value added services to the second device based on the updated monitoring result
In some example embodiments, the monitoring includes at least one of: determining a position of the second device, capturing a pose of the carrier of the second device, or capturing a behavior of the carrier of the second device.
Fig. 6 is a simplified block diagram of a device 600 suitable for implementing embodiments of the present disclosure. The device 600 may be provided to implement a communication device, such as the first device 110, the second device 120, the third device 130, the fourth device 140, or the fifth device 150. As shown, the device 600 includes one or more processors 610, one or more memories 620 coupled to the processors 610, and one or more communication modules 640 coupled to the processors 610.
The communication module 640 is used for two-way communication. The communication module 640 has at least one antenna to facilitate communication. The communication interface may represent any interface required to communicate with other network elements.
The processor 610 may be of any type suitable to the local technology network and may include one or more of the following: by way of non-limiting example, general purpose computers, special purpose computers, microprocessors, digital Signal Processors (DSPs) and processors based on a multi-core processor architecture. The apparatus 600 may have multiple processors, such as application specific integrated circuit chips that are temporally slaved to a clock that synchronizes the master processor.
Memory 620 may include one or more non-volatile memories and one or more volatile memories. Examples of non-volatile memory include, but are not limited to, read-only memory (ROM) 624, electrically programmable read-only memory (EPROM), flash memory, hard disks, compact Disks (CD), digital Video Disks (DVD), and other magnetic and/or optical storage devices. Examples of volatile memory include, but are not limited to, random Access Memory (RAM) 622 and other volatile memory that does not last for the duration of the power outage.
The computer program 630 includes computer-executable instructions that are executed by the associated processor 610. Program 630 may be stored in ROM 624. Processor 610 may perform any suitable actions and processes by loading program 630 into RAM 622.
Embodiments of the present disclosure may be implemented by means of program 630 such that device 600 may perform any of the processes of the present disclosure as discussed with reference to fig. 3-5. Embodiments of the present disclosure may also be implemented in hardware or a combination of software and hardware.
In some embodiments, program 630 may be tangibly embodied in a computer-readable medium that may be included in device 600 (e.g., in memory 620) in other storage devices accessible by device 600. Device 600 may load program 630 from a computer readable medium into RAM 622 for execution. The computer readable medium may include any type of tangible non-volatile memory, such as ROM, EPROM, flash memory, hard disk, CD, DVD, etc. Fig. 7 shows an example of a computer readable medium 700 in the form of a CD or DVD. The computer readable medium has stored thereon the program 630.
It should be appreciated that future networks may utilize Network Function Virtualization (NFV), which is a network architecture concept that proposes to virtualize network node functions as "building blocks" or entities that may be operatively connected or linked together to provide services. A Virtualized Network Function (VNF) may comprise one or more virtual machines that run computer program code using standard or generic type servers instead of custom hardware. Cloud computing or data storage may also be used. In radio communication, this may mean node operations to be performed at least in part in a central/centralized unit CU (e.g. server, host or node) operatively coupled to distributed units DU (e.g. radio heads/nodes). Node operations may also be distributed among multiple servers, nodes, or hosts. It should also be appreciated that the allocation of labor between core network operation and base station operation may vary depending on implementation.
In one embodiment, a server may generate a virtual network through which the server communicates with the distributed units. In general, virtual networking may involve the process of combining hardware and software network resources and network functions into a single software-based management entity (virtual network). Such virtual networks may provide a flexible distribution of operations between servers and wireless heads/nodes. In fact, any digital signal processing task may be performed in a CU or DU, and the boundary to transfer responsibility between a CU and a DU may be chosen depending on the implementation.
Thus, in one embodiment, a CU-DU architecture is implemented. In this case, the device 600 may be included in a central unit (e.g., control unit, edge cloud server, server) operatively coupled (e.g., via a wireless or wired network) to distributed units (e.g., remote radio heads/nodes). That is, the central unit (e.g., edge cloud server) and the distributed units may be separate devices that communicate with each other via a radio path or via a wired connection. Alternatively, they may be in the same entity that communicates via a wired connection or the like. An edge cloud or edge cloud server may serve multiple distributed units or radio access networks. In one embodiment, at least some of the processes may be performed by a central unit. In another embodiment, the device 600 may alternatively be included in a distributed unit, and at least some of the described processes may be performed by the distributed unit.
In one embodiment, the execution of at least some of the functions of device 600 may be shared between two physically separate devices (DU and CU) that form one operational entity. Thus, it can be seen that the apparatus describes an operational entity comprising one or more physically separate devices for performing at least some of the described processes. In one embodiment, such a CU-DU architecture may provide flexible distribution of operations between CUs and DUs. In fact, any digital signal processing task may be performed in a CU or DU, and the boundary to transfer responsibility between a CU and a DU may be chosen depending on the implementation. In one embodiment, the device 600 controls the execution of processes regardless of the location of the device and regardless of where the processes/functions are performed.
In general, the various embodiments of the disclosure may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device. While aspects of the embodiments of the present disclosure are illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that the blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
The present disclosure also provides at least one computer program product tangibly stored on a non-transitory computer-readable storage medium. The computer program product comprises computer executable instructions, such as those included in program modules, that are executed in a device on a target real or virtual processor to perform the methods 300, 400, or 500 as described above with reference to fig. 3-5. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or separated as desired in various embodiments. Machine-executable instructions of program modules may be executed within local or distributed devices. In distributed devices, program modules may be located in both local and remote memory storage media.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine, partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, computer program code or related data may be carried by any suitable carrier to enable an apparatus, device or processor to perform the various processes and operations described above. Examples of carrier waves include signals, computer readable media, and the like.
The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer-readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Moreover, although operations are described in a particular order, this should not be construed as requiring that these operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these details should not be construed as limitations on the scope of the disclosure, but rather as descriptions of features specific to particular embodiments. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the disclosure has been described in language specific to structural features and/or methodological acts, it is to be understood that the disclosure defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (30)

