摘要:
iAlert_Enhanced_Alert_Manager enables a user to register an interest in their current location, as well as persons, places and/or things in which the user holds some regard. The iAlert_Enhanced_Alert_Manager provides notification and clarifying information to user's devices concerning events/happenstance that have occurred or are likely to occur within a proximity of registered persons, places, and/or things. The iAlert_Enhanced_Alert_Manager comprises data structures (e.g. an Affinity Table, a SPIN table, a SPIN-List Table, an Affinity-List Table, and a Keyword-List Table) to manage affinities, Spheres of Influence (SPINs), and relationships therebetween that may positively or negatively induce a person. Timely notification of events/happenstance to a user comprises the computation of iEvent-vectors and iAlert-vectors. An iEvent-vector contains fields pertaining to events/happenstance whereas an iAlert-vector comprises information pertaining to notifications. Transmission of a notification is determined as a function of the magnitude of an event/happenstance and the proximity of an event/happenstance to registered objects of interest.
摘要:
A resource selection server that performs crowd-sourced resource selection over a social networking service, absent a central ratings database. A device subscribed to a social networking service implementing the inventive resource selection server, may register as a resource offering a particular skill. Additionally, any device subscribed to a relevant social networking service may transmit a skill request to the inventive resource selection server, to request a best-fit resource be returned for a particular skill of interest. The resource selection server queries a subscriber account database to identify resources on a social networking service, registered to offer a requested skill. The resource selection server additionally prompts subscriber devices within ‘n’ degrees of separation of a requesting device, to submit real-time trust ratings for resources complying with a particular skill request. The resource selection server analyzes ratings submitted by selected subscriber devices to return a best-fit resource for a particular skill request.
摘要:
A method and apparatus to facilitate the secure storage of multimedia content (i.e. video with optional audio) on an internet cloud, and to grant the release of stored multimedia content to pre-authorized users and pre-authorized emergency dispatch personnel, only. A subscriber entity uses a secure user interface component to store a multimedia package containing important/relevant navigation and/or location information on a cloud database. In addition, the subscriber entity specifies whether or not emergency personnel are authorized to access the multimedia package during an emergency event, and whether or not a predefined highly trusted network of users may access the multimedia package following a conventional authorization procedure. The inventive multimedia geospatial routing engine releases the multimedia package to members of a subscriber's highly trusted network of users, by pre-authorization only, and to emergency dispatch personnel subscribed to the subscriber multimedia content database, in the case of an emergency event only.
摘要:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common communication network.
摘要:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common communication network.
摘要:
A gateway can be configured to receive an emergency event message in a predefined format via a network. The emergency event message can characterize a location and a nature of an emergency event. The gateway can also be configured to identify a particular Public Safety Answering Point (PSAP) customer premise equipment (CPE) to service the emergency event. The gateway can further be configured determine a format of messages employable by the particular PSAP. The gateway can still further be configured to provide the particular PSAP CPE with an output message in the format employable by the particular PSAP CPE. The output message can characterize the nature and the location of the emergency event.
摘要:
A centralized database system is used in a wireless location system that determines the geographical locations of mobile wireless transmitters, the wireless location system including signal collection systems, location processors for processing digitized RF data provided by the signal collection systems, and a centralized database system for managing resources in the wireless location system. The centralized database system includes a computer, a database, and a plurality of software processes for managing the wireless location system, providing interfaces to external users and applications, and storing location records and configuration information.
摘要:
Mobile LMUs can be used in a Wireless Location System to provide detection coverage in areas lacking adequate receiver coverage. The mobile LMUs can be used to detect the radio frequency (RF) transmissions from wireless handsets and devices over a period of time to permit determination of their location. The mobile LMU's time, position, and velocity is calculated and transmitted to a SMLC along with any transmissions received from wireless devices. The SMLC analyzes and resolves the Doppler component of the wireless device while compensating for the Doppler component of the mobile LMU. The position and velocity of the wireless device can be compared with real-time imagery taken by the mobile LMU platform to accurately determine the location of the wireless device. To enhance the mobile LMU's ability to detect a signal of interest, which may be very weak and/or corrupted by noise, a process may be employed whereby the low power mobile terminals' signals are received at receiving sites and stored in memory. Then, a more powerful replica of the SOI is received at a later time from a network controller, or BTS, and this is employed to enhance the correlation processing of the SOI in memory.
摘要:
In multi-user operating systems, set-up files that are present locally have to be processed each time a user logs in at a computer, in order to undertake settings at the computer which optimally configure the further operating of the user using his user programs. If an update of a user program is now fed in, it is also necessary to change the associated set-up file. This change to a set-up file is now carried out on a net-wide basis and automatically on the basis of the set-up mechanism.
摘要:
An Applications Processor (14) including a centralized database system is used in a wireless location system (WLS). The APs 14 may be used to manage resources in the WLS, including signal collection systems (SCSs 10) and TDOA location processors (TLPs 12). Each AP 14 contains a database containing triggers for the WLS. The WLS can be programmed to locate only certain pre-determined types of transmissions. When a transmission of a pre-determined type occurs, then the WLS is triggered to begin location processing. Each AP 14 also contains applications interfaces that permit a variety of applications to securely access the WLS. These applications may access location records in real time or non-real time, create or delete certain types of triggers, or cause the WLS to take other actions. Each AP 14 is also capable of certain post-processing functions.