DISSEMINATING ALERTS OR OTHER NOTIFICATIONS USING ProSe DIRECT DISCOVERY SIGNALING

ABSTRACT

Aspects of the subject disclosure may include, for example, detecting, by a wireless communication device, a transmission, by a radio access network node, of an alert message, identifying contents of the alert message, determining that the wireless communication device is authorized to relay the contents of the alert message, generating alert information comprising the contents of the alert message, and transmitting a ProSe direct discovery message comprising the alert information. Other embodiments are disclosed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/915,402 filed on Jun. 29, 2020. All sections of the aforementionedapplication are incorporated herein by reference in their entirety.

FIELD OF THE DISCLOSURE

The subject disclosure relates to disseminating alerts or othernotifications using ProSe direct discovery signaling.

BACKGROUND

A Public Safety UE which is at the cell edge, or in a disaster-hit areamay encounter poor or no radio signal quality while attempting toconnect to the E-UTRAN network. This may cause UE to not receivecritical alerts & notifications from the network. One such example iswireless emergency alerts originated by law enforcement or nationalweather service agencies. These alerts are referred to as WirelessEmergency Alerts (WEA) and are distributed by wireless networks.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made to the accompanying drawings, which are notnecessarily drawn to scale, and wherein:

FIG. 1 is a block diagram illustrating an exemplary, non-limitingembodiment of a communications network in accordance with variousaspects described herein.

FIG. 2 is a block diagram illustrating an example, non-limitingembodiment of a first operating environment in accordance with variousaspects described herein.

FIG. 3 is a block diagram illustrating an example, non-limitingembodiment of a second operating environment in accordance with variousaspects described herein.

FIG. 4 is a block diagram illustrating an example, non-limitingembodiment of a third operating environment in accordance with variousaspects described herein.

FIG. 5 is a block diagram illustrating an example, non-limitingembodiment of a fourth operating environment in accordance with variousaspects described herein.

FIG. 6 is a block diagram illustrating an example, non-limitingembodiment of a discovery message in accordance with various aspectsdescribed herein.

FIG. 7 is a block diagram illustrating an example, non-limitingembodiment of a first operations flow in accordance with various aspectsdescribed herein.

FIG. 8 is a block diagram illustrating an example, non-limitingembodiment of a fifth operating environment in accordance with variousaspects described herein.

FIG. 9 is a block diagram illustrating an example, non-limitingembodiment of a second operations flow in accordance with variousaspects described herein.

FIG. 10 is a block diagram illustrating an example, non-limitingembodiment of a third operations flow in accordance with various aspectsdescribed herein.

FIG. 11 depicts an illustrative embodiment of a method in accordancewith various aspects described herein.

FIG. 12 is a block diagram illustrating an example, non-limitingembodiment of a virtualized communication network in accordance withvarious aspects described herein.

FIG. 13 is a block diagram of an example, non-limiting embodiment of acomputing environment in accordance with various aspects describedherein.

FIG. 14 is a block diagram of an example, non-limiting embodiment of amobile network platform in accordance with various aspects describedherein.

FIG. 15 is a block diagram of an example, non-limiting embodiment of acommunication device in accordance with various aspects describedherein.

DETAILED DESCRIPTION

The subject disclosure describes, among other things, illustrativeembodiments for using ProSe discovery signaling to disseminate thecontents of alert messages to devices that are outside of networkcoverage. According to techniques described herein, a device locatedwithin network coverage may receive an alert message from a radio accessnetwork node. In some embodiments, the alert message may comprise awireless emergency alert (WEA) message. In some embodiments, the devicemay relay the contents of the alert message to one or more other devicesby transmitting a ProSe direct discovery message that comprises thosecontents. In some embodiments, the ProSe direct discovery message maycomprise a PC5_DISCOVERY message, such as a PC5_DISCOVERY message forrelay discovery additional information. Other embodiments are describedin the subject disclosure.

One or more aspects of the subject disclosure include an apparatuscomprising a processing system including a processor and a memory thatstores executable instructions that, when executed by the processingsystem, facilitate performance of operations. The operations can includedetecting a transmission, by a radio access network node, of an alertmessage, identifying contents of the alert message, determining that thedevice is authorized to relay the contents of the alert message,generating alert information comprising the contents of the alertmessage, and transmitting a ProSe direct discovery message comprisingthe alert information.

One or more aspects of the subject disclosure include a non-transitorymachine-readable medium, comprising executable instructions that, whenexecuted by a processing system of a wireless communication device, theprocessing system including a processor, facilitate performance ofoperations. The operations can include detecting a transmission, by aradio access network node, of an alert message, identifying contents ofthe alert message, determining that the wireless communication device isauthorized to relay the contents of the alert message, generating alertinformation comprising the contents of the alert message, andtransmitting a ProSe direct discovery message comprising the alertinformation.

One or more aspects of the subject disclosure include a method. Themethod can include detecting, by a processing system of a wirelesscommunication device, the processing system including a processor, atransmission, by a radio access network node, of an alert message,identifying contents of the alert message, determining that the wirelesscommunication device is authorized to relay the contents of the alertmessage, generating alert information comprising the contents of thealert message, and transmitting a ProSe direct discovery messagecomprising the alert information.

Referring now to FIG. 1 , a block diagram is shown illustrating anexample, non-limiting embodiment of a system 100 in accordance withvarious aspects described herein. For example, system 100 can facilitatein whole or in part detecting, by a wireless communication device, atransmission, by a radio access network node, of an alert message,identifying contents of the alert message, determining that the wirelesscommunication device is authorized to relay the contents of the alertmessage, generating alert information comprising the contents of thealert message, and transmitting a ProSe direct discovery messagecomprising the alert information. In particular, a communicationsnetwork 125 is presented for providing broadband access 110 to aplurality of data terminals 114 via access terminal 112, wireless access120 to a plurality of mobile devices 124 and vehicle 126 via basestation or access point 122, voice access 130 to a plurality oftelephony devices 134, via switching device 132 and/or media access 140to a plurality of audio/video display devices 144 via media terminal142. In addition, communication network 125 is coupled to one or morecontent sources 175 of audio, video, graphics, text and/or other media.While broadband access 110, wireless access 120, voice access 130 andmedia access 140 are shown separately, one or more of these forms ofaccess can be combined to provide multiple access services to a singleclient device (e.g., mobile devices 124 can receive media content viamedia terminal 142, data terminal 114 can be provided voice access viaswitching device 132, and so on).

The communications network 125 includes a plurality of network elements(NE) 150, 152, 154, 156, etc. for facilitating the broadband access 110,wireless access 120, voice access 130, media access 140 and/or thedistribution of content from content sources 175. The communicationsnetwork 125 can include a circuit switched or packet switched network, avoice over Internet protocol (VoIP) network, Internet protocol (IP)network, a cable network, a passive or active optical network, a 4G, 5G,or higher generation wireless access network, WIMAX network,UltraWideband network, personal area network or other wireless accessnetwork, a broadcast satellite network and/or other communicationsnetwork.

In various embodiments, the access terminal 112 can include a digitalsubscriber line access multiplexer (DSLAM), cable modem terminationsystem (CMTS), optical line terminal (OLT) and/or other access terminal.The data terminals 114 can include personal computers, laptop computers,netbook computers, tablets or other computing devices along with digitalsubscriber line (DSL) modems, data over coax service interfacespecification (DOCSIS) modems or other cable modems, a wireless modemsuch as a 4G, 5G, or higher generation modem, an optical modem and/orother access devices.

In various embodiments, the base station or access point 122 can includea 4G, 5G, or higher generation base station, an access point thatoperates via an 802.11 standard such as 802.11n, 802.11ac or otherwireless access terminal. The mobile devices 124 can include mobilephones, e-readers, tablets, phablets, wireless modems, and/or othermobile computing devices.

In various embodiments, the switching device 132 can include a privatebranch exchange or central office switch, a media services gateway, VoIPgateway or other gateway device and/or other switching device. Thetelephony devices 134 can include traditional telephones (with orwithout a terminal adapter), VoIP telephones and/or other telephonydevices.

In various embodiments, the media terminal 142 can include a cablehead-end or other TV head-end, a satellite receiver, gateway or othermedia terminal 142. The display devices 144 can include televisions withor without a set top box, personal computers and/or other displaydevices.

In various embodiments, the content sources 175 include broadcasttelevision and radio sources, video on demand platforms and streamingvideo and audio services platforms, one or more content data networks,data servers, web servers and other content servers, and/or othersources of media.

In various embodiments, the communications network 125 can includewired, optical and/or wireless links and the network elements 150, 152,154, 156, etc. can include service switching points, signal transferpoints, service control points, network gateways, media distributionhubs, servers, firewalls, routers, edge devices, switches and othernetwork nodes for routing and controlling communications traffic overwired, optical and wireless links as part of the Internet and otherpublic networks as well as one or more private networks, for managingsubscriber access, for billing and network management and for supportingother network functions.

FIG. 2 illustrates an example of an operating environment 200 that maybe representative of some embodiments. In operating environment 200, aradio access network (RAN) 201 comprises a RAN node 202, which serves aRAN cell 203. Wireless communication devices (WCDs) 204-1, 204-2, and205 are located within RAN cell 203. WCDs 204-1 and 204-2 are located atpoints relatively close to RAN node 202, while WCD 205 is positioned atthe cell edge, relatively distant from RAN node 202. In variousembodiments, RAN 201 may comprise an Evolved Universal MobileTelecommunications System Terrestrial Radio Access Network (E-UTRAN),and RAN node 202 may comprise an evolved node B (eNB). In someembodiments, RAN 201 may comprise a 3GPP 5G RAN, such as an NG-RAN, andRAN node 202 may comprise an NG-eNB or a gNB. WCDs 204-1, 204-2, and 205may comprise user equipment (UE) operating in accordance with protocolsgoverning wireless communications in RAN 201. For example, if RAN 201 isan E-UTRAN, WCDs 204-1, 204-2, and 205 may be UEs operating inaccordance with 3GPP 4G LTE protocols. The embodiments are not limitedto this example.

In operating environment 200, RAN node 202 transmits a broadcast message206, which may generally comprise a message directed to all devicesoperating within RAN cell 203. As they are relatively close to RAN node202, and thus may receive wireless signals transmitted by RAN node 202with relatively high received signal strength, WCDs 204-1 and 204-2 mayhave no problem receiving broadcast message 206. On the other hand, dueto its position at the cell edge, WCD 205 may receive wireless signalstransmitted by RAN node 202 with relatively low received signalstrength. If the received signal strength is too weak, WCD 205 may beunable to receive broadcast message 206.

FIG. 3 illustrates an example of an operating environment 300. Operatingenvironment 300 may be representative of various embodiments in whichRAN node 202 transmits a broadcast message in order to provide devicesin RAN cell 203 with notification of an emergency. In operatingenvironment 300, the WCDs 204-1, 204-2, and 205 of FIG. 2 operate aspublic safety UEs (PS-UEs) 304-1, 304-2, and 305, respectively. RAN node202 transmits an emergency alert message 306 in order to alert devicesin RAN cell 203 to an emergency. PS-UEs 304-1 and 304-2 may be able toreceive emergency alert message 306 due to their proximity to RAN node202. On the other hand, due to its location at the cell edge, PS-UE 305may be unable to receive emergency alert message 306. According to someembodiments, emergency alert message 306 may comprise a wirelessemergency alert (WEA) alert message. In various embodiments, RAN node202 may transmit emergency alert message 306 by including it in a systeminformation block (SIB) that RAN node 202 broadcasts in RAN cell 203.The embodiments are not limited in this context.

FIG. 4 depicts an example of an operating environment 400 thatillustrates an approach to providing PS-UE 305 with the informationcomprised in emergency alert message 306 when PS-UE 305 is unable toreceive emergency alert message 306 from the network. In operatingenvironment 400, PS-UE 304-2 may serve as a relay node and relay thecontents of emergency alert message 306 to PS-UE 305 after receivingemergency alert message 306 from RAN node 202. In the context of thisrole as a relayer of the contents of emergency alert message 306, PS-UE304-2 may be referred to as a proximity services (ProSe) public safetyrelay UE. In the context of its role as a relayee of the contents ofemergency alert message 306, PS-UE 305 may be referred to as a ProSepublic safety remote UE. The embodiments are not limited in thiscontext.

In operating environment 400, PS-UE 304-2 may relay the contents ofemergency alert message 306 to PS-UE 305 via a direct D2D link 408.Direct D2D link 408 may generally comprise a type of link that canconvey unicast and/or evolved multimedia broadcast multicast services(eMBMS) traffic directly between UEs when one or both of those UEsis/are outside of network coverage. In some embodiments, communicationsover direct D2D link 408 may comprise communications via a PC5interface. In various embodiments, PS-UE 304-2 may provide the contentsof emergency alert message 306 to PS-UE 305 via direct D2D link 408 asunicast traffic, which may be in the form of IP packets. The embodimentsare not limited in this context.

In some embodiments, PS-UE 304-2 and PS-UE 305 may communicate viadirect D2D link 408 according to ProSe direct communication procedures.In various embodiments, in order to establish direct D2D link 408 anduse it to communicate according to the ProSe direct communicationprocedures, PS-UE 304-2 and PS-UE 305 may first need to perform ProSedirect discovery procedures in order to detect and discover each other.In some embodiments, PS-UE 304-2 and PS-UE 305 may perform ProSe directdiscovery procedures that are specifically designated for use by publicsafety UEs in situations involving threats to public safety. Suchprocedures are hereinafter referred to as ProSe public safety directdiscovery procedures, and may also be referred to as ProSe directdiscovery for public safety use procedures. The embodiments are notlimited in this context.

FIG. 5 depicts an example of an operating environment 500 thatillustrates an alternate approach to providing PS-UE 305 with thecontents of emergency alert message 306. In operating environment 500,as in operating environment 400 of FIG. 4 , PS-UE 304-2 may act as aProSe public safety relay UE and relay the contents of emergency alertmessage 306 to PS-UE 305, which may act as a ProSe public safety remoteUE. However, rather than relaying the contents of emergency alertmessage 306 to PS-UE 305 as unicast traffic via direct D2D link 408,PS-UE 304-2 may provide the contents of emergency alert message 306 toPS-UE 305 in conjunction with performing operations associated withProSe public safety direct discovery procedures. In various embodiments,this approach may facilitate providing the contents of emergency alertmessage 306 to PS-UE 305 with lower latency, as PS-UE 304-2 may not needto wait for establishment of an IP bearer as would be required if itwere to relay the contents of emergency alert message 306 to PS-UE 305as unicast traffic via direct D2D link 408 of FIG. 4 .

In some embodiments, PS-UE 304-2 may be configured to provide thecontents of emergency alert message 306 to PS-UE 305 by including thosecontents as emergency alert information 512 within a discovery message510 that PS-UE 304-2 sends to PS-UE 305 in conjunction with ProSe publicsafety direct discovery procedures. In various embodiments, discoverymessage 510 may comprise a ProSe direct discovery message, such as a PC5DISCOVERY message. In some such embodiments, discovery message 510 maycomprise a PC5 DISCOVERY for Relay Discovery Additional Informationmessage that PS-UE 304-2 sends to PS-UE 305 in conjunction with anannouncing UE procedure for relay discovery additional information. Invarious embodiments, emergency alert information 512 may be comprised inan information element (IE) included within discovery message 510. Insome such embodiments, discovery message 510 may include another IE thatcomprises an indication of the presence of the IE comprising emergencyalert information 512. For example, in various embodiments, a bit withinanother IE may be set to a value indicating the presence of the IEcomprising emergency alert information 512. The embodiments are notlimited in this context.

FIG. 6 illustrates a discovery message 600 comprising a format that maybe representative of discovery message 510 of FIG. 5 according to someembodiments. As reflected in FIG. 6 , according to a defined format fordiscovery message 600, discovery message 600 may include an RDAIComposition IE 602. As shown in FIG. 6 , RDAI Composition IE 602 maycomprise eight bits. Bit 6 of RDAI Composition IE 602 may be set toindicate the presence or absence of a WEA Content IE 604 withindiscovery message 600. Bit 7 of RDAI Composition IE 602 may be set toindicate the presence or absence of an ECGI IE 606 within discoverymessage 600. Bit 8 of RDAI Composition IE 602 may be set to indicate thepresence or absence of an MBMS Related Information IE 608 withindiscovery message 600.

If discovery message 600 is being used as the discovery message 510 thatconveys emergency alert information 512 in operating environment 500 ofFIG. 5 , WEA Content IE 604 may be present within discovery message 600,and bit 6 of RDAI Composition IE 602 may be set accordingly. As shown inFIG. 6 , WEA Content IE 604 may comprise a Message Identifier parameter605A, a Serial Number parameter 605B, a Data Coding Scheme parameter605C, and an Alert Text parameter 605D. Message Identifier parameter605A may identify the source and type of a WEA alert described by WEAContent IE 604. Serial Number parameter 605B may identify a specific WEAalert for which WEA Content IE 604 conveys the contents. Data CodingScheme parameter 605C may identify the alphabet/coding and the languageapplied variations characterizing that WEA alert. Alert Text parameter605D may comprise the contents of the WEA alert.

