[go: up one dir, main page]

WO2004089004A1 - Procede de protection d'informations relatives a la localisation dans un service de localisation - Google Patents

Procede de protection d'informations relatives a la localisation dans un service de localisation Download PDF

Info

Publication number
WO2004089004A1
WO2004089004A1 PCT/CN2004/000297 CN2004000297W WO2004089004A1 WO 2004089004 A1 WO2004089004 A1 WO 2004089004A1 CN 2004000297 W CN2004000297 W CN 2004000297W WO 2004089004 A1 WO2004089004 A1 WO 2004089004A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
service
information request
location information
location
Prior art date
Application number
PCT/CN2004/000297
Other languages
English (en)
Chinese (zh)
Inventor
Xiaoqin Duan
Jie Wang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2004089004A1 publication Critical patent/WO2004089004A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present invention relates to the positioning technology of network equipment, and particularly to a method for protecting location information requests in a location service. '' Background of the invention
  • the location service (LCS, Location Service) of a mobile communication network is to obtain location information of a target user equipment (UE) through positioning technology.
  • the target UE refers to a UE terminal located in the mobile communication network.
  • the location information may be geographic latitude and longitude information or current location information. Location information of the street.
  • the location information obtained by the LCS system can be provided to the target UE for its own positioning; it can also be provided to other client applications, such as institutions and individuals, that request the location information of the target UE for value-added services. Therefore, location services have a wide range of functions in emergency rescue, vehicle navigation and intelligent transportation systems, work scheduling and team management, mobile yellow page query, and enhanced network performance.
  • 3GPP 3rd Generation Partnership Project
  • the location information request initiated by the requester to the target UE is divided into two types: immediate location information request and delayed location information request.
  • Immediate location information request means that the LCS system immediately locates the target UE after receiving the location information request from the requesting end to the target UE, and then immediately sends the positioning result to the requesting end, that is, the LCS system receives the location information sent by the requesting end. After the request, the current location information of the target UE is provided to the requesting end immediately.
  • Delayed location information request refers to the requesting end requesting the LCS system to provide the location information of the target UE to it at a future point in time or when a certain event occurs. That is, after the LCS system receives the location information request from the requesting end to the target UE, it needs to go through A delay After the delay event is triggered, the requester is provided with the current location information of the target UE.
  • 3GPP allows the requester to request the LCS system to provide it with the location information of the target UE periodically, that is, the requester defines the start time point and the end time point and a certain periodic logic, and requires the LCS system to follow the periodic logic to the It provides location information of the target UE.
  • the above-mentioned location information request may be referred to as a periodic location information request.
  • the periodic location information request is one of the delayed location information requests, so the periodic location information request can be classified into the delayed location information request type.
  • Figure 1 is a schematic diagram of the logical structure of the LCS network.
  • the requesting end 101 requests the location information of the target UE 103 through the LCS system 102.
  • the LCS system 102 performs legality authentication on the requesting end 101 and checks whether the target UE 103 allows the The requester 101 initiates a request for location information on it. If the requester 101 passes the legality authentication of the LCS system 102, the LCS system 102 provides the location information of the target UE 103 to it; otherwise, the LCS system 102 rejects the requester 101 to the target UE 103. Initiated location request.
  • the location information belongs to the privacy information of the target UE, the location information of the target UE should be strictly protected. Since the location service belongs to a service subscribed by the target UE, at some times, it may be necessary to request the LCS system to close the location service to the requesting end for the purpose of protecting its private information, that is, to deactivate the location service; In addition, when the target UE roams out of the home service area, the positioning cost may increase due to roaming. Due to the consideration of charges, the target UE may also need to request the LCS system to close the location service to the requesting end.
  • the LCS system When the LCS system deactivates the location service of the target UE, it will interrupt the processing of all currently active location information requests, and in the subsequent process, all location information requests initiated by the target UE to the target UE will be It was rejected by the LCS system. In this way, for some non-value-added service location information requests, such as the legal tracking of local security agencies, and the location information requests initiated by network operators for maintenance operations, will be disturbed, affecting the completion of normal tasks.
  • non-value-added service location information requests such as the legal tracking of local security agencies, and the location information requests initiated by network operators for maintenance operations
  • the purpose of the present invention is to provide a method for protecting a location information request in a location service, and to specifically protect a location information request with a special application and purpose that exceeds the control range of a target UE user, and to ensure such type of location information.
  • the request is executed without interference from the user operation of the target UE.
  • the present invention provides a method for protecting a location information request in a location service.
  • the method includes the following steps:
  • the target sends a location service operation request to the LCS system, and the location service operation request carries a target UE identifier
  • the LCS 'system determines whether the location information request for the target UE belongs to the set operation invalid service scope. If it does not, perform step C, otherwise, the current location information request operation protection process is ended;
  • the LCS system performs the location service operation requested by the target UE in step A on the location information request.
  • the step B includes the following steps:
  • step B12 determines whether there is currently a location information request initiated by the target UE according to the target UE identification carried in the location service operation request. If so, step B12 is performed; otherwise, the current location information request operation protection process is ended;
  • the LCS system judges whether the location information request initiated by the target UE belongs to the set operation invalid service scope, and if it belongs, execute step B13; otherwise, execute step C;
  • the LCS system determines whether to perform the location service operation requested by the target UE for the location information request that belongs to the service invalid service range. If so, execute step C; otherwise, end the current location information request operation protection process.
  • the operation invalid service range described in step B is set in the LCS system in advance.
  • the service invalid service range described in step B is carried in the location service operation request when the target UE initiates the location service operation.
  • the location service operation request is a location service deactivation operation request
  • the step A is: the target UE sends a location service deactivation operation request to the LCS system, and the location service deactivation operation request carries a target UE identifier;
  • the step B is: the LCS system judges whether the active location information request to the target UE belongs to the set operation invalid service range; if it does not belong to step C, otherwise, the location service of the target UE is set to invalid To end the current location information request operation protection process;
  • the step C is: the LCS system performs an invalidation operation on the active position information request to the target UE, and sets the position service of the target UE as invalid.
  • the step B includes the following steps:
  • the LCS system searches whether there is currently an active position information request initiated by the target UE, and if so, performs step B22; otherwise, ends the current position information request operation protection process;
  • the LCS system judges whether the active position information request to the target UE belongs to the set operation invalid service scope. If it belongs, go to step B23; otherwise, go to step C;
  • the LCS system determines whether to perform invalidation operation on the location information request that belongs to the operation invalid service range. If so, perform step C; otherwise, set the location service of the target UE to invalid, and end the current location information request operation protection process.
  • the method further includes: the LCS system receives the location information request initiated by the target UE, and determines whether to process the location information request according to the set operation invalid service range, if it is , For the location information please Request processing, otherwise, refuse to process the location information request.
  • the LCS system described in step C further includes: The LCS system returns a positioning failure response to the requesting end corresponding to the position information request that has performed the invalidation operation.
  • the location service operation request is a location service query operation request
  • the step A is: the target UE sends a location service query operation request to the LCS system, and the location service query operation request carries a target UE identifier;
  • the step B is: the LCS system judges whether the location information request to the target UE that meets the query operation requirements belongs to the set operation invalid service scope; if it does not, step C is performed, otherwise, the current location information request operation protection process is ended ;
  • the step C is: The LCS system performs a query operation on the location information request, and returns a query operation result to the target UE.
  • the step B includes the following steps:
  • the LCS system searches whether there is an active position information request initiated by the target UE, and if so, executes step B32; otherwise, ends the current position information request operation protection process;
  • the LCS system judges whether the location information request belongs to a set operation invalid service scope, and if it belongs, execute step B33; otherwise, execute step C;
  • the LCS system judges whether to perform a query operation on a location information request that belongs to an operation invalid service range. If so, execute step C; otherwise, end the current location information request operation protection process.
  • the location information request can be processed correspondingly for different types of location information request types, and some special features beyond the control range of the target UE user are protected.
  • Application and destination location information requests to ensure that the execution of such location information requests is uninterrupted and enhance their security Fullness.
  • Figure 1 is a schematic diagram of the logical structure of the LCS network
  • FIG. 2 is a flowchart of the operation of the LCS system to protect the position information in the present invention
  • FIG. 3 is a flowchart of the LCS system to perform the deactivation protection of the position information in the deactivation operation in the present invention.
  • FIG. 2 is a flowchart of seeking protection of position information by the LCS system according to the present invention. As shown in FIG. 2, the implementation process of obtaining protection of position information by the LCS system includes the following steps:
  • Steps 201 to 202 The target UE sends a location service operation request to the LCS system, and the location service operation request carries the target UE identity. After receiving the location service operation request, the LCS system searches for a location information request initiated by the target UE that meets the request operation requirements of the target UE according to the target UE identity. If it is found, step 203 is performed; otherwise, the LCS system ends the location information request. Operation protection process. Meeting the request operation requirements of the target UE refers to a preset operating condition, for example, deactivating a location information request in a certain area and querying a certain type of location information request.
  • Step 203 The LCS system judges whether the currently searched location information request for the target UE that meets the location service operation requirements of the target UE belongs to the operation invalid service range. If so, step 204 is performed; otherwise, step 205 is performed.
  • the operation invalid service range may be preset by a network operator or a target UE user in a location service system (LCS system), or may be carried when the target UE initiates a location service operation request for planning It is divided into whether the location service scope of the currently initiated location service operation request can be directly executed.
  • the operational invalid service scope can be divided according to different types of location information requests. For example, it can be divided into value-added service scope, operator operation and maintenance service scope, emergency service scope, and legal tracking service scope according to the application and purpose of the location information request.
  • the location information request that belongs to the value-added service range directly executes the currently initiated location service operation request, and the location information request that belongs to the non-value-added service range needs to be determined according to specific circumstances. Whether to perform the currently initiated location service operation request.
  • Step 204 The LCS system determines whether to perform the location service operation requested by the target UE for the location information request. If yes, execute step 205; otherwise, end the operation protection process for the location information requested by the LCS system.
  • Step 205 The LCS system performs the location service operation requested by the target UE for the location information request.
  • the LCS system processing the location service deactivation operation request initiated by the target UE, when the current location information request initiated by the target UE is invalidated, for some non-value-added service type location information requests, for example, local security Institutional legal tracking, location information requests initiated by network operators for maintenance operations, because these types of location information requests are beyond the control of the target UE user, there is no need to deactivate the location service initiated by the target UE user Failure, the LCS system needs to protect such location information requests.
  • some non-value-added service type location information requests for example, local security Institutional legal tracking
  • location information requests initiated by network operators for maintenance operations because these types of location information requests are beyond the control of the target UE user, there is no need to deactivate the location service initiated by the target UE user Failure, the LCS system needs to protect such location information requests.
  • FIG. 3 is a flowchart of performing a deactivation protection on a location information request within a service area where the deactivation operation is invalid during the deactivation operation performed by the LCS system in the present invention.
  • the implementation process of requesting deactivation protection for location information in the service scope includes the following steps:
  • Steps 301 to 302 The target UE sends a location service deactivation operation request to the LCS system, and the location service deactivation operation request carries the target UE identifier.
  • LCS system After requesting the location service deactivation operation, search for an active location information request currently initiated by the target UE according to the target UE identity, and if found, go to step 303; otherwise, go to step 307.
  • Step 303 The LCS system judges whether the searched location information request currently initiated by the target UE in the active state belongs to the invalid service range of the deactivation operation, and if it belongs to step 304, otherwise, step 305 is performed.
  • Step 304 The LCS system determines whether the location information request is invalid, and if so, performs step 305; otherwise, the LCS system normally processes the location information request, such as authenticating the requesting end, locating the target UE, and returning the target UE. The positioning result and so on, and then step 307 is performed.
  • Step 305 The LCS system fails the location information request, and the LCS system terminates the processing of the failed location information request.
  • Step 306 The LCS system sends a positioning failure response to the corresponding requester that has failed its location information request.
  • the positioning failure response may carry a parameter, which indicates that the target UE has terminated the processing of the location information request initiated by the requester by the LCS system. .
  • This step may be omitted, that is, the LCS system may not return any message to the corresponding requesting end.
  • Step 307 The LCS system sets the location service of the target UE to be invalid, that is, deactivates the location service of the target UE.
  • the LCS system determines whether the location service of the target UE is successfully set to be invalid. If yes, go to step 308; otherwise, go to step 309.
  • Step 308 The LCS system returns a successful response to the location service deactivation operation to the target UE, notifies the target UE that the location service deactivation operation it initiated has been successfully performed, and ends the location service deactivation operation.
  • Step 309 The LCS system returns a location service deactivation operation failure response to the target UE.
  • the location service deactivation operation failure response carries a corresponding failure reason value, and notifies the target UE that the location service deactivation operation initiated by it fails to execute.
  • Step 308 or step 309 may be omitted, that is, the LCS system may not return any message to the target UE. If step 308 or step 309 is omitted, the step of the LCS system in step 307 to determine whether the location service of the target UE is successfully set to be invalid may also be omitted. .
  • the LCS system receives a subsequent location information request to the target UE, and judges whether the location information request belongs to the deactivation operation invalid service scope. If the location information request belongs to the deactivation operation invalid service scope, the LCS system Continue to determine whether to reject the location information request. If so, the LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location information of the target UE; otherwise, the LCS system normally processes the location information request, for example, to the Qianqiu terminal. Perform authentication, locate the target UE, return the positioning result of the target UE, etc .; if the location information request does not belong to the invalid service scope of the deactivation operation,
  • the LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location station of the target UE
  • a security agency In a mobile communication network, a security agency is using the LCS system to initiate a periodic location information request for a target UE, dynamically track the target UE, and periodically obtain the location information of the target UE.
  • an entertainment website initiates a delayed location information request to the target UE, hoping that when the target UE enters a certain area, such as within a large shopping mall, it will immediately obtain its location information.
  • the operator pre-sets the invalid service scope of the deactivation operation of the target UE user as: the operator's operation and maintenance service scope, emergency service scope, and legal tracking service scope, that is, the deactivation operation of the target UE should not be applied to the operator's operation Location information requests for maintenance services, emergency services, and legal tracking services.
  • the LCS system may allow the target UE to use the short message service (SMS) as a message bearer to perform information interaction with the LCS system, that is, the target UE may send a location service operation request to the LCS system through the SMS.
  • SMS short message service
  • the target UE needs an invalid location service
  • a short message with a specific meaning can be edited and sent to the specified address, for example, the target UE edits the short message LCS + off and sends it to 9999, indicating that the LCS system is requested to locate the target UE.
  • Set services for deactivation At this time, the LCS system can authenticate the target UE and determine whether the target UE has permission to request the LCS system to perform the location service deactivation operation.
  • the LCS system accepts the location service deactivation operation request initiated by the target UE. , Performing a deactivation operation on the location service of the target UE; otherwise, the LCS system rejects the location service deactivation operation request initiated by the target UE.
  • the LCS system authenticates the target UE to require the target UE to provide a location service deactivation operation password. If the location service provided by the target UE deactivates the operation password, the location service deactivation operation password corresponding to the target UE is stored in the LCS system.
  • the target UE passes authentication, and the LCS system accepts the location service deactivation operation request initiated by the target UE, and deactivates the location service of the target UE; otherwise, the LCS system rejects the location service deactivation operation request initiated by the target UE. .
  • the LCS system After the target UE passes the authentication, the LCS system searches for the active position information request currently initiated on the target UE. If it finds the active position information request currently initiated on the target UE, the LCS system continues to judge the searched current position information request. Whether the active location information request initiated by the target UE belongs to the deactivation operation invalid service scope, that is, determines whether the currently activated location information request belongs to the operator's operation and maintenance service scope, or belongs to the emergency service scope, or belongs to Legal tracking business scope. At this time, the periodic location information request initiated by a previous security agency belongs to the legal tracking business scope, that is, within the invalid business scope of the deactivation operation, and the delayed location information initiated by an entertainment website. The request belongs to the scope of value-added services, and does not belong to the scope of invalid business of deactivation operations.
  • the LCS system judges whether the processing method preset by the network operator for the location information request that belongs to the invalid business scope of the deactivation operation is allowed by the deactivation operation. If so, the LCS system terminates the periodic location information request and the entertainment website initiated by the security agency.
  • the positioning failure response carries a parameter, which indicates that the target UE terminated the LCS system to send it
  • the LCS system invalidates the location service of the target UE; otherwise, the LCS system only suspends the processing of the location information request that does not belong to the invalid service scope of the deactivation operation, that is, it only suspends the initiation of the entertainment website
  • the processing of the delayed location information request does not stop the processing of the periodic location information request initiated by the security agency, and then the LCS system sends a positioning failure response to the corresponding requester that suspended the processing of the location information request, such as the entertainment website.
  • the LCS system will The location service of the target UE is disabled.
  • the LCS system receives the location information request from the target UE, and first determines whether the location information request belongs to the invalid service range of the deactivation operation. If the location information request belongs to the deactivation service, Invalid service scope, the LCS system continues to determine whether the processing method preset by the network operator for the location information request belonging to the invalid service scope of the deactivation operation is allowed for the deactivation operation. If so, the LCS system returns a positioning failure to the corresponding requester.
  • the LCS system In response, it refuses to provide the location information of the target UE; otherwise, the LCS system normally processes the location information request, such as authenticating the requesting end, locating the target UE, and returning the positioning result of the target UE; if the location information request is not It belongs to the service invalid operation range. The LCS system returns a positioning failure response to the corresponding requester, and refuses to provide the location information of the target UE.
  • the method proposed by the present invention is also applicable to other operations, such as a location information request query operation, a location information request cancel operation, and the like.
  • a location information request query operation such as a location information request query operation, a location information request cancel operation, and the like.
  • the location information request protection method proposed in the present invention can be used to correspondingly protect them.
  • the protection process is basically the same as the above process, so it is no longer To repeat.
  • an effective service range of operations may also be set, and the implementation process is the same as the above process, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé de protection d'informations relatives à la localisation dans un service de localisation. L'objet UE envoie une demande de d'opération de service de localisation au système LCS, la demande d'opération de service de localisation porte l'identité de l'objet UE. En fonction de la gamme de services de fonctionnement inefficace testée, le système détermine si la demande de service de localisation à l'objet UE fait partie de cette gamme de services inefficace et, si ce n'est pas le cas, le système LCS de service de localisation exécute l'opération de service de localisation de l'objet UE, sinon il conclut le flux de protection d'opération de cette demande d'informations. Selon le procédé de cette invention, lorsque le système de localisation de service exécute la demande de service de localisation requise par l'objet UE, il peut se fonder sur les différents types de demande d'information, exécuter les opérations pertinentes pour cette demande, s'assurer que cette demande qui possède une application et un objet spécifique allant au delà de la portée de commande de l'objet UE évite le brouillage et accroît la sécurité.
PCT/CN2004/000297 2003-04-02 2004-03-31 Procede de protection d'informations relatives a la localisation dans un service de localisation WO2004089004A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN03121591.2 2003-04-02
CNA031215912A CN1535040A (zh) 2003-04-02 2003-04-02 位置业务中保护位置信息请求的方法

Publications (1)

Publication Number Publication Date
WO2004089004A1 true WO2004089004A1 (fr) 2004-10-14

Family

ID=33102898

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2004/000297 WO2004089004A1 (fr) 2003-04-02 2004-03-31 Procede de protection d'informations relatives a la localisation dans un service de localisation

Country Status (2)

Country Link
CN (1) CN1535040A (fr)
WO (1) WO2004089004A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478741B (zh) * 2009-02-04 2011-01-19 中兴通讯股份有限公司 提供定位业务的方法及系统
US12058587B2 (en) 2021-12-03 2024-08-06 International Business Machines Corporation Initiating communication on mobile device responsive to event

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256848A (zh) * 1997-05-16 2000-06-14 艾利森电话股份有限公司 电信系统中的完整性保护
CN1297667A (zh) * 1998-04-20 2001-05-30 艾利森公司 利用定位服务越权关键字的系统和方法
WO2003001818A2 (fr) * 2001-06-21 2003-01-03 Vodafone Group Plc Systemes de telecommunication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256848A (zh) * 1997-05-16 2000-06-14 艾利森电话股份有限公司 电信系统中的完整性保护
CN1297667A (zh) * 1998-04-20 2001-05-30 艾利森公司 利用定位服务越权关键字的系统和方法
WO2003001818A2 (fr) * 2001-06-21 2003-01-03 Vodafone Group Plc Systemes de telecommunication

Also Published As

Publication number Publication date
CN1535040A (zh) 2004-10-06

Similar Documents

Publication Publication Date Title
CN101455096B (zh) 移动通信网络中发送定位业务请求的方法及系统
EP1894430B1 (fr) Procede et appareil pour la fourniture de services de localisation avec des flux de messages reduits
WO2004091235A1 (fr) Procede pour limiter la quantite de flux de demandes d'informations de position
WO2010121557A1 (fr) Méthode de déclenchement de procédure de localisation de zone, serveur de localisation, et terminal de localisation
JP2007259507A (ja) テレコミュニケーションシステムにおけるなりすましの防止
US20060099960A1 (en) Method for processing a location request of an area event change
US7509132B2 (en) Method of sending a location report from target user equipment
US7778648B2 (en) Method for handling deferred location request
KR100779963B1 (ko) 사용자 장치로부터의 위치 정보에 대한 요청을 처리하는방법
EP2914027B1 (fr) Procédé et système de gestion de mobilité dans un réseau m2m
WO2005036900A1 (fr) Procede de traitement apres modification des informations de confidentialite d'un equipement d'utilisateur cible
WO2008101438A1 (fr) Procédé de traitement, système et dispositif mis en oeuvre dans une zone de classification
WO2004089004A1 (fr) Procede de protection d'informations relatives a la localisation dans un service de localisation
EP1703749B1 (fr) Gestion d'une demande d'informations de position lancee par un equipement d'utilisateur
CN100474945C (zh) 位置业务中地域限制位置信息请求的方法
WO2009105984A1 (fr) Procédé et dispositif d'implication d'interface usi
WO2004114688A1 (fr) Procede de traitement qui fournit au cote demandeur, des informations de position du materiel d'un utilisateur abonne
WO2012089030A1 (fr) Procédé, dispositif d'accès et dispositif d'authentification pour accès au réseau par de multiples procédés d'accès
WO2004086679A1 (fr) Procede servant a activer et desactiver un service de localisation
WO2004066658A1 (fr) Procede de demande de position periodique dans un service de position
WO2004091234A1 (fr) Procede d'activation interimaire d'une demande d'informations de localisation dans un service de localisation
WO2005020615A1 (fr) Procede de mise a jour de position non autorisee
WO2004066657A1 (fr) Procede d'intercommunication entre un materiel utilisateur et un systeme de service de localisation pendant que l'utilisateur initialise l'operation
CN119255341A (zh) 信息处理方法、装置、网络节点、存储介质及计算机程序产品
WO2006024229A1 (fr) Procede de traitement de notification/validation d'une demande d'information de position de type de zone variationnel

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase