Abstract: The present disclosure relates to method, system for determining location information of a user. The present disclosure encompasses receiving a location information request based on a SUPI and transmitting a request message to a first technology network node to determine the location information. The present disclosure encompasses receiving response message comprising the location information, in response to the request message, if the user is non-migrated user. The present disclosure encompasses receiving first message from the first technology network node and acknowledging that the location information request has failed, if the user is determined as being in detached state. The present disclosure encompasses receiving a second message from the first technology network node and transmitting a subsequent request to second technology network node if the user is a migrated user and receiving a subsequent response comprising the location information, in response to the subsequent request from the second technology network node. [FIG. 2]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“SYSTEM AND METHOD FOR DETERMINING A LOCATION INFORMATION OF A USER”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
SYSTEM AND METHOD FOR DETERMINING A LOCATION INFORMATION OF A USER
FIELD OF THE DISCLOSURE
[0001] The present disclosure relates generally to the field of wireless communication systems. More particularly, the present disclosure relates to methods and systems for determining a location information of a user irrespective of their migration status to a 5G network.
BACKGROUND
[0002] The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless
communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] For Location Interception Management (LIM), a location of a target subscriber of a service provided by a telecom network operator may need to be retrieved. The target subscriber can be 5G migrated or non 5G migrated and thereby, attached to either 5G or 4G network or in some cases may also be attached to other generations of networks.
[0005] In existing solutions, if the target subscriber is a migrated user, then there is no solution in which the location of the target subscriber for location interception can be determined smoothly. The existing solutions would throw an error showing that the target subscriber is absent (i.e. the target subscriber is not available in the migrated network), instead of showing that the target subscriber has migrated to the network. Further, in certain existing solutions the location determination technology is not provided for location determination for both the migrated users and the non-migrated users.
[0006] Hence, there exists a need for a solution that helps in retrieving the location of such a target subscriber or a user for location interception as well as for other uses, which may retrieve the location irrespective of migration status of the target subscriber. The proposed solution helps in retrieving the location of such a user for location interception.
OBJECTS OF THE DISCLOSURE
[0007] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0008] The present disclosure aims to provide a method and a system for determining a location information of a user.
[0009] One object of the disclosure is to derive location for different type of users such as for both 5G migrated Subscriber Identity Module(s) (SIM(s)) and non 5G migrated SIM(s) for location interception.
[0010] Another object of the disclosure is fetching location details for location interception of user irrespective of user being attached to 4G or 5G network.
[0011] Yet another object of the present disclosure is to fetch user location for location interception in an environment where few subscribers are migrated to 5G and few subscriber migrations to 5G is pending.
[0012] Yet another object of the present disclosure is to provide a method and system for determining a location information of the user, which may be implemented for various services.
SUMMARY OF THE DISCLOSURE
[0013] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0014] A first aspect of the present disclosure relates to a method for determining a location information of a user. The method comprises receiving, by a first analysis unit via a first transceiver unit, a location information request for the user based on a Subscription Permanent Identifier (SUPI). The first analysis unit is associated with a Location Interception Management (LIM) unit. The method further comprises transmitting, by the first transceiver unit, a request message to a first technology network node to determine the location information of the user. The method further comprises receiving, by the first transceiver unit, a response
message in response to the request message, from the first technology network node, wherein the response message comprises the location information of the user, if the user is determined as a non-migrated user. The method further comprises receiving, by the first transceiver unit, a first message from the first technology network node and acknowledging that the location information request has failed if the user is determined as being in a detached state. The method further comprises receiving, by the first transceiver unit, a second message from the first technology network node, and transmitting a subsequent request to a second technology network node if the user is determined as a migrated user. The method further comprises, if the user is registered in the second technology network node, receiving, by the first transceiver unit, a subsequent response in response to the subsequent request, from the second technology network node, wherein the subsequent response comprises the location information of the user.
[0015] In an exemplary aspect of the present disclosure, the method further comprises reattempting, by the first analysis unit, to receive, via the first transceiver unit, the location information of the user from the first technology network node upon a failure of receiving the location information from the second technology network node.
[0016] In another exemplary aspect of the present disclosure, the method further comprises receiving, by the first transceiver unit, one or more legal and authorized requests, and the location interception is based on the one or more legal and authorized requests.
[0017] In another exemplary aspect of the present disclosure, the method further comprises providing a feedback, by the first analysis unit, to a requesting entity regarding one of a success and a failure, of retrieval of the location information.
[0018] In another exemplary aspect of the present disclosure, the SUPI is an identifier used to maintain a user-specific data across network migrations.
[0019] In another exemplary aspect of the present disclosure, the first technology network node is a 4G Gateway Mobile Location Centre (GMLC), and the second technology network node is a 5G Gateway Mobile Location Centre (GMLC).
[0020] A second aspect of the present disclosure relates to a system for determining a location information of a user. The system comprises a first transceiver unit, and a first analysis unit connected to each other either directly or indirectly. The first analysis unit is configured to receive, via the transceiver unit, a location information request for the user based on a Subscription Permanent Identifier (SUPI). The first analysis unit is associated with a Location Interception Management (LIM) unit. The first transceiver unit is further configured to transmit, a request message to a first technology network node to determine the location information of the user. The transceiver unit is further configured to receive a response message in response to the request message, from the first technology network node, wherein the response message comprising the location information of the user if the user is determined as a non-migrated user. The first transceiver unit is further configured to receive a first message from the first technology network node and acknowledge that the location information request has failed if the user is determined as being in a detached state. The first transceiver unit is further configured to receive a second message from the first technology network node if the user is determined as a migrated user, and transmit a subsequent request to a second technology network node. If the user is registered in the second technology network node, the transceiver unit is further configured to receive a subsequent response in response to the subsequent request, wherein the subsequent response comprising the location information of the user.
[0021] A third aspect of the present disclosure relates to a User Equipment (UE) for determining a location information of a user. The UE comprises a second transceiver unit and a second analysis unit which are associated with each other. The second transceiver unit is configured to receive a location information request
based on a Subscription Permanent Identifier (SUPI) from a network system. The
second analysis unit is configured to determine if the SUPI of the location
information request matches with a SUPI of the UE. The second transceiver unit is
further configured to transmit the location information of the UE based on a positive
5 matching of the SUPI of the location information request with the SUPI of the UE.
[0022] A fourth aspect of the present disclosure relates to a User Equipment (UE) for applying a Location Interception (LI) policy. The UE comprises a third transceiver unit and a third analysis unit which are connected to each other. The
10 third transceiver unit is configured to receive the LI policy from a Location
Interception Management (LIM) unit. The third analysis unit is configured to apply the LI policy. The LI policy is based on a location information of the UE, and the location information of the UE is determined based on receiving, by a system, a location information request for the user based on a Subscription Permanent
15 Identifier (SUPI),. The determination of the location information is further based
on transmitting, by the system, a request message to a first technology network node to determine the location information of the user. The determination of the location information is further based on receiving, by the system, a response message in response to the request message, wherein the response message comprises the
20 location information of the user if the user is determined as a non-migrated user.
The determination of the location information is further based on receiving, by the system, a first message from the first technology network node and acknowledging that the location information request has failed if the user is determined as being in a detached state. The determination of the location information is further based on
25 receiving, by the system, a second message from the first technology network node,
and transmitting a subsequent request to a second technology network node if the user is determined as a migrated user. If the user is registered in the second technology network node, the determination of the location information is further based on receiving, by the system, a subsequent response in response to the
30 subsequent request, wherein the subsequent response comprises the location
information of the user.
