US20140273911A1 - Local network alert system for mobile devices using an ims session and wi-fi access point - Google Patents
Local network alert system for mobile devices using an ims session and wi-fi access point Download PDFInfo
- Publication number
- US20140273911A1 US20140273911A1 US13/912,127 US201313912127A US2014273911A1 US 20140273911 A1 US20140273911 A1 US 20140273911A1 US 201313912127 A US201313912127 A US 201313912127A US 2014273911 A1 US2014273911 A1 US 2014273911A1
- Authority
- US
- United States
- Prior art keywords
- alert
- ims
- message
- target area
- access points
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H04W4/22—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1023—Media gateways
- H04L65/103—Media gateways in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
- H04W64/003—Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Abstract
Description
- This application claims the benefit of U.S. Provisional Application No. 61/801,200, entitled “LOCAL NETWORK ALERT SYSTEM FOR MOBILE DEVICES USING AN IMS SESSION AND WI-FI ACCESS POINT,” filed Mar. 15, 2013.
- Mobile devices, such as wireless and cordless phones, handheld computers, smartphones, and media players, among others, have become ubiquitous. Most mobile devices, if not all, have messaging capabilities, such as text messaging via SMS (Short Message Service) and multimedia messaging via MMS (Multimedia Message Service). SMS and MMS have become popular modes of transmitting information to mobile device users. In addition, some fixed devices now share mobile device platforms and services. In particular, Unlicensed Mobile Access (UMA) devices, which may be fixed and replicate traditional “landline” operate on both cellular and IP-based networks.
- In an emergency situation, such as a terror attack or a natural disaster (e.g., hurricane, tornado, and earthquake), it may be desirable to alert members of the public located in the particular area of the emergency such that they may have sufficient warning or receive instructions for responding to the emergency. Alternatively, it may be desirable to alert members of the public within a specific geographical area of a commercial offering that is available at a nearby retail location.
- Current systems are designed to send alert messages to mobile users by identifying traditional cellular base stations that are located in a target area for a given alert. The alert is sent to each cellular base station in the target area, each base station then forwards the alert to each mobile phone that is connected to the respective base station. However, these traditional alert systems do not offer the ability to reach mobile devices that use a WiFi access point (rather than a traditional base station) to connect to a telecommunications network such as an IP for Multimedia Subsystem (IMS) network. Therefore, a need exists for an alert system that tracks the physical location of WiFi access points and forwards alert messages to devices (such as mobile devices or other IMS-enabled devices) that are connected to the WiFi access points that are situated in a target region. Overall, the examples herein of some prior or related systems and their associated limitations are intended to be illustrative and not exclusive. Other limitations of existing or prior systems will become apparent to those of skill in the art upon reading the following Detailed Description.
-
FIGS. 1A and 1B show a system level schematic illustration of an alert system operable to implement aspects of the invention. Hereinafter,FIGS. 1A and 1B will collectively be referred to asFIG. 1 . -
FIG. 2 illustrates a look-up table 200 that operates in accordance with the embodiments disclosed herein. -
FIG. 3 is a flow diagram of a method for targeted broadcasting of alert messages. -
FIG. 4 is a geographic illustration of a target area covering portions of several counties having devices located throughout. - A wireless emergency alert system (“WEA,” and formerly known as a commercial mobile alert system, or “CMAS”) receives a geotargeted federal alert that is to be delivered to mobile devices within a defined geographic region. A database of locations of WiFi access points is utilized by the system to identify those access points that are likely present in the defined region. The system identifies mobile devices that have an ongoing IP multimedia subsystem (IMS) session with the identified WiFi access points, in part by maintaining and accessing a look-up table containing location information for the WiFi access point and connected mobile devices. In addition, the system tracks mobile devices that no longer have an ongoing IMS session and deregisters the appropriate mobile devices in the look-up table. For mobile devices that have an ongoing IMS session, the system delivers the received alert to the mobile devices in the targeted region via the identified Wi-Fi access points.
- Various examples of the invention will now be described. The following description provides specific details for a thorough understanding and enabling description of these examples. One skilled in the relevant art will understand, however, that the invention may be practiced without many of these details. Likewise, one skilled in the relevant art will also understand that the invention incorporates many other obvious features not described in detail herein. Additionally, some well-known structures or functions may not be shown or described in detail below, so as to avoid unnecessarily obscuring the relevant description.
- The terminology used below is to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific examples of the invention. Indeed, certain terms may even be emphasized below; any terminology intended to be interpreted in any restricted manner will, however, be overly and specifically defined as such in this Detailed Description section.
-
FIG. 1 shows a system level schematic illustration of analert system 100, for example a Wireless Emergency Alert System (WEA). Thealert system 100 comprises an alerting network 102 (including an alert gateway 105) coupled to abroadcasting network 104 operable to transmit targeted alerts to one or moremobile devices 110 located within aWiFi coverage area 170. The one or moremobile devices 110 may be coupled to thebroadcasting network 104 through an access point 180, such as a wireless router. Thealerting network 102 is operable to send an alert message fromalert gateway 105 to thebroadcasting network 104 for transmission to one or moremobile devices 110 positioned in a specificgeographic target area 108, such as a FIPS code, ZIP code, Census Code, or other region, as described in more detail below.Alert gateway 105 transmits alert messages issued by an agency such as a federal government. For example, under WEA,alert gateway 105 may transmit alerts issued by the President of the United States, alerts involving imminent threats to safety or life, and/or AMBER alerts. Themobile devices 110 may be any of a variety of mobile devices, such as wireless phones, Unlicensed Mobile Access or UMA-enabled devices (also known as Generic Access Network (GAN) devices), handheld computers, smartphones, media players, and the like that are enabled for use within at least thetarget area 108. In addition to specifying one or more target areas, an alert message may also include various instructions for responding to an emergency. For example, an alert message may warn residents of an approaching tornado or hurricane and direct residents to available storm shelters. -
Target area 108 may include one or more IP-based networks, particularly WiFi networks (or “hotspots”) featuring a WiFi access point such as a wireless router for sending and receiving data over unlicensed spectrum. A WiFi network allows multiple WiFi enabled devices, such as mobile phones and personal computers, to communicate over various public or private communications networks, such as the Internet. A WiFi access point within a WiFi network typically provides Internet access to multiple user devices within a limited geographic area. For example,FIG. 1 includesWiFi access point 180 a which resides within the WiFi network and provides Internet access to multiple users located inside of a coffee shop. Similarly,access point 180 b resides the withinWiFi network 170 b and provides Internet access to multiple users within a residential home,access point 180 c resides within theWiFi network 170 c and provides Internet access to multiple users within a school building,access point 180 d resides within theWiFi network 170 c and provides Internet access to multiple users within a school building, andaccess point 180 e resides within theWiFi network 170 e and provides Internet access to multiple user located on a bus. - The
alerting network 102 may send a target area signal to broadcastingnetwork 104, the target signal including geographic location information corresponding totarget area 108. Alternatively, thealert gateway 105 may embed the geographic location information in the alert message. The geographic location information may include place name information such as, for example, Potomac River Valley or the like. In other embodiments, the geographic location information may take the form of a FIPS code, ZIP code, or GPS coordinates. Federal Information Processing Standards (FIPS) codes, like Census Codes, are used by the U.S. government to standardize the identification of different entities, such as states and counties. These codes are issued by the National Institute of Standards and Technology. For example, each county in the United States is assigned a FIPS code. ZIP codes on the other hand designate quadrants or locations within a county. Thebroadcasting network 104 determines one or more access point identifiers (e.g., an IP address or MAC address) associated with one or more access points located at least partially withintarget area 108. - The
broadcasting network 104 may calculate a shape (e.g., a polygon) from the geographic location information (e.g., FIPS, ZIP, or GPS coordinates) included in the target area signal (or alert message) that represents thetarget area 108. In some embodiments, the geographic location information may already be in the form of a shape (e.g., a 5-mile radius with a center at a defined coordinate, or a polygon) that represents thetarget area 108. Thebroadcasting network 104 determines an adjustedtarget area 114 that substantially estimates thetarget area 108. In other words, the adjustedtarget area 114 may enclose or overlay thetarget area 108. Thebroadcasting network 104 may then determine the mobile devices that are connected to theaccess points 180 a (coffee shop), 180 b (home), 180 c (school), and/or 180 d (library) and forward the alert message to only those mobile devices without substantially broadcasting the alert message to mobile devices connected to accesspoint 180 e (bus), which lies outside of the adjustedtarget area 114. In the example ofFIG. 1 , the alert message would be transmitted tomobile devices point 180 a),mobile devices point 180 b), andmobile devices point 180 c). Further, in the example ofFIG. 1 , the alert message would not be transmitted tomobile devices point 180 e). - An alert message may be in a variety of formats, including the Common Alerting Protocol (CAP) format. The CAP is an XML-based data format for exchanging public warnings and emergencies between alerting technologies. CAP allows a warning message to be consistently disseminated simultaneously over many warning systems to many applications. The
alert gateway 105 may receive an alert message (e.g., alert message in CAP format) from the alertingnetwork 102 and convert the alert message into a format supported by the broadcasting network 104 (e.g., a text profile base Commercial Mobile Alert Message (CMAM) format). Thealert gateway 105 sends the converted alert message, hereinafter CMAM, to thebroadcasting network 104. - The
broadcasting network 104 comprises multiple components common to IMS networks. The broadcasting network includes a location/application server 140 and location information databases 145 a-145 d. Additionally, thebroadcasting network 104 includes a look-uptable database 150 operable to track access points serving mobile devices registered to the IMS network, as described in more detail below. The location information databases contain various types of information that the location/application server 140 may use to determine the location (such as GPS coordinates) of one or more access points 180 that are connected to thebroadcasting network 104. For example,database 145 a may contain MAC address information,database 145 b may contain GSM WCDMA information,database 145 c may contain customer address information, and/ordatabase 145 d may contain public IP information. TheCBC 130 receives the CMAM from thealert gateway 105. The CMAM may include the geographic location information of thetarget area 108 embedded in the CMAM. Alternatively, according to one embodiment, theCBC 130 may receive the target area signal from the alertingnetwork 102, wherein the target area signal provides the geographic location information of thetarget area 108. In such embodiment, the target area signal is sent in addition to the CMAM (i.e., alert message). This target area signal having the geographic location information may also be converted into text profile based CMAM format. TheCBC 130 may run a validation test on the CMAM and send an error response to thealerting network 102 if the CMAM fails validation. Such may result in the CMAM not being broadcast. - The location/
application server 140 receives the geographic location information of thetarget area 108 from theCBC 130. AlthoughFIG. 1 illustrates the location/application server 140 as a separate component from theCBC 130, in some embodiments the location/application server 140 may be embedded within theCBC 130, such as operating on the same server. The geographic location information may, for example, be in the form of FIPS, ZIP, GPS coordinates, or a defined shape. If the geographic location information is received in the form of FIPS, ZIP, or GPS coordinates, the location/application server 140 transforms the geographic location information into the shape (e.g., a polygon) representing thetarget area 108. Otherwise, the geographic location information received from theCBC 130 is already in a form of the shape representative of thetarget area 108. The transformation into the representative shape (e.g., a polygon) of thetarget area 108 may occur in real-time or near real-time to provide a more accurate alert and respond to changes that may occur periodically, such as daily changes or hourly changes. For example, daily changes may be in the form of changes in the boundaries of thetarget area 108 in response to changes in the emergency conditions. For example, path changes of a hurricane or twister, wind shifts during forest fires, or updated intelligence on an imminent terror attack may reflect a change in the boundaries of thetarget area 108. In some embodiments, the alertingnetwork 102 provides theCBC 130 with external data, e.g., meteorological data and/or updated intelligence data, to show changes in hurricane or twister path or other natural disaster, and/or changes to a potential terror area. The external data can be used by components of thebroadcasting network 104 to alter the boundaries of thetarget area 108 in real-time. In some embodiments, the alertingnetwork 102 provides theCBC 130 with a link to external data such as an Internet Web site to retrieve information (e.g., location, threat nature, threat severity, threat duration, etc.) regarding an alert message. - The location/
application server 140 has access to one or more databases 145 a-145 d and 150 including identification, location, and/or geographic coverage information for access points 180 a-180 e and/or areas served by access points 180 a-180 e. AlthoughFIG. 1 illustrates the database(s) 145 a-145 d and 150 as separate from, but directly connected with, location/application server 140, in some embodiments one or more of the databases may be distributed anywhere in thebroadcasting network 104. For example, location/application server 140 may be capable of accessing databases 145 a-145 d and 150, which may store IP addresses, MAC addresses or other identifiers for access points 180 a-180 c that are included in thetarget area 108. - In an embodiment, the location/
application server 140 implements a point-in-polygon search to determine the identifiers (e.g., IP addresses, MAC addresses and other relevant identifiers) for access points 180 a-180 c that are situated within thetarget area 108. For example, this can be done by determining the latitude and longitude extent of the target area 108 (e.g., a polygon), identifying those access points 180 a-180 c that are situated within thetarget area 108, and obtaining the identifiers associated with such access points 180 a-180 c. Alternatively or additionally, the location/application server 140 may determine the latitude and longitude extent of the target area 108 (e.g., a polygon), determine whether all or any portion of the access points 180 a-180 c (e.g., using point-in-polygon search) extend into an area outside thetarget area 108, and obtain identifiers associated with those access points 180 a-180 c. Details on techniques for implementing the point-in-polygon search may, for example, be found in an article by Bourke, Paul, entitled “Determining If A Point Lies On The Interior Of A Polygon,” November 1987, and in U.S. Pat. No. 5,124,693. The polygon-in-polygon search technique may, for example, be found in U.S. Pat. No. 5,124,693. - The obtained access point information may include, in addition to relevant identifiers, location coordinates such as coverage areas of the provided WiFi service, and/or the latitude and longitude of the access points 180 a-180 c, similar to the CGI information provided for 911 services in a location center. The location/
application server 140 may forward a list of the determined identifiers (e.g., IP addresses, MAC addresses and/or other identifiers) to theCBC 130. - Alternatively or additionally, the location/
application server 140 may determine the adjusted target area (e.g., a rectangle, square, or circle) 114 that substantially estimates the representative shape of thetarget area 108 using one of any known best-fit algorithms. For example, the location/application server 140 may define a center of thetarget area 108 and a radius defining the adjusted target area 114 (i.e., a circle) that forms a best-fit circle encircling or just within thetarget area 108. Alternatively, the adjustedtarget area 114 may be a “best-fit” rectangle that fits around or within the boundary of thetarget area 108. Some best-fit algorithms may include a determination of first and second best-fit areas, and if the first best-fit area minus thetarget area 108 is greater than the second best-fit area minus thetarget area 108, the algorithm selects the second best-fit area as the adjustedtarget area 114. AlthoughFIG. 1 shows arectangular target area 108 inside of a circular adjustedtarget area 114, a person of ordinary skill in the art will recognize that a circular target area may lie inside of a rectangular adjusted target area. - The location/
application server 140 may calculate location coordinates (e.g., latitude and longitude) of opposite corners of the adjustedtarget area 114. Alternatively, the location/application server 140 may calculate a location coordinate of the center of the adjustedtarget area 114 and the radius, which define the adjustedtarget area 114. Although reference will herein be made to the opposite corners defining the adjustedtarget area 114, it will be understood by those skilled in the art that defining the adjustedtarget area 114 by determining various other coordinates such as the center coordinate and the associated radius is also within the scope of aspects of the invention. The location coordinates of the opposite corners may be forwarded to theCBC 130 for validation. The location/application server 140 then, or coincidentally with the calculation of the adjustedtarget area 114, obtains identifiers as described above. Further details regarding defining the boundary are provided below, e.g. with reference toFIG. 4 . - Alternatively or additionally, the location/
application server 140 may adjust the boundaries of the “best fit” adjusted target area to accommodate or ensure maximum broadcast coverage in thetarget area 108, using a “best coverage” algorithm. For example, a “best fit” adjustedtarget area 114 may include all access points 180 a-180 c within its borders, but may not capture all of the relevant coverage area within the adjustedtarget area 114 because some percentage of coverage within the adjustedtarget area 114 is provided byaccess point 180 d located outside the adjustedtarget area 114. For example, anaccess point 180 d may be located outside of the adjustedtarget area 114 but its associated coverage area may intersect with a portion of the adjustedtarget area 114 to provide service tomobile device 110 j. In such a case, a “best coverage” algorithm may be executed to extend the outward borders of the adjustedtarget area 114 to ensure that the broadcast alert is broadcast to accesspoint 180 d to ensure maximum coverage of the adjustedtarget area 114. The location coordinates of the opposite corners of the adjustedtarget area 114 may be forwarded to theCBC 130 for validation. -
Access point 180 e, which is located outside of adjustedtarget area 114 and which does not overlap with adjustedtarget area 114, does not receive the broadcasted alert.Access point 180 e is located on a moving bus. Whileaccess point 180 e may not initially be located inside of the adjustedtarget area 114, theaccess point 180 e may move into the adjustedtarget area 114 as the bus travels to a destination. In such cases, the location/application server may continually monitor thetarget area 108 and the adjustedtarget area 114. The location/application server then may update the stored location information accordingly to ensure that alerts are broadcast to all access points in a designated target area. - The access points 180 a-180 d are registered as part of the relevant network. Geographic location information associated with access points 180 a-180 d are known to the location/
application server 140. For example, the location/application server 140 may have access to thedatabase 150 containing a look-up table of registered access points and their associated location information, as described in more detail below. The location information can be geographic coordinates (e.g., latitude and longitude) of the access points used to route communications between the access point and the connected mobile devices. Alternatively, the location information can be the street address of the access point, which may be converted into latitude and longitude coordinates. For example, when an access point is initially registered with the network, the user may be required to input a street address for the location of the access point. The system may then obtain and store in a database the latitude and longitude coordinates for the access point. Details on techniques for locating access points may be found in PCT App. No. PCT/US07/82156, System And Method For Determining A Subscriber's Zone Information, Oct. 22, 2007, (31419-8034.WO00); PCT App. No. PCT/US07/82133, Two Stage Mobile Device Geographic Location Determination, Oct. 22, 2007, (31419-8035.WO00); PCT App. No. PCT/US07/82136, System And Method For Utilizing IP-Based Wireless Telecommunications Client Location Data, Oct. 22, 2007, (31419-8036.WO00); U.S. patent application Ser. No. 12/089,905, System And Method For Determining Device Location In An IP-Based Wireless Telecommunications Network, Apr. 10, 2008, (31419-8028.US01); and PCT App. No. PCT/US07/66579, Mobile Computing Device Geographic Location Determination, Apr. 12, 2007, (31419-8030.WO00). - The
broadcast network 104 receives the CMAM (i.e., converted alert message) and the location coordinates of the opposite corners of therectangular shape 108 from theCBC 130. The location/application server performs a lookup of the registered devices in thedatabase 150 to identify those devices that are within therectangular shape 108. In other words, the location/application serer compares the coordinates associated with the registered devices to the location coordinates of the opposite corners of therectangular shape 108, to select those registered devices that are within therectangular shape 108 for broadcasting. Based on such determination, thebroadcast network 104 broadcasts the CMAM to the devices that are within the target area without substantially broadcasting the CMAM to devices located outside the target area. -
FIG. 2 illustrates a look-up table 200 that operates in accordance with the embodiments disclosed herein. Look-up table 200 can be used to track the locations of access points and the locations of registered devices that connect to the IMS network through the access points. The lookup table may be stored in one or more databases inbroadcast network 104. For example, the look-up table 200 may be stored indatabase 150, which is accessible by the location/application server 140. Although not shown, thedatabase 150 also may be accessible via theCBC 130, thereby allowing theCBC 130 to access the contents of the look-up table 200. The look-up table 200 contains a variety of rows and columns to facilitate tracking the locations of access points and registered devices, as well as tracking the status of alert messages. - An “Access Point ID”
column 205 contains an identification number for each access point that is connected to a registered device. As discussed above, the identification number for each access point may be an IP address, a MAC address, or any other identification number operable to distinguish one access point from other access points in the look-up table. A “Device Identifier”column 220 contains an identification number for each registered device (also referred to as a “user equipment identification” or “UE ID”). The identification number for a registered device may be any number that is operable to distinguish the device from other devices in the look-up table 200. For example, the Device Identifier may be an International Mobile Equipment Identity (IMEI) number, an International Mobile Subscriber Identity (IMSI), a serial number (SN), a Mobile Subscriber Integrated Services Digital Network-Number (MSISDN), or a Uniform Resource Identifier (URI). A “Location Information”column 210 contains the physical location of each access point that serves a registered device. As discussed above, the location information may be any information that provides a geographic location of the access point, including a FIPS code, a ZIP code, or GPS coordinates. A person of ordinary skill in the art will recognize that additional types of geographic location information may be included in the look-up table 210, including place names (e.g., Potomac River Valley), street addresses (e.g., 211 Main St.), street intersections (e.g., Main St. & 1st Ave.), or neighborhoods (e.g., Hell's Kitchen). - A “Session State”
column 215 contains an indication of the registration status of each device that is currently in the look-up table 200, where the registration status reflects whether a respective device is currently registered on the IMS network (i.e., active session) or is not currently registered on the IMS network (i.e., inactive session). A device such as a mobile phone or smartphone may register with the IMS network using well-known registration procedures involving commonly understood IMS network components, including interrogating or serving call session control function (I/S-CSCF) 160, proxy call session control function (P-CSCF) 162, home subscriber server (HSS) 166, and access session border controller (A-SBC) 164. Further details on the IMS network components and registration procedures may be found in commonly-assigned U.S. patent application Ser. No. 12/856,519 Title ENHANCED REGISTRATION MESSAGES IN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEMS, filingdate 13 Aug. 2010, which is herein incorporated by reference in its entirety. - The IMS architecture typically does not provide for explicit deregistration of devices that are no longer operatively connected to the IMS network. For example, when a user enters a
coffee shop 170 a, the user'smobile phone 110 b may register for IMS services throughaccess point 180 a. However, when the user leaves thecoffee shop 170 a and travels to an area that is not served byaccess point 180 a or a different access point, themobile phone 110 b typically may not send a deregistration message to inform the IMS network that themobile phone 110 b is no longer within a range serviceable by theaccess point 180 a. As a result, the IMS databases may lack an up-to-date listing that accurately reflects the connected devices. The present technology therefore enables the accurate gathering of information regarding the registration and deregistration of devices on the IMS network via the look-up table 200. - The system may obtain deregistration status in a variety of ways. In one embodiment, the system automatically deregisters a user device after a predetermined amount of time. For example, each time a device registers on the IMS network, the location/application server (or other component of the system) sets the “Session State” to a value (e.g., “Active,” “communicating,” or ‘Y’) that indicates an active registration status for the newly registered device. In addition, the location/application server (or other component of the system) may start a timer that expires after a predetermined amount of time. When the timer expires after the predetermined amount of time has elapsed, the location/application server automatically deregisters the user device from the IMS network and indicates a deregistered status by assigning an appropriate value (e.g., “Inactive,” “not communicating,” or ‘N’) in the look-up table for the deregistered device. If a deregistered device remains within the coverage area of an access point through which it may connect to the IMS network, the deregistered device simply repeats the registration process to re-establish access to the IMS network. In such case, the look-up table is then updated to again indicate a registered status for the device.
- In another embodiment, the system performs periodic refreshes of one or more user devices in look-up table 200 in order to determine registration status. For example, the location/
application server 140 may send a status request message (such as an Internet ping request) to each registered device at a predetermined, fixed or variable interval. If the queried device responds, then the registration status of the device remains active in the look-up table 200. If, however, a response is not received from the queried device, then the registration status is set to inactive in the look-up table 200. Although tracking registration and deregistration of devices is described with respect to the location/application server 140, a person of ordinary skill in the art will recognize that one or more additional components in thebroadcast network 104 may carry out the tracking functionality (e.g., the CBC 130). - An “Alert Message”
portion 225 of the table contains three columns that track the identity and status of multiple alert messages. A “Message ID”column 226 uniquely identifies each message received by the system on a per-device basis. The Message ID may be any value operable to distinguish one alert message from other alert messages in the look-up table. A “Message Sent”column 227 contains an indication of whether a particular alert (i.e., Message ID) has been sent to a particular device (i.e., device identifier) that lies within a determined target area, as described above. When thebroadcast network 104 sends an alert message to a particular registered device, the system updates the corresponding entry in the look-up table 200, for example by indicating a ‘Y’ incolumn 227. In addition, a “Confirmation Received”column 228 contains an indication of whether the particular registered device returns an acknowledgement of the particular alert message. The system will assign a default value of ‘N’ in the “Confirmation Received”column 228 when the alert message is sent. If an acknowledgement is received, the system will update the look-table 200 to reflect a value of ‘Y’ in the “Confirmation Received”column 228. - A person of ordinary skill will appreciate that look-up table 200 may be used to track the identity and status of multiple alert messages on a per-UE or per-device identifier level. For example, look-up table 200 may be used to track the status of a first alert message (Message ID D5546) to reflect that the system has sent Alert Message D5546 to a first registered device (Device Identifier 548785463215465) but has not yet received a confirmation from the first registered device; the system has not sent the first Alert Message D5546 to a second registered device (Device Identifier 588745445189336) and accordingly has not yet received a confirmation from the second registered device; and so on.
- Similarly, look-up table 200 may be used to track the status of a second alert message (Message ID BBTGD) to reflect that the system has sent Alert Message BBTGD to a first registered device (Device Identifier 548785463215465) but has not yet received a confirmation from the first registered device; the system has sent the second Alert Message BBTGD to a second registered device (Device Identifier 588745445189336) and has received a confirmation from the second registered device; the system has sent the second Alert Message BBTGD to a third registered device (Device Identifier GGFUHDS) and has received a confirmation from the third registered device; and so on.
- A person of ordinary skill in the art will appreciate that look-up table 200 may omit any of the columns depicted in
FIG. 2 and/or may add additional columns to track a variety of additional information, including but not limited to a time that a device is registered on the IMS network or a time that a device registration is refreshed on the IMS network (i.e., a registration time field), a time that a device registration fails to refresh on the IMS network, a time that a device is explicitly deregistered from the IMS network, a time that a message is sent, a time that a confirmation is received, and information regarding the nature and target area of the message. -
FIG. 3 shows a flow diagram of a method for targeted broadcasting of alert messages, as described above. Atstep 1, thealert gateway 105 sends the CMAM to theCBC 130. TheCBC 130 receives the CMAM from thealert gateway 105, including the geographic location information (hereinafter “GLI”) of thetarget area 108. TheCBC 130 validates the CMAM that is received from thealert gateway 105. If the CMAM is determined to be invalid, theCBC 130 may ignore the CMAM. Otherwise, if the CMAM is determined to be valid, processing continues atstep 3. Atstep 3, theCBC 130 sends an acknowledgment to thealert gateway 105 notifying thealerting network 102 that a valid CMAM was received. Atstep 4, theCBC 130 sends a CAP request to thealert gateway 105. Atstep 5, thealert gateway 105 responds with a CAP alert. - At
step 6, theCBC 130 transmits the GLI and queries the application/location server 140 to determine the access points 180 within thetarget area 108 to be used for target broadcasting. Alternatively or additionally, theCBC 130 queries the application/location server 140 to obtain the shape (e.g., geographic shape) that represents thetarget area 108 for target broadcasting. The representative shape may, for example, take a form of a polygon, square, rectangle, circle or any shape that sufficiently represents thetarget area 108, as noted above. Both the determination of the one ormore access points 108 within thetarget area 108 and the representative shape are based on the received GLI. The GLI may, for example, be selected from a Geographic Names Information System (GNIS). The GNIS is a database that includes name and locative information regarding physical and cultural features located throughout the United States and its territories. The GNIS is part of a system that includes topographic map names and bibliographic references. Alternatively or additionally, the GLI of thetarget area 108 may be received in terms of a particular code, such as a FIPS code or ZIP code. - At
step 7, the application/location server 140 sends an acceptance message to theCBC 130. At step 8, the application/location server 140 transforms the GLI (e.g., GNIS, FIPS code, ZIP code, or GPS coordinates) into the shape that represents thetarget area 108. The representative shape may be an approximate geographic representation that best estimates thetarget area 108. The application/location server 140 may have access to one or more processors operable to approximate the representative shape of thetarget area 108 based on the GLI. Alternatively, the GLI is received in terms of the representative shape (e.g., 5 mile radius having a center at a defined coordinate). Using the look-up table 200, the application/location server 140 identifies the access points and registered devices located within the target area, as described above. - The location/
application server 140 then transmits the alert message through the IMS network to each registered device within the target area. For example, the location/application server 140 transmits the alert to one or more session controllers 161 (step 9). The one or more session controllers transmits the alert message to a border controller 165 (step 10). Theborder controller 165 transmits the alert message to access point 170 (step 11). Theaccess point 170 then transmits the alert message to a registered device 110 (step 12). - At
step 13, the registered device (e.g., a mobile device) performs behavior for an alert message. Such behavior may include providing an audible or visual alert on the mobile device in accordance with the content of the alert. For example, in the case of an AMBER Alert, the registered device may display an image of an abducted child, the alleged abductor, and information regarding the vehicle being driven by the alleged abductor. For an environmental emergency, the alert may provide instructions as to where to go (e.g. routes to take for a hurricane evacuation). - The registered device sends to the location/
application server 140 an acknowledgement that the alert was received. At step 14, the registered device sends an acknowledge message to accesspoint 170. At step 15,access point 170 sends the acknowledge message toborder controller 165. Atstep 16, theborder controller 165 sends the acknowledge message to the one ormore session controllers 161. Atstep 17, the one ormore session controllers 161 send the acknowledge message to the location/application server 140. Atstep 18, the location/application server 140 sends the acknowledge message to theCBC 130. -
FIG. 4 shows a geographic illustration ofseveral counties 442 having devices located throughout. As illustrated inFIG. 4 , atarget area 408 includes portions of three of thesecounties 442. In contrast, a representation of thetarget area 408 by FIPS code alone would define thetarget area 408 as encompassing the entire threecounties 442, instead of only the select portions of these threecounties 442. Such would unnecessarily alert device users outside of the intendedtarget area 408. - For target broadcasting, the location/
application server 140 accesses the lookup-table 200 indatabase 150 to identify access points located within thetarget area 408. The location/application server 140 may perform a point-in-polygon search, polygon-in-polygon search or similar search to identify the identifiers within thetarget area 408. The location/application server 140 creates a list of identifiers for access points located in thetarget area 408 for forwarding to the CBC. - Additionally or alternatively, the location/
application server 140 calculates the adjustedtarget area 414 that substantially approximates thetarget area 408. The adjustedtarget area 414 approximation of thetarget area 408 allows for a two-point determination of the adjustedtarget area 414. For example, as illustrated inFIG. 4 , two opposite points of the adjustedtarget area 414 may define a rectangular shape. The two points may comprise a first latitude/longitude coordinate (lat.sub.1, long.sub.1) and a second latitude/longitude coordinate (lat.sub.2, long.sub.2). The boundary of the adjustedtarget area 414 is thus readily defined by an area between the first and second latitudes, and between the first and second longitudes. The location/application server 140 determines these two opposite points (lat.sub.1, long.sub.1), (lat.sub.2, long.sub.2) for forwarding to theCBC 130. A person of ordinary skill in the art will appreciate that other methods for defining the adjustedtarget area 414 are within the scope of the invention described herein. For example, the adjustedtarget area 414 may be a circle defined by a center coordinate and a radius. - Upon determining the list of identifiers of the respective access points within the
target area 408 and/or the two opposite points (lat.sub.1, long.sub.1), (lat.sub.2, long.sub.2) of the adjustedtarget area 414, the location/application server 140 forwards the list of identifiers of the respective access points in thetarget area 408 and/or the coordinates of the opposite points of the adjustedtarget area 414 to the CBC. TheCBC 130 then transmits the alert to the registered devices in thetarget area 408 without substantially broadcasting outside thetarget area 408. - The discussion above has provided a brief, general description of a suitable environment in which aspects of the invention can be implemented. Although not required, aspects of the invention are described herein in the general context of computer-executable instructions, such as routines that may be executed by a general-purpose data processing device, e.g., a networked server computer, mobile device, etc. Those skilled in the relevant art will appreciate that aspects the invention can be practiced with other communications, data processing, or computer system configurations, including: Internet appliances, hand-held devices (including personal digital assistants (PDAs) and smartphones), wearable computers, all manner of corded, landline, fixed line, cordless, cellular or mobile phones, multi-processor systems, microprocessor-based or programmable consumer electronics, set-top boxes, network PCs, mini-computers, mainframe computers, media players, and the like. Indeed, the terms “computer,” “server,” and the like are generally used interchangeably herein, and refer to any of the above devices and systems, as well as any data processor.
- While aspects of the invention, such as certain functions, are described as being performed exclusively or primarily on a single device, the invention can also be practiced in distributed environments where functions or modules are shared among disparate processing devices, which are linked through a communication network, such as a Local Area Network (LAN), Wide Area Network (WAN), or the Internet. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
- Aspects of the invention may be stored or distributed on tangible computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage media. Alternatively or additionally, computer implemented instructions, data structures, screen displays, and other data under aspects of the invention may be distributed over the Internet or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave(s), etc.) over a period of time, or they may be provided on any analog or digital network (packet switched, circuit switched, or other scheme).
- Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” As used herein, the terms “connected,” “coupled,” or any variant thereof means any connection or coupling, either direct or indirect, between two or more elements; the coupling or connection between the elements can be physical, logical, or a combination thereof. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or,” in reference to a list of two or more items, covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list.
- The above Detailed Description of examples of the invention is not intended to be exhaustive or to limit the invention to the precise form disclosed above. While specific examples for the invention are described above for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize. For example, while aspects of the invention are described above with respect to capturing and routing digital images, any other digital content may likewise be managed or handled by the system provided herein, including video files, audio files, and so forth. While processes or blocks are presented in a given order, alternative implementations may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed or implemented in parallel, or may be performed at different times.
- The teachings of the invention provided herein can be applied to other systems, not necessarily the system described above. The elements and acts of the various examples described above can be combined to provide further implementations of the invention.
- Any patents and applications and other references noted above, including any that may be listed in accompanying filing papers, are incorporated herein by reference. Aspects of the invention can be modified, if necessary, to employ the systems, functions, and concepts of the various references described above to provide yet further implementations of the invention.
- Other changes can be made to the invention in light of the above Detailed Description. While the above description describes certain examples of the invention, and describes the best mode contemplated, no matter how detailed the above appears in text, the invention can be practiced in many ways. Details of the system may vary considerably in its specific implementation, while still being encompassed by the invention disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the invention should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the invention with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the invention to the specific examples disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the invention encompasses not only the disclosed examples, but also all equivalent ways of practicing or implementing the invention under the claims.
Claims (21)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/912,127 US9271135B2 (en) | 2013-03-15 | 2013-06-06 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US15/050,331 US9596583B2 (en) | 2013-03-15 | 2016-02-22 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US15/424,724 US9820126B2 (en) | 2013-03-15 | 2017-02-03 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361801200P | 2013-03-15 | 2013-03-15 | |
US13/912,127 US9271135B2 (en) | 2013-03-15 | 2013-06-06 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/050,331 Continuation US9596583B2 (en) | 2013-03-15 | 2016-02-22 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140273911A1 true US20140273911A1 (en) | 2014-09-18 |
US9271135B2 US9271135B2 (en) | 2016-02-23 |
Family
ID=51529281
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/912,127 Active 2034-02-19 US9271135B2 (en) | 2013-03-15 | 2013-06-06 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US15/050,331 Active US9596583B2 (en) | 2013-03-15 | 2016-02-22 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US15/424,724 Active US9820126B2 (en) | 2013-03-15 | 2017-02-03 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/050,331 Active US9596583B2 (en) | 2013-03-15 | 2016-02-22 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US15/424,724 Active US9820126B2 (en) | 2013-03-15 | 2017-02-03 | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
Country Status (1)
Country | Link |
---|---|
US (3) | US9271135B2 (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967687A (en) * | 2015-06-30 | 2015-10-07 | 广东建邦计算机软件有限公司 | Service information acquisition method and device based on commercial registration of party |
US20160073300A1 (en) * | 2014-09-09 | 2016-03-10 | Verizon Patent And Licensing Inc. | Device state derivation |
US20160249274A1 (en) * | 2013-11-07 | 2016-08-25 | Icom Incorporated | Relaying device, audio-communication system and relaying method for relaying audio signal |
US20160255050A1 (en) * | 2015-03-01 | 2016-09-01 | Cisco Technology, Inc. | System, method, apparatus and machine-readable media for enterprise wireless calling |
WO2016210110A1 (en) * | 2015-06-23 | 2016-12-29 | Ac&C, Llc | Emergency alert system and method |
CN106412964A (en) * | 2016-11-15 | 2017-02-15 | 中国联合网络通信集团有限公司 | Method of improving network traffic rate, base station controller and server |
US20170078760A1 (en) * | 2015-09-11 | 2017-03-16 | George G. Christoph | Geolocation based content delivery network system, method and process |
US20170127259A1 (en) * | 2014-12-29 | 2017-05-04 | Iridium Satellite Llc | Emergency communications from a local area network hotspot |
US20170127256A1 (en) * | 2015-10-29 | 2017-05-04 | Alcatel-Lucent Usa Inc. | Distributing Alert Messages Via Unlicensed Spectrum |
US20180048941A1 (en) * | 2015-04-03 | 2018-02-15 | Sony Corporation | Reception apparatus, reception method, transmission apparatus, and transmission method |
US20180096587A1 (en) * | 2016-10-05 | 2018-04-05 | Alcatel-Lucent Usa Inc. | Transmitting wireless alert messages at sub-cell granularity |
US20190230618A1 (en) * | 2018-01-23 | 2019-07-25 | Nokia Technologies Oy | Using sidelink information in radio-based positioning |
US10411799B1 (en) * | 2017-01-11 | 2019-09-10 | VLNCOMM, Inc. | Optical wireless communication systems with hadamard coded modulation |
US10440503B2 (en) * | 2014-07-16 | 2019-10-08 | TUPL, Inc. | Machine learning-based geolocation and hotspot area identification |
US10440188B2 (en) * | 2017-09-27 | 2019-10-08 | Bandwidth, Inc. | Techniques for providing location data in emergency calls |
CN111937418A (en) * | 2018-02-13 | 2020-11-13 | 诺基亚技术有限公司 | Transmitting location information and wireless emergency alert messages to devices using cell broadcast |
WO2021061176A1 (en) * | 2019-09-27 | 2021-04-01 | Nokia Technologies Oy | Method, apparatus and computer program for user equipment localization |
US20220078582A1 (en) * | 2015-03-19 | 2022-03-10 | T-Mobile Usa, Inc. | Intelligent provisioning of cell/sector coverage to optimize broadcast areas for wireless emergency alerts |
JP2022091931A (en) * | 2018-08-10 | 2022-06-21 | アイピーコム ゲーエムベーハー ウント コー. カーゲー | Public warning messages over n3gpp access |
US11445327B2 (en) | 2020-08-28 | 2022-09-13 | T-Mobile Usa, Inc. | Mobile device intelligent processing and presentation of wireless emergency alerts |
US11468762B2 (en) | 2020-01-09 | 2022-10-11 | Joseph Skowron | Facility alert system |
WO2023010016A1 (en) * | 2021-07-27 | 2023-02-02 | View, Inc. | Locally initiated wireless emergency alerts |
US20230122720A1 (en) * | 2014-09-26 | 2023-04-20 | Ent. Services Development Corporation Lp | Systems and method for management of computing nodes |
US11948015B2 (en) | 2014-12-08 | 2024-04-02 | View, Inc. | Multiple interacting systems at a site |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9271135B2 (en) * | 2013-03-15 | 2016-02-23 | T-Mobile Usa, Inc. | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
US10375758B2 (en) | 2017-02-16 | 2019-08-06 | At&T Intellectual Property I, L.P. | Wi-Fi communication of wireless emergency alerts |
CN107395608B (en) * | 2017-08-03 | 2020-09-11 | 奇安信科技集团股份有限公司 | Network access abnormity detection method and device |
WO2019167082A1 (en) * | 2018-03-01 | 2019-09-06 | Centre For Development Of Telematics | Method and system to broadcast emergency alert message using ieee 802.11 based wi-fi access point |
CN110366270B (en) | 2018-04-10 | 2021-08-13 | 华为技术有限公司 | Communication method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090247111A1 (en) * | 2008-03-27 | 2009-10-01 | At&T Mobility Ii Llc | Multi-mode provision of emergency alerts |
US20110103302A1 (en) * | 2009-11-04 | 2011-05-05 | At&T Intellectual Property I, L.P. | Campus alerting via wireless geocast |
US20120276864A1 (en) * | 2011-04-26 | 2012-11-01 | At&T Mobility Ii Llc | Dynamic voice-based emergency notification |
US20140273910A1 (en) * | 2013-03-14 | 2014-09-18 | Motorola Mobility Llc | Method and apparatus for alert message reception |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5124693A (en) | 1985-10-29 | 1992-06-23 | International Business Machines | Three dimensional graphic display with user defined vanishing point |
WO2007048028A2 (en) | 2005-10-21 | 2007-04-26 | T-Mobile, Usa, Inc. | System and method for determining device location in an ip-based wireless telecommunications network |
EP2014111B1 (en) | 2006-04-13 | 2017-09-06 | T-Mobile USA, Inc. | Mobile computing device geographic location determination |
WO2008049132A2 (en) | 2006-10-20 | 2008-04-24 | T-Mobile Usa, Inc. | System and method for determining a subscriber's zone information |
US8953567B2 (en) | 2006-10-20 | 2015-02-10 | T—Mobile USA, Inc. | System and method for utilizing IP-based wireless telecommunications client location data |
US8369266B2 (en) | 2006-10-20 | 2013-02-05 | T-Mobile Usa, Inc. | Two stage mobile device geographic location determination |
US20090291630A1 (en) | 2008-03-17 | 2009-11-26 | Dunn Timothy N | Geographic targeting of alerts |
US8537797B2 (en) | 2010-08-13 | 2013-09-17 | T-Mobile Usa, Inc. | Enhanced registration messages in internet protocol multimedia subsystems |
US20130012154A1 (en) * | 2011-07-08 | 2013-01-10 | Shortcode7 LLC | Alert system and method |
US9271135B2 (en) * | 2013-03-15 | 2016-02-23 | T-Mobile Usa, Inc. | Local network alert system for mobile devices using an IMS session and Wi-Fi access point |
-
2013
- 2013-06-06 US US13/912,127 patent/US9271135B2/en active Active
-
2016
- 2016-02-22 US US15/050,331 patent/US9596583B2/en active Active
-
2017
- 2017-02-03 US US15/424,724 patent/US9820126B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090247111A1 (en) * | 2008-03-27 | 2009-10-01 | At&T Mobility Ii Llc | Multi-mode provision of emergency alerts |
US20110103302A1 (en) * | 2009-11-04 | 2011-05-05 | At&T Intellectual Property I, L.P. | Campus alerting via wireless geocast |
US20120276864A1 (en) * | 2011-04-26 | 2012-11-01 | At&T Mobility Ii Llc | Dynamic voice-based emergency notification |
US20140273910A1 (en) * | 2013-03-14 | 2014-09-18 | Motorola Mobility Llc | Method and apparatus for alert message reception |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160249274A1 (en) * | 2013-11-07 | 2016-08-25 | Icom Incorporated | Relaying device, audio-communication system and relaying method for relaying audio signal |
US10194372B2 (en) * | 2013-11-07 | 2019-01-29 | Icom Incorporated | Relaying device, audio-communication system and relaying method for relaying audio signal |
US10440503B2 (en) * | 2014-07-16 | 2019-10-08 | TUPL, Inc. | Machine learning-based geolocation and hotspot area identification |
US20160073300A1 (en) * | 2014-09-09 | 2016-03-10 | Verizon Patent And Licensing Inc. | Device state derivation |
US9756462B2 (en) * | 2014-09-09 | 2017-09-05 | Verizon Patent And Licensing Inc. | Device state derivation |
US20230122720A1 (en) * | 2014-09-26 | 2023-04-20 | Ent. Services Development Corporation Lp | Systems and method for management of computing nodes |
US11948015B2 (en) | 2014-12-08 | 2024-04-02 | View, Inc. | Multiple interacting systems at a site |
US9980113B2 (en) * | 2014-12-29 | 2018-05-22 | Iridium Satellite Llc | Emergency communications from a local area network hotspot |
US20170127259A1 (en) * | 2014-12-29 | 2017-05-04 | Iridium Satellite Llc | Emergency communications from a local area network hotspot |
US20160255050A1 (en) * | 2015-03-01 | 2016-09-01 | Cisco Technology, Inc. | System, method, apparatus and machine-readable media for enterprise wireless calling |
US10341300B2 (en) * | 2015-03-01 | 2019-07-02 | Cisco Technology, Inc. | System, method, apparatus and machine-readable media for enterprise wireless calling |
US20220078582A1 (en) * | 2015-03-19 | 2022-03-10 | T-Mobile Usa, Inc. | Intelligent provisioning of cell/sector coverage to optimize broadcast areas for wireless emergency alerts |
US20180048941A1 (en) * | 2015-04-03 | 2018-02-15 | Sony Corporation | Reception apparatus, reception method, transmission apparatus, and transmission method |
US11758239B2 (en) * | 2015-04-03 | 2023-09-12 | Saturn Licensing Llc | Reception apparatus, reception method, transmission apparatus, and transmission method |
WO2016210110A1 (en) * | 2015-06-23 | 2016-12-29 | Ac&C, Llc | Emergency alert system and method |
CN104967687A (en) * | 2015-06-30 | 2015-10-07 | 广东建邦计算机软件有限公司 | Service information acquisition method and device based on commercial registration of party |
US20170078760A1 (en) * | 2015-09-11 | 2017-03-16 | George G. Christoph | Geolocation based content delivery network system, method and process |
US10433021B2 (en) * | 2015-09-11 | 2019-10-01 | George G. Christoph | Geolocation based content delivery network system, method and process |
US20170127256A1 (en) * | 2015-10-29 | 2017-05-04 | Alcatel-Lucent Usa Inc. | Distributing Alert Messages Via Unlicensed Spectrum |
US10812959B2 (en) * | 2015-10-29 | 2020-10-20 | Alcatel Lucent | Distributing alert messages via unlicensed spectrum |
US20180096587A1 (en) * | 2016-10-05 | 2018-04-05 | Alcatel-Lucent Usa Inc. | Transmitting wireless alert messages at sub-cell granularity |
CN106412964A (en) * | 2016-11-15 | 2017-02-15 | 中国联合网络通信集团有限公司 | Method of improving network traffic rate, base station controller and server |
US10411799B1 (en) * | 2017-01-11 | 2019-09-10 | VLNCOMM, Inc. | Optical wireless communication systems with hadamard coded modulation |
US10440188B2 (en) * | 2017-09-27 | 2019-10-08 | Bandwidth, Inc. | Techniques for providing location data in emergency calls |
US20190230618A1 (en) * | 2018-01-23 | 2019-07-25 | Nokia Technologies Oy | Using sidelink information in radio-based positioning |
US11564061B2 (en) | 2018-02-13 | 2023-01-24 | Nokia Technologies Oy | Transmission of location information to devices along with wireless emergency alert messages using cell broadcast |
CN111937418A (en) * | 2018-02-13 | 2020-11-13 | 诺基亚技术有限公司 | Transmitting location information and wireless emergency alert messages to devices using cell broadcast |
JP2022091931A (en) * | 2018-08-10 | 2022-06-21 | アイピーコム ゲーエムベーハー ウント コー. カーゲー | Public warning messages over n3gpp access |
JP7121213B2 (en) | 2018-08-10 | 2022-08-17 | アイピーコム ゲーエムベーハー ウント コー. カーゲー | Public alert messages through N3GPP access |
JP7463450B2 (en) | 2018-08-10 | 2024-04-08 | アイピーコム ゲーエムベーハー ウント コー. カーゲー | Public warning messages via N3GPP access |
WO2021061176A1 (en) * | 2019-09-27 | 2021-04-01 | Nokia Technologies Oy | Method, apparatus and computer program for user equipment localization |
US11468762B2 (en) | 2020-01-09 | 2022-10-11 | Joseph Skowron | Facility alert system |
US11445327B2 (en) | 2020-08-28 | 2022-09-13 | T-Mobile Usa, Inc. | Mobile device intelligent processing and presentation of wireless emergency alerts |
US11792601B2 (en) | 2020-08-28 | 2023-10-17 | T-Mobile Usa, Inc. | Mobile device intelligent processing and presentation of wireless emergency alerts |
WO2023010016A1 (en) * | 2021-07-27 | 2023-02-02 | View, Inc. | Locally initiated wireless emergency alerts |
Also Published As
Publication number | Publication date |
---|---|
US9271135B2 (en) | 2016-02-23 |
US9820126B2 (en) | 2017-11-14 |
US20160174054A1 (en) | 2016-06-16 |
US9596583B2 (en) | 2017-03-14 |
US20170150336A1 (en) | 2017-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9820126B2 (en) | Local network alert system for mobile devices using an IMS session and Wi-Fi access point | |
US20090291630A1 (en) | Geographic targeting of alerts | |
US10904820B1 (en) | Methods and systems for beacon-based management of shared resources | |
US9137635B2 (en) | Wireless user based notification system | |
US8340628B2 (en) | Systems and methods for localized wireless notification | |
US9414422B2 (en) | Proximity detection for mobile communication devices using geo-fencing | |
US8730872B2 (en) | System and method for identification of mobile device users in an area of a wireless access point | |
US20150140954A1 (en) | Method and system for an emergency location information service (e-lis) from unmanned aerial vehicles (uav) | |
US20030117316A1 (en) | Systems and methods for locating and tracking a wireless device | |
EP2744234B1 (en) | Geofencing system and method | |
CN103313388A (en) | Method and device for positioning mobile communication terminal | |
US20120327837A1 (en) | Method, apparatus and system for providing emergency alerts to mobile devices | |
US9107180B2 (en) | User device radio activity optimization in dead zones | |
AU2011316490A1 (en) | Method and apparatus for communication and alert system | |
JP4404209B2 (en) | Group page system, mobile terminal, group page identifier server | |
US20150281886A1 (en) | Method and apparatus for improved geofencing background | |
KR20160012575A (en) | Disaster alerting server and disaster alerting method thereof | |
JP2014219917A (en) | Information distribution system and information distribution method | |
CN108093366B (en) | Geographic information sending method and device | |
JP2016171489A (en) | Information communication system, condition designation communication control device, condition designation communication control method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: T-MOBILE USA, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DUNN, TIMOTHY N.;HOOKER, MICHAEL;SEWARD, SHELBY;AND OTHERS;SIGNING DATES FROM 20130529 TO 20130530;REEL/FRAME:031571/0080 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:T-MOBILE USA, INC.;METROPCS COMMUNICATIONS, INC.;T-MOBILE SUBSIDIARY IV CORPORATION;REEL/FRAME:037125/0885 Effective date: 20151109 Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, AS ADMINISTRATIV Free format text: SECURITY AGREEMENT;ASSIGNORS:T-MOBILE USA, INC.;METROPCS COMMUNICATIONS, INC.;T-MOBILE SUBSIDIARY IV CORPORATION;REEL/FRAME:037125/0885 Effective date: 20151109 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: DEUTSCHE TELEKOM AG, GERMANY Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:T-MOBILE USA, INC.;REEL/FRAME:041225/0910 Effective date: 20161229 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: IBSV LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE TELEKOM AG;REEL/FRAME:052969/0381 Effective date: 20200401 Owner name: PUSHSPRING, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: T-MOBILE USA, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: LAYER3 TV, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: T-MOBILE USA, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE TELEKOM AG;REEL/FRAME:052969/0381 Effective date: 20200401 Owner name: T-MOBILE SUBSIDIARY IV CORPORATION, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: METROPCS WIRELESS, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: METROPCS COMMUNICATIONS, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 Owner name: IBSV LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK AG NEW YORK BRANCH;REEL/FRAME:052969/0314 Effective date: 20200401 |
|
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:T-MOBILE USA, INC.;ISBV LLC;T-MOBILE CENTRAL LLC;AND OTHERS;REEL/FRAME:053182/0001 Effective date: 20200401 |
|
AS | Assignment |
Owner name: SPRINT SPECTRUM LLC, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: SPRINT INTERNATIONAL INCORPORATED, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: SPRINT COMMUNICATIONS COMPANY L.P., KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: SPRINTCOM LLC, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: CLEARWIRE IP HOLDINGS LLC, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: CLEARWIRE COMMUNICATIONS LLC, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: BOOST WORLDWIDE, LLC, KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: ASSURANCE WIRELESS USA, L.P., KANSAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: T-MOBILE USA, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: T-MOBILE CENTRAL LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: PUSHSPRING, LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: LAYER3 TV, LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 Owner name: IBSV LLC, WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:062595/0001 Effective date: 20220822 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |