Abstract:
A system and method are provided for using location information associated with wireless devices. The system includes a wireless device, a location system, and a feature server. The wireless device includes any wireless apparatus having wireless communications capabilities. The location system can generate location information pinpointing the location of the wireless device. The feature server can use the location information to determine whether to execute an action in accordance with subscriber rules. A large number of applications may be implemented to execute the action via a number of communication channels, including without limitation, a wireless communications network, a computer network, and a public switched telephone system, for example.
Abstract:
The present invention is a system and method for conducting survey using wireless devices. The system architecture of the present invention comprises a location server and a location system. The location server can receive a survey request from a subscriber, delineate a survey area for the survey, broadcast a query containing the survey to a plurality of wireless devices, process responses received from the wireless devices, and deliver a result of the survey to the subscriber. The location system can generate location information for each of the wireless devices that received the query. The location system may be a network-based unit or a portable unit provisioned at each of the wireless devices. In one of the embodiments, the location system is a GPS receiver that generates the longitude and the latitude of the wireless devices at which it is provisioned.
Abstract:
A wireless communication system is described for allocating limited network access according to priorities designated for requested transactions of wireless communications. The wireless network has a number of access links for transmitting transactions for wireless communications. A plurality of wireless communications devices requests transmission of transactions on the wireless network. A designated priority level is associated with each transaction. In response to the transaction requests, an access control manager in the wireless network schedules transmission of transactions when all of the plurality of access links are occupied, by authorizing a transmission of a transaction of higher priority than another transaction that is being transmitted, and discontinuing the transmission of the transaction of lower priority.
Abstract:
The present invention is a system and method for conducting survey using wireless devices. The system architecture of the present invention comprises a location server and a location system. The location server can receive a survey request from a subscriber, delineate a survey area for the survey, broadcast a query containing the survey to a plurality of wireless devices, process responses received from the wireless devices, and deliver a result of the survey to the subscriber. The location system can generate location information for each of the wireless devices that received the query. The location system may be a network-based unit or a portable unit provisioned at each of the wireless devices. In one of the embodiments, the location system is a GPS receiver that generates the longitude and the latitude of the wireless devices at which it is provisioned.
Abstract:
Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service provider may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service provider may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service provider may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile sub scriber.
Abstract:
The present invention is a system and method for conducting survey using wireless devices. The system architecture of the present invention comprises a location server and a location system. The location server can receive a survey request from a subscriber, delineate a survey area for the survey, broadcast a query containing the survey to a plurality of wireless devices, process responses received from the wireless devices, and deliver a result of the survey to the subscriber. The location system can generate location information for each of the wireless devices that received the query. The location system may be a network-based unit or a portable unit provisioned at each of the wireless devices. In one of the embodiments, the location system is a GPS receiver that generates the longitude and the latitude of the wireless devices at which it is provisioned.
Abstract:
Subscriber authorization information from a wireless communication device is identified. The subscriber authorization information indicates that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device. Subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device is received or retrieved without information that identifies the location of the wireless communication device.
Abstract:
Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service promoter may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service promoter may disclose the mobile subscriber's identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber's identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber.
Abstract:
An anonymous location wireless network service for use in a wireless network. The service provides content providers with the location of network users without revealing their identities. The service includes a wireless network having a proxy server, a network communication link to a plurality of web sites, and a wireless communication link to a plurality of handheld devices. The proxy server blocks identity by reading the location and identity information of network devices, generating dummy identifications, relating the dummy identifications to the identity information, storing the relationships in a memory storage, and forwarding the location information and dummy identifications to the global computer network. Upon receiving messages from the global computer network, the proxy server reads the dummy identifications, looks up the related identification information in the memory storage, and forwards the data to the appropriate network devices.
Abstract:
An anonymous location wireless network service for use in a wireless network. The service provides content providers with the location of network users without revealing their identities. The service includes a wireless network having a proxy server, a network communication link to a plurality of web sites, and a wireless communication link to a plurality of handheld devices. The proxy server blocks identity by reading the location and identity information of network devices, generating dummy identifications, relating the dummy identifications to the identity information, storing the relationships in a memory storage, and forwarding the location information and dummy identifications to the global computer network. Upon receiving messages from the global computer network, the proxy server reads the dummy identifications, looks up the related identification information in the memory storage, and forwards the data to the appropriate network devices.