Patent application number | Description | Published |
20080255954 | E-coupon service for location-aware mobile commerce which determines whether to supply requested e-coupons based on the number of requests received in a processing cycle, and a threshold number of requests required to make expected returns from redeemed coupons greater than advertising fees - A conditional e-coupon distribution method distributes e-coupons predefined by sellers to mobile users only if the number of mobile users requesting such e-coupons equals or exceeds a threshold. The method receives a request to browse e-coupons from a mobile user. The method receives the location of the mobile user and determines a plurality of sellers local to the mobile electronic device and a plurality of corresponding e-coupons available from the local sellers. The method receives a request for a particular e-coupon from a seller and authorizes the provision of said e-coupon to the mobile user. At the end of a processing cycle, the mobile user receives the requested e-coupon if all conditions, such as a period of time and threshold, have been met. A computer-usable medium having computer-readable program code embodied therein allows for storage of the method. | 10-16-2008 |
20090022152 | SYSTEM AND METHOD TO SUPPORT NETWORKING FUNCTIONS FOR MOBILE HOSTS THAT ACCESS MULTIPLE NETWORKS - An IP-based corporate network architecture and method for providing seamless secure mobile networking across office WLAN, home WLAN, public WLAN, and 2.5 G/3 G cellular networks for corporate wireless data users. The system includes Internet roaming clients (IRCs), a secure mobility gateway (SMG), optional secure IP access (SIA) gateways, and a virtual single account (VSA) server. The IRC is a special client tool installed on a mobile computer (laptop or PDA) equipped with a WLAN adaptor and a cellular modem. It is responsible for establishing and maintaining a mobile IPsec tunnel between the mobile computer and a corporate intranet. The SMG is a mobile IPsec gateway installed between the corporate intranet and the Internet. It works in conjunction with the IRC to maintain the mobile IPsec tunnel when the mobile computer is connected on the Internet via a home WLAN, a public WLAN, or a cellular network. The SIA gateway is a special IPsec gateway installed in the middle of the wired corporate intranet and an office WLAN. It works with the IRC to ensure data security and efficient use of corporate IP addresses when the mobile computer is connected to the office WLAN. The VSA server manages authentication credentials for every corporate user based on a virtual single account concept. The Internet Roaming system can provide secure, always-on office network connectivity for corporate users no matter where they are located using best available wireless networks. | 01-22-2009 |
20090290543 | Transmit and Receive Method for a Data Service - A method includes receiving a plurality of radio frequency (RF) channels in parallel at a receive site, and demodulating the RF channels using a plurality of demodulators of the receive site to generate a plurality of streams of packets, each stream of packets having a first address space. The method also includes combining the plurality of streams of packets at a tunneling destination of the receive site to generate a first stream of packets having a second address space. | 11-26-2009 |
20100002600 | CHANNEL EFFICIENCY BASED PACKET SCHEDULING FOR INTERACTIVE DATA IN CELLULAR NETWORKS - The present packet scheduling algorithm gives cellular network operators greater flexibility in adjusting the way resources are allocated among interactive best-effort data users. The present packet scheduling algorithm is capable of allocating radio resource dynamically, not only based on channel conditions, but also to achieve different performance trade-offs among users with different link qualities. According to the algorithm, channel quality is determined for each user. Channel efficiency is calculated and the channel efficiency value is used as the primary factor in weighting the delivery of packets to (or from) a given user. In a packet schedule weighting equation, a value of exponent may be varied from negative to positive to give good (or bad) users better service. However, performance of users with bad channel qualities degrades the performance of good channel users in a disproportionate manner. | 01-07-2010 |
20100159987 | UNIVERSAL SERIAL BUS BASED SUBSCRIBER IDENTITY MODULE - A USB based USIM or SIM device is disclosed. For example, the device comprises a Subscriber Identity Module (SIM) module, a SIM to Universal Serial Bus (USB) conversion module coupled to said SIM module, and a USB interface module coupled to said SIM to USB conversion module for engaging a computing device. | 06-24-2010 |
20100208751 | Method, System, and Device for Sending Data in a Cable Data Service - A method of sending data from a transmit site to a receive device includes dividing a first transmit data stream having a first bit rate into multiple data streams with each of the multiple data streams having a bit rate that is lower than the first bit rate. Each of the multiple data streams is transmitted over a cable network having multiple radio frequency channels. The multiple data streams are recombined at the receive device to provide a receive data stream having a bit rate equal to the first bit rate. A second transmit data stream is transmitted over one of the radio frequency channels to a legacy user connected to the one radio frequency channel between the transmit site and the receive device. | 08-19-2010 |
20100265942 | Receive Device for a Cable Data Service - A receive device includes a plurality of demodulators and a tunnel destination. The demodulators are configured to receive multiple data streams, each of the multiple data streams having a bit rate that is lower than a bit rate of a transmit data stream. The tunnel destination is configured to recombine the multiple data streams to provide a receive data stream having a bit rate equal to the bit rate of the transmit data stream. At least one of multiple radio frequency channels is connected to a legacy user between a transmit site and the receive device. | 10-21-2010 |
20100274648 | Conditional electronic coupon distribution method and system - A conditional e-coupon distribution method distributes e-coupons predefined by sellers to mobile users only if the number of mobile users requesting such e-coupons equals or exceeds a threshold. The method receives a request to browse e-coupons from a mobile user. The method receives the location of the mobile user and determines a plurality of sellers local to the mobile electronic device and a plurality of corresponding e-coupons available from the local sellers. The method receives a request for a particular e-coupon from a seller and authorizes the provision of said e-coupon to the mobile user. At the end of a processing cycle, the mobile user receives the requested e-coupon if all conditions, such as a period of time and threshold, have been met. A computer-usable medium having computer-readable program code embodied therein allows for storage of the method. | 10-28-2010 |
20110033044 | Secure Open-Air Communication System Utilizing Multi-Channel Decoyed Transmission - A secure, open-air communication system utilizes a plurality of “decoy” data signals to hide one or more true data signals. The true data signal(s) are channel hopped with the plurality of decoy data signals to form a multi-channel “scrambled” output signal that is thereafter transmitted in an open-air communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting both the true and decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s). | 02-10-2011 |
20110107400 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD USING USER-SELECTED THIRD PARTY AUTHORIZATION - A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party. | 05-05-2011 |
20110119485 | METHOD AND APPARATUS FOR PROVIDING RADIO COMMUNICATION WITH AN OBJECT IN A LOCAL ENVIRONMENT - A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate. | 05-19-2011 |
20110143776 | Location and Time Specific Mobile Participation Platform - A mobile participation platform enables a wireless network operator or third party to solicit response data related to a specific time and location specific event by signaling multiple mobile device users that meet predefined qualifications. The qualifications include presence at the specific location at the specific time, and may include other characteristics, such as prior consent to receive solicitations, and particular device type or data collection functionality. The platform locates mobile devices that may qualify for participation, and generates and transmits a solicitation. Mobile devices receiving the solicitation may activate a participation client to acknowledge the solicitation and to contribute by submitting the requested response data, which may include photos, text, sensor data, audio, video and the like. The qualifications are verified, the response data is validated, and anonymity and privacy are maintained by associating the mobile device and other pertinent non-identifying information with an encrypted identifier. | 06-16-2011 |
20110143777 | Network-Assisted Optimization of Continual Location Determination - A mobile device that can use both data from a GPS or other GNSS receiver and signals from a wireless network to provide location based services based on the location of the mobile device is controlled at least partly by a locationing resource control module in the wireless network. The module provides network-assisted optimization of utilization of the GPS receiver and other resources by activating the GPS receiver and associated components when fine resolution location data is needed for provision of the location based services, and deactivating the GPS components when coarse resolution will suffice. The selective control of the GPS components is performed in the wireless network in response to receipt from the mobile device of location requisition data, conditions specifying what actions are to be performed by the mobile device, and current location data from the wireless network. The wireless network may also specify and prioritize at least some conditions. | 06-16-2011 |
20110261737 | TRANSMIT AND RECEIVE METHOD FOR A DATA SERVICE - A method includes receiving, at a transmit site, a first stream of packets addressed to an end user device in a first address space. The first stream of packets is encapsulated to form a second stream of packets addressed in a second address space. A first packet of the second stream of packets is assigned to a first radio frequency channel of a plurality of radio frequency channels. A second packet of the second stream of packets is assigned to a second radio frequency channel of the plurality of radio frequency channels. The first packet is transmitted via the first radio frequency channel and, in parallel, the second packet is transmitted via the second radio frequency channel. | 10-27-2011 |
20120264375 | Devices, Systems, and Methods for Sponsored Tethered Connectivity - Devices, systems, and methods are disclosed which relate to establishing an STC connection by tethering a special purpose connected device (SPCD) through a tethering mobile device having network access. The SPCD accesses an application server on the network, and is authenticated before service to the SPCD begins. Once authenticated, the service provider is billed for the STC connection instead of a user of the tethering mobile device. | 10-18-2012 |
20130010951 | SECURE OPEN-AIR COMMUNICATION SYSTEM UTILIZING MULTICHANNEL DECOYED TRANSMISSION - A secure, open-air communication system utilizes a plurality of “decoy” data signals to hide one or more true data signals. The true data signal(s) are channel hopped with the plurality of decoy data signals to form a multi-channel “scrambled” output signal that is thereafter transmitted in an open-air communication system. The greater the number of decoy signals, the greater the security provided to the open-air system. Further security may be provided by encrypting both the true and decoy signals prior to scrambling and/or by utilizing a spatially diverse set of transmitters and receivers. Without the knowledge of the channel assignment(s) for the true signal(s), an eavesdropper may be able to intercept (and, with time, perhaps descramble) the open-air transmitted signals, will not be able to distinguish the true data from the decoys without also knowing the channel assignment(s). | 01-10-2013 |
20130090981 | Location and Time Specific Mobile Participation Platform - A mobile participation platform enables a wireless network operator or third party to solicit response data related to a specific time and location specific event by signaling multiple mobile device users that meet predefined qualifications. The qualifications include presence at the specific location at the specific time, and may include other characteristics, such as prior consent to receive solicitations, and particular device type or data collection functionality. The platform locates mobile devices that may qualify for participation, and generates and transmits a solicitation. Mobile devices receiving the solicitation may activate a participation client to acknowledge the solicitation and to contribute by submitting the requested response data, which may include photos, text, sensor data, audio, video and the like. The qualifications are verified, the response data is validated, and anonymity and privacy are maintained by associating the mobile device and other pertinent non-identifying information with an encrypted identifier. | 04-11-2013 |
20130138745 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION INQUIRIES - A system that incorporates teachings of the present disclosure may include, for example, a processor that can determine a standard inquiry message from an inquiry command captured at a first communication device of a first user. The standard inquiry message can have an importance rating based on an urgency of the inquiry command and based on behavior information associated with the first user. The processor can deliver the standard inquiry message and the importance rating to a communications management agent of a second communication device, where an inquiry indicator accompanies the delivery of the standard inquiry message at the second communication device. Other embodiments are disclosed. | 05-30-2013 |
20130138746 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION EXCHANGES - A system that incorporates teachings of the present disclosure may include, for example, obtaining a message and an importance rating for the message where the importance rating is determined by a second communications management agent of a server based on an analysis of content of the message. The system can access rating feedback information associated with the second communications management agent. A rating accuracy for the importance rating of the particular message can be determined based on the rating feedback information, and the method of providing the message to the intended recipient can be adjusted based on the determined accuracy. Other embodiments are disclosed. | 05-30-2013 |
20130166492 | Digital Rights Management Using a Digital Agent - A method for digital rights management includes a digital agent for contacting a media host. Media content is compared to a user profile and an identification confidence level is assigned to the media based on the comparison. A digital agent contacts a host of the media based on the identification confidence level, the type of media, and the context of the media. The digital agent requests one or more actions of a media host based on user designations concerning information related to the media. The identification confidence level is generated based on a plurality of user characteristic confidence levels which are generated based on media being analyzed. | 06-27-2013 |
20130336297 | INCORPORATION OF MESH BASE STATIONS IN A WIRELESS SYSTEM - Incorporating and operating a mesh base station in a wireless network is described. The mesh base station can utilize common wireless resource allocations as a corresponding wireless base station while transmitting to wireless subscriber stations during the same time period. The mesh base station obtains a data packet from the wireless base station over a backhaul link during a scheduled time period and transmits the data packet to the designated wireless subscriber station during another scheduled time period. The wireless base station and the mesh base station can also receive data packets from wireless subscriber stations during a same time period. A wireless network can be configured with two mesh base stations at an approximate boundary of two adjacent sector coverage areas, where a coverage area is supported by a wireless base station and each mesh base station supports wireless subscriber stations within a coverage radius. | 12-19-2013 |
