Abstract: In a private wireless high-speed data system and data service method, a private pDLR for handling authentication of a terminal entering a private network and call processing is arranged in a private (premises) EV-DO wireless network and session information of the corresponding terminal is received from a data location register (DLR) of the public EV-DO network and is stored in a database of the private pDLR only when the terminal entering the private EV-DO wireless network requests the call connection for the first time, and the call authentication is performed. The call processing is performed using the session information for the corresponding terminal stored in the private pDLR in when the call connection is requested from the terminal entering the private network at least two or more times.
April 19, 2004
Date of Patent:
May 8, 2007
Samsung Electronics Co., Ltd.
Jun-Hyuk Lee, Soo-Hwan Kim, Doo-Yong Yang
Abstract: There is provided a mobile radio communication system which is capable of reducing a group ID in length with respect to the number of mobile stations and realizing efficiency of air resources. Suspend control of mobile stations is performed by notifying not only control information but also transmission/reception state update information for instructing a state [Active/Suspend] in a status update frame set in advance from a base station to the mobile stations using an HS-SCCH. The base station performs the suspend control by sending, in state update information at timing of a state update frame number of a user ID allocated in advance, a group ID of a user ID allocated to mobile stations desired to be made Active in advance.
Abstract: A system for controlling wireless phone usage enables a supervisor to establish user profiles for supervised users of wireless phones across a range of parameters which are stored in a user profile database. Such parameters may include one or more locations at which use of the wireless phone is restricted or permitted. In addition, restrictions on phone use may be provided based upon total phone usage within a specified control period, time periods, dates or days of the week during which phone use is restricted or permitted. One or more lists including numbers that are always-accessible may be provided and one or more lists including numbers that are never-accessible may also be provided. In the event a call does not satisfy predefined criteria, the call is blocked. Predetermined messages may be played to the called or calling party as applicable when a call is blocked.
February 23, 2004
Date of Patent:
March 27, 2007
Boston Communications Group, Inc.
Thomas Erskine, Kenneth W. Sonberg, Luther Rudisill
Abstract: A home or office is remotely monitored by an authorized caller using wireless piconet networks between personal wireless piconet identifier devices worn or carried by particular persons and a remotely accessible access monitor base unit. Persons are monitored by an authorized remote person using a personal wireless piconet identifying device. Each personal wireless piconet identifying device includes a unique code serving as a personal identifier. An access monitoring base unit (e.g., a cordless telephone) includes a piconet network front end which establishes a piconet or scatternet network connection with a wireless piconet entrance/exit monitor, which in turn establishes temporary wireless piconet networks with the personal wireless piconet identifying units. A properly authorized caller may remotely access the access monitor base unit, enter a suitably secure access code, and request and download desired information from the piconet participant database, either in digital or audible form.
April 20, 2004
Date of Patent:
February 13, 2007
Agere Systems Inc.
Joseph M. Cannon, James J. Johanson, Philip D. Mooney
Abstract: The present invention provides a portable telephone set and a communication inquiring method wherein an inquiry regarding a telephone answering service and an inquiry regarding a mail service can be executed by one operation to achieve sufficient convenience to common users. When one of an inquiring operation as to whether or not a terminated telephone answering service call by the telephone answering service function is present and another inquiring operation as to whether or not a terminated mail by the mail service function is present is performed, an inquiring action corresponding to the one operation is executed first, and then an inquiring action corresponding to the other operation is automatically executed.
Abstract: The invention relates to a process for analysing the ambient electromagnetic field in which, to determine the field level of one or more cellular telecommunication networks, the field is analysed at the frequencies of the beacon pathways of base stations of the network or networks, characterized in that it comprises the steps according to which: with the aid of detection means (4), the intensity of the electromagnetic field is measured over time for several frequencies of a frequency range which is sampled, a processing unit (1) determines for each frequency, from the measurements thus performed, at least one characteristic parameter of the electromagnetic field, the processing unit (1) determines from the values of this characteristic parameter, the frequencies which correspond to the signals of the beacon pathways of one or more base stations, by applying a selection criterion based on the statistical properties of the field radiated by this type of station.
Abstract: Terminal authentication and call processing in a private wireless high-speed data system is effected by a private pDLR adapted to effect authentication of a terminal entering the private network and call processing and arranged within a private EV-DO wireless network. Session information of the corresponding terminal is received from a data location register (DLR) of the public EV-DO network only when the terminal entering the private EV-DO wireless network requests the call connection for the first time and is stored in a database of the private pDLR, and the call processing and authentication are performed. The authentication of the corresponding terminal is performed by extracting an International Mobile Station Identity (IMSI) of the terminal included in the session information of the corresponding terminal and determining whether the extracted IMSI is registered in a pDLR database of the private EV-DO wireless network, without needing a separate AN_AAA in the private EV-DO wireless network.
Abstract: In a wireless transceiver device, a connector module has a coupling section with a first pivot part extending along a first pivot axis. A coupling base is formed with a first pivot hole that engages rotatably the first pivot part to permit relative rotation between the coupling base and the connector module about the first pivot axis, and a pair of second pivot holes aligned along a second pivot axis. A wireless transceiver module includes a casing formed with a pair of third pivot holes corresponding respectively to the second pivot holes, and a wire unit to connect electrically the wireless transceiver module to the connector module. The wire unit includes a pair of second pivot parts pivotally retained at aligned pairs of the second and third pivot holes to permit relative rotation between the wireless transceiver module and the coupling base about the second pivot axis.
Abstract: An automatic messaging system, in which, when a person tunes to a particular television station, a video server sends an SMS message indicating the station being watched. The video server could be a host device, such as a cable-TV receiver or satellite receiver that serves the television, or could take other forms.
Abstract: An AMBER alert gateway includes a central telephone number that is configured to receive telephone calls from individuals in response to potential sightings related to AMBER alerts. An interactive voice response system is configured to selectively direct telephone calls that are responsive to a selected AMBER alert to a selected authority who is responsible for the selected AMBER alert. Efficient processing of potential sightings thereby may be provided. Related systems, methods and computer program products also are disclosed.