1. Field of the Invention
This invention relates generally to wireless telecommunications. More particularly, it relates to improved integration, provisioning, and provisioning of two-way data communication services with vehicle piconet devices, including In-Car Navigation Systems, Personal Navigation Devices and Ultra-Mobile PCs.
2. Background of the Related Art
This invention relates to provisioning of two-way data communication services with vehicle piconet devices, including In-Car Navigation Systems, Personal Navigation Devices and Ultra-Mobile PCs. Some conventional techniques include the use of an embedded communications module. An embedded communications module (ECM) provides a dedicated data communications module within a mobile device and vehicle hardware. But the cost of ECM hardware is a problem as is the cost of the data connection. Solutions that have used this approach tend to cost consumers $10-$12 per month, which is too high for many consumers. Moreover, the cost of provisioning and managing SIMs and accounts also adds to the cost of the solution.
Other companies have used a modem within a mobile phone to provide a data service, thus making use of a mobile phone as a modem. A mobile phone used as a modem is typically offered by wireless operators for consumers to connect their PC to the Internet. However, these solutions have high priced data plans, typically $30 to $60/month, and thus most consumers do not purchase this option for their mobile phones. This solution can also be difficult to configure, and does not provide a way to provide granular management of bandwidth and services. Moreover, access can only be turned on or off for all services.
Still other conventional solutions have deployed data over voice techniques, e.g., Airbiquity™ data over voice solution; embedded data communications modules; and M2M service providers such as Jasper wireless. Unfortunately, data over voice solutions are typically very low bandwidth and not suitable for many applications.
In accordance with the principles of the present invention, a method of provisioning a wireless phone from a network server to autonomously reject a given URL requested by a piconet device connected to the wireless phone comprises compiling a black list of universal resource locator (URL) addresses to a wireless phone. The black list relates to at least one URL that can be requested by a piconet device connected to the wireless phone. The black list of URLs is provided to the wireless phone from a network server via a wireless phone connection. In this way, the wireless phone can autonomously reject a request by the piconet device to a given URL in the black list.
A method of provisioning a wireless phone from a network server to autonomously permit a given URL requested by a piconet device connected to the wireless phone in accordance with another aspect of the invention comprises compiling a white list of universal resource locator (URL) addresses to a wireless phone. The white list relates to at least one URL that can be requested by a piconet device connected to the wireless phone. The white list of URLs is provided to the wireless phone from a network server via a wireless phone connection, whereby the wireless phone can autonomously permit and pass on a request by the piconet device to a given URL in the white list.
In accordance with yet another method of provisioning a wireless phone from a network server to autonomously redirect a given URL requested by a piconet device connected to the wireless phone comprises compiling a redirect list of universal resource locator (URL) addresses to a wireless phone. The redirect list relates to at least one URL that can be requested by a piconet device connected to the wireless phone. The redirect list of URLs is provided to the wireless phone from a network server via a wireless phone connection. In this way, the wireless phone can autonomously pass on a request by the piconet device to a replacement URL from the redirect list based on a match to the requested URL.
Features and advantages of the present invention will become apparent to those skilled in the art from the following description with reference to the drawings:
The present invention provides a remotely provisioned proxy within a wireless/mobile phone that proxies a wireless communication path between a disconnected piconet (e.g., BLUETOOTH™) device and a network resource such as a universal resource locator (URL) via a mating mobile phone. Thus, an application proxy module embodied within the mobile phone provides managed access to remote services. A disconnected piconet device uses the full data bandwidth available to a wireless phone, without the need for the disconnected piconet device to include its own separate wireless front end, or to require use of a modem within the mobile phone. Thus, using a mobile phone with application proxy, the user need not pay for the luxury of a tethered data plan.
In particular, as shown in
The disconnected piconet device 200 can be, e.g., a portable navigation device (PND), telematics hardware, an ultra mobile personal computer (PC), a handheld game, a music player, etc.
The local connection 105 is a piconet such as BLUETOOTH™. The invention is preferably implemented using the Serial Port BLUETOOTH™ Profile which is common on BLUETOOTH™-enabled phones and devices.
The mobile phone with application proxy 120 can be, e.g., a J2ME, BREW, RIM, Symbian, or a Windows Mobile phone.
The remote connection 115 can be established in conformance with an appropriate protocol, e.g., WiMax, EVDO, 1xRTT, EDGE, H SDPA, etc.
Preferably the provisioning server 110 and remote service 130 are accessible on the Internet.
The wireless operator and application provider can manage/monitor the services being provided to the disconnected piconet (e.g., BLUETOOTH™ device). For example, if a wireless operator doesn't want to offer a particular remote service such as YellowPages.com point-of-interest (POI) search, then the wireless operator can disable, block or replace the service with their own.
The wireless operator can disable/turn off users on a user by user, application by application, or device by device basis.
Preferably a generic connection is established which doesn't rely on both the BLUETOOTH™ device and phone to support a particular BLUETOOTH™ profile.
Using the application proxy 100 of a mobile phone with application proxy 120, a disconnected piconet device 200 such as a navigation device can interact with both remote Internet services 130 and services available on the mobile phone with application proxy 120.
In particular, as shown in
Importantly, the wireless phone 120 includes an application proxy 100 that provides proxied facilitation of retrieval of information on a web page from the Internet requested by and for the disconnected piconet device 200.
The disconnected piconet device 200 in accordance with the present invention includes a short range piconet wireless interface, e.g.; a BLUETOOTH™ compatible interface. The piconet interface is capable only of short range wireless communications, e.g., within 20 feet. The present invention provides a proxy within a wireless phone 120 to enable the disconnected piconet device 200 to be provided with information from an approved web site.
Preferably, the web sites accessible by the disconnected piconet device 200 are approved or disapproved by a service provider. The user of the wireless phone 120 may pre-configure approved and/or disapproved web sites (universal resource locators (URLs) with the service provider. In the disclosed embodiments, approved URLs are provided by the service provider to the mobile phone 120 as white listed URLs 122, and disapproved URLs are provided by the service provider to the mobile phone 120 as black listed URLs 124.
In particular, as shown in step 201 of
In step 202, the mobile phone with application proxy 120 connects to the provisioning server 110 and sends credentials. The disconnected piconet device 200 authenticates by sending authentication information (some unique identifier) to the mobile phone with application proxy 120.
In step 203, the provisioning server 110 authenticates the mobile phone with application proxy 120, and sends a white list and/or black list to the mobile phone with application proxy 120. The mobile phone with application proxy 120 sends the disconnected piconet device 200 authentication information along with its own identifying information to the provisioning server 110 to make sure a valid account exists and to get any permissions.
In step 204, the disconnected piconet device 200 requests a network resource via the mobile phone with application proxy 120. The provisioning server 110 sends back an OK status as well as allowed (and/or disallowed) locations, preferably returned as a list of URL's with wildcards. For each combination of mobile phone with application proxy 120 and disconnected piconet device 200, the provisioning server 110 returns a list of allowed URLs (stored in a white listed URLs table) 122 and/or disallowed URLs (stored in a black listed URLs table) 124.
This remote provisioning to the mobile phone with application proxy 120 from the provisioning server 110 enables the mobile phone with application proxy 120 to make decisions about what communication to allow without using bandwidth.
The mobile phone with application proxy 120 is ideally provisioned for each session. Because the mobile phone with application proxy 120 is provisioned for each session, the services the disconnected piconet device 200 can access can be controlled at a very detailed level and with no changes to the disconnected piconet device 200 or the mobile phone with application proxy 120.
In step 205a, the mobile phone with application proxy 120 determines if a particular URL is allowed—not the network resource 130 and not the provisioning server 110. This is important, and greatly reduces bandwidth at the time that the network resource is requested by the disconnected piconet device 200.
The mobile phone with application proxy 120 then compares the requested URL against the network-provided-but-locally-stored white listed URLs table 122 and/or black listed URL table 124.
If the mobile phone with application proxy 120 determines that the URL requested by the disconnected piconet device 200 is permitted to access the requested URL, then processing continues to step 206. If not, in step 205b, the mobile phone with application proxy 120 rejects the URL, and sends an appropriate rejection code or other information regarding the rejection or blocking of the requested URL to the disconnected piconet device 200.
In step 206, the disconnected piconet device 200 sends a request for the given URL in step 205 to the mobile phone with application proxy 120, which passes on the request for the given URL.
In step 207, the requested network resource 130 returns appropriate results to the mobile phone with application proxy 120.
In step 208, the mobile phone with application proxy 120 returns results to the disconnected piconet device 200 of the now-authorized requested URL.
For instance, the disconnected piconet device 200 wants to retrieve a local search for pizza. It determines that it wants to connect to a website with a given URL. The disconnected piconet device 200 sends a request for the given URL in step 205 to the mobile phone with application proxy 120. In step 207, the mobile phone with application proxy 120 itself determines from its white listed URLs 122 and black listed URLs 124 obtained for the session that the requested website address (URL) is an allowed location, so it forwards the request for the URL. In step 208, the requested URL returns the requested results (pizza places in San Francisco) to the mobile phone with application proxy 120, which in turn returns the results to the disconnected piconet device 200.
The invention can be billed by a wireless operator using their existing billing infrastructure (such as BREW or QPass) for wireless applications.
Other services available on the mobile phone may be utilized, e.g., GPS, file storage, access to media files, etc.
The invention can be used with any non-connected device, such as a handheld game or PC. The invention also has particular applicability to both wireless operators and navigation device manufacturers. Vehicle manufacturers can use the invention to provide low-cost connected services to vehicles both with and without navigation devices. Portable navigation device (PND) manufacturers can use the invention to provide low-cost connected services to PND devices. Ultra-mobile PC manufacturers can use the invention to provide connectivity without the cost of an embedded communications module (ECM), for instance, ultra-mobile PCs, PND and in-car navigation providers using mobile applications as a communication mechanism.
The types of services provided to the disconnected device may be expanded. For instance, the mobile phone with application proxy may integrate with other aspects of the phone or piconet disconnected device, including SMS, microphone, GPS, gyroscope, etc.
While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments of the invention without departing from the true spirit and scope of the invention.
This application is a continuation of U.S. patent application Ser. No. 12/588,142 entitled “Remotely Provisioned Wireless Proxy” to Tsurutome et al., filed on Oct. 6, 2009, which claims priority from U.S. Provisional Application No. 61/136,806, entitled “Remotely Provisioned Wireless Proxy” to Tsurutome et al., filed Oct. 6, 2008, the entirety of both of which are explicitly incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5263136 | DeAguiar | Nov 1993 | A |
5359529 | Snider | Oct 1994 | A |
5781200 | Lu | Jul 1998 | A |
5832408 | Tamai | Nov 1998 | A |
5973700 | Taylor | Oct 1999 | A |
6021406 | Kuznetsov | Feb 2000 | A |
6026398 | Brown | Feb 2000 | A |
6064941 | Nimura | May 2000 | A |
6104416 | McGuinness | Aug 2000 | A |
6108650 | Musk | Aug 2000 | A |
6119013 | Maloney | Sep 2000 | A |
6144338 | Davies | Nov 2000 | A |
6262741 | Davies | Jul 2001 | B1 |
6377945 | Risvik | Apr 2002 | B1 |
6401034 | Kaplan | Jun 2002 | B1 |
6424912 | Correia | Jul 2002 | B1 |
6434482 | Oshida | Aug 2002 | B1 |
6470189 | Hill | Oct 2002 | B1 |
6487495 | Gale | Nov 2002 | B1 |
6507785 | Stefan | Jan 2003 | B1 |
6523021 | Monberg | Feb 2003 | B1 |
6529143 | Mikkola | Mar 2003 | B2 |
6571169 | Miyaki | May 2003 | B2 |
6587782 | Nocek | Jul 2003 | B1 |
6636803 | Hartz | Oct 2003 | B1 |
6671424 | Skoll | Dec 2003 | B1 |
6714205 | Miyashita | Mar 2004 | B1 |
6734867 | Munshi | May 2004 | B1 |
6820092 | Nakano | Nov 2004 | B2 |
6940407 | Miramda-Knapp | Sep 2005 | B2 |
6954697 | Smith | Oct 2005 | B1 |
7054743 | Smith | May 2006 | B1 |
7093286 | King | Aug 2006 | B1 |
7155339 | Tu | Dec 2006 | B2 |
7162470 | Sharma | Jan 2007 | B2 |
7190839 | Feather | Mar 2007 | B1 |
7373246 | O'Clair | May 2008 | B2 |
7379729 | Holland | May 2008 | B2 |
7385600 | Marion | Jun 2008 | B2 |
7409219 | Levitan | Aug 2008 | B2 |
7444326 | Jagadish | Oct 2008 | B1 |
7480566 | Laverty | Jan 2009 | B2 |
7499914 | Diab | Mar 2009 | B2 |
7546202 | Oh | Jun 2009 | B2 |
7548915 | Ramer | Jun 2009 | B2 |
565239 | De Silva et al. | Jul 2009 | A1 |
7627656 | Anand et al. | Dec 2009 | B1 |
7706977 | Soehren | Apr 2010 | B2 |
7747611 | Milic-Frayling | Jun 2010 | B1 |
7917154 | Fortescue | Mar 2011 | B2 |
7949642 | Yang | May 2011 | B2 |
RE42927 | Want | Nov 2011 | E |
8095434 | Puttick | Jan 2012 | B1 |
8265864 | Kaufman | Sep 2012 | B1 |
20010021894 | Sakamoto | Sep 2001 | A1 |
20010038626 | Dynarski | Nov 2001 | A1 |
20010047241 | Khavakh | Nov 2001 | A1 |
20020021231 | Schlager | Feb 2002 | A1 |
20020037716 | McKenna | Mar 2002 | A1 |
20020042819 | Reichert | Apr 2002 | A1 |
20020067353 | Kenyon | Jun 2002 | A1 |
20020082774 | Bloebaum | Jun 2002 | A1 |
20020083062 | Neal | Jun 2002 | A1 |
20020098851 | Walczak | Jul 2002 | A1 |
20020130953 | Riconda | Sep 2002 | A1 |
20020190861 | Wentworth | Dec 2002 | A1 |
20020198694 | Yang | Dec 2002 | A1 |
20030011623 | Dermer | Jan 2003 | A1 |
20030033083 | Nakashima | Feb 2003 | A1 |
20030034936 | Ernst | Feb 2003 | A1 |
20030055555 | Knockeart | Mar 2003 | A1 |
20030071728 | McDonald | Apr 2003 | A1 |
20030095525 | Lavin | May 2003 | A1 |
20030128211 | Watanabe | Jul 2003 | A1 |
20030182052 | Delorme | Sep 2003 | A1 |
20040003125 | Ichimura | Jan 2004 | A1 |
20040023645 | Olsen | Feb 2004 | A1 |
20040027258 | Pechatnikov | Feb 2004 | A1 |
20040030493 | Pechatnikov | Feb 2004 | A1 |
20040135784 | Cohen | Jul 2004 | A1 |
20040158829 | Beresin | Aug 2004 | A1 |
20040185870 | Matsuda | Sep 2004 | A1 |
20040203603 | Pierce | Oct 2004 | A1 |
20040203873 | Gray | Oct 2004 | A1 |
20040215641 | Kothuri | Oct 2004 | A1 |
20040217980 | Radburn | Nov 2004 | A1 |
20040220918 | Scriffignano | Nov 2004 | A1 |
20040224702 | Chaskar | Nov 2004 | A1 |
20040225437 | Endo | Nov 2004 | A1 |
20040249568 | Endo | Dec 2004 | A1 |
20050148342 | Sylvain | Jul 2005 | A1 |
20050149253 | Nambata | Jul 2005 | A1 |
20050188333 | Hunleth | Aug 2005 | A1 |
20050228780 | Diab | Oct 2005 | A1 |
20050251331 | Kreft | Nov 2005 | A1 |
20050270311 | Rasmussen | Dec 2005 | A1 |
20050288033 | McNew | Dec 2005 | A1 |
20060005114 | Williamson | Jan 2006 | A1 |
20060015513 | Poyhonen et al. | Jan 2006 | A1 |
20060023626 | Krausz | Feb 2006 | A1 |
20060055693 | Sylthe | Mar 2006 | A1 |
20060055963 | Otsuka et al. | Mar 2006 | A1 |
20060064235 | Ishikawa | Mar 2006 | A1 |
20060089788 | Laverty | Apr 2006 | A1 |
20060089792 | Manber | Apr 2006 | A1 |
20060105782 | Brock | May 2006 | A1 |
20060116818 | Chao et al. | Jun 2006 | A1 |
20060135178 | Allyn | Jun 2006 | A1 |
20060155679 | Kothuri | Jul 2006 | A1 |
20060167616 | Yamane | Jul 2006 | A1 |
20060167621 | Dale | Jul 2006 | A1 |
20060174209 | Barros | Aug 2006 | A1 |
20060200304 | Oh | Sep 2006 | A1 |
20060200308 | Arutunian | Sep 2006 | A1 |
20060206586 | Ling | Sep 2006 | A1 |
20060223518 | Haney | Oct 2006 | A1 |
20060229802 | Vertelney | Oct 2006 | A1 |
20060246922 | Gasbarro | Nov 2006 | A1 |
20060253247 | De Silva et al. | Nov 2006 | A1 |
20070010942 | Bill | Jan 2007 | A1 |
20070015518 | Winter | Jan 2007 | A1 |
20070036318 | Gits et al. | Feb 2007 | A1 |
20070072620 | Levitan | Mar 2007 | A1 |
20070078848 | Sareen | Apr 2007 | A1 |
20070083557 | Leiserowitz | Apr 2007 | A1 |
20070083649 | Zuzga | Apr 2007 | A1 |
20070094042 | Ramer | Apr 2007 | A1 |
20070118520 | Bliss | May 2007 | A1 |
20070124216 | Lucas | May 2007 | A1 |
20070153983 | Bloebaum | Jul 2007 | A1 |
20070156334 | Vu | Jul 2007 | A1 |
20070174259 | Amjadi | Jul 2007 | A1 |
20070213043 | Son | Sep 2007 | A1 |
20070219706 | Sheynblat | Sep 2007 | A1 |
20070219708 | Brasche | Sep 2007 | A1 |
20070233817 | Johnson | Oct 2007 | A1 |
20070238472 | Wanless | Oct 2007 | A1 |
20070239752 | Beitman | Oct 2007 | A1 |
20070253642 | Berrill | Nov 2007 | A1 |
20070281690 | Altman | Dec 2007 | A1 |
20070288613 | Sudame et al. | Dec 2007 | A1 |
20070298812 | Singh | Dec 2007 | A1 |
20080004043 | Wilson | Jan 2008 | A1 |
20080071465 | Chapman | Mar 2008 | A1 |
20080082262 | Silva et al. | Apr 2008 | A1 |
20080104059 | Segel | May 2008 | A1 |
20080104227 | Birnie | May 2008 | A1 |
20080112551 | Forbes et al. | May 2008 | A1 |
20080120293 | Morisawa | May 2008 | A1 |
20080130597 | Kalhan | Jun 2008 | A1 |
20080139114 | Ranganathan | Jun 2008 | A1 |
20080140307 | Chen | Jun 2008 | A1 |
20080154856 | Riise | Jun 2008 | A1 |
20080154888 | Buron | Jun 2008 | A1 |
20080177462 | Yoshioka | Jul 2008 | A1 |
20080177839 | Chang | Jul 2008 | A1 |
20080218407 | Norda | Sep 2008 | A1 |
20080249983 | Meisels | Oct 2008 | A1 |
20080261560 | Ruckart | Oct 2008 | A1 |
20080268822 | Johnson | Oct 2008 | A1 |
20080270366 | Frank | Oct 2008 | A1 |
20080275637 | Kim | Nov 2008 | A1 |
20080280599 | Cheng | Nov 2008 | A1 |
20080307445 | Garg | Dec 2008 | A1 |
20080319652 | Moshfeghi | Dec 2008 | A1 |
20080319653 | Moshfeghi | Dec 2008 | A1 |
20080319990 | Taranenko | Dec 2008 | A1 |
20090009397 | Taylor | Jan 2009 | A1 |
20090018840 | Lutz | Jan 2009 | A1 |
20090029693 | Liwell | Jan 2009 | A1 |
20090055087 | Beacher | Feb 2009 | A1 |
20090061852 | Feher | Mar 2009 | A1 |
20090100037 | Scheibe | Apr 2009 | A1 |
20090132514 | Kisluk | May 2009 | A1 |
20090144247 | Wistrand et al. | Jun 2009 | A1 |
20090144260 | Bennett | Jun 2009 | A1 |
20090150349 | Cartin | Jun 2009 | A1 |
20090171934 | Ratnakar | Jul 2009 | A1 |
20090171955 | Merz | Jul 2009 | A1 |
20090192702 | Bourne | Jul 2009 | A1 |
20090210413 | Hayash | Aug 2009 | A1 |
20090222438 | Strandell | Sep 2009 | A1 |
20090237307 | Tsai | Sep 2009 | A1 |
20090248663 | Maniyar | Oct 2009 | A1 |
20090325615 | McKay et al. | Dec 2009 | A1 |
20100037057 | Shim et al. | Feb 2010 | A1 |
20100094550 | Tsurutome et al. | Apr 2010 | A1 |
20110003578 | Chen et al. | Jan 2011 | A1 |
20110035141 | Barker | Feb 2011 | A1 |
Number | Date | Country |
---|---|---|
1128163 | Aug 2001 | EP |
2008039698 | Feb 2008 | JP |
WO2006071171 | Jul 2006 | WO |
WO2006125291 | Nov 2006 | WO |
Entry |
---|
Ahern et al., “World Explorer: Visualizing Aggregate Data from Unstructured Text in Geo-Referenced Collections,” Jun. 18-23, 2007, ACM, JCDL'07. |
International Search Report in PCT/US2008/10543 dated Aug. 19, 2010. |
International Search Report in PCT/US2008/10542 dated Aug. 19, 2010. |
European Search Report received in European Appl. No. 09819546.4 dated Oct. 15, 2012. |
John Krumm et al, “Map Matching with Travel Time Constraints”, SAE 2007 World Congress, Apr. 19, 2007. |
European Search Report received in European Appl. No. 09819547.2 dated Oct. 16, 2012. |
PCT International Search Report in PCT/US2009/05487 dated Nov. 17, 2009. |
International Search Report in PCT/US2009/05486 dated Jan. 21, 2010. |
U.S. Appl. No. 11/251,766, filed Oct. 2005, Barcklay. |
Number | Date | Country | |
---|---|---|---|
20130122898 A1 | May 2013 | US |
Number | Date | Country | |
---|---|---|---|
61136806 | Oct 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12588142 | Oct 2009 | US |
Child | 13738525 | US |