1. A first device, comprising:
at least one processor; and
at least one memory including computer program code;
the at least one memory and the computer program code are configured to, with the at least one processor, cause the first device to:
sending a request for monitoring of a second device to the second device;
receiving a response to the request from the second device; and
if it is determined that the response indicates that the second device accepts the monitoring, monitoring of the second device is performed.
2. The first device of claim 1, wherein the first device is caused to perform the monitoring without a data connection between the first device and the second device.
3. The first device of claim 1, wherein the first device is further caused to obtain an identification of the second device from the response; and
Wherein the first device is caused to perform the monitoring by:
a radio frequency signal transmitted from the second device is sensed based on the identification of the second device.
4. The first device of claim 1, wherein the first device is further caused to:
receiving information from a third device regarding additional monitoring of the second device performed by the third device; and
updating the result of the monitoring based on the information.
5. A first device as claimed in claim 1, wherein the first device is caused to send the request for monitoring of the second device to the second device by:
in response to receiving a probe request from the second device, a probe response is sent to the second device, the probe response including the request for monitoring of the second device.
6. The first device of claim 1, wherein the first device is further caused to:
and sending an indication that the second device accepts the monitoring to a fourth device, wherein the fourth device manages the first device and the second device.
7. The first device of claim 6, wherein the first device is further caused to:
Information about the monitoring performed by the first device is sent to the fourth device for updating of the result of the monitoring.
8. The first device of claim 7, wherein the first device is further caused to:
and receiving updated monitoring results from the fourth device.
9. The first device of claim 1, wherein the first device is further caused to:
the result of the monitoring of the second device is maintained for a predetermined period of time.
10. The first device of claim 1, wherein the first device is caused to perform the monitoring at a predetermined frequency.
11. The first device of claim 1, wherein the first device is caused to perform the monitoring based on at least one of:
the location of the second device is such that,
the posture of the carrier of the second device, or
Behavior of the carrier of the second device.
12. A second device, comprising:
at least one processor; and
at least one memory including computer program code;
the at least one memory and the computer program code are configured to, with the at least one processor, cause the second device to:
Receiving a request from a first device for monitoring of a second device;
determining whether to accept or reject the monitoring; and
a response to the request is sent to the first device, the response indicating whether the second device accepts or rejects the monitoring.
13. The second device of claim 12, wherein the monitoring is performed in the absence of a data connection between the first device and the second device.
14. A second device as claimed in claim 12, wherein the second device is further caused to:
providing an identification of the second device in the response; and
a radio frequency signal is transmitted to the first device in association with the identification of the second device.
15. The second device of claim 12, wherein the second device is further caused to send a probe request to the first device; and
wherein the second device receives the request for monitoring of the second device by:
a probe response is received from the first device, the probe response including the request for monitoring of the second device.
16. The second device of claim 12, wherein the monitoring comprises at least one of:
A determination of the location of the second device,
capturing the pose of the carrier of the second device, or
Capturing the behavior of the carrier of the second device.
17. A fourth device, comprising:
at least one processor; and
at least one memory including computer program code;
the at least one memory and the computer program code are configured to, with the at least one processor, cause the fourth device to:
an indication is received from a first device that a second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
18. A fourth device according to claim 17, wherein the fourth device is further caused to:
receiving, from the first device, first information regarding the monitoring of the second device performed by the first device;
receiving, from a third device, second information regarding additional monitoring of the second device performed by the third device; and
and updating a monitoring result of the second device based on the first information and the second information.
19. A fourth device according to claim 18, wherein the fourth device is further caused to:
And sending the updated monitoring result to at least one of the first device and the third device.
20. A fourth device according to claim 18, wherein the fourth device is further caused to:
and providing value-added service for the second equipment based on the updated monitoring result.
21. The fourth device of claim 18, wherein the monitoring comprises at least one of:
a determination of the location of the second device,
capturing the pose of the carrier of the second device, or
Capturing the behavior of the carrier of the second device.
22. A method, comprising:
transmitting a request from a first device to a second device for monitoring of the second device;
receiving a response to the request from the second device; and
if it is determined that the response indicates that the second device accepts the monitoring, monitoring of the second device is performed.
23. A method, comprising:
receiving, at the second device, a request from the first device for monitoring of the second device;
determining whether to accept or reject the monitoring; and
a response to the request is sent to the first device, the response indicating whether the second device accepts or rejects the monitoring.
24. A method, comprising:
an indication is received at a fourth device from a first device that a second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
25. An apparatus, comprising:
means for sending a request from a first device to a second device for monitoring of said second device;
means for receiving a response to the request from the second device; and
and means for performing monitoring of the second device if it is determined that the response indicates that the second device accepts the monitoring.
26. An apparatus, comprising:
means for receiving, at the second device, a request from the first device for monitoring of the second device;
means for determining whether to accept or reject the monitoring; and
means for sending a response to the request to the first device, the response indicating whether the second device accepts or rejects the monitoring.
27. An apparatus, comprising:
means for receiving, at a fourth device, from a first device, an indication that a second device accepts monitoring performed by the first device, the first device and the second device being managed by the fourth device.
28. A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 22.
29. A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 23.
30. A non-transitory computer readable medium comprising a computer program for causing an apparatus to perform at least the method of claim 24.
CN202080107167.1A 2020-09-15 2020-09-15 Apparatus, method, device and computer readable medium for performing monitoring Pending CN116458174A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/115402 WO2022056688A1 (en) 2020-09-15 2020-09-15 Devices, methods, apparatuses and computer readable media for performing surveillance

Publications (1)

Publication Number Publication Date
CN116458174A true CN116458174A (en) 2023-07-18

Family

ID=80777507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080107167.1A Pending CN116458174A (en) 2020-09-15 2020-09-15 Apparatus, method, device and computer readable medium for performing monitoring

Country Status (2)

Country Link
CN (1) CN116458174A (en)
WO (1) WO2022056688A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1484929A (en) * 2001-01-04 2004-03-24 ��˹��ŵ�� Method of invoking privacy on telecommunications network
US20110271274A1 (en) * 2010-04-30 2011-11-03 International Business Machines Corporation System, method, and computer program product for collaboratively installing a computer application
CN104754560A (en) * 2013-12-30 2015-07-01 华为终端有限公司 Position privacy protection method, device and system
WO2018086495A1 (en) * 2016-11-11 2018-05-17 中兴通讯股份有限公司 Positioning method, positioning base station, positioning server and positioning system
WO2019138359A1 (en) * 2018-01-12 2019-07-18 Telefonaktiebolaget Lm Ericsson (Publ) Next generation radio access network wireless device rejection indication
CN111418228A (en) * 2017-12-26 2020-07-14 At&T知识产权一部有限合伙公司 Wireless fidelity access control for 5G or other next generation networks
CN111654843A (en) * 2019-03-04 2020-09-11 深圳光启空间技术有限公司 Method and system for automatically updating fingerprint database and wifi positioning method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103068035B (en) * 2011-10-21 2016-03-02 ***通信集团公司 A kind of wireless network localization method, Apparatus and system
US20170094490A1 (en) * 2015-07-09 2017-03-30 GeoVisible, Inc. Method and system for wireless communication in emergency situation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1484929A (en) * 2001-01-04 2004-03-24 ��˹��ŵ�� Method of invoking privacy on telecommunications network
US20110271274A1 (en) * 2010-04-30 2011-11-03 International Business Machines Corporation System, method, and computer program product for collaboratively installing a computer application
CN104754560A (en) * 2013-12-30 2015-07-01 华为终端有限公司 Position privacy protection method, device and system
EP3082354A1 (en) * 2013-12-30 2016-10-19 Huawei Device Co., Ltd. Location privacy protection method, device and system
WO2018086495A1 (en) * 2016-11-11 2018-05-17 中兴通讯股份有限公司 Positioning method, positioning base station, positioning server and positioning system
CN111418228A (en) * 2017-12-26 2020-07-14 At&T知识产权一部有限合伙公司 Wireless fidelity access control for 5G or other next generation networks
WO2019138359A1 (en) * 2018-01-12 2019-07-18 Telefonaktiebolaget Lm Ericsson (Publ) Next generation radio access network wireless device rejection indication
CN111654843A (en) * 2019-03-04 2020-09-11 深圳光启空间技术有限公司 Method and system for automatically updating fingerprint database and wifi positioning method and system

Also Published As

Publication number Publication date
WO2022056688A1 (en) 2022-03-24

Similar Documents

Publication Publication Date Title
US11310636B2 (en) Machine learning coordinated wireless networking
US10371790B2 (en) Calibration-free location determination using wireless communication
US20200163044A1 (en) Location determination with a cloud radio access network
US20160192151A1 (en) Mobile device tracking with peer-to-peer mobile device network
US10887862B2 (en) Location determination in a cloud radio access network utilizing image data
US11330551B2 (en) Method and apparatus for location aware optimal wireless link selection system
CN114828075B (en) Wireless perception measurement control method, device, equipment and storage medium
US20220108092A1 (en) Range extension and dynamic power control for localization on commercial uhf rfid reader
KR20170016784A (en) Apparatus and method for providing user experience with proximity estimation
CN114762402A (en) Positioning method and device
CN111295568A (en) Method and apparatus for determining spatial partitioning of an environment
US11272552B2 (en) Network connection method and apparatus
CN114503704B (en) Method, apparatus and computer readable medium for transmitting PRS
US20200015237A1 (en) Method and apparatus for controlling network device, method and apparatus for sending control information, and method and apparatus for sending data
JP2017073617A (en) Processing device, system, terminal id specification method, and program
CN116458174A (en) Apparatus, method, device and computer readable medium for performing monitoring
WO2023041169A1 (en) Device positioning
EP4260619A1 (en) Method and apparatus for efficient positioning
Brassil et al. Indoor positioning with an enterprise radio access network
WO2024017049A1 (en) Bsc device identification method and apparatus, and communication device
US20240205677A1 (en) Authentication relay procedure for passive iot
WO2024022351A1 (en) Measurement method and apparatus, and device
WO2024083098A1 (en) Positioning based on multiple complementary operations
US20240201362A1 (en) Method and apparatus for controlling non-uwb device by using uwb
WO2021134767A1 (en) Positioning target device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination