throbber
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`( 19) World Intellectual Property Organization
`International Bureau
`
`I lllll 1111111111111111 lllll 11111111111111111111111111111111111111111 IIII IIII IIII
`
`(43) International Publication Date
`21 February 2002 (21.02.2002)
`
`PCT
`
`(JO) International Publication Number
`WO 02/15601 A2
`
`(51) International Patent Classification 7 :
`
`H04Q 7/00
`
`(21) International Application Number:
`
`PCT/EP0 1/08861
`
`(22) International Filing Date:
`
`I August 2001 (01.08.2001)
`
`(25) Viling Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(30) Priority Data:
`09/639. 715
`
`14 August 2000 (14.08.2000) US
`
`(71) Applicant: KONINKLIJKE PHILIPS ELECTRON(cid:173)
`ICS N.V. [NL/NL]; Groencwoudscwcg I. NL-5621 BA
`Eindhoven (NL).
`
`(81) Designated States (national): AE. AG. AL. AM. AT. AU.
`AZ. BA. BB. BG. BR, BY, BZ. CA. CH. CN. CO, CR. CU.
`CZ. DE, DK, DM. DZ. EC. EE. ES. FI. GB. GD. GE, GH.
`GM. HR, HU. ID. IL. IN. IS. JP. KE. KG. KP. KR. KZ. LC.
`LK. LR. LS. LT, LU. LY, MA. MD, MG, MK. MN. MW.
`MX. MZ. NO. NZ. PL. PT. RO. RU. SD. SE. SG, SI. SK.
`SL. TJ, TM. TR. TT. TZ. UA. UG. UZ. YN. YU. ZA. ZW.
`
`(84) Designated States (regional): ARIPO patent (GH. GM.
`KE. LS. MW, MZ, SD, SL. SZ. TZ. UG. ZW). Eurasian
`patent (AM, AZ. BY. KG. KZ, MD. RU. TJ. TMJ. European
`patent (AT. BE. CH, CY, DE. DK, ES. Fl. FR. GB, GR. IE.
`IT. LU, MC. NL. PT. SE. TR). OAPI patent (BF. BJ. CF.
`CG, Cl. CM. GA, GN, GQ. GW, ML. MR. NE. SN. TD.
`TG).
`
`Published:
`without international search repor/ and lo be republished
`upon receipt of that report
`entire~v in electronic form (except for thisjronl page) and
`available upon request from the International Bureau
`
`For two-let/er codes and other abbreviations. refer to /he "Guid(cid:173)
`ance Notes on Codes andAhbreviations" appearing at the begin(cid:173)
`ning of each regular issue of the PCT Ga::elle.
`
`(72) Inventors: RACHABATHUNI, Sailesh; Prof. Holst(cid:173)
`laan 6. NL-5656 AA Eindhoven (NL). GRIFFITHS,
`Johathan; Prof. Holstlaan 6. NL-5656 AA Eindhoven
`(NL). RANKIN, Paul, J.; Prof. Holstlaan 6. NL-5656 AA
`Eindhovcn (NL).
`
`(74) Agent: MEYER, Michael: lntcrnationaal Octrooibureau
`B.V .. Prof. Holstlaan 6, NL-5656 AA Eindhovcn (NL).
`
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`
`~ --==
`iiiiiiiiiiiiiii -iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`-iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`iiiiiiiiiiiiiii -iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiii ===
`
`iiiiiiiiiiiiiii
`
`iiiiiiiiiiiiiii
`
`~
`
`~ (54) Title: IN A WIRELESS SYSTEM. A METHOD OF SELECTING AN APPLICATION WHILE RECEIVNG APPLICATION
`~ SPECIFIC MESSAGES AND USER LOCATION METHOD USING USER LOCATION AWARENESS
`
`~
`0
`(57) Abstract: A method of selecting an application in a wireless device and a user location method are provided. In the method
`~ of selecting an application, specific messages are received from a wireless station. The application specific messages arc specific to
`~ services provided via a wireless station transmitting the application specific messages. The application specific messages have an
`.._ application specific identifier identifying a specific application and data corresponding to the specific application. It is determined
`~ whether an application is present in the wireless device that corresponds to the received application specific identifier. If it is de-
`termined that the corresponding application is ahsent in the wireless device, the correspondingly received data is ignored. In the
`0 user location method that is used in a wireless system. locations and user identities of users of wireless devices arc registered. The
`> wireless devices are capable of roaming through the wireless system when the wireless devices enter into coverage areas of wireless
`~ stations in the system. A user location awareness application uses the registered locations and user identities of the wireless devices
`
`Petitioners' Ex. 1013, Page 1 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`In a wireless system, a method of selecting an application while receiving application specific
`
`messages and user location method using user location awareness
`
`1
`
`BACKGROUND OF THE INVENTION
`
`FIELD OF THE INVENTION
`
`The present invention relates to context aware wireless devices needing
`
`context dependent services. Such services may be location or user specific. Such wireless
`
`5
`
`devices may be cell phones or PD As (Personal Digital Assistants) with augmented functions,
`or dedicated devices, or any other suitable wireless device.
`
`DESCRIPTION OF THE RELATED ART
`Recent years have seen a great increase in subscribers world-wide to mobile
`
`10
`
`telephone networks and, through advances in technology and the addition of functionalities,
`
`cellular telephones have become personal, trusted devices. A result of this is that a mobile
`
`information society is developing, with personalised and localised services becoming
`increasingly more important. Such "Context-Aware" (CA) mobile telephones are used with
`
`low power, short-range base stations in places like shopping malls to provide location-
`
`15
`
`specific information. This information might include local maps, information on nearby
`
`shops and restaurants, information on exhibitions at museums and so on. The user's CA
`
`terminal may be equipped to filter the information received according to pre-stored user
`
`preferences or user profiles and the user is only alerted if an item of data of particular interest
`
`has been received.
`
`20
`
`As example of a CA terminal is given in a technical report published by
`Hewlett Packard, "Uniform Web Presence Architecture for People, Places, and Things",
`
`HPL-2000-67, 13 pages, June, 2000. This report decribes HP's ''Cooltown" vision. The
`
`I
`
`Cooltown vision is that people, places, and things have web representation and that many
`
`useful services can be offered by creating a tighter link between the real word entity and its
`vitual representation. Software architectures are defined enabling the dynamic generation of
`
`25
`
`Web contents based on the user context (location, identity, device capabilities), on his
`security permission, and on the relationships with other Web presences. In Cooltown, the
`
`future consists of nomadic people carrying personal communication and web browsing
`devices interacting with services that are location specific and customized to the user.
`
`Petitioners' Ex. 1013, Page 2 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`2
`
`In Cooltown, a patron might enter into an art museum carrying a handheld
`
`personal communication device with an embedded web browser. The museum has web pages
`
`corresponding to each room of the museum that comes available automatically upon entering
`
`the room. Individual paintings also have a web presence. By approaching a painting, the web
`
`5
`
`page for that painting becomes available automatically. Other services such as printing,
`
`shopping, and choosing one's next activity can be made more relevant as well by connecting
`
`the services to the user's location context. The web presence of the patron could be
`
`automatically linked to the web presence of the devices ( cell phone, handheld device,
`
`etcetera) the patron's husband is currently carrying. The patron's husband clicks on a link
`
`10
`
`representing the patron and a corresponding application pops up at the patron's husband's
`
`device, the application establishing a web link to the current patron's web presence. A web
`
`presence is accessible by any kind of HTTP client including but not limited to a Web
`
`browser, HTML pages being accessible by a client using simple URLs that refer to a home
`
`page at a server. At a given location, URLs become available from wireless "beacons". These
`
`15
`
`beacons are small infrared or radio transceivers located at a particular location.
`
`Thus in the future mobile information society many context, location and
`
`application specific services should be made available to a person carrying a handheld device
`
`such as a cell phone, a PDA or any other handheld device that is capable of communicating
`
`within a defined coverage area within a system.
`
`20
`
`25
`
`SUMMARY OF THE INVENTION
`
`It is an object of the invention to provide a method of selecting an application,
`
`for use in a wireless device, on _the basis of application specific messages received from a
`
`wireless station.
`
`It is another object of the invention to provide such a method wherein
`
`availability and/or desirability to run an application is checked.
`
`It is still another object of the invention to provide such a method wherein
`
`application specific data in said application specific messages is passed to a selected
`
`application.
`
`30
`
`It is an object of the invention to also provide a wireless system running a user
`
`location awareness application using location registration information of context aware
`
`wireless devices when such devices roam through a wireless system of wireless stations of
`
`limited range.
`
`Petitioners' Ex. 1013, Page 3 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`3
`
`It is another object of the invention to provide such a wireless system while
`
`using historical registration data.
`
`It is still another object of the invention to provide such a wireless system
`
`while using proximity information of users to users and/or of users to locations.
`
`5
`
`It is still another object of the invention to provide such a wireless system
`
`while filtering location registration information.
`
`In accordance with the invention, a method of selecting an application is
`
`provided, said method comprising:
`
`receiving application specific messages from a wireless station, said
`
`10
`
`application specific messages being specific to services provided via a wireless station
`
`transmitting said application specific messages, and said application specific messages
`
`comprising an application specific identifier identifying a specific application and data
`
`corresponding to said specific application;
`
`determining whether an application is present in said wireless device that
`
`15
`
`corresponds to said received application specific identifier; and
`
`ignoring said correspondingly received data if it is determined that said corresponding
`
`application is absent in said wireless device.
`
`Advantageously, said application specific messages are received as
`
`connectionless transmitted packets. Herewith, there is no need for unnecessary procedures
`
`20
`
`such as used for connection-oriented communications. Particularly, for context aware
`
`roaming wireless devices that may have a need to quickly change applications a transmission
`
`method is needed avoiding exchange of a lot of system control data. Upon reception, the
`
`packets are re~assembled to application specific messages.
`
`Advantageously, it is checked whether an application corresponding to the
`
`25
`
`received application specific messages is active. Herewith, unnecessary halting of other
`
`running applications, particularly of applications needing the user interface of the wireless
`
`device, is avoided.
`
`By first checking whether the specific application to be loaded matches a user
`
`profile of user preferences in the context wireless environment, it is prevented that currently
`
`30
`
`not needed applications are made active.
`
`In accordance with the invention, also a user location method for use in a
`
`wireless system is provided, said method comprising:
`
`Petitioners' Ex. 1013, Page 4 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`4
`
`registering of locations and user identities of users of wireless devices that
`
`capable of roaming through said wireless system when said wireless devices enter into
`coverage areas of wireless stations in said system; and
`
`running a user location awareness application, said user loca~ion awareness
`application using said registered locations and user identities of said wireless devices.
`
`5
`
`Herewith users in the system are made aware of each other or of their location
`
`while moving from one location to the other, thereby providing a mechanism to relate
`
`services to users, such as location dependent services to a single user, to location dependent
`
`services to multiple users at a single location or at different locations. Such a mechanism is
`
`10
`
`particularly useful in future wireless systems requiring context dependent services.
`
`Particularly useful is an application using historical registration data so that a
`user's movement and behavior can be predicted in advance of providing services. Such
`
`movement could be heading into a direction of a particular wireless station, that could be a
`short-range beacon at a shopping mall or museum, or the like, or could have resulted that the
`
`15
`
`particular wireless device and thus it's user actually is in proximity of the particular wireless
`station.
`
`Another particularly useful application is determining proximity of a user or
`
`users to wire~ess stations. Herewith users can be made aware of the location, and users can be
`made aware of each others locations. Such a mechanism is particularly useful for roaming
`
`20
`
`users who want to contact or meet each other. A user may advantageously also set a user
`
`profile to filter whether an alert should be provided in a given context. Also advantageously
`system behavior may be modified depending on proximity information. Users within range of
`
`the same beacon could have their user profiles checked so that users of similar interest could
`easily contact each other, for instance. Or users could check profiles provided by beacons.
`The system should be modified in that profiles of users entering and leaving a beacon's area
`
`25
`
`should be added or removed from a beacon's set of profiles.
`
`Another useful application is filtering of registration data, either at the side of
`
`the client, i.e., the wireless device, or at the side of the server. Such filtering could be
`necessary if a user passes beacons, particularly short-range beacons, too fast or too
`
`30
`
`frequently, or to avoid system overhead through processing of redundant data.
`
`BRIEF DESCRIPTION OF THE DRAWING
`
`Figure 1 schematically shows a wireless system according to the invention.
`
`Petitioners' Ex. 1013, Page 5 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`Figure 2 schematically shows another wireless system according to the
`
`5
`
`invention.
`
`invention.
`
`Figure 3 shows a wireless device for use in a wireless system according to the
`
`5
`
`Figure 4 is another representation of a wireless device according to the
`
`invention.
`
`invention.
`
`Figure 5 illustrates roaming of a wireless device according to the invention.
`
`Figure 6 shows beacon signals used in a wireless system according to the
`
`10
`
`Figure 7 is still another representation of a wireless device according to the
`
`invention.
`
`Figure 8 is a flow chart illustrating operation of the invention.
`
`Figure 9 schematically shows a wireless system with a location identification
`server according to the invention.
`
`15
`
`Figure 10 shows a database record used by a location identification server
`according to the invention.
`
`Figure 11 illustrates acquisition of location identification information
`
`according to the invention.
`
`20
`
`Figure 12 shows a location identification server according to the invention.
`Figure 13 illustrates a proximity alert application according to the invention.
`
`Figure 14 illustrates modification of system behavior in a proximity based
`wireless system according to the invention.
`
`Figure 15 shows a hot badge application in such a proximity based system.
`Figure 16 shows filtering in a proximity alert system according to the
`
`25
`
`invention.
`
`features.
`
`Throughout the figures the same reference numerals are used for the same
`
`DESCRIPTION OF THE DETAILED EMBODIMENTS
`
`30
`
`Figure 1 schematically shows a wireless system 1 according to the invention.
`
`The wireless system 1 comprises a wide area network 2 with wireless stations 3 and 4, radio
`base stations of a cellular telephony network. The wireless system 1 further comprises
`
`wireless stations 5 and 6, short-range communication or broadcast beacons using radio
`
`communication or infrared communication or any other suitable wireless communication or
`
`Petitioners' Ex. 1013, Page 6 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`6
`
`broadcast, and a wireless device 7. The wide area network 2 is coupled to an application
`
`server 8 that uses a database 9. The wireless device 7 may be a cell phone that uses a cellular
`network communication protocol and that is further capable of communicating with the
`wireless beacons 5 and 6 using another communication protocol. The wireless device may
`also be a dedicated device only capable of communicating with the beacons 5 and 6. The
`wireless device may also be a dedicated device only capable of communicating through the
`base stations 3 and 4 with the wide area network 2. Preferably, the wireless device 7
`communicates with the beacons 5 and 6 through packet transmission using a packet 10. The
`
`packet 10 conveys small quantities of information at a time. Packet transmission may use a
`protocol as described in a patent application filed earlier by the same assignee (PHGB000084
`(UK Appln No. 0015454.2, Filed June 26, 2000), the contents of which is herewith
`incorporated by reference. In the packet transmission protocol described therein added data to
`an existing protocol, the so-called Bluetooth protocol, are piggy backed on inquiry
`facilitation signals, as sixty four bit payloads. In this protocol, in a full inquiry cycle over
`sixteen hopping frequencies and a number of repetitions, and through inclusion of clock
`. information of the beacon for synchronization purposes, a full beacon signal of sixteen
`
`kBytes can be transmitted. Other suitable packet transmission systems may be applied as
`well. In principle, also connection-oriented communication could be used. The database 9
`may store user location information and user identities, applications to be downloaded, or
`other information used by the invention as will be described in further detail hereafter. The
`application server 8 may be configured to download applications to the wireless device 7.
`Figure 2 schematically shows another wireless system 20 according to the
`
`invention. The wireless system 20 comprises a wide area network or local area network 21 of
`wireless beacons 22 and 23.
`The wireless systems 1 and 2 may comprise further application servers and
`databases. Such further servers and databases may be located at and dedicated to the wireless
`beacons 5, 6, 22 and 23, or may be networked to form a dedicated network. In the wireless
`
`5
`
`10
`
`15
`
`20
`
`25
`
`system 20, the wireless beacons 22 and 23 are networked to form a local area network to
`provide a tailored set of applications covering a given geographical area, the premises of a
`30 museum for instance. In an embodiment of dedicated servers and databases to wireless
`beacons, the respective servers and databases only serve areas covered by the respective
`wireless beacons.
`Figure 3 in more detail shows the wireless device 7. The wireless device 7
`comprises transceivers 30 and 31 that are respectively configured to communicate with the
`
`Petitioners' Ex. 1013, Page 7 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`7
`
`radio base stations 3 and 4, and with the wireless beacons 5, 6, 22 and 23. The transceiver 30
`
`is a cellular phone transceiver and includes well-known circuitry for transmission,
`
`modulation and demodulation, encoding and decoding, analog-to-digital conversion, and
`
`digital-to-analog conversion (not shown in detail here). The transceiver 31 is configured to
`
`5
`
`operate in a Bluetooth environment, preferably with additional data transmission piggy
`
`backed on Bluetooth inquiry messages. The wireless device 7 further comprises a processor
`
`32 that is coupled to a programmed ROM (Read Only Memory) 33 and a RAM (Random
`
`Access Memory) 34. The wireless device 7 further comprises a display 35, a keyboard 36,
`
`and an audio presentation device 37 that can present voice messages, alerts, or voice
`
`10
`
`communication. The wireless device 7 may be programmed to run W AP applications (Wire
`
`Access Protocol) and then include a cell phone enabled browser.
`
`Figure 4 is another representation of the wireless device 7 according to the
`
`invention to illustrate use of the wireless device 7 of receiving and processing application
`
`specific messages. The wireless device 7 comprises a ·core program 40 continuously running
`
`15
`
`on the processor 32. Application memory 33 stores applications 41, 42 and 43. For
`
`application 41, an application specific identifier AIDl is also stored, and for application 42
`
`an application specific identifier AID2. No identifier is stored for application 43. Data
`
`memory 34 may store data such as weather data 44, stock data 45, and game score data 46.
`
`The weather and stock data are received through generic beacon signals. The user of the
`
`20 wireless device 7 may decide that a new application should be loaded into the wireless device
`
`7 and install or download such a new program, or that a stored program is no longer needed
`
`and delete such a program.
`
`Figure 5 illustrates roaming of a user carrying the wireless device 7 according
`
`to the invention, indicated with a dashed arrow 50. While roaming the wireless device 7
`
`25
`
`enters into a range of a wireless beacon and leaves it to enter into a range of another wireless
`
`beacon, and so on. While roaming beacon respective signals BS!, BS2 and BSS are received
`
`from respective wireless beacons Bl, B2 and BS, the user entering transmission ranges of the
`
`beacons Bl, B2 and BS. No beacon signals are received from beacons B3 and B4.
`
`Figure 6 shows beacon signals used in the wireless systems 1 and 20 according
`
`30
`
`to the invention. The wireless beacons 5, 6, 22 and 23 each continuously broadcast beacon
`
`signals, such beacon signals including a generic beacon signal 60 as shown in Fig. 6B, and an
`
`application specific beacon signal 61 as shown in Fig. 6C. Bytes 62 and 63 are used to
`
`indicate the length of a beacon signal, and byte 64 to indicate the type of a beacon signal,
`
`generic or specific. For a generic beacon signal bytes 65 and 66 are used to indicate an
`
`Petitioners' Ex. 1013, Page 8 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`8
`
`information type of information contained in a beacon signal, such as weather data and stock
`
`data. For an application specific beacon, bytes 65-68 contain an application specific
`
`identifier, and the remaining bytes application specific data.
`
`Figure 7 is still another representation of the wireless device 7 when receiving
`
`5
`
`and processing application specific messages from wireless beacons. As shown, the wireless
`
`device 7 receives application specific messages with respective application specific
`
`identifiers AIDl, AID2, and AID122, ignores the received application specific message with
`
`application specific identifier AID122, and processes the received application specific
`
`messages with application specific identifiers AIDl and AID2.
`
`10
`
`Figure 8 is a flow chart illustrating operation of receiving and processing of
`
`beacon signals. In block 80, the wireless device 7 waits for a beacon signal. In block 81, upon
`
`reception of a beacon signal, that is re-assembled from received packets, the wireless device
`
`checks a beacon signal's type. If a beacon signal is generic, in block 82, the wireless device 7
`
`handles the generic beacon signal. If a beacon signal is application specific, in block 83, the
`
`15 wireless device 7 checks whether an application exists indicated by the received application
`
`specific identifier. If no such application exists, returned is to block 80. If such an application
`
`exists, in block 84 it is check whether the application is active. If the application is active, in
`
`block 85, correspondingly received data is passed to the active application or program. If the
`
`application is inactive, in block 86 a user profile of user preferences is checked for the
`
`20
`
`desirability to activate the inactive application. If there is such a desirability, in block 87, the
`
`inactive application is activated and correspondingly received data is passed to the active
`
`application. The active program may respond to the passed data in various ways. It may bring
`
`the passed data to the users atte~tion, it may check from other data stored in the wireless
`
`device 7 whether the passed data is of interest to the user, it may consult a central server
`
`25
`
`through the WAN 2 to find out whether the passed data is of interest to the user, or it may
`
`send the passed data to the central server, possibly together with already stored data, for
`
`further processing.
`
`Figure 9 schematically shows a wireless system 90. The wireless system 90
`
`comprises a location identification server 91 that is coupled to a location database 92. The
`
`30 wireless system 90 further comprises wireless devices 93 and 94 of the type of the wireless
`
`device 7, and wireless beacons 95 and 96. The wireless devices 93 and 94 are configured to
`
`communicate with the location identification server 91 through wide area network or carrier
`
`network 97, that may be a cellular network. The wireless beacons 95 and 96 are configured to
`
`Petitioners' Ex. 1013, Page 9 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`9
`
`contact the location identification server 91 through the Internet 98. The location
`identification server 91 registers locations and user identities of users of wireless devices.
`Figure 10 shows a database record 100 used by the location identification
`server according to the invention. The record 100 comprises a record number field 101, a
`user identity or identification field 102, a location identification field 103, and a date and
`time field 104 registering when the user was last encountered at a given location such as at a
`location of a wireless beacon. The wireless system 90 may be configured to keep historical
`
`location data, to filter location data, and to delete location data. The wireless system 90 may
`be configured to use historical location data to predict movements of roaming users, to
`inform a user of it's proximity to a system resource, to make aware users of each other's
`proximity or to respective proximities to respective locations, or to other applications
`described or suggested by the present application. Services may be provided that use relative
`
`5
`
`10
`
`15
`
`20
`
`location information, describing the proximity of users and wireless devices to a known
`location or other users and wireless devices. The wireless system 90 may also be of a type as
`shown and described in Figures 1 and 2, in so far as location registration is meaningful. In it's
`simplest form, the wireless system 90 has the structure of a single network, such as a cellular
`network, that has the capability to coupled users to locations in terms of proximity to a
`system resource. Particularly, when such cellular networks are pico-networks, the described
`location awareness still is meaningful and useful. Preferably, the wireless system 90 at least
`also comprises short-range wireless beacons that have a better defined location. Typically,
`such short-range beacons have a transmission output power of lmW to lO0mW, limiting
`their transmission range.
`In a system also containing wireless beacons, when roaming, the users
`encounter a succession of beacons, possibly encountering beacons more than once. The
`25 wireless device 7 then acts as a bridge or relay to pass beacon information to the location
`identification server 91. Upon reception of passed beacon information, the server 91 updates
`the location database 92 so that the database 92 reflects which wireless beacons wireless
`device have or had proximity to. The wireless system 90 may use short term or long term
`historical proximity data for a given wireless device or set of wireless devices to predict
`location or proximity changes. As an example, a user carrying a wireless device proceeds
`along a street into the range of wireless beacons. On the basis of gathered location
`information, the wireless system 90 may predict when the user arrives as a given location at a
`certain time. Such a prediction mechanism may be implemented as an application running at
`the server 91. The wireless system 90 may use long term history of proximity of location for
`
`30
`
`Petitioners' Ex. 1013, Page 10 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`10
`
`users to build profiles of their movements, individual or shared interests. Herewith, users can
`
`be linked with places, shops, and other users. The database 92 could store a record of
`
`matches to these places and people which is averaged over time.
`
`Figure 11 illustrates alternative acquisition of location identi!ication
`
`5
`
`information according to the invention. Shown is a table 110 with location identifiers 111
`
`that uniquely identify a global location, with a description 112 of a location, and with latitude
`
`and longitude data of the location. Location identification can be represented in various ways,
`
`it can be a geographical description of a location whereby the location_ identifier itself forms
`
`the data to identify a location, it can be a reference to a geographical description of a
`
`10
`
`location, i.e., just a pointer to other information that can be used to determine the location.
`
`Figure 12 shows an embodiment of the location identification server 91
`
`according to the invention. Through the cellular network 97, a W AP gateway 120 and an
`
`Internet server 121, the wireless device 93 passes location and user identity information to
`
`the location identification server 91 for inclusion into the database 92. The location
`
`15
`
`identification server 91 is implemented as a CGI (Common Gateway Interface) script that
`
`resides on the web server 121 that can be reached through the Internet. The wireless device
`
`93 transmits a location identifier it acquired from the wireless beacon 95 to the location
`
`identification server 91 using W AP: "http://1.l.1.1/locsrvr.cgi?loc_id=Li&user.Jd=Ui". The
`
`wireless device 93 calls the CGI script with the location identifier as a parameter, the location
`
`20
`
`identification server's CGI script being invoked by the web server 121 it resides on. When
`
`being invoked, the location identification server's CGI script receives the location identifier
`
`as a parameter and the CGI script stores the location identifier in the database 92.
`
`Figure 13 illustrates a proximity alert application according to the invention.
`
`As shown, wireless device 130 is in-range of beacon 131 at location Li,
`
`25 wireless device 132 is in-range of beacon 133 at location Lj, and wireless device 134 is in(cid:173)
`
`range of beacon 135 at location Lk. Further shown is a user profile 136 of userl carrying
`
`wireless device 134. As a result of user2 matching userl 's user profile 136, userl will get a
`
`proximity alert "User2 is near".
`
`The proximity alert application uses proximity information received and stored
`
`30
`
`by the location identification server and processes that information to determine the
`
`proximity of any two users or one user and a location. The proximity alert application uses
`
`the following information to determine the proximity of two users or a user and a location:
`
`Location of a user:
`
`Petitioners' Ex. 1013, Page 11 of 31
`Hewlett Packard Enterprise Co. et al. v. BillJCo, LLC
`IPR2022-00420
`
`

`

`WO 02/15601
`
`PCT/EP0l/08861
`
`11
`
`This can be determined from the information that is stored by the location
`
`identification server 91. This application has to make some assumptions as to how long a
`
`user is considered to be near a location after the location identification is transmitted to the
`
`location identification server 91. For example, if the last known user location is obtained on

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket