Abstract: A user equipment identification detector for use in a wireless telecommunication network. The user equipment is operable to communicate with network nodes provided in the wireless telecommunication network. The detector comprises a proximity sensor and an interrogation unit. The proximity sensor is operable to detect placement of the user equipment within a predetermined detection region. The interrogation unit is operable to request an indication of identity from the user equipment detected in the predetermined detection region and communicate the indication of identity to a user equipment identification unit.
DETECTOR
FIELD OF THE INVENTION
The present invention relates to a user equipment identification detector, a method of
detecting and identifying user equipment and a computer program product.
BACKGROUND
Wireless telecommunication systems are known. In such systems, user equipment roam
through a wireless telecommunications network. Base stations are provided which
support areas of radio coverage. A number of such base stations are provided and are
distributed geographically in order to provide a wide area of coverage to user
equipment. When user equipment is within an area served by a base station,
communication may be established between the user equipment and base station
over associated radio links. A base station typically supports a number of sectors within
the geographical area of service.
It is desired to enable user equipment to interact with real world objects. Use of user
equipment, such as mobile phones, to access interactions with real world objects is
particularly attractive since end users are familiar and comfortable with their mobile
telephones.
Examples of possible interactions with real world objects include, for example,
convenient payment via mobile phone. Payment can be performed by placing a
mobile phone or other similar user equipment on a payment area on a shop counter,
for example. Furthermore, after successful payment, a n SMS receipt of the transaction
may be sent to the user equipment.
Further examples of interactions with real world objects may include allowing user
equipment to download real world content by touching the content. For example, it
may be possible to download a train timetable directly to user equipment by touching
user equipment against a relevant ticket machine or timetable at a train station. The
download to the user equipment is triggered by placing the phone on the content; for
example, a ticket machine at a railway station. Alternatively, it may be possible to
send a link to the timetable via SMS message from where it can then be accessed by a
user.
Furthermore, user equipment may be used as a keyless entry system for houses, cars
and workplaces.
It will be appreciated that the examples of interactions given represent only a few of a
large possible number of possibilities of local interactions between user equipment and
real world objects.
It is desired to provide a user equipment detector to enable such interactions.
SUMMARY
A first aspect provides a user equipment identification detector for use in a wireless
telecommunication network, the user equipment being operable to communicate with
network nodes provided in the wireless telecommunication network.
The detector comprising:
a proximity sensor, operable to detect placement of the user equipment within
a predetermined detection region;
an interrogation unit, operable to request an indication of identity from the user
equipment detected in the predetermined detection region and communicate the
indication of identity to a user equipment identification unit.
The first aspect recognizes that to reliably provide interactive services between user
equipment and a real world object, it is required that the local interactions between
user equipment and real world objects are not triggered by the passing of user
equipment nearby and that only user equipment that wishes to download, or otherwise
have access to real world content is arranged to receive information from the real
world object.
The first aspect provides a reliable detector having a proximity sensor and an
interrogation unit, for example, a cellular short range sensor and corresponding
architecture, that enables a detector to reliably detect a mobile phone within a
predetermined volume of space and which allows the co-existence of real world
interactions with macro cellular networks whilst re-using the same frequency resources
by minimising disturbance to those networks. Such an approach allows the existing
cellular network infrastructure to be complemented without significant disruption and
enables new services to be offered based upon local interactions between user
equipment and real world objects.
The first aspect recognises that interactions between the detector and user equipment
may advantageously be limited to a small region within a larger geographic area
served by, for example, a macro or femto base station. The coverage region of a
detector according to the first aspect extends typically only a few centimetres around
the detector.
The first aspect recognises that by providing a proximity sensor, operation of the
detector may be restricted to situations in which the proximity sensor detects user
equipment within a relevant region. The interrogation unit only operates to request an
identifier when user equipment is detected by the proximity sensor within the relevant
region. Unwanted interactions with user equipment remote from the detector may thus
be minimized.
In one embodiment, the proximity sensor is operable to activate the interrogation unit
on detection of placement of the user equipment within the predetermined detection
region.
Accordingly, the interrogation unit may be inactive until user equipment is determined
to be close enough for any interaction to take place. Such an arrangement restricts
possible interactions with user equipment merely passing the detector.
Furthermore, such an arrangement allows hardware of the interrogation unit to be
turned off until user equipment is detected by the proximity sensor, allowing energy
savings. Such an arrangement may be particularly useful if the detector is operating on
a limited power supply, for example, a battery or other power cell.
In one embodiment, the proximity sensor is operable to measure a change in a
measurable quantity attributable to placement of said user equipment within said
predetermined detection region.
Accordingly, the proximity sensor may monitor a measurable quantity and monitor for a
predetermined change in that quantity, the change being attributable to the physical
placement of user equipment in the immediate vicinity of the detector.
In one embodiment, the proximity sensor is operable to periodically repeat the
measurement. Accordingly, by repeating measurement and thus repeating detection
steps periodically, measurements from a proximity sensor may be used to check that
user equipment remains in the detection region of the detector. The detector may, for
example, require that a change in measurable quantity is measured to be substantially
constant over a predetermined period before it determines that user equipment is
present in the detection region and it reports detection. The proximity sensor may
operate to monitor the status of detection over a period of time, thereby to determine
whether user equipment remains detected, thus indicating whether communication
between the detector and the user equipment may be established or, when
established, continue.
In one embodiment, the proximity sensor comprises a capacitive sensor. In one
embodiment, the proximity sensor comprises a pressure sensor. In one embodiment,
the proximity sensor comprises an infra red beam sensor. Various detection
mechanisms may be utilized, each programmed to report detection when a set of
criteria indicating that user equipment has entered the predetermined region has been
met.
