Patent application number | Description | Published |
20090187972 | METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT - Methods and apparatus for secure over-the-air (OTA) programming, and particularly, activation, of a wireless unit in a particular communications system. The unit stores a stored key having been generated by using a key algorithm (K-algorithm) with an identifier associated with the unit as an input to the K-algorithm. The unit may receive information such as parameters and a verification number from a communications system for the purpose of programming the unit. The verification number is generated by using an authorization algorithm (A-algorithm) having the parameters and a key as A-algorithm inputs. They key is generated by the K-algorithm having the identifier associated with the K-algorithm input. In response to the receipt of the parameters and the verification number, the wireless unit generates a trial verification number by using the A-algorithm with the parameters and the stored key as trial inputs. The unit compares the verification number to the trial verification number for a match. When finding the match, the unit uses the parameters for programming of the unit in the particular communications system. When failing to find the match, the unit fails to use the parameters for the programming. | 07-23-2009 |
20110140962 | Devices, Systems and Methods for Providing Location Information Over a Cellular Network - The disclosure provides devices, systems, and methods for approximating the location of a mobile communication device. A base station transceiver (BTS) broadcasts assistance data across a control channel. The assistance data is received by a mobile communication device in communication with the BTS. The assistance data includes location information for the BTS, and Public Land Mobile Network (PLMN) information associated with the BTS. The assistance data can be broadcast by incorporating these fields in a control channel between the BTS and the mobile communication device. A-GPS devices correlate the received assistance data with a GPS almanac in order to connect to a set of positioning satellites. Devices without a GPS receiver or devices unable to connect to a satellite correlate the received assistance data to a known approximate location, by referring to a database stored on the device or on the network. | 06-16-2011 |
20120184250 | METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT - Systems, methods, and apparatus for facilitating secure over-the-air (OTA) programming are presented herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The device can receive information such as parameter(s) and a verification number from a communications system. The verification number can be generated by using an authorization algorithm (A-algorithm) based on the parameter(s) and a K-algorithm input. The device can generate a trial verification number by using the A-algorithm with the parameter(s) and the key as trial inputs. The device can compare the verification number to the trial verification number, and in response to the verification number being at least similar to the trial verification number, the device can use the parameter(s) for programming of the device. | 07-19-2012 |
20130103290 | TRANSPORTATION ANALYTICS EMPLOYING TIMED FINGERPRINT LOCATION INFORMATION - The disclosed subject matter provides for traffic analysis employing timed fingerprint location information. In an aspect, TFL information can be associated with location characteristics for a UE. These location characteristics can describe the motion of the UE. As such, with proper analysis, the motion of the UE can be correlated to traffic patterns. Transportation analytics can employ TFL information to provide real time or near real time traffic information, forecast traffic conditions, or automate response to traffic conditions based on TFL information. Whereas TFL can provide advantages over other types of location information systems, leveraging TFL information in traffic analysis can reflect these advantages. Further, whereas TFL information can be gathered from nearly all modern and many legacy mobile devices, large volumes of TFL information can be employed in related transportation analytics. | 04-25-2013 |
20130165078 | METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT - Systems, methods, and apparatus for facilitating secure over-the-air (OTA) programming are presented herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The device can receive information such as parameter(s) and a verification number from a communications system. The verification number can be generated by using an authorization algorithm (A-algorithm) based on the parameter(s) and a K-algorithm input. The device can generate a trial verification number by using the A-algorithm with the parameter(s) and the key as trial inputs. The device can compare the verification number to the trial verification number, and in response to the verification number being at least similar to the trial verification number, the device can use the parameter(s) for programming of the device. | 06-27-2013 |
20130244628 | PERSONALIZED ELECTRONIC ADDRESS BOOK - In some embodiments of the present disclosure the location of a mobile device can be used to manage a user's electronic address book and connect a user to various members of a directory. | 09-19-2013 |
20130295884 | METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT - Facilitation of secure over-the-air programming is provided herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The device can receive information such as parameter(s) and a verification number from a communications system. The verification number can be generated by using an authorization algorithm (A-algorithm) based on the parameter(s) and a K-algorithm input. The device can generate a trial verification number by using the A-algorithm with the parameter(s) and the key as trial inputs. The device can compare the verification number to the trial verification number, and in response to the verification number being at least similar to the trial verification number, the device can use the parameter(s) for programming of the device. | 11-07-2013 |
20160033285 | TRANSPORTATION ANALYTICS EMPLOYING TIMED FINGERPRINT LOCATION INFORMATION - The disclosed subject matter provides for traffic analysis employing timed fingerprint location information. In an aspect, TFL information can be associated with location characteristics for a UE. These location characteristics can describe the motion of the UE. As such, with proper analysis, the motion of the UE can be correlated to traffic patterns. Transportation analytics can employ TFL information to provide real time or near real time traffic information, forecast traffic conditions, or automate response to traffic conditions based on TFL information. Whereas TFL can provide advantages over other types of location information systems, leveraging TFL information in traffic analysis can reflect these advantages. Further, whereas TFL information can be gathered from nearly all modern and many legacy mobile devices, large volumes of TFL information can be employed in related transportation analytics. | 02-04-2016 |