Abstract:
Methods, systems, and products create credit cards, debit cards, and other transactional cards. An image is received and provided on a transactional card. Account information is retrieved and associated with the transactional card. A machine-readable element is also provided on the transactional card and includes the account information.
Abstract:
Optimized location information is provided for a location based service. An event is detected which is indicative of an error in the location based service which degrades the performance of the location based service. A cause of the error is determined, and resolution of the error is initiated based on the determined cause.
Abstract:
A location query service is disclosed. The service provides requestors with a location of a device. The service receives a location query from a requestor, retrieves location information associated with the network user, and returns the location information to the requestor. Before returning the location information to the requestor, the service is configured, in some embodiments, to authenticate that the requestor is authorized by the network user to receive the network user's location information. Methods for providing a location query service also are disclosed.
Abstract:
Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service provider may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service provider may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service provider may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile sub scriber.
Abstract:
A system and method are provided for using location information associated with wireless devices. The system includes a wireless device, a location system, and a feature server. The wireless device includes any wireless apparatus having wireless communications capabilities. The location system can generate location information pinpointing the location of the wireless device. The feature server can use the location information to determine whether to execute an action in accordance with subscriber rules. A large number of applications may be implemented to execute the action via a number of communication channels, including without limitation, a wireless communications network, a computer network, and a public switched telephone system, for example.
Abstract:
Location-blocking and identity-blocking services that can be commercially offered by a service provider, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service provider may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service provider may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service provider may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber.
Abstract:
A system and method are provided for using location information associated with wireless devices. The system includes a wireless device, a location system, and a feature server. The wireless device includes any wireless apparatus having wireless communications capabilities. The location system can generate location information pinpointing the location of the wireless device. The feature server can use the location information to determine whether to execute an action in accordance with subscriber rules. A large number of applications may be implemented to execute the action via a number of communication channels, including without limitation, a wireless communications network, a computer network, and a public switched telephone system, for example.
Abstract:
An apparatus and method for providing a user interface for facilitating communications between devices are provided. According to one aspect, an interface device provides communications between a first device and a second device. The interface device has an input for receiving data in a first format from the first device. Logic within the interface device is configured to receive a request to interact with the interface device and to provide a user interface in response to receiving the request. The logic identifies a second device for receiving the data from the first device. The logic identifies a second format that is compatible with the second device and translates the data to the second format. The interface device further has an output for transmitting the translated data to the second device.
Abstract:
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.
Abstract:
Identity-blocking services are provided. The current physical location of a mobile device may be disclosed to a third party without sending any identity information of the mobile subscriber to the third party. Blocking of the mobile subscriber's identity may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber.