US20220417722A1 - Wireless emergency alert geofencing enhancements - Google Patents
Wireless emergency alert geofencing enhancements Download PDFInfo
- Publication number
- US20220417722A1 US20220417722A1 US17/901,588 US202217901588A US2022417722A1 US 20220417722 A1 US20220417722 A1 US 20220417722A1 US 202217901588 A US202217901588 A US 202217901588A US 2022417722 A1 US2022417722 A1 US 2022417722A1
- Authority
- US
- United States
- Prior art keywords
- user equipment
- lack
- wea
- location
- action
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000009471 action Effects 0.000 claims abstract description 117
- 238000000034 method Methods 0.000 claims description 88
- 238000012545 processing Methods 0.000 claims description 25
- 230000001413 cellular effect Effects 0.000 abstract description 46
- 230000008569 process Effects 0.000 description 32
- 230000004044 response Effects 0.000 description 22
- 230000011664 signaling Effects 0.000 description 17
- 238000003860 storage Methods 0.000 description 13
- 230000006855 networking Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 230000000737 periodic effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 229920001621 AMOLED Polymers 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 101150048216 tag-131 gene Proteins 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 101100127285 Drosophila melanogaster unc-104 gene Proteins 0.000 description 1
- WHXSMMKQMYFTQS-UHFFFAOYSA-N Lithium Chemical compound [Li] WHXSMMKQMYFTQS-UHFFFAOYSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 229910052744 lithium Inorganic materials 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- the present disclosure relates generally to wireless emergency alerts, and more specifically to transmitting wireless emergency alerts to user equipment in or around a targeted geographical area.
- a wireless emergency alert is an alert defined by the Alliance for Telecommunications Industry Solutions (ATIS) sent to wireless mobile devices (e.g., cell phones, pagers, and so on) via a 3rd Generation Partnership Project (3GPP) network (e.g., a 4 th generation (4G) cellular network, a 5 th generation (5G) cellular network, and so on).
- 3GPP 3rd Generation Partnership Project
- a WEA may include, for example, presidential alerts, imminent threat alerts, child abduction emergency or AMBER (America's Missing: Broadcast Emergency Response) alerts, public safety alerts, and the like.
- the WEA may be sent by a Commercial Mobile Alert System (CMAS).
- CMAS Commercial Mobile Alert System
- Some WEAs may indicate a geofenced area (e.g., where the WEAs are relevant or applicable).
- User equipment receiving the WEA may determine whether the user equipment is located within the geofenced area, and, if so, display or otherwise output the WEA.
- determining whether the user equipment is located within the geofenced area may be inefficient, or even unnecessary.
- a base station having a receiver, a transmitter, and at least one processor.
- the at least one processor receives, via the receiver, an alert message from an alert originator.
- the alert message includes an indication of a geofenced area.
- the at least one processor also determines whether a coverage area of the base station is within the geofenced area, and, in response to determining that the coverage area is completely within the geofenced area, sends, using the transmitter, a first wireless emergency alert without the indication of the geofenced area to user equipment in the coverage area.
- the at least one processor further, in response to determining that the coverage area is not completely within the geofenced area, sends, using the transmitter, a second wireless emergency alert comprising the indication of the geofenced area to the user equipment in the coverage area.
- a method performed by user equipment includes receiving, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area. The method also includes, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receiving, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area. The one or more action messages have a periodicity and an end time. The method further includes, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determining that the end time has not elapsed.
- the method includes, in response to determining that the end time has not elapsed, determining that the periodicity has elapsed, and, in response to determining that the periodicity has elapsed, determining that the user equipment is within the geofenced area.
- the method also includes, in response to determining that the end time has elapsed, ending processing of the wireless emergency alert.
- a non-transitory computer-readable medium stores computer-executable instructions that, when executed by one or more processors of user equipment, cause the one or more processors to receive, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, in response to determining that the user equipment is within the geofenced area, display the wireless emergency alert.
- the instructions also cause the one or more processors to, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receive, via the receiver of the user equipment, one or more action messages comprising an indication to end the wireless emergency alert.
- the instructions further cause the one or more processors to, in response to receiving the one or more action messages, end processing of the wireless emergency alert.
- a method performed by user equipment includes receiving, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receiving, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area.
- the one or more action messages have a lack of service time limit and a lack of service action.
- the method also includes, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determining that the user equipment does not have cellular service, and, in response to determining that the user equipment does not have cellular service, determining that the lack of service time limit has elapsed.
- the method further includes, in response to determining that the lack of service time limit has elapsed, performing the lack of service action.
- a non-transitory computer-readable medium stores computer-executable instructions that, when executed by one or more processors of user equipment, cause the one or more processors to receive, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receive, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area.
- the one or more action messages has a lack of location time limit and a lack of location action.
- the instructions also cause the one or more processors to, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determine whether a location of the user equipment can be determined, and, in response to determining that the location of the user equipment cannot be determined, determine whether the lack of location time limit has elapsed.
- the instructions further cause the one or more processors to, in response to determining that the lack of location time limit has elapsed, perform the lack of location action.
- FIG. 1 is a block diagram of an electronic device (e.g., user equipment), according to embodiments of the present disclosure
- FIG. 2 is a functional diagram of the electronic device of FIG. 1 , according to embodiments of the present disclosure
- FIG. 3 is a schematic diagram of a communication system that may send wireless emergency alerts (WEAs) to the electronic device of FIG. 1 , according to embodiments of the present disclosure;
- WEAs wireless emergency alerts
- FIG. 4 is a map illustrating a geofenced area as indicated by a WEA, according to embodiments of the present disclosure
- FIG. 5 is a flowchart of a method for sending selectively sending WEAs to user equipment that indicate or do not indicate a geofenced area based on whether a coverage area is completely within the geofenced area, according to embodiments of the present disclosure
- FIG. 6 is an example list of extended WEA Handset Action Message (WHAM) signaling, according to embodiments of the present disclosure
- FIG. 7 is a tag-length-value (TLV) code for indicating a periodicity configuration for determining whether a location of user equipment is within a geofenced area, according to embodiments of the present disclosure
- FIG. 8 is a method for periodically determining whether user equipment is located in a geofenced area, according to embodiments of the present disclosure
- FIG. 9 is a TLV code for indicating an alert end, according to embodiments of the present disclosure.
- FIG. 10 is a method for ending processing of a WEA, according to embodiments of the present disclosure.
- FIG. 11 is a TLV code for indicating a lack of service, according to embodiments of the present disclosure.
- FIG. 12 is a method for performing a lack of service action after being without cellular service for a lack of service time limit, according to embodiments of the present disclosure
- FIG. 13 is a TLV code for indicating a lack of location, according to embodiments of the present disclosure.
- FIG. 14 is a method for performing a lack of location action after being unable to determine a location of user equipment for a lack of location time limit, according to embodiments of the present disclosure.
- a target e.g., design, value, amount
- a margin of any suitable or contemplatable error e.g., within 0.1% of a target, within 1% of a target, within 5% of a target, within 10% of a target, within 25% of a target, and so on.
- WEAs wireless emergency alerts
- the WEA may be sent via a base station supporting a 3rd Generation Partnership Project (3GPP) network (e.g., a 4 th generation (4G) cellular network, a 5 th generation (5G) cellular network, and so on) to user equipment in a coverage area of the base station.
- 3GPP 3rd Generation Partnership Project
- the user equipment receiving the WEA may determine whether the user equipment is located within the geofenced area, and, if so, display or otherwise output the WEA.
- the coverage area is completely within the geofenced area, then it may be unnecessary, and thus an inefficient use of processing and/or network resources, for the user equipment to determine whether it is located within the geofenced area.
- WHAM WEA Handset Action Message
- the user equipment may have its own criteria (e.g., such as time-based criteria or timers) that, if met, may cause the user equipment to re-determine whether it is located within the geofenced area.
- the WHAM and/or the WEA may be used as an indicator of whether or not a given alert is active. If the user equipment enters the geofenced area, but loses cellular service, or it loses cellular service and enters geofenced area, it may not receive a WHAM and/or a WEA, and thus not display or otherwise output the WEA, despite being in the geofenced area where a user should know about the WEA.
- the user equipment may fail to determine its location (e.g., because signals enabling location determination, such as global navigation satellite system (GNSS) service or the Global Positioning System (GPS) service, are not received or observable), and thus not display or otherwise output the WEA, despite being in the geofenced area where a user should know about the WEA.
- GNSS global navigation satellite system
- GPS Global Positioning System
- the network simply stops resending the periodic WEAs and WHAMs associated with the alert.
- the user equipment may continue storing the WEA expecting a corresponding WHAM, and, in some cases, may continue determining to see if it is located in the geofenced area indicated by the WEA. This may unnecessarily expend processing and/or networking resources, and sometimes result in a WEA to be output well after the alert associated with the WEA has ended.
- embodiments herein provide systems and techniques that enable a base station of a network receiving an alert message indicating a geofenced area to determine whether an area covered by the base station is completely within the geofenced area. If so, then there may be no need for user equipment within the coverage area to determine whether it is located within the geofenced area, since the coverage area of the base station that is completely within the geofenced area. As such, the base station may generate and send a WEA based on the alert message that does not indicate the geofenced area to the user equipment in its coverage area, or, in some embodiments, the base station may indicate to the user equipment in its coverage area that geofencing is not required to be performed (e.g., using an additional flag).
- the base station may generate and send a WEA to the user equipment based on the alert message that indicates the geofenced area.
- the user equipment in coverage areas that are completely located within the geofenced area may avoid using processing and/or networking resources to unnecessarily determine whether the user equipment is located within the geofenced area.
- the disclosed embodiments also enable signaling (e.g., in WHAMs) a periodicity for user equipment to determine whether its location is within a geofenced area indicated in a corresponding WEA.
- signaling e.g., in WHAMs
- a periodicity for user equipment to determine whether its location is within a geofenced area indicated in a corresponding WEA.
- the signaling may also include an end time for the user equipment to determine whether its location is within the geofenced area, such that the user equipment may stop wasting processing and/or networking resources to determine whether its location is within the geofenced area after the end time.
- the signaling may further include a WEA identifier to enable identification of the WEA for which the periodicity and the end time correspond.
- the disclosed embodiments further enable signaling (e.g., in WHAMs) a lack of service time limit and a lack of service action for the user equipment to perform after it has been without cellular service for the lack of service time limit.
- signaling e.g., in WHAMs
- a lack of service time limit and a lack of service action for the user equipment to perform after it has been without cellular service for the lack of service time limit.
- the lack of service action may include displaying or otherwise outputting the WEA, or any other suitable action programmed into the user equipment.
- the signaling may also include a WEA identifier to enable identification of the WEA for which the lack of service time limit and the lack of service action correspond. In this manner, the user equipment may display the WEA, or perform any other suitable action, even if it is without cellular service.
- the disclosed embodiments enable signaling (e.g., in WHAMs) a lack of location time limit and a lack of location action for the user equipment to perform if the user equipment cannot determine its location for the lack of location time limit.
- signaling e.g., in WHAMs
- the lack of location action may include displaying or otherwise outputting the WEA, or any other suitable action programmed into the user equipment.
- the signaling may also include a WEA identifier to enable identification of the WEA for which the lack of location time limit and the lack of location action correspond. In this manner, the user equipment may display the WEA, or perform any other suitable action, even if it cannot determine its location.
- the disclosed embodiments may also enable signaling (e.g., in WHAMs) an alert end indication that indicates that the alert associated with the corresponding WEA has ended. That is, instead of the network simply stopping to resend the periodic WEAs and WHAMs associated with the alert, the network may send the alert end indication to indicate that the alert has ended.
- the user equipment may avoid continued storage of a WEA and performing geofencing-related actions corresponding to the alert in expectation of a corresponding WHAM, and continued determinations to see if it is located in the geofenced area indicated by the WEA.
- the signaling may also include a WEA identifier to enable identification of the WEA for which the alert end indication corresponds. Thus, user equipment-side processing and/or networking resources may be conserved, and outputting a WEA well after the alert associated with the WEA has ended may be avoided.
- FIG. 1 is a block diagram of an electronic device 10 , according to embodiments of the present disclosure.
- the electronic device 10 may include, among other things, one or more processors 12 (collectively referred to herein as a single processor for convenience, which may be implemented in any suitable form of processing circuitry), memory 14 , nonvolatile storage 16 , a display 18 , input structures 22 , an input/output (I/O) interface 24 , a network interface 26 , and a power source 29 .
- the various functional blocks shown in FIG. 1 may include hardware elements (including circuitry), software elements (including machine-executable instructions) or a combination of both hardware and software elements (which may be referred to as logic).
- the processor 12 , memory 14 , the nonvolatile storage 16 , the display 18 , the input structures 22 , the input/output (I/O) interface 24 , the network interface 26 , and/or the power source 29 may each be communicatively coupled directly or indirectly (e.g., through or via another component, a communication bus, a network) to one another to transmit and/or receive data between one another.
- FIG. 1 is merely one example of a particular implementation and is intended to illustrate the types of components that may be present in electronic device 10 .
- the electronic device 10 may include any suitable computing device, including a desktop or notebook computer (e.g., in the form of a MacBook®, MacBook® Pro, MacBook Air®, iMac®, Mac® mini, or Mac Pro® available from Apple Inc. of Cupertino, Calif.), a portable electronic or handheld electronic device such as a wireless electronic device or smartphone (e.g., in the form of a model of an iPhone® available from Apple Inc. of Cupertino, Calif.), a tablet (e.g., in the form of a model of an iPad® available from Apple Inc. of Cupertino, Calif.), a wearable electronic device (e.g., in the form of an Apple Watch® by Apple Inc.
- a desktop or notebook computer e.g., in the form of a MacBook®, MacBook® Pro, MacBook Air®, iMac®, Mac® mini, or Mac Pro® available from Apple Inc. of Cupertino, Calif.
- a portable electronic or handheld electronic device such as a wireless electronic device or smartphone
- processor 12 and other related items in FIG. 1 may be generally referred to herein as “data processing circuitry.” Such data processing circuitry may be embodied wholly or in part as software, hardware, or both. Furthermore, the processor 12 and other related items in FIG. 1 may be a single contained processing module or may be incorporated wholly or partially within any of the other elements within the electronic device 10 .
- the processor 12 may be implemented with any combination of general-purpose microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate array (FPGAs), programmable logic devices (PLDs), controllers, state machines, gated logic, discrete hardware components, dedicated hardware finite state machines, or any other suitable entities that may perform calculations or other manipulations of information.
- DSPs digital signal processors
- FPGAs field programmable gate array
- PLDs programmable logic devices
- controllers state machines, gated logic, discrete hardware components, dedicated hardware finite state machines, or any other suitable entities that may perform calculations or other manipulations of information.
- the processors 12 may perform the various functions described herein and below.
- the processor 12 may be operably coupled with a memory 14 and a nonvolatile storage 16 to perform various algorithms.
- Such programs or instructions executed by the processor 12 may be stored in any suitable article of manufacture that includes one or more tangible, computer-readable media.
- the tangible, computer-readable media may include the memory 14 and/or the nonvolatile storage 16 , individually or collectively, to store the instructions or routines.
- the memory 14 and the nonvolatile storage 16 may include any suitable articles of manufacture for storing data and executable instructions, such as random-access memory, read-only memory, rewritable flash memory, hard drives, and optical discs.
- programs e.g., an operating system
- encoded on such a computer program product may also include instructions that may be executed by the processor 12 to enable the electronic device 10 to provide various functionalities.
- the display 18 may facilitate users to view images generated on the electronic device 10 .
- the display 18 may include a touch screen, which may facilitate user interaction with a user interface of the electronic device 10 .
- the display 18 may include one or more liquid crystal displays (LCDs), light-emitting diode (LED) displays, organic light-emitting diode (OLED) displays, active-matrix organic light-emitting diode (AMOLED) displays, or some combination of these and/or other display technologies.
- LCDs liquid crystal displays
- LED light-emitting diode
- OLED organic light-emitting diode
- AMOLED active-matrix organic light-emitting diode
- the input structures 22 of the electronic device 10 may enable a user to interact with the electronic device 10 (e.g., pressing a button to increase or decrease a volume level).
- the I/O interface 24 may enable electronic device 10 to interface with various other electronic devices, as may the network interface 26 .
- the I/O interface 24 may include an I/O port for a hardwired connection for charging and/or content manipulation using a standard connector and protocol, such as the Lightning connector provided by Apple Inc. of Cupertino, Calif., a universal serial bus (USB), or other similar connector and protocol.
- the network interface 26 may include, for example, one or more interfaces for a personal area network (PAN), such as a BLUETOOTH® network, for a local area network (LAN) or wireless local area network (WLAN), such as a network employing one of the IEEE 802.11x family of protocols (e.g., WI-FI®), and/or for a wide area network (WAN), such as any standards related to the Third Generation Partnership Project (3GPP), including, for example, a 3 rd generation (3G) cellular network, universal mobile telecommunication system (UMTS), 4 th generation (4G) cellular network, long term evolution (LTE®) cellular network, long term evolution license assisted access (LTE-LAA) cellular network, 5 th generation (5G) cellular network, and/or New Radio (NR) cellular network, a satellite network, and so on.
- PAN personal area network
- LAN local area network
- WLAN wireless local area network
- WAN wide area network
- 3GPP Third Generation Partnership Project
- 3GPP
- the network interface 26 may include, for example, one or more interfaces for using a Release-15 cellular communication standard of the 5G specifications that include the millimeter wave (mmWave) frequency range (e.g., 24.25-300 gigahertz (GHz)).
- the network interface 26 of the electronic device 10 may allow communication over the aforementioned networks (e.g., 5G, Wi-Fi, LTE-LAA, and so forth).
- the network interface 26 may also include one or more interfaces for, for example, broadband fixed wireless access networks (e.g., WIMAX®), mobile broadband Wireless networks (mobile WIMAX®), asynchronous digital subscriber lines (e.g., ADSL, VDSL), digital video broadcasting-terrestrial (DVB-T®) network and its extension DVB Handheld (DVB-H®) network, ultra-wideband (UWB) network, alternating current (AC) power lines, and so forth.
- broadband fixed wireless access networks e.g., WIMAX®
- mobile broadband Wireless networks e.g., mobile broadband Wireless networks (mobile WIMAX®)
- asynchronous digital subscriber lines e.g., ADSL, VDSL
- DVD-T® digital video broadcasting-terrestrial
- DVD-H® extension DVB Handheld
- UWB ultra-wideband
- AC alternating current
- the network interface 26 may include a transceiver 30 .
- the transceiver 30 may support transmission and receipt of various wireless signals via one or more antennas, and thus include a transmitter and a receiver.
- the power source 29 of the electronic device 10 may include any suitable source of power, such as a rechargeable lithium polymer (Li-poly) battery and/or an alternating current (AC) power converter.
- the electronic device 10 may take the form of a computer, a portable electronic device, a wearable electronic device, or other type of electronic device.
- FIG. 2 is a functional diagram of the electronic device 10 of FIG. 1 , according to embodiments of the present disclosure.
- the processor 12 , the memory 14 , the transceiver 30 , a transmitter 52 , a receiver 54 , and/or the antennas 55 may be communicatively coupled directly or indirectly (e.g., through or via another component, a communication bus, a network) to one another to transmit and/or receive data between one another.
- the electronic device 10 may include the transmitter 52 and/or the receiver 54 that respectively enable transmission and reception of data between the electronic device 10 and an external device via, for example, a network (e.g., including base stations) or a direct connection. As illustrated, the transmitter 52 and the receiver 54 may be combined into the transceiver 30 .
- the electronic device 10 may also have one or more antennas 55 A- 55 N electrically coupled to the transceiver 30 .
- the antennas 55 A- 55 N may be configured in an omnidirectional or directional configuration, in a single-beam, dual-beam, or multi-beam arrangement, and so on. Each antenna 55 may be associated with a one or more beams and various configurations.
- multiple antennas of the antennas 55 A- 55 N of an antenna group or module may be communicatively coupled a respective transceiver 30 and each emit radio frequency signals that may constructively and/or destructively combine to form a beam.
- the electronic device 10 may include multiple transmitters, multiple receivers, multiple transceivers, and/or multiple antennas as suitable for various communication standards.
- the transmitter 52 may wirelessly transmit packets having different packet types or functions. For example, the transmitter 52 may transmit packets of different types generated by the processor 12 .
- the receiver 54 may wirelessly receive packets having different packet types. In some examples, the receiver 54 may detect a type of a packet used and process the packet accordingly. In some embodiments, the transmitter 52 and the receiver 54 may transmit and receive information via other wired or wireline systems or means.
- the various components of the electronic device 10 may be coupled together by a bus system 56 .
- the bus system 56 may include a data bus, for example, as well as a power bus, a control signal bus, and a status signal bus, in addition to the data bus.
- the components of the electronic device 10 may be coupled together or accept or provide inputs to each other using some other mechanism.
- FIG. 3 is a schematic diagram of a communication system 60 that may send wireless emergency alerts (WEAs) to the electronic device 10 of FIG. 1 , according to embodiments of the present disclosure.
- An alerting authority computing device 62 (referred to herein as an alerting authority) may generate an alert 64 .
- the alerting authority 62 may include one or more computing devices of a jurisdiction with the designated authority to alert or warn the public (e.g., at least people within a geographical region or geofenced area), and include at least some of the components of the electronic device 10 shown in FIGS. 1 and/or 2 .
- the alerting authority 62 may be one of over 1500 federal, state, local, tribal, and territorial authorities, such as weather authorities (e.g., the National Oceanic and Atmospheric Administration's (NOAA) National Weather Service (NWS)), missing persons' authorities (e.g., the National Center for Missing and Exploited Children), county authorities (e.g., the Pennsylvania Delaware Country authority), city authorities (e.g., the Texas City of Houston authority), emergency management authorities (e.g., the Michigan City of Lansing Emergency Management authority), public safety authorities (e.g., the North Carolina Department of Public Safety authority), law enforcement authorities (e.g., the Illinois State Police authority), homeland security authorities (e.g., the Wyoming Office of Homeland Security authority), and so on.
- weather authorities e.g., the National Oceanic and Atmospheric Administration's (NOAA) National Weather Service (NWS)
- missing persons' authorities e.g., the National Center for Missing and Exploited Children
- county authorities e.g., the Pennsylvania Delaware
- an alert originator e.g., an individual person operating the alerting authority 62
- the alert 64 may be related to an impending natural or manmade disaster, threat, or dangerous or missing person.
- the alert 64 may include a presidential alert, imminent threat alert, child abduction emergency or AMBER (America's Missing: Broadcast Emergency Response) alert, and so on.
- the alerting authority 62 may generate a Common Alerting Protocol (CAP) message 66 based on the alert 64 , which may include an indication of the alert 64 , as well as other characteristics of the alert 64 , such as a geofenced area (e.g., latitude and longitude coordinates of a geofence in the form of a shape or polygon) for which the alert 64 is relevant, a duration of time for which the alert 64 is relevant, and so on.
- CAP Common Alerting Protocol
- the CAP message 66 may be in the form of an international standard, and routed through the Federal Emergency Management Agency's (FEMA's) Integrated Public Alert and Warning System (IPAWS) to communication networks 67 provided by wireless (e.g., cellular) network providers having base stations within a relevant area of the alert 64 (e.g., based on the geofenced area defined in the CAP message 66 , based on a defined radius from a defined point, using Federal Information Processing Standard (FIPS/county) codes, and so on).
- a base station 68 A-C may receive the illustrated CAP message 66 .
- the base station 68 may include at least some of the components of the electronic device 10 shown in FIGS. 1 and/or 2 . Moreover, it should be understood that the base station 68 is considered part of the network 67 .
- the base station 68 may generate a WEA 70 based on the CAP message 66 that indicates the alert 64 .
- the base station 68 may include a receiver (in the form of the receiver 54 as described above with respect to the electronic device 10 ), and receive the CAP message 66 using the receiver. Additionally or alternatively, the base station 68 may receive the CAP message 66 over wired network-side cables (e.g., fiber cables).
- the WEA 70 if conforming to the Alliance for Telecommunications Industry Solutions (ATIS) WEA 3.0 standard, may indicate the geofenced area.
- the base station 68 may then send the WEA 70 to user equipment (e.g., the electronic device 10 ) within its coverage area 72 A-C (e.g., an area or cell for which the base station 68 provides network coverage, collectively referred to as 72 ).
- the base station 68 may provide any suitable network coverage, such as coverage for a 3rd Generation Partnership Project (3GPP) network (e.g., a 4 th generation (4G) cellular network, a 5 th generation (5G) cellular network, and so on).
- 3GPP 3rd Generation Partnership Project
- 4G 4 th generation
- 5G 5 th generation
- the network provider may cause the base station 68 to repeatedly send the WEA 70 to the user equipment 10 at a certain periodicity (e.g., between the range of every 1 second to every 24 hours, such as every 3 to 4 seconds, every 10-15 seconds, and so on).
- the user equipment 10 may determine (using a device-specific location determination technique and/or a global navigation satellite system (GNSS) service, such as the Global Positioning System (GPS) service) whether it is located in the geofenced area (e.g., performing device-based geofencing (DBGF)).
- GNSS global navigation satellite system
- GPS Global Positioning System
- DBGF device-based geofencing
- the network 67 or the network provider may cause the base station 68 to also periodically broadcast a WEA Handset Action Message (WHAM) 74 indicative of the WEA 70 that requests that the user equipment 10 re-determine whether it is located within the geofenced area.
- WHAM WEA Handset Action Message
- the periodicity of the WHAM 74 may include a range between every 1 second to every 24 hours, such as every 3 to 4 seconds, every 10-15 seconds, and so on.
- the WHAM 74 may include an identifier or serial number to enable the user equipment to perform duplicate detection so as to cause the user equipment 10 to again determine whether it is located in the geofenced area.
- the coverage area 72 is completely within the geofenced area, then it may be unnecessary, and thus an inefficient use of processing and/or network resources, for the user equipment 10 to determine whether it is located within the geofenced area.
- alerts 64 e.g., public safety alerts, AMBER alerts, wildfire alerts, and the like
- WEAs 70 may be broadcast to geofenced areas 80 that include entire counties, and even multiple cities.
- FIG. 4 is a map illustrating a geofenced area 80 (e.g., an alert area) as indicated by a WEA 70 , according to embodiments of the present disclosure.
- the map also illustrates four coverage areas 72 A-D, which may be provided by four base stations 68 .
- Coverage areas 72 A and 72 B are completely within the geofenced area 80 (e.g., no portion of the coverage areas 72 A and 72 B are outside the geofenced area 80 ), while coverage areas 72 C and 72 D are partially within the geofenced area 80 and partially outside the geofenced area 80 .
- the user equipment 10 may compare its location to the geofenced area 80 indicated in the WEA 70 , determine that it is not located in the geofenced area 80 , and not output the WEA 70 .
- the user equipment 10 may receive periodic WEAs 70 , but because, as defined by ATIS, the user equipment 10 may only determine whether it is located within the geofenced area 80 one time, it may no longer determine whether it is located within the geofenced area 80 in response to receiving subsequent WEAs 70 . Instead, the user equipment 10 may receive WHAMs 74 requesting that the user equipment 10 determine whether it is located within the geofenced area 80 indicated by the WEA 70 .
- the disclosed embodiments enable the base station 68 of a coverage area 72 A that is completely within the geofenced area 80 to send a WEA 70 to the user equipment 10 that does not indicate the geofenced area 80 , such that the user equipment 10 may avoid processing the geofenced area 80 to unnecessarily determine whether it is located in the geofenced area 80 .
- the base station 68 may generate and send a WEA 70 to the user equipment 10 that indicates the geofenced area 80 .
- the user equipment 10 in coverage areas (e.g., 72 A) that are completely located within the geofenced area 80 may avoid using processing and/or networking resources to unnecessarily determine whether the user equipment 10 is located within the geofenced area 80 .
- FIG. 5 is a flowchart of a method 90 for sending selectively sending WEAs 70 to user equipment 10 that indicate or do not indicate a geofenced area 80 based on whether a coverage area 72 is completely within the geofenced area 80 , according to embodiments of the present disclosure.
- Any suitable device e.g., a controller
- the method 90 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as the memory 14 or storage 16 , using the processor 12 .
- the method 90 may be performed at least in part by one or more software components, such as an operating system, one or more software applications, and the like, of the alerting authority 62 , the base station 68 , and/or the user equipment 10 . While the method 90 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether.
- one or more software components such as an operating system, one or more software applications, and the like
- the alerting authority 62 generates an alert 64 .
- the alert 64 may be related to an impending natural or manmade disaster, threat, or dangerous or missing person.
- the alerting authority 62 generates an alert message 66 based on the alert 64 .
- the alert message 66 may be in the form of a Common Alerting Protocol (CAP) message, and may include an indication of the alert 64 , as well as other characteristics of the alert 64 , such as a geofenced area 80 for which the alert 64 is relevant, a duration of time for which the alert 64 is relevant, and so on.
- CAP Common Alerting Protocol
- the alerting authority 62 sends the alert message 66 to the base station 68 .
- the alert message 66 may be routed through FEMA's IPAWS to the base station 68 of a network 67 or the network provider located within a relevant area of the alert 64 .
- the alerting authority 62 may send the alert message to the base station 68 based on the geofenced area 80 defined in the alert message 66 , based on a defined radius from a defined point, using Federal Information Processing Standard (FIPS/county) codes, and so on.
- FIPS/county Federal Information Processing Standard
- the base station 68 receives the alert message 66 , and, in decision block 100 , determines whether a cell or coverage area 72 supported by the base station 68 is completely within the geofenced area 80 .
- the base station 68 may store an indication of its coverage area 72 (e.g., a radius from the base station 68 , latitude and longitude coordinates, and so on), and compare the indication of the coverage area 72 to the geofenced area 80 indicated in the alert message 66 .
- the base station 68 determines that its coverage area 72 is completely within the geofenced area 80 , then the base station 68 , in process block 102 , generates and sends (e.g., broadcasts) a WEA 70 without an indication of the geofenced area 80 to user equipment 10 in the coverage area 72 . Additionally, in some embodiments, the network 67 may determine to generate and send the WEA 70 via base stations 68 that have coverage areas 72 that only slightly extend outside the geofenced area 80 (e.g., less than 50%, 30%, 25%, 20%, 15%, 10%, 8%, 7%, 5%, 3%, 2%, 1%, and so on, of the coverage area 72 extending outside the geofenced area 80 ) in order to conserve network resources.
- the base station 68 may generate the WEA 70 to indicate the alert 64 , but not indicate the geofenced area 80 , since the user equipment 10 is in a coverage area 72 that is completely within the geofenced area 80 , and thus has no need to determine whether it is in the geofenced area 80 .
- the WEA 70 that does not have the indication of the geofenced area 80 may conform of the ATIS WEA 2.0 standard, which does not include an indication of the geofenced area 80 . This may decrease processing usage of the base station 68 to prepare the WEA 70 to include the coordinates of the geofenced area 80 .
- the user equipment 10 receives and displays (or otherwise outputs) the WEA 70 .
- display or otherwise outputting the WEA 70 includes displaying or otherwise outputting an indication of the alert 64 corresponding to the WEA 70 .
- the user equipment 10 may display an indication of the alert 64 on the display 18 .
- the user equipment 10 may output the alert 64 using additional or alternative devices, such as by outputting the alert 64 as audio data via speakers of the user equipment 10 , as haptic data by vibrating the user equipment 10 via a motor of the user equipment 10 , and so on. This may decrease processing and network usage by the user equipment 10 (e.g., for determining its location using a device-specific location determination technique and/or a GNSS or GPS service, comparing its location to the geofenced area 80 , and so on).
- the base station 68 determines that its coverage area 72 is not completely within the geofenced area 80 , then the base station 68 , in process block 106 , generates and sends (e.g., broadcasts) a WEA 70 with an indication of the geofenced area 80 to user equipment 10 in the coverage area 72 . That is, the base station 68 may generate the WEA 70 to indicate the alert 64 , along with latitude and longitude coordinates of the geofenced area 80 to the user equipment 10 .
- the WEA 70 that includes the indication of the geofenced area 80 may conform of the ATIS WEA 3.0 standard, which provides an indication of the geofenced area 80 .
- the user equipment 10 receives the WEA 70 .
- decision block 110 the user equipment 10 determines whether it is located within the geofenced area 80 indicated in the WEA 70 .
- the user equipment 10 may use a device-specific location determination technique and/or a GNSS or GPS service to determine its location, and compare its location to the geofenced area 80 . If the user equipment 10 determines that it is located within the geofenced area 80 , then, in process block 112 , the user equipment 10 displays the WEA 70 . Otherwise, if the user equipment 10 determines that it is not located within the geofenced area 80 , then, in process block 114 , the user equipment 10 does not display or otherwise output the WEA 70 .
- the user equipment 10 may compare its location to the geofenced area 80 indicated in the WEA 70 , determine that it is not located in the geofenced area 80 , and not output the WEA 70 .
- a WHAM 74 may then be sent to the user equipment 10 that requests that the user equipment 10 determine whether it is located within the geofenced area 80 indicated by the WEA 70 .
- user equipment 10 may not receive the WHAM 74 , and thus not display or otherwise output the WEA 70 , despite being in the geofenced area 80 where a user should know about the WEA 70 .
- FIG. 6 is an example list of extended WHAM signaling, according to embodiments of the present disclosure.
- a WHAM may be provided in a tag-length-value (TLV) format, where the WHAM includes a tag indicating a WHAM type, followed by a length of a value of the WHAM, and finally followed by the value itself.
- TLV tag-length-value
- the example list illustrates bit positions 8 , 7 , 6 , and 5 within a byte of a WHAM, which corresponding to tags of the WHAM.
- the 0001 tag 129 corresponds to an active alert identity tuple list 130 . That is, the WHAM 74 including the 0001 tag 129 may be indicative of the alert 64 being sent by the alerting authority 62 .
- the 0010 tag 131 corresponds to an active alert identity tuple list—common warning area coordinates 132 .
- the WHAM 74 including the 0010 tag 131 may be indicative of a language (e.g., English, Spanish, and so on) of the alert 64 , a language setting of the user equipment 10 , and the like. Both the 0001 and the 0010 tags 129 , 131 may be defined by the ATIS WEA standards.
- the 0011 tag 133 corresponds to a configuration action related to a periodicity configuration 134 .
- the WHAM 74 including the 0011 tag 133 may be indicative of a periodicity for determining whether a location of the user equipment 10 is within the geofenced area 80 (e.g., indicated in a WEA 70 ).
- the 0100 tag 135 corresponds to a configuration action related to indicating an alert end 136 .
- the WHAM 74 including the 0100 tag 135 may be indicative of an end to an alert 64 .
- the 0101 tag 137 corresponds to a configuration action related to a lack of service or no-service 138 .
- the WHAM 74 including the 0101 tag 137 may be indicative of a time limit and an action to perform in case of lack of cellular service.
- the 0110 tag 139 corresponds to a configuration action related to a lack of location or location determination 140 .
- the WHAM 74 including the 0110 tag 139 may be indicative of a time limit and an action to perform in case of lack of location determination.
- the 1111 tag 141 corresponds to a Commercial Mobile Service Providers (CMSP) defined use.
- CMSP Commercial Mobile Service Providers
- the WHAM 74 including the 1111 tag 141 is reserved for authorized network providers to send public safety alerts and warnings to user equipment 10 .
- FIG. 6 illustrates extending WHAM signaling to indicate a periodicity configuration 134 for determining whether a location of the user equipment 10 is within the geofenced area 80 (e.g., the 0011 tag 133 ), an alert end 136 (e.g., the 0100 tag 135 ), a lack of service 138 (e.g., the 0101 tag 137 ), and a lack of location 140 (e.g., the 0110 tag 139 ), it should be understood that any additional or alternative form of signaling may be used to signal these indications to user equipment 10 , such as signaling within a system information block (SIB) sent from the base station 68 to the user equipment 10 to establish a connection or via a dedicated radio resource control (RRC) connection.
- SIB includes SIB types designated for, for example, Earthquake and Tsunami Warning System (ETWS) information (in SIB 10 and SIB 11 ), Commercial Mobile Alerting System (CMAS) information (in SIB 12 ), and so on.
- SIB system
- FIG. 7 is a TLV code for indicating a periodicity configuration 134 for determining whether a location of the user equipment 10 is within the geofenced area 80 , according to embodiments of the present disclosure.
- the TLV code includes the tag 133 (e.g., 0011), as shown in FIG. 6 .
- the TLV code also includes a length 152 of a value 154 of the TLV code, and the value 154 . As illustrated, the length 152 field may be followed by a number of zeroes to, for example, reserve space in the field for future values.
- the value 154 of the TLV code may include a WEA identifier 156 , a periodicity 158 , and an end time 160 .
- the WEA identifier 156 may enable the user equipment 10 to identify the WEA 70 for which the periodicity 158 and the end time 160 correspond.
- the periodicity 158 may indicate how often (e.g., in seconds) the user equipment 10 is to determine whether its location (e.g., using a device-specific location determination technique and/or a GNSS or GPS service) is within the geofenced area 80 (e.g., as indicated in the corresponding WEA 70 ).
- the periodicity 158 may be any suitable duration of time to periodically determine whether the location of the user equipment 10 is within the geofenced area 80 , such as at least every 1 second, 5 seconds, 10 seconds, 30 seconds, 60 seconds, 90 seconds, 120 seconds, 300 seconds, 600 seconds, 1800 seconds, and so on.
- the end time 160 may indicate a time for the user equipment 10 to stop determining whether it is located in the geofenced area 80 .
- the end time 160 may be any suitable duration of time to stop determining whether the location of the user equipment 10 is within the geofenced area 80 , such as at least 5 seconds, 10 seconds, 30 seconds, 1 minute, 5 minutes, 10 minutes, 30 minutes, 1 hour, 2 hours, 4 hours, 5 hours, 8 hours, 12 hours, 18 hours, 24 hours, and so on.
- the end time 160 may be provided in epoch time format.
- a WHAM 74 that requests that the user equipment 10 determine whether it is located in a geofenced area 80 every 5 minutes for 4 hours may include a periodicity 158 of 5 minutes and an end time 160 of 4 hours.
- the WEA identifier 156 , the periodicity 158 , and/or the end time 160 may be sent in multiple (e.g., successive in some cases) WHAMs 74 .
- the periodicity 158 and/or the end time 160 may be based on one or more parameters set and sent by the alerting authority 62 . That is, the periodicity 158 and/or the end time 160 may be based on one or more parameters (e.g., a duration of the alert 64 , an indication of when the alert 64 will end) that are part of a CAP message 66 received by the network 67 via the base station 68 .
- the network 67 or the network provider may generate the WHAM 74 with the TLV code for indicating the periodicity configuration 134 , and send the WHAM 74 to the user equipment 10 via the base station 68 .
- the user equipment 10 may determine whether its location is within the geofenced area 80 according to the periodicity 158 , until the end time 160 has elapsed. As such, if the user equipment 10 enters the geofenced area 80 and loses cellular service, but still retains its device-specific location determination technique and/or GNSS or GPS service, then it may determine to see if it is in the geofenced area 80 , and display the WEA 70 .
- FIG. 8 is a method 170 for periodically determining whether the user equipment 10 is located in a geofenced area 80 , according to embodiments of the present disclosure.
- Any suitable device e.g., a controller
- the method 170 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as the memory 14 or storage 16 , using the processor 12 .
- the method 170 may be performed at least in part by one or more software components of the user equipment 10 , such as an operating system of the user equipment 10 , one or more software applications of the user equipment 10 , and the like. While the method 170 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether.
- the processor 12 receives a WEA 70 with an indication of a geofenced area 80 .
- the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, at process block 176 , the processor 12 displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then the processor 12 may not display the WEA 70 , and may wait to receive a WHAM 74 .
- the processor 12 receives a WHAM 74 with a periodicity 158 and an end time 160 .
- the WHAM 74 may include tag 133 (e.g., 0011), length 152 , and value 154 format shown in FIG. 7 .
- the WHAM 74 may include the WEA identifier 156 , the periodicity 158 , and/or the end time 160 shown in FIG. 7 .
- the WEA identifier 156 may enable the user equipment 10 to identify the WEA 70 for which the periodicity 158 and the end time 160 correspond.
- the periodicity 158 may indicate how often (e.g., in seconds) the user equipment 10 is to determine whether its location (e.g., using a device-specific location determination technique and/or a GNSS or GPS service) is within the geofenced area 80 (e.g., as indicated in the corresponding WEA 70 ).
- the end time 160 may indicate a time for the user equipment 10 to stop determining whether it is located in the geofenced area 80 .
- decision block 180 the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, the processor 12 , in process block 176 , displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then, in decision block 182 , the processor 12 determines whether the end time 160 provided in the WHAM 74 has elapsed. If not, in decision block 184 , the processor 12 determines whether the periodicity 158 provided in the WHAM 74 has elapsed. If not, the repeats decision block 184 . If the processor 12 determines that the periodicity 158 has elapsed, then the processor returns to decision block 182 to determine whether the end time 160 has elapsed.
- the processor 12 in process block 186 , ends processing of the WEA 70 . That is, the processor 12 may no longer determine whether the user equipment 10 is located in the geofenced area 80 . In this manner, even in the case that the user equipment 10 enters the geofenced area 80 and loses cellular service, but still retains using its device-specific location determination technique and/or GNSS or GPS service, the user equipment 10 may continue determining whether it is in the geofenced area 80 , and, if so, display the WEA 70 .
- the network 67 may continue to broadcast the WHAMs 74 via the base station 68 , which may be received by the user equipment 10 . While the user equipment 10 may be configured to ignore the subsequent WHAMs 74 , in some embodiments, the user equipment 10 may choose to process the WHAMs 74 and determine whether it is located in the geofenced area 80 based on receiving a WHAM 74 , as opposed to determining whether it is located in the geofenced area 80 based on the periodicity 158 . In particular, the network 67 may indicate to the user equipment 10 that the periodicity 158 applies, for example, only when the user equipment 10 does not have cellular service. In some embodiments, this may be a definition as per a contract between the user equipment 10 and the network 67 .
- the network 67 may simply stop resending the periodic WEAs 70 and WHAMs 74 associated with the alert 64 .
- the user equipment 10 may continue storing the WEA 70 expecting a corresponding WHAM 74 , and, in some cases, may continue determining whether it is located in the geofenced area 80 indicated by the WEA 70 . This may unnecessarily expend processing and/or networking resources, and sometimes result in a WEA 70 to be output well after the alert 64 associated with the WEA 70 has ended.
- FIG. 9 is a TLV code for indicating an alert end 136 , according to embodiments of the present disclosure.
- the TLV code includes the tag 135 (e.g., 0100), as shown in FIG. 6 .
- the TLV code also includes a length 200 of a value 202 of the TLV code, and the value 202 .
- the value 202 of the TLV code may include a WEA identifier 204 , which may enable the user equipment 10 to identify the WEA 70 for which the corresponding alert 64 has ended.
- the WHAM 74 indicating the alert end 136 may be based on one or more parameters set and sent by the alerting authority 62 .
- the WHAM 74 indicating the alert end 136 may be based on one or more parameters (e.g., a duration of the alert 64 , an indication of when the alert 64 will end) that are part of a CAP message 66 received by the network 67 via the base station 68 .
- the network 67 or the network provider may generate the WHAM 74 with the TLV code for indicating the alert end 136 , and send the WHAM 74 to the user equipment 10 via the base station 68 .
- the user equipment 10 may stop processing the WEA 70 (e.g., stop determining whether its location is within the geofenced area 80 ).
- the user equipment 10 may avoid continued storage of a WEA 70 corresponding to the alert 64 in expectation of a corresponding WHAM 74 , and continued determinations to see if it is located in the geofenced area 80 indicated by the WEA 70 .
- processing and/or networking resources may be conserved, and outputting a WEA 70 well after the alert 64 associated with the WEA 70 has ended may be avoided.
- FIG. 9 illustrates a WHAM 74 indicating an alert end 136
- any additional or alternative form of signaling may be used to signal an end of an alert 64 to user equipment 10 , such as signaling within a system information block (SIB) sent from the base station 68 to the user equipment 10 to establish a connection.
- SIB system information block
- an indication to end an alert 64 may be provided in a SIB, along with the WEA identifier 204 (e.g., a message identifier or serial number corresponding to the WEA 70 ).
- an indication of a duration of the alert 64 may be sent via, for example, a WEA 70 .
- the user equipment 10 may then determine when the alert 64 is over, rather than receiving an indication from the WHAM 74 indicating the alert end 136 .
- FIG. 10 is a method 210 for ending processing of a WEA 70 , according to embodiments of the present disclosure.
- Any suitable device e.g., a controller
- the method 210 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as the memory 14 or storage 16 , using the processor 12 .
- the method 210 may be performed at least in part by one or more software components of the user equipment 10 , such as an operating system of the user equipment 10 , one or more software applications of the user equipment 10 , and the like. While the method 210 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether.
- the processor 12 receives a WEA 70 with an indication of a geofenced area 80 .
- decision block 214 the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, at process block 216 , the processor 12 displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then the processor 12 may not display the WEA 70 , and may wait to receive a WHAM 74 .
- the processor 12 receives a WHAM 74 with an alert end indication 136 .
- the WHAM 74 may include tag 135 (e.g., 0100), length 200 , and value 202 format shown in FIG.
- the WHAM 74 may include the WEA identifier 156 that enables the user equipment 10 to identify the WEA 70 for which the corresponding alert 64 has ended. Accordingly, in process block 220 , the processor 12 ends processing of the WEA 70 . That is, the processor 12 may no longer determine whether the user equipment 10 is located in the geofenced area 80 . In this manner, the user equipment 10 may avoid continued storage of a WEA 70 corresponding to the alert 64 in expectation of a corresponding WHAM 74 , and continued determinations to see if it is located in the geofenced area 80 indicated by the WEA 70 . Thus, processing and/or networking resources may be conserved, and outputting a WEA 70 well after the alert 64 associated with the WEA 70 has ended may be avoided.
- FIG. 11 is a TLV code for indicating a lack of service 138 , according to embodiments of the present disclosure.
- the TLV code includes the tag 137 (e.g., 0101), as shown in FIG. 6 .
- the TLV code also includes a length 230 of a value 232 of the TLV code, and the value 232 .
- the value 232 of the TLV code may include a WEA identifier 234 , a lack of service time limit 236 , and a lack of service action 238 .
- the WEA identifier 234 may enable the user equipment 10 to identify the WEA 70 for which the lack of service time limit 236 and the lack of service action 238 correspond.
- the lack of service action 238 includes an action for the user equipment 10 to perform after it has been without cellular service for the lack of service time limit 236 .
- the lack of service action 238 may include displaying or otherwise outputting the WEA 70 , or an action defined by implementation of the user equipment 10 .
- the user equipment 10 may display the WEA 70 upon being without cellular service for the lack of service time limit 236 . If the lack of service action 238 is a second value (e.g., a logic high or 1 value), then the user equipment 10 may perform an action defined by implementation of the user equipment 10 .
- a first value e.g., a logic low or 0 value
- the user equipment 10 may display the WEA 70 upon being without cellular service for the lack of service time limit 236 .
- a second value e.g., a logic high or 1 value
- the WEA identifier 156 may be sent in multiple (e.g., successive in some cases) WHAMs 74 .
- the lack of service time limit 236 may be based on one or more parameters set and sent by the alerting authority 62 or the network 67 .
- the lack of service time limit 236 may be based on a maximum wait time indicated in a system information block (SIB) sent from the base station 68 to the user equipment 10 to establish a connection.
- SIB system information block
- the lack of service time limit 236 may be expressed in seconds, and include any suitable time to wait for cellular service to be restored to the user equipment 10 before the lack of service action 238 is performed, such as at least 10 seconds, 30 seconds, 45 seconds, 60 seconds, 90 seconds, 120 seconds, 255 seconds, and so on. In this manner, the user equipment 10 may display the WEA 70 , or perform any other suitable action, even if it is without cellular service.
- FIG. 12 is a method 250 for performing the lack of service action 238 after being without cellular service for the lack of service time limit 236 , according to embodiments of the present disclosure.
- Any suitable device e.g., a controller
- the method 250 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as the memory 14 or storage 16 , using the processor 12 .
- the method 250 may be performed at least in part by one or more software components of the user equipment 10 , such as an operating system of the user equipment 10 , one or more software applications of the user equipment 10 , and the like. While the method 250 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether.
- the processor 12 receives a WEA 70 with an indication of a geofenced area 80 .
- decision block 254 the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, at process block 256 , the processor 12 displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then the processor 12 may not display the WEA 70 , and may wait to receive a WHAM 74 .
- the processor 12 receives a WHAM 74 with a lack of service time limit 236 and a lack of service action 238 .
- the WHAM 74 may include tag 137 (e.g., 0101), length 230 , and value 232 format shown in FIG. 11 .
- the WHAM 74 may include the WEA identifier 234 , the lack of service time limit 236 , and/or the lack of service action 238 shown in FIG. 11 .
- the WEA identifier 156 may enable the user equipment 10 to identify the WEA 70 for which the lack of service time limit 236 and the lack of service action 238 correspond.
- the lack of service action 238 includes an action for the user equipment 10 to perform after it has been without cellular service for the lack of service time limit 236 .
- the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, the processor 12 , in process block 256 , displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then, in decision block 262 , the processor 12 determines whether the user equipment 10 has cellular service. That is, the processor 12 may determine whether it may send and/or receive signals using its transmitter 52 and/or receiver 54 over a cellular network 67 (e.g., via the base station 68 ).
