5g Mobile Device Based Regional Patrolling Over Highways

Sivakumar; Gandhi ;   et al.

Patent Application Summary

U.S. patent application number 17/011031 was filed with the patent office on 2022-03-03 for 5g mobile device based regional patrolling over highways. The applicant listed for this patent is International Business Machines Corporation. Invention is credited to Lynn Kwok, Kushal S. Patel, Sarvesh S. Patel, Gandhi Sivakumar.

Application Number20220068116 17/011031
Document ID /
Family ID
Filed Date2022-03-03

United States Patent Application 20220068116
Kind Code A1
Sivakumar; Gandhi ;   et al. March 3, 2022

5G MOBILE DEVICE BASED REGIONAL PATROLLING OVER HIGHWAYS

Abstract

In an approach to 5G mobile device based regional patrolling over highways, a fifth generation (5G) mobile ad-hoc network is enabled based on data received from checkpoints. A 5G traffic channel is connected between the 5G mobile ad-hoc network and a virtual network function (VNF). Responsive to detecting that a vehicle containing a 5G UE device is in the ad-hoc network, a 5G traffic channel is connected between the UE device in the vehicle and the VNF. Responsive to receiving location information from the UE device in the vehicle, the location trajectory for the vehicle is determined. Responsive to determining that the location trajectory for the vehicle is improbable, a signal is sent to a patrol manager, where the signal includes a last received location for the vehicle.


Inventors: Sivakumar; Gandhi; (Bentleigh, AU) ; Kwok; Lynn; (Bundoora, AU) ; Patel; Kushal S.; (Pune, IN) ; Patel; Sarvesh S.; (Pune, IN)
Applicant:
Name City State Country Type

International Business Machines Corporation

Armonk

NY

US
Appl. No.: 17/011031
Filed: September 3, 2020

International Class: G08B 25/14 20060101 G08B025/14; H04W 84/18 20060101 H04W084/18; H04W 4/021 20060101 H04W004/021; G06Q 50/26 20060101 G06Q050/26; H04W 76/12 20060101 H04W076/12; G01S 13/50 20060101 G01S013/50

Claims



1. A computer-implemented method for 5G mobile device based regional patrolling over highways, the computer-implemented method comprising the steps of: enabling, by one or more computer processors, a fifth generation (5G) mobile ad-hoc network based on a data received from one or more checkpoints; connecting, by the one or more computer processors, a first 5G traffic channel between the 5G mobile ad-hoc network and a virtual network function (VNF); responsive to detecting a vehicle containing a 5G UE device in the 5G mobile ad-hoc network, connecting, by the one or more computer processors, a second 5G traffic channel between the 5G UE device in the vehicle and the VNF, wherein the second 5G traffic channel is a lightweight dedicated traffic channel (DTCH); responsive to receiving a location information from the 5G UE device in the vehicle, determining, by the one or more computer processors, a location trajectory for the vehicle; and responsive to determining that the location trajectory for the vehicle is improbable, sending, by the one or more computer processors, a signal to a patrol manager, wherein the signal includes a last received location for the vehicle.

2. The computer-implemented method of claim 1, wherein each checkpoint of the one or more checkpoints is a stationary structure that contain the 5G UE device and is positioned along a highway to be patrolled.

3. The computer-implemented method of claim 1, wherein the first 5G traffic channel includes a DTCH between each checkpoint of the one or more checkpoints and an eNodeB and an S1 bearer channel between the eNodeB and a serving gateway (SGW).

4. The computer-implemented method of claim 1, wherein responsive to determining that the location trajectory for the vehicle is improbable, sending the signal to the patrol manager, wherein the signal includes the last received location for the vehicle further comprises: detecting, by the one or more computer processors, if the location trajectory for the vehicle is unusual; responsive to determining that the location trajectory for the vehicle is unusual, retrieving, by the one or more computer processors, the location information for one or more other active 5G UE devices in the 5G mobile ad-hoc network from the VNF; retrieving, by the one or more computer processors, a list of location objects for the last received location for the vehicle from a map-based location determination system; and determining, by the one or more computer processors, if the last received location for the vehicle is improbable based on the location information for the one or more other active 5G UE devices and the list of location objects from the map-based location determination system.

5. The computer-implemented method of claim 1, wherein responsive to determining that the location trajectory for the vehicle is improbable, utilizing the second 5G traffic channel to establish a voice communications between the checkpoint and the vehicle.

6. The computer-implemented method of claim 1, wherein enabling the 5G mobile ad-hoc network based on the data received from the one or more checkpoints further comprises: receiving, by the one or more computer processors, one or more data structures required for enablement of the mobile ad-hoc network; loading, by the one or more computer processors, a default setting mode of operation; and determining, by the one or more computer processors, a boundary definition of the 5G mobile ad-hoc network based on the one or more data structures.

7. The computer-implemented method of claim 1, wherein responsive to receiving the location information from the 5G UE device in the vehicle, determining the location trajectory for the vehicle further comprises: polling, by the one or more computer processors, the vehicle continuously for the location information using a service daemon running in the VNF; and determining, by the one or more computer processors, the location trajectory for the vehicle based on the location information from the service daemon.

8. A computer program product for 5G mobile device based regional patrolling over highways, the computer program product comprising one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions including instructions to: enable a fifth generation (5G) mobile ad-hoc network based on a data received from one or more checkpoints; connect a first 5G traffic channel between the 5G mobile ad-hoc network and a virtual network function (VNF); responsive to detecting a vehicle containing a 5G UE device in the 5G mobile ad-hoc network, connect a second 5G traffic channel between the 5G UE device in the vehicle and the VNF, wherein the second 5G traffic channel is a lightweight dedicated traffic channel (DTCH); responsive to receiving a location information from the 5G UE device in the vehicle, determine a location trajectory for the vehicle; and responsive to determining that the location trajectory for the vehicle is improbable, send a signal to a patrol manager, wherein the signal includes a last received location for the vehicle.

9. The computer program product of claim 8, wherein each checkpoint of the one or more checkpoints is a stationary structure that contain the 5G UE device and is positioned along a highway to be patrolled.

10. The computer program product of claim 8, wherein the first 5G traffic channel includes a DTCH between each checkpoint of the one or more checkpoints and an eNodeB and an S1 bearer channel between the eNodeB and a serving gateway (SGW).

11. The computer program product of claim 8, wherein responsive to determining that the location trajectory for the vehicle is improbable, send the signal to the patrol manager, wherein the signal includes the last received location for the vehicle further comprises one or more of the following program instructions, stored on the one or more computer readable storage media, to: detect if the location trajectory for the vehicle is unusual; responsive to determining that the location trajectory for the vehicle is unusual, retrieve the location information for one or more other active 5G UE devices in the 5G mobile ad-hoc network from the VNF; retrieve a list of location objects for the last received location for the vehicle from a map-based location determination system; and determine if the last received location for the vehicle is improbable based on the location information for the one or more other active 5G UE devices and the list of location objects from the map-based location determination system.

12. The computer program product of claim 8, wherein responsive to determining that the location trajectory for the vehicle is improbable, utilizing the second 5G traffic channel to establish a voice communications between the checkpoint and the vehicle.

13. The computer program product of claim 8, wherein enable the 5G mobile ad-hoc network based on the data received from the one or more checkpoints further comprises one or more of the following program instructions, stored on the one or more computer readable storage media, to: receive one or more data structures required for enablement of the mobile ad-hoc network; load a default setting mode of operation; and determine a boundary definition of the 5G mobile ad-hoc network based on the one or more data structures.

14. The computer program product of claim 8, wherein responsive to receiving the location information from the 5G UE device in the vehicle, determine the location trajectory for the vehicle further comprises one or more of the following program instructions, stored on the one or more computer readable storage media, to: poll the vehicle continuously for the location information using a service daemon running in the VNF; and determine the location trajectory for the vehicle based on the location information from the service daemon.

15. A computer system for 5G mobile device based regional patrolling over highways, the computer system comprising: one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the stored program instructions including instructions to: enable a fifth generation (5G) mobile ad-hoc network based on a data received from one or more checkpoints; connect a first 5G traffic channel between the 5G mobile ad-hoc network and a virtual network function (VNF); responsive to detecting a vehicle containing a 5G UE device in the 5G mobile ad-hoc network, connect a second 5G traffic channel between the 5G UE device in the vehicle and the VNF, wherein the second 5G traffic channel is a lightweight dedicated traffic channel (DTCH); responsive to receiving a location information from the 5G UE device in the vehicle, determine a location trajectory for the vehicle; and responsive to determining that the location trajectory for the vehicle is improbable, send a signal to a patrol manager, wherein the signal includes a last received location for the vehicle.

16. The computer system of claim 15, wherein each checkpoint of the one or more checkpoints is a stationary structure that contain the 5G UE device and is positioned along a highway to be patrolled.

17. The computer system of claim 15, wherein the first 5G traffic channel includes a DTCH between each checkpoint of the one or more checkpoints and an eNodeB and an S1 bearer channel between the eNodeB and a serving gateway (SGW).

18. The computer system of claim 15, wherein responsive to determining that the location trajectory for the vehicle is improbable, send the signal to the patrol manager, wherein the signal includes the last received location for the vehicle further comprises one or more of the following program instructions, stored on the one or more computer readable storage media, to: detect if the location trajectory for the vehicle is unusual; responsive to determining that the location trajectory for the vehicle is unusual, retrieve the location information for one or more other active 5G UE devices in the 5G mobile ad-hoc network from the VNF; retrieve a list of location objects for the last received location for the vehicle from a map-based location determination system; and determine if the last received location for the vehicle is improbable based on the location information for the one or more other active 5G UE devices and the list of location objects from the map-based location determination system.

19. The computer system of claim 15, wherein responsive to determining that the location trajectory for the vehicle is improbable, utilizing the second 5G traffic channel to establish a voice communications between the checkpoint and the vehicle.

20. The computer system of claim 15, wherein enable the 5G mobile ad-hoc network based on the data received from the one or more checkpoints further comprises one or more of the following program instructions, stored on the one or more computer readable storage media, to: receive one or more data structures required for enablement of the mobile ad-hoc network; load a default setting mode of operation; and determine a boundary definition of the 5G mobile ad-hoc network based on the one or more data structures.
Description



BACKGROUND

[0001] The present invention relates generally to the field of traffic control systems for road vehicles, and more particularly to fifth generation (5G) mobile device based regional patrolling over highways.

[0002] 5G technology refers to the next generation of wireless technology that will replace the 4G Long Term Evolution (LTE) standard. 5G, the 5th generation of mobile networks, is a significant evolution of 4G LTE networks. 5G has been designed to meet the very large growth in data and connectivity not only of User Equipment (UE) such as smart phones, but also the internet of things (IoT) with billions of connected devices, and new technologies such as driverless cars. 5G will initially operate in conjunction with existing 4G networks before evolving to fully standalone networks in subsequent releases and coverage expansions.

SUMMARY

[0003] Embodiments of the present invention disclose a method, a computer program product, and a system for 5G mobile device based regional patrolling over highways. In one embodiment, a fifth generation (5G) mobile ad-hoc network is enabled based on data received from checkpoints. A 5G traffic channel is connected between the 5G mobile ad-hoc network and a virtual network function (VNF). Responsive to detecting that a vehicle containing a 5G UE device is in the ad-hoc network, a 5G traffic channel is connected between the UE device in the vehicle and the VNF. Responsive to receiving location information from the UE device in the vehicle, the location trajectory for the vehicle is determined. Responsive to determining that the location trajectory for the vehicle is improbable, a signal is sent to a patrol manager, where the signal includes a last received location for the vehicle.

BRIEF DESCRIPTION OF THE DRAWINGS

[0004] FIG. 1 is a functional block diagram illustrating a distributed data processing environment, in accordance with an embodiment of the present invention.

[0005] FIG. 2 is an example of a system overview of one possible embodiment of the present invention.

[0006] FIG. 3 is an example of initiating geographic status information in one possible embodiment of the present invention.

[0007] FIG. 4 is an example of the Virtual Network Function (VNF) data collection and locator function in one possible embodiment of the present invention.

[0008] FIG. 5 is a flowchart depicting operational steps of the section of code performed by the instance of the 5G vigilance program running at the checkpoints, within the distributed data processing environment of FIG. 1, in accordance with an embodiment of the present invention.

[0009] FIG. 6 is a flowchart depicting operational steps of the section of code performed by the instance of the 5G vigilance program running at the VNF systems, within the distributed data processing environment of FIG. 1, in accordance with an embodiment of the present invention.

[0010] FIG. 7 is a flowchart depicting operational steps of the section of code performed by the instance of the 5G vigilance program running at the orchestration service, within the distributed data processing environment of FIG. 1, in accordance with an embodiment of the present invention.

[0011] FIG. 8 is a flowchart depicting operational steps of the section of code performed by the instance of the 5G vigilance program running on the UE device, within the distributed data processing environment of FIG. 1, in accordance with an embodiment of the present invention.

[0012] FIG. 9 depicts a block diagram of components of the computing devices executing the 5G vigilance program within the distributed data processing environment of FIG. 1, in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION

[0013] 5G offers a nearly unlimited mobile broadband experience, providing massive connectivity for everything from human-held smart devices to sensors and machines, and most importantly, it has the ability to support critical machine communications with instant action and ultra-high reliability. One of the key features of 5G is that the network itself is intelligent and cognitive. Metro Ethernet technologies provide a common physical transport platform together with a Hardware Abstraction Layer (HAL) that allows support for multiple services under one physical infrastructure umbrella and allows the creation and management of multiple dedicated logical channels for specialized services.

[0014] One of the most important of these technologies is the "new radio," massive Multiple Input Multiple Output (MIMO) antennae that play an important role in achieving wireless network capabilities that far surpass 4G LTE technology.

[0015] 5G architecture comprises multiple bearer channels from the RAN (Radio Access Network) between the UE device and the Evolved Node B (eNodeB, the 5G cellular base station). Both send and receive data in a bearer channel are transported by an S1 bearer between a Serving Gateway (SGW) and an eNodeB, and by a radio bearer between a UE and an eNodeB. The application traffic is transmitted and controlled using one or more logical channels that are established on top of the radio bearer and the S1 bearer.

[0016] A highway typically has staff that patrol for the safety of the people using the highway. This often includes a patrol office at a toll plaza or rest area on the highway, with a staff that monitors the vehicles on the highway and patrol vehicles to help travelers during emergencies.

[0017] Smart highways utilize closed-circuit television (CCTV) for video surveillance, with cameras placed along the highway to help identify people in need of help. Since the cameras are unable to cover the entire highway, a person in need of assistance may be out of view from these cameras, and hence may not be detected unless a patrol vehicle happens to spot them. The present invention proposes a smart approach for patrolling the highways using 5G technology and logical channeling over the 5G network to detect and locate people on the highway that are in need of help. The present invention uses smart monitoring tools placed at the service orchestration layer of the 5G network that identifies improbable patterns of vehicle movement and notifies the patrol staff of the vehicle status and geographic position to enable help to be dispatched without user intervention. This can be critical if the user is unable to summon help due to injury from, for example, a traffic accident.

[0018] The present invention is a computer-implemented method, computer program product and system that integrates a 5G Virtual Network Function and Service Orchestration Layer to monitor the vehicles on the highway between checkpoints, which are stationary structures such as a toll plaza or a rest stop, for additional patrolling. The invention includes the checkpoint that communicates with the 5G VNF via a dedicated traffic channel (DTCH). This dedicated traffic channel will be used to transfer the vehicle location data across the VFN to the signaling devices at the checkpoints. The signaling device instance contains a thin layer of software implementation that connects with other vehicle mounted IoT devices using a 5G ad-hoc network. In an embodiment, these IoT devices may include, for example, a GPS incorporated directly into the vehicle. When a device comes in the range of the intelligent patrolling checkpoints, the vehicle sends the Universally Unique Identifier (UUID) of the UE device (which could be the International Mobile Equipment Identity (IMEI) number or unique keys like the International Mobile Subscriber Identity (IMSI) or the Temporary Mobile Subscriber Identities (TMSI) number sent by the eNodeB). The information about the device UUID is received by the patrolling monitor device which sends the information to the VNF via Medium Access Control (MAC) based communication established over a dedicated traffic channel of the 5G network.

[0019] In an embodiment, the instance of the present invention running in the VNF continuously polls for the UUID of the UE device for which the detailed patrolling needs to be started or updated. In an embodiment, a map-based location tracking system is invoked when the UUID of the UE device is received by the VNF instance. The location tracking channel is active the whole time the UE device is in the patrol area, from its initial inception at the checkpoint. The VNF keeps track of each newly created DTCH created by each Physical Network Function (PNF) in the patrol region. The VNF maintains the map of all the location tracking channels that are created in the region.

[0020] In an embodiment, this service tracks the UE device movement over the highway and determines the trajectory on the road of the vehicle containing the UE device. The GPS location of this UE device is collected using another special purpose lightweight DTCH created between the UE device in the vehicle and the cell tower that continuously sends the location of the UE device to the service instance. The location trajectory is plotted from the location data and vehicle movement is tracked. This geographic coordinate information is sent to the trajectory path mapper which is part of the service orchestration layer of the 5G network.

[0021] In an embodiment, the present invention includes a service in the 5G orchestration layer instance that polls for the information supplied from the VNF and Virtualized Infrastructure Manager (VIM) functions that manage the dedicated channel monitoring across the infrastructure and the UE locations when enabled. This service in the orchestration plane collects the information from the VNF instance about the device UUID and coordinates and provides insights for the movement pattern of the vehicle. If an unusual pattern is detected by the service, then the service sends an alert message to the patrolling manager device (at the checkpoint) along with the latest coordinates of the vehicle. The unusual pattern could be, for example, the car stopped at a location with no other vehicles. The information about other active devices in the region is collected from the VNF to the service orchestration instance of the invention. For example, if a vehicle stops in between the checkpoints, then the present invention triggers the VNF to collect additional data. In response, the VNF gathers additional data like active users in the area, etc. The map-based location determination system is invoked to get the location objects for the location where the car has stopped. These collected objects are tagged and are sent to the orchestration instance and used to make the determination whether the pattern is improbable. For example, if the vehicle has stopped at a location where no other vehicles are stopped, and the location objects indicate that this is not a location where vehicles normally stop, e.g., a rest stop, then the stop is considered improbable.

[0022] In an embodiment, the instance of the present invention in the VNF translates the DTCH to UE map based on metadata mapper objects and sends the data using MAC-based data exchange to the service orchestration plane. The daemon instance of the present invention in the service plane collects the information from the VNF and inserts the location tracking for the respective UE devices and polls for the geo-locations continuously. In an embodiment, monitoring of these channels is performed based on pre-defined policies. In another embodiment, monitoring of these channels is performed based on dynamic interval policies.

[0023] For example, if a vehicle containing the UE device stops on the highway, then the service instance locates the trajectory paths of UE devices with no velocity and triggers additional data collection to the VNF for that UE device. Once the map-based tagged objects are received by the service instance, it determines the location point. If the location has, for example, a coffee shop, then the service instance predicts that the user stopped to have a cup of coffee. Other example tags could be a picnic area, a scenic photography area, etc. If none of these obvious tags are detected, and the vehicle has been stopped beyond a threshold period of time, then the stop is considered improbable and an alarm notification is sent to the patrolling staff or checkpoint location with the location of the vehicle.

[0024] In an embodiment, once the trigger is received by the patrolling staff or at the checkpoints, the checkpoint staff can respond to the location and provide assistance. In an embodiment, the dedicated logical channel between the checkpoint staff and the UUID of the UE device in the vehicle can be used to communicate directly with the user of the UE device. With this dedicated channel, the staff can inquire about the status and offer assistance to the person easily. This avoids unnecessary patrol response efforts when assistance is not necessary and improves the ability to locate the people seeking assistance on the highway.

[0025] As referred to herein, all data retrieved, collected, and used, is used in an opt in manner, i.e., the data provider has given permission for the data to be used. For example, the installation procedure for a user equipment device, such as a smart phone, that would be used to collect data could include an option that must be selected by the owner to allow use of the data. As another example, the 5G vigilance program could request approval from the owner of the device before collecting the data. Any data or information used for which the provider has not opted in is data that is publicly available.

[0026] FIG. 1 is a functional block diagram illustrating a distributed data processing environment, generally designated 100, suitable for operation of 5G vigilance program 112, 142, and 152 in accordance with at least one embodiment of the present invention. The term "distributed" as used herein describes a computer system that includes multiple, physically distinct devices that operate together as a single computer system. FIG. 1 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made by those skilled in the art without departing from the scope of the invention as recited by the claims.

[0027] Distributed data processing environment 100 includes computing device 110, and UE 140 and 150, all connected to LTE network 130. Computing device 110 is also connected to network 120. Network 120 can be, for example, a telecommunications network, a local area network (LAN), a wide area network (WAN), such as the Internet, or a combination of the three, and can include wired, wireless, or fiber optic connections. Network 120 can include one or more wired and/or wireless networks that are capable of receiving and transmitting data, voice, and/or video signals, including multimedia signals that include voice, data, and video information. In general, network 120 can be any combination of connections and protocols that will support communications between computing device 110 and other computing devices (not shown) within distributed data processing environment 100.

[0028] Computing device 110 can be a standalone computing device, a management server, a web server, a mobile computing device, or any other electronic device or computing system capable of receiving, sending, and processing data. In an embodiment, computing device 110 can be a laptop computer, a tablet computer, a netbook computer, a personal computer (PC), a desktop computer, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with other computing devices (not shown) within distributed data processing environment 100 via network 120. In another embodiment, computing device 110 can represent a server computing system utilizing multiple computers as a server system, such as in a cloud computing environment. In yet another embodiment, computing device 110 represents a computing system utilizing clustered computers and components (e.g., database server computers, application server computers) that act as a single pool of seamless resources when accessed within distributed data processing environment 100.

