Abstract:
A least squares geofence method that introduces inventive geofence steps and modifies existing geofence steps to minimize trigger misfires caused by data variability and location blunders and to minimize delayed/missed entry triggers generated under urban and/or indoor conditions. The least squares geofence method periodically retrieves sample locations for a target wireless device to determine that device's geographic location and to evaluate a corresponding side condition. Sample locations retrieved with accuracies greater than 1km are filtered. If a potential change in side condition is detected for a given device, the least squares geofence method retrieves five fast location fixes for that device and evaluates a weighted least squares (LS) location estimate based on sample locations retrieved. A LS location estimate is then filtered according to an anticipated trigger event and the least squares geofence method evaluates a final geofence side condition based on the LS location estimate previously computed.
Abstract:
Authenticating cloud computing enabling secure services (ACCESS) offloads "client authentication" activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
Abstract:
A commercial transaction is associated with a current location of a wireless device having location services enabled at the time of the transaction. The current location is compared to an entry in a database of associated merchants accepting transactions to the locations that they handle such transactions. If a match in location is found, the transaction may be validated. If the wireless device registered as the device of the person believed to be conducting the transaction is not at an expected or acceptable location at the time of the transaction, then the transaction may be flagged for possible fraudulent activity. At the time of the transaction, a software location based services (LBS) trigger is initiated to request validation of the transaction based on the wireless device's current location.
Abstract:
A method enabling a device the ability to maintain a personal distribution list (PDL), i.e., a group contact list, via manipulation of text messages sent over the SMS, with service homed on the SMSC. Each PDL is maintained on an SMSC affiliated with the list's originating device and is referenced with a trigger address, either particularly or implicitly defined. When an SMSC receives an SMS message destined to a trigger address, identifying a PDL, the SMSC copies the originally transmitted text message for every recipient in the list. The SMSC subsequently routes each duplicate text message to every address contained within the indicated PDL, via conventional SMS procedures. Syntax indicating list management operations (e.g., add, delete, list entries, and delete, synch, and/or tag entire list) may be indicated in the body of an SMS message addressed to the local address of the SMSC for list management capabilities.
Abstract:
A mobile IP. location server that retrieves the location of a mobile device based on the public IP address that a mobile device is using. A mobile IP location server comprises a mobile location protocol interface, an identifier resolver, and a location manager. The mobile location protocol interface interacts with location applications and receives and responds to location requests. The identifier resolver converts a device's public IP address to a real mobile identifier (e.g. MSISDN) and performs address conversion by either interacting with an HTTP proxy server or querying a network address translation (NAT) table. The location manager retrieves the location of a mobile device given the device's real mobile identifier (e.g. MSISDN). A web application requests mobile IP location services by transmitting an IP request to the mobile IP location server. An IP location request contains a mobile device's public IP address, port number, and any application specific information.
Abstract:
Parylene-coated, ultra ruggedized ball grid array electronic components include a substrate with electronic components attached to one surface, and solder balls attached to a second substrate surface through openings formed in the parylene coating.
Abstract:
Area event triggers are handled by receiving an original area event trigger with an initial target area within a given mobile network, for a given target mobile device. When the target mobile device is outside the mobile network serving the target area, a first changed area event trigger based on entry into the given mobile network is transmitted to the given target mobile device. When the first changed area event trigger becomes satisfied, a second changed area event trigger is generated based on entry into the initial target area, and transmitted to the given target mobile device. The second changed area event trigger may be based on entry into a region larger than, but including, the initial target area. Then when the second changed area event trigger becomes satisfied, the original area event trigger may be transmitted to the target mobile device.
Abstract:
A method and apparatus for steering location requests to a serving one of a plurality of possible location positioning devices. A location request may be steered base on an emergency status of the location request, whether or not the subscriber device has a valid data plan established, based on the device type of the wireless device, or based on the type of application running on the wireless device. A location request may also be steered to a fallback location device if a steering to a primary selected location device fails and sufficient time remains to locate via the fallback location device.
Abstract:
Heat generated by operating electronic components within an environmentally-sealed enclosure is removed, without direct transmission of a viscous medium through the enclosure. An internal heat sink and external heat sink each span a given wall. The internal heat sink section is baffled and channeled with one place for air to enter, and one to exit. A fan forces air over heat sink extremities of the internal heat sink section. A circulating air column entrapped within the enclosure is drawn into the entrance of the internal heat sink, and forced through the entire length of the internal heat sink, providing for a thermal conduit for a heated entrapped air column to transfer its heat into the internal heat sink. The external heat sink is exposed to the ambient environment, with airflow managed over the external heat sink preferably with a structural surround that provides for channeling of airflow.
Abstract:
A vehicle includes a telematics controller and a single short range, low power interior transmitter focused substantially only on a vehicle's driver's seat only. Synergistic interaction is provided between a vehicle's telematics controller and a wireless device used by the driver (e.g. a cell phone, smart phone, PDA, wireless laptop, etc.) to parametrically control at least one wireless service or other operation of a wireless device presumed operated by the driver of the vehicle. Example wireless services blocked or forced into a safe mode (such as hands-free operation) include SMS, Email, and Voice services.