Location-based resource allocation in 5G networks

ABSTRACT

Techniques for configuring a network system that includes a cellular network and a Wi-Fi network to support location-based resource allocation are discussed herein. To cover regions with weak cellular signal and/or with densely packed devices (e.g., a stadium during a football game), a network may use both cellular and Wi-Fi networks to provide coverage. In some examples, the system may configure a base station and a user device to enable automatic authentication of the user device to access a new Wi-Fi network. In response to a service request from the user device, the system may determine whether the Wi-Fi network can handle the service or switch a serving connection. The system may also determine whether the Wi-Fi network includes location-based applications that should be rendered at the user device.

BACKGROUND

Modern telecommunication systems include heterogeneous mixtures ofsecond, third, fourth, and fifth generation (2G, 3G, 4G, 5G) cellularwireless access technologies, which may be cross-compatible and mayoperate collectively to provide communication services. Global Systemsfor Mobile (GSM) is an example of 2G telecommunications technologies;Universal Mobile Telecommunications System (UMTS) is an example of 3Gtelecommunications technologies; Long Term Evolution (LTE), includingLTE Advanced, and Evolved High-Speed Packet Access (HSPA+) are examplesof 4G telecommunications technologies; and New Radio (NR) is an exampleof 5G telecommunication technologies.

To provide infrastructure for wireless communication technologies,wireless nodes may be deployed to provide support for a particular typeof network. These wireless nodes enable connectivity to support theinfrastructure and systems for the next-generation networks.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is described with reference to the accompanyingfigures. In the figures, the left-most digit(s) of a reference numberidentifies the figure in which the reference number first appears. Theuse of the same reference numbers in different figures indicates similaror identical components or features.

FIG. 1 illustrates an example system including network devicesconfigured to support location-based resource allocation.

FIG. 2 is a block diagram of a user device.

FIG. 3 is a block diagram of a network device configured to supportlocation-based resource allocation.

FIG. 4 is a schematic diagram showing an example system includingnetwork devices configured to support location-based resourceallocation.

FIG. 5 illustrates an example process for configuring a network tosupport location-based resource allocation, including automaticauthentication for Wi-Fi network access.

FIG. 6 illustrates another example process for configuring a network tosupport location-based resource allocation, including Wi-Fi networkswitch.

FIG. 7 illustrates another example process for configuring a network tosupport automatic authentication for a location-based application.

DETAILED DESCRIPTION

Techniques for configuring a network system with network devices thatsupport location-based resource allocation for user devices arediscussed herein. In a traditional cellular network, a user device maybe automatically authenticated to access a cellular network withinformation stored on a subscriber identity module (SIM) card. The userdevice may need manual input to access an unknown Wi-Fi network withinformation entered by user input. In some examples, after the initialaccess to the unknown Wi-Fi network, the user device may remember theWi-Fi network and may automatically sign onto the Wi-Fi network againwhen the user device is within signal range again. In some instances, inlarge stadiums, warehouses, or other similarly large structures, theuser devices within the interior of these structures may be denselypacked while sharing the same weak cellular signal (“weak signalregion”). These structures may also be wired with wireless nodes toprovide Wi-Fi coverage to substantially all of the structure.Accordingly, to provide network coverage for such a weak signal region,a service provider may partner with the Wi-Fi service provider to deploya network including base stations and Wi-Fi access points thatautomatically authenticates the user device to access the Wi-Fi networkand determine location-based resource allocation.

In some examples, the system may configure network devices and userdevices to support location-based resource allocation. The system mayconfigure a SIM card with an enhanced SIM profile to indicate that anassociated user device is configured to automatically self-authenticateand/or enable location-based services associated with the serviceprovider. The system may configure a network device on a base station tostore network data for one or more Wi-Fi networks within the coveragearea of the base station. The network data may include information foreach Wi-Fi network, including network security information, access pointlocations, and/or a geofence for the Wi-Fi network. The geofence may bedefined by: (1) a predetermined radius from a location of a wirelessnode and/or (2) corner coordinates defining geofence boundaries. Invarious examples, the system may receive data from a user device thathas entered into the coverage area of the base station. The data mayinclude SIM data and a beam number of the base station in connectionwith the user device. The SIM data may indicate an enhanced SIM profile.The system may determine, based on the SIM data, the user device isconfigured to use the location-based resources.

In various examples, the system may use the beam number to determinemore precise geolocation information associated with the location of theuser device. A user device may include a Global Positioning System (GPS)receiver to receive and report signal information received from GPSsatellites in a traditional geolocation system. The traditional systemrelies on the global navigation satellite systems (GNSS) to provide thegeolocation and time information to the GPS receiver if there is anunobstructed line of sight to four or more GPS satellites. However,obstacles such as large building structures may block the weak GPSsignals. Thus, the present system using the beam number to determine thegeolocation information may provide more accurate geolocationinformation associated with the location of the user device. The systemmay use the beam number to determine beam data, including location dataof the base station, a beam direction, a beam tilt, a beam power, a beamfrequency band (e.g., the Millimeter wave (mmWave) band), and the like.The system may apply any beam allocation algorithm with the beam data asinput to determine the geolocation information. The system may use thegeolocation information to determine the available location-basedservices include a cellular network and a Wi-Fi network. The system maydetermine if the user device is within a geofence of the Wi-Fi networkand if yes, the system may automatically authenticate the user device toaccess the Wi-Fi network.

In various examples, the system may determine a location-based resourceto use based on a requested service type and/or prioritization scheme.The system may determine to maintain both a cellular connection and aWi-Fi connection with the user device. The system may receive signalreports from the devices in an area, and the prioritization scheme maydetermine the network selection rules based on signal quality and/orstrength. In some examples, the location-based resources may includemore than one Wi-Fi network, and the prioritization scheme may determinethe network selection based on prioritizing a high-security network, apreferred partner network, and/or a user home network. Additionally, theprioritization scheme may include prioritizing Wi-Fi connection use overthe cellular connection unless it receives a service request for aspecific service type that requires a cellular connection from the userdevice. The service types may include but are not limited to: anemergency service call, a voice call to a terminating user device,internet access, email access, data transfer, and the like. In someexamples, a particular service type (e.g., emergency service call) mayonly be served by the cellular network, and in response, the system maydetermine to switch the network, if not already connected, to thecellular network. In an alternative and/or additional examples, theparticular service type (e.g., internet access, email access, datatransfer) can be served by the Wi-Fi network and/or the cellularnetwork, and in response, the system may determine to switch thenetwork, if not already connected, to the Wi-Fi network. In someexamples, the system may generate security tokens for Wi-Fi connectionsfor secured data transfer and/or high-security networks. The system mayconfigure a communication client that may download application dataand/or stream data onto the user device.

The systems and methods described herein can be used to deploy a networkwith wireless nodes configured to support location-based resourceallocation. As noted above, traditional cellular networks use basestations to provide wireless connectivity. However, in weak signalregions with high network capacity requirements, the base stations maynot provide adequate quality coverage. The present system provides fastand cost-effective deployment of wireless service to these weak signalbut densely populated regions. The system may monitor network use andsignal quality to determine whether a connection to a device shouldswitch between a cellular network or a Wi-Fi network to optimize networktraffic. Additionally, the system may use a priority scheme to furtheroptimize network traffic. Moreover, by allowing automatic authenticationto access a location-based network and/or access a location-basedapplication, the system may reduce the resources needed to wait formanual input. These and other improvements to the functioning of acomputer and network are discussed herein.

In some examples, the techniques discussed herein can be implemented inthe context of protocols associated with one or more of 3G, 4G, 4G LTE,5G protocols. In some examples, the network implementations can supportstandalone architectures, non-standalone architectures, dualconnectivity, carrier aggregation, etc. Example implementations areprovided below with reference to the following figures.

FIG. 1 illustrates an example system 100, including network devicesconfigured to support location-based resource allocation.

The user device 102(1) and user device 102(2) (collectively referred toas user devices 102) can communicatively connect with other devices,including network devices(s) (e.g., network devices 104 and 106)associated with a service provider, via one or more network(s) 108. Inan example, the example system 100 shows user device 102(1) and userdevice 102(2) can connect to the one or more network(s) 108 to engage indata transfers and/or any other type of communication. The userdevice(s) 102 can be any user device that can connect and communicatebetween the next-generation network (e.g., 5G Standalone (SA)) and thelegacy network (e.g., 4G LTE). In some examples, the user device(s) 102can be a mobile phone, such as a smartphone or other cellular phone. Inother examples, the user device(s) 102 can be a personal digitalassistant (PDA), a media player, a tablet computer, a gaming device, asmartwatch, a network hub, a personal computer (PC) such as a laptop,desktop, or workstation, or any other type of computing or communicationdevice. The user device(s) 102 may include a SIM card and acommunication client. In some examples, the user device(s) 102 may usedata from the SIM card to establish connections with correspondingnetwork nodes (e.g., network device(s) 104 and 106) to transmit data,including information to identify the device and/or SIM profile.

The user device(s) 102 may be configured to use a SIM card associatedwith the service provider. The SIM card may store data (“SIM data” or“SIM profile”) associated with the user device(s) 102, the devicecapabilities, the service provider, subscription information, and thelike. In some examples, the SIM profile may indicate the user device(s)102 is associated with a subscription for the service provider and mayfurther indicate any features and/or services that are supported basedon the subscription. For instance, the SIM profile may be an enhancedSIM profile to indicate that the user device(s) 102 is configured toautomatically self-authenticate and/or enable location-based servicesassociated with the service provider. The SIM data may include theservice provider and/or network information used to authenticate andidentify subscribers on the network, the information including, but notlimited to, an international mobile subscriber identity (IMSI),authentication key, an Integrated Circuit Card Identification Number(ICCID), Local Area Identity (LAI), Service Provider Name (SPN), ServiceDialing Numbers (SDN), a Subscription Concealed Identifier (SUCI), aSubscription Permanent Identifier (SUPI), and the like.

The user device(s) 102 may include a communication client configured tosupport communication sessions and/or related data transmission. In someexamples, the communication client may interface with a user and anetwork. The communication client may provide access to a user portal toregister an associated user device for subscription to wireless servicefrom the service provider. The communication client may generate a userinterface or trigger an application to present location-basedapplication content. In various examples, the communication client mayconfigure communication parameters based on the subscription and theaccess network. The communication parameter may include but is notlimited to network selection rules, access type, signal strength, Wi-Fiinformation, and the like.

In some examples, the user device(s) 102 can wirelessly connect to oneor more base stations or other access points of the access networks, andin turn, be connected to the network(s) 108 via the base stations (e.g.,network device(s) 104) or other access points (e.g., network device(s)106). In some examples, the network(s) 108 can be a packet core networkof an LTE network, which may be referred to as an Evolved Packet Core(EPC). In other examples, the network(s) 108 can be a 5G core network.

The base station may implement the network device(s) 104 and may includea coverage area with a first Wi-Fi access network 114 and a second Wi-Fiaccess network 116. The first Wi-Fi access network 114 can includenetwork device(s) 106(1), 106(2), 106(3), 106(4), and 106(5). The secondWi-Fi access network 116 can include network device(s) 106(6) and106(N).

The network device(s) 106(1), 106(2), 106(3), 106(4), 106(5), 106(6),and 106(N) (collectively referred to as network device(s) 106) cancommunicatively connect with other devices, including the user devices102 and other network node(s) (e.g., network device(s) 104) associatedwith a service provider, via the one or more network(s) 108. In someexamples, the network device(s) 104 implemented in the base station andthe network device(s) 106 implemented in the Wi-Fi nodes may beconfigured to automatically authenticate user devices to connect to oneor more Wi-Fi networks associated with the service provider and toaccess any location-based services provided by the Wi-Fi node(s). Forinstance, the network device(s) 106(1)-106(5) implemented on the firstWi-Fi access network 114, may each be configured to provide access toapplications and/or application data related to team information formatches at the stadium. Additionally, the network device(s) 106(6) and106(N) implemented on the second Wi-Fi access network 116, may each beconfigured to provide access to applications and/or application datarelated to event information for shows at the convention hall. Theapplications and/or application data may be triggered or displayed bythe communication clients on the user device(s) 102.

The network device(s) 104 can include a location service component 110and a scheduler component 112. In some instances, the network device(s)104 can include implementing one or more communication servers tofacilitate communications by and between the various devices in thesystem 100. That is, the network device(s) 104 can represent anycomputing devices implementing various aspects of one or more of second,third, fourth, and fifth generation (2G, 3G, 4G, and 5G) cellularwireless access technologies, which may be cross-compatible and mayoperate collectively to provide data communication services.

Global Systems for Mobile (GSM) is an example of 2G telecommunicationstechnologies; Universal Mobile Telecommunications System (UMTS) is anexample of 3G telecommunications technologies; Long Term Evolution(LTE), including LTE Advanced, and Evolved High-Speed Packet Access(HSPA+) are examples of 4G telecommunications technologies; and NewRadio (NR) is an example of 5G telecommunication technologies. Thus, thenetwork device(s) 104 may implement GSM, UMTS, LTE/LTE Advanced, and/orNR telecommunications technologies.

In some instances, telecommunication technologies can be referred togenerally as radio access technology. Thus, a 5G network can represent5G radio access technology. The network nodes (e.g., network device(s)104) may include, but is not limited to, a combination of: basetransceiver stations (BTSs) (e.g., NodeBs, Enhanced-NodeBs, gNodeBs),Radio Network Controllers (RNCs), serving GPRS support nodes (SGSNs),gateway GPRS support nodes (GGSNs), proxies, a mobile switching center(MSC), a mobility management entity (MME), a serving gateway (SGW), apacket data network (PDN) gateway (PGW), an evolved packet data gateway(e-PDG), an Internet Protocol (IP) Multimedia Subsystem (IMS), or anyother data traffic control entity configured to communicate and/or routedata packets between the user device(s) 102, the network device(s) 104and 106, and/or the network(s) 108. In some embodiments, the networkdevice(s) 104 and 106 may be operated by one or more service providers.A service provider may include a wireless service provider,telecommunications service provider, cellular carrier, network operator,mobile operator, and the like. The network device(s) 104 and 106 andassociated components, including the location service component 110 andthe scheduler component 112, may configure a database to maintainsubscriber information with associated SIM card information and networkinformation with associated Wi-Fi network information to support thenetwork system. In various examples, the system may receive, from a userdevice, data for requesting access to the network and/or data formaintaining the connection to the network. If not yet authenticated, thesystem may authenticate the user device(s) 102 to access the cellularnetwork of the base station. In some examples, the system may determinewhether the data includes SIM data indicating an enhanced SIM profile.If the SIM data indicates an enhanced SIM profile, the location servicecomponent 110 may determine which location-based resource is availableto the user device. The scheduler component 112 may determine anallocation for the resources available between all the currentlyconnected user devices. Additionally, based at least in part on theenhanced SIM profile, the location service component 110 may determineto automatically authenticate the user device to access a new Wi-Finetwork.

The location service component 110 may include functions to identify thelocation-based resources available. The location-based resources mayinclude but are not limited to: wireless networks, file access,application access, discount offers, media access, and the like. In someexamples, the location service component 110 may be implemented on anetwork device associated with a network node (e.g., base station,wireless access point, etc.) and may facilitate communication betweenthe network nodes and other devices in the network. In various examples,the location service component 110 implemented on the network device(s)104 may receive and store network data for one or more Wi-Fi networkswithin the coverage area of the base station. The network data mayinclude information for each Wi-Fi network, including access pointlocations and/or a geofence for the Wi-Fi network. The geofence may bedefined by: (1) a predetermined radius from an access point location or(2) a predetermined geographical boundary defining a polygon (e.g.,inside a boundary defined by three or more coordinates). For instance,the network data for the first Wi-Fi access network 114 may includeWi-Fi access information, the geolocations of the network device(s)106(1)-106(5), and the geofence may be defined by the four geolocationcorners of the stadium. In various examples, the location servicecomponent 110 may receive data from a user device 102 inside thecoverage area of the base station. The data may include SIM data and abeam number of the base station in connection with the user device.

The location service component 110 may use the beam number to determinegeolocation information associated with the location of the user device.As discussed herein, the user device may include a GPS receiver toreceive and report the geolocation and time information obtained fromGPS satellites; however, the geolocation may be inaccurate inside largebuilding structures that may block the weak GPS signals. The locationservice component 110 may use the beam number to determine beam data,including location data of the base station, a beam direction, a beamtilt, a beam power, a beam frequency band (e.g., the Millimeter wave(mmWave) band), and the like. The location service component 110 mayapply any beam allocation algorithm with the beam data as input todetermine the geolocation information. The location service component110 may use the geolocation information to determine the availablelocation-based services include a cellular network and a Wi-Fi network.The location service component 110 may determine if the user device iswithin the Wi-Fi network geofence. In response to affirmative, thelocation service component 110 may automatically authenticate the userdevice to access the Wi-Fi network.

