Abstract:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common electrical network.
Abstract:
A follow-me application can be configured to generate a follow-me identifier (ID) that uniquely identifies a particular route traveled by a computing device executing the follow-me application. The follow-me application can also be configured to determine route data for the particular route traveled. The route data characterizes turn-by-turn directions to facilitate travel along the particular route by another computing device.
Abstract:
A prank call server that performs 911 prank call filtering over a 911 emergency call system, prior to routing a 911 call to a PSAP. The inventive prank call server identifies prank calling devices, regardless of current service subscription, by retrieving and analyzing emergency call data pertaining to detected prank 911 calls. The prank call server assigns a unique global identifier to each 911 call detected on the 911 emergency call system. Unique global identifiers enable a PSAP to uniquely identify prank 911 calls that are identified thereon. A PSAP transmits a prank call signal and a relevant unique global identifier to the prank call server, for each prank 911 call that is detected. A prank call signal/unique global identifier combination triggers the prank call server to store all available call data for a referenced prank 911 call in to a prank call database, for subsequent prank call filtering analysis.
Abstract:
A security broker (SB) that provides network based authorization of secure VoIP services, triggered upon attempted user access. The security broker (SB) intercepts a SIP transaction during session setup to transmit a network based security challenge to a SIP application attempting to access (secure) IP based services. A network based security challenge is transmitted to a participating SIP application on both the origination and termination legs of a SIP transaction. The network based security challenge prompts a SIP application to return subscriber authorization/authentication credentials (e.g. a username/password combination). If credentials returned by the SIP application are valid, the security broker (SB) authorizes the network to permit session completion, and access to secure IP services is granted. Alternatively, if credentials returned by the VoIP application are invalid, the security broker (SB) terminates the corresponding session attempt, hence preventing unauthorized access to (secure) IP based services.
Abstract:
A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone.
Abstract:
A technique to allow a server such as a location server to throttle concurrent or closely timed location requests for the position of a given wireless device such that within a certain time period preferably only one location request will be initiated to the positioning engine and the remaining closely-timed location requests will be buffered or cached. When a position for the given wireless device is returned per the outstanding location request, then the retrieved position will be used to respond to each of the buffered location requests. Thus, a plurality of location requests are satisfied with a single request to the positioning engine. By optimizing the use of cached position requests, throttling of location requests per the invention reduces network traffic significantly, increases the efficiency of a positioning server (therefore reducing business cost), and provides for an improved grade or quality of location based services in general.
Abstract:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common communication network.
Abstract:
A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone.
Abstract:
A technique to allow a server such as a location server to throttle concurrent or closely timed location requests for the position of a given wireless device such that within a certain time period preferably only one location request will be initiated to the positioning engine and the remaining closely-timed location requests will be buffered or cached. When a position for the given wireless device is returned per the outstanding location request, then the retrieved position will be used to respond to each of the buffered location requests. Thus, a plurality of location requests are satisfied with a single request to the positioning engine. By optimizing the use of cached position requests, throttling of location requests per the invention reduces network traffic significantly, increases the efficiency of a positioning server (therefore reducing business cost), and provides for an improved grade or quality of location based services in general.