`
`( 19) World Intellectual Property Organization
`International Bureau
`
`I lllll 1111111111111111 lllll 11111111111111111111111111111111111111111 IIII IIII IIII
`
`(43) International Publication Date
`21 February 2002 (21.02.2002)
`
`PCT
`
`(JO) International Publication Number
`WO 02/15601 A2
`
`(51) International Patent Classification 7 :
`
`H04Q 7/00
`
`(21) International Application Number:
`
`PCT/EP0 1/08861
`
`(22) International Filing Date:
`
`I August 2001 (01.08.2001)
`
`(25) Viling Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(30) Priority Data:
`09/639. 715
`
`14 August 2000 (14.08.2000) US
`
`(71) Applicant: KONINKLIJKE PHILIPS ELECTRON(cid:173)
`ICS N.V. [NL/NL]; Groencwoudscwcg I. NL-5621 BA
`Eindhoven (NL).
`
`(81) Designated States (national): AE. AG. AL. AM. AT. AU.
`AZ. BA. BB. BG. BR, BY, BZ. CA. CH. CN. CO, CR. CU.
`CZ. DE, DK, DM. DZ. EC. EE. ES. FI. GB. GD. GE, GH.
`GM. HR, HU. ID. IL. IN. IS. JP. KE. KG. KP. KR. KZ. LC.
`LK. LR. LS. LT, LU. LY, MA. MD, MG, MK. MN. MW.
`MX. MZ. NO. NZ. PL. PT. RO. RU. SD. SE. SG, SI. SK.
`SL. TJ, TM. TR. TT. TZ. UA. UG. UZ. YN. YU. ZA. ZW.
`
`(84) Designated States (regional): ARIPO patent (GH. GM.
`KE. LS. MW, MZ, SD, SL. SZ. TZ. UG. ZW). Eurasian
`patent (AM, AZ. BY. KG. KZ, MD. RU. TJ. TMJ. European
`patent (AT. BE. CH, CY, DE. DK, ES. Fl. FR. GB, GR. IE.
`IT. LU, MC. NL. PT. SE. TR). OAPI patent (BF. BJ. CF.
`CG, Cl. CM. GA, GN, GQ. GW, ML. MR. NE. SN. TD.
`TG).
`
`Published:
`without international search repor/ and lo be republished
`upon receipt of that report
`entire~v in electronic form (except for thisjronl page) and
`available upon request from the International Bureau
`
`For two-let/er codes and other abbreviations. refer to /he "Guid(cid:173)
`ance Notes on Codes andAhbreviations" appearing at the begin(cid:173)
`ning of each regular issue of the PCT Ga::elle.
`
`(72) Inventors: RACHABATHUNI, Sailesh; Prof. Holst(cid:173)
`laan 6. NL-5656 AA Eindhoven (NL). GRIFFITHS,
`Johathan; Prof. Holstlaan 6. NL-5656 AA Eindhoven
`(NL). RANKIN, Paul, J.; Prof. Holstlaan 6. NL-5656 AA
`Eindhovcn (NL).
`
`(74) Agent: MEYER, Michael: lntcrnationaal Octrooibureau
`B.V .. Prof. Holstlaan 6, NL-5656 AA Eindhovcn (NL).
`
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`
`~ --==
`iiiiiiiiiiiiiii -iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`-iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiii ===
`
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`
`~
`
`~ (54) Title: IN A WIRELESS SYSTEM. A METHOD OF SELECTING AN APPLICATION WHILE RECEIVNG APPLICATION
`~ SPECIFIC MESSAGES AND USER LOCATION METHOD USING USER LOCATION AWARENESS
`
`~
`0
`(57) Abstract: A method of selecting an application in a wireless device and a user location method are provided. In the method
`~ of selecting an application, specific messages are received from a wireless station. The application specific messages arc specific to
`~ services provided via a wireless station transmitting the application specific messages. The application specific messages have an
`.._ application specific identifier identifying a specific application and data corresponding to the specific application. It is determined
`~ whether an application is present in the wireless device that corresponds to the received application specific identifier. If it is de-
`termined that the corresponding application is ahsent in the wireless device, the correspondingly received data is ignored. In the
`0 user location method that is used in a wireless system. locations and user identities of users of wireless devices arc registered. The
`> wireless devices are capable of roaming through the wireless system when the wireless devices enter into coverage areas of wireless
`~ stations in the system. A user location awareness application uses the registered locations and user identities of the wireless devices
`
`Petitioners' Ex. 1013, Page 1 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`In a wireless system, a method of selecting an application while receiving application specific
`
`messages and user location method using user location awareness
`
`1
`
`BACKGROUND OF THE INVENTION
`
`FIELD OF THE INVENTION
`
`The present invention relates to context aware wireless devices needing
`
`context dependent services. Such services may be location or user specific. Such wireless
`
`5
`
`devices may be cell phones or PD As (Personal Digital Assistants) with augmented functions,
`or dedicated devices, or any other suitable wireless device.
`
`DESCRIPTION OF THE RELATED ART
`Recent years have seen a great increase in subscribers world-wide to mobile
`
`10
`
`telephone networks and, through advances in technology and the addition of functionalities,
`
`cellular telephones have become personal, trusted devices. A result of this is that a mobile
`
`information society is developing, with personalised and localised services becoming
`increasingly more important. Such "Context-Aware" (CA) mobile telephones are used with
`
`low power, short-range base stations in places like shopping malls to provide location-
`
`15
`
`specific information. This information might include local maps, information on nearby
`
`shops and restaurants, information on exhibitions at museums and so on. The user's CA
`
`terminal may be equipped to filter the information received according to pre-stored user
`
`preferences or user profiles and the user is only alerted if an item of data of particular interest
`
`has been received.
`
`20
`
`As example of a CA terminal is given in a technical report published by
`Hewlett Packard, "Uniform Web Presence Architecture for People, Places, and Things",
`
`HPL-2000-67, 13 pages, June, 2000. This report decribes HP's ''Cooltown" vision. The
`
`I
`
`Cooltown vision is that people, places, and things have web representation and that many
`
`useful services can be offered by creating a tighter link between the real word entity and its
`vitual representation. Software architectures are defined enabling the dynamic generation of
`
`25
`
`Web contents based on the user context (location, identity, device capabilities), on his
`security permission, and on the relationships with other Web presences. In Cooltown, the
`
`future consists of nomadic people carrying personal communication and web browsing
`devices interacting with services that are location specific and customized to the user.
`
`Petitioners' Ex. 1013, Page 2 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`2
`
`In Cooltown, a patron might enter into an art museum carrying a handheld
`
`personal communication device with an embedded web browser. The museum has web pages
`
`corresponding to each room of the museum that comes available automatically upon entering
`
`the room. Individual paintings also have a web presence. By approaching a painting, the web
`
`5
`
`page for that painting becomes available automatically. Other services such as printing,
`
`shopping, and choosing one's next activity can be made more relevant as well by connecting
`
`the services to the user's location context. The web presence of the patron could be
`
`automatically linked to the web presence of the devices ( cell phone, handheld device,
`
`etcetera) the patron's husband is currently carrying. The patron's husband clicks on a link
`
`10
`
`representing the patron and a corresponding application pops up at the patron's husband's
`
`device, the application establishing a web link to the current patron's web presence. A web
`
`presence is accessible by any kind of HTTP client including but not limited to a Web
`
`browser, HTML pages being accessible by a client using simple URLs that refer to a home
`
`page at a server. At a given location, URLs become available from wireless "beacons". These
`
`15
`
`beacons are small infrared or radio transceivers located at a particular location.
`
`Thus in the future mobile information society many context, location and
`
`application specific services should be made available to a person carrying a handheld device
`
`such as a cell phone, a PDA or any other handheld device that is capable of communicating
`
`within a defined coverage area within a system.
`
`20
`
`25
`
`SUMMARY OF THE INVENTION
`
`It is an object of the invention to provide a method of selecting an application,
`
`for use in a wireless device, on _the basis of application specific messages received from a
`
`wireless station.
`
`It is another object of the invention to provide such a method wherein
`
`availability and/or desirability to run an application is checked.
`
`It is still another object of the invention to provide such a method wherein
`
`application specific data in said application specific messages is passed to a selected
`
`application.
`
`30
`
`It is an object of the invention to also provide a wireless system running a user
`
`location awareness application using location registration information of context aware
`
`wireless devices when such devices roam through a wireless system of wireless stations of
`
`limited range.
`
`Petitioners' Ex. 1013, Page 3 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`3
`
`It is another object of the invention to provide such a wireless system while
`
`using historical registration data.
`
`It is still another object of the invention to provide such a wireless system
`
`while using proximity information of users to users and/or of users to locations.
`
`5
`
`It is still another object of the invention to provide such a wireless system
`
`while filtering location registration information.
`
`In accordance with the invention, a method of selecting an application is
`
`provided, said method comprising:
`
`receiving application specific messages from a wireless station, said
`
`10
`
`application specific messages being specific to services provided via a wireless station
`
`transmitting said application specific messages, and said application specific messages
`
`comprising an application specific identifier identifying a specific application and data
`
`corresponding to said specific application;
`
`determining whether an application is present in said wireless device that
`
`15
`
`corresponds to said received application specific identifier; and
`
`ignoring said correspondingly received data if it is determined that said corresponding
`
`application is absent in said wireless device.
`
`Advantageously, said application specific messages are received as
`
`connectionless transmitted packets. Herewith, there is no need for unnecessary procedures
`
`20
`
`such as used for connection-oriented communications. Particularly, for context aware
`
`roaming wireless devices that may have a need to quickly change applications a transmission
`
`method is needed avoiding exchange of a lot of system control data. Upon reception, the
`
`packets are re~assembled to application specific messages.
`
`Advantageously, it is checked whether an application corresponding to the
`
`25
`
`received application specific messages is active. Herewith, unnecessary halting of other
`
`running applications, particularly of applications needing the user interface of the wireless
`
`device, is avoided.
`
`By first checking whether the specific application to be loaded matches a user
`
`profile of user preferences in the context wireless environment, it is prevented that currently
`
`30
`
`not needed applications are made active.
`
`In accordance with the invention, also a user location method for use in a
`
`wireless system is provided, said method comprising:
`
`Petitioners' Ex. 1013, Page 4 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`4
`
`registering of locations and user identities of users of wireless devices that
`
`capable of roaming through said wireless system when said wireless devices enter into
`coverage areas of wireless stations in said system; and
`
`running a user location awareness application, said user loca~ion awareness
`application using said registered locations and user identities of said wireless devices.
`
`5
`
`Herewith users in the system are made aware of each other or of their location
`
`while moving from one location to the other, thereby providing a mechanism to relate
`
`services to users, such as location dependent services to a single user, to location dependent
`
`services to multiple users at a single location or at different locations. Such a mechanism is
`
`10
`
`particularly useful in future wireless systems requiring context dependent services.
`
`Particularly useful is an application using historical registration data so that a
`user's movement and behavior can be predicted in advance of providing services. Such
`
`movement could be heading into a direction of a particular wireless station, that could be a
`short-range beacon at a shopping mall or museum, or the like, or could have resulted that the
`
`15
`
`particular wireless device and thus it's user actually is in proximity of the particular wireless
`station.
`
`Another particularly useful application is determining proximity of a user or
`
`users to wire~ess stations. Herewith users can be made aware of the location, and users can be
`made aware of each others locations. Such a mechanism is particularly useful for roaming
`
`20
`
`users who want to contact or meet each other. A user may advantageously also set a user
`
`profile to filter whether an alert should be provided in a given context. Also advantageously
`system behavior may be modified depending on proximity information. Users within range of
`
`the same beacon could have their user profiles checked so that users of similar interest could
`easily contact each other, for instance. Or users could check profiles provided by beacons.
`The system should be modified in that profiles of users entering and leaving a beacon's area
`
`25
`
`should be added or removed from a beacon's set of profiles.
`
`Another useful application is filtering of registration data, either at the side of
`
`the client, i.e., the wireless device, or at the side of the server. Such filtering could be
`necessary if a user passes beacons, particularly short-range beacons, too fast or too
`
`30
`
`frequently, or to avoid system overhead through processing of redundant data.
`
`BRIEF DESCRIPTION OF THE DRAWING
`
`Figure 1 schematically shows a wireless system according to the invention.
`
`Petitioners' Ex. 1013, Page 5 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`Figure 2 schematically shows another wireless system according to the
`
`5
`
`invention.
`
`invention.
`
`Figure 3 shows a wireless device for use in a wireless system according to the
`
`5
`
`Figure 4 is another representation of a wireless device according to the
`
`invention.
`
`invention.
`
`Figure 5 illustrates roaming of a wireless device according to the invention.
`
`Figure 6 shows beacon signals used in a wireless system according to the
`
`10
`
`Figure 7 is still another representation of a wireless device according to the
`
`invention.
`
`Figure 8 is a flow chart illustrating operation of the invention.
`
`Figure 9 schematically shows a wireless system with a location identification
`server according to the invention.
`
`15
`
`Figure 10 shows a database record used by a location identification server
`according to the invention.
`
`Figure 11 illustrates acquisition of location identification information
`
`according to the invention.
`
`20
`
`Figure 12 shows a location identification server according to the invention.
`Figure 13 illustrates a proximity alert application according to the invention.
`
`Figure 14 illustrates modification of system behavior in a proximity based
`wireless system according to the invention.
`
`Figure 15 shows a hot badge application in such a proximity based system.
`Figure 16 shows filtering in a proximity alert system according to the
`
`25
`
`invention.
`
`features.
`
`Throughout the figures the same reference numerals are used for the same
`
`DESCRIPTION OF THE DETAILED EMBODIMENTS
`
`30
`
`Figure 1 schematically shows a wireless system 1 according to the invention.
`
`The wireless system 1 comprises a wide area network 2 with wireless stations 3 and 4, radio
`base stations of a cellular telephony network. The wireless system 1 further comprises
`
`wireless stations 5 and 6, short-range communication or broadcast beacons using radio
`
`communication or infrared communication or any other suitable wireless communication or
`
`Petitioners' Ex. 1013, Page 6 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`6
`
`broadcast, and a wireless device 7. The wide area network 2 is coupled to an application
`
`server 8 that uses a database 9. The wireless device 7 may be a cell phone that uses a cellular
`network communication protocol and that is further capable of communicating with the
`wireless beacons 5 and 6 using another communication protocol. The wireless device may
`also be a dedicated device only capable of communicating with the beacons 5 and 6. The
`wireless device may also be a dedicated device only capable of communicating through the
`base stations 3 and 4 with the wide area network 2. Preferably, the wireless device 7
`communicates with the beacons 5 and 6 through packet transmission using a packet 10. The
`
`packet 10 conveys small quantities of information at a time. Packet transmission may use a
`protocol as described in a patent application filed earlier by the same assignee (PHGB000084
`(UK Appln No. 0015454.2, Filed June 26, 2000), the contents of which is herewith
`incorporated by reference. In the packet transmission protocol described therein added data to
`an existing protocol, the so-called Bluetooth protocol, are piggy backed on inquiry
`facilitation signals, as sixty four bit payloads. In this protocol, in a full inquiry cycle over
`sixteen hopping frequencies and a number of repetitions, and through inclusion of clock
`. information of the beacon for synchronization purposes, a full beacon signal of sixteen
`
`kBytes can be transmitted. Other suitable packet transmission systems may be applied as
`well. In principle, also connection-oriented communication could be used. The database 9
`may store user location information and user identities, applications to be downloaded, or
`other information used by the invention as will be described in further detail hereafter. The
`application server 8 may be configured to download applications to the wireless device 7.
`Figure 2 schematically shows another wireless system 20 according to the
`
`invention. The wireless system 20 comprises a wide area network or local area network 21 of
`wireless beacons 22 and 23.
`The wireless systems 1 and 2 may comprise further application servers and
`databases. Such further servers and databases may be located at and dedicated to the wireless
`beacons 5, 6, 22 and 23, or may be networked to form a dedicated network. In the wireless
`
`5
`
`10
`
`15
`
`20
`
`25
`
`system 20, the wireless beacons 22 and 23 are networked to form a local area network to
`provide a tailored set of applications covering a given geographical area, the premises of a
`30 museum for instance. In an embodiment of dedicated servers and databases to wireless
`beacons, the respective servers and databases only serve areas covered by the respective
`wireless beacons.
`Figure 3 in more detail shows the wireless device 7. The wireless device 7
`comprises transceivers 30 and 31 that are respectively configured to communicate with the
`
`Petitioners' Ex. 1013, Page 7 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`7
`
`radio base stations 3 and 4, and with the wireless beacons 5, 6, 22 and 23. The transceiver 30
`
`is a cellular phone transceiver and includes well-known circuitry for transmission,
`
`modulation and demodulation, encoding and decoding, analog-to-digital conversion, and
`
`digital-to-analog conversion (not shown in detail here). The transceiver 31 is configured to
`
`5
`
`operate in a Bluetooth environment, preferably with additional data transmission piggy
`
`backed on Bluetooth inquiry messages. The wireless device 7 further comprises a processor
`
`32 that is coupled to a programmed ROM (Read Only Memory) 33 and a RAM (Random
`
`Access Memory) 34. The wireless device 7 further comprises a display 35, a keyboard 36,
`
`and an audio presentation device 37 that can present voice messages, alerts, or voice
`
`10
`
`communication. The wireless device 7 may be programmed to run W AP applications (Wire
`
`Access Protocol) and then include a cell phone enabled browser.
`
`Figure 4 is another representation of the wireless device 7 according to the
`
`invention to illustrate use of the wireless device 7 of receiving and processing application
`
`specific messages. The wireless device 7 comprises a ·core program 40 continuously running
`
`15
`
`on the processor 32. Application memory 33 stores applications 41, 42 and 43. For
`
`application 41, an application specific identifier AIDl is also stored, and for application 42
`
`an application specific identifier AID2. No identifier is stored for application 43. Data
`
`memory 34 may store data such as weather data 44, stock data 45, and game score data 46.
`
`The weather and stock data are received through generic beacon signals. The user of the
`
`20 wireless device 7 may decide that a new application should be loaded into the wireless device
`
`7 and install or download such a new program, or that a stored program is no longer needed
`
`and delete such a program.
`
`Figure 5 illustrates roaming of a user carrying the wireless device 7 according
`
`to the invention, indicated with a dashed arrow 50. While roaming the wireless device 7
`
`25
`
`enters into a range of a wireless beacon and leaves it to enter into a range of another wireless
`
`beacon, and so on. While roaming beacon respective signals BS!, BS2 and BSS are received
`
`from respective wireless beacons Bl, B2 and BS, the user entering transmission ranges of the
`
`beacons Bl, B2 and BS. No beacon signals are received from beacons B3 and B4.
`
`Figure 6 shows beacon signals used in the wireless systems 1 and 20 according
`
`30
`
`to the invention. The wireless beacons 5, 6, 22 and 23 each continuously broadcast beacon
`
`signals, such beacon signals including a generic beacon signal 60 as shown in Fig. 6B, and an
`
`application specific beacon signal 61 as shown in Fig. 6C. Bytes 62 and 63 are used to
`
`indicate the length of a beacon signal, and byte 64 to indicate the type of a beacon signal,
`
`generic or specific. For a generic beacon signal bytes 65 and 66 are used to indicate an
`
`Petitioners' Ex. 1013, Page 8 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`8
`
`information type of information contained in a beacon signal, such as weather data and stock
`
`data. For an application specific beacon, bytes 65-68 contain an application specific
`
`identifier, and the remaining bytes application specific data.
`
`Figure 7 is still another representation of the wireless device 7 when receiving
`
`5
`
`and processing application specific messages from wireless beacons. As shown, the wireless
`
`device 7 receives application specific messages with respective application specific
`
`identifiers AIDl, AID2, and AID122, ignores the received application specific message with
`
`application specific identifier AID122, and processes the received application specific
`
`messages with application specific identifiers AIDl and AID2.
`
`10
`
`Figure 8 is a flow chart illustrating operation of receiving and processing of
`
`beacon signals. In block 80, the wireless device 7 waits for a beacon signal. In block 81, upon
`
`reception of a beacon signal, that is re-assembled from received packets, the wireless device
`
`checks a beacon signal's type. If a beacon signal is generic, in block 82, the wireless device 7
`
`handles the generic beacon signal. If a beacon signal is application specific, in block 83, the
`
`15 wireless device 7 checks whether an application exists indicated by the received application
`
`specific identifier. If no such application exists, returned is to block 80. If such an application
`
`exists, in block 84 it is check whether the application is active. If the application is active, in
`
`block 85, correspondingly received data is passed to the active application or program. If the
`
`application is inactive, in block 86 a user profile of user preferences is checked for the
`
`20
`
`desirability to activate the inactive application. If there is such a desirability, in block 87, the
`
`inactive application is activated and correspondingly received data is passed to the active
`
`application. The active program may respond to the passed data in various ways. It may bring
`
`the passed data to the users atte~tion, it may check from other data stored in the wireless
`
`device 7 whether the passed data is of interest to the user, it may consult a central server
`
`25
`
`through the WAN 2 to find out whether the passed data is of interest to the user, or it may
`
`send the passed data to the central server, possibly together with already stored data, for
`
`further processing.
`
`Figure 9 schematically shows a wireless system 90. The wireless system 90
`
`comprises a location identification server 91 that is coupled to a location database 92. The
`
`30 wireless system 90 further comprises wireless devices 93 and 94 of the type of the wireless
`
`device 7, and wireless beacons 95 and 96. The wireless devices 93 and 94 are configured to
`
`communicate with the location identification server 91 through wide area network or carrier
`
`network 97, that may be a cellular network. The wireless beacons 95 and 96 are configured to
`
`Petitioners' Ex. 1013, Page 9 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`9
`
`contact the location identification server 91 through the Internet 98. The location
`identification server 91 registers locations and user identities of users of wireless devices.
`Figure 10 shows a database record 100 used by the location identification
`server according to the invention. The record 100 comprises a record number field 101, a
`user identity or identification field 102, a location identification field 103, and a date and
`time field 104 registering when the user was last encountered at a given location such as at a
`location of a wireless beacon. The wireless system 90 may be configured to keep historical
`
`location data, to filter location data, and to delete location data. The wireless system 90 may
`be configured to use historical location data to predict movements of roaming users, to
`inform a user of it's proximity to a system resource, to make aware users of each other's
`proximity or to respective proximities to respective locations, or to other applications
`described or suggested by the present application. Services may be provided that use relative
`
`5
`
`10
`
`15
`
`20
`
`location information, describing the proximity of users and wireless devices to a known
`location or other users and wireless devices. The wireless system 90 may also be of a type as
`shown and described in Figures 1 and 2, in so far as location registration is meaningful. In it's
`simplest form, the wireless system 90 has the structure of a single network, such as a cellular
`network, that has the capability to coupled users to locations in terms of proximity to a
`system resource. Particularly, when such cellular networks are pico-networks, the described
`location awareness still is meaningful and useful. Preferably, the wireless system 90 at least
`also comprises short-range wireless beacons that have a better defined location. Typically,
`such short-range beacons have a transmission output power of lmW to lO0mW, limiting
`their transmission range.
`In a system also containing wireless beacons, when roaming, the users
`encounter a succession of beacons, possibly encountering beacons more than once. The
`25 wireless device 7 then acts as a bridge or relay to pass beacon information to the location
`identification server 91. Upon reception of passed beacon information, the server 91 updates
`the location database 92 so that the database 92 reflects which wireless beacons wireless
`device have or had proximity to. The wireless system 90 may use short term or long term
`historical proximity data for a given wireless device or set of wireless devices to predict
`location or proximity changes. As an example, a user carrying a wireless device proceeds
`along a street into the range of wireless beacons. On the basis of gathered location
`information, the wireless system 90 may predict when the user arrives as a given location at a
`certain time. Such a prediction mechanism may be implemented as an application running at
`the server 91. The wireless system 90 may use long term history of proximity of location for
`
`30
`
`Petitioners' Ex. 1013, Page 10 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`10
`
`users to build profiles of their movements, individual or shared interests. Herewith, users can
`
`be linked with places, shops, and other users. The database 92 could store a record of
`
`matches to these places and people which is averaged over time.
`
`Figure 11 illustrates alternative acquisition of location identi!ication
`
`5
`
`information according to the invention. Shown is a table 110 with location identifiers 111
`
`that uniquely identify a global location, with a description 112 of a location, and with latitude
`
`and longitude data of the location. Location identification can be represented in various ways,
`
`it can be a geographical description of a location whereby the location_ identifier itself forms
`
`the data to identify a location, it can be a reference to a geographical description of a
`
`10
`
`location, i.e., just a pointer to other information that can be used to determine the location.
`
`Figure 12 shows an embodiment of the location identification server 91
`
`according to the invention. Through the cellular network 97, a W AP gateway 120 and an
`
`Internet server 121, the wireless device 93 passes location and user identity information to
`
`the location identification server 91 for inclusion into the database 92. The location
`
`15
`
`identification server 91 is implemented as a CGI (Common Gateway Interface) script that
`
`resides on the web server 121 that can be reached through the Internet. The wireless device
`
`93 transmits a location identifier it acquired from the wireless beacon 95 to the location
`
`identification server 91 using W AP: "http://1.l.1.1/locsrvr.cgi?loc_id=Li&user.Jd=Ui". The
`
`wireless device 93 calls the CGI script with the location identifier as a parameter, the location
`
`20
`
`identification server's CGI script being invoked by the web server 121 it resides on. When
`
`being invoked, the location identification server's CGI script receives the location identifier
`
`as a parameter and the CGI script stores the location identifier in the database 92.
`
`Figure 13 illustrates a proximity alert application according to the invention.
`
`As shown, wireless device 130 is in-range of beacon 131 at location Li,
`
`25 wireless device 132 is in-range of beacon 133 at location Lj, and wireless device 134 is in(cid:173)
`
`range of beacon 135 at location Lk. Further shown is a user profile 136 of userl carrying
`
`wireless device 134. As a result of user2 matching userl 's user profile 136, userl will get a
`
`proximity alert "User2 is near".
`
`The proximity alert application uses proximity information received and stored
`
`30
`
`by the location identification server and processes that information to determine the
`
`proximity of any two users or one user and a location. The proximity alert application uses
`
`the following information to determine the proximity of two users or a user and a location:
`
`Location of a user:
`
`Petitioners' Ex. 1013, Page 11 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`
`
`WO 02/15601
`
`PCT/EP0l/08861
`
`11
`
`This can be determined from the information that is stored by the location
`
`identification server 91. This application has to make some assumptions as to how long a
`
`user is considered to be near a location after the location identification is transmitted to the
`
`location identification server 91. For example, if the last known user location is obtained on