Patent application number | Description | Published |
20080261613 | Sparsed U-TDOA Wireless Location Networks - In an overlay, U-TDOA-based, Wireless Location System, LMUs typically co-located with BTSs, are used to collect radio signaling both in the forward and reverse channels. Techniques are used to compensate for sparse LMU deployments where sections of the U-TDOA service area are uplink demodulation or downlink beacon discovery limited. | 10-23-2008 |
20090005061 | LOCATION QUALITY OF SERVICE INDICATOR - A mobile wireless device is configured to provide a location quality of service indicator (QoSI) indicative of the quality of a calculated location estimation for use by a location-based service. The QoSI may be calculated by the device itself or by a server, such as a location enabling server (LES). The QoSI may be used to represent the predicted location accuracy, availability, latency, precision, and/or yield. | 01-01-2009 |
20090170528 | Subscriber Selective, Area-based Service Control - A method for use in controlling a mobile device's access to one or more wireless communications networks (WCNs) with an overlaid wireless location system (WLS) includes monitoring a set of one or more predefined signaling links of at least one WCN, and detecting an event associated with the mobile device. Next, using a low-accuracy location function of the WLS, the system determines that the mobile device is within a defined area of interest and is potentially within a defined quiet zone. Next, using a high-accuracy location function of the WLS, the system determines a precise geographic location of the mobile device and based thereon confirms that the mobile device is within the quiet zone or at least within an area of ambiguity around the quiet zone. Finally, the mobile device's access to the wireless communications network is limited, e.g., according to a pre-defined rule established by the carrier. This approach allows finer definition of the fenced area while also minimizing the load on the high-accuracy location function. The proximity threshold is preferably based on the accuracy of the underlying location technology. | 07-02-2009 |
20100120394 | Femto-Cell Location by Proxy Methods - Location of small, consumer deployed femto-cells cannot be determined by the usual site survey methods. Location of attached mobiles allows for a proxy location of the femto-cell that can then be used for wireless network planning including the provisioning of a calculated default emergency services location for the femto-cell. | 05-13-2010 |
20100120447 | Femto-Cell Location by Direct Methods - Illustrative embodiments of the inventive subject matter described herein include, but are not limited to, the following: a femto-cell device, methods for use by a wireless location system (WLS) in locating a femto-cell device, and a wireless location system having certain features relating to the location of femto-cell devices. A femto-cell device used in a wireless communications system (WCS) includes a location subsystem configured to acquire information identifying the geographic location of the femto-cell device. The device also includes an antenna subsystem, a radio frequency (RF) block coupled to the antenna subsystem, a baseband block coupled to the RF block, and a communications block coupled to the baseband block. In addition, the device is configured to communicate with the WCS, including communicating at least some of the location information to the WCS. | 05-13-2010 |
20100222081 | Location Quality of Service Indicator - A mobile wireless device is configured to provide a location quality of service indicator (QoSI) indicative of the quality of a calculated location estimation for use by a location-based service. The QoSI may be calculated by the device itself or by a server, such as a location enabling server (LES). The QoSI may be used to represent the predicted location accuracy, availability, latency, precision, and/or yield. | 09-02-2010 |
20100227628 | Advanced Triggers for Location-Based Service Applications in a Wireless Location System - Methods and systems are employed by a wireless location system (WLS) for locating a wireless device operating in a geographic area served by a wireless communications system. An exemplary method includes monitoring a set of signaling links of the wireless communications system, and detecting at least one predefined signaling transaction occurring on at least one of the predefined signaling links. Then, in response to the detection of the at least one predefined network transaction, at least one predefined location service is triggered. | 09-09-2010 |
20100273504 | Network Autonomous Wireless Location System - A Network Autonomous Wireless Location System (NAWLS) is designed to allow for precise location of a mobile device (e.g., a cell phone) without interconnection to, and with minimal disruption of, the local wireless communications network. Using distributed radio network monitors (RNM) and a managed network emulator (NE); mobile devices are sampled, acquired or captured. Once triggered by the RNM or NE, an untethered wireless location system (U-WLS) is used to calculate a precise location. The U-WLS; comprising mobile receiver sites, each capable of self location, exchanging information with other components of the NAWLS, and receiving or exchanging signals from the mobile device; utilizes various network-based and handset-based wireless location techniques dependent on the deployed options. In addition, the NAWLS includes data links interconnecting the U-WLS, NE and RNM. | 10-28-2010 |
20110086609 | Remotely Activatable Locator with Voice/Data Relay - A method for use in locating a mobile locator device in a wireless communications network (WCN) includes establishing a three-way call involving the locator device, a caretaker, and an emergency services answering point upon initiation of an emergency services call from the locator device, and providing a location record for the locator device from a database to the answering point while conducting the three-way call. Therefore, in cases of an emergency location where a locator is attached to a disabled subject or object, the locator device allows for extended emergency services calling where a third party such as a care giver, guardian, or custodial organization may be involved in real-time with the automatically located call to provide verbal or textual information to responders. | 04-14-2011 |
20110148699 | Satellite Positioning Receiver and Proxy Location System - To reduce power consumption in a user terminal, especially mobile devices, a system and method are introduced that use terrestrial beacons as a location proxy when satellite positioning signals are not available. The geographic locations of the terrestrial beacons need not be known to use the beacons as a proxy for a satellite positioning signals derived location. | 06-23-2011 |
20110151839 | Location Intelligence Management System - Collection and analysis of network transaction information which includes the mobile device's usage, location, movements coupled with data from non-wireless network sources allow for the automation of analysis for the detection of anti-social behaviors. | 06-23-2011 |
20120032854 | INTERFERENCE DETECTION, CHARACTERIZATION AND LOCATION IN A WIRELESS COMMUNICATIONS OR BROADCAST SYSTEM - A Wide Area Sensor Network (WASN) is disclosed that utilizes wideband software defined radios (SDRs) to monitor RF energy over a wide frequency range, detect when critical frequencies are being jammed or otherwise interfered with, and locate the source of the interference so that the interference can be eliminated. The WASN may use one or more geolocation techniques In addition, the WASN may detect and locate unauthorized transmitters as well as estimate the transmitted power of authorized transmitters to assure they are not transmitting more power than authorized. | 02-09-2012 |
20120154213 | Interference Detection, Characterization and Location in a Wireless Communications or Broadcast System - A Wide Area Sensor Network (WASN) is disclosed that utilizes wideband software defined radios (SDRs) to monitor RF energy over a wide frequency range, detect when critical frequencies are being jammed or otherwise interfered with, and locate the source of the interference so that the interference can be eliminated. The WASN may use one or more geolocation techniques In addition, the WASN may detect and locate unauthorized transmitters as well as estimate the transmitted power of authorized transmitters to assure they are not transmitting more power than authorized. | 06-21-2012 |
20120167207 | Unauthorized Location Detection and Countermeasures - A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network. | 06-28-2012 |
20120194382 | Satellite Positioning Receiver and Proxy Location System - To reduce power consumption in a user terminal, especially mobile devices, a system and method are introduced that use terrestrial beacons as a location proxy when satellite positioning signals are not available. The geographic locations of the terrestrial beacons need not be known to use the beacons as a proxy for a satellite positioning signals derived location. | 08-02-2012 |
20120309341 | REMOTELY ACTIVATABLE LOCATOR WITH BACKCHANNEL - A method for use in providing emergency services to a locator device comprises remotely triggering the locator device. This causes the locator device to employ a first wireless transceiver to communicate with a control center and to employ a second wireless transceiver to initiate an emergency services call to a public services answering point (PSAP). Information relating to the locator device is provided from the control center to the PASP using a backchannel communications channel. | 12-06-2012 |
20130023247 | Location Intelligence Management System - Collection and analysis of network transaction information which includes the mobile device's usage, location, movements coupled with data from non-wireless network sources allow for the automation of analysis for the detection of anti-social or criminal behaviors and tasking of high-accuracy location surveillance. | 01-24-2013 |
20130130710 | Combination of Multiple Baselines for Location Estimation - A method for combining a plurality of individual location measurements, for use in a wireless location system, includes the following steps. A quality metric for a single location estimate is computed along with individual quality metrics and individual weightings for each individual location measurement. In addition, weighting operations incorporating a quality metric for a single location are performed, and the measurement weights are adjusted based on information about co-location groups; and a decision metric and common bias accounting for multiple reference measurements are computed. | 05-23-2013 |
20130163440 | Location of Mobile Devices Served by a Relay Node - A network-based wireless location system (WLS) is configured to locate mobile devices, or user equipment (UE), wirelessly communicating with a relay node (RN). The RN is wirelessly backhauled to a serving donor enhanced NodeB (donor eNB), and the RN has eNB functionality to communicate with the UE and has UE functionality to communicate data from the UE with the donor eNB. The WLS carries out a method including receiving uplink transmissions from the RN, using the uplink transmissions from the RN to compute a location estimate for the RN, and determining a location estimate for the UE based on the location estimate for the RN. | 06-27-2013 |
20130310070 | Advanced Triggers for Location-Based Service Applications in a Wireless Location System - Methods and systems are employed by a wireless location system (WLS) for locating a wireless device operating in a geographic area served by a wireless communications system. An exemplary method includes monitoring a set of signaling links of the wireless communications system, and detecting at least one predefined signaling transaction occurring on at least one of the predefined signaling links. Then, in response to the detection of the at least one predefined network transaction, at least one predefined location service is triggered. | 11-21-2013 |
20140045529 | Location Intelligence Management System for Border Security - Collection and analysis of network transaction information which includes the mobile device's usage, location, movements coupled with data from non-wireless network sources allow for the automation of analysis for the detection of smuggling or other criminal behaviors and tasking of high-accuracy location surveillance. | 02-13-2014 |
20140059655 | Unauthorized Location Detection and Countermeasures - A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network. | 02-27-2014 |
20140080503 | Overlay Network-Based Location of E-UTRAN Devices - In an overlay, network-based, wireless location system, passive network probes and Location Measurement Units, typically co-located with eNodeB's, are used to collect identity information and radio signaling both in the forward and reverse channels for use in power-based, timing-based and/or angle-based positioning methods in Long Term Evolution (LTE) and LTE-Advanced wireless communications networks. | 03-20-2014 |
20140282908 | INTELLIGENT AGENT FOR PRIVACY AND SECURITY - A system and method are provided for use with a mobile device. The system is configurable to detect unauthorized access to onboard sensors or information developed by the sensors or configured by the user. Upon detection, access may be denied or limited according to pre-set rules or user intervention. The rules may consider prior access attempts, time-of-day or current location in the denial or limitation of access. Access limitation can include limiting access to only dithered data or spoofed data in accordance to the rules or user instructions. | 09-18-2014 |
20140342689 | Advanced Triggers for Location-Based Service Applications in a Wireless Location System - Methods and systems are employed by a wireless location system (WLS) for locating a wireless device operating in a geographic area served by a wireless communications system. An exemplary method includes monitoring a set of signaling links of the wireless communications system, and detecting at least one predefined signaling transaction occurring on at least one of the predefined signaling links. Then, in response to the detection of the at least one predefined network transaction, at least one predefined location service is triggered. | 11-20-2014 |
20140344946 | EMISSION CONTROL FOR WIRELESS LOCATION MANAGEMENT - An emission control scheme intended to limit the localization and identification of a wireless device to known friendly wireless networks. Use of an intelligent access control (IAC) on a wireless device allows the user or administrator control over the revealing of the wireless device to any particular network. Passive scanning allows collection of network information while passive device-based location and on-board databased information on the wireless networks allows localization to thwart network spoofing for unfriendly positioning and identification of the wireless device. | 11-20-2014 |
20150065166 | LOCATION SPOOFING DETECTION - A spoofed location detection system using information collected from a radio signal or information from multiple receivers collecting multiple radio signals to validate a location estimate. | 03-05-2015 |
20150067880 | LOCATION SPOOFING FOR PRIVACY AND SECURITY - A sentry system is provided for use within a mobile device to limit access to device location using onboard systems. Access limitation can include access to only spoofed data in accordance to the rules or user instructions. Spoofed data may include refinements to render a location estimate and associated collateral information to be more plausible. | 03-05-2015 |