摘要:
Techniques are presented for identifying mobile devices within a coverage legion of a wireless station Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices ale selected via certain criteria, including, for instance, campaign specifications and subscriber information A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.
摘要:
Techniques are presented for identifying mobile devices within a coverage region of a wireless station. Positions for mobile devices, if any, within the coverage region are determined. It is then determined whether the positions are within one or more defined areas, called “notification areas” herein. Additionally, selected mobile devices within notification areas are sent messages. The selected mobile devices are selected via certain criteria, including, for instance, campaign specifications and subscriber information. A message can be sent to a mobile device if the subscriber corresponding to the mobile device has indicated an acceptance of a category of notifications for the message and for the publisher who is publishing the notifications. The category could be traffic conditions and the publisher could be a Department of Transportation having responsibility for a particular freeway. These are two examples of multiple criteria for selecting mobile devices to which messages could be sent.
摘要:
Spatial rules involve locations of entities, such as wireless devices, from a mobile population. When evaluating rules in a communication network, attributes of an entity are determined, where one of the attributes comprises location of the entity. Rules are evaluated to produce one or more results, each of the rules operating on the attributes of the entity. Specified actions for the rules are performed, based on the evaluation of the rules. At least one of the specified actions comprises communicating a result to an application. The communication network may have a portion that is wireless. An attribute of the entity can include subscriber information and an entity generally corresponds to a particular subscriber in the communication network, but the entity may also correspond to multiple subscribers. An entity may be a wireless device, which can subscribe to a network. Rules can apply to particular geographical regions, to particular subscribers, to both, or to additional criteria.
摘要:
It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service are redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service. The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service are redirected to another information service when properties of the new information service are determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.
摘要:
It is determined whether a location of a mobile device is within a coverage region of a first information service. Communications for the first information service ate redirected to a second information service when the location of the mobile device is not within a coverage region of the first information service The second information service generally has a coverage region encompassing the location of the mobile device. Communications between a mobile device and a first information service ate redirected to another information service when properties of the new information service ale determined to meet predetermined criteria set by a user of the mobile device, by an application, or both. In yet another aspect of the invention, Replacement of information services can be “aggressive” or “non-aggressive.” Communications between a mobile device and an original information service are redirected to another information service when the original information service fails.
摘要:
A method for determining attributes of entities within a physical space. More specifically, the location of the entities in the physical space are determined using this invention. A reader automatically moves throughout the space and takes measurements of the attributes of corresponding entities when it detects the presence of these entities in the physical space. The attributes of the entities could be the location, temperature and so forth. The reader could be an RF detection device for reading signals from the tags attached to the entities.
摘要:
A telemetry data acquisition management system includes a system processor and an interface engine, controlled by the system processor, for interfacing with sensor bearing systems, to receive telemetry data from the sensor bearing systems, and distribute the data to a plurality data processing systems or applications operational for processing telemetry data according to each sensor bearing systems' protocol. The system processor enables the plurality of multiple data processing systems or applications to specify telemetry requests including “fuzzy” timeliness protocol, generates a charging structure such that the sensor bearing systems are charge by usage commensurate with system load.
摘要:
A telemetry data acquisition management system includes a system processor and an interface engine, controlled by the system processor, for interfacing with sensor bearing systems, to receive telemetry data from the sensor bearing systems, and distribute the data to a plurality data processing systems or applications operational for processing telemetry data according to each sensor bearing systems' protocol. The system processor enables the plurality of multiple data processing systems or applications to specify telemetry requests including “fuzzy” timeliness protocol, generates a charging structure such that the sensor bearing systems are charge by usage commensurate with system load.
摘要:
A digital rights management (DRM) system and methodology for a Java client implementing a Java Runtime Environment (JRE). The JRE comprises a Java Virtual Machine (JVM) and Java runtime libraries components and is capable of executing a player application for presenting content that can be presented through a Java program (e.g., a Java application, applet, servlet, bean, etc.) and downloaded from a content server to the client. The DRM system includes an acquisition component for receiving downloaded protected contents; and a dynamic rights management layer located between the JRE and player application for receiving requests to view or play downloaded protected contents from the player, and, in response to each request, determining the rights associated with protected content and enabling viewing or playing of the protected contents via the player application if permitted according to the rights. By providing a DRM-enabled Java runtime, which does not affect the way non-DRM-related programs work, DRM content providers will not require the installation of customized players. By securing the runtime, every Java™ player automatically and transparently becomes a DRM-enabled player.
摘要:
A method of securely receiving data on a user's system from a web broadcast infrastructure with a plurality of channels. The method comprising receiving promotional metadata from a first web broadcast channel, the promotional metadata related to data available for reception; assembling at least part of the promotional metadata into a promotional offering for review by a user; selecting by a user, data to be received related to the promotional metadata; receiving data from a second web broadcast channel, the data selected from the promotional metadata, and wherein the data has been previously encrypted using a first encrypting key; and receiving the first decrypting key via a computer readable medium, the first decrypting key for decrypting at least some of the data received via the second web broadcast channel. In another embodiment, a method and system to transmit data securely from a web broadcast center is disclosed.