Control beacons for wireless devices

    公开(公告)号:US10390202B2

    公开(公告)日:2019-08-20

    申请号:US16027245

    申请日:2018-07-03

    Abstract: Systems and methods for automatically modifying computing devices are provided. Various embodiments allow multiple control beacons (e.g., Bluetooth low energy beacons) with GPS to automatically pre-configure by discovering each other using location provided by the GPS in the beacons. These beacons can then be used to enforce multiple rules or policies on the computing device (e.g., restrict the activities/functionality of a mobile device). For example, a beacon can be installed at a family's dinner table and can be used as a trigger to restrict (or activate) phone features (e.g., allow only incoming calls while near this beacon during dinner times). In some embodiments, the GPS on the beacon can be used to notify administrators (e.g., parents) if the beacon is moved from its current location.

    Emergency call handling within IP multimedia system (IMS) networks

    公开(公告)号:US10305657B2

    公开(公告)日:2019-05-28

    申请号:US15727405

    申请日:2017-10-06

    Abstract: Systems and methods are described herein for handling E911 communications within IMS networks, such as Voice over LTE (VoLTE) networks. In some embodiments, the systems and methods, via various communication nodes, handle or otherwise govern emergency calls within the VoLTE network, by sending an INVITE message from a sender node of the VoLTE network to a recipient node of the VoLTE network, and starting a retry timer at the sender node that is specific to handling E911 calls by the VoLTE network.

    CONTROL BEACONS FOR WIRELESS DEVICES
    73.
    发明申请

    公开(公告)号:US20180317074A1

    公开(公告)日:2018-11-01

    申请号:US16027245

    申请日:2018-07-03

    CPC classification number: H04W4/80 H04W4/33 H04W40/244 H04W48/04 H04W48/12

    Abstract: Systems and methods for automatically modifying computing devices are provided. Various embodiments allow multiple control beacons (e.g., Bluetooth low energy beacons) with GPS to automatically pre-configure by discovering each other using location provided by the GPS in the beacons. These beacons can then be used to enforce multiple rules or policies on the computing device (e.g., restrict the activities/functionality of a mobile device). For example, a beacon can be installed at a family's dinner table and can be used as a trigger to restrict (or activate) phone features (e.g., allow only incoming calls while near this beacon during dinner times). In some embodiments, the GPS on the beacon can be used to notify administrators (e.g., parents) if the beacon is moved from its current location.

    SECURITY VIA ADAPTIVE THREAT MODELING
    75.
    发明申请

    公开(公告)号:US20180219914A1

    公开(公告)日:2018-08-02

    申请号:US15417548

    申请日:2017-01-27

    Abstract: A methods and systems of providing security based on an identified susceptibility profile of a user are provided. Behavioral data related to an account of a user is received for a predetermined period. The behavioral data is analyzed for a pattern of on-line behavior of the user. A susceptibility profile of the user is created based on the pattern of on-line behavior. Environment parameters are received from a database. A security threat model is created based on the susceptibility profile and the environment parameters. A report data packet based on the created threat model is sent to an account of the user.

    Device switching service
    77.
    发明授权

    公开(公告)号:US10015651B1

    公开(公告)日:2018-07-03

    申请号:US15396065

    申请日:2016-12-30

    Inventor: Kanakrai Chauhan

    Abstract: A device switching technique that can be used when a user switches from a first cell phone to a second cell phone is described, wherein a phone provider detects an event indicating that a device switch is imminent and sets up temporary storage associated with a first device. At the user's convenience, the user performs a data transfer process to transfer a portion of user data from the first device to the temporary storage. When the user receives the second device, such as in a phone store, remaining user data is transferred from the first device to the second device, thereby decreasing the amount of time necessary to set up the second device.

    Roaming LTE emergency call with call back number retrieval

    公开(公告)号:US09967723B2

    公开(公告)日:2018-05-08

    申请号:US15489557

    申请日:2017-04-17

    CPC classification number: H04W4/90 H04W8/08 H04W8/12 H04W76/50 H04W84/042

    Abstract: A roaming wireless user device on a Visited Public Land Mobile Network (VPLMN) may initiate a Long-Term Evolution (LTE) emergency call to a Public Safety Answering Point (PSAP). Accordingly, a Proxy Call Session Control Function (P-CSCF) of the VPLMN may receive an anonymous Session Initiation Protocol (SIP) invite message for the LTE emergency call. The anonymous SIP invite message lacks a Mobile Station International Subscriber Directory Number (MSISDN) of the wireless user device but has an International Mobile Equipment Identity (IMEI) of the wireless user device. The anonymous SIP invite message is forwarded to a Location Retrieval Function (LRF) in a Gateway Mobile Location Center (GMLC) of the VPLMN. The LRF obtains a MSISDN of the wireless user device that matches the IMEI in the anonymous SIP invite message from a database of the GMLC, such that the MSISDN is routed with the LTE emergency call to the PSAP.

Patent Agency Ranking