摘要:
The invention is directed to the optimization of power to increase a coverage area between a mobile device and the wireless communications network. Once it is determined that coverage is to be increased, a scheduling request is communicated to an access component (e.g., base station, eNodeB). The access component then sends a scheduling grant to the mobile device indicating that coverage will be increased. The determination to increase coverage is based on a total time delay of a packet sent from one device to another device, and a quality of the current voice or data session.
摘要:
Systems, methods, and software for operating environmental sensor systems are provided herein. In one example, a method is provided that includes monitoring environmental conditions to detect a trigger condition and transferring an access request for delivery to a data system responsive to the trigger condition. The method also includes receiving a security challenge transferred by the data system, and in response, transferring a security answer for delivery to the data system that includes a hash result generated using one of the security keys, and receiving a security grant transferred by the data system indicating one of the hash results. The method also includes selecting an environmental sensor function based on an association with one of the security keys used to generate the hash result indicated in the security grant, performing the environmental sensor function to obtain sensor data, and transferring the sensor data for delivery to the data system.
摘要:
A Session Initiation Protocol (SIP) system controls an Internet Protocol (IP) communication session between a first communication device and a second communication device. A SIP control server receives a SIP bye message from the first communication device indicating a loss of the IP communication session, and in response, transfers a notification request for the second communication device to a SIP registration server. The SIP registration server processes a SIP registration message from the second communication device, and in response to the notification request and the SIP registration message, transfers a registration notification for the second communication device to the SIP control server. The SIP control server receives the registration notification for the second communication device, and in response, transfers a SIP invite message to re-establish the IP communication session to the first communication device.
摘要:
A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a computer software on a mobile device with different computing devices. A mobile device is used to authenticate a user's access to computer software. The computer software may reside on the mobile device, the user's computing device, or another computing device. A unique identifier is stored in the mobile device associated with the computer software to enable the authentication.
摘要:
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include authorized electronic devices that proxy authentication and registration for one or more unauthenticated electronic devices. The unauthenticated electronic devices connect to the authenticated electronic device over a personal area network and initiate a communication session—via the authenticated electronic devices—with an authentication server located on a secure broadband wireless network that connects the one or more authenticated electronic devices. When the authentication server authorizes the unauthenticated electronic devices to access the secure broadband wireless network, network configuration data is communicated to the unauthenticated electronic devices via the authenticated electronic devices.
摘要:
Portable mobile devices may have ambient light sensors (ALS) capable of modulating the level of backlight on the display of the portable electronic device in various environmental situations. The ALS is capable of receiving an infrared signal or a visible light signal that may then be read to determine an end and a beginning, and parsed to extract the code. The information sent from the infrared or visible light source to the portable electronic device may be handled by the device in various ways including direct processing and display to present the user of the portable electronic device with a coupon, offer, or other benefit. This may occur in several ways including displaying a coupon or an offer, launching a URL or URI, or launching an application on the portable electronic device.
摘要:
A communication system receives a communication for a phone number and determines if the phone number is shared by a wireless phone and a packet appliance. If the phone number is shared, then the communication system determines if the wireless phone is logged-in to a wireless network and if the packet appliance is logged-in to a packet network. If the wireless phone is logged-in, then the communication system transfers the communication to the wireless network for delivery to the wireless phone. If the packet appliance is logged-in, then the communication system transfers the communication to the packet network for delivery to the packet appliance. The communication may be simultaneously transferred to the wireless network and the packet network if the phone number is shared and the wireless phone and the packet appliance are both logged-in.
摘要:
A Session Initiation Protocol (SIP) system controls an Internet Protocol (IP) communication session between a first communication device and a second communication device. A SIP control server receives a SIP bye message from the first communication device indicating a loss of the IP communication session, and in response, transfers a notification request for the second communication device to a SIP registration server. The SIP registration server processes a SIP registration message from the second communication device, and in response to the notification request and the SIP registration message, transfers a registration notification for the second communication device to the SIP control server. The SIP control server receives the registration notification for the second communication device, and in response, transfers a SIP invite message to re-establish the IP communication session to the first communication device.
摘要:
Communication systems, media, and methods for authenticating and registering unauthenticated electronic devices are provided. The communication systems include authorized electronic devices that proxy authentication and registration for one or more unauthenticated electronic devices. The unauthenticated electronic devices connect to the authenticated electronic device over a personal area network and initiate a communication session—via the authenticated electronic devices—with an authentication server located on a secure broadband wireless network that connects the one or more authenticated electronic devices. When the authentication server authorizes the unauthenticated electronic devices to access the secure broadband wireless network, network configuration data is communicated to the unauthenticated electronic devices via the authenticated electronic devices.
摘要:
Systems, methods, and software for operating communication systems and wireless communication devices are provided herein. In one example, a method is provided that includes transferring an access request for delivery to a remote data system, receiving a security challenge transferred by the remote data system, and in response, transferring a security answer for delivery to the remote data system that includes at least one hash result generated in the security portion using at least one of the security keys. The method also includes receiving a security grant transferred by the remote data system indicating one of the hash results, selecting at least one of the transceivers based on an association of the transceivers with one of the security keys used to generate the hash result indicated in the security grant, and transferring the data for delivery to the remote data system over a wireless network associated with the selected transceiver.