ECGI IE 606 may be usable to indicate an E-UTRAN Cell Global Identifier(ECGI) associated with the serving cell of a ProSe public safety relayUE transmitting discovery message 600. MBMS Related Information IE 608may be usable to indicate a Temporary Mobile Group Identity (TMGI)associated with an eMBMS broadcast session for which the ProSe publicsafety relay UE transmitting discovery message 600 is relaying traffic.In various embodiments, WEA Content IE 604, ECGI IE 606, and MBMSRelated Information IE 608 may be conditional IEs, such that thepresence of one is conditional upon the absence of the others. In somesuch embodiments, if WEA Content IE 604 is present within discoverymessage 600, ECGI IE 606 and MBMS Related Information IE 608 may beabsent. The embodiments are not limited in this context.

FIG. 7 illustrates an example operations flow 700 that may berepresentative of the use of ProSe direct discovery signaling to relaythe contents of WEA alerts or other alert messages according to variousembodiments. For example, operations flow 700 may be representative ofoperations that may be performed in operating environment 500 of FIG. 5in some embodiments in which PS-UE 304-2 relays the contents ofemergency alert message 306 to PS-UE 305 as emergency alert information512 contained in discovery message 510.

As shown in FIG. 7 , operations flow 700 may begin at 702, where any orall of a UE1, a UE2, and a UE3 may engage in procedures for publicsafety UEs to get authorized for ProSe direct discovery for publicsafety and ProSe direct communication. In some embodiments, rather thanobtaining such authorization via such procedures, any or all of UE1,UE2, and UE3 may be pre-provisioned with such authorization, or maycomprise a USIM pre-provisioned with such authorization. At 704, UE1 mayengage in a procedure to get authorized by the network to relay WEAalerts to ProSe public safety remote UEs in conjunction with serving asa public safety UE-Network Relay UE. In some embodiments, rather thanobtaining such authorization via such a procedure, UE1 may bepre-provisioned with such authorization, or may comprise a USIMpre-provisioned with such authorization.

At 706, UE1, UE2, and UE3 may engage in ProSe discovery for publicsafety procedures in order to detect/identify each other and establishdirect communication via a PC5 interface. At 708, an eNB may start WEAalert transmission over an air interface, such as via transmission ofSIB 12. At 710, UE2 and UE3, both operating as ProSe public safetyremote UEs, may be out of network coverage and unable to receive WEAalerts transmitted by the network. At 712, UE1 may detect that WEA alerttransmission has started, and may check for authorization to relay WEAalerts to public safety remote UEs. At 714 and 716, having confirmedthat it possesses such authorization, UE1 may transmit, to UE2 and UE3,respective PC5_DISCOVERY for RDAI messages that contain WEA alertcontent IEs comprising the contents of the WEA alert transmitted at 708.UE2 and UE3 may, at 718 and 720 respectively, receive the PC5_DISCOVERYfor RDAI messages transmitted at 714 and 716, and display the WEA alertdescribed by the WEA alert content IEs comprised in those messages.

FIG. 8 illustrates an example of an operating environment 800 that maybe representative of the implementation of additional novel techniquesfor disseminating WEA alerts or other alert messages according tovarious embodiments. In operating environment 800, PS-UE 304-1 isauthorized to generate WEA alerts or other alerts or notifications anddisseminate them to ProSe public safety remote UEs in its vicinity. Insome embodiments, PS-UE 304-1 may obtain such authorization via anetwork ProSe function using defined authorization procedures. Invarious other embodiments, PS-UE 304-1 may be pre-provisioned withauthorization to generate WEA alerts or other alerts or notifications,or such authorization may be pre-provisioned on a USIM of PS-UE 304-1.The embodiments are not limited in this context.

In the example depicted in FIG. 8 , PS-UE 304-1 sends—to a PS-UE 804comprising a ProSe public safety remote UE—a discovery message 810-1.Discovery message 810-1 includes emergency alert information 812, whichcomprises the contents of a WEA alert or other alert or notificationgenerated by PS-UE 304-1. According to some embodiments, discoverymessage 810-1 may be a ProSe direct discovery message, such as aPC5_DISCOVERY with Relay Discovery Additional Information message orother PC5_DISCOVERY message. According to various embodiments, discoverymessage 810-1 may comprise a same or similar format as discovery message510 of FIG. 5 and/or discovery message 600 of FIG. 6 . The embodimentsare not limited in this context.

In operating environment 800, PS-UE 305 may be authorized to act as botha relayee and a relayer of the contents of WEA alerts or other alerts ornotifications, such as emergency alert message 306. In some embodiments,PS-UE 305 may obtain such authorization via a network ProSe functionusing defined authorization procedures. In various other embodiments,PS-UE 305 may be pre-provisioned with authorization to act as both arelayee and a relayer of the contents of WEA alerts or other alerts ornotifications, or such authorization may be pre-provisioned on a USIM ofPS-UE 305. The embodiments are not limited in this context.

In the example depicted in FIG. 8 , PS-UE 305 receives—from PS-UE 304-2acting as a ProSe public safety relay UE—discovery message 510, whichincludes emergency alert information 512 comprising the contents ofemergency alert message 306. PS-UE 305 then sends—to a PS-UE 805comprising a ProSe public safety remote UE—a discovery message 810-2.Discovery message 810-2 includes the emergency alert information 512comprised in the discovery message 510 received from PS-UE 304-2.According to some embodiments, discovery message 810-2 may be a ProSedirect discovery message, such as a PC5 DISCOVERY with Relay DiscoveryAdditional Information message or other PC5 DISCOVERY message. Accordingto various embodiments, discovery message 810-2 may comprise a same orsimilar format as discovery message 510 of FIG. 5 , discovery message600 of FIG. 6 , and/or discovery message 810-1. The embodiments are notlimited in this context.

FIG. 9 illustrates an example operations flow 900 that may berepresentative of the use of ProSe direct discovery signaling todisseminate the contents of WEA alerts or other alert messages ornotifications generated by an authorized ProSe public safety UEaccording to some embodiments. For example, operations flow 900 may berepresentative of operations that may be performed in operatingenvironment 800 of FIG. 8 in various embodiments in which PS-UE 304-1generates a WEA alert or other alert or notification and disseminatesits contents as emergency alert information 812 comprised in discoverymessage 810-1.

As shown in FIG. 9 , operations flow 900 may begin at 902, where any orall of a UE1, a UE2, and a UE3 may engage in procedures for publicsafety UEs to get authorized for ProSe direct discovery for publicsafety and ProSe direct communication. In some embodiments, rather thanobtaining such authorization via such procedures, any or all of UE1,UE2, and UE3 may be pre-provisioned with such authorization, or maycomprise a USIM pre-provisioned with such authorization. At 904, UE1 mayengage in a procedure to get authorized by the network to generate anddistribute WEA alerts or other alerts or notifications to ProSe publicsafety remote UEs. In some embodiments, rather than obtaining suchauthorization via such a procedure, UE1 may be pre-provisioned with suchauthorization, or may comprise a USIM pre-provisioned with suchauthorization.

At 906, UE1, UE2, and UE3 may engage in ProSe discovery for publicsafety procedures in order to detect/identify each other and establishdirect communication via a PC5 interface. At 908, due to an emergencyevent, a user of UE1 may attempt to generate a WEA alert or other alertor notification for distribution to public safety remote UEs over directPC5 links. At 910, UE1 may check for authorization to generate anddistribute alerts/notifications to public safety remote UEs in itsvicinity. At 912 and 914, having confirmed that it possesses suchauthorization and having generated the desired WEA alert or other alertor notification, UE1 may transmit, to UE2 and UE3, respective PC5DISCOVERY for RDAI messages that contain WEA alert content IEscomprising the contents of the generated WEA alert or other alert ornotification. UE2 and UE3 may, at 916 and 918 respectively, receive thePC5 DISCOVERY for RDAI messages transmitted at 912 and 914, and displaythe WEA alert or other alert or notification described by the WEA alertcontent IEs comprised in those messages.

FIG. 10 illustrates an example operations flow 1000 that may berepresentative of the use, by a ProSe public safety remote UE that is arelayee of the contents of a WEA alert or other alert message ornotification, of ProSe direct discovery signaling to relay thosecontents to another ProSe public safety remote UE according to someembodiments. For example, operations flow 1000 may be representative ofoperations that may be performed in operating environment 800 of FIG. 8in various embodiments in which PS-UE 305 obtains emergency alertinformation 512 from the discovery message 510 received from PS-UE304-2, and then relays emergency alert information 512 to PS-UE 805 byincluding emergency alert information 512 in a discovery message 810-2that PS-UE 305 sends to PS-UE 805.

As shown in FIG. 10 , operations flow 1000 may begin at 1002, where anyor all of a UE1, a UE2, a UE3, and a UE4 may engage in procedures forpublic safety UEs to get authorized for ProSe direct discovery forpublic safety and ProSe direct communication. In some embodiments,rather than obtaining such authorization via such procedures, any or allof UE1, UE2, UE3, and UE4 may be pre-provisioned with suchauthorization, or may comprise a USIM pre-provisioned with suchauthorization. At 1004, UE1 may engage in a procedure to get authorizedby the network to relay WEA alerts to ProSe public safety remote UEs. Insome embodiments, rather than obtaining such authorization via such aprocedure, UE1 may be pre-provisioned with such authorization, or maycomprise a USIM pre-provisioned with such authorization. At 1006, UE2may engage in the procedure to get authorized by the network to relayWEA alerts to ProSe public safety remote UEs. In some embodiments,rather than obtaining such authorization via such a procedure, UE2 maybe pre-provisioned with such authorization, or may comprise a USIMpre-provisioned with such authorization.

At 1008, UE1, UE2, UE3, and UE4 may engage in ProSe discovery for publicsafety procedures in order to detect/identify each other and establishdirect communication via a PC5 interface. At 1010, an eNB may start WEAalert transmission over an air interface, such as via transmission ofSIB 12. At 1012, UE2, UE3, and UE4, each operating as a ProSe publicsafety remote UE, may be out of network coverage and unable to receiveWEA alerts transmitted by the network. At 1014, UE1 may detect that WEAalert transmission has started, and may check for authorization to relayWEA alerts to public safety remote UEs. At 1014 and 1016, havingconfirmed that it possesses such authorization, UE1 may transmit, to UE2and UE3, respective PC5_DISCOVERY for RDAI messages that contain WEAalert content IEs comprising the contents of the WEA alert transmittedat 1008. UE2 and UE3 may, at 1020 and 1022 respectively, receive thePC5_DISCOVERY for RDAI messages transmitted at 1016 and 1018, anddisplay the WEA alert described by the WEA alert content IEs comprisedin those messages.

At 1024, UE2 may detect reception of the WEA alert, and may check forauthorization to relay WEA alerts to other public safety remote UEs. At1026, having confirmed that it possesses such authorization, UE2 maytransmit, to UE4, a PC5_DISCOVERY for RDAI message that contains a WEAalert content IE comprising the contents of the WEA alert. At 1028, UE4may receive the PC5 DISCOVERY for RDAI message transmitted at 1026, anddisplay the WEA alert described by the WEA alert content IE comprised inthat message.

FIG. 11 depicts an illustrative embodiment of a method 1100 inaccordance with various aspects described herein. Method 1100 may berepresentative of operations that may be performed by PS-UE 304-2 inoperating environment 500 of FIG. 5 according to some embodiments. Asshown in FIG. 11 , a transmission of an alert message by a RAN node maybe detected at 1102. For example, in operating environment 500 of FIG. 5, PS-UE 304-2 may detect transmission of emergency alert message 306 byRAN node 202. At 1104, the contents of the alert message may beidentified. For example, in operating environment 500 of FIG. 5 , PS-UE304-2 may identify the contents of emergency alert message 306.

At 1106, it may be determined that authorization has been provided torelay the contents of the alert message. For example, in operatingenvironment 500 of FIG. 5 , PS-UE 304-2 may determine that it isauthorized to relay the contents of emergency alert message 306 tonearby ProSe public safety remote UEs such as PS-UE 305. At 1108, alertinformation may be generated that comprises the contents of the alertmessage. For example, in operating environment 500 of FIG. 5 , PS-UE304-2 may generate emergency alert information 512, which may comprisethe contents of emergency alert message 306. At 1110, a ProSe directdiscovery message may be transmitted that comprises the alertinformation generated at 1108. For example, in operating environment 500of FIG. 5 , PS-UE 304-2 may transmit discovery message 510, which may bea ProSe direct discovery message and may comprise emergency alertinformation 512. The embodiments are not limited to these examples.

While for purposes of simplicity of explanation, the respectiveprocesses are shown and described as a series of blocks in FIG. 11 , itis to be understood and appreciated that the claimed subject matter isnot limited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Moreover, not all illustrated blocks maybe required to implement the methods described herein.

Referring now to FIG. 12 , a block diagram 1200 is shown illustrating anexample, non-limiting embodiment of a virtualized communication networkin accordance with various aspects described herein. In particular avirtualized communication network is presented that can be used toimplement some or all of the subsystems and functions of system 100, thesubsystems and functions of RAN 201 and/or RAN node 202, and theoperations of operations flows 700, 900, and 1000 presented in FIGS. 1-5and 7-10 . For example, virtualized communication network 1200 canfacilitate in whole or in part detecting, by a wireless communicationdevice, a transmission, by a radio access network node, of an alertmessage, identifying contents of the alert message, determining that thewireless communication device is authorized to relay the contents of thealert message, generating alert information comprising the contents ofthe alert message, and transmitting a ProSe direct discovery messagecomprising the alert information.

In particular, a cloud networking architecture is shown that leveragescloud technologies and supports rapid innovation and scalability via atransport layer 1250, a virtualized network function cloud 1225 and/orone or more cloud computing environments 1275. In various embodiments,this cloud networking architecture is an open architecture thatleverages application programming interfaces (APIs); reduces complexityfrom services and operations; supports more nimble business models; andrapidly and seamlessly scales to meet evolving customer requirementsincluding traffic growth, diversity of traffic types, and diversity ofperformance and reliability expectations.

In contrast to traditional network elements—which are typicallyintegrated to perform a single function, the virtualized communicationnetwork employs virtual network elements (VNEs) 1230, 1232, 1234, etc.that perform some or all of the functions of network elements 150, 152,154, 156, etc. For example, the network architecture can provide asubstrate of networking capability, often called Network FunctionVirtualization Infrastructure (NFVI) or simply infrastructure that iscapable of being directed with software and Software Defined Networking(SDN) protocols to perform a broad variety of network functions andservices. This infrastructure can include several types of substrates.The most typical type of substrate being servers that support NetworkFunction Virtualization (NFV), followed by packet forwardingcapabilities based on generic computing resources, with specializednetwork technologies brought to bear when general purpose processors orgeneral purpose integrated circuit devices offered by merchants(referred to herein as merchant silicon) are not appropriate. In thiscase, communication services can be implemented as cloud-centricworkloads.

As an example, a traditional network element 150 (shown in FIG. 1 ),such as an edge router can be implemented via a VNE 1230 composed of NFVsoftware modules, merchant silicon, and associated controllers. Thesoftware can be written so that increasing workload consumes incrementalresources from a common resource pool, and moreover so that it'selastic: so the resources are only consumed when needed. In a similarfashion, other network elements such as other routers, switches, edgecaches, and middle-boxes are instantiated from the common resource pool.Such sharing of infrastructure across a broad set of uses makes planningand growing infrastructure easier to manage.

In an embodiment, the transport layer 1250 includes fiber, cable, wiredand/or wireless transport elements, network elements and interfaces toprovide broadband access 110, wireless access 120, voice access 130,media access 140 and/or access to content sources 175 for distributionof content to any or all of the access technologies. In particular, insome cases a network element needs to be positioned at a specific place,and this allows for less sharing of common infrastructure. Other times,the network elements have specific physical layer adapters that cannotbe abstracted or virtualized, and might require special DSP code andanalog front-ends (AFEs) that do not lend themselves to implementationas VNEs 1230, 1232 or 1234. These network elements can be included intransport layer 1250.

The virtualized network function cloud 1225 interfaces with thetransport layer 1250 to provide the VNEs 1230, 1232, 1234, etc. toprovide specific NFVs. In particular, the virtualized network functioncloud 1225 leverages cloud operations, applications, and architecturesto support networking workloads. The virtualized network elements 1230,1232 and 1234 can employ network function software that provides eithera one-for-one mapping of traditional network element function oralternately some combination of network functions designed for cloudcomputing. For example, VNEs 1230, 1232 and 1234 can include routereflectors, domain name system (DNS) servers, and dynamic hostconfiguration protocol (DHCP) servers, system architecture evolution(SAE) and/or mobility management entity (MME) gateways, broadbandnetwork gateways, IP edge routers for IP-VPN, Ethernet and otherservices, load balancers, distributers and other network elements.Because these elements don't typically need to forward large amounts oftraffic, their workload can be distributed across a number ofservers—each of which adds a portion of the capability, and overallwhich creates an elastic function with higher availability than itsformer monolithic version. These virtual network elements 1230, 1232,1234, etc. can be instantiated and managed using an orchestrationapproach similar to those used in cloud compute services.

The cloud computing environments 1275 can interface with the virtualizednetwork function cloud 1225 via APIs that expose functional capabilitiesof the VNEs 1230, 1232, 1234, etc. to provide the flexible and expandedcapabilities to the virtualized network function cloud 1225. Inparticular, network workloads may have applications distributed acrossthe virtualized network function cloud 1225 and cloud computingenvironment 1275 and in the commercial cloud, or might simplyorchestrate workloads supported entirely in NFV infrastructure fromthese third party locations.

Turning now to FIG. 13 , there is illustrated a block diagram of acomputing environment in accordance with various aspects describedherein. In order to provide additional context for various embodimentsof the embodiments described herein, FIG. 13 and the followingdiscussion are intended to provide a brief, general description of asuitable computing environment 1300 in which the various embodiments ofthe subject disclosure can be implemented. In particular, computingenvironment 1300 can be used in the implementation of network elements150, 152, 154, 156, access terminal 112, base station or access point122, switching device 132, media terminal 142, and/or VNEs 1230, 1232,1234, etc. Each of these devices can be implemented viacomputer-executable instructions that can run on one or more computers,and/or in combination with other program modules and/or as a combinationof hardware and software. For example, computing environment 1300 canfacilitate in whole or in part detecting, by a wireless communicationdevice, a transmission, by a radio access network node, of an alertmessage, identifying contents of the alert message, determining that thewireless communication device is authorized to relay the contents of thealert message, generating alert information comprising the contents ofthe alert message, and transmitting a ProSe direct discovery messagecomprising the alert information.

Generally, program modules comprise routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the methods can be practiced with other computer systemconfigurations, comprising single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

As used herein, a processing circuit includes one or more processors aswell as other application specific circuits such as an applicationspecific integrated circuit, digital logic circuit, state machine,programmable gate array or other circuit that processes input signals ordata and that produces output signals or data in response thereto. Itshould be noted that while any functions and features described hereinin association with the operation of a processor could likewise beperformed by a processing circuit.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structured dataor unstructured data.

Computer-readable storage media can comprise, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devicesor other tangible and/or non-transitory media which can be used to storedesired information. In this regard, the terms “tangible” or“non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and comprises any informationdelivery or transport media. The term “modulated data signal” or signalsrefers to a signal that has one or more of its characteristics set orchanged in such a manner as to encode information in one or moresignals. By way of example, and not limitation, communication mediacomprise wired media, such as a wired network or direct-wiredconnection, and wireless media such as acoustic, RF, infrared and otherwireless media.

With reference again to FIG. 13 , the example environment can comprise acomputer 1302, the computer 1302 comprising a processing unit 1304, asystem memory 1306 and a system bus 1308. The system bus 1308 couplessystem components including, but not limited to, the system memory 1306to the processing unit 1304. The processing unit 1304 can be any ofvarious commercially available processors. Dual microprocessors andother multiprocessor architectures can also be employed as theprocessing unit 1304.

The system bus 1308 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1306comprises ROM 1310 and RAM 1312. A basic input/output system (BIOS) canbe stored in a non-volatile memory such as ROM, erasable programmableread only memory (EPROM), EEPROM, which BIOS contains the basic routinesthat help to transfer information between elements within the computer1302, such as during startup. The RAM 1312 can also comprise ahigh-speed RAM such as static RAM for caching data.

The computer 1302 further comprises an internal hard disk drive (HDD)1314 (e.g., EIDE, SATA), which internal HDD 1314 can also be configuredfor external use in a suitable chassis (not shown), a magnetic floppydisk drive (FDD) 1316, (e.g., to read from or write to a removablediskette 1318) and an optical disk drive 1320, (e.g., reading a CD-ROMdisk 1322 or, to read from or write to other high capacity optical mediasuch as the DVD). The HDD 1314, magnetic FDD 1316 and optical disk drive1320 can be connected to the system bus 1308 by a hard disk driveinterface 1324, a magnetic disk drive interface 1326 and an opticaldrive interface 1328, respectively. The hard disk drive interface 1324for external drive implementations comprises at least one or both ofUniversal Serial Bus (USB) and Institute of Electrical and ElectronicsEngineers (IEEE) 1394 interface technologies. Other external driveconnection technologies are within contemplation of the embodimentsdescribed herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1302, the drives andstorage media accommodate the storage of any data in a suitable digitalformat. Although the description of computer-readable storage mediaabove refers to a hard disk drive (HDD), a removable magnetic diskette,and a removable optical media such as a CD or DVD, it should beappreciated by those skilled in the art that other types of storagemedia which are readable by a computer, such as zip drives, magneticcassettes, flash memory cards, cartridges, and the like, can also beused in the example operating environment, and further, that any suchstorage media can contain computer-executable instructions forperforming the methods described herein.

A number of program modules can be stored in the drives and RAM 1312,comprising an operating system 1330, one or more application programs1332, other program modules 1334 and program data 1336. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1312. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

A user can enter commands and information into the computer 1302 throughone or more wired/wireless input devices, e.g., a keyboard 1338 and apointing device, such as a mouse 1340. Other input devices (not shown)can comprise a microphone, an infrared (IR) remote control, a joystick,a game pad, a stylus pen, touch screen or the like. These and otherinput devices are often connected to the processing unit 1304 through aninput device interface 1342 that can be coupled to the system bus 1308,but can be connected by other interfaces, such as a parallel port, anIEEE 1394 serial port, a game port, a universal serial bus (USB) port,an IR interface, etc.

A monitor 1344 or other type of display device can be also connected tothe system bus 1308 via an interface, such as a video adapter 1346. Itwill also be appreciated that in alternative embodiments, a monitor 1344can also be any display device (e.g., another computer having a display,a smart phone, a tablet computer, etc.) for receiving displayinformation associated with computer 1302 via any communication means,including via the Internet and cloud-based networks. In addition to themonitor 1344, a computer typically comprises other peripheral outputdevices (not shown), such as speakers, printers, etc.

The computer 1302 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1348. The remotecomputer(s) 1348 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallycomprises many or all of the elements described relative to the computer1302, although, for purposes of brevity, only a remote memory/storagedevice 1350 is illustrated. The logical connections depicted comprisewired/wireless connectivity to a local area network (LAN) 1352 and/orlarger networks, e.g., a wide area network (WAN) 1354. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1302 can beconnected to the LAN 1352 through a wired and/or wireless communicationnetwork interface or adapter 1356. The adapter 1356 can facilitate wiredor wireless communication to the LAN 1352, which can also comprise awireless AP disposed thereon for communicating with the adapter 1356.

When used in a WAN networking environment, the computer 1302 cancomprise a modem 1358 or can be connected to a communications server onthe WAN 1354 or has other means for establishing communications over theWAN 1354, such as by way of the Internet. The modem 1358, which can beinternal or external and a wired or wireless device, can be connected tothe system bus 1308 via the input device interface 1342. In a networkedenvironment, program modules depicted relative to the computer 1302 orportions thereof, can be stored in the remote memory/storage device1350. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

The computer 1302 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, restroom), and telephone. This can comprise WirelessFidelity (Wi-Fi) and BLUETOOTH® wireless technologies. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.

Wi-Fi can allow connection to the Internet from a couch at home, a bedin a hotel room or a conference room at work, without wires. Wi-Fi is awireless technology similar to that used in a cell phone that enablessuch devices, e.g., computers, to send and receive data indoors and out;anywhere within the range of a base station. Wi-Fi networks use radiotechnologies called IEEE 802.11 (a, b, g, n, ac, ag, etc.) to providesecure, reliable, fast wireless connectivity. A Wi-Fi network can beused to connect computers to each other, to the Internet, and to wirednetworks (which can use IEEE 802.3 or Ethernet). Wi-Fi networks operatein the unlicensed 2.4 and 5 GHz radio bands for example or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic 10BaseT wired Ethernetnetworks used in many offices.

Turning now to FIG. 14 , an embodiment 1400 of a mobile network platform1410 is shown that is an example of network elements 150, 152, 154, 156,and/or VNEs 1230, 1232, 1234, etc. For example, platform 1410 canfacilitate in whole or in part detecting, by a wireless communicationdevice, a transmission, by a radio access network node, of an alertmessage, identifying contents of the alert message, determining that thewireless communication device is authorized to relay the contents of thealert message, generating alert information comprising the contents ofthe alert message, and transmitting a ProSe direct discovery messagecomprising the alert information. In one or more embodiments, the mobilenetwork platform 1410 can generate and receive signals transmitted andreceived by base stations or access points such as base station oraccess point 122. Generally, mobile network platform 1410 can comprisecomponents, e.g., nodes, gateways, interfaces, servers, or disparateplatforms, that facilitate both packet-switched (PS) (e.g., internetprotocol (IP), frame relay, asynchronous transfer mode (ATM)) andcircuit-switched (CS) traffic (e.g., voice and data), as well as controlgeneration for networked wireless telecommunication. As a non-limitingexample, mobile network platform 1410 can be included intelecommunications carrier networks, and can be considered carrier-sidecomponents as discussed elsewhere herein. Mobile network platform 1410comprises CS gateway node(s) 1412 which can interface CS trafficreceived from legacy networks like telephony network(s) 1440 (e.g.,public switched telephone network (PSTN), or public land mobile network(PLMN)) or a signaling system #7 (SS7) network 1460. CS gateway node(s)1412 can authorize and authenticate traffic (e.g., voice) arising fromsuch networks. Additionally, CS gateway node(s) 1412 can accessmobility, or roaming, data generated through SS7 network 1460; forinstance, mobility data stored in a visited location register (VLR),which can reside in memory 1430. Moreover, CS gateway node(s) 1412interfaces CS-based traffic and signaling and PS gateway node(s) 1418.As an example, in a 3GPP UMTS network, CS gateway node(s) 1412 can berealized at least in part in gateway GPRS support node(s) (GGSN). Itshould be appreciated that functionality and specific operation of CSgateway node(s) 1412, PS gateway node(s) 1418, and serving node(s) 1416,is provided and dictated by radio technology(ies) utilized by mobilenetwork platform 1410 for telecommunication over a radio access network1420 with other devices, such as a radiotelephone 1475.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 1418 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions cancomprise traffic, or content(s), exchanged with networks external to themobile network platform 1410, like wide area network(s) (WANs) 1450,enterprise network(s) 1470, and service network(s) 1480, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 1410 through PS gateway node(s) 1418. It is tobe noted that WANs 1450 and enterprise network(s) 1470 can embody, atleast in part, a service network(s) like IP multimedia subsystem (IMS).Based on radio technology layer(s) available in technology resource(s)or radio access network 1420, PS gateway node(s) 1418 can generatepacket data protocol contexts when a data session is established; otherdata structures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 1418 cancomprise a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 1400, mobile network platform 1410 also comprises servingnode(s) 1416 that, based upon available radio technology layer(s) withintechnology resource(s) in the radio access network 1420, convey thevarious packetized flows of data streams received through PS gatewaynode(s) 1418. It is to be noted that for technology resource(s) thatrely primarily on CS communication, server node(s) can deliver trafficwithout reliance on PS gateway node(s) 1418; for example, server node(s)can embody at least in part a mobile switching center. As an example, ina 3GPP UMTS network, serving node(s) 1416 can be embodied in servingGPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)1414 in mobile network platform 1410 can execute numerous applicationsthat can generate multiple disparate packetized data streams or flows,and manage (e.g., schedule, queue, format . . . ) such flows. Suchapplication(s) can comprise add-on features to standard services (forexample, provisioning, billing, customer support . . . ) provided bymobile network platform 1410. Data streams (e.g., content(s) that arepart of a voice call or data session) can be conveyed to PS gatewaynode(s) 1418 for authorization/authentication and initiation of a datasession, and to serving node(s) 1416 for communication thereafter. Inaddition to application server, server(s) 1414 can comprise utilityserver(s), a utility server can comprise a provisioning server, anoperations and maintenance server, a security server that can implementat least in part a certificate authority and firewalls as well as othersecurity mechanisms, and the like. In an aspect, security server(s)secure communication served through mobile network platform 1410 toensure network's operation and data integrity in addition toauthorization and authentication procedures that CS gateway node(s) 1412and PS gateway node(s) 1418 can enact. Moreover, provisioning server(s)can provision services from external network(s) like networks operatedby a disparate service provider; for instance, WAN 1450 or GlobalPositioning System (GPS) network(s) (not shown). Provisioning server(s)can also provision coverage through networks associated to mobilenetwork platform 1410 (e.g., deployed and operated by the same serviceprovider), such as the distributed antennas networks shown in FIG. 1(s)that enhance wireless service coverage by providing more networkcoverage.

It is to be noted that server(s) 1414 can comprise one or moreprocessors configured to confer at least in part the functionality ofmobile network platform 1410. To that end, the one or more processor canexecute code instructions stored in memory 1430, for example. It isshould be appreciated that server(s) 1414 can comprise a contentmanager, which operates in substantially the same manner as describedhereinbefore.

In example embodiment 1400, memory 1430 can store information related tooperation of mobile network platform 1410. Other operational informationcan comprise provisioning information of mobile devices served throughmobile network platform 1410, subscriber databases; applicationintelligence, pricing schemes, e.g., promotional rates, flat-rateprograms, couponing campaigns; technical specification(s) consistentwith telecommunication protocols for operation of disparate radio, orwireless, technology layers; and so forth. Memory 1430 can also storeinformation from at least one of telephony network(s) 1440, WAN 1450,SS7 network 1460, or enterprise network(s) 1470. In an aspect, memory1430 can be, for example, accessed as part of a data store component oras a remotely connected memory store.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 14 , and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe disclosed subject matter also can be implemented in combination withother program modules. Generally, program modules comprise routines,programs, components, data structures, etc. that perform particulartasks and/or implement particular abstract data types.

Turning now to FIG. 15 , an illustrative embodiment of a communicationdevice 1500 is shown. The communication device 1500 can serve as anillustrative embodiment of devices such as data terminals 114, mobiledevices 124, vehicle 126, display devices 144 or other client devicesfor communication via either communications network 125. For example,computing device 1500 can facilitate in whole or in part detecting, by awireless communication device, a transmission, by a radio access networknode, of an alert message, identifying contents of the alert message,determining that the wireless communication device is authorized torelay the contents of the alert message, generating alert informationcomprising the contents of the alert message, and transmitting a ProSedirect discovery message comprising the alert information.

The communication device 1500 can comprise a wireline and/or wirelesstransceiver 1502 (herein transceiver 1502), a user interface (UI) 1504,a power supply 1514, a location receiver 1516, a motion sensor 1518, anorientation sensor 1520, and a controller 1506 for managing operationsthereof. The transceiver 1502 can support short-range or long-rangewireless access technologies such as Bluetooth®, ZigBee®, WiFi, DECT, orcellular communication technologies, just to mention a few (Bluetooth®and ZigBee® are trademarks registered by the Bluetooth® Special InterestGroup and the ZigBee® Alliance, respectively). Cellular technologies caninclude, for example, CDMA-1×, UMTS/HSDPA, GSM/GPRS, TDMA/EDGE, EV/DO,WiMAX, SDR, LTE, as well as other next generation wireless communicationtechnologies as they arise. The transceiver 1502 can also be adapted tosupport circuit-switched wireline access technologies (such as PSTN),packet-switched wireline access technologies (such as TCP/IP, VoIP,etc.), and combinations thereof.

The UI 1504 can include a depressible or touch-sensitive keypad 1508with a navigation mechanism such as a roller ball, a joystick, a mouse,or a navigation disk for manipulating operations of the communicationdevice 1500. The keypad 1508 can be an integral part of a housingassembly of the communication device 1500 or an independent deviceoperably coupled thereto by a tethered wireline interface (such as a USBcable) or a wireless interface supporting for example Bluetooth®. Thekeypad 1508 can represent a numeric keypad commonly used by phones,and/or a QWERTY keypad with alphanumeric keys. The UI 1504 can furtherinclude a display 1510 such as monochrome or color LCD (Liquid CrystalDisplay), OLED (Organic Light Emitting Diode) or other suitable displaytechnology for conveying images to an end user of the communicationdevice 1500. In an embodiment where the display 1510 is touch-sensitive,a portion or all of the keypad 1508 can be presented by way of thedisplay 1510 with navigation features.

The display 1510 can use touch screen technology to also serve as a userinterface for detecting user input. As a touch screen display, thecommunication device 1500 can be adapted to present a user interfacehaving graphical user interface (GUI) elements that can be selected by auser with a touch of a finger. The display 1510 can be equipped withcapacitive, resistive or other forms of sensing technology to detect howmuch surface area of a user's finger has been placed on a portion of thetouch screen display. This sensing information can be used to controlthe manipulation of the GUI elements or other functions of the userinterface. The display 1510 can be an integral part of the housingassembly of the communication device 1500 or an independent devicecommunicatively coupled thereto by a tethered wireline interface (suchas a cable) or a wireless interface.

The UI 1504 can also include an audio system 1512 that utilizes audiotechnology for conveying low volume audio (such as audio heard inproximity of a human ear) and high volume audio (such as speakerphonefor hands free operation). The audio system 1512 can further include amicrophone for receiving audible signals of an end user. The audiosystem 1512 can also be used for voice recognition applications. The UI1504 can further include an image sensor 1513 such as a charged coupleddevice (CCD) camera for capturing still or moving images.

The power supply 1514 can utilize common power management technologiessuch as replaceable and rechargeable batteries, supply regulationtechnologies, and/or charging system technologies for supplying energyto the components of the communication device 1500 to facilitatelong-range or short-range portable communications. Alternatively, or incombination, the charging system can utilize external power sources suchas DC power supplied over a physical interface such as a USB port orother suitable tethering technologies.

The location receiver 1516 can utilize location technology such as aglobal positioning system (GPS) receiver capable of assisted GPS foridentifying a location of the communication device 1500 based on signalsgenerated by a constellation of GPS satellites, which can be used forfacilitating location services such as navigation. The motion sensor1518 can utilize motion sensing technology such as an accelerometer, agyroscope, or other suitable motion sensing technology to detect motionof the communication device 1500 in three-dimensional space. Theorientation sensor 1520 can utilize orientation sensing technology suchas a magnetometer to detect the orientation of the communication device1500 (north, south, west, and east, as well as combined orientations indegrees, minutes, or other suitable orientation metrics).

The communication device 1500 can use the transceiver 1502 to alsodetermine a proximity to a cellular, WiFi, Bluetooth®, or other wirelessaccess points by sensing techniques such as utilizing a received signalstrength indicator (RSSI) and/or signal time of arrival (TOA) or time offlight (TOF) measurements. The controller 1506 can utilize computingtechnologies such as a microprocessor, a digital signal processor (DSP),programmable gate arrays, application specific integrated circuits,and/or a video processor with associated storage memory such as Flash,ROM, RAM, SRAM, DRAM or other storage technologies for executingcomputer instructions, controlling, and processing data supplied by theaforementioned components of the communication device 1500.

Other components not shown in FIG. 15 can be used in one or moreembodiments of the subject disclosure. For instance, the communicationdevice 1500 can include a slot for adding or removing an identity modulesuch as a Subscriber Identity Module (SIM) card or Universal IntegratedCircuit Card (UICC). SIM or UICC cards can be used for identifyingsubscriber services, executing programs, storing subscriber data, and soon.

The terms “first,” “second,” “third,” and so forth, as used in theclaims, unless otherwise clear by context, is for clarity only anddoesn't otherwise indicate or imply any order in time. For instance, “afirst determination,” “a second determination,” and “a thirddetermination,” does not indicate or imply that the first determinationis to be made before the second determination, or vice versa, etc.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory, by way of illustration, and not limitation, volatilememory, non-volatile memory, disk storage, and memory storage. Further,nonvolatile memory can be included in read only memory (ROM),programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable ROM (EEPROM), or flash memory. Volatile memory cancomprise random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as synchronous RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).Additionally, the disclosed memory components of systems or methodsherein are intended to comprise, without being limited to comprising,these and any other suitable types of memory.

Moreover, it will be noted that the disclosed subject matter can bepracticed with other computer system configurations, comprisingsingle-processor or multiprocessor computer systems, mini-computingdevices, mainframe computers, as well as personal computers, hand-heldcomputing devices (e.g., PDA, phone, smartphone, watch, tabletcomputers, netbook computers, etc.), microprocessor-based orprogrammable consumer or industrial electronics, and the like. Theillustrated aspects can also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a communications network; however, some if not allaspects of the subject disclosure can be practiced on stand-alonecomputers. In a distributed computing environment, program modules canbe located in both local and remote memory storage devices.

In one or more embodiments, information regarding use of services can begenerated including services being accessed, media consumption history,user preferences, and so forth. This information can be obtained byvarious methods including user input, detecting types of communications(e.g., video content vs. audio content), analysis of content streams,sampling, and so forth. The generating, obtaining and/or monitoring ofthis information can be responsive to an authorization provided by theuser. In one or more embodiments, an analysis of data can be subject toauthorization from user(s) associated with the data, such as an opt-in,an opt-out, acknowledgement requirements, notifications, selectiveauthorization based on types of data, and so forth.

Some of the embodiments described herein can also employ artificialintelligence (AI) to facilitate automating one or more featuresdescribed herein. The embodiments (e.g., in connection withautomatically identifying acquired cell sites that provide a maximumvalue/benefit after addition to an existing communication network) canemploy various AI-based schemes for carrying out various embodimentsthereof. Moreover, the classifier can be employed to determine a rankingor priority of each cell site of the acquired network. A classifier is afunction that maps an input attribute vector, x=(x1, x2, x3, x4, . . . ,xn), to a confidence that the input belongs to a class, that is,f(x)=confidence (class). Such classification can employ a probabilisticand/or statistical-based analysis (e.g., factoring into the analysisutilities and costs) to determine or infer an action that a user desiresto be automatically performed. A support vector machine (SVM) is anexample of a classifier that can be employed. The SVM operates byfinding a hypersurface in the space of possible inputs, which thehypersurface attempts to split the triggering criteria from thenon-triggering events. Intuitively, this makes the classificationcorrect for testing data that is near, but not identical to trainingdata. Other directed and undirected model classification approachescomprise, e.g., naïve Bayes, Bayesian networks, decision trees, neuralnetworks, fuzzy logic models, and probabilistic classification modelsproviding different patterns of independence can be employed.Classification as used herein also is inclusive of statisticalregression that is utilized to develop models of priority.

As will be readily appreciated, one or more of the embodiments canemploy classifiers that are explicitly trained (e.g., via a generictraining data) as well as implicitly trained (e.g., via observing UEbehavior, operator preferences, historical information, receivingextrinsic information). For example, SVMs can be configured via alearning or training phase within a classifier constructor and featureselection module. Thus, the classifier(s) can be used to automaticallylearn and perform a number of functions, including but not limited todetermining according to predetermined criteria which of the acquiredcell sites will benefit a maximum number of subscribers and/or which ofthe acquired cell sites will add minimum value to the existingcommunication network coverage, etc.

As used in some contexts in this application, in some embodiments, theterms “component,” “system” and the like are intended to refer to, orcomprise, a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution,computer-executable instructions, a program, and/or a computer. By wayof illustration and not limitation, both an application running on aserver and the server can be a component. One or more components mayreside within a process and/or thread of execution and a component maybe localized on one computer and/or distributed between two or morecomputers. In addition, these components can execute from variouscomputer readable media having various data structures stored thereon.The components may communicate via local and/or remote processes such asin accordance with a signal having one or more data packets (e.g., datafrom one component interacting with another component in a local system,distributed system, and/or across a network such as the Internet withother systems via the signal). As another example, a component can be anapparatus with specific functionality provided by mechanical partsoperated by electric or electronic circuitry, which is operated by asoftware or firmware application executed by a processor, wherein theprocessor can be internal or external to the apparatus and executes atleast a part of the software or firmware application. As yet anotherexample, a component can be an apparatus that provides specificfunctionality through electronic components without mechanical parts,the electronic components can comprise a processor therein to executesoftware or firmware that confers at least in part the functionality ofthe electronic components. While various components have beenillustrated as separate components, it will be appreciated that multiplecomponents can be implemented as a single component, or a singlecomponent can be implemented as multiple components, without departingfrom example embodiments.

Further, the various embodiments can be implemented as a method,apparatus or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device or computer-readable storage/communicationsmedia. For example, computer readable storage media can include, but arenot limited to, magnetic storage devices (e.g., hard disk, floppy disk,magnetic strips), optical disks (e.g., compact disk (CD), digitalversatile disk (DVD)), smart cards, and flash memory devices (e.g.,card, stick, key drive). Of course, those skilled in the art willrecognize many modifications can be made to this configuration withoutdeparting from the scope or spirit of the various embodiments.

In addition, the words “example” and “exemplary” are used herein to meanserving as an instance or illustration. Any embodiment or designdescribed herein as “example” or “exemplary” is not necessarily to beconstrued as preferred or advantageous over other embodiments ordesigns. Rather, use of the word example or exemplary is intended topresent concepts in a concrete fashion. As used in this application, theterm “or” is intended to mean an inclusive “or” rather than an exclusive“or”. That is, unless specified otherwise or clear from context, “Xemploys A or B” is intended to mean any of the natural inclusivepermutations. That is, if X employs A; X employs B; or X employs both Aand B, then “X employs A or B” is satisfied under any of the foregoinginstances. In addition, the articles “a” and “an” as used in thisapplication and the appended claims should generally be construed tomean “one or more” unless specified otherwise or clear from context tobe directed to a singular form.

Moreover, terms such as “user equipment,” “mobile station,” “mobile,”subscriber station,” “access terminal,” “terminal,” “handset,” “mobiledevice” (and/or terms representing similar terminology) can refer to awireless device utilized by a subscriber or user of a wirelesscommunication service to receive or convey data, control, voice, video,sound, gaming or substantially any data-stream or signaling-stream. Theforegoing terms are utilized interchangeably herein and with referenceto the related drawings.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer” andthe like are employed interchangeably throughout, unless contextwarrants particular distinctions among the terms. It should beappreciated that such terms can refer to human entities or automatedcomponents supported through artificial intelligence (e.g., a capacityto make inference based, at least, on complex mathematical formalisms),which can provide simulated vision, sound recognition and so forth.

As employed herein, the term “processor” can refer to substantially anycomputing processing unit or device comprising, but not limited tocomprising, single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of user equipment. A processor canalso be implemented as a combination of computing processing units.

As used herein, terms such as “data storage,” data storage,” “database,”and substantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components comprisingthe memory. It will be appreciated that the memory components orcomputer-readable storage media, described herein can be either volatilememory or nonvolatile memory or can include both volatile andnonvolatile memory.

What has been described above includes mere examples of variousembodiments. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing these examples, but one of ordinary skill in the art canrecognize that many further combinations and permutations of the presentembodiments are possible. Accordingly, the embodiments disclosed and/orclaimed herein are intended to embrace all such alterations,modifications and variations that fall within the spirit and scope ofthe appended claims. Furthermore, to the extent that the term “includes”is used in either the detailed description or the claims, such term isintended to be inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

In addition, a flow diagram may include a “start” and/or “continue”indication. The “start” and “continue” indications reflect that thesteps presented can optionally be incorporated in or otherwise used inconjunction with other routines. In this context, “start” indicates thebeginning of the first step presented and may be preceded by otheractivities not specifically shown. Further, the “continue” indicationreflects that the steps presented may be performed multiple times and/ormay be succeeded by other activities not specifically shown. Further,while a flow diagram indicates a particular ordering of steps, otherorderings are likewise possible provided that the principles ofcausality are maintained.

As may also be used herein, the term(s) “operably coupled to”, “coupledto”, and/or “coupling” includes direct coupling between items and/orindirect coupling between items via one or more intervening items. Suchitems and intervening items include, but are not limited to, junctions,communication paths, components, circuit elements, circuits, functionalblocks, and/or devices. As an example of indirect coupling, a signalconveyed from a first item to a second item may be modified by one ormore intervening items by modifying the form, nature or format ofinformation in a signal, while one or more elements of the informationin the signal are nevertheless conveyed in a manner than can berecognized by the second item. In a further example of indirectcoupling, an action in a first item can cause a reaction on the seconditem, as a result of actions and/or reactions in one or more interveningitems.

Although specific embodiments have been illustrated and describedherein, it should be appreciated that any arrangement which achieves thesame or similar purpose may be substituted for the embodiments describedor shown by the subject disclosure. The subject disclosure is intendedto cover any and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, can be used in the subject disclosure.For instance, one or more features from one or more embodiments can becombined with one or more features of one or more other embodiments. Inone or more embodiments, features that are positively recited can alsobe negatively recited and excluded from the embodiment with or withoutreplacement by another structural and/or functional feature. The stepsor functions described with respect to the embodiments of the subjectdisclosure can be performed in any order. The steps or functionsdescribed with respect to the embodiments of the subject disclosure canbe performed alone or in combination with other steps or functions ofthe subject disclosure, as well as from other embodiments or from othersteps that have not been described in the subject disclosure. Further,more than or less than all of the features described with respect to anembodiment can also be utilized.

What is claimed is:
 1. A wireless communication device, comprising: aprocessing system including a processor; and a memory that storesexecutable instructions that, when executed by the processing system,facilitate performance of operations, the operations comprising:detecting a transmission, by a radio access network node, of an alertmessage; generating alert information comprising contents of the alertmessage; and transmitting, to a second wireless communication device, afirst proximity services (ProSe) direct discovery message comprising thealert information, wherein the second wireless communication device ispre-provisioned with a first authorization to relay the alertinformation via a second ProSe direct discovery message.
 2. The wirelesscommunication device of claim 1, wherein the second wirelesscommunication device is pre-provisioned with a second authorization toreceive the alert information from the first ProSe direct discoverymessage.
 3. The wireless communication device of claim 1, wherein theoperations further comprise identifying contents of the alert message.4. The wireless communication device of claim 1, wherein the operationsfurther comprise determining that the wireless communication device isauthorized to relay the contents of the alert message.
 5. The wirelesscommunication device of claim 1, wherein the alert message is comprisedin a system information block (SIB), and wherein the second wirelesscommunication device transmits the alert information to a third wirelesscommunication device via the second ProSe direct discovery message. 6.The wireless communication device of claim 1, wherein the first ProSedirect discovery message includes a wireless emergency alert (WEA)content information element (IE) that comprises the alert information.7. The wireless communication device of claim 6, wherein the WEA contentIE includes a first parameter comprising a serial number identifying thealert message and a second parameter comprising text of the alertmessage.
 8. The wireless communication device of claim 1, wherein thefirst ProSe direct discovery message comprises a PC5 DISCOVERY messagefor relay discovery additional information (RDAI).
 9. The wirelesscommunication device of claim 1, wherein the first ProSe directdiscovery message includes a relay discovery additional information(RDAI) composition information element (IE), wherein the RDAIcomposition IE includes a first bit comprising a value set to indicate apresence of the alert information.
 10. The wireless communication deviceof claim 9, wherein the RDAI composition IE includes a second bitcomprising a value set to indicate an absence of an evolved universalmobile telecommunications system terrestrial radio access network(E-UTRAN) cell global identifier (ECGI) IE.
 11. The wirelesscommunication device of claim 9, wherein the RDAI composition IEincludes a third bit comprising a value set to indicate an absence of amultimedia broadcast multicast service (MBMS) related information IE.12. A non-transitory machine-readable medium, comprising executableinstructions that, when executed by a processing system of a wirelesscommunication device, the processing system including a processor,facilitate performance of operations, the operations comprising:detecting a transmission, by a radio access network node, of an alertmessage; generating alert information comprising contents of the alertmessage; and transmitting, to a second wireless communication device, afirst proximity services (ProSe) direct discovery message comprising thealert information, wherein the second wireless communication device isauthorized to relay the alert information.
 13. The non-transitorymachine-readable medium of claim 12, wherein the operations furthercomprise: identifying contents of the alert message; and determiningthat the wireless communication device is authorized to relay thecontents of the alert message.
 14. The non-transitory machine-readablemedium of claim 12, wherein the second wireless communication device ispre-provisioned with an authorization to receive the alert informationfrom the first ProSe direct discovery message.
 15. The non-transitorymachine-readable medium of claim 12, wherein the second wirelesscommunication device is pre-provisioned with an authorization to relaythe alert information via a second ProSe direct discovery message. 16.The non-transitory machine-readable medium of claim 12, wherein thealert message is comprised in a system information block (SIB).
 17. Thenon-transitory machine-readable medium of claim 12, wherein the firstProSe direct discovery message comprises a relay discovery additionalinformation (RDAI) composition information element (IE) that includes afirst bit comprising a value set to indicate a presence of the alertinformation.
 18. A method, comprising: detecting, by a processing systemincluding a processor, a transmission, by a radio access network node,of an alert message; generating, by the processing system, alertinformation comprising contents of the alert message; and transmitting,by the processing system, to a second wireless communication device, afirst proximity services (ProSe) direct discovery message comprising thealert information.
 19. The method of claim 18, further comprising:identifying, by the processing system, contents of the alert message;and determining, by the processing system, that the wirelesscommunication device is authorized to relay the contents of the alertmessage.
 20. The method of claim 18, wherein the second wirelesscommunication device is pre-provisioned with an authorization to receivethe alert information from the first ProSe direct discovery message, andwherein the second wireless communication device is pre-provisioned withan authorization to relay the alert information via a second ProSedirect discovery message.