Openwave Systems, Inc. Patent applications |
Patent application number | Title | Published |
20130198607 | SYSTEMS AND METHODS FOR MODIFYING WEBPAGE DATA - Methods, systems, devices and computer program products for modifying and processing host webpage data are described. The host webpage data intended for receipt by a browser which will interpret the host webpage data and generate a host webpage document therefrom. The host webpage data is modified using second and third webpage data before being sent to the browser. The second webpage data is arranged to cause a frame to be generated within the host webpage document, the generated frame comprising a second webpage document which is associated with a different domain to the host webpage document. Furthermore, the third webpage data is arranged to cause the browser to allow access to functionality of the host webpage document by the second webpage document which would otherwise be blocked. | 08-01-2013 |
20120315922 | WIRELESS USER BASED NOTIFICATION SYSTEM - A group of wireless device users are notified of an event. A location data determination algorithm is provided to a wireless device, where the algorithm determines a frequency at which the device interacts with network elements to determine its location. The location data is stored in a notification server and used to identify a user at a specific location. When a governmental or commercial entity wishes to issue a notification, a message is provided to those users whose location is identified as being in an area defined by the entity. | 12-13-2012 |
20120226552 | MEDIATION SYSTEM AND METHOD TO PROVIDE RELEVANT ADVERTISEMENTS - In one embodiment a method comprises: at an access network, receiving a first request from a request source for an advertisement; requesting request source information related to the request source from an access network knowledge base using identification data of the request source; generating a second request for an advertisement in response to the request source information; and sending the second request to an ad server to obtain a targeted advertisement for the request source based on the request source information. | 09-06-2012 |
20120209990 | METHOD AND SYSTEM FOR PROVIDING A ZERO RATING SERVICE TO AN END-USER DEVICE - Methods and systems for providing a zero rating service to an end-user device are described. In one embodiment, a method for providing a zero rating service to an end-user device involves redirecting a request that is directed to a third party URL from an end-user device to a zero rating URL and performing a URL transformation in response to the redirected request. Other embodiments are also described. | 08-16-2012 |
20120209964 | DYNAMIC INJECTION OF METADATA INTO FLASH VIDEO - A method for dynamically configuring a video stream, including: identifying player control metadata attributes for an input video stream, wherein the input video stream is received from an origin server; storing the identified metadata attributes to a memory device; and dynamically inserting the metadata attributes into an output video stream in real-time. | 08-16-2012 |
20120209872 | USER-CENTRIC IDENTITY MANAGEMENT PROXY FOR PERSONALIZED BROWSING - A user-centric identity management proxy system, including: a personalization engine configured to: receive user-centric information for a user from an identity management engine, wherein the user-centric information identifies the user and is specific to the user; receive context information for a location request by a user device from a content categorization engine, wherein the context information provides detail about the location request that is relatable to the user-centric information; and produce personalized information for the user based on the user-centric information and the context information; and a memory device to store the personalized information. | 08-16-2012 |
20120209778 | MEDIATION SYSTEM AND METHOD FOR RESTRICTED ACCESS ITEM DISTRIBUTION - Mediation systems and methods for restricted access item distribution are disclosed. In an embodiment, a method for facilitating payment from a user device for a restricted access item hosted by a host system is disclosed. In another embodiment, a system for facilitating payment from a user device to for a restricted access item hosted by a host system is disclosed. In another embodiment, a method for providing a mediated marketplace service is disclosed. | 08-16-2012 |
20120207041 | SYSTEM AND METHOD FOR TAGGING CLIENT/NETWORK INFORMATION IN HEADERS OF DATA PACKETS - A system and method for tagging client/network information in mobile data packet traffic intercepts a data packet from a wireless mobile device, which includes client-related information embedded in a header of the data packet, at a mobile access network. The client-related information is then extracted from the data packet for processing. | 08-16-2012 |
20120195413 | TELEPHONY SESSION MANAGEMENT FOR DATA SERVICES - Data services are managed within the context of telephony services. Using the telephony services to manage the data services allows for authentication, authorization, and accounting of the data services within the framework of the telecommunication services. | 08-02-2012 |
20120191876 | METHOD AND SYSTEM FOR POLICY BASED TRANSCODING BROKERING - A method and system for managing the delivery of content over a content network is described. In one embodiment, a method for managing the delivery of content over a content network involves maintaining a transcoding brokerage policy for a transcoding system that includes multiple transcoding engines, where the transcoding brokerage policy defines rules for selecting the transcoding engines, receiving a request for a content element that is stored at a content source, selecting one of the transcoding engines to transcode the requested content element according to the transcoding brokerage policy, and causing the requested content element to be transcoded by the selected transcoding engine. Other embodiments are also described. | 07-26-2012 |
20120191874 | ROUTING OF IP TRAFFIC DIRECTED AT DOMAIN NAMES USING DNS REDIRECTION - A domain name system (DNS) server is disclosed. The DNS server includes: a receiver to receive a DNS query comprising a domain name from a client device, wherein the domain name corresponds to a host server; a modifier to append a domain to an end of the domain name to create a modified domain name; and a mapping engine to compare the modified domain name to a local cache, wherein the local cache comprises a list of domain names, at least some of which are to be routed to an Internet Protocol (IP) address corresponding to an intermediate server. | 07-26-2012 |
20120191805 | METHOD AND TRANSCODING PROXY FOR TRANSCODING A MEDIA STREAM THAT IS DELIVERED TO AN END-USER DEVICE OVER A COMMUNICATIONS NETWORK - Methods and transcoding proxies for transcoding media streams are described. In one embodiment, a method for transcoding a media stream that is delivered to an end-user device over a communications network involves selecting a transcoding technique for the media stream, transcoding a portion of the media stream using the selected transcoding technique, streaming the transcoded portion of the media stream to the end-user device, while the transcoded portion of the media stream is being streamed to the end-user device, detecting a change in a condition of the communications network, selecting a different transcoding technique in response to the change in the condition of the communications network, transcoding a subsequent portion of the media stream using the different transcoding technique, and streaming the transcoded subsequent portion of the media stream to the end-user device. Other embodiments are also described. | 07-26-2012 |
20120191804 | SYSTEM AND METHOD FOR CACHING CONTENT ELEMENTS WITH DYNAMIC URLS - A system and method for allowing requests generated as a result of dynamic URLs to be efficiently looked up in a cache are provided. The system and method involve receiving a request for a content element, the request being generated from a dynamic URL. A static content element identifier is generated from the request. In an embodiment, the static content element identifier includes only the content identification parameters and the dynamic parameters are removed. The static content element identifier is then used to determine whether the content element is in the cache. | 07-26-2012 |
20120165044 | ANONYMOUS POSITIONING OF A WIRELESS UNIT FOR DATA NETWORK LOCATION-BASED SERVICES - This invention concerns a process and a system for providing location information for a wireless unit in a wireless network to a location-based service provider, using a data network. In particular, the location information is provided to the location-based service provider without necessarily providing the identity of wireless unit, e.g., a subscriber's wireless identification number, to the service provider. In this regard, a subscriber's identification number may be hidden from the positioning service provider via a process in which an alias is used instead of the subscriber's normal identity. The subscriber's number may further be concealed from the service provider via a process wherein encrypted information is used instead of the subscriber's normal identity. | 06-28-2012 |
20120084460 | METHOD AND SYSTEM FOR DYNAMIC TRAFFIC STEERING - A method and system for dynamic traffic steering is described. In one embodiment, a method for dynamic traffic steering involves receiving a request for content at a steering component, comparing information in the request with steering criteria in the steering component, steering the request based on the comparing, and continuously updating the steering criteria based on requests that are subsequently received at the steering component. Other embodiments are also described. | 04-05-2012 |
20120084423 | METHOD AND SYSTEM FOR DOMAIN BASED DYNAMIC TRAFFIC STEERING - A method and system for domain based dynamic traffic steering is described. In one embodiment, a method for domain based dynamic traffic steering involves comparing a domain name with a domain whitelist and a domain blacklist of a packet modifying entity, and if the domain name matches the domain whitelist or the domain blacklist of the packet modifying entity, updating a corresponding Internet Protocol (IP) whitelist or IP blacklist of the packet modifying entity to include an IP address of the domain name. Other embodiments are also described. | 04-05-2012 |
20120084382 | ON-THE-FLY REVERSE MAPPING - In accordance with the invention, embodiments of a DNS server, a DNS proxy process, and an intermediate server (IMS) are described. The DNS server, DNS proxy process, and intermediate server (IMS) described herein utilize a destination IP address for a destination device in on-the-fly reverse mapping operations in order to accurately provide a hostname originally requested by the client device. | 04-05-2012 |
20120079055 | REVERSE DNS LOOKUP WITH MODIFIED REVERSE MAPPINGS - In accordance with the invention, embodiments of a DNS server, a DNS proxy process, and an intermediate server (IMS) are described. The DNS server, DNS proxy process, and intermediate server (IMS) described herein utilize a source IP address for a client device, in combination with a destination IP address for a host server, in reverse mapping operations in order to accurately provide a hostname originally requested by the client device. | 03-29-2012 |
20120078706 | LOCATION PREDICTION PROTOCOL (LPP) - In accordance with the invention, embodiments of an ad placement device are described. The ad placement engine calculates a probability parameter that is indicative of a user's likelihood of making a purchase in response to a mobile advertisement. The probability parameter is calculated based on a variety of parameters. | 03-29-2012 |
20120047247 | SYSTEM AND METHOD FOR ALLOWING DATA TRAFFIC SEARCH - A system and method for allowing data traffic search involves capturing data traffic to and from a user device on at least one communication path between the user device and end devices and indexing data of the captured data traffic based on parameters, wherein the data of the captured data includes data of different types of data traffic with respect to at least one of protocol and application. As a result, the system and method allows a user to search the indexed data for the different types of data traffic to and from the user device. | 02-23-2012 |
20120044807 | METHOD AND SYSTEM FOR ENFORCING TRAFFIC POLICIES AT A POLICY ENFORCEMENT POINT IN A WIRELESS COMMUNICATIONS NETWORK - Embodiments of a method and system for enforcing a traffic policy at a Policy Enforcement Point (PEP) that controls the flow of traffic in a wireless communications network are described. In one embodiment, a method involves learning the topology of the wireless communications network, defining a virtual PEP (VPEP) within the topology of the wireless communications network, the VPEP comprising a location component that is remote from the PEP, associating a traffic policy with the VPEP, associating a traffic flow with the VPEP if the traffic flow has a characteristic that corresponds to the location component of the VPEP, and enforcing, at the PEP, the traffic policy that is associated with the VPEP against the traffic flow. | 02-23-2012 |
20120030359 | SYSTEM AND METHOD FOR PROVIDING NETWORK RESOURCE IDENTIFIER SHORTENING SERVICE TO COMPUTING DEVICES - A system and method for providing shortened network resource identifier service to computing devices uses a link translating technique to replace at least some of the links in network resources requested by the computing devices using shortened network resource identifiers so that network activities of the computing devices can be monitored or controlled. | 02-02-2012 |
20120030305 | METHOD AND SYSTEM FOR DELIVERING EMBEDDED OBJECTS IN A WEBPAGE TO A USER AGENT USING A NETWORK DEVICE - A method and system for delivering embedded objects in a webpage to a user agent using a network device is described. In one embodiment, a method for delivering embedded objects in a webpage to a user agent using a network device is described. The method for delivering embedded objects in a webpage to a user agent using a network device involves intercepting a webpage at a network device, where the webpage is transmitted from a web server and is destined to a user agent, scanning the webpage at the network device to discover links that are embedded in the webpage, obtaining an object that is identified by one of the links at the network device, and transmitting the object from the network device to the user agent as soon as the object is obtained at the network device. Other embodiments are also described. | 02-02-2012 |
20120030294 | METHOD AND SYSTEM FOR LINK-TRIGGERED LINK-TRANSLATING PROXYING - A method for obtaining web content at an Internet-connected device from an Internet accessible content source, wherein the device connects to the Internet via an access network, is described. The method involves obtaining, at the device, a link to a content element that is stored at the content source, wherein the link includes a pointer to a link-translating proxy server (LTPS) that is located outside of the access network and additional information that corresponds to a Universal Resource Locator (URL) for the content element. The method also involves initiating, from the device, a request for the content element that is associated with the link, the request being directed to the content source through the LTPS, and receiving, at the device, a response that includes the requested content element, the response passing through the LTPS. | 02-02-2012 |
20120028650 | SYSTEM AND METHOD FOR PREDICTING FUTURE LOCATIONS OF MOBILE COMMUNICATION DEVICES USING CONNECTION-RELATED DATA OF A MOBILE ACCESS NETWORK - A system and method for predicting future locations of mobile communication devices utilizes connection-related data from a mobile access network supporting the mobile communication devices to determine latest locations of the mobile communication devices, which are used to predict the future locations of the mobile communication devices. In addition to the determined locations of the mobile communication devices, carrier-provided location predictive indicators and/or non-carrier location predictive indicators may be used to improve the accuracy of the predicted future locations. | 02-02-2012 |
20120021772 | SYSTEM AND METHOD FOR SENDING LOCATION-BASED MESSAGES USING DATA TRANSMITTED BETWEEN BASE STATIONS AND MOBILE SWITCHING DEVICES - A system and method for sending location-based messages to mobile communication devices utilizes communications between base stations and mobile switching devices of a mobile access network to calculate the latest locations of the mobile communication devices supported by the mobile access network. The calculated locations of the mobile communication devices are maintained as location data in at least one location database, as well as information about the mobile communication devices. The location data and the information about the mobile communication devices are used to send the location-based messages to the mobile communication devices located within a specified geographical area. | 01-26-2012 |
20110314071 | METADATA-BASED DATA ACCESS AND CONTROL - Data access is controlled using metadata in the data being stored. As consistent with various example embodiments, data is stored on behalf of one or more of a multitude of disparate users and/or applications using the data, based upon metadata in the data itself and storage rules for the metadata. In one implementation, a rules-based storage and access system retrieves storage rules based upon metadata in received data, and executes the storage rules to select a file system in which to store the received data, from a plurality of file systems having different data retrieval characteristics such as speed, security and quality. | 12-22-2011 |
20110203006 | METHOD AND SYSTEM FOR DELIVERING CLOSED-AUDIENCE CONTENT TO A CLOSED MOBILE AUDIENCE - A method and system for delivering closed-audience content to a closed mobile audience is described. In one embodiment, a method for delivering closed-audience content to a closed mobile audience is described. The method for delivering closed-audience content to a closed mobile audience involves obtaining closed-audience content, establishing a closed mobile audience, identifying a mobile user or a mobile device as being part of the closed mobile audience, and delivering the closed-audience content to the mobile user or the mobile device. Other embodiments are also described. | 08-18-2011 |
20110202654 | CONFIGURABLE CONTENT INJECTION SERVICE SYSTEM - A configurable content injection service system and method of injecting a new content into data of a data traffic between a data source and a user device uses configuration information set by one or more content injection service users. The configuration information includes at least one condition related to the data traffic between the data source and the user device to inject the new content if the at least one condition is satisfied. | 08-18-2011 |
20110202589 | SCRIPTING/PROXY SYSTEMS, METHODS AND CIRCUIT ARRANGEMENTS - Techniques for providing a proxy service are disclosed. In an embodiment, a proxy system includes a proxy service module and a scripting engine. The proxy service module is configured to intercept and process messages that travel between user devices and the Internet and the scripting engine is in communication with the proxy service module and is configured to manage a plurality of scripts that are written in one or more scripting languages. The proxy service module is configured to intercept a message that travels to the proxy service module and that is related to a user device, to associate a script with the intercepted message, and to cause the script to be executed at one of the user device, the proxy system, or a system that is external to the user device and the proxy system depending on the function associated with the script. | 08-18-2011 |
20110202409 | USING LANGUAGE INSERTION TO PROVIDE TARGETED ADVERTISEMENTS - A system and method for providing targeted advertisements are provided. The system and method involve receiving a request message from a request source for a content element hosted by a content source. A request description is inserted into the request message for use in selecting a targeted advertisement, whereby the request description contains information about the request source. The request description is sent to the content source, and after receiving a response message that includes a targeted advertisement that was selected based on the request description, the response message is sent to the request source. | 08-18-2011 |
20110201351 | SYSTEM AND METHOD FOR PROVIDING MOBILE USER CLASSFICATION INFORMATION FOR A TARGET GEOGRAPHICAL AREA - A system and method for providing mobile user classification information for a target geographical area uses location information of mobile communication devices to detect the mobile communication devices within the target geographical area at a specified time and then further uses at least one of the location information of the detected mobile communication devices and Internet session information of the detected mobile communication devices to produce the mobile user classification information of the mobile communication devices within the target geographical area that are classified in one or more classifications. | 08-18-2011 |
20110142024 | SYSTEM AND METHOD FOR ROUTING A WIRELESS CONNECTION IN A HYBRID NETWORK - Embodiments of the present invention are directed to systems and methods for establishing and/or routing wireless data and/or voice connections across a hybrid network based upon a user's selection or preference. In some embodiments, a method for routing a wireless connection across a hybrid network comprises allowing a user to select a routing preference, routing the wireless connection via a short-haul communications network if the routing preference indicates a short-haul communications network choice, and routing the wireless connection via a cellular network if the routing preference indicates a cellular network choice. In other embodiments, the present invention provides a system and method for learning the user's data, cellular, and/or VoIP access habits in order to optimize the user's experience. In yet other embodiments, the present invention allows carriers to comply with CALEA and E911 rules by identifying the location of hybrid devices within the hybrid network. | 06-16-2011 |
20110105146 | BACK-CHANNELED PACKETED DATA - Certain embodiments configure wireless-technology equipment, including a processor node, to store and access back channel data for the purpose of controlling aspects of mobile terminals. Within a wireless communication network, a memory circuit stores: on behalf of an operator for the communication network, user profiles that include wireless network subscriber data useful for providing network access to user terminals associated with the subscriber data; and on behalf of a third party, communication rules relevant to a geographic region of service provided by the communication network (optionally, the third party communication rules are implemented pursuant to three-way agreements between the subscriber, the operator of the wireless network and the third party). The processor node is configured within the wireless-technology equipment for assimilating current location data regarding the user terminals with the user profiles, and using the assimilated current location data to facilitate communication for the mobile terminals, via the communication rules relevant to the geographic region, over the communication network. The communication rules can be used to dictate how certain of the mobile terminals can operate, e.g., in terms of operable features, applications and access to the network. | 05-05-2011 |
20110105145 | BACK-CHANNELED PACKETED DATA - Consistent with one aspect, location-based mobile-terminal data is processed within or involving the wireless portion of such communication networks, and methods and apparatuses process the location-based mobile-terminal data based on information provided from outside the relationship of the network operator and the user. The location-based mobile-terminal data is extracted and processed by a node in the wireless portion of the communication network based on a specified set of rules. Other sources of location-based information originate from within the communication network itself including, but not limited to, location information regarding the nodes themselves. | 05-05-2011 |
20110105130 | BACK-CHANNELED PACKETED DATA - Aspects of the disclosure are directed to various embodiments in which a processor node in the wireless network uses a caller's location-based data, alone or in combination with portions of the user profile, to provide information to the telephony terminal (an agent thereof) being called. In one embodiment, the wireless-technology equipment includes a processor node (e.g., processor module, circuit, and/or stored set of executable processor instructions) that is configured to access a memory circuit that stores on behalf of an operator for the communication network, user profiles that include wireless network subscriber data useful for providing network access to user mobile terminals associated with the subscriber data, and that also stores, on behalf of a third party, communication rules relevant to geographic regions of service provided by the communication network and relevant to designated telephony terminals called by the user mobile terminals. The processor node is configured within the wireless-technology equipment for assimilating current location data regarding the user terminals with the user profiles, and using the assimilated current location data and the communication rules to control access or effect communication with the designated telephony terminals through the network communication. | 05-05-2011 |
20110105084 | BACK-CHANNELED PACKETED DATA - According to certain aspects, a processor node provides controls on access to communications channels according to government-related standards which are similarly stored and used as mobile-terminal profiles. Where government employees are prohibited from keyboarding/texting on a mobile terminal while driving (as recently enacted in one federal level), the processor node controls the communications to block/monitor such keyboarding/texting while the mobile terminal is being track using the user's mobile-identification information with the location-access point as part of a mandatory government-based authorization subscriber protocol and/or another authorized procedure. In other government-related control instances, when automobile accidents are expected to escalate, government-related controls can similarly discriminate access of some or all types of communications (as discussed above) based on one or more of the following: the location-data indicating movement in a vehicle moving at all, on specific highways, or at specific speeds; alone or in combination with: the user's age as extracted and assumed from the subscriber data for the mobile equipment, the time (e.g., after curfew), or the day (e.g., New Year's Eve). | 05-05-2011 |
20110103358 | BACK-CHANNELED PACKETED DATA - The disclosure concerns a communication network having a wireless network that provides access of back channel data to third parties. A processor node in the wireless network uses and processes location-based mobile-terminal data as geographically-tagged information sources for processing and analysis by third parties. In some configurations, the processor node receives feedback from the third parties, and/or input from other resources and databases, for adaptively re-processing the data previously provided to the third parties. | 05-05-2011 |
20110103357 | BACK-CHANNELED PACKETED DATA - The disclosure is directed to mobile terminals, their circuits, components, CPU-programming instructions and methods of implementing the mobile terminals so that they behave in accordance with one or more of the above-characterized manners. For example, the mobile terminal used in such a wireless network includes a memory circuit that stores: on behalf of an operator for the communication network, user identity information relating to wireless network subscriber data useful for providing network access; and on behalf of a third party, an executable set of communication rules relevant to a geographic region of service provided by the communication network. The mobile terminal also includes a mobile-terminal processor node which is configured in response to a communication from the wireless-technology equipment, indicating that the current location data for the mobile terminal permits the mobile terminal to alter normal rights for communicating with the user over the network while the mobile terminal is in the geographic region. | 05-05-2011 |
20110103356 | BACK-CHANNELED PACKETED DATA - Consistent with one aspect, location-based mobile-terminal data is processed within or involving the wireless portion of such communication networks, and methods and apparatuses process the location-based mobile-terminal data based on information provided from outside the relationship of the network operator and the user. The location-based mobile-terminal data is extracted and processed by a node in the wireless portion of the communication network based on a specified set of rules. Other sources of location-based information originate from within the communication network itself including, but not limited to, location information regarding the nodes themselves. | 05-05-2011 |
20110082946 | MANAGING NETWORK TRAFFIC USING INTERMEDIATE FLOW CONTROL - A technique for controlling the streaming of content through a network is disclosed. The technique involves changing the rate at which content chunks are sent from an intermediate network device in order to cause a client to request content chunks that are encoded at a different bit rate. For example, an intermediate network device can reduce the rate at which content chunks are sent to a client in order to cause the client to adapt to the reduced flow rate by requesting content chunks that are encoded at a lower bit rate. Causing a client to request content chunks that are encoded at a lower bit rate can reduce the bandwidth demand in a wireless communications network. | 04-07-2011 |
20110082924 | MANAGING NETWORK TRAFFIC BY EDITING A MANIFEST FILE - A technique for controlling the streaming of content through a network is disclosed. In an embodiment, the technique involves editing the manifest file that is used to implement an HTTP adaptive bit rate streaming protocol. For example, a manifest file is received at an intermediate network device in response to a request from a client for a content element, the manifest file is then edited at the intermediate network device, and then the edited manifest file is sent to the client. In an embodiment, editing the manifest file involves deleting and/or inserting a URI within the manifest file. | 04-07-2011 |
20110075676 | METHOD AND SYSTEM FOR MANAGING MULTIMEDIA MESSAGES USING A MESSAGE INTERMEDIATION MODULE - A system and method for managing multimedia messaging is described. A system includes a messaging intermediation module having, a sender-side interface configured to communicate a multimedia message between the messaging intermediation module and a data gateway of a multimedia messaging system, a recipient-side interface configured to communicate the multimedia message between the messaging intermediation module, an Internet gateway, a message store and forward (MSF) server, and another messaging intermediation module, a message storage module configured to store the multimedia message for forwarding to the Internet gateway, the MSF server, and the other messaging intermediation module, and a workflow engine configured to process the multimedia message. In response to the processing, the workflow engine forwards the multimedia message to the Internet gateway, forwards the multimedia message to the MSF server, or forwards the multimedia message to the other messaging intermediation module. Other embodiments are also described. | 03-31-2011 |
20110034185 | NETWORK-BASED IMPLEMENTATION OF VELOCITY CONTROLS FOR A MOBILE COMMUNICATION DEVICE - A communication network includes a wireless network, a location platform, and a network component. The wireless network includes a base station to send data to and receive data from a mobile station via radio frequency communication signals. The location platform is operably coupled to the wireless network. In one embodiment, the location platform computes a velocity of the mobile station in response to a velocity request. The network component is operably coupled between the wireless network and the location platform. In one embodiment, the network component compares the computed velocity of the mobile station with a velocity threshold in response to an attempted communication involving the mobile station. The network component also implements a restrictive action for the attempted communication involving the mobile station in response to a determination that the computed velocity exceeds the velocity threshold. | 02-10-2011 |
20100211470 | SYSTEM AND METHOD FOR CONTROLLING FINANCIAL TRANSACTIONS OVER A WIRELESS NETWORK - A system and method for controlling financial transactions is disclosed. A customer, using a wireless device, identifies a point of sale and the amount of a transaction at that point of sale is first communicated to a central service and then transmitted to the wireless device for display at the wireless device. The customer can either accept the transaction amount to complete the transaction or reject the amount to cancel the transaction. The customer may have to enter a password or personal identification number to verify the authorization to use the wireless financial system. The customer is billed for the transaction via credit, debit, ATM or other methods, such as the wireless carrier or an internet provider. | 08-19-2010 |
20100138423 | CONTENT DISCOVERY USING GATEWAY BROWSING DATA - An internet browsing gateway is utilized to locate mobile web content and improve search capabilities for wireless devices. Mobile browsing data is logged as web pages are requested from and returned to wireless devices associated with the same wireless network. An index server continually updates search indexes in real time as users request searches and search results are returned. As a result, the mobile content that is discovered becomes more relevant for users of the same wireless network or mobile carrier. In other words, the search results are more localized in accordance with the location of the wireless network that services the mobile users within a specific geographic region. When a web search is requested from a wireless device, the index server queries the search indexes. The search results are ranked using a search algorithm that incorporates the browsing data to improve the accuracy and relevance of searches. | 06-03-2010 |
20100042739 | CONFIRMATION OF DELIVERY OF CONTENT TO AN HTTP/TCP DEVICE - A method to confirm delivery of data to a receiving device via a sending socket is disclosed. One embodiment of the method comprises determining when a predetermined amount of data has been removed from a send buffer of the sending socket and sending a confirmation when the predetermined amount of data has been removed from the send buffer. Other embodiments are described and claimed. | 02-18-2010 |
20080301235 | METHOD, APPARATUS AND SYSTEM FOR DETECTING UNWANTED DIGITAL CONTENT DELIVERED TO A MAIL BOX - Email messages stored on a mail server are filtered to identify the email messages that contain unwanted content. The mail server receives incoming email messages over a network. A content filter performs an initial scan to identify the incoming email messages that contain unwanted content by determining whether signatures associated with the email messages are included on a list of signatures that identify email messages that are known to include unwanted content. The email messages that are not identified as containing unwanted content are forwarded to appropriate mail boxes on the mail server. Multiple scanning threads perform a subsequent scan of the email messages in the mail boxes to identify those email messages containing unwanted content that were not identified by the initial scan. The subsequent scan determines whether signatures associated with the email messages in the mail boxes are included in an updated list of the signatures. | 12-04-2008 |