摘要:
What is disclosed is a method and system for determining an anonymity level of a user's data. If it desired to change the anonymity level, location and time information may be changed and/or deleted to effect the change. The change may be user directed, or may be achieved by the system, before providing the information to a third party.
摘要:
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first algorithm; creating at least two subsets of data from the data stream by extracting one or more data portions from the encrypted data stream, thereby leaving a remaining portion and an extracted portion; communicating the remaining portion to a destination by way of a first communications channel; encrypting the extracted portion utilizing a second algorithm; communicating the encrypted extracted portion to the destination by way of a second communications channel; and providing for recombining the remaining portion and the encrypted extracted portion to facilitate recovery of the encrypted data stream.
摘要:
An embodiment of the current invention is directed to facilitating a location-based service for use by a given mobile-device. A location of each of a number of base stations that makes up a portion of a wireless-telecommunications-network is identified. For a given base station, the probability that it provides a level of signal coverage to a geographical area that would enable the mobile-device in the first geographical area to communicate with the network is determined. A density of possible locations that the mobile-device may be within the geographical area is determined. A position for the mobile-device is approximated based on the density. A location-based service is facilitated for use by the mobile-device based on the position of the mobile-device.
摘要:
A method for the identification of potential internet service customers is provided. The method includes receiving a first internet traffic data for an internet entity corresponding to a first amount of internet traffic exchanged with the internet entity over a first service provider network. The method also includes receiving a second internet traffic data for the internet entity corresponding to a second amount of internet traffic exchanged with the internet entity over a second service provider network. The method also includes determining a volume metric for the internet entity based at least in part on the first and second internet traffic data, determining whether the volume metric meets a criterion, and displaying an identity of the internet entity if the volume metric meets the criterion.
摘要:
Disclosed herein is a method of operating a communication system, wherein the method comprises receiving entity historical performance information including a paging delay value and a paging cost value for each of a plurality of past call periods; receiving target performance information indicating a paging delay goal and a paging cost goal; processing the historical performance information and the target performance information to determine a past call period wherein the past call period comprises one of the plurality of past call periods having a paging delay value that is within a predetermined proximity of the paging delay goal and a paging cost value that is within a predetermined proximity of the paging cost goal; processing call history information associated with the entity to determine a plurality of locations where the entity was located during the past call period; receiving a call for the entity; and in response to the call, transferring a plurality of paging messages to page the entity at the plurality of locations.
摘要:
A method and apparatus for more efficiently scheduling transmission of page messages over a paging channel in a radio access network (RAN). The RAN, which generally assigns slotted messages a higher transmission priority than non-slotted messages, may determine a level of occupancy of the paging channel either periodically, continuously, or responsive to a triggering event. Thereafter, the RAN may compare the level of occupancy to a load threshold, which may either be based on (i) a predicted probability of non-slotted messages that will result from slotted messages in the RAN, or (ii) a ratio of non-slotted messages to slotted messages in the RAN. If the load threshold is based on the ratio, the RAN may determine the load threshold before making the comparison. After making the comparison, the RAN may assign non-slotted messages a higher transmission priority than slotted messages if the level of occupancy exceeds the load threshold.