7
[0023] A fifth aspect of the present disclosure relates to a non-transitory computer-
readable-medium storing one or more instructions, the one or more instructions
comprising executable code which when executed by one or more units of a system,
5 causes the one or more units to perform certain functions. The executable code
when executed causes a first analysis unit of the system to receive, via a first transceiver unit, a location information request for the user based on a Subscription Permanent Identifier (SUPI), the first analysis unit is associated with a location interception management (LIM) unit. The executable code when executed further
10 causes the first transceiver unit of the system to transmit, a request message to a
first technology network node to determine the location information of the user. The executable code when executed further causes the first transceiver unit of the system to receive a response message in response to the request message, from the first technology network node, wherein the response message comprising the location
15 information of the user if the user is determined as a non-migrated user. The
executable code when executed further causes the first transceiver unit of the system to receive a first message from the first technology network node and acknowledge that the location information request has failed if the user is determined as being in a detached state. The executable code when executed further causes the first
20 transceiver unit of the system to receive a second message from the first technology
network node if the user is determined as a migrated user, and transmit a subsequent request to a second technology network node. The executable code when executed further causes the first transceiver unit of the system to receive a subsequent response in response to the subsequent request, from the second technology
25 network node, if the user is registered in second technology network node, wherein
the subsequent response comprising the location information of the user.
BRIEF DESCRIPTION OF DRAWINGS
30 [0024] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
8
and systems in which like reference numerals refer to the same parts throughout the
different drawings. Components in the drawings are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Some drawings may indicate the components using block diagrams and
5 may not represent the internal circuitry of each component. It will be appreciated
by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
10 [0025] FIG. 1A illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture, in accordance with exemplary embodiment of the present disclosure.
[0026] FIG.1B illustrates an exemplary block diagram of a system for determining
15 a location information of a user, in accordance with exemplary embodiments of the
present disclosure.
[0027] FIG.2 illustrates an exemplary process for determining a location
information for a location interception management (LIM) of users irrespective of
20 their migration status to a 5G network, in accordance with exemplary
implementation of the present disclosure is shown.
[0028] FIG.3 illustrates an exemplary block diagram of a user equipment for
determining a location information of the user in accordance with exemplary
25 implementations of the present disclosure.
[0029] FIG.4 illustrates an exemplary block diagram of a user equipment (UE) for applying a location interception policy in accordance with exemplary implementation of the present disclosure. 30
9
[0030] FIG.5 illustrates an exemplary method flow diagram for determining a location information of a user, in accordance with exemplary implementation of the present disclosure.
5 [0031] FIG. 6 illustrates an exemplary block diagram of a computing device upon
which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0032] The foregoing shall be more apparent from the following more detailed
10 description of the disclosure.
DETAILED DESCRIPTION
[0033] In the following description, for the purposes of explanation, various
15 specific details are set forth in order to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter can each be used independently of one
another or with any combination of other features. An individual feature may not
20 address any of the problems discussed above or might address only some of the
problems discussed above. Some of the problems discussed above might not be
fully addressed by any of the features described herein. Example embodiments of
the present disclosure are described below, as illustrated in various drawings in
which like reference numerals refer to the same parts throughout the different
25 drawings.
[0034] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
30 the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
10
arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0035] It should be noted that the terms "mobile device", "user equipment", "user
5 device", “communication device,” “device” and similar terms are used
interchangeably for the purpose of describing the present disclosure. These terms
are not intended to limit the scope of the disclosure or imply any specific
functionality or limitations on the described embodiments. The use of these terms
is solely for convenience and clarity of description. The disclosure is not limited to
10 any particular type of device or equipment, and it should be understood that other
equivalent terms or variations thereof may be used interchangeably without departing from the scope of the disclosure as defined herein.
[0036] Specific details are given in the following description to provide a thorough
15 understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, networks, processes, and other
components may be shown as components in block diagram form in order not to
obscure the embodiments in unnecessary detail. In other instances, well-known
20 circuits, processes, algorithms, structures, and techniques may be shown without
unnecessary detail in order to avoid obscuring the embodiments.
[0037] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
25 diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
30
11
[0038] The word “exemplary” and/or “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
5 necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes”, “has”, “contains” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive—in a manner
10 similar to the term “comprising” as an open transition word—without precluding
any additional or other elements.
[0039] As used herein, an “electronic device”, or “portable electronic device”, or “user device” or “communication device” or “user equipment” or “device” refers
15 to any electrical, electronic, electromechanical and computing device. The user
device is capable of receiving and/or transmitting one or parameters, performing function/s, communicating with other user devices, and transmitting data to the other user devices. The user equipment may have a processor, a display, a memory, a battery and an input-means such as a hard keypad and/or a soft keypad. For
20 instance, the user equipment may include, but not limited to, a mobile phone,
smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other device as may be obvious to a person skilled in the art for implementation of the features of the present disclosure.
25
[0040] Further, the user device may also comprise a “processor” or “processing unit” includes processing unit, wherein processor refers to any logic circuitry for processing instructions. The processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a
30 plurality of microprocessors, one or more microprocessors in association with a
Digital Signal Processor (DSP) core, a controller, a microcontroller, Application
12
Specific Integrated Circuits, Field Programmable Gate Array circuits, any other
type of integrated circuits, etc. The processor may perform signal coding data
processing, input/output processing, and/or any other functionality that enables the
working of the system according to the present disclosure. More specifically, the
5 processor is a hardware processor.
[0041] Radio Access Technology (RAT) refers to the technology used by mobile devices/ user equipment (UE) to connect to a cellular network. It refers to the specific protocol and standards that govern the way devices communicate with base
10 stations, which are responsible for providing the wireless connection. Further, each
RAT has its own set of protocols and standards for communication, which define the frequency bands, modulation techniques, and other parameters used for transmitting and receiving data. Examples of RATs include GSM (Global System for Mobile Communications), CDMA (Code Division Multiple Access), UMTS
15 (Universal Mobile Telecommunications System), LTE (Long-Term Evolution), and
5G. The choice of RAT depends on a variety of factors, including the network infrastructure, the available spectrum, and the mobile device's/device's capabilities. Mobile devices often support multiple RATs, allowing them to connect to different types of networks and provide optimal performance based on the available network
20 resources.
[0042] In existing solutions, if a target subscriber is a migrated user, then there is no solution in which the location of the target subscriber for location interception can be determined smoothly. The existing solutions would throw an error showing
25 that the target subscriber is absent (i.e. the target subscriber is not available in the
migrated network), instead of showing that the target subscriber has migrated to the network. Further, in certain existing solutions the location determination technology is not provided for location determination for both migrated users and non-migrated users.
30
13
[0043] The present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology such as retrieving a user location for any user who has migrated or not-migrated to a different generation of communication technology. 5
[0044] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings.
