摘要:
A method of locating a mobile telephone includes steps of receiving, transmitting, increasing and determining. In the receiving step, a first base station receives a call from a mobile telephone, the call including a dialed number and a TDMA signal. In the transmitting step, the base station transmits a control message to the mobile telephone when the dialed number meets a predetermined criterion, such as being 911. The control message instructs the mobile telephone to transmit the TDMA signal at a maximum power. In the increasing step, the mobile telephone increases the TDMA signal to maximum power in response to the control message. Then in the determining step, location information for the mobile telephone is determined based on at least one characteristic of the TDMA signal received at at least one of the first base station and other base stations. In an alternate embodiment, the method is practiced in a mobile telephone and the power level is automatically increased in response to the dialed number meeting a predetermined criterion.
摘要:
A variety of methods and systems can be used to achieve electronic surveillance when a call is directed to a destination as a result of service processing. For example, in a system involving a redirecting switch and a service platform switch, correlation between calling party identities for outgoing and incoming call legs can be done to identify a hairpin loop scenario. Upon detection of such a scenario, an appropriate electronic surveillance message can be sent to a monitoring device indicating the call's destination. Correlation information can be collected from available call setup signaling parameters. The methods and systems can be applied, for example, to systems involving directory assistance call completion, voice-activated dialing, voicemail callback, and prepaid services.
摘要:
Methods and apparatus for determining and maintaining user presence information include capturing user presence data with an application presence server. The application presence server can be configured to update user presence data as a user initiates or exits an application. Applications associated with user presence data are configured to query an application proxy client concerning user presence data of a selected user and, based on a returned user status, deliver, discard, or redirect a message intended for the user. User presence data is stored in a user presence repository and can be provided via Internet-based or other connections to applications executed on external networks. User activity status can be used to select or update user presence data. In some examples, an application server of an external network is configured to receive user presence data from the presence server.
摘要:
A device and method wherein, using a keypad such as a standard alphanumeric telephone-style keypad, text entry is improved by employing a key-press combination which indicates which of the multiple characters associated with a key is chosen. The user will push-and-hold a first key, then press a second key; the position within the keypad, such the row number, of the first key indicates which of the characters represented by the second key are chosen. In this way, any standard character can be selected with a two-key combination.
摘要:
A communication device locates a wireless service provider in a multi-service provider environment using a frequency band search schedule. The frequency band search schedule has a first or home band and a several other frequency bands in a predetermined ordered. The order of the frequency bands may be programmed by the user or by a home service provider over the air. The communication device searches for an acceptable service provider by examining the home band and then the other bands listed in the frequency band search schedule. The bands are examined in the order specified by the frequency band search schedule. An acceptable service provider is identified by comparing the identify of a service provider specified by an identifier received from a band being examined with a list of acceptable service providers.
摘要:
A method and apparatus for programming a cellular telephone with activation parameters. A cellular telephone to be programmed is connected to a computer via a communications interface. A user input device is provided to allow a user to provide programming information, including a cellular telephone type, to the computer. A visual representation of the cellular telephone type is displayed on a display monitor to allow the user to interactively verity the inputted programming information. Upon such user verification, the computer determines activation parameters and transmits the activation parameters to the cellular telephone. In accordance with another aspect of the invention, certain activation parameters are dynamically computed based on the user provided programming information In one embodiment, the user enters a cellular telephone number to be assigned to the cellular telephone. The computer looks up a system identification associated with the cellular telephone number in a memory unit. Certain activation parameters are dynamically computed based on the cellular telephone number and system identification.
摘要:
Automated activation and provisioning technologies can be applied in a variety of scenarios. For example, an automated activation and provisioning server can translate user desired features into associated provisioning directives. The directives can then be sent to elements of a wireless communications network support system. Activation and provisioning for a rich set of features can thus be achieved without manual intervention or reaction to the user's choices. Receipt of the user's choices can be accomplished in real time via a user interface of a mobile wireless device or a web-based user interface.
摘要:
In a method of purchasing online, a client device of a customer communicates a purchase selection which is received by a vendor computer system. The vendor computer system, in response, communicates a cost of the purchase selection and fund confirmation address to the client device. The client device communicates a payment authorization for the cost that is received by a fund guardian. The client device also communicates biometric information. The fund guardian confirms the availability of sufficient funds to pay the cost. The biometric information is applied along with a stored biometric print to authenticate the customer. The vendor computer system communicates a fund confirmation address which is received by the fund guardian. When sufficient funds are available to pay the cost, and when the customer is authenticated, the fund guardian communicates a fund confirmation to the vendor computer system at the fund confirmation address.
摘要:
Centralized billing is provided by processing requests for pre-paid and post-paid services at a service control point that is configured to prepare one or more associated event records. Event records associated with provided services can be stored at the service control point or in a remote database, or the service control point can direct the event records to a central billing system that is configured to bill subscribers directly or to transmit event records to one or more payment systems via a financial gateway. Service control point service logic is configured to permit negative account balances for post-paid subscribers, while account balances remain positive for pre-paid subscribers. Credit limits can be associated with post-paid subscribers, and service authorization can be based on such credit limits.
摘要:
Disclosed embodiments include a method for synchronizing a cryptosystem. In one embodiment, the method uses existing control data that is transmitted as part of a connection establishment process in a wireless communication system. In one embodiment, messages that are normally sent between a base station and a remote unit during the setup of both originating and terminating calls are parsed to detect a particular control message that indicates the start of telephony data transmission. Detection of this message indicates a point at which encryption/decryption can begin, and is used to synchronize the cryptosystem. Synchronizing a cryptosystem involves generating an RC4 state space in a keyed-autokey (nullKEKnull) encryption system. In one embodiment, Lower Medium Access Channel (nullLMACnull) messages are used according to a wireless communication protocol. This is convenient because the LMAC messages are passed through the same Associated Control Channel (nullACCnull) processing that encrypts and decrypts the telephony data.