User plane location based service using message tunneling to support roaming

Abstract
An improved User Plane location based service (LBS) architecture and message flow, enabling seamless User Plane location based services even when a mobile or wireless device has roamed among different carrier networks. The present invention overcomes constraints inherent in the current protocol for roaming support defined by the Secure User Plane Location Service specification. A location system is enabled to automatically fall back to a message tunneling mechanism to ensure the security of a communication path between the location service system and the target wireless device, ensuring that the communication path is uninterrupted as the wireless device travels.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention relates generally to wireless and long distance carriers, Internet Service Providers (ISPs), and information content delivery services/providers and long distance carriers. More particularly, it relates to location services for the wireless industry.


2. Background of Related Art


It is desired to accurately locate the physical position of a wireless device (e.g., a wireless telephone) within a wireless network. There are currently two different types of architecture developed to accomplish a location based service (LSB): Control Plane location based services, and more recently User Plane location based services.


Older location based services utilize what is now called Control Plane location based services. A Control Plane location based service utilizes a management system to automate and build processes and perform inventory management. A Control Plane location based service utilizes control or signaling messages to determine the location of a particular wireless device.


A key difference between these two technologies is that a Control Plane solution uses a control channel to communicate with the wireless device, while a User Plane solution uses the subscriber's traffic channel itself (e.g. IP bearer or SMS) to communicate with the wireless device. A Control Plane solution requires software updates to almost all the existing network components and wireless devices, while a User Plane solution is recognized as a more feasible solution for carriers to provide location-based services.


The concept known as User Plane location based service makes use of the user's bearer channel itself, e.g., IP bearer or SMS, to establish the communications required for initiating a positioning procedure. User Plane location based services have been introduced as an alternative location service architecture as defined in standard organizations, e.g., 3GPP.


Thus, User Plane location based services utilize contents of the communications itself to locate the wireless device. User Plane location based services focus on the TCP/IP capability of a wireless device such as a mobile telephone to generally bypass the carrier infrastructure and instead use, e.g., the Internet. There are significant advantages to the deployment of User Plane location based services, including an easier and more streamlined architecture than that of a Control Plane location based service. In this way, costly upgrades are avoided, and quick and relatively inexpensive deployment is possible using otherwise conventional system components.


In User Plane location based services, the inventors have noted that there is an issue related to location service procedure when the target mobile is roaming and IP bearer is used (IP bearer is the default bearer for User Plane location service solutions). Roaming refers to the physical movement of a wireless device among the territories covered by different wireless carriers.


In particular, based on conventional User Plane location service architecture, the target wireless device or mobile to be located must communicate with the Positioning Server (a.k.a. GMLC in 3GPP, MPC in 3GPP2) that is serving the cell where the wireless device camps. In this procedure, a PDP Context is established between the wireless device and the GGSN in the wireless device's Home Public Land Mobile Network (H-PLMN). The PDP Context is a communication channel established for the target wireless device to access IP networks, including an H-LCS Manager (a.k.a. H-GMLC in 3GPP, or H-MPC in 3GPP2), a Visited-LCS Manager (a.k.a. Visited-GMLC in 3GPP, or Visited MPC in 3GPP2), and/or a Positioning Server (a.k.a. SMLC in 3GPP, or PDE in 3GPP2).


However, the inventors herein realize that for security reasons, the IP networks of different PLMNs are separated with protective IP firewalls. Furthermore, inside a PLMN, the IP network is usually configured as a private network using private IP addresses. The IP connectivity to the Internet goes through a gateway router that provides NAT function. Yet, in currently defined User Plane location based services, a target wireless device must communicate with the positioning server in the Visited-PLMN via the GGSN in Home-PLMN, using the positioning server's private IP address provided by the Visited-LCS Manager. However, in a roaming scenario, it is realized that it is currently not permitted for a wireless device to communicate directly with a proper positioning server because of the various firewalls.


While User Plane location based solutions have been developed and deployed in a number of networks, support is not complete, especially when a GPRS IP bearer is used as the bearer. This invention introduces a methodology to resolve a key issue related to a roaming scenario for User Plane location based service solutions.


In conventional 3GPP network architectures, when a mobile initiates a packet data service session, called a PDP Context, the location SGNS will establish a connection to the GGSN indicated by an Access Point Name (APN) provided by the mobile. The GGSN identified by the APN usually resides in the Home Public Land Mobile Network (H-PLMN) of the mobile. So, in the roaming scenario, an IP bearer is established between the MS and the GGSN in the Home PLMN. Therefore, all the IP traffic to/from the mobile is tunneled to the Home PLMN.


With a Release 6 architecture of the 3GPP standard, a Gateway Mobile Location Center (GMLC) is able to communicate with other GMLCs that reside in different PLMNs, using an Lr interface. Thus, the Lr interface is allowed to go though the firewalls of PLMNs, attempting to provide adequate services in a roaming scenario.


In a typical Mobile Terminating (MT) location service in a roaming scenario, the mobile or wireless device must communicate with the local positioning server of a User Plane location based service (sometimes referred to as “SMLC” using 3GPP standards terminology), to exchange location information and request assistance and a positioning calculation depending upon the particular positioning method being used.


However, during the MT location service procedure of a conventional User Plane location based service, a wireless device will be provided with the IP address of the local positioning server. As the inventors have appreciated, usually this IP address is a private IP address. Thus, while in theory full roaming support seems to be enabled, the inventors herein have appreciated that in reality the wireless device is not always able to reach this IP host from a private network (H-PLMN) because it is protected by firewalls.


There is the need to provide roaming support for a real-world subscriber utilizing a User Plane location based service in an existing GPRS network architecture.


SUMMARY OF THE INVENTION

In accordance with the principles of the present invention, message tunneling mechanism enables User Plane location service seamlessly supporting location based service even when the target subscriber is roaming in different networks.


In one aspect of the invention, a method of providing a User Plan location based service to a roaming wireless device comprises establishing a roaming interface between a home LCS manager of a home wireless carrier network and a visited LCS manager of a currently visited wireless carrier network. IP connectivity is directed over the Internet with the capability of being transmitted through a firewall in the home wireless carrier network and through a firewall in the visited wireless carrier network. A message tunneling mechanism is provided to provide an uninterrupted communication path between a location service system and a wireless device being located.





BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of the present invention will become apparent to those skilled in the art from the following description with reference to the drawings, in which:



FIG. 1 shows an exemplary user plane location service architecture in accordance with an embodiment of the present invention.



FIG. 2 shows exemplary user plane location service signaling based on the user plane location service accordance shown in FIG. 1.



FIG. 3 shows exemplary enhanced user plane location service signaling using message-tunneling mechanism, based on the user plane location service accordance shown in FIG. 1.



FIG. 4 shows an exemplary message flow for message tunneling to support roaming in a User Plane location based service, in accordance with the principles of the present invention.



FIG. 5 shows an exemplary message flow for message tunneling to support roaming in a User Plane location based service, where Visited-LCS Manager and Visited-Positioning Server are integrated in one device, in accordance with the principles of the present invention.





DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The present invention relates to the provision of an improved User Plane location based service (LBS) architecture and message flow, enabling seamless User Plane location based services even when a mobile or wireless device has roamed among different carrier networks.


The present invention overcomes constraints inherent in the current protocol for roaming support defined by the Secure User Plane Location Service specification.


The inventive solution enables a location system to automatically fall back to a message tunneling mechanism to ensure the security of a communication path between the location service system and the target wireless device, ensuring that the communication path is uninterrupted as the wireless device travels.



FIG. 1 shows an exemplary user plane location service architecture in accordance with an embodiment of the present invention.


In particular, as shown in FIG. 1, a roaming interface (Lr) is established between LCS Managers (a.k.a. GMLCs in 3GPP, or MPCs in 3GPP2), which can direct IP connectivity through firewalls via the Internet. The inventive solution implements a message tunneling mechanism to provide end-to-end protocol connectivity via a Home-LCS Manager and/or a Visited-LCS Manager.


An important concept introduced by the present invention is the use of a messaging level tunneling via GMLCs using the Lr interface. With this method, a wireless device can communicate with the local positioning server, crossing PLMNs, to complete the requested User Plane positioning procedure.



FIG. 2 shows exemplary existing user plane location service signaling based on the user plane location service accordance shown in FIG. 1.


In particular, as shown in FIG. 2, when roaming UE needs to communicate with V-Positioning Server that resides in Visited PLMN, based on the procedure defined in User Plane LCS, it cannot even establish a TCP connection with the V-Positioning Server, although they are physically in the same network. Therefore, current User Plane architecture cannot support roaming scenarios for the mobile networks using private IP address assignments (which is very common in the industry due to the limited resource of IP addresses).



FIG. 3 shows exemplary enhanced user plane location service signaling using message-tunneling mechanism, based on the user plane location service accordance shown in FIG. 1.


In particular, FIG. 3 illustrates the concept of message tunneling for User Plane LCS service in roaming scenarios. In this case, UE sends a User Plane message, which should be sent to the V-Positioning Server, to the Home-LCS Manager instead. The Home-LCS Manager encapsulates the received message in a generic message and sends it to the V-LCS Manager. With existing 3GPP Release 6 architecture, a LCS Managers (a.k.a GMLC in 3GPP) is able to communicate with other LCS Managers (or GMLCs) that reside in different PLMNs, using Lr interface, i.e. Lr interface is allowed to go though the firewalls of PLMNs. The V-LCS Manager also uses message tunneling mechanism to pass the message from the UE to the V-Positioning Server, via local IP network connectivity.



FIG. 4 shows an exemplary message flow for message tunneling to support roaming in a User Plane location based service, in accordance with the principles of the present invention.


Step A


As shown in step A of FIG. 4, upon receiving a location request from a location service enabled application, the LCS Agent 302 may authenticate the application. If authentication is successful, the LCS Agent 302 issues an MLP Location request to the Requesting-LCS Manager 304, with which LCS Agent is associated, for an immediate location fix.


Step B


The Requesting-LCS Manager 304 authenticates the LCS Agent 302, and verifies that the LCS Agent 302 is authorized for the service it requests, based on the lcs-client-id received.


By examining the received msid of the target subscriber, the R-LCS Manager 304 can identify the relevant Home-LCS Manager 306 based, e.g., on roaming agreements, or using domain name service (DNS) lookup mechanism similar to IETF RFC 2916. The mechanisms used to identify the relevant Home-LCS Manager 306 are known to those of ordinary skill in the art.


The R-LCS Manager 304 then forwards the location request to the Home-LCS Manager 306 of the target subscriber, using an Lr interface.


Step C


Upon receipt of a location request, the Home-LCS Manager 306 applies subscriber Privacy against Ics-client-id, requestor-id, qos, etc. that are received in the request. This use case assumes privacy check success. If the LCS Manager 304 did not authorize the application, step N will be returned with the applicable MLP return code.


The H-LCS Manager 306 then initiates the location processing with the user equipment (UE) 312 using a suitable LCS INIT message, e.g., a wireless application protocol (WAP) PUSH, or a short messaging system (SMS) Trigger, and starts a timer T1.


The H-LCS Manager 306 can optionally provide UE coarse position information to the UE at this time if the H-LCS Manager 306 has knowledge of the coarse position.


If the result of the privacy check in Step B indicates that notification or verification to the target subscriber is needed, the H-LCS Manager 306 may also include a notification element in the LCS INIT message.


Step D


If Notification/Verification is required, UE popup text may be used to notify the subscriber who is requesting his/her location info, e.g., lcs-client-id, requestor-id, request-type, etc. Optionally, the subscriber may be allowed to either grant the location request or deny the location request.


If the target subscriber grants the location request, the UE 312 starts the positioning procedure by retrieving the current serving cell information, TA, NMR, and mobile device capabilities. The UE 312 then initiates a location session with the H-LCS Manager 306 using Start Location Request (SLREQ), with cell info and optional AD, TA and NMR if the UE needs to obtain assistance data, and/or TA and NMR are available. Optionally, the UE 312 also indicates whether the target subscriber has been granted access when verification is required in the LCS INIT message.


If the target subscriber denies the location request, the UE 312 initiates a location response to the H-LCS Manager 306 including indication of the denial.


When the H-LCS Manager 306 receives the SLREQ message from the target subscriber for the pending transaction, it stops the timer T1.


Step E


If the target subscriber has denied the location request in Step D, Step L will be returned with the applicable MLP return code. In this case, Steps E to K are skipped. Otherwise, with the cell information from the target UE 312 (or via another mechanism), the H-LCS Manager 306 can determine that the target UE 312 is roaming. Based on a relevant roaming agreement, or using a DNS lookup mechanism similar to IETF RFC 2916, the H-LCS Manager 306 can identify the Visited-LCS Manager 308, and initiates an Lr request to the Visited-LCS Manager 308, with an indicator that message tunneling mechanism will be used for this transition.


Step F


When receiving the Lr request, the Visited-LCS Manager 308 initiates a Position Request (PREQ), with optional cellinfo, NMR, device cap, etc., to the Positioning Server 310 that serves the area where target UE 312 currently is located.


Step G


The Positioning Server 310 sends a Position Response (PRESP) back to the V-LCS Manager 308, and confirms that the Positioning Server 310 is ready to process the location request identified by sessionid.


Step H


Upon receipt of the Position Response message, the V-LCS Manager 308 sends an Lr Response message to the H-LCS Manager 306. The Lr Response message may include, e.g., the IP address (URL) of the Positioning Server 310.


Step I


Upon receiving the confirmation of the PRESP message from the serving Positioning Server 310, the H-LCS Manager 306 sends a Start Location Response (SLRESP) message with the address of the H-LCS Manager 306 instead of V-Positioning Server for non-roaming scenario, if direct communication between the serving Positioning Server 310 and the target UE 312 is required, and an optional posmode to the target UE 312.


Note, importantly, that the provided address of the serving Positioning Server 310 may be a private IP address in the roaming scenario.


Step J


Upon detection of roaming for the relevant UE 312, the target UE 312 initiates position determination, e.g., Position Determination Initiation (PDINIT), and sessionid, to the H-LCS Manager 306. The PDINIT message optionally contains additional information, e.g., cell id, ad, and/or IS-801 PDU.


Step K


When receiving the message, the H-LCS Manager 306 forwards the PDINIT message inside a Position Data message corresponding to the sessionid to the V-LCS Manager 308 via the relevant Lr connection.


Step L


The V-LCS Manager 308 forwards the received Position Data message to the serving Positioning Server 310.


Step M


The Positioning Server 310 and the target UE 312 start a precise positioning procedure by exchanging Position Determination Messaging (PDMESS) messages encapsulated by Position Data as illustrated in Steps J, K and L, via the H-LCS Manager 306 and the V-LCS Manager 308.


Importantly, the positioning procedure itself may be, e.g., an RRLP, IS-801, or RRC based transaction. However, the positioning procedure (e.g., RRLP, IS-801 or RRC) protocol is tunneled in PDMESS messages, which are tunneled by generic Position Data messages that are transported between H-LCS Manager and V-LCS Manager.


Step N


The Positioning Server 310 may send a Position Report (PRPT) to the R/H/V-LCS Managers 304, 306, 308 with the determined location information from the target UE 312.


Steps O, P


Upon receiving the required position estimates from the Position Report (PRPT), the Visited-LCS Manager 308 forwards the location estimate to the Home-LCS Manager 306 using an Lr response message.


Step Q


The Home-LCS Manager 306 forwards the location estimate to the Requesting-LCS Manager 304 if the location estimate is allowed by the privacy settings of the target subscriber.


Step R


Finally, the Requesting-:LCS Manager 304 sends an MLP SLIA message with location estimates back to the LCS Agent 302.



FIG. 5 shows an exemplary message flow for message tunneling to support roaming in a User Plane location based service, where Visited-LCS Manager and Visited-Positioning Server are integrated in one device, in accordance with the principles of the present invention.


Step A


As shown in step A of FIG. 4, upon receiving a location request from a location service enabled application, the LCS Agent 302 may authenticate the application. If authentication is successful, the LCS Agent 302 issues an MLP Location request to the Requesting-LCS Manager 304, with which LCS Agent is associated, for an immediate location fix.


Step B


The Requesting-LCS Manager 304 authenticates the LCS Agent 302, and verifies that the LCS Agent 302 is authorized for the service it requests, based on the lcs-client-id received.


By examining the received msid of the target subscriber, the R-LCS Manager 304 can identify the relevant Home-LCS Manager 306 based, e.g., on roaming agreements, or using domain name service (DNS) lookup mechanism similar to IETF RFC 2916. The mechanisms used to identify the relevant Home-LCS Manager 306 are known to those of ordinary skill in the art.


The R-LCS Manager 304 then forwards the location request to the Home-LCS Manager 306 of the target subscriber, using an Lr interface.


Step C


Upon receipt of a location request, the Home-LCS Manager 306 applies subscriber Privacy against lcs-client-id, requestor-id, qos, etc. that are received in the request. This use case assumes privacy check success. If the LCS Manager 304 did not authorize the application, step N will be returned with the applicable MLP return code.


The H-LCS Manager 306 then initiates the location processing with the user equipment (UE) 312 using a suitable LCS INIT message, e.g., a wireless application protocol (WAP) PUSH, or a short messaging system (SMS) Trigger, and starts a timer T1.


The H-LCS Manager 306 can optionally provide UE coarse position information to the UE at this time if the H-LCS Manager 306 has knowledge of the coarse position.


If the result of the privacy check in Step B indicates that notification or verification to the target subscriber is needed, the H-LCS Manager 306 may also include a notification element in the LCS INIT message.


Step D


If Notification/Verification is required, UE popup text may be used to notify the subscriber who is requesting his/her location info, e.g., lcs-client-id, requestor-id, request-type, etc. Optionally, the subscriber may be allowed to either grant the location request or deny the location request.


If the target subscriber grants the location request, the UE 312 starts the positioning procedure by retrieving the current serving cell information, TA, NMR, and mobile device capabilities. The UE 312 then initiates a location session with the H-LCS Manager 306 using Start Location Request (SLREQ), with cell info and optional AD, TA and NMR if the UE needs to obtain assistance data, and/or TA and NMR are available. Optionally, the UE 312 also indicates whether the target subscriber has been granted access when verification is required in the LCS INIT message.


If the target subscriber denies the location request, the UE 312 initiates a location response to the H-LCS Manager 306 including indication of the denial.


When the H-LCS Manager 306 receives the SLREQ message from the target subscriber for the pending transaction, it stops the timer T1.


Step E


If the target subscriber has denied the location request in Step D, Step L will be returned with the applicable MLP return code. In this case, Steps E to K are skipped. Otherwise, with the cell information from the target UE 312 (or via another mechanism), the H-LCS Manager 306 can determine that the target UE 312 is roaming. Based on a relevant roaming agreement, or using a DNS lookup mechanism similar to IETF RFC 2916, the H-LCS Manager 306 can identify the Visited-LCS Manager 308, and initiates an Lr request to the Visited-LCS Manager 308, with an indicator that message tunneling mechanism will be used for this transition.


Step F


The Positioning Server 310 and the target UE 312 start a precise positioning procedure by exchanging Position Determination Messaging (PDMESS) messages encapsulated by Position Data messages, via the H-LCS Manager 306 and the V-LCS Manager 308.


Importantly, the positioning procedure itself may be, e.g., an RRLP, IS-801, or RRC based transaction. However, the positioning procedure (e.g., RRLP, IS-801 or RRC) protocol is tunneled in PDMESS messages, which are tunneled by generic Position Data messages that are transported between H-LCS Manager and V-LCS Manager.


Steps G


Upon receiving the required position estimates in Step F, the Visited-LCS Manager 308 forwards the location estimate to the Home-LCS Manager 306 using an Lr response message.


Step H


The Home-LCS Manager 306 forwards the location estimate to the Requesting-LCS Manager 304 if the location estimate is allowed by the privacy settings of the target subscriber.


Step I


Finally, the Requesting-:LCS Manager 304 sends an MLP SLIA message with location estimates back to the LCS Agent 302.


While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments of the invention without departing from the true spirit and scope of the invention.

Claims
  • 1. A method of providing a User Plane location based service to a roaming wireless device, comprising: establishing a data channel between said roaming wireless device and a visited location service (V-LCS) manager, via an intermediary home Location Services (H-LCS) manager, associated with said roaming wireless device;encapsulating, at said H-LCS manager, a User Plane message from said roaming wireless device; andtransmitting said encapsulated User Plane message from said H-LCS manager to said V-LCS manager over said data channel;wherein said User Plane message uses a subscriber traffic channel to communicate with said roaming wireless device.
  • 2. The method of providing a User Plane location based service to a roaming wireless device according to claim 1, wherein said roaming wireless device comprises: a mobile telephone.
  • 3. The method of providing a User Plane location based service to a roaming wireless device according to claim 1, wherein said roaming wireless device comprises: a personal data assistant (PDA) device.
  • 4. The method of providing a User Plane location based service to a roaming wireless device according to claim 1, wherein said roaming wireless device comprises: a wireless email device.
  • 5. The method of providing a User Plane location based service to a roaming wireless device according to claim 1, wherein said roaming wireless device comprises: a wireless device including a camera.
  • 6. Apparatus for providing a User Plane location based service to a roaming wireless device, comprising: means for establishing a data channel between said roaming wireless device and a visited location service (V-LCS) manager, via an intermediary home Location Services (H-LCS) manager, associated with said roaming wireless device;means for encapsulating, at said H-LCS manager, a User Plane message from said roaming wireless device; andmeans for transmitting said encapsulated User Plane message from said H-LCS manager to said V-LCS manager over said data channel;wherein said User Plane message uses a subscriber traffic channel to communicate with said roaming wireless device.
  • 7. The apparatus for providing a User Plane location based service to a roaming wireless device according to claim 6, wherein said roaming wireless device comprises: a mobile telephone.
  • 8. The apparatus for providing a User Plane location based service to a roaming wireless device according to claim 6, wherein said roaming wireless device comprises: a personal data assistant (PDA) device.
  • 9. The apparatus for providing a User Plane location based service to a roaming wireless device according to claim 6, wherein said roaming wireless device comprises: a wireless email device.
  • 10. The apparatus for providing a User Plane location based service to a roaming wireless device according to claim 6, wherein said roaming wireless device comprises: a wireless device including a camera.
Parent Case Info

The present invention is a continuation application of U.S. patent application Ser. No. 10/724,773, entitled “USER PLANE LOCATION BASED SERVICE USING MESSAGE TUNNELING TO SUPPORT ROAMING,” to ZHU, filed on Dec. 2, 2003, now U.S. Pat. No. 7,424,293 of common assignee to the present invention, the entirety of which is incorporated herein by reference.

US Referenced Citations (441)
Number Name Date Kind
1103073 O'Connell Jul 1914 A
4494119 Wimbush Jan 1985 A
4651156 Martinez Mar 1987 A
4706275 Kamil Nov 1987 A
4891638 Davis Jan 1990 A
4891650 Sheffer Jan 1990 A
4952928 Carroll Aug 1990 A
4972484 Theile et al. Nov 1990 A
5014206 Scribner May 1991 A
5043736 Darnell Aug 1991 A
5055851 Sheffer Oct 1991 A
5068656 Sutherland Nov 1991 A
5068891 Marshall Nov 1991 A
5119104 Heller Jun 1992 A
5144283 Arens Sep 1992 A
5161180 Chavous Nov 1992 A
5177479 Wagai Jan 1993 A
5193215 Olmer Mar 1993 A
5208756 Song May 1993 A
5214789 George May 1993 A
5218367 Sheffer Jun 1993 A
5223844 Mansell Jun 1993 A
5239570 Koster Aug 1993 A
5265630 Hartmann Nov 1993 A
5266944 Carroll Nov 1993 A
5283570 DeLucca Feb 1994 A
5289527 Tiedemann, Jr. Feb 1994 A
5293642 Lo Mar 1994 A
5299132 Wortham Mar 1994 A
5311516 Kuznicki May 1994 A
5325302 Izidon Jun 1994 A
5327529 Fults et al. Jul 1994 A
5334974 Simms Aug 1994 A
5343493 Karimulah Aug 1994 A
5347568 Moody Sep 1994 A
5351235 Lahtinen Sep 1994 A
5361212 Class Nov 1994 A
5363425 Mufti Nov 1994 A
5374936 Feng Dec 1994 A
5379451 Nakagoshi Jan 1995 A
5381338 Wysocki Jan 1995 A
5387993 Heller Feb 1995 A
5388147 Grimes Feb 1995 A
5390339 Bruckert Feb 1995 A
5394158 Chia Feb 1995 A
5396227 Caroll Mar 1995 A
5398190 Wortham Mar 1995 A
5406614 Hara Apr 1995 A
5418537 Bird May 1995 A
5423076 Westengren Jun 1995 A
5432841 Rimer Jul 1995 A
5434789 Fraker Jul 1995 A
5454024 Lebowitz Sep 1995 A
5461390 Hoshen Oct 1995 A
5470233 Fruchterman Nov 1995 A
5479408 Will Dec 1995 A
5479482 Grimes Dec 1995 A
5485161 Vaughn Jan 1996 A
5485163 Singer Jan 1996 A
5488563 Chazelle Jan 1996 A
5494091 Freeman Feb 1996 A
5497149 Fast Mar 1996 A
5508931 Snider Apr 1996 A
5513243 Kage Apr 1996 A
5515287 Hakoyama May 1996 A
5519403 Bickley May 1996 A
5530655 Lokhoff et al. Jun 1996 A
5530914 McPheters Jun 1996 A
5532690 Hertel Jul 1996 A
5535434 Siddoway Jul 1996 A
5539398 Haall Jul 1996 A
5539829 Lokhoff et al. Jul 1996 A
5543776 L'Esperance Aug 1996 A
5552772 Janky Sep 1996 A
5555286 Tendler Sep 1996 A
5568119 Shippler Oct 1996 A
5574648 Pilley Nov 1996 A
5579372 Angstrom Nov 1996 A
5587201 Rho et al. Dec 1996 A
5588009 Will Dec 1996 A
5592535 Klotz Jan 1997 A
5604486 Lauro Feb 1997 A
5606313 Allen Feb 1997 A
5606618 Lokhoff et al. Feb 1997 A
5606850 Nakamura Mar 1997 A
5610815 Gudat Mar 1997 A
5614890 Fox Mar 1997 A
5615116 Gudat Mar 1997 A
5621793 Bednarek et al. Apr 1997 A
5628051 Salin May 1997 A
5633912 Tsoi May 1997 A
5636276 Brugger Jun 1997 A
5661755 Van De Kerkhof et al. Aug 1997 A
5682600 Salin Oct 1997 A
5699053 Jonsson Dec 1997 A
5704029 Wright, Jr. Dec 1997 A
5721781 Deo Feb 1998 A
5740534 Ayerst Apr 1998 A
5761618 Lynch Jun 1998 A
5765152 Erickson Jun 1998 A
5767795 Schaphorst Jun 1998 A
5768509 Gunluk Jun 1998 A
5771353 Eggleston Jun 1998 A
5774533 Patel Jun 1998 A
5774670 Montulli Jun 1998 A
5787357 Salin Jul 1998 A
5794142 Vantilla Aug 1998 A
5797094 Houde Aug 1998 A
5797096 Lupien Aug 1998 A
5802492 DeLorme Sep 1998 A
5806000 Vo Sep 1998 A
5809415 Rossmann Sep 1998 A
5812087 Krasner Sep 1998 A
5822700 Hult Oct 1998 A
5828740 Khue Oct 1998 A
5841396 Kransner Nov 1998 A
5864667 Barkan Jan 1999 A
5874914 Krasner Feb 1999 A
5896369 Warsta Apr 1999 A
5920821 Seaholtz Jul 1999 A
5922074 Richard et al. Jul 1999 A
5930250 Klok Jul 1999 A
5930701 Skog Jul 1999 A
5943399 Bannister Aug 1999 A
5945944 Krasner Aug 1999 A
5946629 Sawyer Aug 1999 A
5946630 Willars Aug 1999 A
5950130 Coursey Sep 1999 A
5953398 Hill Sep 1999 A
5960362 Grob Sep 1999 A
5974054 Couts Oct 1999 A
5978685 Lahai Nov 1999 A
5983099 Yao et al. Nov 1999 A
5987323 Huotari Nov 1999 A
5998111 Abe Dec 1999 A
5999124 Sheynblat Dec 1999 A
6032051 Hall Feb 2000 A
6035025 Hanson Mar 2000 A
6049710 Nilsson Apr 2000 A
6052081 Krasner Apr 2000 A
6058300 Hanson May 2000 A
6058338 Agashe et al. May 2000 A
6061018 Sheynblat May 2000 A
6061346 Nordman May 2000 A
6064336 Krasner May 2000 A
6064875 Morgan May 2000 A
6070067 Nguyen May 2000 A
6075982 Donovan Jun 2000 A
6081229 Soliman Jun 2000 A
6081508 West Jun 2000 A
6085320 Kaliski, Jr. Jul 2000 A
6101378 Barabash Aug 2000 A
6104931 Havinis Aug 2000 A
6122503 Daly Sep 2000 A
6122520 Want Sep 2000 A
6124810 Segal et al. Sep 2000 A
6131067 Girerd Oct 2000 A
6133874 Krasner Oct 2000 A
6134483 Vayanos et al. Oct 2000 A
6148197 Bridges Nov 2000 A
6148198 Anderson Nov 2000 A
6149353 Nillson Nov 2000 A
6150980 Krasner Nov 2000 A
6169891 Gorham Jan 2001 B1
6173181 Losh Jan 2001 B1
6178505 Schneider Jan 2001 B1
6178506 Quick, Jr. Jan 2001 B1
6181935 Gossman Jan 2001 B1
6185427 Krasner Feb 2001 B1
6188354 Soliman et al. Feb 2001 B1
6188752 Wesley Feb 2001 B1
6188909 Alanara Feb 2001 B1
6189098 Walker et al. Feb 2001 B1
6198431 Gibson Mar 2001 B1
6199045 Giniger Mar 2001 B1
6199113 Alegre Mar 2001 B1
6205330 Winbladh Mar 2001 B1
6208290 Krasner Mar 2001 B1
6208854 Roberts Mar 2001 B1
6215441 Moeglein Apr 2001 B1
6219557 Havinis Apr 2001 B1
6223046 Hamill-Keays Apr 2001 B1
6226529 Bruno May 2001 B1
6239742 Krasner May 2001 B1
6247135 Feague Jun 2001 B1
6249680 Wax Jun 2001 B1
6249744 Morita Jun 2001 B1
6249783 Crone et al. Jun 2001 B1
6260147 Quick, Jr. Jul 2001 B1
6266614 Alumbaugh Jul 2001 B1
6275692 Skog Aug 2001 B1
6275849 Ludwig Aug 2001 B1
6289373 DeZonno Sep 2001 B1
6307504 Sheynblat Oct 2001 B1
6308269 Proidl Oct 2001 B2
6313786 Sheynblat et al. Nov 2001 B1
6317594 Gossman Nov 2001 B1
6321091 Holland Nov 2001 B1
6321250 Knape Nov 2001 B1
6321257 Kotola Nov 2001 B1
6324542 Wright, Jr. Nov 2001 B1
6327473 Soliman et al. Dec 2001 B1
6327479 Mikkola Dec 2001 B1
6333919 Gafney Dec 2001 B2
6367019 Ansell Apr 2002 B1
6370389 Isomursu Apr 2002 B1
6377209 Krasner Apr 2002 B1
6400314 Krasner Jun 2002 B1
6400958 Isomursu Jun 2002 B1
6411254 Moeglein Jun 2002 B1
6421002 Krasner Jul 2002 B2
6433734 Krasner Aug 2002 B1
6449473 Raivisto Sep 2002 B1
6449476 Hutchison, IV et al. Sep 2002 B1
6456852 Bar Sep 2002 B2
6477150 Maggenti Nov 2002 B1
6504491 Christians Jan 2003 B1
6505049 Dorenbosch Jan 2003 B1
6510387 Fuchs et al. Jan 2003 B2
6512922 Burg et al. Jan 2003 B1
6512930 Sandegren Jan 2003 B2
6515623 Johnson Feb 2003 B2
6519466 Pande et al. Feb 2003 B2
6522682 Kohli et al. Feb 2003 B1
6529490 Oh Mar 2003 B1
6529722 Heinrich Mar 2003 B1
6529829 Turetzky et al. Mar 2003 B2
6531982 White et al. Mar 2003 B1
6538757 Sansone Mar 2003 B1
6539200 Schiff Mar 2003 B1
6539304 Chansarkar Mar 2003 B1
6542464 Takeda Apr 2003 B1
6542734 Abrol et al. Apr 2003 B1
6542743 Soliman Apr 2003 B1
6549522 Flynn Apr 2003 B1
6549776 Joong Apr 2003 B1
6549844 Egberts Apr 2003 B1
6556832 Soliman Apr 2003 B1
6560534 Abraham et al. May 2003 B2
6570530 Gaal et al. May 2003 B2
6571095 Koodli May 2003 B1
6574558 Kohli Jun 2003 B2
6584307 Antonucci Jun 2003 B1
6584552 Kuno et al. Jun 2003 B1
6594500 Bender et al. Jul 2003 B2
6597311 Sheynblat et al. Jul 2003 B2
6600927 Hamilton Jul 2003 B2
6606495 Korpi et al. Aug 2003 B1
6606554 Edge Aug 2003 B2
6609004 Morse et al. Aug 2003 B1
6611757 Brodie Aug 2003 B2
6618670 Chansarkar Sep 2003 B1
6621452 Knockeart et al. Sep 2003 B2
6628233 Knockeart et al. Sep 2003 B2
6360093 Jones Oct 2003 B1
6633255 Krasner Oct 2003 B2
6640184 Rabe Oct 2003 B1
6650901 Schuster Nov 2003 B1
6661372 Girerd Dec 2003 B1
6665539 Sih et al. Dec 2003 B2
6665541 Krasner et al. Dec 2003 B1
6671620 Garin et al. Dec 2003 B1
6677894 Sheynblat et al. Jan 2004 B2
6678357 Stumer Jan 2004 B2
6680694 Knockeart et al. Jan 2004 B1
6680695 Turetzky et al. Jan 2004 B2
6694258 Johnson et al. Feb 2004 B2
6697629 Grilli et al. Feb 2004 B1
6701144 Kirbas et al. Mar 2004 B2
6703971 Pande et al. Mar 2004 B2
6703972 van Diggelmen Mar 2004 B2
6704651 van Diggelmen Mar 2004 B2
6707421 Drury et al. Mar 2004 B1
6714793 Carey et al. Mar 2004 B1
6718174 Vayanos Apr 2004 B2
6720915 Sheynblat Apr 2004 B2
6721578 Minear et al. Apr 2004 B2
6721871 Piispanen Apr 2004 B2
6724342 Bloebaum et al. Apr 2004 B2
6725159 Krasner Apr 2004 B2
6731940 Nagendran May 2004 B1
6734821 van Diggelen May 2004 B2
6738013 Orler May 2004 B2
6738800 Aquilon May 2004 B1
6741842 Goldberg et al. May 2004 B2
6744856 Karnik Jun 2004 B2
6745038 Callaway Jun 2004 B2
6747596 Orler Jun 2004 B2
6748195 Philips Jun 2004 B1
6751464 Burg et al. Jun 2004 B1
6756938 Zhao et al. Jun 2004 B2
6757544 Rangarajan et al. Jun 2004 B2
6771742 McCalmont Aug 2004 B2
6772340 Peinado Aug 2004 B1
6775655 Peinado Aug 2004 B1
6775802 Gaal Aug 2004 B2
6778136 Groneneyer Aug 2004 B2
6778885 Agashe et al. Aug 2004 B2
6781963 Crockett Aug 2004 B2
6788249 Farmer et al. Sep 2004 B1
6795699 McCraw et al. Sep 2004 B1
6799049 Zellner Sep 2004 B1
6799050 Krasner Sep 2004 B1
6801159 Swope et al. Oct 2004 B2
6804524 Vandermeijjden Oct 2004 B1
6808534 Escano Oct 2004 B1
6810323 Bullock et al. Oct 2004 B1
6813560 van Diggelen Nov 2004 B2
6816111 Krasner Nov 2004 B2
6816710 Krasner Nov 2004 B2
6816719 Heinonen Nov 2004 B1
6816734 Wong et al. Nov 2004 B2
6820269 Kogan Nov 2004 B2
6829475 Lee et al. Dec 2004 B1
6832373 O'Neill Dec 2004 B2
6839020 Geir et al. Jan 2005 B2
6839021 Sheynblat et al. Jan 2005 B2
6842715 Gaal Jan 2005 B1
6853916 Fuchs et al. Feb 2005 B2
6856282 Mauro et al. Feb 2005 B2
6861980 Rowitch et al. Mar 2005 B1
6865171 Nilsson Mar 2005 B1
6865395 Riley Mar 2005 B2
6867734 Voor Mar 2005 B2
6873854 Crockett Mar 2005 B2
6885940 Brodie et al. Apr 2005 B2
6888497 King et al. May 2005 B2
6888932 Snip May 2005 B2
6895238 Newell et al. May 2005 B2
6895249 Gaal May 2005 B2
6900758 Mann et al. May 2005 B1
6903684 Simic et al. Jun 2005 B1
6904029 Fors et al. Jun 2005 B2
6907224 Younis Jun 2005 B2
6907238 Leung Jun 2005 B2
6912395 Berer et al. Jun 2005 B2
6912545 Lundy et al. Jun 2005 B1
6915208 Garin et al. Jul 2005 B2
6917331 Groneneyer Jul 2005 B2
6930634 Peng et al. Aug 2005 B2
6937187 van Diggelen Aug 2005 B2
6937597 Rosenberg Aug 2005 B1
6937872 Krasner Aug 2005 B2
6940950 Dickinson Sep 2005 B2
6941144 Stein Sep 2005 B2
6944540 King et al. Sep 2005 B2
6947772 Minear et al. Sep 2005 B2
6950058 Davis et al. Sep 2005 B1
6957073 Bye Oct 2005 B2
6961019 McConnell et al. Nov 2005 B1
6961562 Ross Nov 2005 B2
6963557 Knox Nov 2005 B2
6965754 King Nov 2005 B2
6965767 Maggenti Nov 2005 B2
6968195 Nowak Nov 2005 B2
6970917 Kushwaha Nov 2005 B1
6973320 Brown et al. Dec 2005 B2
6975266 Abraham et al. Dec 2005 B2
6978453 Rao et al. Dec 2005 B2
6980816 Rohles Dec 2005 B2
6996720 DeMello Feb 2006 B1
6999782 Shaughnessy Feb 2006 B2
7024321 Deninger et al. Apr 2006 B1
7024393 Peinado Apr 2006 B1
7047411 DeMello May 2006 B1
7065351 Carter et al. Jun 2006 B2
7065507 Mohammed Jun 2006 B2
7079857 Maggenti Jul 2006 B2
7092385 Gallant Aug 2006 B2
7103018 Hansen Sep 2006 B1
7103574 Peinado Sep 2006 B1
7106717 Rousseau Sep 2006 B2
7136838 Peinado Nov 2006 B1
7151946 Maggenti Dec 2006 B2
7209969 Lahti Apr 2007 B2
7218940 Niemenmaa May 2007 B2
7221959 Lindqvist May 2007 B2
7321773 Hines Jan 2008 B2
7440442 Grabelsky Oct 2008 B2
7522581 Acharya Apr 2009 B2
20020037735 Maggenti Mar 2002 A1
20020052214 Maggenti May 2002 A1
20020061760 Maggenti May 2002 A1
20020069259 Kushwaha Jun 2002 A1
20020102999 Maggenti Aug 2002 A1
20020112047 Kushwaha Aug 2002 A1
20020197991 Anvekar Dec 2002 A1
20030009602 Jacobs Jan 2003 A1
20030016804 Sheha Jan 2003 A1
20030037163 Kitada Feb 2003 A1
20030065788 Salomaki Apr 2003 A1
20030072318 Lam et al. Apr 2003 A1
20030078064 Chan Apr 2003 A1
20030078886 Minear Apr 2003 A1
20030081557 Mettala May 2003 A1
20030101329 Lahti May 2003 A1
20030103484 Oommen et al. Jun 2003 A1
20030114148 Albertson et al. Jun 2003 A1
20030115328 Saliminen Jun 2003 A1
20030137961 Tsirtsis Jul 2003 A1
20030153340 Crockett Aug 2003 A1
20030153341 Crockett Aug 2003 A1
20030153342 Crockett Aug 2003 A1
20030153343 Crockett Aug 2003 A1
20030161298 Bergman Aug 2003 A1
20030196105 Fineberg Oct 2003 A1
20030204640 Sahinoja Oct 2003 A1
20030223381 Schrodens Dec 2003 A1
20040002326 Maher Jan 2004 A1
20040044623 Wake Mar 2004 A1
20040068724 Gardner Apr 2004 A1
20040098497 Banet May 2004 A1
20040132465 Mattila Jul 2004 A1
20040146040 Phan-Anh et al. Jul 2004 A1
20040163104 Schein et al. Aug 2004 A1
20040205151 Sprigg Oct 2004 A1
20040229632 Flynn et al. Nov 2004 A1
20040242238 Wang Dec 2004 A1
20050028034 Gantman Feb 2005 A1
20050039178 Marolia et al. Feb 2005 A1
20050041578 Huotari Feb 2005 A1
20050043037 Ioppe Feb 2005 A1
20050086467 Asokan et al. Apr 2005 A1
20050201528 Meer Sep 2005 A1
20050209995 Aksu Sep 2005 A1
20050259675 Tuohino et al. Nov 2005 A1
20060053225 Poikselka Mar 2006 A1
20060212558 Sahinoja Sep 2006 A1
20060212562 Kushwaha Sep 2006 A1
20060234639 Kushwaha Oct 2006 A1
20060234698 Folk et al. Oct 2006 A1
20060258380 Liebowitz Nov 2006 A1
20070026854 Nath Feb 2007 A1
20070030539 Nath Feb 2007 A1
20070049288 Lamprecht Mar 2007 A1
20070253429 James Nov 2007 A1
20070254625 Edge Nov 2007 A1
20080162637 Adamczyk Jul 2008 A1
20090003535 Grabelsky Jan 2009 A1
20090067417 Kalavade Mar 2009 A1
20090097450 Wallis Apr 2009 A1
Related Publications (1)
Number Date Country
20090011760 A1 Jan 2009 US
Continuations (1)
Number Date Country
Parent 10724773 Dec 2003 US
Child 12230864 US