- the processor 12 may not display the WEA 70 , and may wait to receive a WHAM 74 , returning to process block 258 to receive another WHAM 74 with a lack of service time limit 236 and a lack of service action 238 . If the processor 12 determines that the user equipment 10 does not have cellular service, then, in decision block 264 , the processor 12 determines whether the lack of service time limit 236 has elapsed. If not, the processor 12 returns to decision block 262 to determine whether the user equipment 10 has cellular service. If the processor 12 determines that the lack of service time limit 236 has elapsed, then, in process block 266 , the processor 12 performs the lack of service action 238 .
- the lack of service action 238 may include displaying or otherwise outputting the WEA 70 , or an action defined by implementation of the user equipment 10 .
- the user equipment 10 may display the WEA 70 , or perform any other suitable action, even if it is without cellular service.
- FIG. 13 is a TLV code for indicating a lack of location 140 , according to embodiments of the present disclosure.
- the TLV code includes the tag 139 (e.g., 0110), as shown in FIG. 6 .
- the TLV code also includes a length 280 of a value 282 of the TLV code, and the value 282 .
- the value 282 of the TLV code may include a WEA identifier 284 , a lack of location time limit 286 , and a lack of location action 288 .
- the WEA identifier 284 may enable the user equipment 10 to identify the WEA 70 for which the lack of location time limit 286 and the lack of location action 288 correspond.
- the lack of location action 288 includes an action for the user equipment 10 to perform after it has been unable to determine its location for the lack of location time limit 286 .
- the lack of location action 288 may include displaying or otherwise outputting the WEA 70 , or an action defined by implementation of the user equipment 10 .
- the user equipment 10 may display the WEA 70 upon being unable to determine its location for the lack of location time limit 286 . If the lack of location action 288 is a second value (e.g., a logic high or 1 value), then the user equipment 10 may perform an action defined by implementation of the user equipment 10 .
- a first value e.g., a logic low or 0 value
- the user equipment 10 may display the WEA 70 upon being unable to determine its location for the lack of location time limit 286 .
- a second value e.g., a logic high or 1 value
- the WEA identifier 156 may be sent in multiple (e.g., successive in some cases) WHAMs 74 .
- the lack of location time limit 286 may be based on one or more parameters set and sent by the alerting authority 62 or the network 67 .
- the lack of location time limit 286 may be based on a maximum wait time indicated in a system information block (SIB) sent from the base station 68 to the user equipment 10 to establish a connection.
- SIB system information block
- the MAX WAIT TIME parameter as defined in ATIS standards specification 0700041 section 5.2.8, which is broadcasted with geofencing coordinates, may be used as the lack of location time limit 286 .
- the lack of location time limit 286 may be expressed in seconds, and include any suitable time to wait for cellular service to be restored to the user equipment 10 before the lack of location action 288 is performed, such as at least 10 seconds, 30 seconds, 45 seconds, 60 seconds, 90 seconds, 120 seconds, 255 seconds, and so on. In this manner, the user equipment 10 may display the WEA 70 , or perform any other suitable action, even if it is unable to determine its location.
- FIG. 14 is a method 300 for performing the lack of location action 288 after being unable to determine a location of the user equipment 10 for the lack of location time limit 286 , according to embodiments of the present disclosure.
- Any suitable device e.g., a controller
- the method 300 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as the memory 14 or storage 16 , using the processor 12 .
- the method 300 may be performed at least in part by one or more software components of the user equipment 10 , such as an operating system of the user equipment 10 , one or more software applications of the user equipment 10 , and the like. While the method 300 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether.
- the processor 12 receives a WEA 70 with an indication of a geofenced area 80 .
- decision block 304 the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, at process block 306 , the processor 12 displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then the processor 12 may not display the WEA 70 , and may wait to receive a WHAM 74 .
- the processor 12 receives a WHAM 74 with a lack of location time limit 286 and a lack of location action 288 .
- the WHAM 74 may include tag 139 (e.g., 0110), length 280 , and value 282 format shown in FIG. 13 .
- the WHAM 74 may include the WEA identifier 284 , the lack of location time limit 286 , and/or the lack of location action 288 shown in FIG. 13 .
- the WEA identifier 156 may enable the user equipment 10 to identify the WEA 70 for which the lack of location time limit 286 and the lack of location action 288 correspond.
- the WEA identifier 156 may be defined as per ATIS 0700041 specification section 5.1.6: Active alert identity tuple.
- the lack of location action 288 includes an action for the user equipment 10 to perform after it has been unable to determine its location for the lack of location time limit 286 .
- the processor 12 determines whether the user equipment 10 is within the geofenced area 80 . If so, the processor 12 , in process block 306 , displays or otherwise outputs the WEA 70 . If the processor 12 determines that the user equipment 10 is not within the geofenced area 80 , then, in decision block 312 , the processor 12 determines whether the user equipment 10 is able to determine its location. That is, the processor 12 may determine whether its device-specific location determination technique and/or GNSS or GPS service is operational.
- the processor 12 may return to decision block 312 to determine whether the user equipment 10 is within the geofenced area 80 . If the processor 12 determines that the user equipment 10 is unable to determine its location, then, in decision block 314 , the processor 12 determines whether the lack of action time limit 286 has elapsed. If not, the processor 12 returns to decision block 312 to determine whether the user equipment 10 is within the geofenced area 80 . If the processor 12 determines that the lack of action time limit 286 has elapsed, then, in process block 316 , the processor 12 performs the lack of location action 288 .
- the lack of location action 288 may include displaying or otherwise outputting the WEA 70 , or an action defined by implementation of the user equipment 10 . In this manner, the user equipment 10 may display the WEA 70 , or perform any other suitable action, even if it cannot determine its location.
- the disclosed embodiment include providing certain information (e.g., indications of the geofenced area 80 , duration of an alert 64 , and so on) in a WHAM 74
- additional information that may be relevant to the alert 64 may also be provided (e.g., in the corresponding WEA 70 and/or the WHAM 74 ).
- the additional information may be received via a CAP message 66 from the alerting authority 62 by the network 67 via the base station 68 .
- the additional information may include CAP information elements like a source of the alert 64 (e.g., the United States Geological Survey), a category of the alert 64 (e.g., geological), an event description of the alert 64 (e.g., earthquake warning), a response type of the alert 64 (e.g., asking users to take shelter), an urgency of the alert 64 (e.g., immediate), a severity of the alert 64 (e.g., severe), a certainty of the alert 64 (e.g., observed), and so on.
- CAP information elements like a source of the alert 64 (e.g., the United States Geological Survey), a category of the alert 64 (e.g., geological), an event description of the alert 64 (e.g., earthquake warning), a response type of the alert 64 (e.g., asking users to take shelter), an urgency of the alert 64 (e.g., immediate), a severity of the alert 64 (e.g., severe), a certainty of the alert 64 (e.g., observed), and
- personally identifiable information should follow privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining the privacy of users.
- personally identifiable information data should be managed and handled so as to minimize risks of unintentional or unauthorized access or use, and the nature of authorized use should be clearly indicated to users.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Emergency Management (AREA)
- Environmental & Geological Engineering (AREA)
- Public Health (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A base station receives an alert indicating a geofenced area, and determines whether its coverage area is completely within the area. If so, the base station generates/sends a wireless emergency alert (WEA) to user equipment in the coverage area that does not indicate the area. Otherwise, the base station generates/sends a WEA that indicates the area. The base station sends action messages that indicate a periodicity and end time for the user equipment to determine whether its location is within the geofenced area, a lack of service time limit and lack of service action for the user equipment to perform after it has been without cellular service for the lack of service time limit, a lack of location time limit and lack of location action for the user equipment to perform if its location cannot be determined for the lack of location time limit, and/or that the WEA has ended.
Description
- This application is a continuation of and claims priority to U.S. application Ser. No. 17/579,357, filed Jan. 19, 2022, entitled “WIRELESS EMERGENCY ALERT GEOFENCING ENHANCEMENTS,” which claims priority to U.S. Provisional Application No. 63/192,219, filed May 24, 2021, entitled “WIRELESS EMERGENCY ALERT GEOFENCING ENHANCEMENTS,” each of which is incorporated by reference in its entirety for all purposes.
- The present disclosure relates generally to wireless emergency alerts, and more specifically to transmitting wireless emergency alerts to user equipment in or around a targeted geographical area.
- A wireless emergency alert (WEA) is an alert defined by the Alliance for Telecommunications Industry Solutions (ATIS) sent to wireless mobile devices (e.g., cell phones, pagers, and so on) via a 3rd Generation Partnership Project (3GPP) network (e.g., a 4th generation (4G) cellular network, a 5th generation (5G) cellular network, and so on). A WEA may include, for example, presidential alerts, imminent threat alerts, child abduction emergency or AMBER (America's Missing: Broadcast Emergency Response) alerts, public safety alerts, and the like. The WEA may be sent by a Commercial Mobile Alert System (CMAS). Some WEAs, such as those conforming to the ATIS WEA 3.0 standard, may indicate a geofenced area (e.g., where the WEAs are relevant or applicable). User equipment receiving the WEA may determine whether the user equipment is located within the geofenced area, and, if so, display or otherwise output the WEA. However, in certain circumstances, determining whether the user equipment is located within the geofenced area may be inefficient, or even unnecessary. Moreover, there may be difficulties for user equipment that are located outside the geofenced area when receiving the WEA, but later enter the geofenced area.
- A summary of certain embodiments disclosed herein is set forth below. It should be understood that these aspects are presented merely to provide the reader with a brief summary of these certain embodiments and that these aspects are not intended to limit the scope of this disclosure. Indeed, this disclosure may encompass a variety of aspects that may not be set forth below.
- In one embodiment, a base station having a receiver, a transmitter, and at least one processor. The at least one processor receives, via the receiver, an alert message from an alert originator. The alert message includes an indication of a geofenced area. The at least one processor also determines whether a coverage area of the base station is within the geofenced area, and, in response to determining that the coverage area is completely within the geofenced area, sends, using the transmitter, a first wireless emergency alert without the indication of the geofenced area to user equipment in the coverage area. The at least one processor further, in response to determining that the coverage area is not completely within the geofenced area, sends, using the transmitter, a second wireless emergency alert comprising the indication of the geofenced area to the user equipment in the coverage area.
- In another embodiment, a method performed by user equipment includes receiving, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area. The method also includes, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receiving, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area. The one or more action messages have a periodicity and an end time. The method further includes, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determining that the end time has not elapsed. The method includes, in response to determining that the end time has not elapsed, determining that the periodicity has elapsed, and, in response to determining that the periodicity has elapsed, determining that the user equipment is within the geofenced area. The method also includes, in response to determining that the end time has elapsed, ending processing of the wireless emergency alert.
- In yet another embodiment, a non-transitory computer-readable medium stores computer-executable instructions that, when executed by one or more processors of user equipment, cause the one or more processors to receive, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, in response to determining that the user equipment is within the geofenced area, display the wireless emergency alert. The instructions also cause the one or more processors to, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receive, via the receiver of the user equipment, one or more action messages comprising an indication to end the wireless emergency alert. The instructions further cause the one or more processors to, in response to receiving the one or more action messages, end processing of the wireless emergency alert.
- In another embodiment, a method performed by user equipment includes receiving, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receiving, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area. The one or more action messages have a lack of service time limit and a lack of service action. The method also includes, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determining that the user equipment does not have cellular service, and, in response to determining that the user equipment does not have cellular service, determining that the lack of service time limit has elapsed. The method further includes, in response to determining that the lack of service time limit has elapsed, performing the lack of service action.
- In yet another embodiment, a non-transitory computer-readable medium stores computer-executable instructions that, when executed by one or more processors of user equipment, cause the one or more processors to receive, via a receiver of the user equipment, a wireless emergency alert to determine whether the user equipment is within a geofenced area, and, after determining that the user equipment is not within the geofenced area in response to receiving the wireless emergency alert, receive, via the receiver of the user equipment, one or more action messages to determine whether the user equipment is within the geofenced area. The one or more action messages has a lack of location time limit and a lack of location action. The instructions also cause the one or more processors to, after determining that the user equipment is not within the geofenced area in response to receiving the one or more action messages, determine whether a location of the user equipment can be determined, and, in response to determining that the location of the user equipment cannot be determined, determine whether the lack of location time limit has elapsed. The instructions further cause the one or more processors to, in response to determining that the lack of location time limit has elapsed, perform the lack of location action.
- Various refinements of the features noted above may exist in relation to various aspects of the present disclosure. Further features may also be incorporated in these various aspects as well. These refinements and additional features may exist individually or in any combination. For instance, various features discussed below in relation to one or more of the illustrated embodiments may be incorporated into any of the above-described aspects of the present disclosure alone or in any combination. The brief summary presented above is intended only to familiarize the reader with certain aspects and contexts of embodiments of the present disclosure without limitation to the claimed subject matter.
- Various aspects of this disclosure may be better understood upon reading the following detailed description and upon reference to the drawings described below in which like numerals refer to like parts.
-
FIG. 1 is a block diagram of an electronic device (e.g., user equipment), according to embodiments of the present disclosure; -
FIG. 2 is a functional diagram of the electronic device ofFIG. 1 , according to embodiments of the present disclosure; -
FIG. 3 is a schematic diagram of a communication system that may send wireless emergency alerts (WEAs) to the electronic device ofFIG. 1 , according to embodiments of the present disclosure; -
FIG. 4 is a map illustrating a geofenced area as indicated by a WEA, according to embodiments of the present disclosure; -
FIG. 5 is a flowchart of a method for sending selectively sending WEAs to user equipment that indicate or do not indicate a geofenced area based on whether a coverage area is completely within the geofenced area, according to embodiments of the present disclosure; -
FIG. 6 is an example list of extended WEA Handset Action Message (WHAM) signaling, according to embodiments of the present disclosure; -
FIG. 7 is a tag-length-value (TLV) code for indicating a periodicity configuration for determining whether a location of user equipment is within a geofenced area, according to embodiments of the present disclosure; -
FIG. 8 is a method for periodically determining whether user equipment is located in a geofenced area, according to embodiments of the present disclosure; -
FIG. 9 is a TLV code for indicating an alert end, according to embodiments of the present disclosure; -
FIG. 10 is a method for ending processing of a WEA, according to embodiments of the present disclosure; -
FIG. 11 is a TLV code for indicating a lack of service, according to embodiments of the present disclosure; -
FIG. 12 is a method for performing a lack of service action after being without cellular service for a lack of service time limit, according to embodiments of the present disclosure; -
FIG. 13 is a TLV code for indicating a lack of location, according to embodiments of the present disclosure; -
FIG. 14 is a method for performing a lack of location action after being unable to determine a location of user equipment for a lack of location time limit, according to embodiments of the present disclosure. - One or more specific embodiments will be described below. In an effort to provide a concise description of these embodiments, not all features of an actual implementation are described in the specification. It should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another. Moreover, it should be appreciated that such a development effort might be complex and time consuming, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure.
- When introducing elements of various embodiments of the present disclosure, the articles “a,” “an,” and “the” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements. Additionally, it should be understood that references to “one embodiment” or “an embodiment” of the present disclosure are not intended to be interpreted as excluding the existence of additional embodiments that also incorporate the recited features. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Use of the term “approximately,” “near,” “about,” “close to,” and/or “substantially” should be understood to mean including close to a target (e.g., design, value, amount), such as within a margin of any suitable or contemplatable error (e.g., within 0.1% of a target, within 1% of a target, within 5% of a target, within 10% of a target, within 25% of a target, and so on).
- This disclosure is directed to wireless emergency alerts (WEAs), which, when conforming to the Alliance for Telecommunications Industry Solutions (ATIS) WEA 3.0 standard, may indicate a geofenced area. In particular, the WEA may be sent via a base station supporting a 3rd Generation Partnership Project (3GPP) network (e.g., a 4th generation (4G) cellular network, a 5th generation (5G) cellular network, and so on) to user equipment in a coverage area of the base station. The user equipment receiving the WEA may determine whether the user equipment is located within the geofenced area, and, if so, display or otherwise output the WEA. However, if, for example, the coverage area is completely within the geofenced area, then it may be unnecessary, and thus an inefficient use of processing and/or network resources, for the user equipment to determine whether it is located within the geofenced area.
- Moreover, there may be difficulties for user equipment that are located outside the geofenced area when receiving the WEA, but later enter the geofenced area. In particular, despite the network being configured to periodically resend WEAs, it is assumed (as may be defined by ATIS) that the user equipment will only determine if it is located within the geofenced area once. For user equipment that received the WEA when outside the geofenced area (and as such, did not output the WEA), the network may periodically broadcast a WEA Handset Action Message (WHAM) indicative of the WEA that requests that the user equipment re-determine whether it is located within the geofenced area. In some embodiments, the user equipment may not rely on WHAM exclusively to trigger geofencing. For example, the user equipment may have its own criteria (e.g., such as time-based criteria or timers) that, if met, may cause the user equipment to re-determine whether it is located within the geofenced area. In either case, the WHAM and/or the WEA may be used as an indicator of whether or not a given alert is active. If the user equipment enters the geofenced area, but loses cellular service, or it loses cellular service and enters geofenced area, it may not receive a WHAM and/or a WEA, and thus not display or otherwise output the WEA, despite being in the geofenced area where a user should know about the WEA. In the above mentioned scenario, even if the user equipment were to trigger a location check on its own, the user equipment may fail to determine its location (e.g., because signals enabling location determination, such as global navigation satellite system (GNSS) service or the Global Positioning System (GPS) service, are not received or observable), and thus not display or otherwise output the WEA, despite being in the geofenced area where a user should know about the WEA.
- Additionally, when an alert associated with a WEA ends, the network simply stops resending the periodic WEAs and WHAMs associated with the alert. However, if the user equipment is located outside or some distance away from the geofenced area when receiving the WEA, and the alert ends, but the user equipment later enters the geofenced area after the alert has ended, the user equipment may continue storing the WEA expecting a corresponding WHAM, and, in some cases, may continue determining to see if it is located in the geofenced area indicated by the WEA. This may unnecessarily expend processing and/or networking resources, and sometimes result in a WEA to be output well after the alert associated with the WEA has ended.
- Accordingly, embodiments herein provide systems and techniques that enable a base station of a network receiving an alert message indicating a geofenced area to determine whether an area covered by the base station is completely within the geofenced area. If so, then there may be no need for user equipment within the coverage area to determine whether it is located within the geofenced area, since the coverage area of the base station that is completely within the geofenced area. As such, the base station may generate and send a WEA based on the alert message that does not indicate the geofenced area to the user equipment in its coverage area, or, in some embodiments, the base station may indicate to the user equipment in its coverage area that geofencing is not required to be performed (e.g., using an additional flag). If the base station determines that its coverage area is not completely within the geofenced area (e.g., at least some of its coverage area is outside the geofenced area), then the base station may generate and send a WEA to the user equipment based on the alert message that indicates the geofenced area. In this manner, the user equipment in coverage areas that are completely located within the geofenced area may avoid using processing and/or networking resources to unnecessarily determine whether the user equipment is located within the geofenced area.
- The disclosed embodiments also enable signaling (e.g., in WHAMs) a periodicity for user equipment to determine whether its location is within a geofenced area indicated in a corresponding WEA. As such, if the user equipment enters the geofenced area and loses cellular service, but still retains GNSS/GPS service or has other means to determine its location (e.g., WiFi), then it may determine to see if it is in the geofenced area, and display the WEA. The signaling may also include an end time for the user equipment to determine whether its location is within the geofenced area, such that the user equipment may stop wasting processing and/or networking resources to determine whether its location is within the geofenced area after the end time. The signaling may further include a WEA identifier to enable identification of the WEA for which the periodicity and the end time correspond.
- The disclosed embodiments further enable signaling (e.g., in WHAMs) a lack of service time limit and a lack of service action for the user equipment to perform after it has been without cellular service for the lack of service time limit. As such, if the user equipment enters the geofenced area and loses cellular service, and does not regain cellular service within the lack of service time limit (or any other suitable criteria that may be used to determine that the user equipment is without cellular service), then the user equipment may perform the lack of service action. The lack of service action may include displaying or otherwise outputting the WEA, or any other suitable action programmed into the user equipment. The signaling may also include a WEA identifier to enable identification of the WEA for which the lack of service time limit and the lack of service action correspond. In this manner, the user equipment may display the WEA, or perform any other suitable action, even if it is without cellular service.
- Similarly, the disclosed embodiments enable signaling (e.g., in WHAMs) a lack of location time limit and a lack of location action for the user equipment to perform if the user equipment cannot determine its location for the lack of location time limit. As such, if the user equipment enters the geofenced area and is without cellular service and/or cannot determine its location, and does not regain its location determination service within the lack of location time limit, then the user equipment may perform the lack of location action. The lack of location action may include displaying or otherwise outputting the WEA, or any other suitable action programmed into the user equipment. The signaling may also include a WEA identifier to enable identification of the WEA for which the lack of location time limit and the lack of location action correspond. In this manner, the user equipment may display the WEA, or perform any other suitable action, even if it cannot determine its location.
- The disclosed embodiments may also enable signaling (e.g., in WHAMs) an alert end indication that indicates that the alert associated with the corresponding WEA has ended. That is, instead of the network simply stopping to resend the periodic WEAs and WHAMs associated with the alert, the network may send the alert end indication to indicate that the alert has ended. As such, the user equipment may avoid continued storage of a WEA and performing geofencing-related actions corresponding to the alert in expectation of a corresponding WHAM, and continued determinations to see if it is located in the geofenced area indicated by the WEA. The signaling may also include a WEA identifier to enable identification of the WEA for which the alert end indication corresponds. Thus, user equipment-side processing and/or networking resources may be conserved, and outputting a WEA well after the alert associated with the WEA has ended may be avoided.
- With the preceding in mind,
FIG. 1 is a block diagram of anelectronic device 10, according to embodiments of the present disclosure. Theelectronic device 10 may include, among other things, one or more processors 12 (collectively referred to herein as a single processor for convenience, which may be implemented in any suitable form of processing circuitry),memory 14,nonvolatile storage 16, adisplay 18,input structures 22, an input/output (I/O)interface 24, anetwork interface 26, and apower source 29. The various functional blocks shown inFIG. 1 may include hardware elements (including circuitry), software elements (including machine-executable instructions) or a combination of both hardware and software elements (which may be referred to as logic). Theprocessor 12,memory 14, thenonvolatile storage 16, thedisplay 18, theinput structures 22, the input/output (I/O)interface 24, thenetwork interface 26, and/or thepower source 29 may each be communicatively coupled directly or indirectly (e.g., through or via another component, a communication bus, a network) to one another to transmit and/or receive data between one another. It should be noted thatFIG. 1 is merely one example of a particular implementation and is intended to illustrate the types of components that may be present inelectronic device 10. - By way of example, the
electronic device 10 may include any suitable computing device, including a desktop or notebook computer (e.g., in the form of a MacBook®, MacBook® Pro, MacBook Air®, iMac®, Mac® mini, or Mac Pro® available from Apple Inc. of Cupertino, Calif.), a portable electronic or handheld electronic device such as a wireless electronic device or smartphone (e.g., in the form of a model of an iPhone® available from Apple Inc. of Cupertino, Calif.), a tablet (e.g., in the form of a model of an iPad® available from Apple Inc. of Cupertino, Calif.), a wearable electronic device (e.g., in the form of an Apple Watch® by Apple Inc. of Cupertino, Calif.), and other similar devices. It should be noted that theprocessor 12 and other related items inFIG. 1 may be generally referred to herein as “data processing circuitry.” Such data processing circuitry may be embodied wholly or in part as software, hardware, or both. Furthermore, theprocessor 12 and other related items inFIG. 1 may be a single contained processing module or may be incorporated wholly or partially within any of the other elements within theelectronic device 10. Theprocessor 12 may be implemented with any combination of general-purpose microprocessors, microcontrollers, digital signal processors (DSPs), field programmable gate array (FPGAs), programmable logic devices (PLDs), controllers, state machines, gated logic, discrete hardware components, dedicated hardware finite state machines, or any other suitable entities that may perform calculations or other manipulations of information. Theprocessors 12 may perform the various functions described herein and below. - In the
electronic device 10 ofFIG. 1 , theprocessor 12 may be operably coupled with amemory 14 and anonvolatile storage 16 to perform various algorithms. Such programs or instructions executed by theprocessor 12 may be stored in any suitable article of manufacture that includes one or more tangible, computer-readable media. The tangible, computer-readable media may include thememory 14 and/or thenonvolatile storage 16, individually or collectively, to store the instructions or routines. Thememory 14 and thenonvolatile storage 16 may include any suitable articles of manufacture for storing data and executable instructions, such as random-access memory, read-only memory, rewritable flash memory, hard drives, and optical discs. In addition, programs (e.g., an operating system) encoded on such a computer program product may also include instructions that may be executed by theprocessor 12 to enable theelectronic device 10 to provide various functionalities. - In certain embodiments, the
display 18 may facilitate users to view images generated on theelectronic device 10. In some embodiments, thedisplay 18 may include a touch screen, which may facilitate user interaction with a user interface of theelectronic device 10. Furthermore, it should be appreciated that, in some embodiments, thedisplay 18 may include one or more liquid crystal displays (LCDs), light-emitting diode (LED) displays, organic light-emitting diode (OLED) displays, active-matrix organic light-emitting diode (AMOLED) displays, or some combination of these and/or other display technologies. - The
input structures 22 of theelectronic device 10 may enable a user to interact with the electronic device 10 (e.g., pressing a button to increase or decrease a volume level). The I/O interface 24 may enableelectronic device 10 to interface with various other electronic devices, as may thenetwork interface 26. In some embodiments, the I/O interface 24 may include an I/O port for a hardwired connection for charging and/or content manipulation using a standard connector and protocol, such as the Lightning connector provided by Apple Inc. of Cupertino, Calif., a universal serial bus (USB), or other similar connector and protocol. Thenetwork interface 26 may include, for example, one or more interfaces for a personal area network (PAN), such as a BLUETOOTH® network, for a local area network (LAN) or wireless local area network (WLAN), such as a network employing one of the IEEE 802.11x family of protocols (e.g., WI-FI®), and/or for a wide area network (WAN), such as any standards related to the Third Generation Partnership Project (3GPP), including, for example, a 3rd generation (3G) cellular network, universal mobile telecommunication system (UMTS), 4th generation (4G) cellular network, long term evolution (LTE®) cellular network, long term evolution license assisted access (LTE-LAA) cellular network, 5th generation (5G) cellular network, and/or New Radio (NR) cellular network, a satellite network, and so on. In particular, thenetwork interface 26 may include, for example, one or more interfaces for using a Release-15 cellular communication standard of the 5G specifications that include the millimeter wave (mmWave) frequency range (e.g., 24.25-300 gigahertz (GHz)). Thenetwork interface 26 of theelectronic device 10 may allow communication over the aforementioned networks (e.g., 5G, Wi-Fi, LTE-LAA, and so forth). - The
network interface 26 may also include one or more interfaces for, for example, broadband fixed wireless access networks (e.g., WIMAX®), mobile broadband Wireless networks (mobile WIMAX®), asynchronous digital subscriber lines (e.g., ADSL, VDSL), digital video broadcasting-terrestrial (DVB-T®) network and its extension DVB Handheld (DVB-H®) network, ultra-wideband (UWB) network, alternating current (AC) power lines, and so forth. - As illustrated, the
network interface 26 may include atransceiver 30. In some embodiments, all or portions of thetransceiver 30 may be disposed within theprocessor 12. Thetransceiver 30 may support transmission and receipt of various wireless signals via one or more antennas, and thus include a transmitter and a receiver. Thepower source 29 of theelectronic device 10 may include any suitable source of power, such as a rechargeable lithium polymer (Li-poly) battery and/or an alternating current (AC) power converter. In certain embodiments, theelectronic device 10 may take the form of a computer, a portable electronic device, a wearable electronic device, or other type of electronic device. -
FIG. 2 is a functional diagram of theelectronic device 10 ofFIG. 1 , according to embodiments of the present disclosure. As illustrated, theprocessor 12, thememory 14, thetransceiver 30, atransmitter 52, areceiver 54, and/or the antennas 55 (illustrated as 55A-55N, collectively referred to as an antenna 55) may be communicatively coupled directly or indirectly (e.g., through or via another component, a communication bus, a network) to one another to transmit and/or receive data between one another. - The
electronic device 10 may include thetransmitter 52 and/or thereceiver 54 that respectively enable transmission and reception of data between theelectronic device 10 and an external device via, for example, a network (e.g., including base stations) or a direct connection. As illustrated, thetransmitter 52 and thereceiver 54 may be combined into thetransceiver 30. Theelectronic device 10 may also have one ormore antennas 55A-55N electrically coupled to thetransceiver 30. Theantennas 55A-55N may be configured in an omnidirectional or directional configuration, in a single-beam, dual-beam, or multi-beam arrangement, and so on. Each antenna 55 may be associated with a one or more beams and various configurations. In some embodiments, multiple antennas of theantennas 55A-55N of an antenna group or module may be communicatively coupled arespective transceiver 30 and each emit radio frequency signals that may constructively and/or destructively combine to form a beam. Theelectronic device 10 may include multiple transmitters, multiple receivers, multiple transceivers, and/or multiple antennas as suitable for various communication standards. - The
transmitter 52 may wirelessly transmit packets having different packet types or functions. For example, thetransmitter 52 may transmit packets of different types generated by theprocessor 12. Thereceiver 54 may wirelessly receive packets having different packet types. In some examples, thereceiver 54 may detect a type of a packet used and process the packet accordingly. In some embodiments, thetransmitter 52 and thereceiver 54 may transmit and receive information via other wired or wireline systems or means. - As illustrated, the various components of the
electronic device 10 may be coupled together by abus system 56. Thebus system 56 may include a data bus, for example, as well as a power bus, a control signal bus, and a status signal bus, in addition to the data bus. The components of theelectronic device 10 may be coupled together or accept or provide inputs to each other using some other mechanism. -
FIG. 3 is a schematic diagram of acommunication system 60 that may send wireless emergency alerts (WEAs) to theelectronic device 10 ofFIG. 1 , according to embodiments of the present disclosure. An alerting authority computing device 62 (referred to herein as an alerting authority) may generate an alert 64. The alertingauthority 62 may include one or more computing devices of a jurisdiction with the designated authority to alert or warn the public (e.g., at least people within a geographical region or geofenced area), and include at least some of the components of theelectronic device 10 shown inFIGS. 1 and/or 2 . The alertingauthority 62 may be one of over 1500 federal, state, local, tribal, and territorial authorities, such as weather authorities (e.g., the National Oceanic and Atmospheric Administration's (NOAA) National Weather Service (NWS)), missing persons' authorities (e.g., the National Center for Missing and Exploited Children), county authorities (e.g., the Pennsylvania Delaware Country authority), city authorities (e.g., the Texas City of Houston authority), emergency management authorities (e.g., the Michigan City of Lansing Emergency Management authority), public safety authorities (e.g., the North Carolina Department of Public Safety authority), law enforcement authorities (e.g., the Illinois State Police authority), homeland security authorities (e.g., the Wyoming Office of Homeland Security authority), and so on. In some embodiments, an alert originator (e.g., an individual person operating the alerting authority 62) employed by the alertingauthority 62 may generate the alert 64. The alert 64 may be related to an impending natural or manmade disaster, threat, or dangerous or missing person. For example, the alert 64 may include a presidential alert, imminent threat alert, child abduction emergency or AMBER (America's Missing: Broadcast Emergency Response) alert, and so on. - The alerting
authority 62 may generate a Common Alerting Protocol (CAP)message 66 based on the alert 64, which may include an indication of the alert 64, as well as other characteristics of the alert 64, such as a geofenced area (e.g., latitude and longitude coordinates of a geofence in the form of a shape or polygon) for which the alert 64 is relevant, a duration of time for which the alert 64 is relevant, and so on. TheCAP message 66 may be in the form of an international standard, and routed through the Federal Emergency Management Agency's (FEMA's) Integrated Public Alert and Warning System (IPAWS) tocommunication networks 67 provided by wireless (e.g., cellular) network providers having base stations within a relevant area of the alert 64 (e.g., based on the geofenced area defined in theCAP message 66, based on a defined radius from a defined point, using Federal Information Processing Standard (FIPS/county) codes, and so on). Accordingly, abase station 68A-C (collectively referred to as 68) may receive the illustratedCAP message 66. Thebase station 68 may include at least some of the components of theelectronic device 10 shown inFIGS. 1 and/or 2 . Moreover, it should be understood that thebase station 68 is considered part of thenetwork 67. - Upon receiving the
CAP message 66, thebase station 68 may generate aWEA 70 based on theCAP message 66 that indicates the alert 64. In some embodiments, thebase station 68 may include a receiver (in the form of thereceiver 54 as described above with respect to the electronic device 10), and receive theCAP message 66 using the receiver. Additionally or alternatively, thebase station 68 may receive theCAP message 66 over wired network-side cables (e.g., fiber cables). TheWEA 70, if conforming to the Alliance for Telecommunications Industry Solutions (ATIS) WEA 3.0 standard, may indicate the geofenced area. Thebase station 68 may then send theWEA 70 to user equipment (e.g., the electronic device 10) within itscoverage area 72A-C (e.g., an area or cell for which thebase station 68 provides network coverage, collectively referred to as 72). Thebase station 68 may provide any suitable network coverage, such as coverage for a 3rd Generation Partnership Project (3GPP) network (e.g., a 4th generation (4G) cellular network, a 5th generation (5G) cellular network, and so on). The network provider may cause thebase station 68 to repeatedly send theWEA 70 to theuser equipment 10 at a certain periodicity (e.g., between the range of every 1 second to every 24 hours, such as every 3 to 4 seconds, every 10-15 seconds, and so on). It should be noted that, even though the ATIS WEA standard,CAP messages 66, and 3GPP are referred to herein, these are merely example technologies for which the disclosed embodiments may apply. In additional or alternative embodiments, the systems and techniques disclosed herein may apply to other messaging and/or network technologies for example, regions outside of the United States, such as Canada, Europe and the European Telecommunications Standards Institute (ETSI), and so on. - Upon receipt of the
WEA 70, theuser equipment 10 may determine (using a device-specific location determination technique and/or a global navigation satellite system (GNSS) service, such as the Global Positioning System (GPS) service) whether it is located in the geofenced area (e.g., performing device-based geofencing (DBGF)). Despite thenetwork 67 or the network provider configured to periodically resend theWEA 70 via thebase station 68, it is assumed (as defined by ATIS) that theuser equipment 10 may only determine if it is located within the geofenced area one time. In particular, eachWEA 70 may have an identifier or serial number that enables theuser equipment 10 to perform duplication detection and not present theWEA 70 more than once. Because theuser equipment 10 may receive theWEA 70 when located outside the geofenced area (and as such, may not output theWEA 70 at that time), thenetwork 67 or the network provider may cause thebase station 68 to also periodically broadcast a WEA Handset Action Message (WHAM) 74 indicative of theWEA 70 that requests that theuser equipment 10 re-determine whether it is located within the geofenced area. Like theWEA 70, the periodicity of theWHAM 74 may include a range between every 1 second to every 24 hours, such as every 3 to 4 seconds, every 10-15 seconds, and so on. Also like theWEA 70, theWHAM 74 may include an identifier or serial number to enable the user equipment to perform duplicate detection so as to cause theuser equipment 10 to again determine whether it is located in the geofenced area. - However, if, for example, the coverage area 72 is completely within the geofenced area, then it may be unnecessary, and thus an inefficient use of processing and/or network resources, for the
user equipment 10 to determine whether it is located within the geofenced area. In particular, as geofencing becomes more common, more alerts 64 (e.g., public safety alerts, AMBER alerts, wildfire alerts, and the like) are broadcasted with geofencing parameters. In some cases, WEAs 70 may be broadcast togeofenced areas 80 that include entire counties, and even multiple cities. In such cases, coverage areas 72 (especially in the case of small or home cells, mmWave NR implementations, or multiple-input and multiple-output (MIMO)-based cellular implementations) may be much smaller than the geofencedarea 80.FIG. 4 is a map illustrating a geofenced area 80 (e.g., an alert area) as indicated by aWEA 70, according to embodiments of the present disclosure. The map also illustrates fourcoverage areas 72A-D, which may be provided by fourbase stations 68.Coverage areas coverage areas coverage areas area 80 and partially outside the geofencedarea 80. - Accordingly, if, for example, the
user equipment 10 is initially outside the geofenced area 80 (e.g., located in a portion ofcoverage area 72C that is outside the geofenced area 80) when it receives theWEA 70, then theuser equipment 10 may compare its location to the geofencedarea 80 indicated in theWEA 70, determine that it is not located in the geofencedarea 80, and not output theWEA 70. Theuser equipment 10 may receiveperiodic WEAs 70, but because, as defined by ATIS, theuser equipment 10 may only determine whether it is located within the geofencedarea 80 one time, it may no longer determine whether it is located within the geofencedarea 80 in response to receiving subsequent WEAs 70. Instead, theuser equipment 10 may receiveWHAMs 74 requesting that theuser equipment 10 determine whether it is located within the geofencedarea 80 indicated by theWEA 70. - However, if the
user equipment 10 has not determined whether it is located within the geofencedarea 80, and then proceeds to a coverage area (e.g., 72A) that is completely within the geofencedarea 80, then there is no need for theuser equipment 10 to determine whether it is located within the geofencedarea 80, as theentire coverage area 72A is within the geofencedarea 80. Accordingly, the disclosed embodiments enable thebase station 68 of acoverage area 72A that is completely within the geofencedarea 80 to send aWEA 70 to theuser equipment 10 that does not indicate the geofencedarea 80, such that theuser equipment 10 may avoid processing the geofencedarea 80 to unnecessarily determine whether it is located in the geofencedarea 80. If thebase station 68 determines that its coverage area (e.g., 72C) is not completely within the geofenced area, then thebase station 68 may generate and send aWEA 70 to theuser equipment 10 that indicates the geofencedarea 80. In this manner, theuser equipment 10 in coverage areas (e.g., 72A) that are completely located within the geofencedarea 80 may avoid using processing and/or networking resources to unnecessarily determine whether theuser equipment 10 is located within the geofencedarea 80. -
FIG. 5 is a flowchart of amethod 90 for sending selectively sending WEAs 70 touser equipment 10 that indicate or do not indicate ageofenced area 80 based on whether a coverage area 72 is completely within the geofencedarea 80, according to embodiments of the present disclosure. Any suitable device (e.g., a controller) that may control components of the alertingauthority 62, thenetwork 67, thebase station 68, and/or theuser equipment 10, such as theprocessor 12, may perform themethod 90. In some embodiments, themethod 90 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as thememory 14 orstorage 16, using theprocessor 12. For example, themethod 90 may be performed at least in part by one or more software components, such as an operating system, one or more software applications, and the like, of the alertingauthority 62, thebase station 68, and/or theuser equipment 10. While themethod 90 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether. - In
process block 92, the alertingauthority 62 generates an alert 64. The alert 64 may be related to an impending natural or manmade disaster, threat, or dangerous or missing person. Inprocess block 94, the alertingauthority 62 generates analert message 66 based on the alert 64. Thealert message 66 may be in the form of a Common Alerting Protocol (CAP) message, and may include an indication of the alert 64, as well as other characteristics of the alert 64, such as ageofenced area 80 for which the alert 64 is relevant, a duration of time for which the alert 64 is relevant, and so on. - In
process block 96, the alertingauthority 62 sends thealert message 66 to thebase station 68. In particular, thealert message 66 may be routed through FEMA's IPAWS to thebase station 68 of anetwork 67 or the network provider located within a relevant area of the alert 64. The alertingauthority 62 may send the alert message to thebase station 68 based on the geofencedarea 80 defined in thealert message 66, based on a defined radius from a defined point, using Federal Information Processing Standard (FIPS/county) codes, and so on. - In
process block 98, thebase station 68 receives thealert message 66, and, indecision block 100, determines whether a cell or coverage area 72 supported by thebase station 68 is completely within the geofencedarea 80. In particular, thebase station 68 may store an indication of its coverage area 72 (e.g., a radius from thebase station 68, latitude and longitude coordinates, and so on), and compare the indication of the coverage area 72 to the geofencedarea 80 indicated in thealert message 66. If thebase station 68 determines that its coverage area 72 is completely within the geofencedarea 80, then thebase station 68, inprocess block 102, generates and sends (e.g., broadcasts) aWEA 70 without an indication of the geofencedarea 80 touser equipment 10 in the coverage area 72. Additionally, in some embodiments, thenetwork 67 may determine to generate and send theWEA 70 viabase stations 68 that have coverage areas 72 that only slightly extend outside the geofenced area 80 (e.g., less than 50%, 30%, 25%, 20%, 15%, 10%, 8%, 7%, 5%, 3%, 2%, 1%, and so on, of the coverage area 72 extending outside the geofenced area 80) in order to conserve network resources. That is, thebase station 68 may generate theWEA 70 to indicate the alert 64, but not indicate the geofencedarea 80, since theuser equipment 10 is in a coverage area 72 that is completely within the geofencedarea 80, and thus has no need to determine whether it is in the geofencedarea 80. In some embodiments, theWEA 70 that does not have the indication of the geofencedarea 80 may conform of the ATIS WEA 2.0 standard, which does not include an indication of the geofencedarea 80. This may decrease processing usage of thebase station 68 to prepare theWEA 70 to include the coordinates of the geofencedarea 80. - In
process block 104, theuser equipment 10 receives and displays (or otherwise outputs) theWEA 70. As referred to herein, display or otherwise outputting theWEA 70 includes displaying or otherwise outputting an indication of the alert 64 corresponding to theWEA 70. For example, theuser equipment 10 may display an indication of the alert 64 on thedisplay 18. In some embodiments, theuser equipment 10 may output the alert 64 using additional or alternative devices, such as by outputting the alert 64 as audio data via speakers of theuser equipment 10, as haptic data by vibrating theuser equipment 10 via a motor of theuser equipment 10, and so on. This may decrease processing and network usage by the user equipment 10 (e.g., for determining its location using a device-specific location determination technique and/or a GNSS or GPS service, comparing its location to the geofencedarea 80, and so on). - If the
base station 68 determines that its coverage area 72 is not completely within the geofencedarea 80, then thebase station 68, inprocess block 106, generates and sends (e.g., broadcasts) aWEA 70 with an indication of the geofencedarea 80 touser equipment 10 in the coverage area 72. That is, thebase station 68 may generate theWEA 70 to indicate the alert 64, along with latitude and longitude coordinates of the geofencedarea 80 to theuser equipment 10. In some embodiments, theWEA 70 that includes the indication of the geofencedarea 80 may conform of the ATIS WEA 3.0 standard, which provides an indication of the geofencedarea 80. - In
process block 108, theuser equipment 10 receives theWEA 70. Indecision block 110, theuser equipment 10 determines whether it is located within the geofencedarea 80 indicated in theWEA 70. In particular, theuser equipment 10 may use a device-specific location determination technique and/or a GNSS or GPS service to determine its location, and compare its location to the geofencedarea 80. If theuser equipment 10 determines that it is located within the geofencedarea 80, then, inprocess block 112, theuser equipment 10 displays theWEA 70. Otherwise, if theuser equipment 10 determines that it is not located within the geofencedarea 80, then, inprocess block 114, theuser equipment 10 does not display or otherwise output theWEA 70. - There may also be difficulties for
user equipment 10 that are located outside the geofencedarea 80 when receiving theWEA 70, but later enter the geofencedarea 80. For example, referring back toFIG. 4 , if theuser equipment 10 is initially outside the geofenced area 80 (e.g., located in a portion ofcoverage area 72C that is outside the geofenced area 80) when it receives theWEA 70, then theuser equipment 10 may compare its location to the geofencedarea 80 indicated in theWEA 70, determine that it is not located in the geofencedarea 80, and not output theWEA 70. AWHAM 74 may then be sent to theuser equipment 10 that requests that theuser equipment 10 determine whether it is located within the geofencedarea 80 indicated by theWEA 70. However, ifuser equipment 10 enters the geofencedarea 80 but loses cellular service, it may not receive theWHAM 74, and thus not display or otherwise output theWEA 70, despite being in the geofencedarea 80 where a user should know about theWEA 70. - The disclosed embodiments enable signaling (e.g., in WHAMs 74) a periodicity for the
user equipment 10 to determine whether its location is within the geofencedarea 80 indicated in acorresponding WEA 70.FIG. 6 is an example list of extended WHAM signaling, according to embodiments of the present disclosure. In particular, a WHAM may be provided in a tag-length-value (TLV) format, where the WHAM includes a tag indicating a WHAM type, followed by a length of a value of the WHAM, and finally followed by the value itself. The example list illustratesbit positions identity tuple list 130. That is, theWHAM 74 including the 0001 tag 129 may be indicative of the alert 64 being sent by the alertingauthority 62. The 0010tag 131 corresponds to an active alert identity tuple list—common warning area coordinates 132. TheWHAM 74 including the 0010tag 131 may be indicative of a language (e.g., English, Spanish, and so on) of the alert 64, a language setting of theuser equipment 10, and the like. Both the 0001 and the 0010 tags 129, 131 may be defined by the ATIS WEA standards. - The 0011
tag 133 corresponds to a configuration action related to aperiodicity configuration 134. TheWHAM 74 including the 0011tag 133 may be indicative of a periodicity for determining whether a location of theuser equipment 10 is within the geofenced area 80 (e.g., indicated in a WEA 70). The 0100tag 135 corresponds to a configuration action related to indicating analert end 136. TheWHAM 74 including the 0100tag 135 may be indicative of an end to an alert 64. The 0101tag 137 corresponds to a configuration action related to a lack of service or no-service 138. TheWHAM 74 including the 0101tag 137 may be indicative of a time limit and an action to perform in case of lack of cellular service. The 0110tag 139 corresponds to a configuration action related to a lack of location orlocation determination 140. TheWHAM 74 including the 0110tag 139 may be indicative of a time limit and an action to perform in case of lack of location determination. The 1111 tag 141 corresponds to a Commercial Mobile Service Providers (CMSP) defined use. TheWHAM 74 including the 1111 tag 141 is reserved for authorized network providers to send public safety alerts and warnings touser equipment 10. - While
FIG. 6 illustrates extending WHAM signaling to indicate aperiodicity configuration 134 for determining whether a location of theuser equipment 10 is within the geofenced area 80 (e.g., the 0011 tag 133), an alert end 136 (e.g., the 0100 tag 135), a lack of service 138 (e.g., the 0101 tag 137), and a lack of location 140 (e.g., the 0110 tag 139), it should be understood that any additional or alternative form of signaling may be used to signal these indications touser equipment 10, such as signaling within a system information block (SIB) sent from thebase station 68 to theuser equipment 10 to establish a connection or via a dedicated radio resource control (RRC) connection. In particular, the SIB includes SIB types designated for, for example, Earthquake and Tsunami Warning System (ETWS) information (inSIB 10 and SIB 11), Commercial Mobile Alerting System (CMAS) information (in SIB 12), and so on. -
FIG. 7 is a TLV code for indicating aperiodicity configuration 134 for determining whether a location of theuser equipment 10 is within the geofencedarea 80, according to embodiments of the present disclosure. The TLV code includes the tag 133 (e.g., 0011), as shown inFIG. 6 . The TLV code also includes alength 152 of avalue 154 of the TLV code, and thevalue 154. As illustrated, thelength 152 field may be followed by a number of zeroes to, for example, reserve space in the field for future values. Thevalue 154 of the TLV code may include aWEA identifier 156, aperiodicity 158, and anend time 160. TheWEA identifier 156 may enable theuser equipment 10 to identify theWEA 70 for which theperiodicity 158 and theend time 160 correspond. Theperiodicity 158 may indicate how often (e.g., in seconds) theuser equipment 10 is to determine whether its location (e.g., using a device-specific location determination technique and/or a GNSS or GPS service) is within the geofenced area 80 (e.g., as indicated in the corresponding WEA 70). Theperiodicity 158 may be any suitable duration of time to periodically determine whether the location of theuser equipment 10 is within the geofencedarea 80, such as at least every 1 second, 5 seconds, 10 seconds, 30 seconds, 60 seconds, 90 seconds, 120 seconds, 300 seconds, 600 seconds, 1800 seconds, and so on. Theend time 160 may indicate a time for theuser equipment 10 to stop determining whether it is located in the geofencedarea 80. Theend time 160 may be any suitable duration of time to stop determining whether the location of theuser equipment 10 is within the geofencedarea 80, such as at least 5 seconds, 10 seconds, 30 seconds, 1 minute, 5 minutes, 10 minutes, 30 minutes, 1 hour, 2 hours, 4 hours, 5 hours, 8 hours, 12 hours, 18 hours, 24 hours, and so on. In some embodiments, theend time 160 may be provided in epoch time format. For example, aWHAM 74 that requests that theuser equipment 10 determine whether it is located in ageofenced area 80 every 5 minutes for 4 hours may include aperiodicity 158 of 5 minutes and anend time 160 of 4 hours. Additionally or alternatively, instead of sending theWEA identifier 156, theperiodicity 158, and/or theend time 160 in asignal WHAM 74, theWEA identifier 156, theperiodicity 158, and/or theend time 160 may be sent in multiple (e.g., successive in some cases)WHAMs 74. - In some embodiments, the
periodicity 158 and/or theend time 160 may be based on one or more parameters set and sent by the alertingauthority 62. That is, theperiodicity 158 and/or theend time 160 may be based on one or more parameters (e.g., a duration of the alert 64, an indication of when the alert 64 will end) that are part of aCAP message 66 received by thenetwork 67 via thebase station 68. As should be understood, thenetwork 67 or the network provider may generate theWHAM 74 with the TLV code for indicating theperiodicity configuration 134, and send theWHAM 74 to theuser equipment 10 via thebase station 68. Upon receiving theWHAM 74, theuser equipment 10 may determine whether its location is within the geofencedarea 80 according to theperiodicity 158, until theend time 160 has elapsed. As such, if theuser equipment 10 enters the geofencedarea 80 and loses cellular service, but still retains its device-specific location determination technique and/or GNSS or GPS service, then it may determine to see if it is in the geofencedarea 80, and display theWEA 70. - With this in mind,
FIG. 8 is amethod 170 for periodically determining whether theuser equipment 10 is located in ageofenced area 80, according to embodiments of the present disclosure. Any suitable device (e.g., a controller) that may control components of theuser equipment 10, such as theprocessor 12, may perform themethod 170. In some embodiments, themethod 170 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as thememory 14 orstorage 16, using theprocessor 12. For example, themethod 170 may be performed at least in part by one or more software components of theuser equipment 10, such as an operating system of theuser equipment 10, one or more software applications of theuser equipment 10, and the like. While themethod 170 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether. - In
process block 172, theprocessor 12 receives aWEA 70 with an indication of a geofencedarea 80. Indecision block 174, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, atprocess block 176, theprocessor 12 displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then theprocessor 12 may not display theWEA 70, and may wait to receive aWHAM 74. Inprocess block 178, theprocessor 12 receives aWHAM 74 with aperiodicity 158 and anend time 160. In some embodiments, theWHAM 74 may include tag 133 (e.g., 0011),length 152, andvalue 154 format shown inFIG. 7 . In any case, theWHAM 74 may include theWEA identifier 156, theperiodicity 158, and/or theend time 160 shown inFIG. 7 . TheWEA identifier 156 may enable theuser equipment 10 to identify theWEA 70 for which theperiodicity 158 and theend time 160 correspond. Theperiodicity 158 may indicate how often (e.g., in seconds) theuser equipment 10 is to determine whether its location (e.g., using a device-specific location determination technique and/or a GNSS or GPS service) is within the geofenced area 80 (e.g., as indicated in the corresponding WEA 70). Theend time 160 may indicate a time for theuser equipment 10 to stop determining whether it is located in the geofencedarea 80. - In
decision block 180, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, theprocessor 12, inprocess block 176, displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then, indecision block 182, theprocessor 12 determines whether theend time 160 provided in theWHAM 74 has elapsed. If not, indecision block 184, theprocessor 12 determines whether theperiodicity 158 provided in theWHAM 74 has elapsed. If not, therepeats decision block 184. If theprocessor 12 determines that theperiodicity 158 has elapsed, then the processor returns to decision block 182 to determine whether theend time 160 has elapsed. If so, theprocessor 12, inprocess block 186, ends processing of theWEA 70. That is, theprocessor 12 may no longer determine whether theuser equipment 10 is located in the geofencedarea 80. In this manner, even in the case that theuser equipment 10 enters the geofencedarea 80 and loses cellular service, but still retains using its device-specific location determination technique and/or GNSS or GPS service, theuser equipment 10 may continue determining whether it is in the geofencedarea 80, and, if so, display theWEA 70. - In addition, in some cases, the
network 67 may continue to broadcast theWHAMs 74 via thebase station 68, which may be received by theuser equipment 10. While theuser equipment 10 may be configured to ignore thesubsequent WHAMs 74, in some embodiments, theuser equipment 10 may choose to process theWHAMs 74 and determine whether it is located in the geofencedarea 80 based on receiving aWHAM 74, as opposed to determining whether it is located in the geofencedarea 80 based on theperiodicity 158. In particular, thenetwork 67 may indicate to theuser equipment 10 that theperiodicity 158 applies, for example, only when theuser equipment 10 does not have cellular service. In some embodiments, this may be a definition as per a contract between theuser equipment 10 and thenetwork 67. - Additionally, when an alert 64 associated with a WEA ends, the
network 67 may simply stop resending the periodic WEAs 70 andWHAMs 74 associated with the alert 64. However, if theuser equipment 10 is located outside the geofencedarea 80 when receiving theWEA 70, and the alert 64 ends, but theuser equipment 10 later enters the geofencedarea 80 after the alert 64 has ended, theuser equipment 10 may continue storing theWEA 70 expecting acorresponding WHAM 74, and, in some cases, may continue determining whether it is located in the geofencedarea 80 indicated by theWEA 70. This may unnecessarily expend processing and/or networking resources, and sometimes result in aWEA 70 to be output well after the alert 64 associated with theWEA 70 has ended. -
FIG. 9 is a TLV code for indicating analert end 136, according to embodiments of the present disclosure. The TLV code includes the tag 135 (e.g., 0100), as shown inFIG. 6 . The TLV code also includes alength 200 of avalue 202 of the TLV code, and thevalue 202. Thevalue 202 of the TLV code may include aWEA identifier 204, which may enable theuser equipment 10 to identify theWEA 70 for which thecorresponding alert 64 has ended. In some embodiments, theWHAM 74 indicating thealert end 136 may be based on one or more parameters set and sent by the alertingauthority 62. That is, theWHAM 74 indicating thealert end 136 may be based on one or more parameters (e.g., a duration of the alert 64, an indication of when the alert 64 will end) that are part of aCAP message 66 received by thenetwork 67 via thebase station 68. As should be understood, thenetwork 67 or the network provider may generate theWHAM 74 with the TLV code for indicating thealert end 136, and send theWHAM 74 to theuser equipment 10 via thebase station 68. Upon receiving theWHAM 74, theuser equipment 10 may stop processing the WEA 70 (e.g., stop determining whether its location is within the geofenced area 80). As such, theuser equipment 10 may avoid continued storage of aWEA 70 corresponding to the alert 64 in expectation of acorresponding WHAM 74, and continued determinations to see if it is located in the geofencedarea 80 indicated by theWEA 70. Thus, processing and/or networking resources may be conserved, and outputting aWEA 70 well after the alert 64 associated with theWEA 70 has ended may be avoided. - While
FIG. 9 illustrates aWHAM 74 indicating analert end 136, it should be understood that any additional or alternative form of signaling may be used to signal an end of an alert 64 touser equipment 10, such as signaling within a system information block (SIB) sent from thebase station 68 to theuser equipment 10 to establish a connection. In particular, an indication to end an alert 64 may be provided in a SIB, along with the WEA identifier 204 (e.g., a message identifier or serial number corresponding to the WEA 70). Moreover, in additional or alternative embodiments, an indication of a duration of the alert 64 may be sent via, for example, aWEA 70. In such embodiments, theuser equipment 10 may then determine when the alert 64 is over, rather than receiving an indication from theWHAM 74 indicating thealert end 136. - With this in mind,
FIG. 10 is amethod 210 for ending processing of aWEA 70, according to embodiments of the present disclosure. Any suitable device (e.g., a controller) that may control components of theuser equipment 10, such as theprocessor 12, may perform themethod 210. In some embodiments, themethod 210 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as thememory 14 orstorage 16, using theprocessor 12. For example, themethod 210 may be performed at least in part by one or more software components of theuser equipment 10, such as an operating system of theuser equipment 10, one or more software applications of theuser equipment 10, and the like. While themethod 210 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether. - In
process block 212, theprocessor 12 receives aWEA 70 with an indication of a geofencedarea 80. Indecision block 214, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, atprocess block 216, theprocessor 12 displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then theprocessor 12 may not display theWEA 70, and may wait to receive aWHAM 74. Inprocess block 218, theprocessor 12 receives aWHAM 74 with analert end indication 136. In some embodiments, theWHAM 74 may include tag 135 (e.g., 0100),length 200, andvalue 202 format shown inFIG. 9 . In any case, theWHAM 74 may include theWEA identifier 156 that enables theuser equipment 10 to identify theWEA 70 for which thecorresponding alert 64 has ended. Accordingly, inprocess block 220, theprocessor 12 ends processing of theWEA 70. That is, theprocessor 12 may no longer determine whether theuser equipment 10 is located in the geofencedarea 80. In this manner, theuser equipment 10 may avoid continued storage of aWEA 70 corresponding to the alert 64 in expectation of acorresponding WHAM 74, and continued determinations to see if it is located in the geofencedarea 80 indicated by theWEA 70. Thus, processing and/or networking resources may be conserved, and outputting aWEA 70 well after the alert 64 associated with theWEA 70 has ended may be avoided. - Furthermore, if the
user equipment 10 enters the geofencedarea 80, but loses cellular service, it may not receive aWHAM 74, and thus not display or otherwise output theWEA 70, despite being in the geofencedarea 80 where a user should know about theWEA 70.FIG. 11 is a TLV code for indicating a lack ofservice 138, according to embodiments of the present disclosure. The TLV code includes the tag 137 (e.g., 0101), as shown inFIG. 6 . The TLV code also includes alength 230 of avalue 232 of the TLV code, and thevalue 232. Thevalue 232 of the TLV code may include aWEA identifier 234, a lack ofservice time limit 236, and a lack ofservice action 238. TheWEA identifier 234 may enable theuser equipment 10 to identify theWEA 70 for which the lack ofservice time limit 236 and the lack ofservice action 238 correspond. The lack ofservice action 238 includes an action for theuser equipment 10 to perform after it has been without cellular service for the lack ofservice time limit 236. In some embodiments, the lack ofservice action 238 may include displaying or otherwise outputting theWEA 70, or an action defined by implementation of theuser equipment 10. For example, if the lack ofservice action 238 is a first value (e.g., a logic low or 0 value), then theuser equipment 10 may display theWEA 70 upon being without cellular service for the lack ofservice time limit 236. If the lack ofservice action 238 is a second value (e.g., a logic high or 1 value), then theuser equipment 10 may perform an action defined by implementation of theuser equipment 10. Additionally or alternatively, instead of sending theWEA identifier 156, the lack ofservice time limit 236, and/or the lack ofservice action 238 in asignal WHAM 74, theWEA identifier 156, the lack ofservice time limit 236, and/or the lack ofservice action 238 may be sent in multiple (e.g., successive in some cases)WHAMs 74. - In some embodiments, the lack of
service time limit 236 may be based on one or more parameters set and sent by the alertingauthority 62 or thenetwork 67. For example, the lack ofservice time limit 236 may be based on a maximum wait time indicated in a system information block (SIB) sent from thebase station 68 to theuser equipment 10 to establish a connection. The lack ofservice time limit 236 may be expressed in seconds, and include any suitable time to wait for cellular service to be restored to theuser equipment 10 before the lack ofservice action 238 is performed, such as at least 10 seconds, 30 seconds, 45 seconds, 60 seconds, 90 seconds, 120 seconds, 255 seconds, and so on. In this manner, theuser equipment 10 may display theWEA 70, or perform any other suitable action, even if it is without cellular service. - With this in mind,
FIG. 12 is amethod 250 for performing the lack ofservice action 238 after being without cellular service for the lack ofservice time limit 236, according to embodiments of the present disclosure. Any suitable device (e.g., a controller) that may control components of theuser equipment 10, such as theprocessor 12, may perform themethod 250. In some embodiments, themethod 250 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as thememory 14 orstorage 16, using theprocessor 12. For example, themethod 250 may be performed at least in part by one or more software components of theuser equipment 10, such as an operating system of theuser equipment 10, one or more software applications of theuser equipment 10, and the like. While themethod 250 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether. - In
process block 252, theprocessor 12 receives aWEA 70 with an indication of a geofencedarea 80. Indecision block 254, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, atprocess block 256, theprocessor 12 displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then theprocessor 12 may not display theWEA 70, and may wait to receive aWHAM 74. Inprocess block 258, theprocessor 12 receives aWHAM 74 with a lack ofservice time limit 236 and a lack ofservice action 238. In some embodiments, theWHAM 74 may include tag 137 (e.g., 0101),length 230, andvalue 232 format shown inFIG. 11 . In any case, theWHAM 74 may include theWEA identifier 234, the lack ofservice time limit 236, and/or the lack ofservice action 238 shown inFIG. 11 . TheWEA identifier 156 may enable theuser equipment 10 to identify theWEA 70 for which the lack ofservice time limit 236 and the lack ofservice action 238 correspond. The lack ofservice action 238 includes an action for theuser equipment 10 to perform after it has been without cellular service for the lack ofservice time limit 236. - In
decision block 260, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, theprocessor 12, inprocess block 256, displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then, indecision block 262, theprocessor 12 determines whether theuser equipment 10 has cellular service. That is, theprocessor 12 may determine whether it may send and/or receive signals using itstransmitter 52 and/orreceiver 54 over a cellular network 67 (e.g., via the base station 68). If so, then theprocessor 12 may not display theWEA 70, and may wait to receive aWHAM 74, returning to process block 258 to receive anotherWHAM 74 with a lack ofservice time limit 236 and a lack ofservice action 238. If theprocessor 12 determines that theuser equipment 10 does not have cellular service, then, indecision block 264, theprocessor 12 determines whether the lack ofservice time limit 236 has elapsed. If not, theprocessor 12 returns to decision block 262 to determine whether theuser equipment 10 has cellular service. If theprocessor 12 determines that the lack ofservice time limit 236 has elapsed, then, inprocess block 266, theprocessor 12 performs the lack ofservice action 238. For example, the lack ofservice action 238 may include displaying or otherwise outputting theWEA 70, or an action defined by implementation of theuser equipment 10. In this manner, theuser equipment 10 may display theWEA 70, or perform any other suitable action, even if it is without cellular service. - Similarly, if the
user equipment 10 enters the geofencedarea 80, but loses the ability to determine its location and/or its cellular service, (e.g., a device-specific location determination technique and/or a GNSS or GPS service, is not operational), it may receive aWHAM 74, but not be able to determine whether it is located in the geofencedarea 80, and thus not display or otherwise output theWEA 70, despite being in the geofencedarea 80 where a user should know about theWEA 70.FIG. 13 is a TLV code for indicating a lack oflocation 140, according to embodiments of the present disclosure. The TLV code includes the tag 139 (e.g., 0110), as shown inFIG. 6 . The TLV code also includes alength 280 of avalue 282 of the TLV code, and thevalue 282. Thevalue 282 of the TLV code may include aWEA identifier 284, a lack oflocation time limit 286, and a lack oflocation action 288. TheWEA identifier 284 may enable theuser equipment 10 to identify theWEA 70 for which the lack oflocation time limit 286 and the lack oflocation action 288 correspond. The lack oflocation action 288 includes an action for theuser equipment 10 to perform after it has been unable to determine its location for the lack oflocation time limit 286. In some embodiments, the lack oflocation action 288 may include displaying or otherwise outputting theWEA 70, or an action defined by implementation of theuser equipment 10. For example, like the lack ofservice action 238, if the lack oflocation action 288 is a first value (e.g., a logic low or 0 value), then theuser equipment 10 may display theWEA 70 upon being unable to determine its location for the lack oflocation time limit 286. If the lack oflocation action 288 is a second value (e.g., a logic high or 1 value), then theuser equipment 10 may perform an action defined by implementation of theuser equipment 10. Additionally or alternatively, instead of sending theWEA identifier 156, the lack oflocation time limit 286, and/or the lack oflocation action 288 in asignal WHAM 74, theWEA identifier 156, the lack oflocation time limit 286, and/or the lack oflocation action 288 may be sent in multiple (e.g., successive in some cases)WHAMs 74. - Like the lack of
service time limit 236, the lack oflocation time limit 286 may be based on one or more parameters set and sent by the alertingauthority 62 or thenetwork 67. For example, the lack oflocation time limit 286 may be based on a maximum wait time indicated in a system information block (SIB) sent from thebase station 68 to theuser equipment 10 to establish a connection. In some cases, the MAX WAIT TIME parameter, as defined in ATIS standards specification 0700041 section 5.2.8, which is broadcasted with geofencing coordinates, may be used as the lack oflocation time limit 286. The lack oflocation time limit 286 may be expressed in seconds, and include any suitable time to wait for cellular service to be restored to theuser equipment 10 before the lack oflocation action 288 is performed, such as at least 10 seconds, 30 seconds, 45 seconds, 60 seconds, 90 seconds, 120 seconds, 255 seconds, and so on. In this manner, theuser equipment 10 may display theWEA 70, or perform any other suitable action, even if it is unable to determine its location. - With this in mind,
FIG. 14 is amethod 300 for performing the lack oflocation action 288 after being unable to determine a location of theuser equipment 10 for the lack oflocation time limit 286, according to embodiments of the present disclosure. Any suitable device (e.g., a controller) that may control components of theuser equipment 10, such as theprocessor 12, may perform themethod 300. In some embodiments, themethod 300 may be implemented by executing instructions stored in a tangible, non-transitory, computer-readable medium, such as thememory 14 orstorage 16, using theprocessor 12. For example, themethod 300 may be performed at least in part by one or more software components of theuser equipment 10, such as an operating system of theuser equipment 10, one or more software applications of theuser equipment 10, and the like. While themethod 300 is described using steps in a specific sequence, it should be understood that the present disclosure contemplates that the described steps may be performed in different sequences than the sequence illustrated, and certain described steps may be skipped or not performed altogether. - In process block 302, the
processor 12 receives aWEA 70 with an indication of a geofencedarea 80. Indecision block 304, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, atprocess block 306, theprocessor 12 displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then theprocessor 12 may not display theWEA 70, and may wait to receive aWHAM 74. Inprocess block 308, theprocessor 12 receives aWHAM 74 with a lack oflocation time limit 286 and a lack oflocation action 288. In some embodiments, theWHAM 74 may include tag 139 (e.g., 0110),length 280, andvalue 282 format shown inFIG. 13 . In any case, theWHAM 74 may include theWEA identifier 284, the lack oflocation time limit 286, and/or the lack oflocation action 288 shown inFIG. 13 . TheWEA identifier 156 may enable theuser equipment 10 to identify theWEA 70 for which the lack oflocation time limit 286 and the lack oflocation action 288 correspond. TheWEA identifier 156 may be defined as per ATIS 0700041 specification section 5.1.6: Active alert identity tuple. The lack oflocation action 288 includes an action for theuser equipment 10 to perform after it has been unable to determine its location for the lack oflocation time limit 286. - In
decision block 310, theprocessor 12 determines whether theuser equipment 10 is within the geofencedarea 80. If so, theprocessor 12, inprocess block 306, displays or otherwise outputs theWEA 70. If theprocessor 12 determines that theuser equipment 10 is not within the geofencedarea 80, then, indecision block 312, theprocessor 12 determines whether theuser equipment 10 is able to determine its location. That is, theprocessor 12 may determine whether its device-specific location determination technique and/or GNSS or GPS service is operational. - If so, then the
processor 12 may return to decision block 312 to determine whether theuser equipment 10 is within the geofencedarea 80. If theprocessor 12 determines that theuser equipment 10 is unable to determine its location, then, indecision block 314, theprocessor 12 determines whether the lack ofaction time limit 286 has elapsed. If not, theprocessor 12 returns to decision block 312 to determine whether theuser equipment 10 is within the geofencedarea 80. If theprocessor 12 determines that the lack ofaction time limit 286 has elapsed, then, inprocess block 316, theprocessor 12 performs the lack oflocation action 288. For example, the lack oflocation action 288 may include displaying or otherwise outputting theWEA 70, or an action defined by implementation of theuser equipment 10. In this manner, theuser equipment 10 may display theWEA 70, or perform any other suitable action, even if it cannot determine its location. - While the disclosed embodiment include providing certain information (e.g., indications of the geofenced
area 80, duration of an alert 64, and so on) in aWHAM 74, additional information that may be relevant to the alert 64 may also be provided (e.g., in the correspondingWEA 70 and/or the WHAM 74). In particular, the additional information may be received via aCAP message 66 from the alertingauthority 62 by thenetwork 67 via thebase station 68. For instance, the additional information may include CAP information elements like a source of the alert 64 (e.g., the United States Geological Survey), a category of the alert 64 (e.g., geological), an event description of the alert 64 (e.g., earthquake warning), a response type of the alert 64 (e.g., asking users to take shelter), an urgency of the alert 64 (e.g., immediate), a severity of the alert 64 (e.g., severe), a certainty of the alert 64 (e.g., observed), and so on. - It is well understood that the use of personally identifiable information should follow privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining the privacy of users. In particular, personally identifiable information data should be managed and handled so as to minimize risks of unintentional or unauthorized access or use, and the nature of authorized use should be clearly indicated to users.
