Patent application number | Description | Published |
20080247484 | METHOD FOR DATA COMMUNICATION VIA A VOICE CHANNEL OF A WIRELESS COMMUNICATION NETWORK USING CONTINUOUS SIGNAL MODULATION - A system and method for data communication over a cellular communications network that allows the transmission of digital data over a voice channel using a vocoder that monitors parameters of a Levinson Durbin recursion and then uses full rate CELP if the monitored prediction error falls to below a predetermined threshold within a pre-selected number of iterations of the recursion. The system and method encode digital data to be transmitted using a continuous signal modulation technique at a selected bit rate and one or more frequencies that are selected such that the resulting modulated carrier signal is processed by the vocoder using full rate CELP as a result of the monitored prediction error. | 10-09-2008 |
20080255828 | DATA COMMUNICATION VIA A VOICE CHANNEL OF A WIRELESS COMMUNICATION NETWORK USING DISCONTINUITIES - A system and method for data communication over a cellular communications network that allows the transmission of digital data over a voice channel using a vocoder that operates in different modes depending upon characteristics of the inputted signal it receives. To prepare the digital data for transmission, one or more carrier signals are encoded with the digital data using one of a number of modulation schemes that utilize differential phase shift keying to give the modulated carrier signal certain periodicity and energy characteristics that allow it to be transmitted by the vocoder at full rate. The modulation schemes include DPSK using either a single or multiple frequency carriers, combined FSK-DPSK modulation, combined ASK-DPSK, PSK with a phase tracker in the demodulator, as well as continuous signal modulation (ASK or FSK) with inserted discontinuities that can be independent of the digital data. | 10-16-2008 |
20090047929 | METHOD OF AUTHENTICATING A SHORT MESSAGE SERVICE (SMS) MESSAGE - An authentication method that can be used by a telematics-equipped vehicle to authenticate an SMS message and provide additional security features above and beyond those inherent to the SMS protocol. Generally speaking, a call center uses a mathematical function to derive a security code, and then sends an SMS message to a telematics-equipped vehicle that includes information related to the derived security code. The telematics-equipped vehicle can utilize the transmitted information to authenticate the sender of the SMS message and/or its contents. One group of suitable mathematical functions utilizes keyed-hash message authentication codes (HMACs). | 02-19-2009 |
20090088187 | Method and System for Configuring a Telematics Device Using Two-Way Data Messaging - A method and system for configuring a telematics device is constructed so as to use two-way short message service (SMS) to provide improved configuration execution. Mobile identification number (MIN), Mobile Directory Number (MDH), Home System Identification (SID) number, SID/NID pairs, NAI/password for packet data, over the air service provisioning (OTASP) number, and Preferred Roaming List (PRL) flag can be easily updated with no manual or voice channel configuration actions. In addition, other system settings such as button behavior, language, call barring, adding units to hands-free calling, etc. may be updated as well. In an example, a series of binary SMS messages configures the telematics device, with a subset of the messages being used specifically for configuration while the remaining message initiates a packet data session to complete additional configuration. | 04-02-2009 |
20090088910 | Method to Prevent Excessive Current Drain of Telematics Unit Network Access Device - The disclosed examples illustrate a system and method that prevent excessive current drain through the network access device (NAD) of a telematics unit and provide flexible discontinuous-receive management. Normally, when in a Standby State and where communication service is unavailable, the NAD may dissipate current at rate many times more than where communication service is available. A Standby Counter provides the length of the time interval for Standby State or the sleep cycle. Certain of the disclosed examples prevent excessive vehicle battery drain by operating the telematics unit in a first mode wherein a sleep cycle value of the telematics unit is above a first predetermined threshold, and if the communication service is available, operating the telematics unit in a second mode wherein a sleep cycle value is in a range from zero to the first predetermined threshold. | 04-02-2009 |
20090167524 | METHOD FOR REMOTELY CONTROLLING VEHICLE FEATURES - A method and system that enables users to remotely control or manage certain vehicle features, such as emergency flashers or a remote engine start, through the use of a trigger device other than a conventional vehicle key fob. For example, a trigger device like a mobile phone, a personal digital assistant (PDA), or a computer can be used to remotely control or activate select vehicle features. In one embodiment, short message service (SMS) messages are used to send feature commands either directly from the trigger device to the vehicle or via a call center or other message processing entity. | 07-02-2009 |
20090168742 | METHOD FOR CONTROLLING THE TIMING OF WIRELESS COMMUNICATIONS INVOLVING TELEMATICS-EQUIPPED VEHICLES - A timing control method for use with wireless communications involving telematics-equipped vehicles. The timing control method generally determines a temporally-distributed sequence of message response times for a group of telematics-equipped vehicles, and then includes these different response times in wireless messages that are sent to the vehicles. In reply, the vehicles use the various message response times to respond in an apportioned or distributed fashion that generally correlates with the temporally-distributed sequence; instead of all at once. In another disclosed method, the response times are determined at each vehicle itself. The methods can be used for requesting data from vehicles via SMS messages. | 07-02-2009 |
20090172102 | PROCESSING ELECTRONIC MESSAGES WIRELESSLY SENT TO A VEHICLE - A processing system and method for controlling the distribution of certain types of electronic messages, such as SMS messages, instant messages, emails, etc., that are wirelessly sent to a vehicle. In one embodiment, a messaging application installed on a communication device diverts to a call center outgoing messages destined for the vehicle. Once the electronic message is properly checked and authenticated at the call center, it is wirelessly forwarded on to the vehicle where its contents can be displayed to the passengers. By controlling the distribution of these types of electronic messages to the vehicle, the processing method can reduce or mitigate the effects of unauthorized third party communications. | 07-02-2009 |
20090249074 | WIRELESS COMMUNICATION USING COMPACT CERTIFICATES - A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a digital signature and only a portion of the data used in generating the signature. The remaining certificate data is pre-stored on one or more wireless devices for which secure communication is desired. Upon receiving a compact certificate, the wireless device authenticates the certificate using its digital signature along with both the data contained in the certificate and the data pre-stored on the wireless device. This approach permits secure connections to be established between wireless devices using relatively small digital certificates. | 10-01-2009 |
20110038307 | PACKET DATA ORIGINATION FOR VEHICLE COMMUNICATION WITH A CALL CENTER - A system and method for making vehicle originated calls to a telematics service provider or other call center. The method includes identifying a call type associated with a desired wireless communication of speech or data to the call center, and then carrying out one of a number of different call connection processes depending on the call type. For voice channel cellular connections, an in-band modem cellular connection is preferably established in most instances using a connection retry strategy that includes primary, secondary, and possibly tertiary connection attempts each of which utilize at least one of a number of different voice and data call origination processes. The system and method can be carried out in connection with various cellular system technologies, but is especially suited for use with GSM systems. | 02-17-2011 |
20110039586 | SMS ORIGINATION FOR VEHICLE COMMUNICATION WITH A CALL CENTER - A system and method for making vehicle originated calls to a telematics service provider or other call center. The method includes identifying a call type associated with a desired wireless communication of speech or data to the call center, and then carrying out one of a number of different call connection processes depending on the call type. For voice channel cellular connections, an in-band modem cellular connection is preferably established in most instances using a connection retry strategy that includes primary, secondary, and possibly tertiary connection attempts each of which utilize at least one of a number of different voice and data call origination processes. The system and method can be carried out in connection with various cellular system technologies, but is especially suited for use with GSM systems. | 02-17-2011 |
20110244830 | AUTHENTICATING A SHORT MESSAGE SERVICE (SMS) MESSAGE - A vehicle telematics unit or other electronic hardware in a vehicle authenticates an incoming SMS message and provides additional security features above and beyond those inherent to the SMS protocol. A call center uses a mathematical function to derive a security code, and then sends an SMS message to the vehicle. The telematics unit can utilize the transmitted information to authenticate the sender of the SMS message and/or its contents. One group of suitable mathematical functions utilizes keyed-hash message authentication codes (HMACs). | 10-06-2011 |