Abstract:
Locating satellites (e.g., GPS) are culled into a preferred group having a longest dwell time based on a time passing through an ellipsoid arc path through a cone of space, and communicated to mobile devices within a particular region (e.g., serviced by a particular base station). The culled locating satellites may select those visible, or more preferably those locating satellites currently within a cone of space above the relevant base station are selected for communication by a mobile device within the service area of the base station. Alternatively, a minimum set of locating satellites may be selected based on, e.g., being not only within an arbitrary cone of space normal to the base station, but also projected to remain within that cone of space for the longest period of time, i.e., having the longest dwell time, based on a calculated ellipsoid arc path through a cone of space.
Abstract:
Sensitive, Standard Telephone Equipment (STE) data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the pubilc Internet or other IP protocol network, that then passes it to a similar STE device over an ISDN link for decryption. The present invention is embodied in a system that provides secure Voice-Over-IP (VOIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.
Abstract:
Wireless carrier networks can utilize multiple MMSCs all accessed by a message sender with a message addressed to a single Internet domain, providing a single point of entry for messages into the network of MMSCs and maintaining routing information sufficient to route messages to all subscribers via the MMSC.
Abstract:
A phone number only messaging experience is provided in an Inter-Carrier Short Messaging System (IC-SMS) service. Subscriber to subscriber messages are routed between carrier's networks using an Inter-Carrier messaging module (100) with appropriate MIN/carrier/carrier routing look-up capabilities (120). Short messages may be sent to a subscriber (220) in another carrier's network addressed only with a phone number. If the recipient is outside of the sender's carrier network, the Inter-Carrier messaging module (100) of the Inter-Carrier service provider (ICSP) determines the appropriate carrier for the recipient, appends the appropriate syntax to the short message to allow internet protocol (IP) or other standardized communication techniques between SMSCs of the two carriers, and routes the short message to the destination carrier. The recipient in the other carrier's network may reply back to the ICSP's sender using only the subscriber's directory number.
Abstract:
A follow-me application can be configured to generate a follow-me identifier (ID) that uniquely identifies a particular route traveled by a computing device executing the follow-me application. The follow-me application can also be configured to determine route data for the particular route traveled. The route data characterizes turn-by-turn directions to facilitate travel along the particular route by another computing device.
Abstract:
A gateway can be configured to receive an emergency event message in a predefined format via a network. The emergency event message can characterize a location and a nature of an emergency event. The gateway can also be configured to identify a particular Public Safety Answering Point (PSAP) customer premise equipment (CPE) to service the emergency event. The gateway can further be configured determine a format of messages employable by the particular PSAP. The gateway can still further be configured to provide the particular PSAP CPE with an output message in the format employable by the particular PSAP CPE. The output message can characterize the nature and the location of the emergency event.
Abstract:
A wireless device initiates a connection by sending an Unsolicited HTTP(s) POST that includes a user identity and credentials, not in response to a form that is provided to the wireless device from a secondary authentication service (2AS), so the 2AS does not have a session with the wireless device. An HTTP(s) session is handled by a home agent or enterprise home agent. The 2AS uses the user identity and credentials from the Unsolicited POST to complete interaction with a downstream identity management server, and takes appropriate action by either indicating to the home agent that authentication was successful and the device is authorized to use the private enterprise network resources protected by the 2AS process; or if the authentication was unsuccessful that the session(s) should be disconnected. In addition, the 2AS may communicate with the agent on the wireless device to send intermediate and final status of the attempt.
Abstract:
Dynamically selecting and facilitating stored caller information to a communications recipient device with a communications event, based on communication recipient credentials (e.g. IP address, MDN, etc.), preferences outlined in a subscriber profile associated with a relevant calling device, and other variables, e.g., time of day, location of calling device, etc. A subscriber is permitted to provision subscriber preferences and subscriber information associated with users of a subscribing communications device in to a subscriber profile, for use during a communications event. Subscriber preferences are defined to place restrictive conditions on stored subscriber information that may be transmitted with a communications event initiated by a corresponding communications device. A content collection node dynamically selects customized caller information via a subscriber information content collection process. Customized caller information is transmitted to appropriate recipient devices with a corresponding communication event.
Abstract:
A resource selection server that performs crowd-sou reed resource selection over a social networking service, absent a central ratings database. A device subscribed to a social networking service implementing the inventive resource selection server, may register as a resource offering a particular skill. Additionally, any device subscribed to a relevant social networking service may transmit a skill request to the inventive resource selection server, to request a best-fit resource be returned for a particular skill of interest. The resource selection server queries a subscriber account database to identify resources on a social networking service, registered to offer a requested skill. The resource selection server additionally prompts subscriber devices within 'n' degrees of separation of a requesting device, to submit real-time trust ratings for resources complying with a particular skill request. The resource selection server analyzes ratings submitted by selected subscriber devices to return a best-fit resource for a particular skill request.
Abstract:
A prepaid messaging solution that utilizes a pre-delivery debit query to tariff a short message, coupled with an additional debit query performed once necessary billing information has been acquired. A short message is tariffed prior to message delivery via a pre-delivery debit query to a prepaid server. During message, delivery, the prepaid server is queried a second time, following the HLR query performed by the Short Message Service Center (SMSC). This subsequent debit query bills a subscriber for any additional service fees discovered throughout message delivery, e.g., international/roaming fees, etc. If either the pre-delivery debit query or the subsequent debit query indicates that a subscriber has insufficient account balance to deliver a short message, the message is prevented from being delivered. If a message is dropped due to lack of account balance, any funds debited throughout the attempted message delivery may be credited back to the subscriber's prepaid account.