In one embodiment, the interrogation unit comprises an antenna, operable to
communicate with the user equipment within a predetermined coverage region.
Accordingly, the detector may establish a radio link with said user equipment thereby
allowing communication with the user equipment in the same manner as
communication between a typical wireless communication network and user
equipment.
In one embodiment, the predetermined coverage region and the predetermined
detection region substantially correlate. Accordingly, the interrogation unit is
substantially operable to interact and communicate only with those user equipment
determined to be within the range of the proximity sensor. Such an arrangement helps
to minimize unwanted user equipment interaction and minimizes overall disruption to a
macrocell in a wireless communication network.
In one embodiment, the interrogation unit is operable to detect ambient radio
conditions and adjust power settings of a radio channel transmitted by the antenna in
accordance with detected ambient radio conditions. Accordingly, the detector may
be operable to select a radio frequency or channel in accordance with the wireless
communication network within which it is placed.
In one embodiment, the interrogation unit is operable to detect ambient radio
conditions and select a transmission frequency or channel to be transmitted by the
antenna in accordance with detected ambient radio conditions. Accordingly, by
detecting the radio condition of the surrounding wireless communication network, the
detector can select appropriate power settings on which to transmit a pilot channel to
communicate with user equipment in the detection or coverage region. If the
detector is located in a wireless communication network close to a base station it may
be necessary for the detector to transmit at high power to be "heard" above a macro
base station transmission.
In one embodiment the interrogation unit is operable to detect ambient radio
conditions and transmit a jamming signal on one or more radio frequencies to disrupt
communication with user equipment on those frequencies. Accordingly, depending
on the location of the detector within in a wireless communication network, the
detector may sense surrounding radio conditions and be operable to jam signals from
the surrounding network from reaching user equipment located within the detection
and/or coverage regions. Such a jamming signal allows the detector to communicate
with user equipment located in the detection and coverage zones effectively, allowing
the detector to be "heard" above transmissions occurring in the surrounding wireless
telecommunications network.
In one embodiment, the strength of the jamming signal is determined in accordance
with detected ambient radio conditions.
In one embodiment, the antenna comprises a directive antenna operable to provide
coverage within the predetermined coverage region and poor coverage outside the
region. Accordingly, interference can be minimised and interactions with user
equipment and the detector closely controlled.
In one embodiment, the antenna comprises a coil antenna. In one embodiment, the
antenna comprises a patch antenna. In one embodiment, the antenna comprises a
transmission line. The transmission line may be terminated by a n appropriately
matched load. Such antenna are typically substantially planar and therefore can be
easily included in a substantially planar detector. Such detectors allow user equipment
to be easily pressed against them. A planar component allows other planar
components, such as a user interface touch screen, or appropriate proximity sensor, to
be assembled into a compact unit.
In one embodiment, the indication of identity comprises said user equipment IMSI. User
equipment IMSI already operates as a unique identifier for user equipment in a wireless
telecommunications network. Use of that identifier allows a greater depth of already
available information about a n end user to be utilized. Use of IMSI may allow user data
†o be pulled in from other databases on a network, such that the interaction between
a real world object and the user equipment can be targeted to a specific end user.
In one embodiment the interrogation unit is operable to initiate a user equipment
camping procedure. Accordingly, the interrogation unit is operable to transmit a
location address which differs from the macro cell in which the detector is located.
When user equipment is in the coverage region of the interrogation unit and the
interrogation unit is active, and thus transmitting a pilot signal including such a location
address, the user equipment detects the pilot including the "new" location address.
The user equipment initiates a known "camping" procedure during which the
interrogation unit asks the user equipment for a n identity, typically the user equipment
IMSI. The camping procedure typically operates such that user equipment can obtain
a good communication link with the wireless network, so if user equipment finds itself to
be receiving a pilot channel with a reasonable signal strength (for example, from the
detector) the camping procedure may be used to communicate with user equipment.
In one embodiment, the interrogation unit is operable to terminate the initiated
camping procedure before completion of the camping procedure. Accordingly, user
equipment with which the interrogation unit is communicating does not attach itself to
the detector, which itself cannot provide network services to the user equipment. Use
of the camping procedure causes short term disruption to the network operation of user
equipment since the macrocell may not for a short period of time, whilst the camping
procedure is being utilized by the detector, be operable to send or receive user data.
Termination of the camping procedure ensures that any disruption is minimized.
In one embodiment, user equipment identification detector comprises the user
equipment identification unit. For example, in one embodiment the user equipment
identification unit is integrally formed with the detector. Accordingly, the detector may
have a n internal look-up unit from which to identify user equipment. That arrangement
may reduce latency in response, which may be advantageous in some interactions, for
example, opening a door in response to user equipment. Maintaining an internal
database of user equipment identities which meet the door-opening criteria ensures
the door is opened promptly.
In one embodiment the interrogation unit further comprises a cellular transceiver,
operable to communicate with a wireless telecommunications network including the
user equipment identification unit. In one embodiment the interrogation unit further
comprises a wired backhaul connector operable to communicate with a wireless
telecommunications network including the user equipment identification unit.The user
equipment identification unit may be located remote to the detector.
Accordingly, the detector may be operable to communicate with a typical macrocell
network, or similar, and the user equipment indicator of identity is communicated from
the detector to the network. The identification unit may be provided on the network.
Such an arrangement allows the detector to be relatively simple in operation and
construction, and allows information about an end user associated with user
equipment to be accumulated from a variety of sources within a network. Furthermore,
passing the identifier through the network allows a range of responses to be
implemented in response to detection of user equipment, for example, the sending of a
SMS message, billing the end user via user equipment charges, sending information at a
later time or date, that information being sent directly from the macrocell network,
rather than the detector itself.
A second aspect provides a method of detecting and identifying user equipment in a
wireless telecommunication network, the user equipment being operable to
communicate with network nodes provided in the wireless telecommunication network,
the method comprising the steps of:
detecting placement of the user equipment within a predetermined detection
region;
requesting an indication of identity from the user equipment detected in the
predetermined detection region; and
communicating the indication of identity to a user equipment identification
unit.
In one embodiment, the method further comprises the step of activating the
interrogation unit on detection of placement of the user equipment within the
predetermined detection region.
In one embodiment, the step of detecting further comprises the step of measuring a
change in a measurable quantity attributable to placement of the user equipment
within the predetermined detection region.
In one embodiment, the method further comprises the step of periodically repeating
the measurement.
In one embodiment the placement detection is performed by a proximity sensor
comprising a capacitive sensor. In one embodiment the proximity sensor comprises a
pressure sensor. In one embodiment the proximity sensor comprises an infra red beam
sensor.
In one embodiment the step of requesting an indication of identity is performed by an
interrogation unit the interrogation unit comprising an antenna, operable to
communicate with the user equipment within a predetermined coverage region.
In one embodiment the predetermined coverage region and the predetermined
detection region substantially correlate.
In one embodiment the method further comprises the steps of detecting ambient
radio conditions and adjusting power settings of a radio channel transmitted by the
antenna in accordance with detected ambient radio conditions.
In one embodiment method further comprises the steps of detecting ambient radio
conditions and selecting a transmission frequency or channel to be transmitted by the
antenna in accordance with detected ambient radio conditions.
In one embodiment the method further comprises the steps of detecting ambient
radio conditions and transmitting a jamming signal on one or more radio frequencies to
disrupt communication with user equipment on those frequencies.
In one embodiment the method further comprises the steps of determining the
strength of the jamming signal in accordance with detected ambient radio conditions.
In one embodiment the antenna comprises a directive antenna operable to provide
coverage within the predetermined coverage region and poor coverage outside the
region.
In one embodiment the antenna comprises a coil antenna. In one embodiment the
antenna comprises a patch antenna. In one embodiment the antenna comprises a
transmission line.
In one embodiment the indication of identity comprises user equipment IMSI.
In one embodiment the step of requesting a n indication of identity comprises initiation
of a user equipment camping procedure.
In one embodiment the method further comprises the step of terminating the initiated
camping procedure before completion of the camping procedure.
In one embodiment the method further comprises the step of communicating with a
wireless telecommunications network including said user equipment identification unit.
In one embodiment the step of communicating with a wireless telecommunications
network is performed using a wired backhaul connector operable to communicate
with a wireless telecommunications network including said user equipment
identification unit. In one embodiment a cellular transceiver backhaul is utilized.
A third aspect provides a computer program product operable, when executed on a
computer, to perform the method of the second aspect.
Further particular and preferred aspects of the present invention are set out in the
accompanying independent and dependent claims. Features of the dependent
claims may be combined with features of the independent claims as appropriate, and
in combinations other than those explicitly set out in the claims.
BRIEF DESCRIPTION OFTHE DRAWINGS
Embodiments of the present invention will now be described further, with reference to
the accompanying drawings in which:
Figure l a is a schematic side elevation of a detector according to one embodiment;
Figure b is a schematic front elevation of the detector shown in Figure 1a;
Figure 2 is a schematic representation of the main components of a detector
according to one embodiment
Figure 3a is a schematic illustration of a n antenna for use in one embodiment and a
schematic illustration of one embodiment of a detector including such an antenna;
Figure 3b is a schematic illustration of a n antenna for use in one embodiment a
schematic illustration of one embodiment of a detector including such a n antenna,
and a n indication of a possible antenna band of operation;
Figure 3c is a schematic illustration of a n antenna for use in one embodiment
Figure 4 is a schematic illustration of a n antenna for use in a further embodiment;
Figure 5 is a schematic illustration of a proximity sensor for use in one embodiment and
Figure 6 is a schematic illustration of a telecommunications network including a
detector according to one embodiment.
DETAILED DESCRIPTION OF EMBODIMENTS
Wireless telecommunication systems are known. In such systems, user equipment roam
through a wireless telecommunications network. Base stations are provided which
support areas of radio coverage. A number of such base stations are provided and are
distributed geographically in order to provide a wide area of coverage to user
equipment. When user equipment is within an area served by a base station,
communication may be established between the user equipment and base station
over associated radio links. A base station typically supports a number of sectors within
the geographical area of service.
It is possible, according to described embodiments, to enable user equipment to
interact with real world objects. Due to existing telecommunications networks,
provided most of the infrastructure to enable such interactions with real world objects
to occur is in place. Use of a user equipment, such as mobile phones, to access
interactions with real world objects, is particularly attractive since end users are familiar
and comfortable with their mobile telephones.
Examples of possible interactions with real world objects include, for example,
convenient payment via mobile phone. Payment can be performed by placing a
mobile phone or other similar user equipment on a payment area on a shop counter,
for example. Furthermore, after successful payment, a n SMS receipt of the transaction
may be sent to the user equipment.
Further examples of interactions with real world objects may include allowing user
equipment to download real world content by touching the content. For example, it
may be possible to download a train timetable directly to user equipment by touching
user equipment against a relevant ticket machine or timetable at a train station. The
download to the user equipment is triggered by placing the phone on the content; for
example, a ticket machine at a railway station. Alternatively, it may be possible to
send a link to the timetable via SMS message from where it can then be accessed by a
user.
Furthermore, user equipment may be used as a keyless entry system for houses, cars
and workplaces.
I† will be appreciated that the examples of interactions given above represent a few of
a large possible number of possibilities of local interactions between user equipment
and real world objects.
To reliably provide such services, it is required that the local interactions between user
equipment and real world objects are not triggered by the passing of user equipment
nearby and that only user equipment that wishes to download, or otherwise have
access to real world content, is arranged to receive information from the real world
object.
Embodiments described herein provide a reliable cellular short range sensor and
corresponding architecture that enables a detector to reliably detect a mobile and
which allows the co-existence of real world interactions with macro cellular networks
whilst reusing the same frequency resources. Such a n approach allows the existing
cellular network infrastructure to be complemented without significant disruption and
enables new services to be offered based upon local interactions between user
equipment and real world objects.
Embodiments provide a device to detect the close proximity of user equipment to an
object, then communicate with the user equipment using a short range user equipment
sensor.
In one embodiment, detector includes a proximity sensor component, for example a
capacitive sensor, operable to detect whether a potential target device, for example
user equipment, is placed against the proximity sensor. If the proximity sensor
component detects the presence of user equipment, it operates to activate a short
range user equipment sensor, for example, a radio frequency sensing part.
The user equipment (or "cellular") sensor operates to transmit a low power radio
frequency pilot signal substantially identical to the type of signal sent by a typical base
station provided in a wireless telecommunications network. The pilot signal transmitted
by the cellular sensor includes information which sets out a different location area code
to the macro cell in which the cellular sensor is located. When user equipment receives
the cellular sensor low power pilot signal it triggers a known "camping" procedure with
a location area update for user equipment in idle mode within range of the cellular
sensor. The signal strength of the low power pilot signal will typically depend upon the
location within the macro cell within which the cellular sensor is operating and, in
particular, whether it is reusing the same carrier frequency.
The typical range of both the proximity sensor and cellular sensor will substantially
overlap and it is particularly useful when the range of those sensors substantially
corresponds. The typical range extends a few centimetres in front of the front plate of
any such sensor. A directive antenna is preferably provided which can provide good
near field and poor far field performance, thereby disrupting other user equipment and
the wireless network more generally as little as possible.
Once user equipment is detected by the combined operation of the proximity sensor
and cellular sensor, the cellular sensor may operate, for example, using the camping
procedure, to request a unique identifier associated with the user equipment. That
unique identifier may typically comprise user equipment IMSI" or "TMSI". It will be
appreciated that other indicators may be used. However, use of IMSI or TMSI allows
standardised signalling messages to be reused by the cellular sensor of the detector.
To ensure only user equipment which intends to download or interact with the detector
communicates with the cellular sensor, the proximity sensor may perform periodic
measurements to detect user equipment mobility and thereby prevent any action for
user equipment which is not statically placed or substantially statically placed close to
the sensor. A possible alternative which does not rely on periodic measurements from
the proximity sensor would be to enable the cellular sensor to request a series of
channel condition estimates from connected user equipment, thereby detecting
whether the user equipment is static on the detector.
If placement of user equipment on the detector is sensed and a n identifier from user
equipment is received, that identifier may then be used by the real world device to
provide information to the user equipment. For example, the identifier may be
transmitted to a n application server by the detector using either a wireless or wireline
backhaul. The application server may be located either inside or outside of a n
operator's network. The application server may be operable to instruct or send
messages in response to reception of the unique identifier associated with user
equipment.
Upon receipt of the identifier, the application server obtains user equipment
information, for example phone number or account details, stored in a n operator's
network and can use that information to provide a service such as payment through a
phone bill or receipt via SMS, or enable the download of information to user equipment.
Embodiments enable user equipment to interact with real world content. The
approach is intended to work essentially seamlessly with existing user equipment and
does not require any registration or other set up for an end user. It is envisaged that as
a result of the short range and low power operation of a detector, it is able to reuse the
same carrier or carriers as existing cellular networks without causing significant
interference.
Figure a is a schematic side elevation of the detector according to one embodiment
and Figure l b is a schematic front elevation of the detector shown in Figure la. The
detector 1 shown in Figure 1 comprises a front plate 2 arranged to conceal a proximity
sensor 3 and antennae 4. The detector further comprises detector control logic. The
operation of detector control logic 5 is described in more detail in relation to Figure 2 .
Detector 1 is arranged to have an area of sensor (both proximity and cellular)
coverage 6 within which proximity sensor 3 and the cellular sensor antenna 4
associated with detector control logic 5 cover.
Figure 2 is a schematic representation of the main components of a detector
according to one embodiment. In particular, Figure 2 illustrates in more detail detector
control logic 5. Detector control logic 5 comprises a cellular sensor and mobile ID
requester 100 operable, in conjunction with sensing antenna 4a, to transmit pilot signals,
perform measurements for pilot power configuration, request a user equipment
identifier, for example IMSI, request channel estimates from user equipment and reject
a camping attempt. The cellular sensor 00 is operable to communicate with sensing
antenna 4a and with detector logic 200 which oversees the operation of the detector.
Detector control logic 5 further comprises a proximity sensing logic 110, for example a
capacitive sensor. The capacitive proximity sensing logic 110 communicates with
proximity sensor 3, in this case a sensing capacitor, and with detector logic 200. The
proximity sensor 3 and associated logic operates to detect whether a potential target
device, for example user equipment, is located within sensor coverage area 6.
In the embodiment shown, if a target device is determined by proximity sensing logic to
be located within area 6, detector logic 200 operates to activate the other sensor
functions. Such an arrangement allows the majority of the processing and transmission
of the detector 1 to be switched off for the majority of the time, thereby reducing
energy consumption. In addition, proximity sensor logic 1 0 is able to operate to report
periodic capacity measurements made by proximity sensor 3 and thereby determine,
in conjunction with detector logic 200, whether user equipment is properly placed on
detector 1.
Radio sensing logic 5 further comprises backhaul transceiver 120. In this case, the
backhaul transceiver is wireless, for example cellular, such as GSM, and is operable to
communicate with backhaul antenna 4 and detector logic 200 to wirelessly transfer the
user equipment identifier obtained by sensing antenna 4a in conjunction with cellular
sensing logic 100. That identifier is sent via backhaul antenna 4b to a standard wireless
network. The information may also be sent via a wired backhaul, for example,
ethernet. It is envisaged, that for most applications such a wired backhaul will not be
readily available. The user equipment identifier is sent via a standard wireless network
to an application server associated with detector .
Detector control logic 5 comprises detector logic 200 which is used to control the sensor
components and backhaul transmissions. In addition, detector logic 200 may be
programmed to perform certain actions in conjunction with an actuator output 130.
Detector control logic 5 is thus also operable to send messages or control an actuator
when specific user equipment is detected, and backhaul transceiver 120 receives a n
appropriate message from the wireless network. Actuator output 130 is operable to
react to measurements or reply to messages from the application server, for example,
to display a confirmation message, switch on a light or control the opening of doors.
Detector control logic 5 further comprises a power supply 300 which supplies detector
logic 200, the antennae 4a, 4b, capacitor 3 and units 100, 110, 120, 130 with necessary
power.
The operation of the detector within a network is described in more detail in relation to
Figure 6.
As mentioned previously, a sensing antenna 4a for use in a detector in accordance
with embodiments has to ensure operation such that it does not generate a strong far
field and which yields a low gain thereby to interact only with user equipment which is
located in close proximity of the antenna. In particular, the antenna ought to only be
operable within a predetermined sensor area 6 . That area may extend only a few
centimetres from the surface of plate 2. The best suited antennae for the sensing
antenna application are therefore of such a kind that they avoid the radiation or
generation of far fields, for example by choosing a sensible mode of operation.
I† is possible †o choose antenna and deliberately de-tune them, such that the radiation
and reception efficiency of the antennae is reduced and only user equipment in close
proximity are able to establish a connection with the detector 1. It will also be
appreciated that one solution would be to contain the radiation field within a confined
space, for example by use of appropriate shielding, thereby restricting the interaction
between user equipment and antennae to an area in close proximity of the detector.
Various antennae possibilities are described in more detail in relation to Figures 3a-c
and Figure 4.
Figure 3a is a schematic illustration of an antenna for use in one embodiment and a
schematic illustration of one embodiment of a detector including such an antenna.
The antenna 4a comprises a printed circuit coil antenna. Such antenna may also be
formed by coiling a wire. The printed circuit coil 400 comprises a coil antenna 401 and
a transceiver 402. Printed circuit coils are usually very lossy or can be designed to be
deliberately lossy, and thus their gain is inherently low. Printed circuit coils may be
operated off resonance, which may also act to reduce the gain and thus any possible
interaction with a macro layout of a wireless communication network.
As can be seen from Figure 3a, such antennae are typically flat and can easily be
integrated into a touch pad. Figure 3 includes a schematic illustration of some
components of one embodiment of a detector including such an antenna. The
detector 1 shown comprises a short range proximity sensor (not shown) a cellular sensor
comprising a coil antenna 400 and touch pad or screen 500. User equipment 1000 may
be easily placed on the flat surface of touch pad 500 such that the coil antenna 400
and proximity sensor can operate. A printed circuit coil antenna can also be placed
underneath the touch pad or other input device for further user commands, in a display
screen, or beneath a form of proximity sensor.
Figure 3b is a schematic illustration of an antenna for use in one embodiment and a
schematic illustration of one embodiment of a detector including such an antenna,
together with an indication of a possible antenna band of operation. Reference
numerals have been reused as appropriate. Figure 3b illustrates a patch antenna 400a.
Patch antenna 400a comprises a transceiver 402, a matched band metal plate
antenna 401 , and a filter to restrict band of operation 403.
Patch antennae are very flat and can therefore easily be integrated into a sensor,
Patch antennas are typically cheap but need to be de-tuned in order to restrict their
interaction with the environment, thereby minimising the volume within which user
equipment may be able to establish a link with that antenna.
A patch antenna for use as a short range cellular sensor is de-tuned as shown in the
graph of Figure 3b, showing a typical band of operation 600 which is deliberately
spaced from patch antenna matched band 700. De-tuning such an antenna reduces
its gain and enables communication between the detector and user equipment only in
the near field. It will be appreciated that such an effect could also be accomplished
by sufficiently reducing antenna output power or placing a n attenuator between the
transceiver 402 and antenna 401 .
An attenuator may also be used to de-sensitize the antenna, such that only user
equipment within closest proximity of the detector may establish a connection. The
mode depicted in Figure 3b has the advantage of avoiding a tuning influence of user
equipment placed on a detector, thereby ensuring operation with a wide variety of
devices. A filter such as that illustrated as 403 provided between the transceiver 402
and the antenna 401 ensures that blockers or interferers in the matched band do not
act to de-sensitize the receiver of the detector.
Furthermore, it will be appreciated that it is possible to use a patch antenna to detect
that user equipment is present on a detector and therefore that user equipment may
be trying to connect to the detector. Any frequency shift in the band of lower input
return loss may be used as a detecting mechanism. It will therefore be understood that
a patch antenna may itself be used as a proximity sensor.
Figure 3c is a schematic illustration of a n antenna for use in a further embodiment.
Figure 3c illustrates an antenna 400c, comprising a transmission line 401, a matched
load 405 and a transceiver 402. Transmission line 401 produces line-bound electric and
magnetic fields. Connecting transceiver 402 to a length of matched terminated
transmission line 401, does not result in the signal transmitted by the transceiver 402
being radiated by an antenna, but it does travel along the transmission line until it is
terminated in matched load 405. The field of the travelling wave is tightly bound to line
401 and does not radiate a significant amount of energy into the surrounding
environment. As a result, the field associated with the transmission line does not interact
with any user equipment which is not in very close proximity of that line.
If user equipment is brought close enough to transmission line 401, for example in the
order of millimetres or a few centimetres, then the field generated around the
transmission line couples to the user equipment. Since the wave is not radiated, but
remains line-bound, the fringing E- and H- fields are only present in very close proximity
to the transmission line 401. Thus, it is only possible to generate a significant interaction
between user equipment and a terminated transmission line if those two components
are very close. Any user equipment device which is placed further away will not be
able to couple to the transmission line and therefore will not be able to be sensed by
the cellular sensor. Use of a transmission line as shown in Figure 3c may avoid the need
for a separate proximity sensor in a detector, since a leaky transmission line provides the
functionality of both a proximity sensor and ability to couple on a radio frequency: only
user equipment that is placed upon the leaky transmission line will be recognised and
the likelihood that passers-by will accidentally couple to any services provided by the
detector is consequently low.
Figure 4 is a schematic illustration of an antenna for use in a further embodiment.
Sensor plate 550 includes an antenna (not shown), a transceiver 402, and shielding 560.
By placing shield 560 over sensor 550, it is possible to ensure that communication
between user equipment 1000 and the sensor 550 is only possible within the shield. The
field generated by the antenna is concentrated in an area 570 within the shield. The
shield 560 acts to attenuate the field of the antenna outside the shield, such that
interaction of the detector with the macro cell environment is reduced.
Figure 5 is a schematic illustration of a proximity sensor for use in one embodiment. The
proximity sensor 3 shown in Figure 5 comprises a capacitance sensor. The proximity
sensor shown in Figure 5 comprises capacitance plates 610 and an inductor 620
mounted on a plate 630. Figure 5 includes a schematic circuit diagram illustrating the
component parts of the proximity sensor.
Between capacitor plates 610 an E- field 650 is generated. If user equipment 1000 is
placed within the E- field it acts to change the resonance frequency of the capacitor
and therefore also the proximity of the detector. Such a detector may also be used to
act as a n antenna for communication between the sensor and user equipment.
Although the capacitor plates 610 are shown vertically, it will be appreciated that they
may be arranged horizontally so that they do not project significantly from a front plate
630 of a proximity sensor 3.
Figure 6 is a schematic illustration of a telecommunications network including a
detector according to one embodiment. Initial configuration processes will be
described, followed by a description of the manner in which a detector may operate
within a telecommunication network.
Installation of a detector as shown in Figure 1 within a network requires configuration of
that detector. Initial configuration typically comprises two stages. Some operational
parameters. Those parameters are specific for each network operator within which the
detector is to operate. That provisioning of information can be performed remotely via
a cellular backhaul connection provided in the detector. Such a backhaul link is
indicated as transceiver 120 in Figure 2. Alternatively, it will be appreciated that the
operational parameters may be programmed into the detector control logic 5 of a
detector during the manufacturing process in the case where a large number of
detectors are produced for a single operator.
The second stage of configuration is to make operation and integration of a detector
within a network as simple as possible. Thus the remaining parameters required for a
detector to operate are auto-configured based on measurements made at and by the
detector.
Provisioned information (information that can be programmed or is sent to a detector
by a backhaul transceiver 120) can include, for example, information relating to the
carrier frequencies to use for cellular sensing and those carrier frequencies used by the
operator network, information relating to which network to use for backhaul, and an
address of an application server which hosts the application of interest.
Remaining parameters including detecting the location area code of the macro cell
network and allocating a new location area code to the detector to trigger location
area updates in user equipment 1000 can be auto-configured. Furthermore, pilot
power of the detector may be automatically configured to match target coverage.
Pilot power can be calculated based on, for example, the free space path of the
measured macro cell pilot power on a carrier used for sensing, antenna gain, and a
camping hysteresis threshold.
Detectors according to embodiments operate using user equipment camping
attempts. In one embodiment, a detector includes a capacitive proximity sensor such
as that shown in Figure 5 . If capacitive proximity sensor 3 detects that a potential
target user equipment is placed against the detector, it activates the cellular sensing
part of the detector, shown schematically in Figure 2 as cellular sensor 100, controlled
by detector control logic 5.
Control logic 5 then instructs cellular sensor 100 to transmit a cellular pilot signal having
a different location area code to that of the macro cell within which the detector is
placed. Transmission of a cellular pilot signal with a different location area code to the
macro cell triggers a location update for user equipment in idle mode, thereby allowing
the detector to fully detect and identify them. Once user equipment 1000 placed on
the detector initiates a camping procedure, it is requested by the detector to send its
International Mobile Subscriber Identifier (IMSI) by cellular sensor 100. The IMSI is a
unique identifier assigned to each user equipment, which is used to route any call (user
equipment generated or user equipment originated) via a traditional route within a
wireless communication network. Once detector 1 has obtained user equipment IMSI,
the detector can uniquely identify detected user equipment.
Alternatively, a detector could request other temporary identifiers and, in collaboration
with the core network and backhaul transceiver 120, identify the mobile uniquely.
Once the IMSI identifier is known, user equipment can be authenticated using the same
security mechanisms a s employed for standard authenticated user equipment
operation. The SIM secure storage device already provided in user equipment and the
SIM's established security relationship with a n operator's network may therefore be
used by the detector. It will be understood that this sequence of events must not result
in user equipment 1000 fully updating its location area, since it cannot be fully
functionally served by detector 1. Once an IMSI for user equipment has been
obtained, the camping procedure is terminated by detector 1.
To prevent unwanted detection of user equipment, for example user equipment which
is simply passing a detector, the capacitive sensor 3 may be configured such that it
performs multiple measurements over time to determine whether user equipment is
properly placed on detector 1 and therefore is not moving. If there is no change in
capacity due to the placement of user equipment for a predefined time, the detector
can be relatively sure that the user equipment is placed properly on the sensor for that
time period.
Alternatively, if cellular sensor 100 is operational, the user equipment with which it has
established a connection can be requested to report periodic channel estimates for
the channel to the sensor. If user equipment is placed properly on the detector, the
channel conditions ought to remain largely constant over a predetermined time
interval and the path loss will remain sufficiently low.
If a n operator uses multiple carriers, or air interfaces such as GSM and UMTS, different
approaches may be possible to ensure that all mobile phones are captured. If multiple
carriers or air interfaces are in use, the detector may be operable to transmit pilots and
perform the detection process on all of those pilots. Alternatively, the detector may be
operable to send a jamming signal which causes user equipment to contact the sensor
on a preferred carrier transmitting a pilot signal. The power of the jamming signals is
calculated in the same manner as the pilot signal to ensure that coverage is disabled
only a few centimetres around the detector.
Figure 6 shows a n example of network architecture for use with a detector in
accordance with one embodiment. User equipment 1000 is sensed by the detector 1
and its identity is retrieved and relayed to the network via backhaul transceiver 120. In
some applications it may be helpful to include some SMARTS in the sensor device itself,
for example to reduce latency when opening a door the identity of permitted user
equipment keys may be stored within a n application server that forms part of the
detector itself. That store may be updated by the network when a change to
permissions occurs. It will be understood that in such a case, instead of contacting a
macrocell wireless network each time, the detector 1 locally looks up its set of securely
sourced door keys and unlocks the door if a valid key is present.
In most cases it is anticipated that the detector 1 will connect to the network via a n
existing cellular network, for example, the nearest macro base station 1010, which acts
as a network access point. It will be appreciated that it is possible to use DSL or any
other method to get a n IP connection to the network.
The user equipment ID SI) obtained from user equipment 1000 is passed through
operator network 1020 using standard communication protocols, for example Internet
protocol, to a n application server 1030. User equipment ID is used to perform a look-up
request in the operator network 1020 subscription information databases, for example,
to match the user equipment ID against a customer record which may include
information regarding the age, payment plan, home address and similar details of the
end user. An operator's knowledge of a particular customer may be spread across
different databases, for example across billing and customer preference databases.
However, it will be appreciated that all feeds can be cross-referenced to construct a
deeper picture of a customer and hence produce customer targeted applications.
The operator information provided by operator network 1020 may be processed by a
vertical application 1030 in the context of other feeds that exist inside a hosted vertical
application server. For example, that server may include historical logs of events and
databases storing sensor and actuator characteristics such as the capabilities of the
detector and actuator. It will be appreciated that further information from third parties
key to application provision may be also pulled in to application server 1030. That
further information may be pulled in to application server 1030 by connection to an
Internet-hosted web service indicated generally as 1 40 in Figure 6 . A SMART link may
be completed when the vertical application server 1030 produces a n output 1050
which is fed back to the detector platform 1 and results in some action, for example
confirming payment, opening a door, providing services. In other cases there may be
no feedback to the detector platform, and the application server 1030 mat directly
feed back using network services to identified user equipment 1000.
A person of skill in the art would readily recognize that steps of various above-described
methods can be performed by programmed computers. Herein, some embodiments
are also intended to cover program storage devices, e.g., digital data storage media,
which are machine or computer readable and encode machine-executable or
computer-executable programs of instructions, wherein said instructions perform some
or all of the steps of said above-described methods. The program storage devices may
be, e.g., digital memories, magnetic storage media such as a magnetic disks and
magnetic tapes, hard drives, or optically readable digital data storage media. The
embodiments are also intended to cover computers programmed to perform said
steps of the above-described methods.
The functions of the various elements shown in the Figures, including any functional
blocks labelled as "processors" or "logic", may be provided through the use of
dedicated hardware as well as hardware capable of executing software in association
with appropriate software. When provided by a processor, the functions may be
provided by a single dedicated processor, by a single shared processor, or by a
plurality of individual processors, some of which may be shared. Moreover, explicit use
of the term "processor" or "controller" or "logic" should not be construed to refer
exclusively to hardware capable of executing software, and may implicitly include,
without limitation, digital signal processor (DSP) hardware, network processor,
application specific integrated circuit (ASIC), field programmable gate array (FPGA),
read only memory (ROM) for storing software, random access memory (RAM), and non
volatile storage. Other hardware, conventional and/or custom, may also be included.
Similarly, any switches shown in the Figures are conceptual only. Their function may be
carried out through the operation of program logic, through dedicated logic, through
the interaction of program control and dedicated logic, or even manually, the
particular technique being selectable by the implementer as more specifically
understood from the context.
It should be appreciated by those skilled in the art that any block diagrams herein
represent conceptual views of illustrative circuitry embodying the principles of the
invention. Similarly, it will be appreciated that any flow charts, flow diagrams, state
transition diagrams, pseudo code, and the like represent various processes which may
be substantially represented in computer readable medium and so executed by a
computer or processor, whether or not such computer or processor is explicitly shown.
The description and drawings merely illustrate the principles of the invention. It will thus
be appreciated that those skilled in the art will be able to devise various arrangements
that, although not explicitly described or shown herein, embody the principles of the
invention and are included within its spirit and scope. Furthermore, all examples recited
herein are principally intended expressly to be only for pedagogical purposes to aid the
reader in understanding the principles of the invention and the concepts contributed
by the inven†or(s) to furthering the art, and are to be construed as being without
limitation to such specifically recited examples and conditions. Moreover, all statements
herein reciting principles, aspects, and embodiments of the invention, as well as
specific examples thereof, are intended to encompass equivalents thereof.
CLAIMS
. A user equipment identification detector for use in a wireless
telecommunication network, said user equipment being operable to communicate
with network nodes provided in said wireless telecommunication network,
said detector comprising:
a proximity sensor, operable to detect placement of said user equipment within
a predetermined detection region;
an interrogation unit, operable to request an indication of identity from said user
equipment detected in said predetermined detection region and communicate said
indication of identity to a user equipment identification unit.
2 . A detector according to claim 1, wherein said proximity sensor is operable to
activate said interrogation unit on detection of placement of said user equipment
within said predetermined detection region.
3. A detector according to claim 1or claim 2, wherein said proximity sensor is
operable to measure a change in a measurable quantity attributable to placement of
said user equipment within said predetermined detection region.
4. A detector according to claim 3, wherein said proximity sensor is operable to
periodically repeat said measurement.
5. A detector according to any preceding claim wherein said proximity sensor
comprises a capacitive sensor.
6. A detector according to any preceding claim, wherein said interrogation unit
comprises an antenna, operable to communicate with said user equipment within a
predetermined coverage region.
7 . A detector according to claim 6, wherein said predetermined coverage region
and said predetermined detection region substantially correlate.
8. A detector according to claim 6 or claim 7, wherein said antenna comprises a
directive antenna operable to provide coverage within said predetermined coverage
region and poor coverage outside said region.
9 . A detector according to any one of claims 6 to 8, wherein said antenna
comprises one of: a coil antenna, a patch antenna, a transmission line.
10. A detector according to any preceding claim, wherein said indication of
identity comprises said user equipment IMSI.
11. A detector according to any preceding claim, wherein said interrogation unit is
operable to trigger a user equipment camping procedure.
12. A detector according to claim 11, wherein said interrogation unit is operable to
terminate said initiated camping procedure before completion of said camping
procedure.
3. A detector according to any preceding claim, wherein said interrogation unit
further comprises a cellular transceiver, operable to communicate with a wireless
telecommunications network including said user equipment identification unit.
14. A method of detecting and identifying user equipment in a wireless
telecommunication network, said user equipment being operable to communicate
with network nodes provided in said wireless telecommunication network,
said method comprising the steps of:
detecting placement of said user equipment within a predetermined detection
region;
requesting an indication of identity from said user equipment detected in said
predetermined detection region; and
communicating said indication of identity to a user equipment identification
unit.
15. A computer program product operable, when executed on a computer, to
perform the method of claim 14 .
| # | Name | Date |
|---|---|---|
| 1 | 10920-CHENP-2012 POWER OF ATTORNEY 31-12-2012.pdf | 2012-12-31 |
| 2 | 10920-CHENP-2012 FORM-5 31-12-2012.pdf | 2012-12-31 |
| 3 | 10920-CHENP-2012 FORM-3 31-12-2012.pdf | 2012-12-31 |
| 4 | 10920-CHENP-2012 FORM-2 FIRST PAGE 31-12-2012.pdf | 2012-12-31 |
| 5 | 10920-CHENP-2012 FORM-18 31-12-2012.pdf | 2012-12-31 |
| 6 | 10920-CHENP-2012 FORM-1 31-12-2012.pdf | 2012-12-31 |
| 7 | 10920-CHENP-2012 DRAWINGS 31-12-2012.pdf | 2012-12-31 |
| 8 | 10920-CHENP-2012 DESCRIPTION (COMPLETE) 31-12-2012.pdf | 2012-12-31 |
| 9 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 31-12-2012.pdf | 2012-12-31 |
| 10 | 10920-CHENP-2012 CLAIMS SIGNATURE LAST PAGE 31-12-2012.pdf | 2012-12-31 |
| 11 | 10920-CHENP-2012 CLAIMS 31-12-2012.pdf | 2012-12-31 |
| 12 | 10920-CHENP-2012.pdf | 2013-01-01 |
| 13 | 10920-CHENP-2012 FORM-3 11-06-2013.pdf | 2013-06-11 |
| 14 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 11-06-2013.pdf | 2013-06-11 |
| 15 | 10920-CHENP-2012 FORM-3 19-06-2013.pdf | 2013-06-19 |
| 16 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 19-06-2013.pdf | 2013-06-19 |
| 17 | 10920-CHENP-2012 FORM-3 21-10-2013.pdf | 2013-10-21 |
| 18 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 21-10-2013.pdf | 2013-10-21 |
| 19 | 10920-CHENP-2012 FORM-3 07-02-2014.pdf | 2014-02-07 |
| 20 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 07-02-2014.pdf | 2014-02-07 |
| 21 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 20-10-2014.pdf | 2014-10-20 |
| 22 | 10920-CHENP-2012 FORM-3 20-10-2014.pdf | 2014-10-20 |
| 23 | 10920-CHENP-2012 CORRESPONDENCE OTHERS 15-06-2015.pdf | 2015-06-15 |
| 24 | 10920-CHENP-2012 FORM-3 15-06-2015.pdf | 2015-06-15 |
| 25 | 10920-CHENP-2012-FER.pdf | 2018-02-01 |
| 26 | 10920-CHENP-2012-AbandonedLetter.pdf | 2018-08-28 |
| 1 | SearchStrategy_29-12-2017.pdf |