20140016515 | SYSTEM AND METHOD FOR FULL DUPLEX CANCELLATION - Disclosed herein are systems, methods, and computer-readable storage media for enabling improved cancellation of self-interference in full-duplex communications, or the transmitting and receiving of communications in a single frequency band without requiring time, frequency, or code divisions. The system estimates the signal strength and phase of a self-interference signal, generates a cancellation signal based on this estimate, then uses the cancellation signal to suppress the self-interference before sampling received analog signal. After applying the cancellation signal, the system samples and digitizes the remaining analog signal. The digitized signal is then subjected to additional digital cancellation, allowing for extraction of the desired signal. | 01-16-2014 |
20140016516 | SYSTEM AND METHOD FOR MEDIUM ACCESS CONTROL ENABLING BOTH FULL-DUPLEX AND HALF-DUPLEX COMMUNICATIONS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for a modified MAC protocol which can facilitate communications with both full-duplex and half-duplex devices. A system configured according to the disclosed method can enable communications between an Access Point (AP) and a client in either full duplex or half duplex. The system can similarly enable peer-to-peer communications in both full duplex and half duplex communication modes. | 01-16-2014 |
20140071865 | SYSTEM AND METHOD FOR FULL DUPLEX MAC DESIGNS BASED ON BACKOFF IN FREQUENCY DOMAIN - Disclosed herein are a systems and method for using frequency tones to schedule full-duplex communications between at least two full-duplex communication nodes. Communication nodes having data to transmit send, as part of two contention rounds, two separate and randomly selected frequency tones. In the first contention round, all nodes having data to transmit simultaneously transmit a frequency tone. Based on these first frequency tones, groups of nodes are formed. Each group of nodes in turn transmits a second set of frequency tones, and a schedule of full-duplex communications is created based on the second frequency tones. | 03-13-2014 |
20140078940 | SYSTEM AND METHOD FOR FULL-DUPLEX MEDIA ACCESS CONTROL USING REQUEST-TO-SEND SIGNALING - A system and method for full-duplex communications provided by modifying the Media Access Control sub-layer of communication node protocols. The modification allows communication nodes to communicate with one another in full-duplex, where each node transmits and receives data simultaneously with other nodes in a single frequency. A timing of the simultaneous data transmissions, acknowledgments, and short-interframe-space waiting periods can be determined based on network-allocation-vector data transmitted in association with request-to-send or clear-to-send signals. | 03-20-2014 |
20140146715 | SYSTEM AND METHOD FOR WINDOWING IN FULL-DUPLEX COMMUNICATIONS - A system and method for establishing windows that govern the exchange of acknowledgements in a full-duplex communication. The window is established for two nodes which transmit asymmetric frame sizes in full-duplex mode. The window is related to the size of the asymmetric frames. Frames are exchanged in full-duplex between the two nodes, and the window size is defined as enabling the nodes to send data until the number of unacknowledged frames at the nodes is less than or equal to the window size, at which point acknowledgments are exchanged simultaneously. In sending the acknowledgment, both nodes can send acknowledgments simultaneously in full-duplex in the same frequency bin. | 05-29-2014 |
20140169232 | SYSTEM AND METHOD FOR MAC DESIGN OF A FULL-DUPLEX CENTRALIZED CELLULAR NETWORK - Systems, methods, and computer-readable storage media for scheduling full-duplex communications between half-duplex mobile devices and a full-duplex capable access point. The system receives, within a time window, tones from a plurality of mobile devices, the tones indicating that each device in the plurality of devices are performing one of uploading data and downloading data. The system pairs the plurality of devices into pairs of an uploading device and a downloading device, where the pairing is based on an interference each device in the plurality of devices causes with remaining devices in the plurality of devices, to yield a list of paired devices. Upon communicating the list of paired devices to the plurality of devices, one device of each pair transmits data to the base station in a frequency channel while the other device receives data from the base station in the same frequency. | 06-19-2014 |
20140169233 | SYSTEM AND METHOD FOR FULL-DUPLEX MAC TIMING MODIFICATIONS - A system, method, and computer-readable storage media for reducing monopolization of a frequency channel during full-duplex communications. The MAC layer of governing communications can be modified to reduce likelihood of monopolization by (1) in networks which are exclusively filled with full-duplex devices, configuring non-communicating devices to ignore data collisions of communicating devices, requiring the communicating devices to wait for an standard backoff time after the data transmission is complete; and/or (2) in mixed half-duplex/full-duplex networks, requiring a half-duplex nodes and/or a full- duplex node to wait an extended duration after the data transmission is complete, while the non-communicating devices do not wait an extended duration. | 06-19-2014 |
20140233669 | APPARATUS AND METHOD FOR INTERFERENCE CANCELLATION IN COMMUNICATION SYSTEMS - A system that incorporates the subject disclosure may include, for example, determining channel gains for a group of transmitters based on transmitted training symbols; and performing analog time domain cancellation and digital time domain cancellation responsive to a determination that a total interference does not satisfy a threshold range of the analog-to-digital converter, where the total interference is determined based on the channel gains. Other embodiments are disclosed. | 08-21-2014 |
20140248856 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION INQUIRIES - A system that incorporates teachings of the present disclosure may include, for example, a processor that can determine a standard inquiry message from an inquiry command captured at a first communication device of a first user. The standard inquiry message can have an importance rating based on an urgency of the inquiry command and based on behavior information associated with the first user. The processor can deliver the standard inquiry message and the importance rating to a communications management agent of a second communication device, where an inquiry indicator accompanies the delivery of the standard inquiry message at the second communication device. Other embodiments are disclosed. | 09-04-2014 |
20140258429 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION EXCHANGES - A system that incorporates teachings of the present disclosure may include, for example, obtaining a message and an importance rating for the message where the importance rating is determined by a second communications management agent of a server based on an analysis of content of the message. The system can access rating feedback information associated with the second communications management agent. A rating accuracy for the importance rating of the particular message can be determined based on the rating feedback information, and the method of providing the message to the intended recipient can be adjusted based on the determined accuracy. Other embodiments are disclosed. | 09-11-2014 |
20140269448 | SYSTEM AND METHOD OF ACHIEVING FAIRNESS IN A MIXTURE OF FULL-DUPLEX AND HALF-DUPLEX NODES IN A WIRELESS NETWORK - In a system having a full-duplex node, a half-duplex node and an access point, modifying a parameter such as a backoff timing such that access probabilities are adjusted for at least one of the access point, the full-duplex node and the half-duplex node. Based on channel access achieved after modifying the backoff timing, communication occurs between one of the full-duplex node and a half-duplex node with the access point. The modified backoff timing can operate independently or in coordination with backoff timers from any other nodes within a system. | 09-18-2014 |
20140342697 | Devices, Systems, and Methods for Sponsored Tethered Connectivity - Devices, systems, and methods are disclosed which relate to establishing a sponsored tethered connectivity (STC) connection by tethering a special purpose connected device (SPCD) through a tethering mobile device having network access. The SPCD accesses an application server on the network and is authenticated before service to the SPCD begins. Once authenticated, the service provider is billed for the STC connection instead of a user of the tethering mobile device. | 11-20-2014 |
20140348033 | System and Method for Medium Access Control Enabling Both Full-Duplex and Half-Duplex Communications - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for a modified MAC protocol which can facilitate communications with both full-duplex and half-duplex devices. A system configured according to the disclosed method can enable communications between an Access Point (AP) and a client in either full duplex or half duplex. The system can similarly enable peer-to-peer communications in both full duplex and half duplex communication modes. | 11-27-2014 |
20140369353 | DATA SERVICE INCLUDING CHANNEL GROUP - A method at a cable modem termination system includes dividing a transmit stream into multiple data streams and transmitting the multiple data streams over multiple radio frequency channels of a group of channels. The group of channels supports traffic to a plurality of destinations. Each channel in the group of channels is a downstream channel. | 12-18-2014 |
20150029906 | SYSTEM AND METHOD FOR REDUCING INTER-CELLSITE INTERFERENCE IN FULL-DUPLEX COMMUNICATIONS - Disclosed herein are systems, methods, and computer-readable storage devices for reducing inter-cellsite interference during full-duplex communication. A system receives a channel amplitude and a phase estimate between a first station and a second station, the first station and the second station creating inter-cellsite interference on a channel during full-duplex communications. The system calculates a level of the inter-cellsite interference between the first station and the second station based on the channel amplitude and the phase estimate and generates a cancellation signal based on the inter-cellsite interference. The system then communicates the cancellation signal to the first station for transmission with additional data during additional full-duplex communications. | 01-29-2015 |
20150046986 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR RECOVERING A PASSWORD USING USER-SELECTED THIRD PARTY AUTHORIZATION - A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party. | 02-12-2015 |