H04W4/20

MEDIA EVENT STRUCTURE AND CONTEXT IDENTIFICATION USING SHORT MESSAGES

The present disclosure is descriptive of discovering structure, content, and context of a media event, e.g., a live media event, using real-time discussions that unfold through short messaging services. Generally, a sampling of short messages of a plurality of users is obtained. The sampling of short messages corresponds to a media event. A segment in the media event is identified using the sampling of short messages, and at least one term taken from the sampling of short messages is identified. The at least one term is indicative of a context of the identified segment.

METHODS AND APPARATUSES FOR CONFIGURING A BLE ADVERTISING BEACON
20180007544 · 2018-01-04 ·

A method, apparatus, and computer program product are provided in order to provide improvements in the configuring of Bluetooth low energy (BLE) advertising beacons. Embodiments of the present invention are directed to conveniently and reliably configuring or updating the configuration of a BLE beacon, while limiting the amount of technical information and/or tools required. A method is provided comprising: receiving a data stream encoded in a flickering barcode from a programming device; decoding, using a processor, the received data stream; and configuring a BLE beacon advertisement using the decoded data stream. The method may further include transmitting the configured BLE beacon advertisement. A corresponding apparatus and a computer program product are also provided.

SYSTEMS AND METHODS FOR PROVIDING FUNCTIONALITY BASED ON DEVICE ORIENTATION
20180004313 · 2018-01-04 ·

Systems, methods, and non-transitory computer-readable media can determine a first orientation in which a computing system is positioned. A first functionality can be provided when the computing system is positioned in the first orientation. It can be determined that the computing system becomes positioned in a second orientation. A second functionality can be selected, out of a set of functionalities, based on a current state associated with the computing system. The second functionality can be provided when the computing system becomes positioned in the second orientation.

METHOD AND APPARATUS FOR SEARCHING FOR SHORT-DISTANCE OBJECT
20180007524 · 2018-01-04 ·

The present disclosure discloses a method and a computer server for searching for a short-distance object and pertains to the field of mobile terminal technologies. The method includes: receiving a short-distance object search request sent by a target terminal; obtaining location information of the target terminal from the short-distance object search request; separately determining, according to the location information of the target terminal, location information of prestored objects for short-distance object search, and multiple preset distance ranges, objects whose distances from the target terminal fall within each distance range, to obtain one or more objects corresponding to each distance range; separately randomly selecting at least one to-be-presented object from the one or more objects corresponding to each distance range; and returning the to-be-presented objects to be presented on the target terminal. By means of the present disclosure, effectiveness of a short-distance object search function can be enhanced.

SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK
20180014240 · 2018-01-11 ·

A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.

CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
20180013765 · 2018-01-11 ·

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.

SYSTEM AND METHOD FOR SHARING MESSAGE/CONTENT USING LOCATION INFORMATION
20180014170 · 2018-01-11 ·

A system and method for sharing a message and/or content using location information. The system for sharing a message and/or content includes at least one upload terminal that generates and transmits post metadata including a message/content prepared for uploading, location of the upload terminal, and location for uploading the prepared message/content thereto; a download terminal that transmits a connection message including current location, and downloads message/content posted within a predetermined distance from the current location to display the posted message/content; and a server that verifies the post metadata by receiving the prepared message/content and the post metadata corresponding to the prepared message/content from the upload terminal, stores a result of verification, searches for the prepared message/content to be provided to the download terminal when the connection message including the location is received from the download terminal, and provides information on the searched message/content and post location to the download terminal.

Restricting Communications Between Subscriber Machines
20180013767 · 2018-01-11 ·

A method of transferring information between subscribers associated with a communication service is disclosed. The method includes receiving a first handle address associated with a first subscriber device, in which the first subscriber device transfers information to a group of subscriber devices, each of the group of subscriber devices is linked to different handle addresses, and each of the different handle addresses is included in a group of handle addresses. The method also includes determining whether the first handle address is included in the group of handle addresses, transferring information from the first subscriber device to the group of subscriber devices in response to the first handle address being included in the group of handle addresses, and verifying that the transferred information was received by the group of subscriber devices. A corresponding system and computer-readable device are also disclosed.

Systems and methods for device-anonymous performance monitoring in a wireless network

An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.

Overheating protection method for user equipment, device, user equipment, and base station
11711688 · 2023-07-25 · ·

An overheating protection method for user equipment includes: sending a first signaling to a base station, the first signaling carrying indication information indicating that the user equipment has a capability of reporting a temporary capability of the user equipment; receiving a second signaling returned by the base station in response to the first signaling; and when the user equipment is overheated due to a wireless link configuration being too high, sending a third signaling for adjusting the wireless link configuration to the base station, the third signaling carrying assistance information indicating the base station to solve an overheating problem of the user equipment.