Patent application number | Description | Published |
20130028398 | Systems and Methods for Call Replay - Call replay systems and methods are disclosed. A call replay system can record a telephonic communication and replay the recorded communication upon request. The entire communication may be recorded, or only a portion, such as the most recent few minutes. The entire recording can be transmitted to a requestor, or only a portion. The recording may be altered before it is transmitted to a requestor. Alterations may include actions taken to reduce playback time, such as removing spaces in the recording where no conversation is taking place, or speeding up the recording. Other alterations may include adjusting the sonic characteristics of the recording, translating the recording, or transcribing the recording to create a text version. | 01-31-2013 |
20130030882 | Devices, Systems and Methods for Identifying and/or Billing an Individual in a Vehicle - Devices, systems, and methods are disclosed for identifying a driver versus a passenger within a smart vehicle. This involves a determination of the relative positions of the wireless communication devices within the smart vehicle using near-field communication (NFC) or GPS, AGPS, etc. The wireless communication device detected closest to the driver seat is assumed to be the device owned by the driver. Once identified, the driver can be billed for tolls and other road services, based on the location of the smart vehicle. For instance, as the smart vehicle approaches a toll, a notification can be sent to all of the wireless communication devices. A response from a particular wireless communication device will result in the corresponding user's account being billed for the toll. Further, the smart vehicle can communicate with near-field transceivers placed, for instance, alongside a High-Occupancy Vehicle (HOV) lane. A driver of the vehicle can be billed, fined, or ticketed based upon a determination of an absence of passengers in the smart vehicle. | 01-31-2013 |
20130034254 | System and Method for Enhancing the Inductive Coupling Between a Hearing Aid Operating in Telecoil Mode and a Communications Device - A method and system to optimize the relative position of an inductive field of a hearing aid compatible device and a telecoil of a hearing assistive device, are provided. A Steerable Hearing Aid Compatible Device (SHAD) has a steerable inductive field for locating an inductive field in accordance with the location of a telecoil in the hearing assistive device. A Telecoil Hearing Assistive Device (THAD) has a telecoil and telecoil orientation tag. The location of the telecoil of the THAD is determined with respect to a reference system and this telecoil location information is stored on the telecoil orientation tag as Telecoil Location Information (TLI) and provided to the SHAD. In an exemplary embodiment the telecoil orientation tag may be an RFID tag that is read by a tag reader of the SHAD. The SHAD receives the TLI and generates an inductive field in accordance with the TLI, such as a position that is parallel to the telecoil of the THAD. | 02-07-2013 |
20130035058 | CONTENT MANAGEMENT FOR WIRELESS DIGITAL MEDIA FRAMES - System(s) and method(s) are provided for management of content(s) directed to a wireless digital media frame (WDMF). Management is facilitated by a service provided by a mobile network platform. A service subscription allows a subscriber to establish femto cell coverage in a location that host a subscribed WDMF(s); determine content(s) delivery preferences; and extend the service to a group of auxiliary subscribers. Various sources of content such as a mobile station, a non-mobile device, or a content server associated with a service platform (e.g., an internet service provider) can deliver content(s) and signaling. Integrity of content(s) and signaling is provided through access protocol(s) that exploits credentials associated with a source of content. Content(s) are managed through a content interface that conveys available content(s) in a source of content and an intended WDMF. Various alarm(s) can be delivered to a WDMF as a part of the content management service. | 02-07-2013 |
20130040614 | Voicemail Forwarding Functionality For Communications Networks - A voicemail system includes a memory and a processor. The memory can store data relating to one or more users. An incoming communication can be handled by the voicemail system and provided with functionality based upon a user's preferences, for example. The voicemail system can include functionality to allow a user to convert a voicemail message to a desired format and forward voicemail message, for example as a file, to one or more designated destinations. Methods for forwarding one or messages are also disclosed. | 02-14-2013 |
20130040709 | Devices, Systems and Methods for Identification Through a Mobile Device - Devices, systems and methods are disclosed which relate to a smart cover for a mobile communications device. The smart cover includes a housing plate, a secure element coupled to the housing plate, a transceiver in communication with the secure element, and an antenna coupled to the transceiver. The transceiver and the antenna are coupled to the housing plate as well. The housing plate couples to the mobile communications device to provide protection for electronics in the mobile communications device, to make the mobile communications device more aesthetically pleasing, etc. A user having a mobile communications device with a smart cover may enter secure areas, pay funds from an account, or anything else requiring positive identification. The user holds the mobile communications device up to a smart cover reader. The smart cover reader communicates with the smart to cover to identify the user. The user may allow others to use the smart cover by decoupling the smart cover from the user's mobile communications device and coupling it to the other's mobile communications device. | 02-14-2013 |
20130045755 | COMPENSATION OF PROPAGATION DELAYS OF WIRELESS SIGNALS - Propagation delay offsets of wireless signals are compensated. Compensation is accomplished through determination of an effective wireless signal propagation delay that accounts for signal path delay and propagation delay over the air. Such determination is based at least in part on statistical analysis of accurate location estimates of reference positions throughout a coverage sector or cell, and location estimates of the reference positions generated through time-of-flight (TOF) measurements of wireless signals. Determination of propagation or signal path delay offset also is attained iteratively based at least in part on reference location estimates and TOF location estimates. High-accuracy location estimates such as those obtained through global navigation satellite systems are employed as reference location estimates. Position of probes or wireless beacons, deployed throughout a sector or cell, also are employed as reference locations. Compensation of propagation delay offset improves accuracy of conventional TOF location estimates and radio network performance. | 02-21-2013 |
20130051291 | METHOD FOR FREQUENCY DIVISION DUPLEX COMMUNICATIONS - The high quality PCS communications are enabled in environments where adjacent PCS service bands operate with out-of-band harmonics that would otherwise interfere with the system's operation. The highly bandwidth-efficient communications method combines a form of time division duplex (TDD), frequency division duplex (FDD), time division multiple access (TDMA), orthogonal frequency division multiplexing (OFDM), spatial diversity, and polarization diversity in various unique combinations. The method provides excellent fade resistance. The method enables changing a user's available bandwidth on demand by assigning additional TDMA slots during the user's session. | 02-28-2013 |
20130070593 | Policy-Enabled Dynamic Deep Packet Inspection for Telecommunications Networks - Provided herein is a method including the steps of: establishing at least one policy in a centralized policy management framework (PMF), wherein the policy includes at least one policy condition; monitoring data traffic; determining if the data traffic at least substantially meets one of the policy conditions; sending a trigger to the PMF, if at least one of the policy conditions is at least substantially met; generating an enforcement decision at the PMF, wherein the enforcement decision includes at least one enforcement action; sending the enforcement decision to an enforcement function; and enforcing the enforcement decision. A system for realizing this method is also provided. | 03-21-2013 |
20130070913 | Visual Voicemail Privacy Protection - Visual voicemail privacy protection is implemented by requiring a credential from a user or a user device before providing voicemail data to the user. The credential may be a user name and password combination, a digital certificate, or the like. The user may enable or disable this privacy protection feature at will. A first device being used for visual voicemail services may detect a second device within a defined area around the first device and either enable or disable privacy protection features based on whether the second device is determined to be an authorized or unauthorized device. Privacy protection features may be implemented locally or remotely. | 03-21-2013 |
20130072175 | Controlling Functions of Mobile Communications Devices - Function-control instructions for controlling a function or feature of a device can be created remotely, locally, or both. A device can receive a function-control instruction or a function-control instruction embedded in received content. Additionally, or alternatively, a function-control instruction can be created locally based on user information or calibration information. Function-control instructions can be passed to an instruction execution application that interprets the function-control instruction. The instruction execution application can pass instructions, based on the function-control instruction, to the device for implementation. | 03-21-2013 |
20130073659 | Methods and Systems for Providing Application Level Presence Information in Wireless Communication - Methods and apparatus for determining and maintaining user presence information include capturing user presence data with an application presence server. The application presence server can be configured to update user presence data as a user initiates or exits an application. Applications associated with user presence data are configured to query an application proxy client concerning user presence data of a selected user and, based on a returned user status, deliver, discard, or redirect a message intended for the user. User presence data is stored in a user presence repository and can be provided via Internet-based or other connections to applications executed on external networks. User activity status can be used to select or update user presence data. In some examples, an application server of an external network is configured to receive user presence data from the presence server. | 03-21-2013 |
20130076639 | AUTOMATIC SOFT KEY ADAPTATION WITH LEFT-RIGHT HAND EDGE SENSING - Input/output operation of an electronic device is adapted for left-handed and/or right-handed scenarios. As described herein, sensors (e.g., capacitive, resistive, touch-sensitive, etc.) are applied to respective outer edges of a device to determine whether a device is in a user's left hand and/or right hand. Based on this determination, respective points along the sensors can be mapped to soft keys to automatically optimize input for left-handed and/or right-handed operation. As further described herein, points of contact with an input device such as a touch-screen can be corrected based on whether a user's left hand and/or right hand is holding an associated electronic device. For example, upon identifying contact between a touch-screen and a thumb of a hand being used to hold an associated device, the point of contact can be shifted to compensate for the angle of the thumb with respect to the touch-screen. | 03-28-2013 |
20130079002 | EXCHANGE OF ACCESS CONTROL LISTS TO MANAGE FEMTO CELL COVERAGE - System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Access lists exchange among subscribers that posses provisioned femto access points and elect to share access lists also is provided. Transference of access list(s) among subscribers is secured and based at least in part on subscriber privacy policy. Subscribers can be prompted to opt in access list sharing, or to update privacy policies to allow reciprocate sharing and update privacy settings. Based at least in part on association criteria, component identifies femto access points for a subscriber to access lists with. | 03-28-2013 |
20130079010 | MOBILITY-BASED RESELECTION SCAN SCHEDULING - An architecture is described that can determine a scanning schedule for reselection scanning in connection with a wireless communication network or service. The architecture can monitor various indicia relating to recent movement of user equipment (UE) such as a wireless device, and, based upon such recent movement indicia, construct a mobility pattern for the UE. In addition, based upon the mobility pattern, the architecture can generate a reselection scanning schedule for the UE designed to optimize tradeoffs between battery life and network awareness. | 03-28-2013 |
20130080555 | Mass Multimedia Messaging - A method and system of mass multimedia messaging in a system having a service provider and a plurality of subscriber communication terminals supported by the service provider, wherein at least some of the subscriber terminals have different messaging capabilities and different message format requirements. The method includes adaptation and handling of a mass multimedia message, and mass multimedia message notification. The system uses a retrieval platform and a processing platform. The retrieval platform generates a unique message identifier for the mass multimedia message, and pre-adapts the message into adapted content messages for the terminal types supported by the service provider. The processing platform formats message notifications for the subscriber terminals based on each terminal's messaging capabilities, with each notification containing the unique message identifier. | 03-28-2013 |
20130083761 | INDICATING RADIO BEARER INFORMATION TO NETWORK APPLICATIONS - Providing information related to a quality of a mobile communication link to an internal and/or external application provider is described herein. By way of example, a system can include component(s) that can receive communication link quality information associated with a mobile session, incorporate such information into a data packet, and forward such data packet to an application provider. The system can provide such information for second generation network components, third generation network components, and advanced components compatible with both second and third generation network architectures. | 04-04-2013 |
20130084823 | DUAL MODE SERVICE WIFI ACCESS CONTROL - The provision of dual mode services is facilitated. Access to the dual mode services is controlled by associating a mobile device to an access point. Subscribers are required to provide valid geographical addresses for access points associated with the mobile devices prior to provision of service. Consequently, physical addresses are necessarily available for emergency services (e.g., E911). Mobile devices are restricted to specific access points based upon the access point identifiers automatically provided during initialization of service and maintained for authorization purposes. | 04-04-2013 |
20130084832 | Method and System for Delivering a Voice Mail Notification to a Subscriber Using Cellular Phone Network - A method and system of the present invention delivers a voice mail notification to a subscriber of a voice mail system to indicate that a voice mail message is waiting in the subscriber mailbox. The voice mail system cellular phone network. The voice mail notification typically includes the calling party number and the name of the calling party if available, and an index. This is forwarded through the cellular phone network to the subscriber to indicate that a voice mail message is waiting in a subscriber mailbox. Subscribers can retrieve a specific message from the Voice Mail System. | 04-04-2013 |
20130086190 | Linking Sounds and Emoticons - A method and apparatus for linking sounds and emoticons to allow a recipient of a message containing an emoticon to hear audio associated with the emoticon. In one aspect of the invention, a first user or sender establishes a link or association between the emoticon being sent and a sound file to be associated with that particular emoticon. The emoticon is then transmitted from the sender to the recipient along with the link or association such that the recipient can hear the audio when the emoticon is displayed. | 04-04-2013 |
20130086602 | System and Method for Updating User Availability for Wireless Communication Applications - Systems and methods for monitoring and updating user availability based upon presence and television viewing behavior are described herein. In one embodiment, a presence system is used to detect a user's presence to update the user's availability status. The availability status is then used to update a contact list, voicemail message, and/or busy message. In further embodiments, user preferences are used in combination with presence data to update the user's availability status. In still further embodiments, a user's television viewing behavior is used in combination with the presence data, user preferences, or both to update the user's availability status. Alternative embodiments provide systems and methods in accordance with the present invention for other interactive devices. | 04-04-2013 |
20130088991 | ASYMMETRICAL MULTICARRIER INTERFERENCE AVOIDANCE - Asymmetrical multicarrier interference avoidance in a communication from a network to a subscriber device is provided. The asymmetrical multicarrier interference avoidance technique comprises measuring signal-to-noise ratio interference values and sorting the measured values into two tables for selecting an anchor and a non-anchor frequency carrier pairs. The system is self-tuning based on changes in the network, the subscriber and the surrounding environment. | 04-11-2013 |
20130089084 | LAN Based Wireless Communications System - A method of routing calls from a mobile unit to a destination location can include registering the mobile unit with a wireless adjunct, wherein the wireless adjunct is in communication with a switching unit and a packet based network and is operable to receive data from the switching unit and place the data, in packetized form, on the packet based network. The method can further include responding to a call setup request from the mobile unit and querying a subscriber database to determine if the mobile unit is a resident or a guest. If the mobile unit is a resident, communications data can be routed from the mobile unit through the switching unit to a first destination location. If the mobile unit is a guest, communications data can be routed from the mobile unit through an RF source to a second destination location. | 04-11-2013 |
20130089189 | Systems And Methods For Intelligent Call Transcription - Intelligent call transcript systems and methods are disclosed. An intelligent call transcript system can create a transcript of a telephonic communication and supplement the transcript with additional information automatically or upon request. Additional information may be added when key words are detected, such as adding acronym expansion when an acronym is detected or adding identifying information to an important task when mention of the task is detected. Portions of the transcript may also be sent as messages, text-based or audio, upon detection of key words or at the instruction of a user or device. | 04-11-2013 |
20130090092 | One Button Access to Network Services From a Remote Control Device - Systems and methods of accessing a network-based communication service provide for generating a dialing request at a remote control device based on user input. A dialing signal is transmitted toward a mobile communication device based on the request, where the dialing signal instructs the mobile communication device to access the network-based communication service. Communication services can enable a user to use information retrieval at a network server as well as use number dialing at the network server. In one example, the dialing signal is transmitted according to a Bluetooth standard. | 04-11-2013 |
20130090094 | Application of Dynamic Profiles to the Allocation and Configuration of Network Resources - A service request is received and associated with a subscriber id. Profile information is accessed for the source of the service request. A copy of the profile information is stored in a network element employed by the source of the service request to access the network. | 04-11-2013 |
20130090095 | Operating a Directory Assistance Call Center Based Upon Directory Assistance Database and Caller ID Data - A system and method is provided to operate a directory assistance call center based upon data stored in a directory assistance database and a line information database (LIDB). A caller can access a directory assistance call center to request phone listing information about a particular party. The directory assistance call center can send a query to a directory assistance database for the requested information. Moreover, if the requested information is not found, then the directory assistance call center can send a query to a LIDB or CNAM database provider. The LIDB or CNAM database provider can forward the query to a local LIDB or CNAM database and to other remote LIDB or CNAM database providers to find the requested information. | 04-11-2013 |
20130090149 | AUTO DIMMING THROUGH CAMERA USE - The use of a digital camera in communication with a mobile device to determine the intensity of ambient light conditions is described herein. In one example, the digital camera receives light energy representing ambient light. The intensity of the ambient light is determined and, based upon a comparison of that intensity to a setpoint, the mobile device is reconfigured. In another example, a mobile device is described that uses a digital camera to measure ambient light conditions. The mobile device can be configured in various ways based upon a determination of the intensity and/or wavelengths of the ambient light. | 04-11-2013 |
20130090150 | Near Field Communication Adapters - Devices and systems are disclosed which relate to enabling NFC communication on devices such as an iPhone. A traditional smart card tray is modified to include contact leads from the inside of the smart card tray to an exterior surface of the smart card tray. Exposed contacts on the external surface provide an outside interface for add-ons. An exemplary add-on is an NFC circuit coupled to or embedded within a mobile device skin. The skin fits snugly around a portion of the mobile device, and includes on one surface contact points that line up with the outside interface of the mobile device. The contact points provide electrical communication between NFC circuitry of the mobile device skin and the smart card within the mobile device. When the skin is worn on the mobile device, the mobile device is NFC enabled. When the skin is removed, the NFC is no longer available. | 04-11-2013 |
20130091062 | Secure Mobile-Based Financial Transactions - Devices, systems and methods are disclosed which relate to securing payments from a mobile communications device. In exemplary embodiments, a mobile communications device communicates with a payment server via a point-of-sale device to conduct a transaction. The mobile communications device uses a client payment logic to send payment information to the point-of-sale device. The point-of-sale device uses a vendor payment logic to forward the payment information to the payment server. The payment server verifies the payment information and sends confirmation to the point-of-sale device. | 04-11-2013 |
20130095813 | Remote Activation Of Video Share On Mobile Devices - A method for initiating a video share service of a mobile device based on commands from a remote source. The method includes receiving a request from the remote source to initiate the video share service, authenticating the sender of the request, receiving a command to start the video share service; and transmitting the output of the service. There is also a system configured for receiving a request from a first mobile device to initiate a service from a second mobile device, for authentication of the request, for commanding the second mobile device to start a service under control of the first mobile device, and for delivery of the output of the service. | 04-18-2013 |
20130095828 | Advanced Roaming Controls in Home Location Register - In a wireless telecommunication system, Home Location Register logic generates a subscriber roaming profile for use by a Visitor Location Register by retrieving a subscriber's provisioned profile, retrieving a rule set associated with the subscriber, and applying the rule set to the set of provisioned service features indicated in the provisioned profile to generate a modified profile. The rules can be responsive to one or more of: the identity of the visited network, subscriber preferences, and provisioned features. The rules can be in the form of tables stored in the Home Location Register. | 04-18-2013 |
20130095851 | System and Method for Wireless Communications Activity Within a Predetermined Area and for Generating Messages to Selected Communication Devices - A system and method is disclosed for detecting the presence and level of wireless communications activity within a predetermined area, without disclosing the identity of the wireless users, and for generating a message to certain information and communications devices in response to the detection of a predetermined level of wireless communications activity within the predetermined area. The information detected also may include information relating to the general direction and rate of movement of detected wireless devices. The message generated in response to the detection of wireless communications activity may include wireless messages, including Short Message Service (SMS) messages, to persons desiring or needing to receive such information; messages to public officials and other interested persons; and automatic signals to devices such as computers, computer networks (including the internet and wireless networks), facsimile machines, signs, lights, loudspeakers, and other devices providing information through other communication and information media. | 04-18-2013 |
20130095852 | Methods and Apparatus for Mobile Station Location Estimation - Methods and apparatus for estimating mobile station location include receiving reported signal strengths or other attachment indicator values from a mobile station. The reported signal strengths are compared with characteristic received signal strength values in a coverage area of a mobile network. A mobile switching center determines if a local function is requested and initiates a location estimation process by a mobile location module (MLM). The MLM receives the reported signal strength contours associated with the attachment points. Based on a comparison of the reported attachment indicator values with characteristic values, the MLM provides a mobile location estimate. | 04-18-2013 |
20130120223 | System, Method and Apparatus for Wireless Communication Between a Wireless Mobile Telecommunications Device and a Remote Wireless Display - A method and apparatus provide for removal of a display screen from a wireless device, or, in a different embodiment, provide for a display screen as a separate and additional device that functions in real time in the same way as if the screen were incorporated in the wireless device. This functionality is enabled by a short range wireless connection, such as Bluetooth, between transceivers located in the wireless device and the display screen device. The display screen device allows a user to monitor the associated wireless device without needing to operate the full device. The display screen device may also have control capability for controlling the wireless device. Thus, a user can monitor, and control, a mobile device from a smaller remote display device while being presented with the information that would be displayed on the display screen of the wireless device. | 05-16-2013 |
20130125025 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING REMOTE PARTICIPATION IN MULTI-MEDIA EVENTS - Implementing remote participation in events is provided. The implementation includes providing a view of an instance of an application on endpoint systems in response to a common option received from users of the endpoint systems of the application, receiving a role from each of the users that include an active participant role and a coach role, and receiving performance data from the endpoint systems. The implementation also includes populating the view with virtual representations of the users of each of the endpoint systems having the active participant role. The populating includes positioning the virtual representations at various locations in the view. The various locations are indicative of the performance data and the view represents an event selected as the common option, which includes a simulated exercise course. | 05-16-2013 |
20130129012 | TRANSMITTER DIVERSITY TECHNIQUE FOR WIRELESS COMMUNICATIONS - A simple block coding arrangement is created with symbols transmitted over a plurality of transmit channels, in connection with coding that comprises only simple arithmetic operations, such as negation and conjugation. The diversity created by the transmitter utilizes space diversity and either time or frequency diversity. Space diversity is effected by redundantly transmitting over a plurality of antennas, time diversity is effected by redundantly transmitting at different times, and frequency diversity is effected by redundantly transmitting at different frequencies: Illustratively, using two transmit antennas and a single receive antenna, one of the disclosed embodiments provides the same diversity gain as the maximal-ratio receiver combining (MRRC) scheme with one transmit antenna and two receive antennas. The principles of this invention are applicable to arrangements with more than two antennas, and an illustrative embodiment is disclosed using the same space block code with two transmit and two receive antennas. | 05-23-2013 |
20130136076 | Systems and Methods for File Sharing Through Mobile Devices - Systems and methods are disclosed which relate to the sending and receiving of multimedia files between two devices while connected through a voice call. These devices are free to send any type of file through a direct connection without the need to hang up and call back just to see if the file was sent successfully. These methods work for a plurality of cellular and computer devices connected through a cellular network or other Internet Service Provider. | 05-30-2013 |
20130137390 | EMERGENCY NOTIFICATION SYSTEM FOR A PORTABLE DEVICE - Systems and methods for providing alerts to end users of networked enabled portable devices are provided so that the end users are made aware when broadcast emergency alerts are issued. In various embodiments, a portable device is enabled to receive information about an emergency alert broadcast of which the user should be aware, e.g., from the EAS, and to notify the user of the emergency alert. The user can be automatically taken to the emergency alert information by having the portable device automatically tune to the emergency broadcast information, the user can optionally retrieve the emergency information by tuning to the emergency broadcast channel, and/or the user can otherwise be presented with a reference to the emergency data, such as a link to the information. | 05-30-2013 |
20130137392 | System and Method for Monitoring Usage of a User Device - A server includes a limitation database, a monitor module, and a notification module. The limitations database is configured to store control limits for a user device. The monitor module is in communication with the limitations database. The monitor module is configured to monitor usage of the user device and to determine that one of the control limits for the user device has been exceeded. The notification module is in communication with the monitor module. The notification module is configured to notify a master device that the one of the control limits for the user device has been exceeded, to receive a request to disable the user device, and to disable the user device in response to the request. | 05-30-2013 |
20130137397 | Systems And Methods For Providing A Password Reset Feature - A method for providing a voicemail password reset feature can include receiving a password reset request message from a mobile device at a voicemail system, resetting a current password to a default password at the voicemail system, and sending a response message request to a short message service center. The response message request can include a request to generate a response message that includes the default password. The method can further include generating the response message at the short message center and sending the response message to the mobile device, wherein the response message includes the default password. A system for providing a voicemail password reset feature and a computer-readable medium for initiating a voicemail password reset from a mobile device. | 05-30-2013 |
20130137399 | HOME NETWORKING USING LTE RADIO - A single identity and billing relationship can be employed for multiple UE (user equipment) associated with a subscriber. Specifically, each of the multiple UEs can employ LTE (Long Term Evolution) radio technology to authenticate and register with a femto access point. Further, the transport level billing associated with the multiple UE can be facilitated by the femto access point by employing a femto id (identity) and/or credentials. Moreover, the femto access point can be employed by the multiple UEs as a network hub and can be employed by the UEs to perform authentication to connect to a core network. In addition, the femto access point can determine an authorized IP cloud associated with a registered UE and allow the registered UE to access only the authorized IP cloud. | 05-30-2013 |
20130137406 | Customizable Keypress Tones and Method of Installing - A method for loading a customizable keypress tone package on a desired electronic device includes defining a customizable keypress tone package. The customizable keypress tone package can include one or more customizable keypress tones and can optionally include one or more customizable visual aids. A user requests installation of the defined customizable keypress tone package on the electronic device and the network sends the defined customizable keypress tone package to the electronic device. Once the device receives the package, the device installs the defined customizable keypress tone package on the electronic device. | 05-30-2013 |
20130137428 | MOTION-BASED KINETIC FINGERPRINT RADIO SELECTION - Motion adaptive wireless user equipment (UE) in a wireless network are provided. Kinetic information is leveraged to select a preferred radio (or radio technology) or adapt a reselection scanning interval. This can serve to improve the performance of a UE by reducing the amount of power expended in maintaining an adequate level of connectedness to the wireless network components in the face of UE movement. In a further aspect, kinetic power generators can be employed as a source of UE transit data. Kinetic fingerprints can be compared to UE transit data, e.g., that acquired from a kinetic generator of the UE, to facilitate selection of preferred radios and reselection intervals. In this aspect, radio selection schema and reselection scanning schema can effectively be selected with little to no drain on a UE power source. | 05-30-2013 |
20130150003 | Systems and Methods for Providing Context-Based Voicemail - Voicemail systems and methods for managing voicemail systems are provided herein. The subject voicemail systems provide a plurality voicemail greeting, each of which are associated with a context tag. The context tag can be, for example, a location, a device parameter, an account parameter, a network parameter, or any other contextual information. Upon receipt of a change in a context tag, the voicemail system determines a new voicemail greeting associated with the new context tag and sets the new voicemail greeting to the active voicemail greeting. | 06-13-2013 |
20130150080 | SYSTEM AND METHOD FOR PROVIDING LOCATION INFORMATION FOR A MOBILE HANDSET - Location of a mobile handset is facilitated. A system includes three or more location measurement units that each correspond to a sector of the cell site. The location measurement units transmit location related information to a computation component. The computation component receives the location related information and performs a triangulation calculation on the information to define the location of the mobile handset. | 06-13-2013 |
20130150987 | FITNESS APPLICATIONS OF A WIRELESS DEVICE - Methods and systems for use in connection with a fitness routine and/or an exercise apparatus. In one such method, fitness information is stored in a fitness analysis system and operative communication is established with an exercise apparatus and/or a wireless communication device. A fitness information request is received at the fitness analysis system, and the system sends a setting associated with the exercise apparatus to facilitate a workout using an exercise apparatus. The system receives exercise information corresponding to the workout, and updates fitness information during the workout. The updated fitness information is analyzed to generate associated with the exercise apparatus to facilitate a subsequent workout. | 06-13-2013 |
20130156022 | Digital Surveillance - A method includes establishing a first communication path from an access point to a service assurance platform via a first network. The access point is configured to provide a wireless local area network. The method includes establishing a second communication path from the access point to the service assurance platform via a mobile device coupled to a second network. The second communication path is distinct from the first communication path. The method includes initiating transmission of a message from the access point to the service assurance platform via the mobile device. The message is associated with an issue detected by a device coupled to the wireless local area network. | 06-20-2013 |
20130156048 | Systems, Methods, and Computer Program Products for Automatic Mapping Between Parlay-X Short Messaging Service Message Element XML Encoding and Native SMPP Protocol Data Coding - Systems, methods, and computer program products are for mapping an extensible markup language (XML) encoding declarations to a short message peer-to-peer (SMPP) data coding scheme (DCS) for a mobile-terminated (MT) short messaging service (SMS). An exemplary method includes receiving a message from a short message entity (SME) for delivery to a mobile device. The message includes a payload with at least one character encoded in accordance with a first character encoding scheme. The exemplary method further includes receiving from the SME a second encoding scheme for the message, implementing a mapping table to map the first character encoding scheme to the second character encoding scheme, and performing an encoding transformation of the message from the first character encoding to the second character encoding scheme yielding a modified message comprising the payload of the message encoded in the second character encoding scheme as specified by the SME. | 06-20-2013 |
20130157615 | Systems, Methods, and Computer Program Products for Providing Service Credit to Customer Accounts in a Wireless Communications Service Network - Systems, methods, and computer program products use combinations of international mobile equipment identity (IMEI), international mobile subscriber identity (IMSI), and account information to determine if a customer is eligible for service credit in near real-time. The customer needs an active account prior to inserting a subscriber identity module (SIM) into a device and powering on the device for the system to determine credit eligibility. No further customer action is required. The credit application process determines credit eligibility based upon device credit eligibility, account tenure, and/or credit rules, and applies the credit to the customer's account. The customer may be proactively notified when the credit is applied. The credit and tenure rules may be changed as the industry and business needs change to remain competitive in the industry. The SIM used is configured with software to lock the SIM to the device upon first power-on. | 06-20-2013 |
20130163459 | Adjusting Link Layer Control Frame to Facilitate Data Thoughput - A base station subsystem includes logic to change the modulation and coding scheme for radio communications, and logic to communicate with a switching GSM to cause a change in link layer control frame size to reflect the change in modulation and coding scheme. | 06-27-2013 |
20130165080 | MOBILE OBJECT LOCATION-BASED PRIVACY PROTECTION - A system, method and apparatus for creating and implementing a privacy zone around a mobile object are described herein. A privacy zone is a geographic location proximate to a mobile object in which mobile device functionality is reduced when a mobile device is inside the boundaries of the privacy zone. A locator subsystem tracks the location of the mobile object to update the location of the privacy zone. Further, the locator subsystem monitors for mobile devices that may interface with the privacy zone. Once a mobile device is found to be within a privacy zone, the pre-determined mobile device features will preferably be disabled. | 06-27-2013 |
20130165081 | PRESENCE-BASED NETWORK SERVICE AVAILABILITY ANNOUNCEMENTS - Availability of common features (e.g. device functions and/or subscription plan features) associated with two or more communication devices can be detected, and data indicative of commonly supported features can be provided to at least one of the two communication devices. Disclosed systems can include components that can audit communication devices and communication networks to determine features supported by a communication, and components that can selectively mask unsupported features and/or reveal supported features. | 06-27-2013 |
20130165085 | ASSESSING PERFORMANCE AND QUALITY OF A MOBILE COMMUNICATION SERVICE - A call quality monitoring system allows a user of a mobile device to report on call quality or otherwise provide information relating to the quality of a wireless communication experience. The call quality monitoring system may allow the mobile device user to establish or accept a call placed on the wireless communication network. The call quality monitoring system may provide at least partially-automated user-feedback process for the user to specify information about the quality of the call from a device from which the call was placed or from a device located at or near a location of the call. The call quality monitoring system may collect information provided by the user in association with specifying information about the quality of the call. | 06-27-2013 |
20130165149 | System For Providing Location-Based Services In A Wireless Network, Such As Locating Sets Of Desired Locations - A system and associated method receives a command from a user's mobile device to locate points of interest near the mobile device's location. The points of interest are associated with different, user-identified, point of interest categories. Based at least in part on the mobile device's location, the system substantially simultaneously provides a list of points of interest for at least some of the point of interest categories. | 06-27-2013 |
20130171942 | System and Method for Radio Frequency Intrusion Detection - A system to detect and analyze RF signals utilizes a data structure storing RF signatures indicating characteristics of known authorized and/or unauthorized RF transmissions. When an RF signal is detected, certain analysis characteristics are extracted from the RF signal and analyzed with respect to the stored RF signatures to determine whether the RF transmission is authorized or unauthorized. In the event of an unauthorized RF transmission, the system generates an alarm condition to alert the user to an RF intrusion and may further log data related to the intruder transmission. Known techniques may be used to determine the location of the RF intrusion within a defined area of operations. | 07-04-2013 |
20130171979 | LOCALIZED DETECTION OF MOBILE DEVICES - Various aspects are disclosed herein for detection of mobile devices. Detection of mobile devices can be localized to an environment that is radio frequency enclosed. Within this environment, any packages can be scanned for the presence of mobile devices and for the interrogation of information from such mobile devices, such as the mobile device number and mobile device equipment information. The environment can contain an antenna for communicating with any mobile devices within the environment and a receiver component configured to receive information from any contacted mobile device. Based on this information, a determination can be made whether to validate a contacted mobile device or to take any alternative action. | 07-04-2013 |
20130172028 | Methods for Providing Additional Information for a Mobile-Originated Short Message Service - Methods for appending additional device, location, and/or presence information to a mobile-originated short message are taught herein. One such method for appending additional device information includes receiving a MO short message at a message center. The MO short message includes a content request. Message center sends a query to a subscriber directory for device information corresponding to the device of the requesting subscriber. The subscriber directory searches for the device information and generates a response to be sent to the message center, the response including the device information. The subscriber directory sends the response to the message center, which appends the device information to the MO short message. The message center then sends the short message to the destination, for example, a content provider. Methods for appending location and/or presence information are also taught. | 07-04-2013 |
20130173392 | MEDIATION ROUTER - Advertisement vendors can be dynamically selected in response to a request from a wireless communication device. A mediation router can receive an ad request from a portal interfaced with a wireless device. Specifically, the mediation router analyzes the request and dynamically selects an ad vendor to service the request, based in part on the analysis. The selected ad vendor supplies the ad and the mediation router ensures that the portal receives the ad. The mediation router selects an ad vendor in a variety of ways including, but not limited to, business decision rules or artificial intelligence and/or a combination thereof. The mediation router further employs customer profiles that help vendors target advertisements to specific consumers and wireless devices. | 07-04-2013 |
20130178193 | Devices, Systems And Methods For SMS-Based Location Querying - The disclosure provides devices, systems, and methods for determining a position of a mobile communication device by communicating with the device via a Short Messaging System (SMS). A location query is submitted to an SMS center, which formats a first SMS message for delivery to the device. The first SMS message is delivered to a designated SMS port on the device. A location logic on the device receives the SMS via the SMS port, extracts the location query, and attempts to calculate a location from received satellite signals. The calculated location is submitted back to the SMS server, either to be forwarded to the location server, or to a network element or device that submitted the location query to the SMS center in the first place. Assistance data may additionally be delivered to the mobile communication device via the SMS port. | 07-11-2013 |
20130182564 | Data Link Layer Tunneling Technique for High-Speed Data in a Noisy Wireless Environment - A data link layer tunneling technique improves the throughput of high speed data in noisy wireless environments. Recovering lost frames transmitted between a packet sending unit and a packet receiving unit in a data communications system generally comprises (a) identifying a failure to successfully receive a missed frame at the packet receiving unit; (b) establishing a logical tunnel channel at the packet receiving unit to acknowledge the next successfully received frame; (c) starting a first timer at the packet receiving unit; (c) upon receiving a tunnel establishment request from the packet receiving unit, the packet sending unit resending the missed frame on the logical tunnel channel and starting a second timer; and (d) the packet sending unit resending the missed frame a specified number of times until receiving an acknowledgement from the packet receiving unit. | 07-18-2013 |
20130183941 | Systems And Methods For Consolidating Wireline And Wireless Voicemail Boxes - Voicemail systems can include a memory and a processor. The memory can store data relating to users. An incoming communication can be handled by the voicemail system, forwarded to another voicemail system, provided with functionality based upon a user's preferences, and the like. The voicemail systems can include functionality to allow a user to consolidate voicemail messages and/or calls at one or more designated destinations, for example, a voicemail system and/or a mobile device. | 07-18-2013 |
20130183956 | METHOD FOR MANAGING MULTIPLE RADIO ACCESS BEARERS IN A SINGLE HANDSET - A method for managing a voice call while simultaneously running a data application on a handset having a display includes determining whether the display on the handset is on or off; and if the display is off, then suspending data transfer supporting the data application. Other conditions for suspending data transfer include whether an application is in the foreground of the display; whether the handset is in proximity to a user's head, or if network reception quality exceeds a threshold. | 07-18-2013 |
20130188791 | Dynamic Password Update for Wireless Encryption System - A method and system for dynamically changing password keys in a secured wireless communication system includes initiating a password key change, generating a new password key, embedding the new password key and a password key indicator in a first message, encrypting the first message using an old password key, storing the new password key, sending the formatted encrypted first message over a wireless communication system, receiving a subsequent second message, and decrypting the subsequent second message using the new password key. | 07-25-2013 |
20130189954 | MOBILITY MANAGEMENT MESSAGE ANALYSIS - A system that facilitates detecting, analyzing, and selectively enabling mobility management messages in connection with providing dual mode services comprises a receiver component that receives a mobility management message from an enterprise network. An analysis component communicatively coupled to the receiver component determines a type of the mobility management message and further determines whether or not to allow a mobility management transaction corresponding to the mobility management message based at least in part upon the determined type. | 07-25-2013 |
20130189977 | INDOOR COMPETITIVE SURVEY OF WIRELESS NETWORKS - Network operation data within a confined indoor wireless environment can be determined and utilized for generation of competitive intelligence and strategic network planning. Scanner component(s) survey and compare signals transported in a set of electromagnetic frequency bands, and in accordance with a set of radio technologies associated with competing networks. Collected data can be aggregated and delivered to femto gateway node(s), which can supply the data to an analysis component that generates network operations NetOp intelligence. A report component can manage received and aggregated network operation data and convey a portion thereof to planning tool(s) that can produce competitive intelligence and develop strategic network planning. Planning tool(s) can request specific network operation data or NetOp intelligence. Aggregated network operation data can be employed to identify service provider indoor coverage strengths or weaknesses relative to competitors to focus sales activities related to network services, and network improvement efforts. | 07-25-2013 |
20130190022 | DISPATCH APPLICATION UTILIZING SHORT MESSAGE SERVICE - A dispatch communication and management system method is provided, allowing a dispatcher and remote service technicians to exchange messages over a network in a prescribed format to notify the technicians of new dispatch orders, and to update status information for dispatch orders in corresponding customer service records in a database. | 07-25-2013 |
20130196635 | Client Management of Visual Voicemail Data Communications - Data communications sessions for visual voicemail data communications are terminated under the control of a wireless device's visual voicemail client. In one embodiment, a visual voicemail client can be configured to transmit a request or command to terminate a data communications session immediately upon sending an acknowledgement of receiving voicemail data from a voicemail server. In another embodiment, a visual voicemail client can be configured to transmit a request or command to terminate a data communications session following the expiration of a timer set by the visual voicemail client. Alternatively, a visual voicemail client can be configured to wait for a termination request for command from a voicemail server. | 08-01-2013 |