摘要:
Method and systems are employed by a wireless location system (WLS) for locating a wireless device operating in a geographic area served by a wireless communications system. An exemplary method includes monitoring a set of signaling links of the wireless communications system, and detecting at least one predefined signaling transaction occurring on at least one of the predefined signaling links. Then, in response to the detection of the at least one predefined network transaction, at least one predefined location service is triggered.
摘要:
Mobile LMUs can be used in a Wireless Location System to provide detection coverage in areas lacking adequate receiver coverage. The mobile LMUs can be used to detect the radio frequency (RF) transmissions from wireless handsets and devices over a period of time to permit determination of their location. The mobile LMU's time, position, and velocity is calculated and transmitted to a SMLC along with any transmissions received from wireless devices. The SMLC analyzes and resolves the Doppler component of the wireless device while compensating for the Doppler component of the mobile LMU. The position and velocity of the wireless device can be compared with real-time imagery taken by the mobile LMU platform to accurately determine the location of the wireless device. To enhance the mobile LMU's ability to detect a signal of interest, which may be very weak and/or corrupted by noise, a process may be employed whereby the low power mobile terminals' signals are received at receiving sites and stored in memory. Then, a more powerful replica of the SOI is received at a later time from a network controller, or BTS, and this is employed to enhance the correlation processing of the SOI in memory.
摘要:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common communication network.
摘要:
A gateway can be configured to receive an emergency event message in a predefined format via a network. The emergency event message can characterize a location and a nature of an emergency event. The gateway can also be configured to identify a particular Public Safety Answering Point (PSAP) customer premise equipment (CPE) to service the emergency event. The gateway can further be configured determine a format of messages employable by the particular PSAP. The gateway can still further be configured to provide the particular PSAP CPE with an output message in the format employable by the particular PSAP CPE. The output message can characterize the nature and the location of the emergency event.
摘要:
iAlert_Enhanced_Alert_Manager enables a user to register an interest in their current location, as well as persons, places and/or things in which the user holds some regard. The iAlert_Enhanced_Alert_Manager provides notification and clarifying information to user's devices concerning events/happenstance that have occurred or are likely to occur within a proximity of registered persons, places, and/or things. The iAlert_Enhanced_Alert_Manager comprises data structures (e.g. an Affinity Table, a SPIN table, a SPIN-List Table, an Affinity-List Table, and a Keyword-List Table) to manage affinities, Spheres of Influence (SPINs), and relationships therebetween that may positively or negatively induce a person. Timely notification of events/happenstance to a user comprises the computation of iEvent-vectors and iAlert-vectors. An iEvent-vector contains fields pertaining to events/happenstance whereas an iAlert-vector comprises information pertaining to notifications. Transmission of a notification is determined as a function of the magnitude of an event/happenstance and the proximity of an event/happenstance to registered objects of interest.
摘要:
A resource selection server that performs crowd-sourced resource selection over a social networking service, absent a central ratings database. A device subscribed to a social networking service implementing the inventive resource selection server, may register as a resource offering a particular skill. Additionally, any device subscribed to a relevant social networking service may transmit a skill request to the inventive resource selection server, to request a best-fit resource be returned for a particular skill of interest. The resource selection server queries a subscriber account database to identify resources on a social networking service, registered to offer a requested skill. The resource selection server additionally prompts subscriber devices within ‘n’ degrees of separation of a requesting device, to submit real-time trust ratings for resources complying with a particular skill request. The resource selection server analyzes ratings submitted by selected subscriber devices to return a best-fit resource for a particular skill request.
摘要:
A centralized database system is used in a wireless location system that determines the geographical locations of mobile wireless transmitters, the wireless location system including signal collection systems, location processors for processing digitized RF data provided by the signal collection systems, and a centralized database system for managing resources in the wireless location system. The centralized database system includes a computer, a database, and a plurality of software processes for managing the wireless location system, providing interfaces to external users and applications, and storing location records and configuration information.
摘要:
An N-dimensional affinity confluencer comprises an affinity table to maintain a plurality of affinities for each of a plurality of wireless devices. A sphere of influence (SPIN) table provides an influence for determination of a confluence between affinities maintained in the affinity table. An affinity confluence determination module determines an affinity confluence between the plurality of wireless devices and an influence parameter associated with the sphere of influence (SPIN) table. An affinity confluence is determined from among a plurality of wireless devices by determining a confluence of at least two predefined affinities from among a plurality of wireless devices. A sphere of influence parameter is applied to the confluence to determine those of the plurality of wireless devices defined by an affinity confluence. The plurality of wireless devices need not be within a common communication network.
摘要:
A method and apparatus to facilitate the secure storage of multimedia content (i.e. video with optional audio) on an internet cloud, and to grant the release of stored multimedia content to pre-authorized users and pre-authorized emergency dispatch personnel, only. A subscriber entity uses a secure user interface component to store a multimedia package containing important/relevant navigation and/or location information on a cloud database. In addition, the subscriber entity specifies whether or not emergency personnel are authorized to access the multimedia package during an emergency event, and whether or not a predefined highly trusted network of users may access the multimedia package following a conventional authorization procedure. The inventive multimedia geospatial routing engine releases the multimedia package to members of a subscriber's highly trusted network of users, by pre-authorization only, and to emergency dispatch personnel subscribed to the subscriber multimedia content database, in the case of an emergency event only.
摘要:
In multi-user operating systems, set-up files that are present locally have to be processed each time a user logs in at a computer, in order to undertake settings at the computer which optimally configure the further operating of the user using his user programs. If an update of a user program is now fed in, it is also necessary to change the associated set-up file. This change to a set-up file is now carried out on a net-wide basis and automatically on the basis of the set-up mechanism.