[0029] UE 140 and 150 can each be a smart phone, standalone computing devices, a computer device incorporated into a vehicle, a management server, a web server, a mobile computing device, or any other electronic device or computing system capable of receiving, sending, and processing data. In an embodiment, UE 140 and 150 can each be a laptop computer, a tablet computer, a netbook computer, a personal computer (PC), a desktop computer, a personal digital assistant (PDA), a smart phone, or any programmable electronic device capable of communicating with other computing devices (not shown) within distributed data processing environment 100 via 5G network 130. In an embodiment, UE 140 and 150 can each incorporate a location tracking device, e.g., a GPS or navigation system.

[0030] In an embodiment, computing device 110 includes instance 5G vigilance program 112 and UE 140 and 150 each includes an instance of 5G vigilance program 142 and 152, respectively. In an embodiment, 5G vigilance program 112, 142 and 152, are a program, application, or subprogram of a larger program for 5G mobile device based regional patrolling. In an alternative embodiment, 5G vigilance program 112, 142 and 152 may be located on any other device accessible by computing device 110 via network 120 or UE 140 and 150 via 5G network 130.

[0031] In an embodiment, computing device 110 and UE 140 and 150 include information repository 114, 144, and 154, respectively. In an embodiment, information repository 114, 144, and 154 may be managed by 5G vigilance program 112, 142, and 152, respectively. In an alternate embodiment, information repository 114, 144, and 154 may be managed by the operating system of computing device 110, UE 140 or UE 150 alone, or together with, 5G vigilance program 112, 142, and 152. Information repository 114, 144, and 154 each is a data repository that can store, gather, compare, and/or combine information. In some embodiments, information repository 114, 144, and 154 are located externally to computing device 110, UE 140, and UE 150, and are accessed through a communication network, such as network 120 or 5G network 130. In some embodiments, information repository 114, 144, and 154 are stored on computing device 110, UE 140, and UE 150, respectively. In some embodiments, information repository 114, 144, and 154 may reside on another computing device (not shown), provided that information repository 114, 144, and 154 are accessible by computing device 110, UE 140, and UE 150, respectively. Information repository 114, 144, and 154 may include 5G system configuration data, geographic data, highway infrastructure data, patrol area data, ad-hoc boundary network data, other data that is received by 5G vigilance program 112, 142, and 152 from one or more sources, and data that is created by 5G vigilance program 112, 142, and 152.

[0032] Information repository 114, 144, and 154 may each be implemented using any volatile or non-volatile storage media for storing information, as known in the art. For example, Information repository 114, 144, and 154 may be implemented with a tape library, optical library, one or more independent hard disk drives, multiple hard disk drives in a redundant array of independent disks (RAID), SATA drives, solid-state drives (SSD), or random-access memory (RAM). Similarly, Information repository 114, 144, and 154 may be implemented with any suitable storage architecture known in the art, such as a relational database, an object-oriented database, or one or more tables.

[0033] FIG. 2 is an example of an overview of a system, generally designated 200, of one possible embodiment of the present invention. In this example, system 200 includes 5G Service and Programmability Plane 210, which is part of computing device 110 from FIG. 1. This is the system that interfaces to the 5G mobile network and implements the invention. 5G Service and Programmability Plane 210 includes 5G Infrastructure Management 212, which is the section of computing device 110 from FIG. 1 that interfaces to the 5G mobile network infrastructure and the cellular backhaul network, and Service Orchestration/Feedback/Improvement 214, which is the section of computing device 110 from FIG. 1 that performs the control functions of the present invention.

[0034] System 200 also includes core network 220, a network that allows communication between any number of computing devices, and will allow access to the internet or any other network access required by any of the devices or programs running on the devices. In an embodiment, core network 220 is network 120 from FIG. 1. Backhaul network 230 is the network connection between the cell sites and core network 220, which ensures the network connectivity of the end user. Network connection 222 is a connection between backhaul network 230 and core network 220.

[0035] System 200 also includes cell towers 240, which include all base station components, such as the eNodeBs, that make up the 5G mobile network. Cell towers 240 connect to UE 246 via DTCH connections 242. In the example illustrated in FIG. 2, UE 246 represents one UE device that is connected to the 5G mobile network. In an embodiment, system 200 may include any number of UE devices connected to the 5G network, for example, UE 140 and 150 of FIG. 1. Network connection 234 is a connection between the cell towers 240 and 5G infrastructure management 212.

[0036] Backhaul network 230 also includes network connections 236 and 238, which are alternate connections between the cell towers 240, 5G Infrastructure Management 212, and Service Orchestration/Feedback/Improvement 214. Backhaul network 230 also includes network connection 232 between backhaul network 230 and the cell towers 240.

[0037] System 200 also includes checkpoint 248, which represents a checkpoint that is connected to the 5G mobile network. In the example illustrated in FIG. 2, the checkpoint is a toll booth. In another example, the checkpoint may be a rest stop. DTCH 244 is a connection between checkpoint 248 and cell towers 240.

[0038] FIG. 3 is an example of initiating geographic status information in one possible embodiment of the present invention. In this example, UE device 310 is user equipment, for example, UE 140 and 150 of FIG. 1, or UE 246 of FIG. 2. UE device 310 is travelling on highway 320, which represents the road that is patrolled by security staff. The security staff could be police, the highway department, a service responsible for assisting travelers, or any other service that can provide assistance to travelers along the road. UE device 310 is connected via DTCH 306 to cell tower 302. DTCH 306 is, for example, DTCH connection 242 from FIG. 2. Cell tower 302 is, for example, cell tower 240 from FIG. 2. Patrol start location 308 is a checkpoint for the patrol area, such as checkpoint 248 from FIG. 2. As described above for FIG. 2, this checkpoint can be a toll plaza, rest stop, police station, etc. Patrol start location 308 is connected via DTCH 304 to cell tower 302. DTCH 304 is, for example, DTCH connection 242 from FIG. 2. Ad-hoc network boundary 322 is the network boundary area covered by cell tower 302. This represents the section of highway 320 that is within the range of the radio in cell tower 302.

[0039] In an embodiment illustrated in FIG. 3, UE 310 is travelling on highway 320 and passes through patrol start location 308, for example, a toll plaza. Patrol start location 308 sends a notification to cell tower 302 via DTCH 304 to start tracking UE 310 as it continues along highway 320. As UE 310 travels along highway 320, cell tower 302 will monitor position information from UE 310 via DTCH 306. Cell tower 302 will continue to monitor the status of UE 310 as long as UE 310 remains within ad-hoc network boundary 322.

[0040] FIG. 4 is an example of VNF data collection and location tracking in one possible embodiment of the present invention. VNF 400 is the virtual network orchestration layer that monitors the geographic patrol area using a shared physical infrastructure. In an embodiment, VNF 400 is 5G Service and Programmability Plane 210 from FIG. 2. In this example, VNF 400 contains PNF_1 410 and PNF_2 420. In an embodiment, PNF_1 410 and PNF_2 420 are cell towers 240 from FIG. 2 or cell tower 302 from FIG. 3. Network connection 402 is the dedicated connection between PNF_1 410 and VNF 400. Network connection 404 is the dedicated connection between PNF_2 420 and VNF 400. Network connection 402 and network connection 404 may be, for example, network connection 234 from FIG. 2.

[0041] The patrol area of the example illustrated in FIG. 4 extends from patrol start location 414 to patrol start location 424. In other examples of other embodiments, the patrol area may extend beyond patrol start location 414 and patrol start location 424, including as many different patrol segments as are connected to VNF 400. Patrol start location 414 and patrol start location 424 may each be, for example, a toll plaza such as checkpoint 248 from FIG. 2 or patrol start location 308 from FIG. 3. Patrol start location 414 connects to PNF_1 410 and patrol start location 424 connects to PNF_2 420 via DTCH 412 and DTCH 422, respectively. In an embodiment, DTCH 412 and DTCH 422 may be DTCH 244 from FIG. 1 or DTCH 304 from FIG. 3.

[0042] FIG. 5 is a flowchart depicting operational steps of the section of code performed by the instance of 5G vigilance program 112 running at the checkpoints, for 5G mobile device based regional patrolling over highways. In an embodiment, 5G vigilance program 112 collects the boundary definition from static configuration parsing. In an embodiment, 5G vigilance program 112 begins polling in the 5G ad-hoc network boundary definition region for other UE devices. In an embodiment, 5G vigilance program 112 creates a 5G dedicated traffic channel between the checkpoint, e.g., patrol start location 308 from FIG. 3 or checkpoints 414 and 424 from FIG. 4. In an embodiment, if 5G vigilance program 112 determines that an ACK was not received from the eNodeB, then 5G vigilance program 112 remains in this step until the ACK is received. In an embodiment, if 5G vigilance program 112 determines that an ACK was received from the eNodeB, then 5G vigilance program 112 sends patrolling UE data over this traffic channel to track UE devices in the patrol area. In an embodiment, 5G vigilance program 112 determines if any UE device is detected in the 5G ad-hoc network boundary, such as ad-hoc network boundary 322 from FIG. 3. In an embodiment, if 5G vigilance program 112 determines that any device was detected in 5G ad-hoc boundary area, then 5G vigilance program 112 establishes a connection to the new UE device. In an embodiment, 5G vigilance program 112 determines if it has received permission to share the location information from the UE device, as explained above. In an embodiment, if 5G vigilance program 112 determines that it does not have permission to share device location, then 5G vigilance program 112 disconnects from the new device and ends for this cycle. In an embodiment, 5G vigilance program 112 shares the UUID tuple received from the UE device with the VNF. In an embodiment, 5G vigilance program 112 determines if the tuple reception ACK was received from the VNF. In an embodiment, if 5G vigilance program 112 determines that an ack was not received, then 5G vigilance program 112 remains in this step until an ACK is received. In an embodiment, if 5G vigilance program 112 determines that an ack was received, then 5G vigilance program 112 initiates a client lightweight instance of the 5G vigilance program on the new UE device, for example, 5G vigilance program 142 on UE 140 of FIG. 1. In an embodiment, 5G vigilance program 112 shares the UUIDs for each UE device in the 5G ad-hoc boundary area with the VNF. In an embodiment, since 5G vigilance program 112 has established a tracking connection between 5G Service and Programmability Plane and the UE device, 5G vigilance program 112 marks the operation complete. 5G vigilance program 112 then ends for this cycle.

[0043] In an alternative embodiment, the steps of workflow 500 may be performed by any other program while working with 5G vigilance program 112. It should be appreciated that embodiments of the present invention provide at least for 5G mobile device based regional patrolling over highways. However, FIG. 5 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made by those skilled in the art without departing from the scope of the invention as recited by the claims.

[0044] 5G vigilance program 112 collects boundary data structures (step 502). In an embodiment, 5G vigilance program 112 5G vigilance program 112 collects the boundary definition from static configuration parsing. In another embodiment, 5G vigilance program 112 receives the boundary definition dynamically by requesting data directly from the UE devices. In an embodiment, 5G vigilance program 112 receives data structures required for enablement of the mobile ad-hoc network from the checkpoints. In another embodiment, 5G vigilance program 112 sets a default mode of operation for the 5G ad-hoc network.

[0045] 5G vigilance program 112 polls a 5G ad-hoc network region for other UEs (step 504). In an embodiment, 5G vigilance program 112 begins polling in the 5G ad-hoc network boundary definition region for other UE devices. In an embodiment, 5G vigilance program 112 receives a response from the checkpoints within the ad-hoc 5G network and then continues to step 506.

[0046] 5G vigilance program 112 creates a DTCH using a radio bearer (step 506). In an embodiment, 5G vigilance program 112 creates a 5G DTCH between the checkpoint, e.g., patrol start location 308 from FIG. 3 or checkpoints 414 and 424 from FIG. 4, and the eNodeB. 5G vigilance program 112 creates the DTCH using a channel create instruction over a radio bearer, and then creates an S1 bearer between the eNodeB and the SGW for signaling. The channel create instruction is received by the eNodeB, and a DTCH_ID is assigned for the channel by the eNodeB. In an embodiment, the eNodeB sends the DTCH_ID to the SGW over the S1 interface. In addition, the ACK is sent to the checkpoint over the Common Control Channel (CCCH--the channel for transmitting control information between UEs and network).

[0047] 5G vigilance program 112 determines if an ACK was received (decision block 508). In an embodiment, if 5G vigilance program 112 determines that an ACK was not received from the eNodeB ("no" branch, decision block 508), then 5G vigilance program 112 remains in decision block 508 until the ACK is received. In an embodiment, if the time waiting for the reception of the ACK exceeds a threshold, then 5G vigilance program 112 resends the channel create instruction. In another embodiment, if the time waiting for the reception of the ACK exceeds a threshold, then 5G vigilance program 112 signals an error and proceeds to step 518 to disconnect from the UE device.

[0048] 5G vigilance program 112 receives UE data over the DTCH (step 510). In an embodiment, if 5G vigilance program 112 determines that ACK was received from the eNodeB ("yes" branch, decision block 508), then 5G vigilance program 112 sends patrolling UE data over this traffic channel to track UE devices in the patrol area.

[0049] 5G vigilance program 112 determines if any device was detected in the 5G ad-hoc boundary (decision block 512). In an embodiment, 5G vigilance program 112 determines if any UE device was detected in the 5G ad-hoc network boundary, such as ad-hoc network boundary 322 from FIG. 3. In an embodiment, the ad-hoc network boundary is the area covered by a single cell tower. In an embodiment, if 5G vigilance program 112 determines that no new device was detected in 5G ad-hoc boundary area ("no" branch, decision block 512), then 5G vigilance program 112 returns to step 510 to continue to send location data on existing UE devices in the 5G ad-hoc boundary area and continues to check for new UE devices entering the 5G ad-hoc boundary area.

[0050] 5G vigilance program 112 connects to the new UE device (step 514). In an embodiment, if 5G vigilance program 112 determines that a new UE device was detected in the 5G ad-hoc boundary area ("yes" branch, decision block 512), then 5G vigilance program 112 establishes a DTCH to the new UE device. 5G vigilance program 112 then authenticates the new UE device using normal 5G authentication protocols and parses the permission settings for the device.

[0051] 5G vigilance program 112 determines if it has permission to share the UE device location (decision block 516). In an embodiment, 5G vigilance program 112 determines if it has received permission to share the location information from the UE device, as explained above. In an embodiment, if 5G vigilance program 112 determines that it has permission to share device location ("yes" branch, decision block 516), then 5G vigilance program 112 proceeds to step 520 to share the information with the tracking system.

[0052] 5G vigilance program 112 disconnects from new device (I/O) request (step 518). In an embodiment, if 5G vigilance program 112 determines that it does not have permission to share device location ("no" branch, decision block 516), then 5G vigilance program 112 returns to step 510 to continue to send location data on existing UE devices in the 5G ad-hoc boundary area and continues to check for new UE devices entering the 5G ad-hoc boundary area.

[0053] 5G vigilance program 112 shares the UUID tuple (step 520). In an embodiment, 5G vigilance program 112 shares the UUID tuple received from the UE device with the VNF. In an embodiment, the UUID tuple includes standard 5G parameters such as the IMSI, the TIMSI, the IMEI, etc.

[0054] 5G vigilance program 112 determines if an ACK was received (decision block 522). In an embodiment, 5G vigilance program 112 determines if the tuple reception ACK was received from the VNF. In an embodiment, if 5G vigilance program 112 determines that an ACK was not received ("no" branch, decision block 522), then 5G vigilance program 112 remains in decision block 522 until an ACK is received. In an embodiment, if the time waiting for the reception of the ACK exceeds a threshold, then 5G vigilance program 112 resends the UUID tuple. In another embodiment, if the time waiting for the reception of the ACK exceeds a threshold, then 5G vigilance program 112 signals an error and proceeds to step 518 to disconnect from the UE device.

[0055] 5G vigilance program 112 initiate a lightweight instance (step 524). In an embodiment, if 5G vigilance program 112 determines that an ack was received ("yes" branch, decision block 522), then 5G vigilance program 112 initiates a client lightweight instance of the 5G vigilance program on the new UE device, for example, 5G vigilance program 142 on UE 140 of FIG. 1.

[0056] 5G vigilance program 112 shares the UUID with the VNF (step 526). In an embodiment, 5G vigilance program 112 shares the UUIDs for each UE device in the 5G ad-hoc boundary area with the VNF. This allows the VNF to track each UE device in the patrol area.

[0057] 5G vigilance program 112 marks the operation complete (step 528). In an embodiment, since 5G vigilance program 112 has established a tracking connection between 5G Service and Programmability Plane and the UE device, 5G vigilance program 112 marks the operation complete. 5G vigilance program 112 then ends for this cycle.

[0058] FIG. 6 is a flowchart depicting operational steps of the section of code performed by the instance of 5G vigilance program 112 running at the VNF systems, for 5G mobile device based regional patrolling over highways. In an embodiment, 5G vigilance program 112 polls from the static checkpoints, for example, patrol start location 308 from FIG. 3 or checkpoints 414 and 424 from FIG. 4. In an embodiment, 5G vigilance program 112 determines if any UE device data was received from the checkpoint. In an embodiment, if 5G vigilance program 112 determines if data was received, then 5G vigilance program 112 streams the location data to the service orchestration instance, e.g., Service Orchestration/Feedback/Improvement 214 from FIG. 2. In an embodiment, 5G vigilance program 112 receives the location data and uses a map-based identifier to locate the X-Y coordinates of the UE device. In an embodiment, when the checkpoint sends a TRACK_STOP message, indicating that the UE device is no longer in the monitored area, 5G vigilance program 112 unloads the respective DTCH from the monitoring table; unmaps the UUID from the mapping database; and unloads the location sharing network slicing channel from eNodeB by instructing the respective PNF in the virtual infrastructure management.

[0059] In an alternative embodiment, the steps of workflow 600 may be performed by any other program while working with 5G vigilance program 112. It should be appreciated that embodiments of the present invention provide at least for 5G mobile device based regional patrolling over highways. However, FIG. 6 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made by those skilled in the art without departing from the scope of the invention as recited by the claims.

[0060] 5G vigilance program 112 polls for user data (step 602). In an embodiment, 5G vigilance program 112 polls from the static checkpoints, for example, patrol start location 308 from FIG. 3 or checkpoints 414 and 424 from FIG. 4. In an embodiment, 5G vigilance program 112 polls for any new geographic data from any UE device within the 5G ad-hoc boundary area of the checkpoint.

[0061] 5G vigilance program 112 determines if data was received (decision block 604). In an embodiment, 5G vigilance program 112 determines if any UE device data was received from the checkpoint. In an embodiment, if 5G vigilance program 112 determines that data was not received ("no" branch, decision block 604), then 5G vigilance program 112 returns to step 602 to continue polling for user data.

[0062] In an embodiment, if 5G vigilance program 112 determines that data was received ("yes" branch, decision block 604), then: 5G vigilance program 112 parses the message to extract field information; 5G vigilance program 112 extracts the mobility UUID; 5G vigilance program 112 requests the information for required device UUID from the respective PNF, e.g., PNF_1 410 or PNF_2 420 from FIGS. 4; and 5G vigilance program 112 invokes the PNF collection protocols to retrieve the UUID information and other interrelated 5G information, local active time, and location maps for this UUID.

[0063] Once 5G vigilance program 112 receives the UUID information, 5G vigilance program 112 updates the metadata monitoring mapper tables with the new UUID. 5G vigilance program 112 requests creation of a special communication channel (step 506 in FIG. 5), receives the DTCH_ID, and updates the monitoring table. This indicates that the new DTCH is active and 5G vigilance program 112 is receiving data from the new UE device. The information received on this location finder DTCH is of the form <UUID, LOCATION>.

[0064] 5G vigilance program 112 sends data to the service orchestration instance (step 606). In an embodiment, 5G vigilance program 112 streams the location data to the service orchestration instance, e.g., Service Orchestration/Feedback/Improvement 214 from FIG. 2. In an embodiment, 5G vigilance program 112 uses an internal 5G in-band protocol to stream the location data to the service orchestration instance. In another embodiment, 5G vigilance program 112 uses a 5G out-of-band protocol to stream the location data to the service orchestration instance.

[0065] 5G vigilance program 112 locates the X,Y coordinates of the user (step 608). In an embodiment, 5G vigilance program 112 receives the location data and uses a map-based identifier to locate the X-Y coordinates of the UE device. In an embodiment, 5G vigilance program 112 then performs a lookup of objects in the neighboring region of the UE device location in an objects database, and creates an OBJECT_LIST containing the structures found in the database. This object structure is sent for further determination to service orchestration instance.

[0066] 5G vigilance program 112 receives a TRACK_STOP message (step 610). In an embodiment, when the checkpoint sends a TRACK_STOP message, indicating that the UE device is no longer in the monitored area, 5G vigilance program 112 unloads the respective DTCH from the monitoring table; unmaps the UUID from the mapping database; and unloads the location sharing network slicing channel from eNodeB by instructing the respective PNF in the virtual infrastructure management. In an embodiment, 5G vigilance program 112 then stops tracking that particular UE device.

[0067] FIG. 7 is a flowchart depicting operational steps of the section of code performed by the instance of 5G vigilance program 112 running at the orchestration service, for 5G mobile device based regional patrolling over highways. In an embodiment, 5G vigilance program 112 polls the VNF and VIM for data. In an embodiment, 5G vigilance program 112 analyzes the VNF data to determine the trajectory of the UE device movement by collecting time-based location information of the UE device. In an embodiment, 5G vigilance program 112 determines if an unusual data pattern was detected in the VNF data analyzed in the previous step. In an embodiment, if 5G vigilance program 112 determines that an unusual data pattern was detected, then 5G vigilance program 112 determines if the reason for stopping is improbable. In an embodiment, if 5G vigilance program 112 determines that the reason for stopping is improbable, then 5G vigilance program 112 sends an alert message to the patrolling manager device to notify the patrol manager that a vehicle has made an improbable stop. In an embodiment, 5G vigilance program 112 determines if there are additional UE devices in the patrol zone. In an embodiment, if 5G vigilance program 112 determines that there are no additional UE devices in the patrol zone ("no" branch, decision block 714), then 5G vigilance program 112 marks the operation complete. 5G vigilance program 112 then ends for this cycle.

[0068] In an alternative embodiment, the steps of workflow 700 may be performed by any other program while working with 5G vigilance program 112. It should be appreciated that embodiments of the present invention provide at least for 5G mobile device based regional patrolling over highways. However, FIG. 7 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made by those skilled in the art without departing from the scope of the invention as recited by the claims.

[0069] 5G vigilance program 112 receives the VNF data (step 702). In an embodiment, 5G vigilance program 112 polls the VNF and VIM for data. In a network, the VIM manages the hardware and software resources that the service provider uses to create service chains and deliver network services to customers. Once 5G vigilance program 112 has received the data from the VNF, 5G vigilance program 112 collects the UUID information and ordinate places structure.

[0070] 5G vigilance program 112 analyzes the VNF data (step 704). In an embodiment, 5G vigilance program 112 analyzes the VNF data to determine the trajectory of the UE device movement by collecting time-based location information of the UE device. In an embodiment, 5G vigilance program 112 determines the trajectory of the UE device movement based on velocity, acceleration, and device movement along the highway from the ordinate places structure. In an embodiment, 5G vigilance program 112 utilizes a service daemon running in the VNF to determine the trajectory of the UE device movement.

[0071] 5G vigilance program 112 determines if an unusual data pattern was detected (decision block 706). In an embodiment, 5G vigilance program 112 determines if an unusual data pattern was detected in the VNF data analyzed in step 704. In an embodiment, if 5G vigilance program 112 determines that an unusual data pattern was not detected ("no" branch, decision block 706), then 5G vigilance program 112 returns to step 702 to continue to receive and analyze VNF data. In an embodiment, if 5G vigilance program 112 cannot determine whether a data pattern was unusual, then 5G vigilance program 112 treats the data pattern as unusual. In another embodiment, if 5G vigilance program 112 cannot determine whether a data pattern was unusual, then 5G vigilance program 112 treats the data pattern as not unusual.

[0072] In an embodiment, 5G vigilance program 112 determines if an unusual data pattern was detected by gathering tracked and managed boundary definitions for the respective location oriented tags for the specific expectations of the locations. For example, if the location is tagged as a "coffee shop", then the expectation here is that the duration of the "stop" will be 10 to 15 minutes. Therefore, if the location of the stop has a tag of "coffee shop" and the vehicle has stopped for longer than 15 minutes, then 5G vigilance program 112 determines that the data pattern is unusual. In an embodiment, the length of time over the expected length of time for the stop that is considered unusual is a default. In another embodiment, the length of time over the expected length of time for the stop that is considered unusual is set by the user. Other example tags could be, for example, "picnic spot", "photography area", etc. If there are no tagged objects associated with the location where the car is stopped and remained for a time above a threshold, then the this can be detected as "unusual". For example, if the vehicle stops at a place where normally no vehicles stop, and the nearest house or other facility is one mile away, this could be an improbable data pattern.

[0073] 5G vigilance program 112 determines the reason for stopping (step 708). In an embodiment, if 5G vigilance program 112 determines that an unusual data pattern was detected ("yes" branch, decision block 706), then 5G vigilance program 112 sends the <X,Y> pair to the VNF and requests the map tags from the ordinate places structure. In an embodiment, 5G vigilance program 112 receives the map tags from the VNF and extracts the tagging objects to determine the reason for the improbable behavior.

[0074] 5G vigilance program 112 determines if the reason for stopping is improbable (decision block 710). In an embodiment, if 5G vigilance program 112 determines that the reason for stopping is not improbable ("no" branch, decision block 710), then 5G vigilance program 112 returns to step 702 to continue to receive and analyze VNF data.

[0075] In an embodiment, 5G vigilance program 112 determines that the reason for stopping is improbable if the UE device stopped at a location that is not expected, i.e., the location is not a rest stop, service area, restaurant, or other place along the patrol area that a vehicle would be expected to stop. In another embodiment, 5G vigilance program 112 determines that the reason for stopping is improbable if the UE device stopped at a location for a time that is longer than expected. In an embodiment, 5G vigilance program 112 determines a time that is longer than expected bases on a predetermined threshold. In another embodiment, 5G vigilance program 112 determines a time that is longer than expected based on a user default set by the user of the UE device during the opt-in process discussed earlier. In yet another embodiment, 5G vigilance program 112 determines a time that is longer than expected based on an average time that the aggregate users spend at that particular location. In other embodiments, 5G vigilance program 112 determines a time that is longer than expected using any other method as would be known to a person in the art.

[0076] 5G vigilance program 112 send alert to patrol manager (step 712). In an embodiment, if 5G vigilance program 112 determines that the reason for stopping is improbable ("yes" branch, decision block 710), then 5G vigilance program 112 sends an alert message to the patrolling manager device to notify the patrol manager that a vehicle has made an improbable stop. In an embodiment, 5G vigilance program 112 then sends the latest coordinates and UUID tuple of the UE device to the checkpoint UE. In an embodiment, 5G vigilance program 112 uses the DTCH between static checkpoint UE and the VNF to send the device information with the message structure. In another embodiment, 5G vigilance program 112 uses CCCH radio frames to transmit the SIGNAL to checkpoint.

[0077] 5G vigilance program 112 determines if there are additional UE devices in the patrol zone (decision block 714). In an embodiment, if 5G vigilance program 112 determines that there are additional UE devices in the patrol zone ("yes" branch, decision block 714), then 5G vigilance program 112 returns to step 702 to continue to receive and analyze VNF data.

[0078] 5G vigilance program 112 marks the operation complete (step 716). In an embodiment, if 5G vigilance program 112 determines that there are no additional UE devices in the patrol zone ("no" branch, decision block 714), then 5G vigilance program 112 marks the operation complete. 5G vigilance program 112 then ends for this cycle.

[0079] FIG. 8 is a flowchart depicting operational steps of the section of code performed by the instance of the 5G vigilance program running on the UE devices, 5G vigilance program 142 and 152, for 5G mobile device based regional patrolling over highways. In an embodiment, if 5G vigilance program 142 and 152 determines that the UE has not been authenticated by the 5G network, then 5G vigilance program 142 and 152 remains in this step until the authentication has completed. In an embodiment, if 5G vigilance program 142 and 152 determines that the authentication has completed, then 5G vigilance program 142 and 152 initiates a lightweight DTCH between the UE device and the cell tower. In an embodiment, the instance of 5G vigilance program 142 and 152 running on the UE device invokes the device-based location service and transfers the location coordinates to the lightweight DTCH. In an embodiment, if 5G vigilance program 142 and 152 determines that a DETACH event was not received, then 5G vigilance program 142 and 152 returns to the previous step to update the location coordinates of the UE device. In an embodiment, if 5G vigilance program 142 and 152 determines that a DETACH event was received, then 5G vigilance program 142 and 152 stops the device-based location service on this UE device; releases the resources of this logical slice of 5G vigilance program 142 and 152; and unmaps the local channel database for the lightweight DTCH. In an embodiment, 5G vigilance program 142 and 152 marks the operation complete. 5G vigilance program 142 and 152 then ends for this cycle.

[0080] In an alternative embodiment, the steps of workflow 800 may be performed by any other program while working with 5G vigilance program 142 and 152. It should be appreciated that embodiments of the present invention provide at least for 5G mobile device based regional patrolling over highways. However, FIG. 8 provides only an illustration of one implementation and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made by those skilled in the art without departing from the scope of the invention as recited by the claims.

[0081] 5G vigilance program 142 and 152 determine if the authentication completed (decision block 802). In an embodiment, if 5G vigilance program 142 and 152 determine that the UE has not been authenticated by the 5G network ("no" branch, decision block 802), then 5G vigilance program 142 and 152 remain in decision block 802 until the authentication has completed. In an embodiment, if the time waiting for the authentication to complete exceeds a threshold, then 5G vigilance program 142 and 152 restart the authentication. In another embodiment, if the time waiting for the authentication to complete exceeds a threshold, then 5G vigilance program 142 and 152 signal an error and ends for this cycle.

[0082] 5G vigilance program 142 and 152 initiate a lightweight DTCH (step 804). In an embodiment, if 5G vigilance program 142 and 152 determine that the authentication has completed ("yes" branch, decision block 802), then 5G vigilance program 142 and 152 initiate a lightweight DTCH between the UE device and the cell tower. This lightweight DTCH is used by 5G vigilance program 142 and 152 to receive the location information from the UE device to allow 5G vigilance program 142 and 152 to track the vehicle through the patrol area.

[0083] 5G vigilance program 142 and 152 send location coordinates (step 806). In an embodiment, the instance of 5G vigilance program 142 and 152 running on the UE device invokes the device-based location service and transfers the location coordinates to the lightweight DTCH created in step 804. In an embodiment, the device-based location service may be, for example, a navigation app or GPS incorporated on a smart phone UE device. In another embodiment, the device-based location service may be, for example, a navigation app or GPS integrated into the vehicle itself.

[0084] 5G vigilance program 142 and 152 determine if a DETACH event was received (decision block 808). In an embodiment, if 5G vigilance program 142 and 152 determine that a DETACH event was not received ("no" branch, decision block 808), then 5G vigilance program 142 and 152 return to step 806 to update the location coordinates of the UE device.

[0085] 5G vigilance program 142 and 152 stop the device-based location service (step 810). In an embodiment, if 5G vigilance program 142 and 152 determine that a DETACH event was received ("yes" branch, decision block 808), then 5G vigilance program 142 and 152 stops the device-based location service on this UE device; releases the resources of this logical slice of 5G vigilance program 142 and 152; and unmaps the local channel database for the lightweight DTCH.

[0086] 5G vigilance program 142 and 152 marks the operation complete (step 812). In an embodiment, 5G vigilance program 142 and 152 marks the operation complete. 5G vigilance program 142 and 152 then ends for this cycle.

[0087] FIG. 9 is a block diagram depicting components of computing device 110 suitable for 5G vigilance program 112, 142, and 152 in accordance with at least one embodiment of the invention. FIG. 9 displays the computer 900, one or more processor(s) 904 (including one or more computer processors), a communications fabric 902, a memory 906 including, a random-access memory (RAM) 916, and a cache 918, a persistent storage 908, a communications unit 912, I/O interfaces 914, a display 922, and external devices 920. It should be appreciated that FIG. 9 provides only an illustration of one embodiment and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made.

[0088] As depicted, the computer 900 operates over the communications fabric 902, which provides communications between the computer processor(s) 904, memory 906, persistent storage 908, communications unit 912, and input/output (I/O) interface(s) 914. The communications fabric 902 may be implemented with an architecture suitable for passing data or control information between the processors 904 (e.g., microprocessors, communications processors, and network processors), the memory 906, the external devices 920, and any other hardware components within a system. For example, the communications fabric 902 may be implemented with one or more buses.

[0089] The memory 906 and persistent storage 908 are computer readable storage media. In the depicted embodiment, the memory 906 comprises a RAM 916 and a cache 918. In general, the memory 906 can include any suitable volatile or non-volatile computer readable storage media. Cache 918 is a fast memory that enhances the performance of processor(s) 904 by holding recently accessed data, and near recently accessed data, from RAM 916.

[0090] Program instructions for 5G vigilance program 112, 142, and 152 may be stored in the persistent storage 908, or more generally, any computer readable storage media, for execution by one or more of the respective computer processors 904 via one or more memories of the memory 906. The persistent storage 908 may be a magnetic hard disk drive, a solid-state disk drive, a semiconductor storage device, read only memory (ROM), electronically erasable programmable read-only memory (EEPROM), flash memory, or any other computer readable storage media that is capable of storing program instruction or digital information.

[0091] The media used by persistent storage 908 may also be removable. For example, a removable hard drive may be used for persistent storage 908. Other examples include optical and magnetic disks, thumb drives, and smart cards that are inserted into a drive for transfer onto another computer readable storage medium that is also part of persistent storage 908.

[0092] The communications unit 912, in these examples, provides for communications with other data processing systems or devices. In these examples, the communications unit 912 includes one or more network interface cards. The communications unit 912 may provide communications through the use of either or both physical and wireless communications links. In the context of some embodiments of the present invention, the source of the various input data may be physically remote to the computer 900 such that the input data may be received, and the output similarly transmitted via the communications unit 912.

[0093] The I/O interface(s) 914 allows for input and output of data with other devices that may be connected to computer 900. For example, the I/O interface(s) 914 may provide a connection to external device(s) 920 such as a keyboard, a keypad, a touch screen, a microphone, a digital camera, and/or some other suitable input device. External device(s) 920 can also include portable computer readable storage media such as, for example, thumb drives, portable optical or magnetic disks, and memory cards. Software and data used to practice embodiments of the present invention, e.g., 5G vigilance program 112, 142m and 152 can be stored on such portable computer readable storage media and can be loaded onto persistent storage 908 via the I/O interface(s) 914. I/O interface(s) 914 also connect to a display 922.

[0094] Display 922 provides a mechanism to display data to a user and may be, for example, a computer monitor. Display 922 can also function as a touchscreen, such as a display of a tablet computer.

[0095] The programs described herein are identified based upon the application for which they are implemented in a specific embodiment of the invention. However, it should be appreciated that any particular program nomenclature herein is used merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature.

[0096] The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.

[0097] The computer readable storage medium can be any tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.

[0098] Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.

[0099] Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGAs), or programmable logic arrays (PLAs) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.

[0100] Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.

[0101] These computer readable program instructions may be provided to a processor of a general-purpose computer, a special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.

[0102] The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.

[0103] The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, a segment, or a portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.

[0104] The descriptions of the various embodiments of the present invention have been presented for purposes of illustration but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The terminology used herein was chosen to best explain the principles of the embodiment, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

* * * * *


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed