Patent classifications
H04W4/20
Parking methods and systems
Disclosed are devices, systems and methods for managing parking monitoring and enforcement. Parking at a meter or in a parking lot or ramp can be provided as a subscription. A registration and verification process for the subscription service can be provided as a multi-step process that combines the smart parking meter with a QR code, a mobile parking app for a smartphone, a central parking management system, and digital images of the parked vehicle(s). The registration process verifies that only vehicles owned by the subscriber are associated with the subscriber's account. Steps can also be employed to ensure that subscribers are not incorrectly issued parking citations by determining whether license plate data for a vehicle initially determined to be in violation matches an active subscription parker's roster of registered vehicles.
Apparatus and method for reducing power consumption in electronic device
An apparatus and a method for reducing power consumption of an Application Processor (AP) in an electronic device are provided. The electronic device includes a first processor for supporting a first Internet Protocol (IP) Multimedia Subsystem (IMS) protocol stack, and a second processor for supporting a second IMS protocol stack. The first processor includes an AP for processing a multimedia service, and the second processor includes at least one of a Communication Processor (CP), a Modem Processor (MP), and a Baseband Processor (BP) for processing a communication service.
Interactive network and method for securing conveyance services
The inventive system and method address a long felt need for enhancing the efficiency of systems in the interactive conveyance industry for goods and services by providing for the filtering, selection and securing of conveyance services in accordance with one or more of client and representative preferences in substantially real time.
Interactive network and method for securing conveyance services
The inventive system and method address a long felt need for enhancing the efficiency of systems in the interactive conveyance industry for goods and services by providing for the filtering, selection and securing of conveyance services in accordance with one or more of client and representative preferences in substantially real time.
Proxy gateway mediated internet-enabled data consumption over unstructured supplementary service data
Apparatuses, methods, and systems for internet-enabled data for transparent application consumption over unstructured supplementary service data are disclosed. One method includes generating, by an application, IP (internet protocol) packets, encapsulating, by a proxy interface, the IP packets into protocol data units (PDUs), generating frames of data for facilitating communication through a wireless link, wherein the frames include data slots and control information slots, identifying, by the base station, unused control information slots of the frames of data, scheduling transmission of a stream of the PDUs over the unused control information slots for a full-time duration of the unused control information slots, inserting the PDUs into one or more of the scheduled control information slots of the frames of data as specified by the scheduling, and transmitting, by the computing device, the frames of data through the wireless link to the base station on the scheduled control information slots.
Proxy gateway mediated internet-enabled data consumption over unstructured supplementary service data
Apparatuses, methods, and systems for internet-enabled data for transparent application consumption over unstructured supplementary service data are disclosed. One method includes generating, by an application, IP (internet protocol) packets, encapsulating, by a proxy interface, the IP packets into protocol data units (PDUs), generating frames of data for facilitating communication through a wireless link, wherein the frames include data slots and control information slots, identifying, by the base station, unused control information slots of the frames of data, scheduling transmission of a stream of the PDUs over the unused control information slots for a full-time duration of the unused control information slots, inserting the PDUs into one or more of the scheduled control information slots of the frames of data as specified by the scheduling, and transmitting, by the computing device, the frames of data through the wireless link to the base station on the scheduled control information slots.
Privacy-Enhanced Contact Tracing using Mobile Applications and Portable Devices
A embodiment may involve receiving a contact tracing request for a first user identifier that corresponds to a first portable device identifier of a first portable device. The second example embodiment may also involve requesting and receiving, from a first computing device associated with the first user identifier, device adjacency data, wherein the device adjacency data contains a plurality of contact entries, wherein one of the contact entries identifies a second portable device identifier of a second portable device that was wirelessly detected by the first portable device and a timestamp of when the wireless detection of the second portable device occurred. The second example embodiment may involve determining, from the mappings, a second user identifier that corresponds to the second portable device identifier. The second example embodiment may further involve transmitting, to a second computing device associated with the second user identifier, a contact tracing notification.
Privacy-Enhanced Contact Tracing using Mobile Applications and Portable Devices
A embodiment may involve receiving a contact tracing request for a first user identifier that corresponds to a first portable device identifier of a first portable device. The second example embodiment may also involve requesting and receiving, from a first computing device associated with the first user identifier, device adjacency data, wherein the device adjacency data contains a plurality of contact entries, wherein one of the contact entries identifies a second portable device identifier of a second portable device that was wirelessly detected by the first portable device and a timestamp of when the wireless detection of the second portable device occurred. The second example embodiment may involve determining, from the mappings, a second user identifier that corresponds to the second portable device identifier. The second example embodiment may further involve transmitting, to a second computing device associated with the second user identifier, a contact tracing notification.
METHOD AND SYSTEM FOR PRESENCE DETECTION
Techniques for detecting and presenting rewards for presence are disclosed. Presence of a mobile device within a building is detected based on a plurality of triggers including a degradation of a first signal and a concurrent improvement of a second signal. The triggers are identified by a client-side application of the mobile device or a corresponding server-side processor with which the client-side application is in communication and from which the client-side application is configured to automatically receive available rewards. In response to detecting presence within the building, the server-side processor determines that a user of the mobile device is eligible for a reward, and the reward is provided to the user via the client-side application at the mobile device.
METHOD AND APPARATUS IN USER EQUIPMENT AND BASE STATION SUPPORTING RANDOM ACCESS
The disclosure provides a method and a device in a User Equipment (UE) and a base station supporting random access. The UE first transmits a first radio signal, and then receives a second radio signal. A first bit block is used for generating the first radio signal, the first bit block includes a positive integer number of bits, the first bit block carries a first identifier and a first data block, the first bit block lacks a field used for indicating RRC connection request cause information, a field used for indicating RRC connection reestablishment request cause information or a field used for indicating RRC connection resume request cause information compared with a Msg3, the first data block includes a positive integer number of higher-layer bits, the second radio signal carries a second identifier. The first identifier is equal to the second identifier.