[0045] FIG. 1A illustrates an exemplary block diagram representation of 5th
10 generation core (5GC) network architecture, in accordance with exemplary
embodiment of the present disclosure. As shown in FIG. 1A, the 5GC network
architecture [100A] includes a user equipment (UE) [102a], a radio access network
(RAN) [104a], an access and mobility management function (AMF) [106a], a
Session Management Function (SMF) [108a], a Service Communication Proxy
15 (SCP) [110a], an Authentication Server Function (AUSF) [112a], a Network Slice
Specific Authentication and Authorization Function (NSSAAF) [114a], a Network
Slice Selection Function (NSSF) [116a], a Network Exposure Function (NEF)
[118a], a Network Repository Function (NRF) [120a], a Policy Control Function
(PCF) [122a], a Unified Data Management (UDM) [124a], an application function
20 (AF) [126a], a User Plane Function (UPF) [128a], a data network (DN) [130a],
wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
25 [0046] The User Equipment (UE) [102a] interfaces with the network via the Radio
Access Network (RAN) [104a]; the Access and Mobility Management Function (AMF) [106a] manages connectivity and mobility, while the Session Management Function (SMF) [108a] administers session control; the service communication proxy (SCP) [110a] routes and manages communication between network services,
30 enhancing efficiency and security, and the Authentication Server Function (AUSF)
[112a] handles user authentication; the Network Slice Specific Authentication and
14
Authorization Function (NSSAAF) [114a] for integrating the 5G core network with
existing 4G LTE networks i.e., to enable Non-Standalone (NSA) 5G deployments,
the Network Slice Selection Function (NSSF) [116a], Network Exposure Function
(NEF) [118a], and Network Repository Function (NRF) [120a] enable network
5 customization, secure interfacing with external applications, and maintain network
function registries respectively; the Policy Control Function (PCF) [122a] develops
operational policies, and the Unified Data Management (UDM) [124a] manages
subscriber data; the Application Function (AF) [126a] enables application
interaction, the User Plane Function (UPF) [128a] processes and forwards user data,
10 and the Data Network (DN) [130a] connects to external internet resources;
collectively, these components are designed to enhance mobile broadband, ensure low-latency communication, and support massive machine-type communication, solidifying the 5GC as the infrastructure for next-generation mobile networks.
15 [0047] Radio Access Network (RAN) [104a] is the part of a mobile
telecommunications system that connects user equipment (UE) [102a] to the core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication. 20
[0048] Access and Mobility Management Function (AMF) [106a] is a 5G core
network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging. 25
[0049] Session Management Function (SMF) [108a] is a 5G core network
function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement. 30
15
[0050] Service Communication Proxy (SCP) [110a] is a network function in the
5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces. 5
[0051] Authentication Server Function (AUSF) [112a] is a network function in
the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
10 [0052] Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114a] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
15 [0053] Network Slice Selection Function (NSSF) [116a] is a network function
responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
[0054] Network Exposure Function (NEF) [118a] is a network function that
20 exposes capabilities and services of the 5G network to external applications,
enabling integration with third-party services and applications.
[0055] Network Repository Function (NRF) [120a] is a network function that
acts as a central repository for information about available network functions and
25 services. It facilitates the discovery and dynamic registration of network functions.
[0056] Policy Control Function (PCF) [122a] is a network function responsible
for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies. 30
16
[0057] Unified Data Management (UDM) [124a] is a network function that
centralizes the management of subscriber data, including authentication, authorization, and subscription information.
5 [0058] Application Function (AF) [126a] is a network function that represents
external applications interfacing with the 5G core network to access network capabilities and services.
[0059] User Plane Function (UPF) [128a] is a network function responsible for
10 handling user data traffic, including packet routing, forwarding, and QoS
enforcement.
[0060] Data Network (DN) [130a] refers to a network that provides data services
to user equipment (UE) in a telecommunications system. The data services may
15 include but are not limited to Internet services, private data network related services.
[0061] Referring to FIG. 1B, an exemplary block diagram for a system [100B] for determining a location information of a user for a location interception, in accordance with exemplary implementation of the present disclosure is shown. The
20 system [100B] comprises at least one first transceiver unit [102] and may also
comprise at least one first analysis unit [104]. The first analysis unit [104] may also be present independent of the system [100B] and may be associated or connected with the system [100B] through any communication means. All of the components as shown in the block diagram are connected to each other. All of the components
25 as mentioned in the block diagram lies within the system [100B] and shall be
considered to be interconnected with each other. Also, in FIG. 1B only a few units are shown, however, the system [100B] may comprise multiple such units or the system [100B] may comprise any such numbers of said units, as required to implement the features of the present disclosure. The present disclosure further
30 discloses that the system [100B] may reside in a server or a network entity.
17
[0062] The system [100B] is configured for determining a location information of
a user, with the help of interconnection between the components/ units of the system
[100B]. The location information may be determined as per the present disclosure
for location interception, lawful interception, providing emergency services,
5 location-based advertising, and for other services which are based on the location
information of the user.
[0063] The location information of the user may be the information related to position of a user device / user equipment (UE) of the user, and also the location
10 information may be an information related to the address of the user equipment
(UE), or the registered location of the user equipment or geodetic position, or civic location, or other positioning methods. Lawful interception may be the process for enabling authorized entities to perform interception by monitoring telecommunications data (such as voice calls, messages, internet traffic, location,
15 etc.) which are in accordance with the legal regulations and process. The lawful
interception for interception of the location information may refer to the location interception. The location interception capabilities are built into the network architecture in order to ensure strict compliance with regulations while also focusing on security, privacy, and data protection laws. The term "user” as used
20 herein may also be a “user equipment” or “user device” or “subscriber” and are
interchangeably used herein, however the meaning may be considered to remain same, unless specified otherwise.
[0064] It is pertinent to note that the first analysis unit [104] is a unit same or similar
25 to a processor that is capable of implementation of features as disclosed in the
present disclosure. Also, the first transceiver unit [102] may include one or more
transmitters and one or more receivers. Particularly, the first analysis unit [104] is
configured to receive, via the first transceiver unit [102], a location information
request for the user based on a Subscription Permanent Identifier (SUPI). The first
30 analysis unit [104] is associated with a Location Interception Management (LIM)
unit [202]. The location information request is a request which seeks the location
18
information with respect to the user equipment or the subscriber. The location
information request may be received from a requesting entity, where the requesting
entity may be, for example, a location-based service provider, or a client of the
location interception management (LIM) unit [202] (shown in FIG 1B). The
5 Subscription Permanent Identifier (SUPI) is an identifier used to maintain user-
specific data across network migrations. The SUPI serves as a unique identifier associated with a subscriber’s subscription in the network. The SUPI may be used to retrieve relevant subscription data and may also be used to retrieve subscriber profile for ensuring continuity of services even during migration of the users
10 between the first-generation networks and the second-generation networks. The
Location Interception Management (LIM) unit [202] is responsible for facilitating and coordinating location interception activities that are mandated by legal authorities and regulatory requirements. The LIM unit [202] intercepts and monitors telecommunication data. The present disclosure further encompasses that
15 the first transceiver unit [102] is configured to receive one or more legal and
authorized requests, and the location interception is based on the one or more legal and authorized requests. The one or more legal and authorized requests are the requests which are checked to be made by the legal authorities acting in compliance with applicable laws, rules, and procedure.
20
[0065] The first transceiver unit [102] is further configured to transmit a request message to a first technology network node [204] to determine the location information of the user. In an implementation of the present disclosure, the first technology network node may be a 4G Gateway Mobile Location Centre (GMLC)
25 [204]. The request message may also be the location information request which was
received by the first analysis unit [104] via the first transceiver unit [102].
[0066] The first technology network node [204] is the key component for location-
based services, emergency services or value-added services providers in the first
30 technology network, and may be used to retrieve the location information of user
devices connected to the first technology network.
19
[0067] The system [100B] may also be further configured to determine whether the
user is a non-migrated user or a migrated user. The determination of a user being
the migrated user or the non-migrated user is based on a response received from the
5 first technology network node [204] in response to the location information request.
The migrated user is the user which has migrated to a second technology network node such as 5G network technology and the non-migrated user is the user which has not migrated to the second technology network and remains in first technology network such as 4G network.
10
[0068] Once, the request message is transmitted, then the first transceiver unit [102] is further configured to receive a response message in response to the request message. The response message comprises the location information of the user. The location information of the user may be retrieved from a first technology network
15 node [204] if the user is determined as the non-migrated user. The first technology
network node [204] responds to this retrieval by delivering a message which may be a success message or an error message. In case of the success message, the location information is retrieved. It should be noted that the first technology network node [204] and the 4G GMLC [204] may have been used interchangeably,
20 nevertheless, it should be noted that the first technology network node [204] may
also refer to any other generation network node which may be used for acquiring location information of the user and shall not be limited to the 4G GMLC [204].
[0069] Further, the first transceiver unit [102] is configured to receive a first
25 message from the first technology network node [204] and acknowledging that the
location information request has failed if the user is determined as being in a
detached state. The acknowledgement that the location information has failed may
also be determined in case the user has not migrated to second technology network
such as 5G. The first message is the response received from the first technology
30 network node [204]. The response may also be an “ABSENT SUBSCRIBER”
message showing that there is no active user in the network. The first message
20
essentially is an error message showing an error in fulfilling the request for
retrieving the location from the first technology network node [204]. The error
message may be in form of Hypertext Markup Language (HTML) format. The
absence of the active user based on the SUPI mentioned in the location information
5 request is called as the user being in a detached state. The acknowledgement is
based on the first message that the location information request is responded with an error message.
[0070] Also, the first transceiver unit [102] is configured to receive a second
10 message from the first technology network node [204] and to transmit a subsequent
request to a second technology network node [206] if the user is determined as the migrated user. The second message is the response message from the first technology network node [204] which may be an “UNKNOWN SUBSCRIBER” message which shows that the SUPI as mentioned in the location information
15 request is not known or does not match the records and shows that the UE must
have been migrated to second technology network such as 5G network and the records will be available with the second technology network node [206] such as 5G GMLC [206]. It should be noted that the second technology network node [206] and the 5G GMLC [206]may have been used interchangeably, nevertheless, it
20 should be noted that the second technology network node [206] may also refer to
any other generation network node which may be used for acquiring location information of the user and shall not be limited to the 5G GMLC [206]. The 5G GMLC [206] is the network node that provides location-based services, emergency services or value-added service providers and may be used to retrieve the location
25 information of user devices.
[0071] The transmission of subsequent request to the second technology network
node [206] may also be based on the first message and the second message. The
first message and the second message may be used as a trigger for subsequent steps.
30 The first message and the second message help in determination of the user being
a migrated user or a non-migrated user. The subsequent request to the second
21
technology network node [206] may also be another location information request, but the subsequent request may be sent to a different entity than the earlier location information request. The subsequent request may be the location information request, for seeking the location information of the user. 5
[0072] The first transceiver unit [102] is configured to receive a subsequent response in response to the subsequent request, from the second technology network node [206], if the user is registered in the second technology network. The second technology network node [206] may be associated with a second technology
10 network such as 5G core network. The user is registered in the second technology
network, such as 5G, may be the case where the user is a migrated user who has migrated from first technology network to the second technology network. In an implementation the system [100B] will be able to retrieve the location information of the user from the second technology network node [206], since the user must be
15 registered in either first technology network (4G) or second technology network
(5G). The system [100B] will be able to retrieve the location information at least from either of the 4G or the 5G network.
[0073] The present disclosure further discloses that the first analysis unit [104] is
20 further configured to reattempt to receive, via the first transceiver unit [102], the
location information of the user from the first technology network node [204] upon
a failure of receiving the location information from the second technology network
node [206]. This function serves as a failsafe after the failure of retrieving location
of the user in all kinds of networks and attempts again to retrieve the location
25 information of the user.
[0074] The present disclosure further discloses that the first analysis unit [104] is
further configured to provide a feedback to a requesting entity regarding a success
and a failure of retrieval of the location information. The feedback is the response
30 indicating whether the system [100B] has been able to retrieve the location
information or not. If the location information is successfully retrieved, this
22
indicates the success of the retrieval of the location information, and if the location
information is unable to be retrieved, then this indicates the failure of the retrieval
of the location information. The feedback provided to the requesting entity may also
comprise the location information in case of the success. Further, the feedback may
5 also comprise the reason for non-retrieval of the location information and may also
include the first message and the second message as the reasons for the failure in case of 5G as well. There may be other reasons as well such as user not found, user inactive, etc.
10 [0075] As per the present disclosure, currently in an implementation when users
IMSI is received, the request is first sent to a first technology network node [204] (or a 4G GMLC [204] in an implementation), if the user is not migrated then currently the location can be fetched from the first technology network (or a 4G core network in an implementation) only. In case the user is not migrated but is
15 currently in detached state then “Absent subscriber” error is received, and further
request is failed with same error.
[0076] In case the user is the migrated subscriber, when the request is sent to the
first technology network node [204], the first technology network node [204]
20 responds with “Unknown subscriber” error to LIM client. On receiving the error,
LIM client resends request to the second technology network node [206] (or a 5G GMLC [206] in an implementation) from which the location for migrated subscriber can be retrieved.
25 [0077] A person skilled in the art would appreciate that the above listed features are
only exemplary and does not limit the present disclosure in any possible manner. In an exemplary implementation, the features listed above may be considered to be in the order of their importance.
30 [0078] Referring to FIG. 2, an exemplary process for determining a location
information for a location interception management (LIM) of users irrespective of
23
their migration status to a 5G network, in accordance with exemplary embodiments of the present discloser is shown.
[0079] At step 1, process includes receiving the location information request based
5 on the user Subscription Permanent Identifier (SUPI) at LIM unit [202] end, where
the LIM unit [202] sends the request to the 4G GMLC [204]. Now, if the user is the non-5G migrated user then the user location is successfully retrieved from the 4G core network.
10 [0080] In the same step, in an event the UE may be in a detached state and might
not migrated to 5G, then the 4G GMLC [204] may respond with an error message “ABSENT Subscriber”. In such a case where user may be in the detached state and the user location may not be retrieved then the user location request may fail for such user.
15
[0081] Next at step 2, if the user may be 5G migrated user, then 4G GMLC [204] may respond with error “UNKNOWN SUBSCRIBER”.
[0082] Further at step 3, on receiving the error, the LIM unit [202] may understand
20 that the user may be a 5G migrated user and then, subsequently may send location
request to the 5G GMLC [206].
[0083] Furthermore, at step 4, if the user may be registered in 5G then the user location may be successfully retrieved from 5G core via a location response. 25
[0084] As is evident from the above, the present disclosure provides a technically advanced solution to derive location for both 5G migrated SIM(s) and non 5G migrated SIM(s) for location interception.
30 [0085] Referring to FIG. 3, an exemplary block diagram of a user equipment [300]
for determining the location information of the user for the location interception is
24
provided, in accordance with exemplary implementations of the present disclosure. The user equipment (UE) [300] comprises at least one second transceiver unit [302] and at least one second analysis unit [304] connected to each other.
5 [0086] The second transceiver unit [302] is configured to receive the location
information request based on the SUPI from a network system. The second
transceiver unit [302] can be a transceiver which is configured to transmit or receive
data and may be either wireless or wired. The second analysis unit [304] may be a
processor configured to perform analysis or processing of the data. The network
10 system can be any communication network system such as the 4G network or the
5G network.
[0087] The second analysis unit [304] is configured to determine if the SUPI of the location information request matches with a SUPI of the UE [300]. The SUPI
15 mentioned in the location information request is required to be matched with the
SUPI of the UE [300] in order to perform authentication of the location information request and to check if the location information sent by the UE [300] is actually desired for the present UE [300] or SUPI. This check enables the transmission of the correct location information of the correct user device. The second analysis unit
20 [304] performs analysis of both the SUPI and provides a result based on the
matching of the SUPI. If the SUPI is matched with each other, it provides a response for positive matching and if it is not matched then it provides a response of negative matching.
25 [0088] The second transceiver unit [302] is further configured to transmit the
location information of the UE [300] based on the positive matching of the SUPI of the location information request with the SUPI of the UE [300]. Based on this matching, the correct location information of the user equipment [300] is sent to the network. The location information may be sent to the network node of the respective
30 technology network.
25
[0089] Referring to FIG. 4, an exemplary block diagram for a user equipment (UE) [400] for applying a location interception policy for the location interception is disclosed in accordance with exemplary implementation of the present disclosure. 5
[0090] The user equipment (UE) [400] comprises at least one third transceiver unit
[402] and at least one third analysis unit [404] connected to each other. The third
transceiver unit [402] may be the transceiver which is configured to transmit or
receive data and may be either wireless or wired. The third analysis unit [404] may
10 be a processor configured to perform analysis or processing of the data.
[0091] The third transceiver unit [402] is configured to receive a Location
Interception (LI) policy from the location interception management (LIM) unit
[202]. The LI policy is a policy for implementation of the location interception
15 performed by the requesting entity. The requesting entity may request the location
information of the UE [400] in order to perform one or more actions which may be covered in the LI policy.
[0092] The third analysis unit [404] is configured to apply the LI policy or
20 implement the one or more actions covered under the LI policy. The LI policy may
be based on the location information of the UE [400] which can be determined by a network entity, where the network entity may be any entity which handles and provides network related services such as a mobile operator end facilitating 5G services. 25
[0093] The determination of the location information of the UE [400] may be based on the following actions performed by the system [100B] at the network entity.
[0094] Receiving, by the first analysis unit [104] via the first transceiver unit [102],
30 the location information request for the user based on the Subscription Permanent
Identifier (SUPI). The location information request is a request which seeks the
26
location information with respect to the user equipment or the subscriber. The
location information request may be received from a requesting entity, where the
requesting entity may be for example, a location-based service provider, or a client
of the location interception management (LIM) unit [202]. The user may be the user
5 equipment [400] or the user device or the subscriber and are interchangeably used
herein, however the meaning may remain same, unless specified. The Subscription Permanent Identifier (SUPI) is an identifier used to maintain user-specific data across network migrations. The SUPI serves as a unique identifier associated with a subscriber’s subscription in the network. The SUPI can be used to retrieve relevant
10 subscription data and may also be used to retrieve subscriber profile for ensuring
continuity of services even during migration of the users between the first generation networks and the second generation networks. The Location Intercept Management (LIM) unit [202] is responsible for facilitating and coordinating location interception activities that are mandated by legal authorities and regulatory
15 requirements. The LIM unit [202] intercepts and monitors telecommunication data.
The present disclosure further discloses that the LIM unit [202] ensures that the location interception is based on one or more legal and authorized requests. The one or more legal and authorized requests are the requests which are checked to be made by the legal authorities acting in compliance with applicable laws, rules, and
20 procedure.
[0095] Then transmitting, by the first transceiver unit [102], a request message to a
first technology network node [204] to determine the location information of the
user. In an implementation of the present disclosure, the first technology network
25 node [204] may be a 4G Gateway Mobile Location Centre (GMLC) [204]. The
request message may also be the location information request which was received.
[0096] The first technology network node [204] is the key component for location-
based services, emergency services or value-added services in the first technology
30 network and may be used to retrieve the location information of user devices.
27
[0097] Then, the determination of the location information may also comprise
determining whether the user is a non-migrated user or a migrated user. The
determination of a user being the migrated user or the non-migrated user is based
on response received from the first technology network node [204] in response to
5 the location information request. The migrated user is the user which has migrated
to the second technology network from the first technology network. The non-migrated user is the user which has not migrated to the second technology network and remains in other networks such as first technology network or 4G network or other generation networks.
10
[0098] Once, the request message is transmitted, then the first transceiver unit [102] is configured to receive a response message in response to the request message. The response message comprises the location information of the user. The location information of the user may be retrieved from a first technology network node [204]
15 if the user is determined as a non-migrated user. The first technology network node
[204] responds to this retrieval by delivering a message which may be a success message or an error message. In case of success message, the location information is retrieved.
20 [0099] Then receiving, by the first transceiver unit [102], a first message from the
first technology network node [204] and acknowledging that the location information request has failed if the user is determined as being in a detached state. The acknowledgement that the location information has failed may also be determined in case user has not migrated to the second technology network. The
25 first message is the response received from the first technology network node [204],
and which may also be an “ABSENT SUBSCRIBER” message showing that there is no active user in the network. The first message is an error message showing an error in fulfilling the request. The error message may also be in form of HTML language and the error message may be the status response messages. The absence
30 of the active user based on the SUPI mentioned in the location information request
is called as the user being in a detached state. The acknowledgement is based on the
28
first message that the location information request is responded with an error message.
[0100] The determination further comprises receiving by the first transceiver unit
5 [102], a second message from the first technology network node [204] and
transmitting a subsequent request to a second technology network node [206] if the user is determined as the migrated user. The second message is the response message from the first technology network node which may be an “UNKNOWN SUBSCRIBER” message which shows that the SUPI as in the location information
10 request is not known or does not match the records and shows that the UE [400]
must have been migrated to second technology network and the records will be available with the second technology network node [206]. The second technology network node [206] such as 5G GMLC [206] is the network node that provides location-based services, emergency services or value-added service providers and
15 may be used to retrieve the location information of user devices.
[0101] The transmission of subsequent request to the second technology network node [206] may also be based on the first message and the second message. The first message and the second message help in the determination of the user being a
20 migrated user or a non-migrated user. The first message and the second message
may be used as a trigger for subsequent steps. The subsequent request to the second technology network node [206] may also be another location information request, but to the subsequent request may be sent to a different entity than the earlier location information request. The subsequent request may be the location
25 information request, for seeking location information of the user.
[0102] Then the determination of the location information is based on receiving a
subsequent response in response to the subsequent request, from the second
technology network node [206], if the user is registered in the second technology
30 network. The second technology network node [206] may be associated with a
second technology network. The user is registered in the second technology
29
network may be the case where the user is a 5G migrated user who has migrated
from first technology network to a second technology network. In an
implementation, the system [100B] is configured to retrieve the location
information of the user from the second technology network node [206], since the
5 user must be registered in either first technology network (4G) or second
technology network (5G). The system [100B] is configured to retrieve the location information at least from either network. The 5G core network or the 5G network are terms that are used for referring to the 5G telecommunications network.
10 [0103] The present disclosure further discloses the third analysis unit [404] is
further configured for providing a feedback to the requesting entity regarding the success and the failure of retrieval of the location information.
[0104] Referring to FIG. 5, an exemplary method flow diagram [500] for
15 determining a location information of a user for a location interception, in
accordance with exemplary implementation of the present disclosure is shown. In an implementation, the method is performed by the system [100B]. Further, the system [100B] (either partially or as a whole) may be present in a service device or in a user device for implementation of the features of the present disclosure. 20
[0105] The method [500] comprises determining a location information of a user for a location interception. Also, as shown in FIG. 5, the method [500] is started at step [502].
25 [0106] The location information may be determined as per the present disclosure
for location interception, lawful interception, providing emergency services, location-based advertising, and for other services which are based on the location information of the user.
30 [0107] The location information of the user may be the information related to
position of the user or the user device/ user equipment (UE), and also may be the
30
information related to the address of the user equipment (UE), or the registered
location of the user equipment or geodetic position, or civic location, or other
positioning methods. Lawful interception may be the process for enabling
authorized entities to perform interception by monitoring telecommunications data
5 (such as voice calls, messages, internet traffic, location, etc.) which are in
accordance with the legal regulations and process. The lawful interception for
interception of the location information may refer to the location interception. The
location interception capabilities are built into the network architecture in order to
ensure strict compliance with regulations while also focusing on security, privacy,
10 and data protection laws. The term "user” as used herein may also be a “user
equipment” or “user device” or “subscriber” and are interchangeably used herein, however the meaning may be considered to remain same, unless specified otherwise.
15 [0108] At step [504], the method [500] comprises receiving by a first analysis unit
[104] via a first transceiver unit [102]. The method [500] involves receiving a
location information request for the user based on a subscription permanent
identifier (SUPI). The first analysis unit [104] is associated with a location
interception management (LIM) unit [202]. The location information request is a
20 request which seeks the location information with respect to the user equipment or
the subscriber. The location information request may be received from a requesting
entity, where the requesting entity may be, for example, a location-based service
provider, or a client of the location interception management (LIM) unit [202]. The
Subscription Permanent Identifier (SUPI) is an identifier used to maintain user-
25 specific data across network migrations. The SUPI serves as a unique identifier
associated with a subscriber’s subscription in the network. The SUPI may be used
to retrieve relevant subscription data and may also be used to retrieve subscriber
profile for ensuring continuity of services even during migration of the users
between the first-generation networks and the second-generation networks. The
30 location interception management (LIM) unit [202] is responsible for facilitating
and coordinating location interception activities that are mandated by legal
31
authorities and regulatory requirements. The LIM unit [202] intercepts and
monitors telecommunication data. The method may further comprise receiving, by
the first transceiver unit [102], one or more legal and authorized requests, and the
location interception is based on the one or more legal and authorized requests. The
5 one or more legal and authorized requests are the requests which are checked to be
made by the legal authorities acting in compliance with applicable laws, rules, and procedure.
[0109] At step [506], the method [500] comprises transmitting, the first transceiver
10 unit [102], a request message to a first technology network node [204] to determine
the location information of the user. In an implementation of the present disclosure,
the first technology network node may be a 4G Gateway Mobile Location Centre
(GMLC) [204]. The request message may also be the location information request
which was received by the first analysis unit [104] via the first transceiver unit
15 [102].
[0110] The first technology network node [204] is the key component for location-
based services, emergency services or value-added services providers in the first
technology network, and may be used to retrieve the location information of user
20 devices connected to the first technology network.
[0111] The method [500] may also comprise determining whether the user is a non-migrated user or a migrated user. The determination of a user being the migrated user or the non-migrated user is based on a response received from the first
25 technology network node [204] in response to the location information request. The
migrated user is the user which has migrated to a second technology network node such as 5G network technology and the non-migrated user is the user which has not migrated to the second technology network and remains in first technology network such as 4G network.
30
32
[0112] Once, the request message is transmitted, then at step [508], the method
[500] comprises receiving, by first transceiver unit [102], a response message in
response to the request message. The response message comprises the location
information of the user. The location information may be received from the first
5 technology network such as 4G core network if the user is determined as a non-
migrated user. The first technology network node [204] responds to this retrieval by
delivering a message which may be a success message or an error message. In case
of the success message, the location information is retrieved. It should be noted that
the first technology network node [204] and the 4G GMLC [204] may have been
10 used interchangeably, nevertheless, it should be noted that the first technology
network node [204] may refer to any other generation network node which may be used for acquiring location information of the user and shall not be limited to the 4G GMLC [204].
15 [0113] At step [510], the method [500] comprises receiving, by the first transceiver
unit [102], a first message from the first technology network node [204] and acknowledging that the location information request has failed if the user is determined as being in a detached state. The acknowledgement that the location information has failed may also be determined in case the user has not migrated to
20 second technology network. The first message is the response received from the
first technology network node [204]. The first message may also be an “ABSENT SUBSCRIBER” message showing that there is no active user in the network. The first message is an error message showing an error in fulfilling the request for retrieving the location from the first technology network node [204]. The error
25 message may also be in form of HTML format. The absence of the active user based
on the SUPI mentioned in the location information request is called as the user being in a detached state. The acknowledgement is based on the first message that the location information request is responded with an error message.
30 [0114] At step [512], the method [500] comprises receiving by the first transceiver
unit [102], a second message from the first technology network node [204] and
33
transmitting a subsequent request to a second technology network node [206] if the
user is determined as the migrated user. The second message is the response
message from the first technology network node which may be an “UNKNOWN
SUBSCRIBER” message which shows that the SUPI as mentioned in the location
5 information request, is not known or does not match the records and shows that the
UE must have been migrated to second technology network such as 5G network and the records will be available with the second technology network node [206] such as 5G GMLC [206]. It should be noted that the second technology network node [206] and the 5G GMLC [206] has been used interchangeably, nevertheless,
10 it should be noted that the second technology network node [206] may refer to any
other generation network node which may be used for acquiring location information of the user and shall not be limited to the 5G GMLC. The 5G GMLC [206] is the network node provides location-based services, emergency services or value-added service providers and may be used to retrieve the location information
15 of user devices.
[0115] The transmission of subsequent request to the second technology network node [206] may also be based on the first message and the second message. The first message and the second message help in determination of the user being a
20 migrated user or a non-migrated user. The first message and the second message
may be used as a trigger for subsequent steps. The subsequent request to the second technology network node [206] may also be another location information request, but to the subsequent request may be sent to a different entity than the earlier location information request. The subsequent request may be the location
25 information request, for seeking the location information of the user.
[0116] At step [514], the method [500] comprises receiving, by the first transceiver
unit [102], a subsequent response in response to the subsequent request, from the
second technology network node [206]. The second technology network node [206]
30 may be associated with a second technology network such as a 5G core network if
the user is registered in the second technology network. The user being registered
34
in the second technology network may be the case where the user is a migrated user
who has migrated from first technology network to the second technology network.
The system [100B] will be able to retrieve the location information of the user from
the second technology network node [206], since the user must be registered in
5 either first technology network (4G) or second technology network (5G). The
system [100B] will be able to retrieve the location information at least from either network.
10 [0117] The present disclosure further discloses that the method [500] also
comprises reattempting, by the first analysis unit [104], to receive, via the first transceiver unit [102], the location information of the user from the first technology network node [204] upon a failure of receiving the location information from the second technology network node [206]. This step serves as a failsafe after the failure
15 of retrieving location of the user in all kinds of networks and attempts again to
retrieve the location information of the user.
[0118] The present disclosure further encompasses providing a feedback, by the first analysis unit [104], to a requesting entity regarding a success and a failure of
20 retrieval of the location information. The feedback is the response whether the
location information is retrieved or not. If the location information is successfully retrieved, this indicates the success of the retrieval of the location information, and if the location information is unable to be retrieved, then this indicates the failure of the retrieval of the location information. The feedback provided to the requesting
25 entity may also comprise the location information in case of the success. Further,
the feedback may also comprise the reason for non-retrieval of the location information and may also include the first message and the second message as the reasons for the failure in case of 5G as well. There may be other reasons as well such as user not found, user inactive, etc.
30
35
[0119] The present disclosure further discloses that in the method [500], the SUPI may be the identifier used to maintain a user-specific data across network migrations.
5 [0120] Thereafter, at step [516], the method [500] is terminated.
[0121] Consider an example, when a user SUPI is received for location information request at LIM [202] end, it first sends request to 4G GMLC [204]. Further if the user is non 5G migrated user then the user location is successfully retrieved from
10 4G core. If the user is not migrated to 4G but it is currently in detached state, then
4G GMLC [204] responds with error “ABSENT Subscriber”. In such case where user is in detached state and its location cannot be retrieved then the location request fails for such user. Also, if the user is 5G migrated user, then 4G GMLC [204] responds with error “UNKNOWN SUBSCRIBER”. On receiving the error, LIM
15 client understands that the user is 5G migrated user and sends location request to
5G GMLC [206]. Further if the user is registered in 5G then its location is successfully retrieved from 5G core.
[0122] As per the present disclosure, currently in an implementation when users
20 IMSI is received, the request is first sent to 4G GMLC [204]. If the user is not
migrated then currently the location can be fetched from 4G core only. In case, the user is not migrated but is currently in detached state then “Absent subscriber” error is received, and further request is failed with same error.
25 [0123] In case the user is 5G migrated subscriber and request is sent on 4G GMLC
[204], the 4G GMLC [204] responds with “Unknown subscriber” error to LIM client. On receiving the error, LIM client resends request to 5G GMLC [206] from which the location for 5G migrates subscriber can be retrieved.
30 [0124] FIG. 6 illustrates an exemplary block diagram of a computing device [600]
upon which the features of the present disclosure may be implemented in
36
accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [600] may also implement a method for
determining a location information of a user utilising the system [100B]. In another
implementation, the computing device [600] itself implements the method for
5 determining the location information of the user using one or more units configured
within the computing device [600], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0125] The computing device [600] may include a bus [602] or other
10 communication mechanism for communicating information, and a hardware
processor [604] coupled with bus [602] for processing information. The hardware
processor [604] may be, for example, a general-purpose microprocessor. The
computing device [600] may also include a main memory [606], such as a random-
access memory (RAM), or other dynamic storage device, coupled to the bus [602]
15 for storing information and instructions to be executed by the processor [604]. The
main memory [606] also may be used for storing temporary variables or other
intermediate information during execution of the instructions to be executed by the
processor [604]. Such instructions, when stored in non-transitory storage media
accessible to the processor [604], render the computing device [600] into a special-
20 purpose machine that is customized to perform the operations specified in the
instructions. The computing device [600] further includes a read only memory
(ROM) [608] or other static storage device coupled to the bus [602] for storing static
information and instructions for the processor [604].
25 [0126] A storage device [610], such as a magnetic disk, optical disk, or solid-state
drive is provided and coupled to the bus [602] for storing information and instructions. The computing device [600] may be coupled via the bus [602] to a display [612], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for
30 displaying information to a computer user. An input device [614], including
alphanumeric and other keys, touch screen input means, etc. may be coupled to the
37
bus [602] for communicating information and command selections to the processor
[604]. Another type of user input device may be a cursor controller [616], such as a
mouse, a trackball, or cursor direction keys, for communicating direction
information and command selections to the processor [604], and for controlling
5 cursor movement on the display [612]. The input device typically has two degrees
of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0127] The computing device [600] may implement the techniques described
10 herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
and/or program logic which in combination with the computing device [600] causes
or programs the computing device [600] to be a special-purpose machine.
According to one implementation, the techniques herein are performed by the
computing device [600] in response to the processor [604] executing one or more
15 sequences of one or more instructions contained in the main memory [606]. Such
instructions may be read into the main memory [606] from another storage medium,
such as the storage device [610]. Execution of the sequences of instructions
contained in the main memory [606] causes the processor [604] to perform the
process steps described herein. In alternative implementations of the present
20 disclosure, hard-wired circuitry may be used in place of or in combination with
software instructions.
[0128] The computing device [600] also may include a communication interface
[618] coupled to the bus [602]. The communication interface [618] provides a two-
25 way data communication coupling to a network link [620] that is connected to a
local network [622]. For example, the communication interface [618] may be an
integrated services digital network (ISDN) card, cable modem, satellite modem, or
a modem to provide a data communication connection to a corresponding type of
telephone line. As another example, the communication interface [618] may be a
30 local area network (LAN) card to provide a data communication connection to a
compatible LAN. Wireless links may also be implemented. In any such
38
implementation, the communication interface [618] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
5 [0129] The computing device [600] can send messages and receive data, including
program code, through the network(s), the network link [620] and the
communication interface [618]. In the Internet example, a server [630] might
transmit a requested code for an application program through the Internet [628], the
ISP [626], the local network [622], a host [624] and the communication interface
10 [618]. The received code may be executed by the processor [604] as it is received,
and/or stored in the storage device [610], or other non-volatile storage for later execution.
[0130] The present disclosure further encompasses a non-transitory computer-
15 readable-medium storing one or more instructions, the one or more instructions
comprising executable code which when executed by one or more units of a system
[100], causes the one or more units to perform certain functions. The executable
code when executed causes a first analysis unit [104] of the system [100] to receive,
via a first transceiver unit [102], a location information request for the user based
20 on a Subscription Permanent Identifier (SUPI), the first analysis unit [104] is
associated with a location interception management (LIM) unit [202]. The
executable code when executed further causes the first transceiver unit [102] of the
system [100] to transmit, a request message to a first technology network node [204]
to determine the location information of the user. The executable code when
25 executed further causes the first transceiver unit [102] of the system [100] to receive
a response message in response to the request message, from the first technology
network node [204].The response message comprising the location information of
the user if the user is determined as a non-migrated user. The executable code when
executed further causes the first transceiver unit [102] of the system [100] to receive
30 a first message from the first technology network node [204] and acknowledge that
the location information request has failed if the user is determined as being in a
39
detached state. The executable code when executed further causes the first
transceiver unit [102] of the system [100] to receive a second message from the first
technology network node [204] if the user is determined as a migrated user, and
transmit a subsequent request to a second technology network node [206]. The
5 executable code when executed further causes the first transceiver unit [102] of the
system [100] to receive a subsequent response in response to the subsequent request, from the second technology network node [206], if the user is registered in second technology network node [206], wherein the subsequent response comprising the location information of the user.
10
[0131] A person skilled in the art would appreciate that the above listed features are only exemplary and does not limit the present disclosure in any possible manner. In an exemplary implementation, the features listed above may be considered to be in the order of their importance.
15
[0132] As is clear from the discussion of the various features herein, the present disclosure provides a technically advanced solution that enables determination of the location information in multiple types of networks, such as if the user equipment has been migrated to 5G network and also enables determination of the location
20 information in case the user equipment is not migrated to the 5G network and
remains within the other generation of the networks (such as 4G or in some cases 3G, 2G as well). This determination of the location information enables the location interception by the requesting entity. The present disclosure is particularly useful while fetching the location information of the user for location interception in an
25 environment where only the few subscribers/ UEs are migrated to 5G and the
migration of the few subscribers to 5G is pending.
[0133] While considerable emphasis has been placed herein on the disclosed
embodiments, it will be appreciated that many embodiments can be made and that
30 many changes can be made to the embodiments without departing from the
principles of the present disclosure. These and other changes in the embodiments
40
of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
5 [0134] Further, in accordance with the present disclosure, it is to be acknowledged
that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
10 functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
41
I/We Claim:
1. A method [500] for determining a location information of a user, the method
comprising:
receiving, by a first analysis unit [104] via a first transceiver unit [102], a location information request for the user based on a Subscription Permanent Identifier (SUPI), the first analysis unit [104] is associated with a Location Interception Management (LIM) unit [202];
transmitting, by the first transceiver unit [102], a request message to a first technology network node [204] to determine the location information of the user;
receiving, by the first transceiver unit [102], a response message in response to the request message, from the first technology network node, wherein the response message comprises the location information of the user, if the user is determined as a non-migrated user;
receiving, by the first transceiver unit [102], a first message from the first technology network node [204] and acknowledging that the location information request has failed if the user is determined as being in a detached state;
receiving, by the first transceiver unit [102], a second message from the first technology network node [204], and transmitting a subsequent request to a second technology network node [206] if the user is determined as a migrated user; and
receiving, by the first transceiver unit [102], a subsequent response in response to the subsequent request, from the second technology network node, if the user is registered in the second technology network node, wherein the subsequent response comprises the location information of the user.
2. The method [500] as claimed in claim 1, further comprising reattempting, by
the first analysis unit [104] to receive, via the first transceiver unit [102], the
location information of the user from the first technology network node [204]
upon a failure of receiving the location information from the second technology network node [206].
3. The method [500] as claimed in claim 1, further comprising receiving, by the first transceiver unit [102], one or more legal and authorized requests, and the location interception is based on the one or more legal and authorized requests.
4. The method [500] as claimed in claim 1, further comprising providing a feedback, by the first analysis unit [104], to a requesting entity regarding one of a success and a failure, of retrieval of the location information.
5. The method [500] as claimed in claim 1, wherein the SUPI is an identifier used to maintain a user-specific data across network migrations.
6. The method [500] as claimed in claim 1, wherein the first technology network node is a 4G Gateway Mobile Location Centre (GMLC), and the second technology network node is a 5G Gateway Mobile Location Centre (GMLC).
7. A system [100B] for determining a location information of a user, the system [100B] comprises:
a first analysis unit [104], configured to:
receive, via a first transceiver unit [102], a location information request for the user based on a Subscription Permanent Identifier (SUPI), the first analysis unit [104] is associated with a location interception management (LIM) unit [202];
the first transceiver unit [102], connected at least to the first analysis unit [104], the first transceiver unit configured to:
transmit, a request message to a first technology network node [204] to determine the location information of the user;
receive a response message in response to the request message, from the first technology network node [204], wherein the response message comprising the location information of the user if the user is determined as a non-migrated user;
receive a first message from the first technology network node [204] and acknowledge that the location information request has failed if the user is determined as being in a detached state;
receive a second message from the first technology network node [204] if the user is determined as a migrated user, and transmit a subsequent request to a second technology network node [206]; and
receive a subsequent response in response to the subsequent request, from the second technology network node [206], if the user is registered in second technology network node [206], wherein the subsequent response comprising the location information of the user.
8. The system [100B] as claimed in claim 7, wherein the first analysis unit [104] is further configured to reattempt to receive, via the first transceiver unit [102], the location information of the user from the first technology network node [204] upon a failure of receiving the location information from the second technology network node [206].
9. The system [100B] as claimed in claim 7, wherein the first transceiver unit [102] is further configured to receive one or more legal and authorized requests, and the location interception is based on the one or more legal and authorized requests.
10. The system [100B] as claimed in claim 7, wherein the first analysis unit [104] is further configured to provide a feedback, to a requesting entity, regarding one of a success and a failure, of retrieval of the location information.
11. The system [100B] as claimed in claim 7, wherein the SUPI is an identifier used to maintain a user-specific data across network migrations.
12. The system [100B] as claimed in claim 7, wherein the first technology network node is a 4G Gateway Mobile Location Centre (GMLC), and the second technology network node is a 5G Gateway Mobile Location Centre (GMLC).
13. A user equipment (UE) [300] for determining a location information of a user, said UE [300] comprising:
a second transceiver unit [302] configured to receive a location information request based on a Subscription Permanent Identifier (SUPI) from a network system; and
a second analysis unit [304] connected to the second transceiver unit [302], the second analysis unit [304] is configured to determine if the SUPI of the location information request matches with a SUPI of the UE [300], wherein:
the second transceiver unit [302] is further configured to transmit the location information of the UE [300] based on a positive matching of the SUPI of the location information request with the SUPI of the UE [300].
14. A user equipment (UE) [400] for applying a location interception (LI) policy,
the UE [400] comprising:
a third transceiver unit [402], configured to receive the LI policy from a location interception management (LIM) unit [202]; and
a third analysis unit [404] connected to the third transceiver unit [402], the third analysis unit [404] is configured to apply the LI policy,
wherein, the LI policy is based on a location information of the UE [400], and the location information of the UE [400] is determined at a network entity based on:
receiving, by a system [100B], a location information request for a user based on a Subscription Permanent Identifier (SUPI),
transmitting, by the system [100B], a request message to a first technology network node [204] to determine the location information of the user,
receiving, by the system [100B], a response message in response to the request message, from the first technology network node, wherein the response message comprises the location information of the user if the user is determined as a non-migrated user,
receiving, by the system [100B], a first message from the first technology network node [204] and acknowledging that the location information request has failed if the user is determined as being in a detached state,
receiving, by the system [100B], a second message from the first technology network node [204], and transmitting a subsequent request to a second technology network node [206] if the user is determined as a migrated user, and
if the user is registered in the second technology network node [206], receiving, by the system [100B], a subsequent response in response to the subsequent request, wherein the subsequent response comprises the location information of the user.
15. The UE [400] as claimed in claim 14, wherein the third transceiver unit [402] is configured to receive one or more legal and authorized request, and the location interception is based on the one or more legal and authorized requests.
16. The UE [400] as claimed in claim 14, wherein the SUPI is an identifier used to maintain user-specific data across network migrations.
| # | Name | Date |
|---|---|---|
| 1 | 202321047456-STATEMENT OF UNDERTAKING (FORM 3) [14-07-2023(online)].pdf | 2023-07-14 |
| 2 | 202321047456-PROVISIONAL SPECIFICATION [14-07-2023(online)].pdf | 2023-07-14 |
| 3 | 202321047456-FORM 1 [14-07-2023(online)].pdf | 2023-07-14 |
| 4 | 202321047456-FIGURE OF ABSTRACT [14-07-2023(online)].pdf | 2023-07-14 |
| 5 | 202321047456-DRAWINGS [14-07-2023(online)].pdf | 2023-07-14 |
| 6 | 202321047456-FORM-26 [14-09-2023(online)].pdf | 2023-09-14 |
| 7 | 202321047456-Proof of Right [23-10-2023(online)].pdf | 2023-10-23 |
| 8 | 202321047456-ORIGINAL UR 6(1A) FORM 1 & 26)-011223.pdf | 2023-12-08 |
| 9 | 202321047456-ENDORSEMENT BY INVENTORS [10-07-2024(online)].pdf | 2024-07-10 |
| 10 | 202321047456-DRAWING [10-07-2024(online)].pdf | 2024-07-10 |
| 11 | 202321047456-CORRESPONDENCE-OTHERS [10-07-2024(online)].pdf | 2024-07-10 |
| 12 | 202321047456-COMPLETE SPECIFICATION [10-07-2024(online)].pdf | 2024-07-10 |
| 13 | 202321047456-FORM 3 [01-08-2024(online)].pdf | 2024-08-01 |
| 14 | Abstract-1.jpg | 2024-08-13 |
| 15 | 202321047456-Request Letter-Correspondence [14-08-2024(online)].pdf | 2024-08-14 |
| 16 | 202321047456-Power of Attorney [14-08-2024(online)].pdf | 2024-08-14 |
| 17 | 202321047456-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf | 2024-08-14 |
| 18 | 202321047456-Covering Letter [14-08-2024(online)].pdf | 2024-08-14 |
| 19 | 202321047456-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf | 2024-08-14 |
| 20 | 202321047456-FORM 18A [10-03-2025(online)].pdf | 2025-03-10 |
| 21 | 202321047456-FER.pdf | 2025-03-28 |
| 22 | 202321047456-FORM 3 [14-05-2025(online)].pdf | 2025-05-14 |
| 23 | 202321047456-FER_SER_REPLY [15-05-2025(online)].pdf | 2025-05-15 |
| 1 | 202321047456_SearchStrategyNew_E_SearchHistory7456E_27-03-2025.pdf |