Abstract:
Systems and methods are disclosed which relate to mitigating the detrimental effects of interference to electronic devices from mobile telephones utilizing any form of time-domain multiplexing technology. A wireless transmitter inside the mobile telephone broadcasts a warning transmission which can be received by affected devices. Once the warning transmission is received by an affected device, the device activates a blanking circuit comprising an actuator and a switch or switches. The switches open for the duration of the interference so that the user does not receive undesired output such as: noise through a speaker, noise through a microphone, or other interference with electrical signals.
Abstract:
Systems and methods are disclosed which relate to mitigating the detrimental effects of interference to electronic devices from mobile telephones utilizing any form of time-domain multiplexing technology. A wireless transmitter inside the mobile telephone broadcasts a warning transmission which can be received by affected devices. Once the warning transmission is received by an affected device, the device activates a blanking circuit comprising an actuator and a switch or switches. The switches open for the duration of the interference so that the user does not receive undesired output such as: noise through a speaker, noise through a microphone, or other interference with electrical signals.
Abstract:
A system and method for merchandizing content to wireless subscribers that have upgraded their mobile station or service is disclosed. The wireless carrier maintains a database of identifying data for content downloaded to subscribers' mobile stations. When a subscriber upgrades his or her mobile station the wireless carrier searches the database for previously downloaded content, identifies the equivalent content that is compatible with the new mobile station and provides the information of available equivalent downloads to the mobile station.
Abstract:
Methods and apparatus for providing personalized content to a user of a wireless network include establishing an anonymous user identifier and delivering the user identifier to a content provider. Based on the user identifier, communication with a predetermined data source is established or predetermined data content is selected. In some embodiments, a device identifier is provided in addition to the user identifier and device specific, personalized content is delivered to the user. In one example, a device identifier and a user identifier are based on a mobile station serial number and a subscriber identity module, respectively, and are used in an HTTP header. The anonymous user identifier can be based on a subscriber identity module (SIM) serial number, or a hash of the SIM serial number so that user information such as a user phone numbers is not available to content providers.
Abstract:
Methods of billing telephone calls in networks that utilize shared modem pools. A request from a user of the network is received along with user identifying data. The user identifying data is correlated with records in a database of user identifying data and if a match is found, the call is passed through the network. The user has then been authenticated as a valid user of the network and can be billed accordingly, even though a random modem in the modem pool was used to place the call. This allows the user to be billed for the call so that the owner of the modem pool is not left financially responsible for the long-distance and/or other toll charges incurred by the user in making the call. The methods also ensure that the modem pool owners can bill for all calls, thereby enhancing the network's revenue stream.
Abstract:
A method and an apparatus provide for controlled access to a shared communication medium. Time slots on a forward channel include information regarding status useful for remote units to determine whether a reverse channel is available for seizure. Additionally, information along the forward channel provides guidance to the remote units to control attempts to seize the reverse channel. In one embodiment a remote unit divides a data package into a plurality of portions and attempts to seize the reverse channel using a single portion of the data package which corresponds to one time slot on the reverse channel. It then waits until it receives notification along the forward channel that the first data portion was successfully received before it attempts to send any of the remainder of its data in consecutive time slots on the reverse channel.
Abstract:
Methods and apparatus for providing personalized content to a user of a wireless network include establishing an anonymous user identifier and delivering the user identifier to a content provider are disclosed. Based on the user identifier, communication with a predetermined data source is established or predetermined data content is selected. In some embodiments, a device identifier is provided in addition to the user identifier and device specific personalized content is delivered to the user. In one example, a device identifier and a user identifier are based on a mobile station serial number and a subscriber identity module (SIM) and are used in an HTTP header. The anonymous user identifier can be based on a SIM serial number, or a hash of the SIM serial number so that user information such as a user phone numbers is not available to content providers.
Abstract:
A system and method for merchandizing content to wireless subscribers that have upgraded their mobile station or service is disclosed. The wireless carrier maintains a database of identifying data for content downloaded to subscribers' mobile stations. When a subscriber upgrades his or her mobile station the wireless carrier searches the database for previously downloaded content, identifies the equivalent content that is compatible with the new mobile station and provides the information of available equivalent downloads to the mobile station.
Abstract:
A system and methods for providing service assurance using real-time monitoring, management and maintenance capabilities to provide customers and vendors with information related to the state of the service. The service assurance domain implements end-to-end functionality with a level of granularity sufficient to diagnose issues to the device and call/session level.
Abstract:
A method for use at a user device of a communications network include utilizing a configuration file obtained from a remote device to configure a communication of an application executed at the user device without requiring user input, the configuration file including logic applied by the application to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting the communication based on one or more parameters representative of the current operational context of the user device. The user device includes a storage module to store a configuration file obtained from a remote device and a processing module to execute an application, wherein during execution the application is to utilize logic of configuration file to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting a communication of the application.