In some examples, the location service component 110 may includefunctions to automatically download data associated with alocation-based resource. The location service component 110 maydetermine, based on accessing the Wi-Fi network, that a current locationhas a location-based resource available. In response to a type oflocation-based resource available, the location service component 110may download associated data and/or trigger an associated application onthe user device(s) 102. The type of location-based resource may includea media file, a data file for advertisement, an application trigger, astreaming file, and the like. In response to an application trigger, thelocation service component 110 may cause a communication client todisplay a prompt on the user device(s) 102 to confirm opening anapplication. In some examples, the user may grant, via a user accountsetting, permission for the system to automatically confirm and triggera location-based application. In response to either a manual orautomatic confirmation, the location service component 110 may triggerthe application. For instance, a ski resort may have a ski trackerapplication to measure the number of runs you've taken; the locationservice component 110 may trigger the ski tracker application based onthe user device(s) 102 being at the ski resort.

The scheduler component 112 may determine location-based resourcesavailable and allocate the resources available. As described herein, thelocation service component 110 may receive, from a user device 102, arequest to establish a first wireless connection with a base station anda second wireless connection to a Wi-Fi node. In response toestablishing the two wireless connections, the scheduler component 112may determine the location-based resource allocation for the network. Insome examples, the allocation of network resources may be based at leastin part on a requested service type from the user device. In alternativeand/or additional examples, the allocation of network resources may bebased at least in part on one or more prioritization schemes. In variousexamples, the prioritization schemes may include one or more networkselection criteria, network selection priority rules, user-definedpriority rules, and the like. The network selection criteria may includepredefined criteria for prioritizing a network (e.g., prioritizingnetwork signal quality but only switch when the quality differenceexceeds a threshold). The network selection priority rules may includepredefined rules for prioritizing a network (e.g., prioritizing a Wi-Finetwork unless service type requires a cellular network; prioritizing amore network with more security features, prioritizing a partner and/oraffiliated network). The user-defined priority rules may include a listof user-defined rules for prioritizing a network over another (e.g.,prioritizing my home Wi-Fi network when available). The schedulercomponent 112 may maintain both the cellular connection and the Wi-Ficonnection for a user device and select the connection based on servicerequests. The scheduler component 112 may receive signal reports fromuser devices in the coverage area.

In various examples, the scheduler component 112 may use one or moreprioritization schemes to select from the available network(s). In anexample, a prioritization scheme may be based on the signal qualityand/or signal strength of each available network(s). In some examples,the available network(s) may include two or more Wi-Fi networks, and theprioritization scheme may be based on a security level, an associationwith the service provider, and an association with the user.Additionally, the prioritization scheme may include prioritizing Wi-Ficonnections over cellular connections unless the scheduler component 112receives, from the user device, a service request for a specific servicetype that requires a cellular connection. The service types may includebut are not limited to an emergency service call, a voice call to aterminating device, internet access, email access, data transfer, andthe like. In some examples, a particular service type (e.g., emergencyservice call) may only be served by the cellular network; thus, thescheduler component 112 may switch the serving network, if necessary, tothe cellular network. In various examples, the scheduler component 112may poll a Wi-Fi network to determine the network capabilities,including network security level and speed. In additional examples, thescheduler component 112 may generate a security token for a Wi-Ficonnection for secured data transfer and/or high-security network. Thescheduler component 112 may cause a communication client on the userdevice to download application data and/or stream data on the userdevice.

While FIG. 1 illustrates the network(s) 108, it is understood in thecontext of this document that the techniques discussed herein may alsobe implemented in other networking technologies, such as nodes that arepart of a wide area network (WAN), metropolitan area network (MAN),local area network (LAN), neighborhood area network (NAN), personal areanetwork (PAN), or the like. Examples of the network(s) 108 can includebut are not limited to networks including second-generation (2G),third-generation (3G), fourth-generation (4G) cellular networks, such asLTE (Long Term Evolution), fifth-generation (5G) networks, and datanetworks, such as Wi-Fi networks.

In some instances, the network device(s) 104 and 106 can communicatewith any number of user equipment, user devices, servers, networkdevices, computing devices, and the like.

As a non-limiting example, the example system 100 can illustrate anexample network with a base station configured to support location-basedresource allocation. The location-based resources may include onecellular network and two Wi-Fi networks within the base station coveragearea. The example system 100 includes an example network, including anetwork device(s) 104 of a base station with an example cellularcoverage area that overlaps an example first Wi-Fi access network 114and an example second Wi-Fi access network 116. The example cellularcoverage area is in a densely packed weak signal region, including alarge stadium and a convention hall, and has a high network capacityrequirement.

The example first Wi-Fi access network 114 includes example networkdevice(s) 106(1)-106(5). The example first Wi-Fi access network 114provides Wi-Fi network coverage for a large stadium. In the presentexample, a soccer match is playing at the stadium. A first user iswatching the match and operating the user device 102(1) within thecoverage area of the example first Wi-Fi access network 114.

In the present example, the user device 102(1) is communicativelyconnected to the base station. The network device(s) 104 may receivedata (e.g., the example data 118) from the user device 102(1). Theexample data 118 may include SIM data and a beam number of the basestation in connection with the user device 102(1). The location servicecomponent 110 located on the network device(s) 104 may determine, basedon the SIM data, that the user device 102(1) is using a SIM cardconfigured with an enhanced SIM profile. Additionally, the locationservice component 110 may use the beam number to determine the firstgeolocation information associated with the first location of the userdevice 102(1).

The location service component 110 may use the first geolocationinformation to determine that the location-based resources include thecellular network provided by the base station and the example firstWi-Fi access network 114. The location service component 110 maydetermine that the first location of the user device 102(1) is within ageofence of the example first Wi-Fi access network 114 and determinethat the example network device(s) 106(5) is the nearest access point.The location service component 110 may transmit example data 120, whichmay include network credential information, to the example networkdevice(s) 106(5). The system may automatically authenticate the userdevice 102(1) to access the example first Wi-Fi access network 114without any input from the first user. In some instances, the locationservice component 110 may determine based on the first location of theuser device 102(1) that location-based example application data 122 isavailable and transmits the example application data 122 to the userdevice 102(1). An example communication client on the user device 102(1)may present the example application data 122. In the present examples,the user device 102(1) may be prompted with a user interface for viewingthe team stats. The user interface may include one or more graphicalelements to present the example team stats. The graphical elements mayinclude but are not limited to 2-dimensional graphical elements,3-dimensional graphical elements, augmented reality graphical elements,and the like.

The example second Wi-Fi access network 116 may include the networkdevice(s) 106(6) and 106(N) to provide wireless coverage for theconvention hall next to the stadium. In the present example, a concertis playing at the convention hall, and a second user is operating anexample user device 102(2) within the geofence of the example secondWi-Fi access network 116.

In the present example, the user device 102(2) may have established aconnection to the base station with the network device(s) 104. Thenetwork device(s) 104 may receive the example data 124 from the exampleuser device 102(2). The example data 124 may include SIM data and a beamnumber of the base station in connection with the example user device102(2). The location service component 110 located on the networkdevice(s) 104 may determine, based on the SIM data, that the user device102(2) uses a SIM card configured with an enhanced SIM profile.Additionally, the location service component 110 may use the beam numberto determine second geolocation information associated with a secondlocation of the user device 102(2).

The location service component 110 may use the second geolocationinformation to determine the available location-based resources. Theresources include the cellular network provided by the base station andthe example second Wi-Fi access network 116. The location servicecomponent 110 may determine that the second location of the user device102(2) is within a geofence of the example second Wi-Fi access network116. Additionally, the system may determine that although the examplenetwork device(s) 106(5) is the nearest access point (based ondistance), the example network device(s) 106(N) is the nearest accesspoint within the geofence of the example second Wi-Fi access network116. The location service component 110 may transmit example data 126 tothe example network device(s) 106(N). The example data 126 may includenetwork credential information to automatically authenticate the userdevice 102(2) to access the example second Wi-Fi access network 116without any input from the second user. In some examples, the locationservice component 110 may determine example application data 128 isavailable for the second location. The system may transmit the exampleapplication data 128 to the user device 102(2). An example communicationclient on the user device 102(2) may present the example applicationdata 128. In the present examples, the communication client may generatea user interface for triggering an example media application “MediaZ” todisplay the song lyrics for a song currently playing.

FIG. 2 is a block diagram of user device 200 configured to use networkservice. In some embodiments, the user device 200 can correspond to theuser device 102(1), 102(2), . . . , 102(N) of FIG. 1 . It is to beunderstood in the context of this disclosure that the user device 200can be implemented as a single device or as a plurality of devices withcomponents and data distributed among them. By way of example, andwithout limitation, the user device 200 can be implemented as varioususer device 200(1), 200(2), . . . , 200(N).

As illustrated, the user device 200 comprises a memory 204 storing anoperating system component 206, a Session Initiation Protocol (SIP)component 208, a communication component 210, and a reporting component212. Also, the user device 200 includes processor(s) 202, a removablestorage 214 and non-removable storage 216, input device(s) 218, outputdevice(s) 220, and transceiver(s) 222.

In various embodiments, the memory 204 is volatile (such as RAM),non-volatile (such as ROM, flash memory, etc.) or some combination ofthe two. The operating system component 206, the SIP component 208, thecommunication component 210, and the reporting component 212 stored inthe memory 204 can comprise methods, threads, processes, applications,or any other sort of executable instructions. The operating systemcomponent 206, the SIP component 208, the communication component 210,and the reporting component 212 can also include files and databases.

The operating system component 206 can include functionality to identifyand track the different applications installed on the user device 200.The operating system component 206 can include functionality to query achipset of the user device 200, and/or query the transceiver(s) 222, toinstruct the transceiver(s) 222 and/or any software or hardware to scanone or more channels or frequency resources to determine metricsassociated with the channel or frequency resources, for example. In someinstances, the operating system component 206 can include an API toreceive instructions from one or more of the SIP component 208, thecommunication component 210, and the reporting component 212 and toprovide data to the corresponding components, including identifying thecommunication clients and/or communication capabilities of the userdevice 200 and/or a serving network, and notifying the components ofclients and/or capabilities. The serving network may include one or morenetwork(s) that the user device 200 is currently communicativelyconnected to. For instance, the user device 200 may be connected to acellular network and/or connected to a Wi-Fi network.

The SIP component 208 may enable communications to be served using SIPinstances and/or SIP messages. The SIP component 208 may transmit SIPmessages containing information for identifying a subscriber account, aSIM profile, a device identifier, a service request including anassociated service type, and/or the communication client to serve acommunication session including but not limited to: SIP instanceinformation, access network information, Mobile Station InternationalSubscriber Directory Number (MSISDN), International Mobile SubscriberIdentity (IMSI), International Mobile Equipment Identity (IMEI) of thedevice, Universally Unique Identifier (UUID), called-party-address asCircuit-Switched Routing Number (CSRN), and session description protocol(SDP). The SIP component 208 may use SIP signaling and determine thecurrent location of the user device 200 using a Global PositioningSystem (GPS). In various examples, the SIP component 208 may transmitSIP messages with headers and/or strings to trigger specific functionsand/or commands.

The communication component 210 may configure a communication client forsend and receive communication data. The communication component 210 mayinclude functions to support communication sessions and/or related datatransmission. The communication component 210 may determine thecapability of the user device 200 and the serving network to determinethe enabled feature information for a communication client. The servingnetwork may include one or more network(s) 108 that the user device 200is currently registered on. In response to registering to a network,communication component 210 may send, to the network, a publish requestto set the enabled feature information of the communication client(e.g., location-based service enabled, a location-based applicationinstalled, etc.). While the communication component 210 may send theenabled feature information to the network, it is understood in thecontext of this document that the user device 200 may send and/orreceive the enabled feature information via the SIP component 208, thecommunication component 210, the reporting component 212, and/or anothercomponent.

The communication component 210 may include functionality to determinewhen to transition an existing communication from one access network toanother. The communication component 210 may receive a command from thenetwork device(s) 300 to transition an existing serving connection froma cellular network to a Wi-Fi network or from the Wi-Fi network to thecellular network. In some examples, the communication component 210 mayperform functions, such as interfacing with the transceiver(s) 222,preparing the user device 200 to receive communications, tuning thetransceiver(s) 222, receiving and processing an invitation message suchas a SIP instance received via the transceiver(s) 222, and the like. Thecommunication component 210 may receive network quality information fromthe transceiver(s) 222 and may determine to transition an existingserving connection from one access network to another. As describedherein, the present system may prioritize Wi-Fi network use over thecellular network. In some examples, if the communication component 210determines that a Wi-Fi signal is weak (e.g., a home Wi-Fi network isdown), the communication component 210 may transition a servingconnection from the Wi-Fi network to the cellular network. In variousexamples, the communication component 210 may call the reportingcomponent 212 to report the network quality information to the network.

The reporting component 212 may include functions to report on thenetwork quality. In some examples, the communication component 210 mayuse the transceiver(s) 222 to perform a network quality test; and thereporting component 212 may transmit the results with location and/ornetwork information. In various examples, the reporting component 212may report on the network quality to a core network device to enable thecore network to determine if a particular wireless node is weak or down.

In some embodiments, the processor(s) 202 is a central processing unit(CPU), a graphics processing unit (GPU), or both CPU and GPU, or otherprocessing unit or component known in the art.

The user device 200 also includes additional data storage devices(removable and/or non-removable) such as, for example, magnetic disks,optical disks, or tape. Such additional storage is illustrated in FIG. 2by removable storage 214 and non-removable storage 216. Tangiblecomputer-readable media can include volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information, such as computer-readable instructions, datastructures, program modules, or other data. Memory 204, removablestorage 214, and non-removable storage 216 are all examples ofcomputer-readable storage media. Computer-readable storage mediainclude, but are not limited to, RAM, ROM, EEPROM, flash memory or othermemory technology, CD-ROM, digital versatile discs (DVD),content-addressable memory (CAM), or other optical storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the user device 200.Any such tangible computer-readable media can be part of the user device200.

In various embodiments, the user device 200 can include applicationsincluding but are not limited, a web browser application, a videostreaming application, an online gaming application, a network analyzer,and the like. During execution on the user device 200, each of theapplications may be configured to cause the user device 200 to initiatecommunications with a network node (e.g., network device 300) over thenetwork(s) 108.

The user device 200 may be configured to communicate over atelecommunications network using any common wireless and/or wirednetwork access technology. Moreover, the user device 200 may beconfigured to run any compatible device operating system (OS), includingbut not limited to Microsoft Windows Mobile, Google Android, Apple iOS,Linux Mobile, as well as any other common mobile device OS.

The user device 200 also can include input device(s) 218, such as akeypad, a cursor control, a touch-sensitive display, a voice inputdevice, etc., and output device(s) 220 such as a display, speakers,printers, etc. These devices are well known in the art and need not bediscussed at length here.

As illustrated in FIG. 2 , the user device 200 also includes one or morewired or wireless transceiver(s) 222. For example, the transceiver(s)222 can include a network interface card (NIC), a network adapter, a LANadapter, or a physical, virtual, or logical address to connect to thenetwork(s) 108 or to the network device (e.g., network device 300). Toincrease throughput when exchanging wireless data, the transceiver(s)222 can utilize multiple-input/multiple-output (MIMO) technology. Thetransceiver(s) 222 can comprise any sort of wireless transceiver capableof engaging in wireless radio frequency (RF) communication. Thetransceiver(s) 222 can also include other wireless modems, such as amodem for engaging in Wi-Fi, WiMax, Bluetooth, infrared communication,and the like.

In some examples, the user device 200 can be implemented as the userdevice(s) 102(1) and 102(2) of FIG. 1 .

FIG. 3 is a block diagram of a network device 300 configured to supportlocation-based resource allocation. In some examples, the network device300 can be configured to implement the techniques discussed herein.

In various examples, the network device 300 may include processor(s) 302and memory 304. Depending on the exact configuration and type ofcomputing device, the memory 304 may be volatile (such as RAM),non-volatile (such as ROM, flash memory, etc.), or some combination ofthe two.

FIG. 3 shows basic, high-level components of the network device 300.Generally, the network device 300 may comprise and/or may be implementedin any of various network components discussed herein, including thosecomponents illustrated in FIG. 1 . For example, the network device 300may be implemented in the network device(s) 104 and 106 and thenetwork(s) 108 or other network devices.

The memory 304 may include an authentication component 306, a locationservice component 308, a scheduler component 310, and a resourcedatabase component 312.

The authentication component 306 can include functionality to identifyand/or authenticate user devices and/or any other communicationscomponents to interact with the network. The authentication component306 may receive requests to initiate a device. The authenticationcomponent 306 may authorize the device to connect to the network bydetermining that the device has a valid SIM card. As described herein,the system may configure a SIM card to use an enhanced SIM profileindicating that an associated user device is configured to automaticallyself-authenticate and/or enable location-based services associated withthe service provider. In response to a successful authentication for theuser device, the authentication component 306 may grant authorizationfor the services that the device is allowed to access based on one ormore of a device capability, a SIM profile, available location-basedresources, a device location, subscription data, and the like. Theauthorization may be executed during a device registration procedure. Invarious examples, the authentication component 306 may determine that aSIM card is associated with an enhanced SIM profile.

The authentication component 306, at a base station, may receive SIMdata, authenticate the user device, and determine based on the SIM datathat the user device is associated with an enhanced SIM profile. The SIMcard may be a physical SIM card or an electronic SIM (eSIM) card. Insome examples, the SIM card may use an enhanced SIM profile toautomatically authorize access for a location-secured application, basedon a predetermined secure location, from a high-security network. Thepredetermined secured location is compared with respect to the currentgeolocation of the user device. The current geolocation of the userdevice is determined based on beam information as described herein, withrespect to the location service component 110 of FIG. 1 . In someexamples, the system may detect a device with the enhanced SIM profileis trying to access the location-secured application from a differentgeographical location and/or from a spoofed location and determine notto authenticate the SIM profile for application access.

As will be described herein with additional details in the examplesystem of FIG. 4 , the system may determine, using beam data, that auser device has entered a geofence of the predetermined secure location.In response, the system may automatically authorize access to aclassified location-secured development project.

In some examples, the authentication component 306 may use a SIM card toautomatically authorize access to a wireless network. In variousexamples, the network device 300 may be implemented in a wireless nodeand may receive enhanced SIM profiles associated with the serviceprovider. The enhanced SIM profile may indicate an associated userdevice is configured to automatically self-authenticate for and/orautomatically enable location-based services associated with the serviceprovider.

The authentication component 306 may retrieve data from a subscriberdatabase, data repository, and/or any other database to verify asubscriber account and/or associated device is authorized to use theservices provided by the network device 300.

The location service component 308 can include functions to providesupport for location-based resource allocation for user devices. In someinstances, the location service component 308 can correspond to thelocation service component 110 of FIG. 1 . As described herein withrespect to the location service component 110, the location servicecomponent 308 may include functions to identify the location-basedresources available. In some examples, the location service component308 may facilitate communication between the wireless nodes and userdevices in the network. In various examples, the location servicecomponent 308 implemented on the network device(s) 300 of an associatedbase station may receive and store network data for one or more Wi-Finetworks within a coverage area of the base station. The network datamay include information for each Wi-Fi network of one or more Wi-Finetworks, including access point locations and/or a geofence for thenetwork. The geofence may be defined by a predetermined radius from anaccess point or by predetermined geolocation coordinates definingboundaries (“geographical boundaries”). In various examples, thelocation service component 308 may receive data from a user device 200that has entered into the coverage area of the base station. The datamay include SIM data and a beam number of the base station in connectionwith the user device.

In some examples, the location service component 308, implemented on anetwork device of a base station, may facilitate communication betweenthe base station, the wireless nodes, and the user devices within thecoverage area of the base station. In various examples, the locationservice component 308 may receive a network access request from adevice, and the authentication component 306 may authenticate thedevice.

In some examples, the location service component 308 may use the beamnumber to determine geolocation information associated with the locationof the user device. The location service component 308 may use the beamnumber to determine beam data, including location data of the basestation, a beam direction, a beam tilt, beam power, a beam frequencyband, and the like. The location service component 308 may apply anybeam allocation algorithm with the beam data as input to determine thegeolocation information. The location service component 308 may use thegeolocation information to determine the available location-basedservices include a cellular network and a Wi-Fi network. The locationservice component 308 may determine if the user device is within ageofence of the Wi-Fi network. If the user device is within thegeofence, the location service component 308 may automaticallyauthenticate the user device to access the Wi-Fi network.

In various examples, the location service component 308 may includefunctions to automatically download data associated with alocation-based resource. The location service component 308 maydetermine, based on accessing the Wi-Fi network, that a current locationhas a location-based resource available. In response to a type oflocation-based resource available, the location service component 308may download associated data and/or trigger an associated application ona user device 200. The type of location-based resource may include amedia file, a data file, a database, an application trigger, a streamingfile, and the like. In response to a database, the location servicecomponent 308 may cause a communication client to display a prompt onthe user device 200 to confirm access to a database granted. Forinstance, a company may have proprietary software on a secured database,which may typically be accessed by a security dongle; the locationservice component 308 may automatically grant access to a user accountassociated with the user device 200 based on location. In response to anapplication trigger, the location service component 308 may cause acommunication client to display a prompt on the user device 200 toconfirm opening an application. In some examples, the user may grant,via privilege settings, permission for the system to automaticallyconfirm and trigger the location-based application. In response toeither a manual or automatic confirmation, the location servicecomponent 308 may initiate the application. For instance, a ski resortmay have a ski tracker application to measure the number of runs you'vetaken; the location service component 308 may trigger the ski trackerapplication based on the user device 200 being at the ski resort.

The location service component 308 can collect data associated with auser (“subscriber”) in a subscriber database. In some examples, thelocation service component 308 may include a common data repository ofsubscriber information and can be used to service network functionsand/or used to determine the service available to a subscriber. Thecommon data repository can be a shared database providing support for2G/3G/4G/5G core and can store subscriber data, including subscriberinformation.

The location service component 308 may maintain a subscriber databasewith associated SIM data. The location service component 308 can collectdata associated with subscribers, subscriber sessions, and/orregistrations in the subscriber database. In various examples, thelocation service component 308 may utilize a common data repository, ashared database providing support for 2G/3G/4G/5G core, to storesubscriber data, including subscriber information. The location servicecomponent 308 may collect and store information specific to thesubscriber accounts and subscription, including one or more of username,account identifier, subscription plan, services, data allocated, dataused, prepaid charge, and the like. The location service component 308can also collect information specific to a user device associated with asubscriber account, including a network prioritization scheme, privilegesettings, stored network accessed information, secured network accessprivileges, device capabilities, a device identifier, a communicationclient capabilities, applications installed, application data, and thelike. The device identifier may include Mobile Station InternationalSubscriber Directory Number (MSISDN), International Mobile SubscriberIdentity (IMSI), International Mobile Equipment Identity (IMEI) of thedevice, Universally Unique Identifier (UUID), and the like.

The scheduler component 310 may include functions to configure wirelessnodes to provide coverage for a network. The wireless nodes may includebase stations and/or Wi-Fi access points. In some instances, thescheduler component 310 can correspond to the scheduler component 112 ofFIG. 1 . As described herein with respect to the scheduler component112, the scheduler component 310 may determine location-based resourcesavailable and determine allocation for the resources. As describedherein, the location service component 308 may establish, for a userdevice, a first wireless connection with a base station node and asecond wireless connection to a Wi-Fi node. In response to establishingthe two wireless connections, the scheduler component 310 may determinethe location-based resource allocation for the network. The resourceallocation may be based at least in part on a requested service typefrom the user device and/or one or more prioritization schemes. Thescheduler component 310 may maintain both the cellular connection andthe Wi-Fi connection with the user device and may receive signal reportsfrom other user devices in the coverage area. In various examples, thescheduler component 310 may determine a prioritization scheme based onsignal quality and/or strength of each available network(s).

In some examples, the location-based resources may include two or moreWi-Fi networks, and the scheduler component 310 may determine aprioritization scheme based on network security level, affiliatednetwork status, and/or user home network. Additionally, theprioritization scheme may include prioritizing Wi-Fi connection use overthe cellular connection unless the scheduler component 310 receives aservice request for a specific service type that requires a cellularconnection from the user device. The service types may include but arenot limited to an emergency service call, a call to a terminatingdevice, internet access, email access, data transfer, and the like. Inadditional examples, the scheduler component 310 may generate a securitytoken for a Wi-Fi connection for secured data transfer and/orhigh-security network. The scheduler component 310 may cause acommunication client on the user device to download application dataand/or stream data on the user device.

The scheduler component 310 may perform different functions based onwhether the scheduler component 310 is on a network device on a basestation and/or a Wi-Fi node. The scheduler component 310 may determinelocation-based resources available for the coverage area associated withthe base station and determine allocation for the resources based on theuser devices connected to the base station. The scheduler component 310may transmit data, including commands for the base station and/or theWi-Fi nodes, to allocate a location-based resource. In some examples,the scheduler component 310 may transmit data, including commands for acommunication client on a user device to reallocate or receive alocation-based resource.

In various examples, the scheduler component 310 may be running from anetwork device on a Wi-Fi node and may configure the Wi-Fi node totransmit location-based resource data. The scheduler component 310 mayreceive a network schedule from a core network device. The schedulercomponent 310 may transmit specific location-based resource dataaccording to the network schedule. In some instances, by default, thescheduler component 310 may configure a stadium Wi-Fi node to transmit,to user devices, general stadium information (e.g., hours, maps, etc.).In additional and/or alternative examples, the scheduler component 310may configure the stadium Wi-Fi node to transmit, to user devices,specific sports team and/or match information during game time.

In some examples, the scheduler component 310 may monitor traffic dataassociated with the network to continuously optimize the network. Thetraffic data may include data associated with network signal quality,capacity, connectivity, and the like. The data associated with networksignal quality may include one or more of Channel Quality Information(CQI) data, signal-to-noise ratio (SNR) data, signal-to-interferenceplus noise ratio (SINR) data, and/or signal-to-noise plus distortionratio (SNDR) data. As described herein, if a particular wireless node isweak or disconnected, the scheduler component 310 may send messages andcommands for a user device to switch to a different network. Thescheduler component 310 may determine a network signal quality fallsbelow a signal quality threshold and transmit a message and/or commandto the user device and/or wireless node to switch serving network. If anamount of data transfer (e.g., greater than 500 MB data) meets orexceeds a threshold, the scheduler component 310 may change the servingnetwork to an available Wi-Fi network. In an alternative example, ifthere is no available Wi-Fi network, the scheduler component 310 maypause the data transfer.

The resource database component 312 may maintain a resource databasewith associated location-based resource data. The resource databasecomponent 312 can collect data associated with network information,location-based applications, location-based application data, and thelike. In various examples, the resource database component 312 mayutilize a common data repository, a shared database providing supportfor 2G/3G/4G/5G core, to store shared location-based resource data,including associated Wi-Fi information. The resource database component312 may collect and store location-based resource data specific to aparticular location and/or associated with a particular Wi-Fi network.As described herein, the scheduler component 310 may configure the Wi-Finode to transmit specific location-based resource data according to anetwork schedule. The resource database component 312 may store andrecall the specific location-based resource data as needed according tothe network schedule. The resource database component 312 may determine,based on the geolocation information, a network service associated withthe location, the network service including a location-basedapplication. The scheduler component 310 may call the resource databasecomponent 312 to transmit, to the user device via the Wi-Fi network,data associated with the location-based application. For instance, thescheduler component 310 may call the resource database component 312 totransmit specific team data during game time.

In some examples, the processor(s) 302 is a central processing unit(CPU), a graphics processing unit (GPU), both CPU and GPU, or otherprocessing unit or component known in the art. Furthermore, theprocessor(s) 302 may include any number of processors and/or processingcores. The processor(s) 302 is configured to retrieve and executeinstructions from memory 304, respectively.

The memory 304 can also be described as non-transitory computer-readablemedia or machine-readable storage memory and may include removable andnon-removable media implemented in any method or technology for storageof information, such as computer-executable instructions, datastructures, program modules, or other data.

The memory 304 may include, but is not limited to, RAM, ROM, EEPROM,flash memory or other memory technology, CD-ROM, digital versatile discs(DVD) or other optical storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othertangible, physical medium which can be used to store the desiredinformation.

The network device 300 also includes additional data storage devices(removable and/or non-removable) such as, for example, magnetic disks,optical disks, or tape. Such additional storage is illustrated in FIG. 3by removable storage 314, and non-removable storage 316. Tangiblecomputer-readable media can include volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information, such as computer-readable instructions, datastructures, program modules, or other data. The memory 304, theremovable storage 314, and the non-removable storage 316 are allexamples of computer-readable storage media. Computer-readable storagemedia include, but are not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile discs (DVD),content-addressable memory (CAM), or other optical storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by the correspondingnetwork device 300. Any such tangible computer-readable media can bepart of the network device 300.

The memory 304, the removable storage 314, and/or the non-removablestorage 316 may in some cases include storage media used to transfer ordistribute instructions, applications, and/or data. In some cases, thememory 304, the removable storage 314, and/or the non-removable storage316 may include data storage that is accessed remotely, such asnetwork-attached storage that the corresponding network device 300accesses over some type of data communications network.

In various examples, any or all of the memory 304, the removable storage314, and/or the non-removable storage 316 may store programminginstructions that, when executed, implement some or all of the functionfunctionality described herein.

The network device 300 also can include input device(s) 318, such as akeypad, a cursor control, a touch-sensitive display, a voice inputdevice, etc., and output device(s) 320 such as a display, speakers,printers, etc. These devices are well known in the art and need not bediscussed at length here.

As illustrated in FIG. 3 , the network device 300 also includes one ormore wired or wireless transceiver(s) 322, respectively. For example,the transceiver(s) 322 can include a network interface card (NIC), anetwork adapter, a LAN adapter, or a physical, virtual, or logicaladdress to connect to the various network device(s), or componentsillustrated in figures herein. To increase throughput when exchangingwireless data, the transceiver(s) 322 can utilizemultiple-input/multiple-output (MIMO) technology. The transceiver(s) 322can comprise any sort of wireless transceiver capable of engaging inwireless radio frequency (RF) communication. The transceiver(s) 322 canalso include other wireless modems, such as a modem for engaging inWi-Fi, WiMAX, Bluetooth, infrared communication, and the like.

In some examples, the network device 300 can be implemented as thenetwork device(s) 104 and 106 of FIG. 1 , including the location servicecomponent 110 and/or the scheduler component 112.

FIG. 4 is an example system 400 illustrating network devices configuredto support location-based resource allocation. The example system 400may include the example network device(s) 104, 106(1), and 106(2)configured to provide example access networks 402, 404, and 406,respectively.

In a non-limiting example, a user associated with an example user device102 may travel from a first network coverage area (e.g., the exampleaccess network 402), into a second network coverage area (e.g., theexample access network 404), and finally, to a third network coveragearea (e.g., the example access network 406). Initially, the networkdevice(s) 104 can authenticate the example user device 102 to connect toa cellular network via the example access network 402. The locationservice component 110 implemented on the example network device(s) 104of the base station received and stored network data for the two Wi-Finetworks within a coverage area of the base station (e.g., the examplesaccess network 402). The network data includes information for a firstWi-Fi network, including the example network device(s) 106(1) locationand a first example geofence of the first Wi-Fi network. In the presentexample, the first example geofence is illustrated by predeterminegeolocation coordinates defining an octagonal area of the examplesaccess network 404.

In the present non-limiting example, the user may move between multipleaccess networks while carrying the user device 102. The user may travelto example transition 408 from a first coverage region associated withthe example access network 402 into a second coverage region associatedwith the example access network 402 and the example access network 404.The location service component 308 may receive, from the user device102, data including SIM data and a beam number to determine geolocationinformation associated with a location of the user device. The locationservice component 110 may use the geolocation information to determinethe available location-based services now include the cellular network(e.g., the example access network 402) and a Wi-Fi network (e.g., theexample access network 404). The location service component 110 maydetermine, based on the SIM data of the user device 102, toautomatically authenticate the user device to access the example accessnetwork 404.

In an additional non-limiting example, the user may move and travel toexample transition 410 from the second coverage region associated withthe example access network 404 into a third coverage region associatedwith the example access network 404 and the example access network 406.The location service component 110 may receive, from the user device102, updated data and determine updated beam data. The location servicecomponent 110 may determine updated geolocation information associatedwith an updated location of the example user device 102. The locationservice component 110 may use the updated location to determine theavailable location-based services include the cellular network, thefirst Wi-Fi network, and a second Wi-Fi network. The present examplesystem may prioritize connection to the example access network 406 overthe example access network 404 because the example access network 406 isa high-security network and includes a location-secured application. Thelocation service component 110 may determine, based on the example data412 received from the user device 102, to perform an exampleauthentication process 414 for the user device 102 to access the exampleaccess network 406. The system may automatically perform an exampleauthorization process 416 to authorize the user device 102 to access thelocation-secured classified application. A communication client on theuser device 102 may notify the user of the security access granted.

FIGS. 5, 6, and 7 illustrate example processes and sequence diagrams inaccordance with examples of the disclosure. These processes areillustrated as logical flow graphs, each operation of which represents asequence of operations that can be implemented in hardware, software, ora combination thereof. In the context of software, the operationsrepresent computer-executable instructions stored on one or morecomputer-readable storage media that, when executed by one or moreprocessors, perform the recited operations. Generally,computer-executable instructions include routines, programs, objects,components, data structures, and the like that perform particularfunctions or implement particular abstract data types. The order inwhich the operations are described is not intended to be construed as alimitation, and any number of the described operations can be combinedin any order, omitted, and/or performed in parallel to implement theprocesses.

FIG. 5 illustrates an example process 500 for configuring a network tosupport location-based resource allocation, including automaticauthentication for Wi-Fi network access. The example process 500 can beperformed by the network device(s) 104 and 106, the user device 200,and/or by the network device 300 comprising the authentication component306, the location service component 308, the scheduler component 310,the resource database component 312, or another component or device asdiscussed herein.

At operation 502, the process can include receiving network resourcedata for one or more Wi-Fi networks associated with a service provider,the network resource data including geofence data and access point dataassociated a Wi-Fi network the of one or more Wi-Fi networks. Asdescribed herein, the system may include receiving and storing networkdata for one or more Wi-Fi networks within a coverage area of the basestation. The network data may include information for each Wi Finetwork, including access point locations and/or a geofence for the WiFi network. The geofence may be defined by: (1) a predetermined radiusfrom an access point location or (2) a predetermined geographicalboundary defining a polygon (e.g., inside a boundary defined by three ormore coordinates). For instance, the network data for the first Wi Fiaccess network 114 may include Wi Fi access information, thegeolocations of the network device(s) 106(1)-106(5), and the geofencemay be defined by the four geolocation corners of the stadium. Invarious examples, the location service component 110 may receive datafrom a user device 102 inside the coverage area of the base station. Thedata may include SIM data and a beam number of the base station inconnection with the user device.

At operation 504, the process can include configuring a SubscriberIdentity Module (SIM) card with an enhanced SIM profile, the enhancedSIM profile indicating a user device is configured to self-authenticatefor location-based services of the service provider. As describedherein, the system may include configuring a SIM card with an enhancedSIM profile to indicate that an associated user device is configured toautomatically self-authenticate and/or enable location-based servicesassociated with the service provider.

At operation 506, the process can include receiving, from the userdevice, data including the enhanced SIM profile and a beam number of abase station in connection with the user device. As described herein,the system may include receiving data from the user device that hasentered into the coverage area of the base station. The system mayreceive data for requesting access to the network and/or data formaintaining a connection to the network. If not yet authenticated, thesystem may authenticate a user device to access the cellular network ofthe base station. In some examples, the system may determine whether thedata includes SIM data indicating an enhanced SIM profile. If the SIMdata indicates an enhanced SIM profile, the system may determine whichlocation-based resource is available to the user device. The system maydetermine an allocation for the resources available between all thecurrently connected user devices. Additionally, based at least in parton the enhanced SIM profile, the system may determine to automaticallyauthenticate the user device to access a new Wi Fi network.

At operation 508, the process can include determining, based at least inpart on the beam number, geolocation information associated with alocation of the user device. As described herein, the system may includeusing the beam number to determine beam data, including location data ofthe base station, a beam direction, a beam tilt, a beam power, a beamfrequency band, and the like. The system may apply any beam allocationalgorithm with the beam data as input to determine the geolocationinformation. The system may use the geolocation information to determinethe available location-based services include a cellular network and aWi-Fi network.

At operation 510, the process can include determining, based at least inpart on the geolocation information and the network resource data, thatnetwork resources associated with the location includes a cellularnetwork and the Wi-Fi network. As described herein, the system may usethe geolocation information to determine the available location-basedservices include a cellular network and a Wi-Fi network.

At operation 512, the process can include determining, based at least inpart on the enhanced SIM profile, to authenticate the user device toaccess the Wi-Fi network. As described herein, the system may includedetermining whether the data includes SIM data indicating an enhancedSIM profile. If the SIM data indicates an enhanced SIM profile, thesystem may determine which location-based resource is available to theuser device. The system may determine an allocation for the resourcesavailable between all the currently connected user devices.Additionally, based at least in part on the enhanced SIM profile, thesystem may determine to automatically authenticate the user device toaccess a new Wi Fi network.

FIG. 6 illustrates another example process 600 for configuring a networkto support location-based resource allocation, including Wi-Fi networkswitch. The example process 600 can be performed by the networkdevice(s) 104 and 106, the user device 200, and/or by the network device300 comprising the authentication component 306, the location servicecomponent 308, the scheduler component 310, the resource databasecomponent 312, or another component or device as discussed herein.

At operation 602, the process can include receiving, from a user device,data including subscriber identity module (SIM) data and a beam numberof a base station in connection with the user device. As describedherein, the system may include receiving data from the user device thathas entered into the coverage area of the base station. The system mayreceive data for requesting access to the network and/or data formaintaining a connection to the network. If not yet authenticated, thesystem may authenticate the user device for access to the cellularnetwork of the base station. The system may receive data, including SIMdata and a beam number of the base station in connection with the userdevice.

At operation 604, the process can include determining, based at least inpart on the beam number, geolocation information associated with alocation of the user device. As described herein, the system may includeusing the beam number to determine beam data, including location data ofthe base station, a beam direction, a beam tilt, a beam power, a beamfrequency band, and the like. The system may apply any beam allocationalgorithm with the beam data as input to determine the geolocationinformation. The system may use the geolocation information to determinethe available location-based services include a cellular network and aWi-Fi network.

At operation 606, the process can include determining, based at least inpart on the geolocation information, that network resources associatedwith the location include a cellular network and a Wi-Fi network. Asdescribed herein, the system may use the geolocation information todetermine the available location-based services include a cellularnetwork and a Wi-Fi network.

At operation 608, the process can include determining, based at least inpart on the SIM data, to automatically authenticate the user device toaccess the Wi-Fi network. As described herein, the system may includedetermining whether the data includes SIM data indicating an enhancedSIM profile. If the SIM data indicates an enhanced SIM profile, thesystem may determine which location-based resource is available to theuser device and determine the resource allocation. Additionally, basedat least in part on the enhanced SIM profile, the system may determineto automatically authenticate the user device to access the Wi-Finetwork.

At operation 610, the process can include receiving a service requestfrom the user device. As described herein, the system may include aprioritization scheme based on one or more of high-security network,preferred partner network, and user home network. Additionally, theprioritization scheme may include prioritizing Wi-Fi connection use overthe cellular connection unless the system receives a service request fora specific service type that requires cellular connection from the userdevice. The service types may include but is not limited to, anemergency service call, a call to another user device, internet access,email access, data transfer, and the like. In additional examples, thesystem may determine to generate a security token for a Wi-Fi connectionfor secured data transfer and/or high security network. The system maycause a communication client on the user device to download applicationdata and/or stream data on the user device.

At operation 612, the process can include determining that a servicetype associated with the service request can be served by the Wi-Finetwork. As described herein, the system may include a prioritizationscheme that may determine the network selection based on prioritizing ahigh-security network, a preferred partner network, and/or a user homenetwork. Additionally, the prioritization scheme may includeprioritizing Wi-Fi connection use over the cellular connection unless itreceives a service request for a specific service type that requires acellular connection from the user device. The service types may includebut are not limited to: an emergency service call, a voice call to aterminating user device, internet access, email access, data transfer,and the like. In some examples, a particular service type (e.g.,emergency service call) may only be served by the cellular network, andin response, the system may determine to switch the network, if notalready connected, to the cellular network. In an alternative and/oradditional examples, the particular service type (e.g., internet access,email access, data transfer) can be served by the Wi-Fi network and/orthe cellular network, and in response, the system may determine toswitch the network, if not already connected, to the Wi-Fi network. Insome examples, the system may generate security tokens for Wi-Ficonnections for secured data transfer and/or high-security networks.

FIG. 7 illustrates another example process 700 for configuring a networkto support automatic authentication for a location-based application.The example process 700 can be performed by the network device(s) 104and 106, the user device 200, and/or by the network device 300comprising the authentication component 306, the location servicecomponent 308, the scheduler component 310, the resource databasecomponent 312, or another component or device as discussed herein.

At operation 702, the process can include receiving, from a user device,first data including an enhanced subscriber identity module (SIM)profile and a beam number of a base station in connection with the userdevice. As described herein, the system may include receiving data fromthe user device that has entered into the coverage area of the basestation. The system may receive data for requesting access to thenetwork and/or data for maintaining a connection to the network. If notyet authenticated, the system may authenticate the user device foraccess to the cellular network of the base station. The system mayreceive data, including SIM data and a beam number of the base stationin connection with the user device.

At operation 704, the process can include determining, based at least inpart on the beam number, geolocation information associated with alocation of the user device. As described herein, the system may includeusing the beam number to determine beam data, including location data ofthe base station, a beam direction, a beam tilt, a beam power, a beamfrequency band, and the like. The system may apply any beam allocationalgorithm with the beam data as input to determine the geolocationinformation. The system may use the geolocation information to determinethe available location-based services include a cellular network and aWi-Fi network.

At operation 706, the process can include determining, based at least inpart on the geolocation information and the enhanced SIM profile, toautomatically authenticate the user device to use a Wi-Fi network. Asdescribed herein, the system may use the geolocation information todetermine the available location-based services include a cellularnetwork and a Wi-Fi network. The system may determine whether the dataincludes SIM data indicating an enhanced SIM profile. If the SIM dataindicates an enhanced SIM profile, the system may determine whichlocation-based resource is available to the user device. The system maydetermine an allocation for the resources available between all thecurrently connected user devices. Additionally, based at least in parton the enhanced SIM profile, the system may determine to automaticallyauthenticate the user device to access a new Wi-Fi network.

At operation 708, the process can include determining, based at least inpart on the geolocation information, a network service associated withthe location, the network service including a location-basedapplication. As described herein, the system may include maintaining aresource database with associated location-based resource data. Thesystem can collect data associated with network information,location-based applications, location-based application data, and thelike. In various examples, the system may utilize a common datarepository, a shared database providing support for 2G/3G/4G/5G core, tostore shared location-based resource data, including associated Wi-Fiinformation. The system may collect and store location-based resourcedata specific to a particular location and/or associated with aparticular Wi-Fi network. As described herein, the system may configurethe Wi-Fi node to transmit specific location-based resource dataaccording to a network schedule. The system may store and recall thespecific location-based resource data as needed according to the networkschedule. Based on the geolocation information, the system may determinea network service associated with the location, the network serviceincluding a location-based application.

At operation 710, the process can include transmitting, to the userdevice via the Wi-Fi network, second data associated with thelocation-based application. As described herein, the system may includedetermining, based on the geolocation information, a network serviceassociated with the location, the network service including alocation-based application. The system may call a resource databasecomponent and may transmit, to the user device via the Wi-Fi network,data associated with the location-based application.

CONCLUSION

Although features and/or methodological acts are described above, it isto be understood that the appended claims are not necessarily limited tothose features or acts. Rather, the features and acts described aboveare disclosed as example forms of implementing the claims.

What is claimed is:
 1. A system comprising: one or more processors; amemory; and one or more components stored in the memory and executableby the one or more processors to perform operations comprising:receiving network resource data associated with one or more Wi-Finetworks affiliated with a service provider, the network resource dataincluding a geofence and access point information associated with aWi-Fi network of the one or more Wi-Fi networks; configuring aSubscriber Identity Module (SIM) card associated with a user device toenable an enhanced SIM profile, the enhanced SIM profile indicating theuser device is configured to automatically enable location-basedservices associated with the service provider; receiving, from the userdevice, data including SIM data and a beam number of a base station inconnection with the user device; determining, based at least in part onthe beam number, geolocation information associated with a location ofthe user device; determining, based at least in part on the geolocationinformation and the network resource data, network resources associatedwith the location; determining that the network resources include acellular network and the Wi-Fi network; determining, based at least inpart on the geolocation information, that the user device is within thegeofence; and determining, based at least in part on the enhanced SIMprofile, to automatically authenticate the user device to access theWi-Fi network.
 2. The system of claim 1, wherein determining thegeolocation information comprises: determining, based at least in parton the beam number, beam data including location data of the basestation, a beam direction, a beam tilt, and a beam power; anddetermining the geolocation information based at least in part on thebeam data.
 3. The system of claim 1, wherein the operations furthercomprise: receiving, from the user device, a service request;determining a service type associated with the service request; anddetermining, based at least in part on the service type, a network ofthe network resources to serve the service request.
 4. The system ofclaim 3, wherein the service type includes at least one of an emergencyservice call, a call to another user device, internet access, emailaccess, or data transfer.
 5. The system of claim 4, wherein theoperations further comprise: determining that the service type can beserved by the Wi-Fi network; and determining to transfer the connectionwith the user device to the Wi-Fi network.
 6. The system of claim 4,wherein the operations further comprise: determining, based at least inpart on the service type, to generate a security token for theconnection.
 7. A method comprising: receiving, from a user device, dataincluding Subscriber Identity Module (SIM) data and a beam number of abase station in connection with the user device; determining, based atleast in part on the SIM data, the user device is associated with anenhanced SIM profile, the enhanced SIM profile indicating the userdevice is configured to self-authenticate for location-based services;determining, based at least in part on the beam number, geolocationinformation associated with a location of the user device; determining,based at least in part on the geolocation information, network resourcesassociated with the location; determining the network resources includesa cellular network and a Wi-Fi network; and determining, based at leastin part on the enhanced SIM profile, to authenticate the user device toaccess the Wi-Fi network.
 8. The method of claim 7, wherein the datafurther comprises signal data including at least one of: Channel QualityInformation (CQI) data; signal-to-noise ratio (SNR) data;signal-to-interference plus noise ratio (SINR) data; or signal-to-noiseplus distortion ratio (SNDR) data.
 9. The method of claim 8, wherein thedata further comprises previously accessed Wi-Fi network data andfurther comprises: determining, based at least in part on the previouslyaccessed Wi-Fi network data, the network resources further includes asecond Wi-Fi network; and determining to poll the second Wi-Fi networkfor network capabilities.
 10. The method of claim 9, further comprising:determining, based at least in part on the signal data and the poll, toauthenticate the user device to use the second Wi-Fi network.
 11. Themethod of claim 7, further comprising: receiving, from the user device,a service request; determining a service type associated with theservice request; determining that the service type associated with theservice request can be served by the Wi-Fi network; and determining totransfer the connection with the user device to the Wi-Fi network. 12.The method of claim 11, further comprising: receiving, from the userdevice, a second service request; determining a second service typeassociated with the second service request can only be served by thecellular network; and determining to transfer the connection with theuser device to the cellular network.
 13. The method of claim 11, whereintransferring the connection to the Wi-Fi network further comprises:determining the Wi-Fi network satisfies one or more network criteria,the one or more network criteria includes at least one of meetingquality of service threshold or an association with the enhanced SIMprofile.
 14. The method of claim 7, further comprising: determining,based at least in part on the geolocation information, a location-basedapplication associated with the location is available; and transmitting,to the user device and based at least in part on the access to the Wi-Finetwork, second data associated with the location-based application. 15.The method of claim 14, wherein the location-based application is amultimedia application and further comprising: causing the multimediaapplication to execute on the user device; and transmitting a command todisplay a multimedia presentation on the user device.
 16. The method ofclaim 14, wherein the location-based application is a classifiedapplication and further comprising: determining, based at least in parton the geolocation information and the enhanced SIM profile, toauthenticate a user account associated with the user device to accessthe classified application.
 17. One or more non-transitorycomputer-readable media storing computer executable instructions that,when executed, cause one or more processors to perform operationscomprising: configuring a base station to schedule network resourceswith one or more Wi-Fi networks within a coverage area associated withthe base station, the base station and the one or more Wi-Fi networksare associated with a service provider; receiving network resource dataassociated with the one or more Wi-Fi networks, the network resourcedata including geofencing information and access information associatedwith the one or more Wi-Fi networks; configuring a Subscriber IdentityModule (SIM) card associated with a user device to enable an enhancedSIM profile, the enhanced SIM profile indicating the user device isconfigured to self-authenticate location-based services associated withthe service provider; receiving, from the user device, data includingSIM data and a beam number of the base station in connection with theuser device; determining, based at least in part on the beam number,geolocation information associated with a location of the user device;determining, based at least in part on the geolocation information andthe geofencing information, that network resources associated with thelocation includes a cellular network and the one or more Wi-Fi networks;and determining, based at least in part on one or more network criteria,a Wi-Fi network of the one or more Wi-Fi networks to authenticate theuser device to access.
 18. The one or more non-transitorycomputer-readable media of claim 17, wherein the one or more networkcriteria comprises at least one of a meeting quality of servicethreshold, an association of a device with the enhanced SIM profile, ora meeting a network selection rule.
 19. The one or more non-transitorycomputer-readable media of claim 18, wherein the network selection ruleincludes a selection priority based on at least one of a user preferrednetwork, an associated user network privilege, associated networkquality, or an affiliation with the service provider.
 20. The one ormore non-transitory computer-readable media of claim 17, wherein thegeofencing information includes geographical location data indicatinggeographical boundaries of a network access area associated with theWi-Fi network.