- The specific embodiments described above have been shown by way of example, and it should be understood that these embodiments may be susceptible to various modifications and alternative forms. It should be further understood that the claims are not intended to be limited to the particular forms disclosed, but rather to cover all modifications, equivalents, and alternatives falling within the spirit and scope of this disclosure.
- The techniques presented and claimed herein are referenced and applied to material objects and concrete examples of a practical nature that demonstrably improve the present technical field and, as such, are not abstract, intangible or purely theoretical. Further, if any claims appended to the end of this specification contain one or more elements designated as “means for [perform]ing [a function] . . . ” or “step for [perform]ing [a function] . . . ,” it is intended that such elements are to be interpreted under 35 U.S.C. 112(f). However, for any claims containing elements designated in any other manner, it is intended that such elements are not to be interpreted under 35 U.S.C. 112(f).
Claims (20)
1. A user equipment device, comprising:
a receiver configured to:
receive a wireless emergency alert, and
receive one or more action messages based on the wireless emergency alert, the one or more action messages comprising a lack of location time limit and a lack of location action; and
one or more processors coupled to the receiver and configured to:
determine that the lack of location time limit has elapsed based on not determining a location of the user equipment, and
perform the lack of location action based on the lack of location time limit elapsing.
2. The user equipment device of claim 1 , wherein the one or more action messages comprise a wireless emergency alert identifier corresponding to the wireless emergency alert.
3. The user equipment device of claim 1 , wherein the one or more action messages comprise a first field comprising a tag indicating a type of the one or more action messages, a second field comprising a length of a value, and a third field comprising the value.
4. The user equipment device of claim 3 , wherein the value of the one or more action messages comprises a wireless emergency alert identifier, the lack of location time limit, and the lack of location action.
5. The user equipment device of claim 1 , wherein the receiver is configured to receive a system information block comprising a maximum wait time, and the lack of location time limit comprising the maximum wait time.
6. The user equipment device of claim 1 , wherein the lack of location action comprises displaying the wireless emergency alert.
7. The user equipment device of claim 1 , wherein the lack of location action is based on an implementation of the user equipment.
8. The user equipment device of claim 1 , wherein the one or more action messages conform to an Alliance for Telecommunications Industry Solutions (ATIS) Wireless Emergency Alert (WEA) standard.
9. A non-transitory, computer-readable medium, comprising computer-executable instructions that, when executed by one or more processors of user equipment, cause the one or more processors to:
receive, via a receiver of the user equipment, one or more action messages associated with a wireless emergency alert, the one or more action messages comprising a lack of location time limit;
determine that the lack of location time limit has elapsed based on not determining a location of the user equipment; and
display, via a display of the user equipment, the wireless emergency alert based on the lack of location time limit elapsing.
10. The non-transitory, computer-readable medium of claim 9 , wherein the one or more action messages comprise a wireless emergency alert identifier corresponding to the wireless emergency alert.
11. The non-transitory, computer-readable medium of claim 9 , wherein the one or more action messages conform to an Alliance for Telecommunications Industry Solutions (ATIS) Wireless Emergency Alert (WEA) standard.
12. The non-transitory, computer-readable medium of claim 9 , wherein the one or more action messages comprise a first field comprising a tag indicating a type of the one or more action messages, a second field comprising a length of a value, and a third field comprising the value.
13. The non-transitory, computer-readable medium of claim 12 , wherein the value of the one or more action messages comprises a wireless emergency alert identifier and the lack of location time limit.
14. The non-transitory, computer-readable medium of claim 9 , wherein the instructions are configured to cause the one or more processors to receive, via the receiver of the user equipment, a system information block comprising a maximum wait time, and the lack of location time limit comprising the maximum wait time.
15. A method performed by user equipment, comprising:
receiving, via a receiver of the user equipment, a wireless emergency alert;
receiving, via the receiver of the user equipment, one or more action messages based on the wireless emergency alert, the one or more action messages comprising
a periodicity indicative of a frequency, and
an indication to end the wireless emergency alert, the indication comprising an end time to stop determining whether the user equipment is within a geofenced area; and
ending processing of the wireless emergency alert based on the end time elapsing.
16. The method of claim 15 , wherein the geofenced area comprises latitude and longitude coordinates.
17. The method of claim 15 , wherein the one or more action messages conforms to an Alliance for Telecommunications Industry Solutions (ATIS) Wireless Emergency Alert (WEA) standard.
18. The method of claim 15 , wherein the one or more action messages comprise a wireless emergency alert identifier corresponding to the wireless emergency alert.
19. The method of claim 15 , wherein the one or more action messages comprise a first field comprising a tag indicating a type of the one or more action messages, a second field comprising a length of a value, and a third field comprising the value.
20. The method of claim 19 , wherein the value comprises a wireless emergency alert identifier, the periodicity, and the indication to end the wireless emergency alert.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/901,588 US20220417722A1 (en) | 2021-05-24 | 2022-09-01 | Wireless emergency alert geofencing enhancements |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163192219P | 2021-05-24 | 2021-05-24 | |
US17/579,357 US12058598B2 (en) | 2021-05-24 | 2022-01-19 | Wireless emergency alert geofencing enhancements |
US17/901,588 US20220417722A1 (en) | 2021-05-24 | 2022-09-01 | Wireless emergency alert geofencing enhancements |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/579,357 Continuation US12058598B2 (en) | 2021-05-24 | 2022-01-19 | Wireless emergency alert geofencing enhancements |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220417722A1 true US20220417722A1 (en) | 2022-12-29 |
Family
ID=81384903
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/579,357 Active 2042-03-07 US12058598B2 (en) | 2021-05-24 | 2022-01-19 | Wireless emergency alert geofencing enhancements |
US17/901,588 Abandoned US20220417722A1 (en) | 2021-05-24 | 2022-09-01 | Wireless emergency alert geofencing enhancements |
US18/763,769 Pending US20240357336A1 (en) | 2021-05-24 | 2024-07-03 | Wireless emergency alert geofencing enhancements |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/579,357 Active 2042-03-07 US12058598B2 (en) | 2021-05-24 | 2022-01-19 | Wireless emergency alert geofencing enhancements |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/763,769 Pending US20240357336A1 (en) | 2021-05-24 | 2024-07-03 | Wireless emergency alert geofencing enhancements |
Country Status (4)
Country | Link |
---|---|
US (3) | US12058598B2 (en) |
EP (2) | EP4243459A3 (en) |
CA (1) | CA3157399A1 (en) |
MX (1) | MX2022006227A (en) |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100557082B1 (en) * | 1998-09-08 | 2006-06-16 | 삼성전자주식회사 | Effective Service Area Calculation Method of Sector Base Station According to Antenna Type |
US7783299B2 (en) * | 1999-01-08 | 2010-08-24 | Trueposition, Inc. | Advanced triggers for location-based service applications in a wireless location system |
US8620342B2 (en) * | 2006-10-10 | 2013-12-31 | Broadcom Corporation | Sensing RF environment to determine geographic location of cellular base station |
US8300560B2 (en) * | 2007-12-28 | 2012-10-30 | Motorola Mobility Llc | Using auxiliary information to direct users of wireless devices to safety in response to emergency alert system alerts |
US8200183B2 (en) * | 2008-03-05 | 2012-06-12 | Motorola Solutions, Inc. | Determining wireless system availability using emergency alert system messaging |
US20090291630A1 (en) | 2008-03-17 | 2009-11-26 | Dunn Timothy N | Geographic targeting of alerts |
US8478225B2 (en) | 2008-05-20 | 2013-07-02 | At&T Mobility Ii Llc | Method for geo-targeting wireless emergency alerts |
US9118776B2 (en) * | 2011-06-03 | 2015-08-25 | Apple Inc. | Location monitoring feature of a mobile device for activating an application subsystem |
US20140088965A1 (en) * | 2012-09-27 | 2014-03-27 | Polaris Wireless, Inc. | Associating and locating mobile stations based on speech signatures |
KR101997771B1 (en) | 2013-04-08 | 2019-07-08 | 삼성전자주식회사 | Apparatas and method for offered a geofence service of low electric power in an electronic device |
US9572002B2 (en) * | 2013-10-22 | 2017-02-14 | Patrocinium Systems LLC | Interactive emergency information and identification systems and methods |
CN104581613B (en) * | 2013-10-29 | 2019-07-30 | 索尼公司 | Enhance the method and apparatus of the proximity service discovery between user apparatus |
US9654953B2 (en) * | 2013-11-27 | 2017-05-16 | Blackberry Limited | Method and apparatus for wireless emergency alerts |
US9773404B2 (en) * | 2014-07-11 | 2017-09-26 | SHIELDtech Inc. | Module mobile emergency notification system |
US9706484B2 (en) * | 2015-04-16 | 2017-07-11 | Apple Inc. | Varying HP-PLMN scan rate using scan history |
US20170094490A1 (en) * | 2015-07-09 | 2017-03-30 | GeoVisible, Inc. | Method and system for wireless communication in emergency situation |
US10104536B2 (en) * | 2015-07-09 | 2018-10-16 | GeoVisible, Inc. | Method and system for user equipment identification in a network |
US10045149B2 (en) * | 2015-07-09 | 2018-08-07 | GeoVisible, Inc. | Method and system for user equipment identification in a network |
KR101698519B1 (en) * | 2015-07-14 | 2017-01-20 | 현대자동차주식회사 | Mobile terminal, control method thereof, audio video navigation terminal, vehicle management center, program and recording medium |
US10375758B2 (en) * | 2017-02-16 | 2019-08-06 | At&T Intellectual Property I, L.P. | Wi-Fi communication of wireless emergency alerts |
EP3619929A4 (en) * | 2017-05-02 | 2021-04-21 | Ac&C, Llc | Emergency alert user system and method |
US10225803B1 (en) * | 2017-09-01 | 2019-03-05 | Apple Inc. | Energy budgeted system recovery |
US10805784B2 (en) * | 2018-02-07 | 2020-10-13 | Qualcomm Incorporated | Methods and systems for efficient location support for wireless emergency alerts |
WO2019160968A1 (en) | 2018-02-13 | 2019-08-22 | Nokia Technologies Oy | Support of latest fcc requirement of device-based geo-targeting |
US11252780B2 (en) | 2019-09-24 | 2022-02-15 | Apple Inc. | Wireless emergency alert end determination |
US11184734B1 (en) | 2020-08-19 | 2021-11-23 | T-Mobile Usa, Inc. | Using geofencing areas to improve road safety use cases in a V2X communication environment |
US11743686B2 (en) * | 2020-11-25 | 2023-08-29 | Here Global B.V. | Aligning in-vehicle mobile device and vehicle bodies for improved global positioning |
US11775702B2 (en) * | 2021-02-03 | 2023-10-03 | Titan Health & Security Technologies, Inc. | AR enhanced structural transformation estimator and modeling engine |
-
2022
- 2022-01-19 US US17/579,357 patent/US12058598B2/en active Active
- 2022-04-19 CA CA3157399A patent/CA3157399A1/en active Pending
- 2022-04-21 EP EP23181749.5A patent/EP4243459A3/en active Pending
- 2022-04-21 EP EP22169261.9A patent/EP4096249A3/en not_active Withdrawn
- 2022-05-23 MX MX2022006227A patent/MX2022006227A/en unknown
- 2022-09-01 US US17/901,588 patent/US20220417722A1/en not_active Abandoned
-
2024
- 2024-07-03 US US18/763,769 patent/US20240357336A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
MX2022006227A (en) | 2022-11-25 |
EP4243459A2 (en) | 2023-09-13 |
CA3157399A1 (en) | 2022-11-24 |
EP4096249A3 (en) | 2022-12-28 |
EP4096249A2 (en) | 2022-11-30 |
EP4243459A3 (en) | 2023-12-13 |
US20220377520A1 (en) | 2022-11-24 |
US12058598B2 (en) | 2024-08-06 |
US20240357336A1 (en) | 2024-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9747784B2 (en) | Emergency system and method | |
US9232378B2 (en) | Locating a victim via a first responder's device | |
US9137635B2 (en) | Wireless user based notification system | |
US9654953B2 (en) | Method and apparatus for wireless emergency alerts | |
US10911915B2 (en) | Device and method for providing V2P service on basis of proximity-based service direct communication | |
US11425645B2 (en) | CMAS alert procedures over Wi-Fi for low power devices | |
US8565716B2 (en) | Devices, systems and methods for detecting proximal traffic | |
US20090318110A1 (en) | Method and apparatus for transmission of emergency messages | |
JP6984016B2 (en) | Methods and devices for transmitting alarm information | |
US12046141B2 (en) | Local broadcast to trigger collision-avoidance procedure | |
US11659373B2 (en) | Wireless emergency alert message failure notification and targeted retry | |
US12058598B2 (en) | Wireless emergency alert geofencing enhancements | |
US20210243583A1 (en) | Location based emergency alert | |
JP6340336B2 (en) | Mobile communication terminal and output control method | |
US20230247385A1 (en) | Wireless Communications Systems with Social Distancing Identification | |
US20230081455A1 (en) | Improved communication of prioritized data | |
CN115866752A (en) | Information forwarding via sidelink relays | |
US20210243584A1 (en) | Locating method for emergency caller with assistance vectoring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |