Protected distribution and location based aggregation service

Information

  • Patent Grant
  • 9055037
  • Patent Number
    9,055,037
  • Date Filed
    Monday, June 10, 2013
    11 years ago
  • Date Issued
    Tuesday, June 9, 2015
    9 years ago
Abstract
A system for and method of per access-point streaming media customization and privacy protected feedback in a wireless network. The system is operative to: encrypt real time streamed media content from a streaming media source; multicast the streamed encrypted media content for availability to a user device for playback, the user device sending out unicast responses at the time of joining or dropping the multicast; aggregate the unicast responses in the form of a connect multicast state or a disconnect multicast state of the user device based on the joining or dropping of the multicast; and provide information back to the streaming media source based on the aggregated unicast responses.
Description
FIELD OF THE INVENTION

The present application relates to a system for and method of per access-point streaming media customization and privacy protected feedback in wireless networks such as bandwidth constrained wide area network (WAN) connected IPv6 mobile networks.


BACKGROUND OF THE INVENTION

Even with the popularity of MP3 players and smart mobile phones, such as iPhones®, for portable content storage and playback, terrestrial radio broadcasts continue to generate more than $20 billion annually in advertisement (ad) revenue. However, approximately 75% of this revenue is generated from localized ad insertion. As large radio station conglomerates transition from traditional terrestrial broadcasting to a primary focus on internet delivery, they will inevitably need to develop new business models to address local vendor ad opportunities.


In view of the foregoing, leveraging long-term-evolution (LTE) and global positioning system (GPS) mobile features without compromising listener privacy for streaming media will be a desire of internet radio and wireless carrier providers.


In addition to the radical changes of traditional (ad based) radio distribution as owners shift to primarily internet distribution, a concurrent secondary paradigm shift will occur within wireless data distribution and their associated backhaul networks. Basically, as fiber is built out to the towers to handle LTE and Wi-Max, the bandwidth choke points will move from backhaul to available wireless spectrum. Accordingly, US wireless carriers will necessarily require more efficient systems to allow Internet radio distribution over their mobile LTE and Wi-Max networks.


SUMMARY OF THE INVENTION

According to one aspect, the present invention provides a system and method that regulate access to multicast streamed content from bandwidth constrained IPv6 access points.


According to another aspect, the present invention provides a system for per access-point streaming media customization and privacy protected feedback in a wireless network, comprising: means for encrypting real time streamed media content from a streaming media source; means for multicasting the streamed encrypted media content for availability to a user device for playback, the user device sending out unicast responses at the time of joining or dropping the multicast; means for aggregating the unicast responses in the form of a connect multicast state or a disconnect multicast state of the user device based on the joining or dropping of the multicast; and means for providing information back to the streaming media source based on the aggregated unicast responses.


The streaming media source may be an Internet radio, and the user device may comprise a mobile device, such as a smart phone or a portable media device.


The wireless network may comprise a bandwidth constrained wide area network (WAN) connected IPv6 mobile network.


The unicast response from the mobile device may further include at least one of a unique mobile device identification (ID) or a location coordinate of the mobile device.


The unicast response from the mobile device may further include a unique mobile device identification (ID), a location coordinate of the mobile device, a streaming media source ID request, and a timestamp.


The location coordinate may be determined via a global positioning system (GPS).


The streamed encrypted media content may be encrypted with a digital rights management (DRM) key.


The information provided back to the internet radio as the streaming media source may include at least one of a radio tower identification (ID), a timestamp, a channel selected, a channel de-selected or a channel global positioning position (GPS).


The invention further provides a method of per access-point streaming media customization and privacy protected feedback in a wireless network, the method comprising: encrypting real time streamed media content from a streaming media source; multicasting the streamed encrypted media content for availability to a user device for playback, the user device sending out unicast responses at the time of joining or dropping the multicast; aggregating the unicast responses in the form of a connect multicast state or a disconnect multicast state of the user device based on the joining or dropping of the multicast; and providing information back to the streaming media source based on the aggregated unicast responses.


The present invention also contemplates a computer readable medium comprising a program for instructing the system to perform the above-described operations.


According to a still further aspect, the present invention provides a mobile wireless access device, comprising: a network interface communicatively coupling the mobile wireless access device to a network server; a controller associated with the network interface and operative to: transmit location coordinate information, an access-point identification (ID), and a streaming media ID request to the network server; receive an encrypted streamed media multicast from the network server; receive a multicast unique key for streamed content decryption; decrypt the streamed content for playback by a player function; transmit a successful connection and decryption of the streamed media multicast back to the network server; and transmit a termination of the connection of the streamed media multicast back to the network server.


There has thus been outlined, some features consistent with the present invention in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are, of course, additional features consistent with the present invention that will be described below and which will form the subject matter of the claims appended hereto.


In this respect, before explaining at least one embodiment consistent with the present invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. Methods and apparatuses consistent with the present invention are capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein, as well as the abstract included below, are for the purpose of description and should not be regarded as limiting.


As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for the designing of other structures, methods and systems for carrying out the several purposes of the present invention. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the methods and apparatuses consistent with the present invention.





BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the invention, and together with the description serve to explain the principles of the invention.



FIG. 1 illustrates a top level system diagram according to an exemplary embodiment of the present invention;



FIG. 2 is a system diagram illustrating further details of a protected distribution and location-based aggregation service according to an exemplary embodiment of the present invention;



FIG. 3 illustrates a system scaling base on tower and internet radio station according to an exemplary embodiment of the present invention;



FIG. 4 is a more detailed diagram illustrating additional details for serving a single access point or tower as shown in connection with FIG. 3;



FIG. 5 illustrates a block diagram showing the basic operation of a thin client plug-in according to an exemplary embodiment of the present invention;



FIG. 6 is an operation flowchart illustrating a client plug-in according to an exemplary embodiment of the present invention;



FIG. 7 illustrates an example of a platform for a mobile device for implementation of the present invention; and



FIGS. 8A and 8B illustrate an example of a use-case ecosystem showing a scenario for implementation of the present invention.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.



FIG. 1 is a top level system diagram showing the central service and client plug-in functions according to an exemplary embodiment of the present invention. These functions would typically be provided by or under the control of a wireless network owner. More specifically, the system shown in FIG. 1 is designed to regulate access to multicast streamed content from bandwidth constrained IPv6 access points. For the sake of clarity, internet radio distribution over a long-term-evolution (LTE) carrier-based wireless network will be described as an exemplary embodiment.


As shown in FIG. 1, a protected distribution and location based aggregation service 1, in the form of a central server, receives Internet radio feeds as shown by communication input 2 from the WAN 3 and encrypts prior to distributing as at 4 within the wireless carrier's network such as IPv6 wireless distribution cell(s) and backhaul network 5. A device plug-in 6 provided to users' mobile client playback devices 7 provides a decryption function. The plug-in device 6 also provides usage data feedback as shown by communication input 8 to the protected distribution and location based aggregation service 1. The service 1 summarizes the usage data and makes location based aggregated statistics available as shown by communication output 9 back to the internet radio stations or other third parties.



FIG. 2 is a system diagram illustrating further details of the protected distribution and location based aggregation service 1 according to an exemplary embodiment of the present invention. In particular, as shown in FIG. 2, the central server of the service 1 includes a separate backhaul entry 10 and an aggregation service 11. The backhaul entry 10 is responsible for the encryption of each Internet radio 2. The separation allows the function to be located at the source of the Internet radio station or at the most cost-effective point in the carrier network. Each backhaul entry point 10 receives DRM keys as shown by communication input 12 from the aggregation service 11 for encryption of each internet radio 2.


A service 1 consistent with the present invention is well suited to support many internet radio stations R1, R2, . . . Rn across many carrier access points as shown in FIG. 3. Using the example of LTE, a system consistent with the present invention will support a large group of wireless cells C1, C2, C3, C4, C5, C6, C7, . . . Cn (or carrier access points) for mobile devices 7. At cell sizes of 5 kilometers, LTE can support spectrum slices as narrow as 1.25 MHz or as wide as 20 MHz. With 4×4 multiple input, multiple output (MIMO) antenna technology, LTE can achieve more than 300 megabits per second (Mbps) total across 200 mobile devices 7. At 128 kilobits per second (Kbps) per internet radio channel, reserving some amount of LTE spectrum per tower/cell for multicast distribution would be a logical plan for carriers. In this scenario, leveraging the two way capabilities of LTE to collect real-time aggregated listener statistics could be of high economic value to radio station owners. True royalty calculation could be performed on a per song per play basis to obtain accurate reporting back to content owners. Additionally, collected location based statistics for listeners could allow better target advertising for ad slots. Again, ads could be late-binded on a per tower T1, T2, T3, T4, T5, T6, T7, . . . Tn basis using, for example, vendor defined rule sets on geographic locations as described in copending U.S. application Ser. No. 12/189,861, filed Aug. 12, 2008 entitled “Method for Location Based Advertising Based on Binding Bids to User Defined Arbitrary Shapes”, the contents of which are incorporated herein by reference.


Scaling of this system could be on a regional basis or the carrier could backhaul their entire network for this function to a single data or network operations center (NOC). With carrier plans to implement fiber based backhauls, this may be the most cost effective solution. However, reliability (or downtime) risks per number of listeners would be much higher. Multiple deployments on a regional scenario may be easier to manage from a business and technical implementation when supporting local vendors and local radio stations.



FIG. 4 is a more detailed diagram illustrating additional details for serving a single access point or tower (e.g., T1) as shown in connection with FIG. 3. A backhaul entry point B1, B2, B3, . . . Bn is provided for each radio station feed F1, F2, F3, . . . Fn targeted for a given tower. As discussed earlier, the entry point may be within the carrier's network or located at the radio station source (or any point in-between). At this entry point B1, . . . Bn, the streamed content is encrypted with a DRM key as shown by DRM key distribution 13 provided by the thin client aggregation server 11′. Keys may also be generated locally at the entry point, but this approach may require more management overhead in large networks. The encrypted internet radio content with the key is DRM locked and multicast IPv6 streamed as shown at S1, . . . Sn and output as shown by L1, . . . Ln to the given tower such as T1 for multicast availability by mobile playback devices 7. The encryption re-streaming function happens in real-time with minimal buffering that would add delay to the Internet radio station R1, . . . Rn broadcast.


As a client such as a user 14 having a mobile client playback device 7, such as but not limited to a smart phone including an iPhone®, joins the multicast, the key is used by a thin client plug-in 6′ to decrypt the signal (note that the term “thin client” as used herein simply refers to the fact that either a program or hardware device relies on having most or all of its functionality supplied by a network server). At the time of joining or dropping a multicast, the thin client plug-in 6′ sends a unicast response U1, . . . Un to the thin client aggregation server 11′. Information for the unicast response U1, . . . Un includes (but is not limited to) the following (see the broken line box labeled 15 in FIG. 4):

    • Unique mobile device identification (ID) (embedded serial number, media access control (MAC) address, etc.);
    • Multicast station ID (unique to radio station);
    • Tower ID (if common multi-cast address used between towers);
    • Timestamp;
    • Location of device via GPS (or other location identifying system); and
    • State of “turning on” or “turning off” given multicast.


For further security, the client may require the unicast response U1, . . . Un to be acknowledged by the thin client aggregation server 11′. This would keep the device from being hacked to intercept or block the responses to the thin client aggregation server 11′. Transmission control protocol (TCP) (layer-4) would satisfy this requirement.


The architecture of the thin client plug-in 6′ (i.e., executable) is protected such that the client cannot be (easily) modified. Even though the key is public, the actual encryption and decryption algorithms are kept proprietary. Alternately, the digital rights management (DRM) key may be encrypted. The internals of the plug-in 6′ would know how to decrypt the key. For a given carrier, a single type of plug-in with a single hidden key could be used. One skilled in the art would recognize many methods to use DRM to protect multicast transmission over the wireless network.


Finally, the unicast responses U1, . . . Un are aggregated at the thin client aggregation server 11′ and provided in one or more formats back to the radio station or other third parties as shown by feedback A. As shown by the broken line box labeled 16 in FIG. 4, the information fed back to the radio station includes, but is not limited to, tower ID, timestamp, channel selected, channel de-selected and channel GPS locations. However, individual device IDs remain private to the carrier's network (i.e., the thin client aggregation server 11′ must remain with the premises and control of the carrier or provider).



FIG. 5 illustrates a block diagram showing the basic operation of a thin client plug-in function according to an exemplary embodiment of the present invention. The actual implementation may be hardware, software, or firmware; or some combination thereof. The thin client functionally resides between the network interface, as shown at IPv6 network interface protocol stack 21 which communicates with the network server, and the playback function as shown at user device internet radio player function 22 of the user mobile device 7′ (in this case shown as a portable media device such as an iPod®). A staging buffer 20 or other memory function may be required allowing smooth transitions between tower T1 handoffs of the streamed content. The thin client plug-in 6′ serves as a controller primarily responsible for identifying the encrypted multicast shown as encrypted received multicast and key 17, obtaining the key from the multicast, and decrypting the signal before supplying the signal through decrypted playback path 18 to the staging buffer 20. To accomplish this, the thin client plug-in 6′ may be required to monitor all received multicasts 19. The thin client plug-in 6′ also has access to the device ID function 23, GPS location function 24, and real time clock function 25 resident to the device. This information is used as previously described for tagging of responses when joining (see reference line 26) or disconnecting from a multicast.



FIG. 6 is a flowchart showing the basic operation of the thin client plug-in 6′. The thin client plug-in 6′ operates between two basic modes or states, either a station “on” state or a station “off” state. In the station “on” state, the user mobile device 7′ is connected to a streamed multicast session from a given access point. Steps 4 through 8 are in a station “on” state operation. Steps 1 through 3, 9 and 10 are station “off” states. Each time a state transfers from one to the other (step 3 to “on”; or step 8 to “off”), the thin client plug-in 6′ identifies to the central service or centralized controller such as the thin client aggregation server 11′ the state change, device ID, device location, station ID, and tower ID. This thin client plug-in process may be active whenever the user mobile device 7′ is on, or only be activated through an internet radio (or other streaming media) application.


More specifically, in step 1 the thin client plug-in 6′ is activated. In step 2, the thin client plug-in 6′ retrieves the device ID 23. The thin client plug-in 6′ then checks for encrypted multicast 17. If no encrypted multicast 17 is received, then the thin client plug-in 6′ continues to check for encrypted multicast 17 (see step 3). If, on the other hand, the thin client plug-in 6′ finds an encrypted multicast 17, then the method proceeds to step 4, where the thin client plug-in 6′ receives the tower ID, the multicast or channel ID, and the DRM key.


Moreover, as noted above, when moving between step 3 and step 4, a change of state occurs and the thin client plug-in 6′ is now in a station “on” state. In step 5, the thin client plug-in 6′ begins the decryption and provides streamed content to the media player function 22. In step 6, the thin client plug-in 6′ retrieves the timestamp from the real-time clock 25 and GPS location 24. In step 7, the thin client plug-in 6′ transmits a unicast packet U1, . . . Un containing “state on” for the device ID, the tower ID, the timestamp, the GPS location, and the multicast or channel ID (see the broken line box labeled 15 in FIGS. 4 and 5). In step 8, the thin client plug-in 6′ then checks for discontinuation of the encrypted multicast 17. If the encrypted multicast 17 has not discontinued, then the thin client plug-in 6′ continues to check for such discontinuation of the encrypted multicast 17. On the other hand, if the thin client plug-in checks and finds that the encrypted multicast 17 has discontinued, then the method moves on to step 9. As noted above, when moving between step 8 and step 9, a change of state occurs and the thin client plug-in 6′ is now in a station “off” state.


In the station “off” state, the thin client plug-in 6′ then retrieves the timestamp from the real-time clock 25 and GPS location 24 as shown in step 9. In step 10, the thin client plug-in 6′ transmits a unicast packet U1, . . . Un containing “state off” for the device ID, the tower ID, the timestamp, the GPS location, and the multicast or channel ID (see the broken line box labeled 15 in FIGS. 4 and 5). The thin client plug-in operation then returns to a point just prior to step 3 to again check for an encrypted multicast 17.



FIG. 7 illustrates an example of a platform for a user mobile device 7″ for implementation of the present invention. The microprocessor 30 provides a controller for operation of the thin client plug-in. Volatile memory 31, such as random access memory (RAM) and non-volatile memory/storage 32 allow for temporary and long-term storage of associated applications and received content. Playback of the received internet radio station is supported by digital playback decompression circuitry 33, digital to analog conversion circuitry 34, equalizer and amplifier circuitry 35, a headphone interface 36, device ID 23′, GPS receiver 24′ and real time clock 25′. A user display 37, user interface 38 and battery 39 for device power would be typical of a smart phone or other mobile device with internet connectivity and content storage/playback functions. As the central entity, the microprocessor 30 provides interfaces to the Wide Area Network (WAN) 40, Local Area Network (LAN), and possibly Personal Area Network (PAN) 41. The WAN interface 40 allows for required on-line connections for receiving internet radio, and playback statistics reporting by the thin client.


EXAMPLE
Use-Case Ecosystem Showing a Scenario for Implementation of the Present Invention

With reference to FIGS. 8A and 8B, the following describes a exemplary scenario for implementation of the present invention utilizing ClearChannel and Verizon over an LTE network infrastructure:


1. As Verizon deploys LTE wireless technology through their network, they allocate in 10 Mbps (for each 100 Mbps of 20 MHz spectrum) for streaming multicast internet radio.


2. ClearChannel enters a business relationship with Verizon to use up to 2 Mbps of streaming bandwidth from each of Verizon's LTE tower access points in the real-time transport protocol (RTP) area for internet radio distribution as a customized simulcast option to their existing terrestrial radio broadcasts.


3. ClearChannel subdivides the leased 2 Mbps into 15 independent radio stations on each LTE tower access point streaming at 128 kbps per station. ClearChannel groups these 15 stations into 5 jazz, 5 country, and 5 rock formats. Example for the genres of the 5 rock formats could be (1) classic rock, (2) big-hair, (3) pop rock, (4) alternative, and (5) indie.


4. ClearChannel provides a per tower per station internet radio capability as shown in FIG. 8A. Key components and functionality include playlist generation/scheduling P1, . . . Pn, content fetch/queue CFQ1, . . . CFQn, DJ snippet fetch/queue SFQ1, . . . SFQn, geographic based ad fetch/queue GFQ1, . . . GFQn, final mixing/internet protocol (IP) streaming FMS1, . . . FMSn, and royalty calculation RC1, . . . RCn. Centralized or distributed servers X1, X2 and X3 house this shared content for music, disc jockey (DJ) snippets or segments and ads, respectively.


5. Each radio channel receives a playlist strategy (i.e., classic rock, etc.) from which a playlist and time-of-play scheduling is generated. As an alternate embodiment, a single playlist may be generated for each station type for common station use with each LTE tower (i.e., all LTE towers would have the same classic rock playlist and time of play schedule. This scenario allows listeners to seamlessly transition between LTE towers while listening to a song on a given station. Metadata and timestamps are used by each of the fetch functions to retrieve music, DJ, and ad content just prior to final mixing and streaming towards the Verizon LTE backhaul network. Even though a single playlist is used between towers, the DJ and ad content would be different. (i.e., Clients may be required to have a buffering function to keep skips from happening during tower T1 transition while DJ snippets or ads are being played.)


6. As Verizon receives each stream radio station B1, . . . Bn for each tower T1, . . . Tn, the content is encrypted as previously described for FIG. 4 (and shown again in FIG. 8B). After encryption, the content is re-streamed via multicast functionality of the LTE carrier network. In addition to the encrypted content, the DRM key is routinely sent with the multicast. Each radio station may have its own unique multicast (i.e., multicast address) or all stations (or groups of stations) may be within a single multicast with sub-channel identifiers on a per station basis.


7. Each Verizon customer (user 14) that wishes to listen to internet radio on the LTE network must download (or have installed) the thin client plug-in 6′ as described in FIG. 5. The encryption is matched to only operate with this plug-in when the key is provided. Since the radio stations are ad supplemented, the plug-ins are provided at no or minimal charge and all plug-ins are identical (at least in functionality). Plug-ins may have to be customized on a per type of handset basis, but not on a per user basis (i.e., Hardware/firmware specifics of a Nokia handset may require a different plug-in than a Motorola handset).


8. As a given Verizon customer selects internet radio, the steps of FIG. 6 execute to produce the unicast responses U1, . . . Un back to the thin client aggregation server 11′ described in FIG. 4. In summary, the thin client aggregation server 11′ will receive an indication and GPS location from the thin client plug-in 6′ whenever a listener tunes to or from one of the 15 ClearChannel internet radio stations. Alternately, for long listening sessions, the thin client may send location updates, even if the station has not changed (not shown in FIG. 4).


9. The thin client aggregation server 11′ summaries these received statistics for each radio station and returns the data as shown by feedback A to the radio station function for royalty calculations and listener locations/densities for identifying appropriate ads. These statistics may be continuously transmitted back to the radio station or provided on a per request basis (i.e., the station may request the number of listeners between two timestamps for calculating royalty fees on a given song). For ad selection, the station may also request a specific number of listeners within a certain geographic defined region at a certain time. For example, a given vendor may have a rule set such that if more than 20 listeners are within a one mile radius of their restaurant, they will pay to fill an ad slot. Specific shapes may be used in the rule determination as described in U.S. application Ser. No. 12/189,861 entitled “Method for Location Based Advertising Based on Binding Bids to User Defined Arbitrary Shapes”. In this particular embodiment, the aggregation server 11′ would aggregate the unicast responses U1, . . . Un based upon a custom defined geographic shape by each radio station. The information fed back to the radio station would also include the identification of the custom defined geographic shape.


10. In addition to providing feedback as at A to the radio station, Verizon's aggregation server 11′ may give direct feedback to vendors. For example, the restaurant vendor may receive notification short message service (SMS) text or other means when their ad is played and the number of listeners within the radius at ad play. The vendor may then light up an electronic billboard in front of the restaurant welcoming listeners of the specific ClearChannel classic rock radio station. Alternatively, an inspiring young entrepreneur may subscribe to receive notification of all ads and numbers of listeners from all of ClearChannel's radio stations at a given geographic location. The entrepreneur has an arrangement with one or more vendors to twirl signs on a street corner when their ads play one or more of the radio stations.


From the above-described use case Example, assuming a 10% bandwidth reservation for internet radio by wireless carriers and a potential 2% royalty, this would potentially yield a $2 M license opportunity for each $1 B of wireless data revenue for a given carrier.


Additionally, the collection and usage of the aggregated statistics on a per tower basis and the ability to stream unique playlists and localized vendor ads to the tower may also generate licensing opportunities directly to large radio station owners.


The present invention has substantial opportunity for variation without departing from the spirit or scope of the present invention. For example, while the embodiments discussed herein are directed to a common secure client, the present invention is not limited thereto. A more secure scenario could use unique-to-device clients for secure decryption thereby leveraging the satellite radio protection scheme. However, per device overhead and maintenance would be much higher that with a common secure client. Moreover, instead of GPS location determination; tower triangulation or an alternate localized position system could be used.


It should be emphasized that the above-described embodiments of the invention are merely possible examples of implementations set forth for a clear understanding of the principles of the invention. Variations and modifications may be made to the above-described embodiments of the invention without departing from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of the invention and protected by the following claims.

Claims
  • 1. A method comprising: encrypting a plurality of real time media content streams to provide a corresponding plurality of encrypted real time media content streams;multicasting the plurality of encrypted real time media content streams via a wireless network; anddetermining whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state.
  • 2. The method of claim 1 wherein determining whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state includes aggregating information that does not include device IDs of the plurality of user devices.
  • 3. The method of claim 1 wherein determining whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state includes determining information that, for each user device of the plurality of user devices, identifies one of the plurality of encrypted real time media content streams to which the user device has connected or identifies one of the plurality of encrypted real time media content streams from which the user device has disconnected.
  • 4. The method of claim 3 wherein determining whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state includes determining information including, for each user device of the plurality of user devices, one or more of a group consisting of: a location of the user device, a tower ID, and a timestamp.
  • 5. The method of claim 1, wherein the information provided back to the Internet radio as the streaming media source includes at least one of a radio tower identification (ID), a timestamp, a channel selected, a channel de-selected, or a channel global positioning system (GPS) location.
  • 6. The method of claim 1, wherein the user device comprises a mobile device.
  • 7. The method of claim 6, wherein each of the unicast responses from the mobile device further includes at least one of a unique mobile device identification (ID) or a location coordinate of the mobile device.
  • 8. The method of claim 7, wherein the location coordinate is determined via a global positioning system (GPS).
  • 9. The method of claim 6, wherein the mobile device is one of a smart phone or a portable media device.
  • 10. The method of claim 1, wherein the wireless network comprises a bandwidth constrained wide area network (WAN) connected IPv6 mobile network.
  • 11. The method of claim 1, wherein the streamed encrypted media content is encrypted with a digital rights management (DRM) key.
  • 12. A system comprising: one or more servers adapted to: encrypt real time streamed media content from a streaming media source; andmulticast the streamed encrypted media content for availability to a plurality of user devices; andan aggregation service adapted to determine whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state.
  • 13. The system of claim 12, wherein the streaming media source is an Internet radio source.
  • 14. The system of claim 12, wherein at least some of the plurality of user devices are mobile devices.
  • 15. The method of claim 14, wherein each of the unicast responses from the mobile device further includes a unique mobile device identification (ID), a location coordinate of the mobile device, a streaming media source ID request, and a timestamp.
  • 16. The system of claim 14, wherein the aggregation service is adapted to determine whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state by receiving unicast responses from each of the mobile devices that include at least one of a unique mobile device identification (ID) or a location coordinate of the mobile device.
  • 17. The system of claim 14, wherein the aggregation service is adapted to determine whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state by receiving unicast responses from each of the mobile devices that include a unique mobile device identification (ID), a location coordinate of the mobile device, a streaming media source ID request, and a timestamp.
  • 18. The system of claim 14, wherein each of the mobile devices is one of a smart phone or a portable media device.
  • 19. The system of claim 12, wherein the wireless network comprises a bandwidth constrained wide area network (WAN) connected IPv6 mobile network.
  • 20. The non-transitory computer readable medium storing a computer program, executable by a machine, the computer program comprising executable instructions for: encrypting a plurality of real time media content streams to provide a corresponding plurality of encrypted real time media content streams;multicasting the plurality of encrypted real time media content streams via a wireless network; anddetermining whether one or more of a plurality of user devices receiving the multicast is in a connect multicast state or a disconnect multicast state.
RELATED APPLICATIONS

This patent application is a continuation of U.S. patent application Ser. No. 13/036,676, filed Feb. 28, 2011, entitled, “PROTECTED DISTRIBUTION AND LOCATION BASED AGGREGATION SERVICE,” which is a continuation of U.S. patent application Ser. No. 12/314,324, filed Dec. 8, 2008, entitled “PROTECTED DISTRIBUTION AND LOCATION BASED AGGREGATION SERVICE,” the disclosure of which is hereby incorporated herein by reference in its entirety.

US Referenced Citations (235)
Number Name Date Kind
3993955 Belcher et al. Nov 1976 A
4054911 Fletcher et al. Oct 1977 A
4058830 Guinet et al. Nov 1977 A
4099258 Parsons Jul 1978 A
4155042 Permut et al. May 1979 A
4155662 Maroth May 1979 A
4311876 Endo et al. Jan 1982 A
4322854 Bundens et al. Mar 1982 A
4323921 Guillou Apr 1982 A
4361848 Poignet et al. Nov 1982 A
4380821 Eckhardt Apr 1983 A
4420833 Noirel Dec 1983 A
4450477 Lovett May 1984 A
4450481 Dickinson May 1984 A
4598385 Kessels et al. Jul 1986 A
4600921 Thomas Jul 1986 A
4602279 Freeman Jul 1986 A
4677686 Hustig et al. Jun 1987 A
4680629 Fukushima et al. Jul 1987 A
4686564 Masuko et al. Aug 1987 A
4734764 Pocock et al. Mar 1988 A
4757371 Nozawa et al. Jul 1988 A
4758959 Thoone et al. Jul 1988 A
4783654 Ichikawa Nov 1988 A
4818987 Ide et al. Apr 1989 A
4829372 McCalley et al. May 1989 A
4860379 Schoeneberger et al. Aug 1989 A
4862513 Bragas Aug 1989 A
4868866 Williams, Jr. Sep 1989 A
4894789 Yee Jan 1990 A
4903212 Yokouchi et al. Feb 1990 A
4907159 Mauge et al. Mar 1990 A
4951211 De Villeroche Aug 1990 A
4975693 Davis et al. Dec 1990 A
4975694 McLaughlin et al. Dec 1990 A
5020143 Duckeck et al. May 1991 A
5036537 Jeffers et al. Jul 1991 A
5065452 Duckeck et al. Nov 1991 A
5070404 Bullock et al. Dec 1991 A
5095532 Mardus Mar 1992 A
5101510 Duckeck Mar 1992 A
5111400 Yoder May 1992 A
5121430 Ganzer et al. Jun 1992 A
5126941 Gurmu et al. Jun 1992 A
5155591 Wachob Oct 1992 A
5164904 Sumner Nov 1992 A
5173691 Sumner Dec 1992 A
5181208 Duckeck Jan 1993 A
5182555 Sumner Jan 1993 A
5193214 Mardus et al. Mar 1993 A
5206641 Grant et al. Apr 1993 A
5257023 Furuya Oct 1993 A
5260778 Kauffman et al. Nov 1993 A
5265024 Crabill et al. Nov 1993 A
5274387 Kakihara et al. Dec 1993 A
5276909 Milner et al. Jan 1994 A
5293163 Kakihara et al. Mar 1994 A
5303401 Duckeck et al. Apr 1994 A
5315295 Fujii May 1994 A
5317311 Martell et al. May 1994 A
5345606 Duckeck et al. Sep 1994 A
5345607 Liman et al. Sep 1994 A
5369588 Hayami et al. Nov 1994 A
5406490 Braegas Apr 1995 A
5432542 Thibadeau et al. Jul 1995 A
5438687 Suchowerskyj et al. Aug 1995 A
5493692 Theimer et al. Feb 1996 A
5565909 Thibadeau et al. Oct 1996 A
5652841 Nemirovsky et al. Jul 1997 A
5752177 Siegle et al. May 1998 A
5754939 Herz et al. May 1998 A
5784691 Ruhl Jul 1998 A
5796727 Harrison et al. Aug 1998 A
5903901 Kawakura et al. May 1999 A
5933094 Goss et al. Aug 1999 A
5949776 Mahany et al. Sep 1999 A
5987382 Weishaupt et al. Nov 1999 A
6014090 Rosen et al. Jan 2000 A
6049711 Ben-Yehezkel et al. Apr 2000 A
6185427 Krasner et al. Feb 2001 B1
6212392 Fitch et al. Apr 2001 B1
6223286 Hashimoto Apr 2001 B1
6240069 Alperovich et al. May 2001 B1
6259381 Small Jul 2001 B1
6259405 Stewart et al. Jul 2001 B1
6295528 Marcus et al. Sep 2001 B1
6326918 Stewart Dec 2001 B1
6349203 Asaoka et al. Feb 2002 B1
6438561 Israni et al. Aug 2002 B1
6456234 Johnson Sep 2002 B1
6505046 Baker Jan 2003 B1
6529136 Cao et al. Mar 2003 B2
6539232 Hendrey et al. Mar 2003 B2
6542750 Hendrey et al. Apr 2003 B2
6552682 Fan Apr 2003 B1
6571279 Herz et al. May 2003 B1
6618593 Drutman et al. Sep 2003 B1
6647257 Owensby Nov 2003 B2
6650902 Richton Nov 2003 B1
6675015 Martini et al. Jan 2004 B1
6675268 DeKoning et al. Jan 2004 B1
6813654 Ishibashi Nov 2004 B1
6853841 St. Pierre Feb 2005 B1
6876642 Adams et al. Apr 2005 B1
6882853 Meyers Apr 2005 B2
6937860 Jahn Aug 2005 B2
6947571 Rhoads et al. Sep 2005 B1
6954443 Forstadius et al. Oct 2005 B2
6970703 Fuchs et al. Nov 2005 B2
6975266 Abraham et al. Dec 2005 B2
6985694 De Bonet et al. Jan 2006 B1
6990497 O'Rourke et al. Jan 2006 B2
7020710 Weber et al. Mar 2006 B2
7035618 Schnurr Apr 2006 B2
7035912 Arteaga Apr 2006 B2
7047315 Srivastava May 2006 B1
7085571 Kalhan et al. Aug 2006 B2
7134040 Ayres Nov 2006 B2
7171018 Rhoads et al. Jan 2007 B2
7200638 Lake Apr 2007 B2
7203753 Yeager et al. Apr 2007 B2
7206568 Sudit Apr 2007 B2
7218611 Mimura et al. May 2007 B2
7240106 Cochran et al. Jul 2007 B2
7249367 Bove, Jr. et al. Jul 2007 B2
7260638 Crosbie Aug 2007 B2
7269854 Simmons et al. Sep 2007 B2
7272357 Nishiga et al. Sep 2007 B2
7319379 Melvin Jan 2008 B1
7320069 Sundharraj et al. Jan 2008 B1
7340768 Rosenberger Mar 2008 B2
7343160 Morton Mar 2008 B2
7359894 Liebman et al. Apr 2008 B1
7373109 Pohja et al. May 2008 B2
7395031 Ritter Jul 2008 B1
7484103 Woo et al. Jan 2009 B2
7509131 Krumm et al. Mar 2009 B2
7512702 Srivastava et al. Mar 2009 B1
7516212 Nguyen et al. Apr 2009 B2
7620404 Chesnais et al. Nov 2009 B2
7668832 Yeh et al. Feb 2010 B2
7684815 Counts et al. Mar 2010 B2
7688756 Allan et al. Mar 2010 B2
7920876 Rahman Apr 2011 B2
7921223 Evans et al. Apr 2011 B2
8180911 Banet et al. May 2012 B2
8463931 Evans et al. Jun 2013 B2
20010039659 Simmons et al. Nov 2001 A1
20010048449 Baker Dec 2001 A1
20020019829 Shapiro Feb 2002 A1
20020044067 Ilcisin Apr 2002 A1
20020086659 Lauper Jul 2002 A1
20020086676 Hendrey et al. Jul 2002 A1
20020171581 Sheynblat et al. Nov 2002 A1
20020184339 Mackintosh et al. Dec 2002 A1
20030022675 Mergler Jan 2003 A1
20030050062 Chen et al. Mar 2003 A1
20030065721 Roskind Apr 2003 A1
20030083931 Lang May 2003 A1
20030229549 Wolinsky et al. Dec 2003 A1
20040117500 Lindholm et al. Jun 2004 A1
20040148393 Breiter et al. Jul 2004 A1
20040160307 Saikkonen et al. Aug 2004 A1
20040225519 Martin Nov 2004 A1
20040254886 Siepen et al. Dec 2004 A1
20050015800 Holcomb Jan 2005 A1
20050021369 Cohen et al. Jan 2005 A1
20050033780 Simelius et al. Feb 2005 A1
20050038876 Chaudhuri Feb 2005 A1
20050059379 Sovio et al. Mar 2005 A1
20050060350 Baum et al. Mar 2005 A1
20050071221 Selby Mar 2005 A1
20050160270 Goldberg et al. Jul 2005 A1
20050174975 Mgrdechian et al. Aug 2005 A1
20050197846 Pezaris et al. Sep 2005 A1
20050198097 Kalnitsky Sep 2005 A1
20050245233 Anderson Nov 2005 A1
20050251453 Lu Nov 2005 A1
20050251565 Weel Nov 2005 A1
20050251566 Weel Nov 2005 A1
20050251576 Weel Nov 2005 A1
20050251807 Weel Nov 2005 A1
20050261001 Marley et al. Nov 2005 A1
20050272413 Bourne Dec 2005 A1
20050280557 Jha et al. Dec 2005 A1
20060059142 Zvinyatskovsky et al. Mar 2006 A1
20060085419 Rosen Apr 2006 A1
20060085821 Simmons et al. Apr 2006 A9
20060099963 Stephens May 2006 A1
20060123080 Baudino et al. Jun 2006 A1
20060149628 Chefalas et al. Jul 2006 A1
20060149631 Brazell et al. Jul 2006 A1
20060167985 Albanese et al. Jul 2006 A1
20060168264 Baba et al. Jul 2006 A1
20060218225 Hee Voon et al. Sep 2006 A1
20060223518 Haney Oct 2006 A1
20060229939 Bhakta et al. Oct 2006 A1
20060269058 Kessler et al. Nov 2006 A1
20060271281 Ahn et al. Nov 2006 A1
20060287915 Boulet et al. Dec 2006 A1
20070077942 Heaven et al. Apr 2007 A1
20070121843 Atazky et al. May 2007 A1
20070136132 Weiser et al. Jun 2007 A1
20070147411 Bijwaard et al. Jun 2007 A1
20070168254 Steelberg et al. Jul 2007 A1
20070168655 Thomasson et al. Jul 2007 A1
20070174243 Fritz Jul 2007 A1
20070205276 Sodan et al. Sep 2007 A1
20070218867 Mononen et al. Sep 2007 A1
20070249327 Nurmi Oct 2007 A1
20070260508 Barry et al. Nov 2007 A1
20070260720 Morain Nov 2007 A1
20070271136 Strauss et al. Nov 2007 A1
20070281689 Altman et al. Dec 2007 A1
20080016205 Svendsen Jan 2008 A1
20080033809 Black et al. Feb 2008 A1
20080081638 Boland et al. Apr 2008 A1
20080097999 Horan Apr 2008 A1
20080133484 Yamamoto Jun 2008 A1
20080148175 Naaman et al. Jun 2008 A1
20080182591 Krikorian Jul 2008 A1
20080208652 Srivastava Aug 2008 A1
20080250337 Lemmela et al. Oct 2008 A1
20080268822 Johnson et al. Oct 2008 A1
20080288375 Uhrig et al. Nov 2008 A1
20080307108 Yan et al. Dec 2008 A1
20080312946 Valentine et al. Dec 2008 A1
20090030999 Gatzke et al. Jan 2009 A1
20090055229 Lidgren et al. Feb 2009 A1
20090085724 Naressi et al. Apr 2009 A1
20090315670 Naressi et al. Dec 2009 A1
20100015991 Evans et al. Jan 2010 A1
20100041419 Svendsen et al. Feb 2010 A1
20100146135 Evans et al. Jun 2010 A1
20120066488 Evans et al. Mar 2012 A1
Foreign Referenced Citations (12)
Number Date Country
2399928 Sep 2004 GB
8005861 May 1982 NE
WO 9005969 May 1990 WO
WO 9013882 Nov 1990 WO
WO 9107029 May 1991 WO
WO 9114154 Sep 1991 WO
WO 9905877 Feb 1999 WO
WO 0003830 Jan 2000 WO
WO 0124551 Apr 2001 WO
WO 0229506 Apr 2002 WO
WO 02062092 Aug 2002 WO
WO 2006082566 Aug 2006 WO
Non-Patent Literature Citations (61)
Entry
“3GPP,” Wikipedia, at <http://en.wikipedia.org/wiki/3GPP>, as revised Mar. 27, 2008, printed Dec. 12, 2011, 1 page.
“4G,” Wikipedia, at <htpp://en.wikipedia.org/wiki4G>, as revised Apr. 23, 2008, printed Dec. 12, 2011, 1 page.
Tsuzawa, M. et al., “Advanced Mobile Traffic Information and Communication System ” AMTICS Vehicle Navigation and Information Systems Conference, 1989, Conference Record, Sep. 11-13, 1989, Toronto, Ontario, Canada, pp. 475-483, published by IEEE, 10 pages.
Plaintiff Ambato Media, LLC's Opening Claim Construction Brief filed on Apr. 26, 2011, in Civil Action No. 2:09-CV-242 (TJW), 40 pages.
Memorandum Opinion and Order issued on Jul. 18, 2011, in Civil Action No. 2:09-CV 242 (TJW), 26 pages.
“Anthem—Overview,” at <http://www.intercastingcorp.com/platform/anthem>, copyright 2004-2007, Intercasting Corp., printed Jan. 16, 2008, 2 pages.
“Apple—iPod classic,” at <http://www.apple.com/ipodclassic/>, printed Oct. 26, 2007, 1 page.
Thoone, Martin L. G. et al., “Application of the Compact Disc in Car Information and Navigation Systems,” SAE Technical Paper Series, International Congress & Exposition, Feb. 1, 1984, pp. 105-111, published by SAE International, 8 pages.
Gordon, Robert L., “Architectures for In-Vehicle Navigation Systems Displaying Real Time Traffic Condition Information,” Vehicle Navigation & Information Systems Conference, Sep. 11-13, 1989, Toronto, Ontario, Canada, pp. 119-124, published by IEEE, 7 pages.
“Bluetooth.com—Learn,” http://www.bluetooth.com/Bluetooth/Learn/, copyright 2007 Bluetooth SIG, Inc., printed Oct. 26, 2007, 1 page.
Challe, Philippe, “CARMINAT,” An Integrated Information and Guidance System, Vehicle Navigation & Information Systems Conference Proceedings, Oct. 20-23, 1991, pp. 137-145, published by IEEE, 11 pages.
“CEN/TC 278 Project Team 12 M-270 Phase 1: Standards for Road Transport and Traffic Telematics: Annexes,” May 1999, published by Information & Communications Technologies (ICT) Standards Board, Intelligent Transport Systems Steering Group (ITSSG), printed Oct. 9, 2003, 48 pages.
Weld, Robert B., “Communications Flow Considerations in Vehicle Navigation and Information Systems,” Vehicle Navigation and Information Systems Conference, Sep. 11-13, 1989, Toronto, Ontario, Canada, Conference Record, pp. 373-375, published by IEEE, 4 pages.
“Dating Service—Singles, Personals and Love, Match.com,” http://www.match.com/, copyright 2008 Match.com, printed Jan. 16, 2008, 2 pages.
Defendants Garmin International, Inc.'s DPH Holdings Corp.'s, and Nextar, Inc.'s Responsive Claim Construction Brief filed on May 10, 2011, in Civil Action No. 2:09-CV 242 (TJW), 44 pages.
Markowetz, A. et al., “Design and Implementation of a Geographic Search Engine,” Eighth International Workshop on the Web and Databases (WebDB 2005), Jun. 16-17, 2005, Baltimore, Maryland, at <http://cis.poly.edu/suel/papers/geo.pdf>, 6 pages.
Shibano, Yoshizo et al., “Development of Mobile Communication System for RACS,” Vehicle Navigation and Information Systems Conference, Sep. 11-13, 1989, Toronto, Ontario, Canada, Conference Record, pp. 376-383, published by IEEE, 9 pages.
“Digital rights management,” at <http://en.wikipedia.org/wiki/Digital—rights—management>, includes information dating back to 1998, page last modified Apr. 16, 2011, printed Apr. 21, 2011, 21 pages.
“dodgeball.com :: mobile social software,” at <http://www.dodgeball.com/>, copyright 2008, Google Inc., printed Jan. 16, 2008, 1 page.
Cowling, James, “Dynamic Location Management in Heterogeneous Cellular Networks,” Thesis under Dr. Bjorn Landfeldt, Advanced Networks Research Group, School of Information Technologies, University of Sydney, Sydney, Australia, Oct. 2004, 155 pages.
“eHarmony,” http://eharmony.com/, copyright 2000-2008 eHarmony.com, printed Jan. 16, 2008, 1 page.
“flickr,” http://www.flickr.com/, copyright 2008 Yahoo! Inc., printed Jan. 16, 2008, 1 page.
“Friendster—Home,” http://www.friendster.com/, copyright 2002-2007 Friendster, Inc., printed Jan. 16, 2008, 1 page.
“Google AdWords: Regional and Local Targeting,” https://adwords.google.com/select/targeting.html, copyright 2008 Google, printed Jul. 17, 2008, 1 page.
“Google Talk,” http://www.google.com/talk/, copyright 2008 Google, printed Jan. 16, 2008, 1 page.
“iChat. Not being there is half the fun,” http://www.apple.com/macosx/features/ichat.html, printed Jan. 16, 2008, 1 page.
“icq,” http://www.icq.com/, copyright 1998-2008 ICQ Inc., printed Jan. 16, 2008, 2 pages.
“IEEE 802.11—WIkipedia, the free encyclopedia,” http://en.wikipedia.org/wiki/IEEE—802.11, printed Oct. 26, 2007, 5 pages.
Fukui, Ryotaro et al., “Individual Communication Function of RACS: Road Automobile Communication System,” Vehicle Navigation and Information Systems Conference, Sep. 11-13, 1989, Toronto, Ontario, Canada, pp. 206-213, published by IEEE, 9 pages.
Frank, Daniel L., “Information Systems: An Integral Part of Future Vehicles,” Proceedings of the Position Location and Navigation Symposium (PLANS '90), Mar. 20-23, 1990, Las Vegas, Nevada, pp. 52-55, published by IEEE, 5 pages.♂
“Instant Messenger—AIM—Instant Message Your Online Buddies for Free—AIM,” http://dashboard.aim.com/aim, copyright 2007 AOL LLC, printed Nov. 8, 2007, 6 pages.
“Internet Relay Chat—Wikipedia, the free encyclopedia,” http://en.wikipedia.org/wiki/IRC, printed Nov. 16, 2007, 11 pages.
“IP Multimedia Subsystem,” http://en.wikipedia.org/wiki/IP—Multimedia—Subsystem, printed Jul. 8, 2009, 11 pages.
“IPv6,” Wikipedia, at <http://en.wikipedia.org/wiki/lPv6>, includes information that dates back to the early 1980s, page last modified Apr. 18, 2011, printed Apr. 21, 2011, 16 pages.
“Jabber SoftwareFoundation,” http://www.jabber.org/, copyright 1999-2005 the Jabber Software Foundation, printed Jan. 16, 2008, 3 pages.
Declaration of Allan A. Kassenoff in Support of Defendants Garmin International, Inc.'s DPH Holdings Corp.'s, and Nextar, Inc.'s Responsive Claim Construction Brief filed on May 10, 2011, in Civil Action No. 2:09-CV-242 (TJW), 79 pages.
Dutta, et al., “MarconiNet supporting Streaming Media over Localized Wireless Multicast,” International Workshop of Mobile E-Commerce, Sep. 28, 2002, Atlanta, Georgia, 9 pages.
“Mobile community, free sms, mobile dating, text flirting and friends networking-playtxt . . . ,” http://web.archive.org/web/20070225125113rn—1/www.playtxt.net/playtxt.do, printed Jan. 16, 2008, 1 page.
Kumar, Vijay, “Mobile Computing—Cellular Technology,” Computer Science Department, University of Missouri—Kansas City, Kansas City, Missouri, date unknown, youngest reference is dated 2001, found at <http://k.web.umkc.edu/kumarv/cs572/cellular-technology.pdf>, 8 pages.
“Multicast,” Wikipedia, at <http://en.wikipedia.org/wiki/Multicast>, includes information that dates back to 2005, page last modified Mar. 26, 2011, printed Apr. 21, 2011, 5 pages.
“MySpace,” at <http://www.myspace.com/>, copyright 2003-2008, MySpace.com, printed Jan. 16, 2008, 2 pages.
Ikeda, M. et al., “New Navigation System, MAPIX-III,” Proceedings of the 16th ISATA, 16th International Symposium on Automotive Technology & Automation with particular reference to automotive micro-electronics vehicle management systems and computer-aided testing, May 11-15, 1987, Florence, Italy, pp. 63-80, published by Automotive Automation, Ltd., Croydon, England, 19 pages.
“Online adult dating service and personals—Lavalife—Where Singles Click,” at <http://lavalife.com/>, copyright 2006, Lavalife Corp., printed Jan. 16, 2008, 1 page.
Scrase, Adrian, “Overview of the Current Status of 3GPP LTE,” Presentation Slides, ETSI, World Class Standards, Mobile World Congress, Feb. 11-14, 2008, Barcelona, Spain, 20 pages.
Farradyne Systems, Inc., “Pathfinder Final Report—Draft—vol. I—Pathfinder System, prepared for: Federal Highway Administration,” May 1, 1991, 51 pages.
Mammano, Frank J. et al., “Pathfinder Status and Implementation Experience,” Vehicle Navigation and Information Systems Conference, 1991, Oct. 20-23, 1991, pp. 407-413, published by IEEE, 9 pages.
Mammano, F. et al., “Pathfinder System Design,” Vehicle Navigation and Information Systems Conference, 1989, Conference Record, Sep. 11-13, 1989, Toronto, Ontario, Canada, pp. 484-488, published by IEEE, 6 pages.
“Rabble—Social networking for your phone,” http://www.rabble.com/, copyright 2005-2008 Intercasting Corp., printed Jan. 16, 2008, 1 page.
Ely, S. R., “RDS-Alert: A DRIVE project to develop a proposed standard for the Traffic Message Channel feature of the Radio System RDS,” IEE Colloquium on Car and its Environment: What DRIVE and PROMETHEUS Have to Offer, Jan. 25, 1990, London, United Kingdom, pp. 8/1-8/6, published by IEEE, 7 pages.
“RITA—Intelligent Transportation Systems—USDOT,” at <http://www.its.dot.gov/faqs.htm>, printed Oct. 13, 2011, 4 pages.
“Service Guide for Mobile Broadcast Services,” Candidate Version 1.0, Feb. 26, 2008, Open Mobile Alliance, copyright 2008, Open Mobile Alliance Ltd., found at <http://www.openmobilealliance.org/Technical/release—program/docs/BCAST/V1—0-20080226-C/OMA-TS-BCAST—Service—Guide-V1—0-20080226-C.pdf>, printed Apr. 18, 2011, pp. 1-217.
“SmallPlanet: Home,” http://web.archive.org/web/20061105030323/http://www.smallplanet.net/, copyright 2005 SmallPlanet.net, printed Jan. 16, 2008, 1 page.
Davies, Peter et al., “Standards for the Radio Data System, Traffic Message Channel,” Future Transportation Technology Conference and Exposition, Aug. 7-10, 1989, Vancouver, British Columbia, Canada, pp. 105-115, published in the SAE Technical Paper Series, copyright 1989, Society of Automotive Engineers, Inc., 16 pages.
“Technology—Geo Targeting,” http://www.invidi.com/pages/itc—technology—05.html, copyright 2007, printed Nov. 18, 2008, 1 page.
Krage, Mark K., “The TravTek Driver Information System,” Vehicle Navigation and Information Systems Conference, Oct. 20-23, 1991, pp. 739-748, published by IEEE, 12 pages.
Rillings, James H. et al., “TravTek,” Vehicle Navigation and Information Systems Conference, Oct. 1991, Warrandale, Pennsylvania, published Oct. 1, 1991, pp. 729-737, published by Society of Automotive Engineers, Inc., Warrendale, Pennsylvania, 10 pages.
Blumentritt, C. W. et al., “TravTek architecture evaluation,” Jul. 1995, published by Federal Highway Administration, Springfield, VA: available through the National Technical Information Service, 1995, 251 pages.
“Windows Live Messenger—Overview,” http://get.live.com/messenger/overview, copyright 2007 Microsoft Corp., printed Nov. 28, 2007, 1 page.
“Yahoo! Messenger—Chat, Instant message, SMS, PC Calls and More,” http://messenger.yahoo.com/webmessengerpromo.php, copyright 2007 Yahoo! Inc., printed Oct. 26, 2007, 1 page.
“Yahoo! Personals,” http://personals.yahoo.com/us/homepage/splash, copyright 2008 Yahoo! Inc., printed Jan. 16, 2008, 2 pages.
“Zune,” http://www.zune.net/en-US/, copyright 2008 Microsoft Corporation, printed Jan. 16, 2008, 1 page.
Related Publications (1)
Number Date Country
20130283036 A1 Oct 2013 US
Continuations (2)
Number Date Country
Parent 13036676 Feb 2011 US
Child 13914175 US
Parent 12314324 Dec 2008 US
Child 13036676 US