Back-channeled packeted data

ABSTRACT

The disclosure concerns a communication network having a wireless network that provides access of back channel data to third parties. A processor node in the wireless network uses and processes location-based mobile-terminal data as geographically-tagged information sources for processing and analysis by third parties. In some configurations, the processor node receives feedback from the third parties, and/or input from other resources and databases, for adaptively re-processing the data previously provided to the third parties.

RELATED PATENT DOCUMENTS

This patent document claims the benefit, under 35 U.S.C. §119(e), ofU.S. Provisional Patent Application Ser. No. 61/256,565 filed on Oct.30, 2009, and entitled “Back-Channeled Packeted Data;” this patentdocument is fully incorporated herein by reference.

FIELD OF THE DISCLOSURE

The present disclosure is related to computers, communication networksand the use of traffic data in a communication network having networkelements that are implemented with wireless technology. Aspects of thedisclosure relate to location-indicative information provided on behalfof terminals and used in such a communication network.

BACKGROUND

Communication networks continue to improve in their abilities toefficiently and practically assist terminal-equipment users and societyin general in communicating information, such as voice signals, images,electronic files or data, and video signals, to and from a mobilecommunication device using radio waves. For example, a wirelesscommunication network may include a communication system using one ormore of various radio-communication schemes such as represented inrecent implementations and proposals of digital (e.g., 3G/4G) cellular,wireless peer-peer, PCS and satellite communication systems.

Wireless communication networks generally include a network of basestations that communicate with various wireless communication devices.Examples of wireless communication devices include telephony devices,wireless readers, radios, personal digital assistants (PDAs), palmtops,notebook computers, and other devices that have wireless communicationcapability. Each base station provides communication services within itsrespective network zone, such that the network of base stations providesa number of network zones that can cover a large geographic area. Thenetwork zones and their respective coverage areas occasionally change asbase stations are improved and added within the wireless communicationnetwork. Nearly all of the United States is covered by cellularcommunication networks, with many of the base stations now providingvarious forms of the above-mentioned communication systems.

More recently, a number of location-based service applications have beenimplemented or proposed for wireless communication networks. Examples ofsuch existing or proposed location-based service applications include:emergency service, location-dependent call routing, location-dependentbilling, location tracking, and the like. In emergency applications thecall and the exact location of the wireless communication device may berouted to the closest provider of emergency services, thus reducingemergency response time and possibly saving lives. In location-dependentbilling applications, different billing rates may be charged to acustomer for operating the wireless communication device in differentgeographical areas. Each location-based service application utilizes thelocation of the wireless communication device.

Location systems sometimes utilize conventional system referencelocation methods for determining or characterizing the location of thewireless communication device. Such reference location methods operateby relating the location of the wireless communication device to anetwork zone, e.g., cell or cell sector of the wireless communicationnetwork. However, mobile operators face specific and real problems withnetwork resources that may hinder widespread deployment of commerciallocation-based services. For example, consider a situation where amobile operator is offering a mix of location-based services to itssubscribers. The application mix includes services like fleet tracking,child finder, push advertising, and traffic alerts. These applicationsgenerally would like to be notified with location updates when thesubscriber is moving, and perhaps with greater frequency when thesubscriber is moving more rapidly.

Aspects of the present disclosure can be useful for addressing thesevarious needs and for providing various advantages and uses oflocation-based information in networks involving mobile terminals. Whilethe present disclosure is not necessarily limited to such aspects, theinstant disclosure may be appreciated through a discussion of examplesusing these and other contexts.

SUMMARY

Without limitation, aspects of the present disclosure are directed tovarious embodiments involving back-channel location-based data availableto an operator of the wireless network. Some of these aspects are: 1)architectural aspects of wireless communication networks for routing andprocessing location-based mobile-terminal data within the network; 2)routing and processing location-based mobile-terminal data by a wirelesscommunication network in cooperation with a local or hot-spot network;3) processing location-based mobile-terminal data by a wirelesscommunication network for controlling aspects of mobile terminals; 4)Mobile terminal operation based on input from a wireless communicationnetwork processing location-based mobile-terminal data; 5) a wirelesscommunication network adapted for routing and processing location-basedmobile-terminal data to monitor (suspicious) calls; 6) providingtelephony terminals network access (e.g., call-screening) on behalf of3^(rd) parties; 7) a wireless communication network adapted for usingand processing location-based mobile-terminal data as (geo-tagged)information sources for third parties and adaptively reprocessing suchlocation-based data within the network with third party applications;and 8) software-based (business) methodology involving income-producingbusiness models.

In connection with yet further aspects, the disclosure concerns acommunication network having a wireless network that provides access toback channel data to third parties. A processor node in the wirelessnetwork uses and processes location-based mobile-terminal data asgeographically-tagged information sources for processing and analysis bythird parties. In some configurations, the processor node receivesfeedback from the third parties, and/or input from other resources anddatabases, for adaptively re-processing the data previously provided tothe third parties.

As a function of subscriber-based agreements or other authorizedprotocols (examples being provided herein), a memory circuit stores theabove-discussed user profiles (including subscriber data such asidentity, age, and other particulars and demographics) on behalf of anoperator for the wireless communication network for access to thenetwork. On behalf of a third party, the memory circuit also storescommunication rules relevant to a geographic region of service providedby the communication network. The processor node is configured withinthe wireless-technology equipment for assimilating back channel data,such as current location data regarding the mobile terminals with theuser profiles, for generating assimilated current location-based anduser-characterizing data. The generated data is provided to anotherprocessor node (such as at a third party). In one configuration, inresponse thereto, a modified set of data and a set of rules are receivedfrom the third party for generating another set of assimilated currentlocation-based and user-characterizing data.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1A depicts a block diagram of a system and various configurationsoptionally involving external data-processing/data-access nodes,consistent with embodiments of the present disclosure.

FIG. 1B depicts a block diagram of a system and various specializedprocessor-node configurations, consistent with embodiments of thepresent disclosure.

FIG. 2A shows a block diagram for data flow relative to certain networkaccesses by mobile devices, and including an expanded block diagram of aspecialized processing node, consistent with embodiments of the presentdisclosure.

FIG. 2B shows a block diagram for a publisher API relative to certainnetwork accesses by mobile devices, and for use with one or more of theinternal or external nodes shown in the block diagrams of one or more ofthe above figures, also consistent with embodiments of the presentdisclosure.

FIG. 3 depicts an example wireless network consistent with variouscellular systems and embodiments of the present disclosure.

FIG. 4 depicts an example network, including a wireless network,consistent with various cellular systems and embodiments of the presentdisclosure and further including expanded example block diagrams toillustrate aspects of the user devices and processor-node circuitryuseful for many of the embodiments discussed and illustrated herein.

FIG. 5 depicts an example network, including a wireless network,consistent with various cellular systems and embodiments of the presentdisclosure including many discussed and illustrated herein.

DETAILED DESCRIPTION

In accordance with various example embodiments, a wirelessdata/communication network includes access networks in multiplegeographies interconnected by a core network, where the wireless datanetwork includes one or more specially-configured processor modules(herein referred to as processor nodes) that operate on location-baseddata and user profile data as this type of data is developed and/orpassed along the channels of the network. While not necessarily limitedthereto, aspects of the present disclosure are directed to uses of thistype of data, referred to herein as back channel data.

The location-based data can be developed upon registration of the mobileterminals which occurs through the radio-access equipment, such as basestations and, in certain configurations and in addition to or in lieuof, the location of the mobile terminal is refined or provided byanother device such as by the mobile terminal pushing its GPS locationto the wireless network or by the above-mentioned processor nodeassimilating the mobile terminal's communication history (e.g.,last-known GPS coordinates and/or last linked-to WiFi server).

The user profile data is largely pre-stored in the wireless networkbased on contractual rights implemented before the user gains access thewireless network. These contractual rights specify the identity of themobile terminal and other miscellaneous information which is useful forthe user of the mobile terminal, for the operator of the wirelessnetwork as well as for certain third parties. For example, a SIM-typecard can contain one or more unique serial numbers for the mobile user,security authentication and ciphering information, temporary informationrelated to the local network such as a temporary local identificationnumber that has been issued to the user, certain passwords and a list ofthe user-accessible services made available by the wireless network tothe user. This information, referred to as user-profile data, isretrieved and processed by the above-mentioned processor nodes, inchannels of wireless network channels for the user to communicate.

Aspects of the present disclosure are useful in a variety ofcommunications networks. As an example, such communications networks mayinclude a wireless network and another local or periphery-regionnetwork, where the wireless network has such a processor node operatingon back channel data and where the local or periphery-region networkincludes a wireless link (e.g., in the last mile of the network)connecting user client devices to a radio transceiver with additionalcore network elements connecting the access network to the Internetbackbone. The core network may employ wired or wireless technologies ora combination thereof. In a particular implementation, the accessnetwork includes a femtocell that acts as the access network'stransceiver with a user's broadband connection acting as the backhaullink to the core network and the Internet backbone. In anotherimplementation, the access network is terminated by a wireless WANrouter that has one or more client devices connected to it over a wiredconnection (e.g., 3G router) or a wireless connection (e.g., 3G WiFirouter). The access and core networks together can be operated by awireless service provider that manages the network and charges users forthe service.

Aspects of the present disclosure relate to use of processor nodeswithin the wireless network that are configured to provide specializedinformation, drawing from the back channel data, to the user of themobile terminal, to the operator of the wireless network and to certainthird parties which may be charged for the services relying on thespecial information. For example, these specialized services can beprovided to an operator of the wireless network to providelocation-based, user-profile based detailed analytics for performingoptimizations of the data traffic in a wireless network by (re)routingin a proactive/predictive manner or reactively based on dynamics learnedwhile users are accessing the network. As the wireless network is awareof its own capabilities for handling data flow, such as where a cachememory might be available at a periphery region of the network about tobe congested by a myriad of users (e.g., a breaking event drawing crowdsto a region and to news-related web pages characterizing the event),communication between its specialized processor nodes can exploit thisback channel data by delivering redundantly-requested content from thecache rather than from a resource on the other side of the network.Similarly, another set of related back channel data, e.g., pertaining tothe number and age groups of people suddenly appearing at the event, canbe processed by the processor node(s) and published asgeographically-tagged information for third parties.

Turning now to the figures, FIG. 1A depicts a block diagram for a datacontrol module within a communication system, consistent withembodiments of the present disclosure. A data flow controller 180controls the flow of data between user devices 184 and content providers(or databases) 188 a-188 c. User devices 184 (also referred to as userterminals, user equipment, user devices, mobile stations, mobiledevices, mobile terminals, mobile equipment) can be wirelessly connectedto the data flow controller through a communications network 182(examples of suitable networks are provided herein). Content providerscan be connected to the data flow controller through a communicationsnetwork 186 (e.g., a wired/wireless, public/private packet-enablednetwork). Communication involving user devices 184 includes wirelesscommunication via radio access network (RAN) equipment 194 which partlydefines the wireless network part of the communication system.

Using the RAN equipment 194, user devices 184 can request content from avariety of sources including for example, website providers, servers,and other user devices which can be individual endpoint devices, such assmart phones which can also be content providers for another smartphone. One of more specialized processor nodes 190 (with designatedmemory circuits 192) are selectively incorporated into the network atone or many locations and are communicatively coupled to the accesschannels provided via the RAN equipment 194. From these access channels,the processor nodes 190 are programmed to look for and interceptlocation-based data and related user profile data for specializedoperations.

In other embodiments, the processor nodes are programmed to access(receive from and/or write to) databases internal to the wirelessnetwork such as a 3G/4G cellular network. As permitted and enabled byway of other specialized resources such as those paid for by thirdparties, databases external to the wireless network are also available.FIG. 1A illustrates a database 196 which is depicted labeled as a“geo-tagged” information source because, in the example, the processornode 190 has stored therein location-based back channel data regardingthe locations of certain user devices. In certain example applications,the database 196 can be implemented external to the wireless network forreview and processing by third parties, and can be implemented internalto the wireless network for review and processing by an operator of thewireless network.

Using the specific application where the database 196 is implementedexternal to the wireless network, management of the data accesses by athird party can be controlled by the same or different processor nodesprocessing the data to protect the user's identity and otherconfidential information which is at least initially present in the formof back channel data. This privacy is maintained through the use of“tokens” in place of such confidential user information, sometimesreferred to as “anonymizing” certain back channel data.

FIG. 1A illustrates databases 188 a-188 c as providing or using a formof the back channel data. Database 188 a contains certain anonymizedback channel data. Database 188 b contains certain back channel datathat is not anonymized, e.g., for applications internal to the wirelessnetwork. Database 188 c contains pseudo-anonymized back channel datawhich is demographically enhanced to hide highly-sensitive informationsuch as the user's identity while providing significant otherinformation to characterize the user and/or the user's behavior insofaras such appropriate information is procured, in various ways, by theprocessor node(s) via the wireless network.

Related embodiments and applications involve different aspects andapplications certain back channel data, as discussed in more detailherein.

As one aspect of the disclosure relates to the specialized use of backchannel data for managing the flow of data in the network (or datatraffic control), use of the specialized processor nodes can becomeintegral with other network processing elements used in the wirelessnetwork. For instance, based on expectations of increased or decreasedtypes of users in a certain region, data that is being uploaded throughthe network to a website or service may be blocked, expedited, delayedor throttled. Blocking traffic disrupts the user activity driving thenetwork usage and forces the responsibility of handling the networkconnectivity interruption on the user or the user's application/service.Blocking may be accomplished by terminating a request for TCPconnection. Delaying traffic postpones data traffic to a future time.This may be motivated by congestion in the network at a given time or byoperator defined policies. Delaying may be accomplished by blockinginitial requests for communication followed by allowing thecommunication to proceed at a later time based on pre-defined policiesor observed increase in network availability. Throttling slows downtraffic in a network allowing the user to continue use of the networkbut at a reduced throughput. Throttling may be accomplished by delayingthe transmission of TCP SYN packets in the case of a TCP/IP networkeffectively simulating a lower available bandwidth. Blocking, delayingand throttling may be implemented using a combination of client deviceand network element functionality. The client device component of thefunctionality may be implemented with a native client resident on theclient device or an embedded client delivered as part of the data streamfor execution in a browser environment. As users often become networkfrustrated in congested times (limited access when the user leaves workin an urban area at the end of the day or leaving a large public eventin a frequented area), the user profiles can include a paid-forexpedited-communication service which the specialized processor nodescan access and utilize for the user when the back channel data indicatesthat the user is in that region and, optionally, at such times.

Data flow controller(s) 180 of FIG. 1A can provide variouslocation-related functions useful for controlling and providing deliveryof content to user devices 184. An example of such functions is limitingaccess to the content based on where one or more user devices 184 arelocated. Access can be limited in a number of different mannersincluding, for example, denial of content, denial of a form of content(e.g., voice, email, mms or short message), and delay in providing thecontent, and/or throttling of the speed at which the content isprovided. The selection and implementation of these functions can beeffected by monitoring, for certain user devices in certain locations, anumber of context parameters including, for instance, parameters thatdefine the current state of the network. This allows for data flowcontroller 180 to actively respond to changing network conditions andfacilitate control over and allow for fair use of bandwidth betweencontent providers and/or for critical content or services to remainavailable.

The implementation of data flow controller 180 can take several formsand may involve using two or more such controllers 180. In this context,the network items 182 and 194 are merely two aspects generallycharacterizing a potential larger network system, perhaps with otherdata flow controllers distributed near the periphery of the networksystem, e.g., near the initial connection point of user devices 184.Each data flow controller 180 can monitor and assess network loading,content overuse and similar parameters (discussed in more detailherein). This can be particularly useful for providing data flow controlthat is tailored toward a particular data path. For instance, contentcan be device specific, geographically specific, language specific orotherwise tend to be unevenly accessed between different users. Thus,one data flow controller may see a very high rate of content accesswhereas another data flow controller sees very low rate of contentaccess.

In such contexts, monitoring and controlling data flow as a function oflocation-based data regarding user devices 184 can be advantageous.Certain implementations use one or more centralized analysis devices toprovide location-based content control indicators to data flowcontrollers 180 for assessing and predicting content accesses acrossdifferent data paths. In certain embodiments discussed in thisdisclosure, cache storage devices can be implemented for caching contentas a function of location-based back channel data, an example of whichis use of a cache for a category of communications to and from adesignated group of mobile terminals heading to a large sporting event.As discussed in connection with the data flow controllers 180, thelocation, control and usage of the cache storage devices can beimplemented largely based on predictive analysis of location-based dataregarding user devices 184.

In a related example, news professionals, safety/medical personnel,government officials and certain businesses may require priority accessto the wireless network in times involving special public situationswhere large crowds gather, whether a newsworthy event, a businessconvention or a potential public catastrophe. In such instances, theuser profiles can include different paid-for business-levels forexpediting communication services. For these services, the specializedprocessor nodes dynamically identify the regions of such publicsituations, by tracking samples of mobile terminals converging in suchregions or via an external news feed, and access the business-level userprofiles when the back channel data indicates that such users are in theregion at such times. The application and/or user profile may call foropening a voice channel or for permitting a real-time live data streamto be transported through the network. In a high-priority emergencyapplication, a video stream may be required on the downlink forconsumption by a number of users simultaneously, and the network mayneed to react by employing multicasting or other relatively rare channelrouting at least for a time until the congestion in the region's radioequipment (the base stations) clears.

In some embodiments and as a function of such location-based situations,traffic management ensuing from the processor node operations may leadto and directly involve operations by other portions of the network. Asexamples, the downstream traffic may be converted for transport overradio broadcast/multicast technologies such as MediaFlo or DVB-H,information can be sent to designated devices using other than therequested forms, e.g., using a WAP push, SMS, MMS or the like. Some ofthese redirections can be particularly useful for sending emergencyinformation and less time-critical data such as targeted advertising.

Other aspects of the disclosure allow for the use of a peer-to-peer(P2P) network and a sharing scheme. In such an implementation, backchannel data can be shared between user devices directly (e.g., directpoint-to-point connection via Bluetooth), through a local area network(LAN) or otherwise. This can be accomplished, for instance, by replacinguser identity information with a token, which can range from an entirelyun-informing piece of data, to a mid-level demographic (male or female)or a much more detailed demographic (gender, age, zip code, favoritehobby and music, political party, etc.). Third parties can use suchnetworks to gather and exchange such “tokenized” back channel dataprovided from the wireless network and optionally request that thewireless network provide geo-tagged notifications when similarlytokenized users approach the regions covered by these third-partynetworks. For instance, two retailers in the same mall might beseparately tracking purchases of certain goods and services around aholiday and discover from “tokenized” back channel data, exchanged andotherwise, important demographics to assist in further sales for thenext holiday.

FIG. 1B depicts a block diagram of a system and various possiblespecialized processor node configurations, consistent with an embodimentof the present disclosure. User devices, or user equipment, 152 connectto content providers, to each other, or to other data sources through avariety of data paths. Non-limiting examples of user devices includecellular phones, smart phones, personal digital assistants (PDA),handheld gaming devices, laptops, home computers, vehicle computers andother devices that connect through wireless networks. For simplicitymany components within the data path have been excluded from thediagram.

One example data path involves radio access networks (RANs) 194. Theuser device(s) 152 could be, for example, a smart phone connectingthrough a cellular communication scheme, such as Global System forMobile communications (GSM), Universal Mobile Telecommunications System(UMTS), Code Division Multiple Access (CDMA) and communicationsprotocols as defined by the 3^(rd) Generation Partnership Project (3GPP)or the 3^(rd) Generation Partnership Project 2 (3GPP2), 4G Long TermEvolution (LTE) and IEEE 802.16 standards bodies. These examples,however, are not limiting and aspects of the disclosure lend themselvesto any number of connection protocols and mechanisms.

Gateways 162 can be used to connect between the RAN interface anddevices using another protocol, such as Internet-based protocols. Forexample, the gateway could translate data between the WirelessApplication Protocol (WAP) protocol and the world-wide web protocolse.g., from various Internet protocols to Wireless Markup Language (WML).The data gateways can be configured to use GPRS Tunneling Protocol (GTP)to communicate with the radio access network. Other embodiments may useother communications protocols. Other conventional operations of thedata gateways are known. For example, the data gateways enable users ofmobile stations to roam between cells, for example, to move betweendifferent locations within the radio access network, by tracking themobile station's identity across the network. The data gateway may alsoprovide authentication and data formatting functions.

As shown in FIG. 1B, multiple RAN connection points (or cells) can use acommon gateway. Also shown in the figure are various memory circuits 192for storing and retrieving banks of data used by the processor nodes190. In one embodiment, the memory circuits 192 include one or morecache storage devices 170 located at certain of the gateways 162. Thisallows for sharing of cache storage between multiple RANs as a functionof and directed by algorithms executed by the processor nodes 190. Atthe same time, there can be many gateways that are geographically (andlogically) distributed around the cellular network and therefore thecache locations can be implemented with a relatively broad distribution.

Another example data path involves the use of femtocells 154. Femtocellsare often implemented as a low power cellular base station that isconnected to a cellular provider's network, often through a broadbandconnection (e.g., DSL or T1) link. Femtocells can be particularly usefulfor providing local cellular coverage to areas that otherwise haveinadequate coverage, e.g., indoors.

For simplicity, many details of the data path are omitted as they can beimplemented in a variety of manners. Often a gateway 162 provides aninterface between user devices and another protocol, such as theInternet. This gateway 162 is a possible location for such a specializedprocessor node 190. The gateway 162 can be located within a cellularprovider's network and thereby shared (or similar to the gateway) withRAN-based data paths from larger/traditional cellular base stations. Asanother possibility, the cache storage device can be situated betweenthe gateway and the user device. For example, a processor node andstorage device can be located at the femtocell base station location.This can be particularly useful for controlling data bandwidth betweenthe femtocell and the remainder of the network as this can be limited bythe capacity of the broadband data link (sometimes shared with a varietyof other devices). A third data path uses wireless network interface 158to connect and request data.

This interface can be, for example, Worldwide Interoperability forMicrowave Access (WiMax), 802.11x or the like. Thus, user devices canconnect using wireless hotspots or other local networks. As before, thedata path may include a gateway 162 and other device 170 and/or 190. Thegateway can sometimes be located at a cellular provider's location, butneed not be so located. In another implementation, cache storage device170 is located between the gateway and the user device. In this manner,such devices are located as part of and within control of the wirelessnetwork.

A user device (or mobile terminal) can sometimes be simultaneouslycapable of connecting to multiple data paths. For instance, a userdevice 152 may be in range of a wireless hotspot while also having aconnection to a 3G-type data interface. The decision on how to retrievethe necessary data can be made based upon a number of criteria, one ofwhich can be whether or not a specialized processor node has assessedfrom location-based back channel data that there is available datalikely residing in a memory (or cache) of a particular data path.

Other embodiments of the present disclosure relate toaccess-analyzing-control functions 166. These functions can be used toaccurately and effectively control what and where content is to berouted and/or cached based on back-channel location information providedby the processor nodes 190.

A number of examples are useful in illustrating such methodology. As oneexample, network communications are routed and/or cached reactivelyand/or predictively, based on such back-channel location information. Ina relatively simple implementation, a cache located in a region isdeemed “highly-populated by mobile users interested in airline arrivaltimes, football scores, bus schedules” by assessing the presence of anexcessive volume of types (ages of users) having user devices: currentlyregistering on in the region so as to reactively process; and havinglocations converging on the region so as to predictively process. Ineither situation, the network nodes cooperate to store data in a FIFOfashion for serving this high population of mobile users before theirrequests would otherwise be overtaking the network's available bandwidth(e.g., as limited by the RAN equipment) by providing the samelargely-redundant information across the network to the same region. Ifparticular content is accessed multiple times before leaving the FIFOcache, it is provided from the cache and then moved back to the front ofthe cache.

As another example of a reactive implementation, a network data analyzeridentifies content that is being accessed in high-volume and that isconsuming considerable bandwidth. The data can then be cached accordingto the network impact of storing in a particular cache storage device.The system can thereby prioritize what data is stored according tonetwork impact. This can be particularly useful for maintaining highpriority content in the cache.

Yet another reactive implementation involves receiving region-specificindications of media content's popularity from 3^(rd) parties, such asthe content providers. This can be implemented using an indication ofthe number of requested downloads within a predefined time period orusing more complex parameters and algorithms.

In a predictive example, the analyzer uses data to predict futurenetwork demands for content. This can include predicting downloadsrelated to breaking news stories or detecting access patterns thatindicate that particular content is likely to increase in usage. Forinstance, as many video clips are accessed via a network, more users seethe data and the demand increases rapidly as the users forward orotherwise send the video clip to other users. Another example relates tosporting events in which a large group of people attempt to accesscontent at approximately the same time, such as near the end of a game.Large news events, such as natural disasters, can also result in a spikein content requests for related information.

Another aspect relates to determining how content is distributed betweenvarious storage elements. In conjunction with the assessment of a regiondeemed “highly populated,” the processor nodes can make determinationson where to store data based upon numerous parameters. For instance, fora particular data path, the network analyzer can identify the mostlikely bottleneck for the data and chose to store the contentaccordingly. As another example, the analyzer might determine thatcertain content is related to another geographical region and therebysend the content to correspondingly located cache storage devices.Another example involves content that is associated with a particulartype of device, e.g., smart phone application for a particular type ofphone. This can also provide valuable information about where thecontent is best stored.

Accordingly, these important decisions can be based upon any number ofother parameters or factors. A few examples may include user data,device characteristics, network characteristics, environmental factorsand socio-cultural factors. Examples of user data include the dataservice price plan a user is subscribed to (e.g., premium vs. standard).Examples of device characteristics include screen size and supportedaudio and video codecs. Examples of network characteristics includenetwork technology (e.g., HSPA, LTE), network topology (e.g., microwavevs. metro Ethernet backhaul) and available network capacity. Examples ofenvironmental factors include time of day, location of sender andrecipient and weather conditions. Examples of socio-cultural factorsinclude holidays, sporting event schedules, etc. One or more of thecontext parameters may be combined to form a context which in turn isused to determine the management of the content in the cache storageelements. For instance, a video clip of breaking news may beautomatically moved to cache storage elements nearer the edge ofnetworks from the cloud cache or core network cache storage elements asthe day breaks around the globe anticipating user requests for playbackof the video clip.

Other aspects of the present disclosure allow for the use ofmulticasting in connection with a delay mechanism discussed herein. Whena user device requests content that is highly-demanded and/or thatconsumes large amounts of bandwidth, access to the content can bedelayed. Access by other user devices requesting the data is alsodelayed. As part of the delay mechanism, the user devices are presentedwith information for connection to a multicast session. The user devicesthen connect to the same multicast session and receive the contenttherefrom. The multicast session can be initiated for the group bypresenting a synchronization time for the session to each of the userdevices or can simply be periodically repeated (e.g., in the case ofvery-highly demanded content) thereby allowing devices to connect asnecessary. Synchronization/multicast information can be sent as part ofthe delay mechanism through a variety of suitable mechanisms.

Yet another implementation is directed to using multicasting for pushingdata to large number of devices. Multicast information (e.g., sessioninitiation information) can be sent to groups of devices, e.g., using aWAP push, SMS, MMS or the like, and the devices can respond byconnecting to the multicast stream/radio channel. This can beparticularly useful for sending emergency information, targetedadvertising or even software updates to a large group of user devices.The content can be cached and sent to groups of devices until alldesired devices receive the content. This can allow for updates to besent and received over time and to devices that may subsequently connectto the network.

Multicasting can be particularly useful for efficient use of radiosignal bandwidth. For instance in a UMTS context, a group of mobilestations can be configured to listen to the packet notification channel(PNCH) on which a point to multipoint-multicast (PTM-M) notification issent. Data can then be sent to the group of mobile stations using ashared packet data traffic channel (PDTCH). These operations can beimportant for many contexts including, for example, emergency situationswhere specifically-equipped or configured groups of mobile stations needto monitor the situations on a priority basis. This type ofmultipoint-multicast mode can be initiated in response to certain of theprocessor nodes executing processes to track externally-reported events(from other databases and networks) and/or converging populations ofuser devices to predict and/or react to location-based back channeldata.

Consistent with another embodiment, a user application can beinstalled/downloaded to a mobile station in response to a user orthird-party profile accessed by the processor node. The processor nodeuses the profile information as a reference for identifying that themobile station should be tracked as it approaches a favorite region,such as “home.” In response, the user application can facilitate theintelligent control and delivery of content to the device by cooperationwith and in response to the device location being monitored by theprocessor node. For instance, the application provides configurationoptions for accessing/downloading content. In one embodiment, theapplication controls delivery options based upon content type and/orcontent source as determined by the user. Such delivery options mightinclude expedited delivery for rich media (recently published e-books ofvideos). This allows the user to specify which, if any, content isprovided using aspects of the present disclosure (e.g., availablecaching locations or access limitations). Other aspects of theapplication allow a user to modify delivery settings dynamically. Theuser can use the application to route content delivery to e-mail, todelay delivery, to use bandwidth throttled, or to access apreferred/premium service which allows access to cache locations andsimilar functionality. This can be particularly useful for changingdeliver options as may be desirable when a user is travelling and haslimited access to other network resources (e.g., home computer access oremail).

To implement such modifications, the application can modify contentrequests to denote user preferences (e.g., by modifying routing data foraccess request or adding preference indications thereby instructing howa remote device should control content delivery). Alternatively, userprofile data can be stored by a service provider. The application thenupdates the user profile data according to user preferences. Access touser profile data can also be provided via other interfaces, such as viaa website.

As a particular example, the user may indicate that a first websitecontains content that is to be afforded a relatively low priority andfor which delivery can be delayed or otherwise slowed. The user mayindicate that another website is to be afforded high priority, anddelivery should be prioritized. The cache/data control device(s) processaccess requests for each website accordingly. For billing purposes, theuser may be charged a premium fee for the high priority accesses. Asanother example, when a mobile device requests access to content, themobile device presents the user with content delivery options. Theseoptions can be a priority indication and/or more detailed options, suchas accepting delayed delivery for a reduced price and/or paying extrafor access to a cached version. Other options include transcodingoptions, such as indicating the acceptability of different videoresolutions or coding schemes.

These and other applications can be implemented on mobile stationsconsistent with the present disclosure. The application includesprogrammed instructions that, when executed by a computer/processor,perform one or more of the methods and/or steps of the disclosure. Theinstructions can be programmed on a computer readable medium includingnon-volatile or volatile memory circuitry.

Various aspects of the present disclosure relate to particular types ofdata flow in response to the location-based operations performed byprocessor nodes 190. FIG. 2A illustrates a block diagram useful fordiscussing examples of such data flow relative to content access bymobile devices, consistent with embodiments of the present disclosure.The system depicted in FIG. 2A includes mobile stations 202, radioaccess networks 204, data gateways 206, an Internet gateway 208, anddata intermediation modules 220 which are used to illustrate an examplestructure for providing specialized back channel operations by theprocessor nodes. Although the system is depicted and described withcertain components and functionality, other embodiments of the systemmay include fewer or more components to implement less or morefunctionality.

For description purposes, one of the mobile stations 202 requestsmultimedia, or other, content and one of the data intermediation modules220 receives the requests. The mobile stations 202 can include handheldwireless devices, such as cell phones, mobile phones, smartphones,personal digital assistants (PDA), handheld gaming devices etc, that canwirelessly communicate using radio frequency (RF) communicationssignals.

In certain embodiments, the radio access networks 204 facilitate radiocommunications between the mobile stations 202 and a core network thatincludes the data gateways 206, the Internet gateways 208, and the dataintermediation modules 220. In an embodiment, the radio access networksinclude one or more base stations to facilitate communications among themobile stations that are within a communication range of the basestations. Each base station has at least one RF transceiver and the basestations communicate with the mobile stations using RF communicationsignals. The radio access network facilitates network communicationsamong multiple mobile stations within the same radio access network andbetween mobile stations in other radio access networks and providesinterfaces to facilitate communications with other entities, such as aPublic Switched Telephone Network (PSTN), a Wide Area Network (WAN), theInternet, Internet servers, hosts, etc., which are outside of the radioaccess network. In an embodiment, the network elements depicted in FIGS.1A and 1B are part of a wireless network that is operated by a singlewireless service provider.

Data signals communicated between the mobile stations 202 and the radioaccess networks 204 include, but are not limited to, analog and/ordigital RF signals (i.e., radio waves) for any type of communicationmode, including text messaging, multimedia messaging, voice calling, andInternet browsing. The radio access network can support variousdifferent RF communications protocols, including without limitation,GSM, UMTS, CDMA, WiMax and communications protocols as defined by 3GPP,3GPP2, or IEEE 802.16. Although some wireless communications protocolsare identified herein, it should be understood that present disclosureis not limited to the cited wireless communications protocols.

The data gateways 206 configure outgoing data access requests for usewith one or more networks and configure incoming data for use by ordisplay on a mobile station 202. As shown, each data gateway interfacesdirectly with a radio access network 204 and a data intermediationmodule 220, although other embodiments may include other intermediatefunctional elements.

The Internet gateway 208 provides a gateway for receiving data fromcontent providers 262 (or optionally between mobile stations 202). Thecontent providers 262 can be Internet-connected hosts and/or servers.For example, the Internet gateway can be a Wireless Application Protocol(WAP) gateway that converts the WAP protocol used by the radio accessnetwork to the Hypertext Transfer Protocol (HTTP) protocol used by theInternet. In an embodiment, the Internet gateway enables mobile stationsto access multimedia content, such as Hyper Text Markup Language (HTML),compact HTML (cHTML), and extensible HTML (xHTML), which is stored onInternet-connected hosts and/or servers.

The disclosure is not limited to Internet communications and can be usedin connection with various other networks and content sources as shownby alternative gateway/service 210. For instance, alternativegateway/service 210 can be a custom interface provided by a wirelessservice provider. The wireless service provider can use the custominterface to provide content to mobile devices. As an example, thecontent could be movies, applications, music, games or otherdownloadable data. The wireless service provider can store the contentat one or more centralized locations and then distribute the content tocache locations as desired and discussed herein. Mobile device users canbe charged for access to the content and at the same time realize animproved quality of experience due to intelligent caching and/ordelivery of the content.

In a particular implementation of the disclosure, the wireless serviceprovider can provide data content originating from other contentproviders. The other content providers purchase access to thecaching/data control aspects of the present disclosure, therebyproviding improved quality of experience for mobile users attempting toaccess their content.

The FCC may impose (“net neutrality”) rules that would prohibit Internetservice providers from slowing or blocking of information and certainapplications over their networks. In this context, it should be notedthat even for content that is allowed equal access to network bandwidth;however, subscribers to the intelligent data control of the instancedisclosure can provide a higher quality of experience for theirrespective content.

With reference to FIG. 2A, in a data acquisition process, a mobilestation 202 generates a data request message (e.g., HTTP, SIP, RTP) thatidentifies a content provider and desired content (e.g., by entering aURL or other identifier). The data intermediation modules 220 can belocated between gateways 206 on one side and the Internet gateway on theother side. In particular, each data intermediation module isfunctionally located in a data path that is between the respective datagateway on one side and the Internet gateway on the other side. Inaccordance with an embodiment of the disclosure, the data/caching module220 manages the flow of content between content providers and mobilestations. The modules can include, or have access to, a cache storagedevice for storing content.

In an embodiment, the data intermediation module 220 intercepts contentrequests that are sent from a mobile station and processes the requeststo determine how to handle the content requests. This can includedetermining whether the requested data is present in the cache and/orperforming various other functions that help to improve the performanceof the system. For example, the data intermediation module may performany of the following functions:

1) limit access to content by a requesting mobile station;

2) cache content for delayed delivery;

3) optimize the content by transcoding thereof;

4) provide content directly from the cache without retrieving thecontent through the Internet gateway; and

5) forward content between data intermediation modules to preemptivelypopulate caches with content.

In alternative embodiments, other techniques for media streaming such asHTTP-Progressive Download (PD) and HTTP adaptive bit rate streaming maybe utilized. In a particular embodiment, the content is part ofstreaming data that is accessible within the 3GPP end-to-end PSstreaming service specification. Within this specification the contentis transported using Real time Transport Protocol (RTP) over User DataProtocol (UDP). Session control/setup is implemented using Real TimeStreaming Protocol (RTSP). For cached data, the streaming session can beeffectively intercepted by streaming from the cached location instead ofthe indicated URL. The cache device can identify requests for streamingsessions for cached URL locations and thereby intercept the connection.This can be accomplished in a number of manners. For instance,connection information is sent to a requesting device using a sessiondescription protocol (SDP) file. In one instance, the SDP file can beadjusted based upon the existence of cache data. The adjustment caninclude changes due to transcoding and or connection information due tocache location.

In alternative embodiments, other techniques for media streaming suchHTTP-Progressive Download (PD) and HTTP adaptive bit rate streaming maybe utilized. In another embodiment, the content can include content(media or otherwise) that is accessible via OMA generic content downloadover-the-air specification. This access can include either download withseparate delivery of download descriptor and media object or downloadwith co-delivery of descriptor and media object. The download descriptorcontains information about a media object and instructions on how todownload the content. The data flow control can thereby be effected bymodifications to the download descriptor.

As a specific example a data network can involve multiple/disparateentities managing nodes/gateways or other content delivery elements. Acontent control device can initiate content delivery (streaming orotherwise) via a setup request. In a more particular embodiment, thecontent control device modifies the setup request as a function of thecurrent cache state or other network parameters (such as subscriberrelationship, content provider agreement or analytics applicable tonetwork environment). In some instances, the modified request includesoptions for content delivery that can be acted upon by a downstream nodeor entity.

The data intermediation modules 220 can be particularly useful forimproving the performance of live data content delivery by intelligentcaching and data flow control. Caching and flow control decisions can bemade based upon the status of cache storage devices at variouslocations. For instance, the data intermediation modules 220 candetermine whether or not all or part of a particular requested contentis already stored in a cache storage device near the recipient device.In this manner, the cached content can be retrieved from the data cachedevice and thereby not sent over the core network.

To facilitate this cache-based communication between data intermediationmodules 220, a variety of messaging protocols can be used. For instance,the existence of multiple cache locations allows for content retrievalto occur between caches thereby alleviating the need to access thecontent provider directly. While not limiting, in one example a centralcache managing server maintains a list of cached content for the variouscache storage devices. A data intermediation module 220 checks with thismanaging server to determine whether the entire content needs to betransmitted as a function of the status of cache storage devices. Inanother example implementation, the data intermediation modules 220communicate directly with one another.

These and other various communications can be implemented over thecontrol protocols for telephonic devices. For instance, the cache checkscan be sent within the signaling system 7 (SS7) protocol, therebyfacilitating transmission across a number of different network platformsincluding, for instance, the PSTN. Other communication protocols arealso possible. An example embodiment using such communication flow isdiscussed more detail in regards to FIG. 3.

Additional improvements in performance can be achieved by processing thecontent to, for example, optimize the content and to provide value addedservices.

Each one of the data intermediation modules 220 (and/or associatedprocessor nodes and storage devices) can be a standalone networkelement, such a distinct network node (e.g., a different “box”) that isconnected to the network by wired and/or fiber-optic network connectionsusing network communications protocols such as Internet Protocol andEthernet. Alternatively, each one of the data intermediation modules 220may be integrated with one of the other network elements. For example, adata intermediation module may be located in the same “box” as one ofthe data gateways 206, the Internet gateway 208, or other components.Whether the data intermediation module 220 is physically located in adistinct physical network node or in the same network node as anothernetwork element, the functionality of the data intermediation module canbe similar.

Use of a data intermediation module as described herein is applicable todifferent kinds of radio access networks, including, for example, 3GPP,3GPP2, IEEE 802.16, and 4G radio access networks. For instance, radioaccess networks as defined by the 3GPP include a NodeB, a Radio NetworkController (RNC), a Serving General Packet Radio Service (GPRS) SupportNode (SGSN), and a Gateway GPRS Support Node (GGSN). These nodes arediscussed briefly as an example system, but the disclosure is notlimited thereto.

A NodeB is a network element that performs base station functionality. ANodeB can use various communication protocols, such as Wideband CodeDivision Multiple Access (WCDMA)/Time Division Synchronous Code DivisionMultiple Access (TD-SCDMA), to communicate with the mobile stations. Inan embodiment, each NodeB includes an RF transceiver that communicateswith the mobile stations that are within a service area of the NodeB. Inone embodiment, the NodeBs have a minimum amount of functionality andare controlled by an RNC. In another embodiment in which High SpeedDownlink Packet Access (HSDPA) is used, some logic (e.g.,retransmission) is handled by the NodeB to achieve shorter responsetimes.

Each RNC is a network element that controls the connected NodeBs. Inparticular, the RNC is responsible for radio resource management andmobility management. The RNC is also the element that performsencryption before user data is sent to and from a mobile station. In anembodiment, radio resource management operations include outer looppower control, load control, admission control, packet scheduling,handover control, security functions, and mobility management. The RadioNetwork Controller may also various radio resource optimizationoperations.

Each SGSN is a network element that delivers packets to and from themobile stations within a corresponding geographical service area.Functionality of the SGSN includes packet routing and transfer, mobilitymanagement (e.g., attach/detach and location management), logical linkmanagement, and authentication and billing. In an embodiment, the SGSNmaintains a location register that stores location information, such asthe current cell of a mobile station, and user profiles, such asInternational Mobile Subscriber Identity (IMSI) address used in thepacket data network, of all GPRS mobile stations that are registeredwithin the corresponding geographical service area of the SGSN.

Each GGSN is a network element that provides interworking between theGPRS network and external packet switched networks, such as the Internetand X.25 networks. In particular, the GGSN hides the GPRS infrastructurefrom the external networks. Functionality of the GGSN includes checkingto see if specific mobile stations are active in the radio accessnetwork and forwarding data packets to the SGSN that is currentlysupporting a mobile station. The GGSN also converts GPRS packets comingfrom an SGSN into the needed packet data protocol format (e.g., InternetProtocol or X.25) and forwards packets to the appropriate externalnetwork. The GGSN is also responsible for IP addressmanagement/assignment and is the default router for the mobile stations.The GGSN may also implement Authentication, Authorization, andAccounting (AAA) and billing functions.

FIG. 2A also depicts a detailed example of a data intermediation module220 in accordance with an embodiment of the disclosure. The dataintermediation module 220 includes a sender-side interface 240, arecipient-side interface 242, a Value Added Service Provider (VASP)interface 244, a billing interface 246, an AAA interface 248, a cachestorage module 250, a context parameter and analytics database 252, amedia processor 254 for handling 3^(rd) party requests and reports,recommendation processor 255, a traffic manager 256, and a workflowengine 258. Without loss of generality, some of the content flow isdiscussed herein in terms of content received over the Internet;however, the data content could be provided via other suitablemechanisms and from other sources.

The sender-side interface 240 is an element of the data intermediationmodule 220 that provides an interface to the sender-side functionalelements of the system and is the incoming interface for data contentsent to the recipient-side mobile station. The recipient-side interface242 is an element of the data intermediation module 220 that provides aninterface to the recipient-side functional elements of the system and isthe outgoing interface for data content destined for a recipient-sidemobile station. In the embodiment of FIG. 2A, the recipient-sideinterface is functionally adjacent to the (Internet) gateway or othernetwork components (e.g., a MSF server), and the receiving dataintermediation module.

The VASP interface 244 is an interface for value added service providers(e.g., service providers that are distinct from the content provider orthe operator of the system and wireless communications network). In anembodiment the value added service providers are third-party serviceproviders that provide some additional service, functionality, or datato the system. In an embodiment, the VASP interface enables value addedservice providers to provide direct inputs to the data intermediationmodule related to, for example, sender parameters, recipient parameters,and optimization parameters.

The billing interface 246 of the data intermediation module provides aninterface to a billing system or billing systems. In an embodiment, thebilling interface enables the system to implement a billing program fordata services. The billing system can also be used to bill contentproviders for access to the caching or for preferred content deliveryfeatures (e.g., enabling of RAN-based multicasting or reducedthrottling). Content providers could request that certain content bestored and easily accessible, thereby improving the user experience forthe cached content. The billing program could record such requests andcharge content providers as a function of the number of cache requests,the number of accesses to the content, the bandwidth used by accesses tothe content and the like.

Another implementation involving a billing function is directed to acentralized controller (or a hierarchy of important data and/or multiplestorage/cache locations at various points within the network) fordistributing content to multiple locations based on mobile-terminalpopulation changes in the regions of the locations. Content providerscan request distribution of content for improved access based upondefined parameters. These parameters can include, for instance,geographical location, type of wireless service available (e.g., 3G,WiMax), wireless service provider (e.g., AT&T, Verizon) or state/countryboundaries. The billing can be accomplished using a centralized model,such as based upon the number of cache locations the content is to beloaded to, and/or a decentralized model where each location tracks usageand generates billing data therefrom. In yet another embodiment, asemi-centralized model involves two or more business entitiescoordinating and negotiating billing models and content deliverycontrol/caching, bandwidth and quality factors. These and other aspectscan thereby be used with various other parameters and content controlfunctions.

Another implementation relating to billing methods involves a method ofcontrolling delivery of source data content through a communicationnetwork including a wireless-technology network and another network. Thewireless-technology network is controlled by a first business entity(e.g., data caching/flow control provider) and the other network beingcontrolled by a second business entity (e.g., Internet ServiceProvider/content provider). In response to notification that source datacontent is to be routed through the communication network, control datais accessed, representing data-delivery conditions agreed to between thefirst and second business entities. In response to and as a function ofthe control data, substantially redundant representations of the sourcedata are directed to cache memories located at nodes in thewireless-technology network. The system delivers redundantrepresentations of the source data from the cache memories to complywith the notification while effecting an improved quality of experienceor improved system bandwidth allocation in the communication network. Ina specific example of such a data network involving multiple/disparateentities managing nodes/gateways or other content delivery elements, a(streaming or otherwise) setup request is modified by one of thebusiness entities to effect delivery as a function of the current cachestate or other network parameters (such as subscriber relationship,content provider agreement or analytics applicable to networkenvironment).

The AAA interface 248 of the data intermediation module provides aninterface to authentication, access control, and accounting informationand services.

The cache storage module 250 of the data intermediation module 220provides storage for content (e.g., video, audio, website, messages). Inan embodiment, the cache storage module enables the data intermediationmodule 220 to delay communication of content to other network elementswhen desired. Additionally, the processor nodes and associated storagemodules can communicate with one another to allow for the dataintermediation modules to implement an accelerated delivery mechanism bysending content directly between data intermediation modules withoutpassing through an Internet gateway.

The context parameter database 252 of the data intermediation moduleprovides a repository for context parameters that can be used to controlcontent caching and/or delivery. In an embodiment, context parametersmay include user data, device characteristics, network characteristics,environmental factors, and socio-cultural factors. Examples of user datainclude the messaging price plan a user is subscribed to (e.g., premiumvs. standard), the age of the user, or the billing location of the user.Examples of device characteristics include the screen size and supportedaudio and video codecs of a mobile station. Examples of networkcharacteristics include network technology (e.g., High Speed PacketAccess (HSPA), LTE), network topology (e.g., microwave vs. metroEthernet backhaul), and available network capacity. Examples ofenvironmental factors include time of day, location of sender andrecipient, and weather conditions. Examples of socio-cultural factorsinclude holidays, sporting event schedules, etc. One or more of thecontext parameters may be combined to form context information that isused to determine how the data intermediation module processes content.For instance, content provided to a user having a standard rate priceplan may not get priority treatment relative when the system iscongested due to a wild fire raging in the area.

The media processor 254 of the data intermediation module supports theprocessing of content to modify one or more aspects of the multimedia(and other) content. In one embodiment, the media processor transcodesthe content. For instance, video content may be modified by changing thespatial and temporal resolution, changing the encoding bit rate, and/orchanging the codec and/or codec parameters. In another embodiment, audiocontent may be changed by changing the sampling rate, changing thenumber of channels, changing the encoding bit rate, and/or changing thecodec and/or the codec parameters. In another embodiment, image contentmay be changed by changing the spatial resolution, changing the bitdepth, changing the encoding bit rate, and/or changing the codec and/orthe codec parameters.

In another embodiment, the media processor 254 processes the content toenhance it. For example, the media processor may insert an advertisementin audio, video, image, or textual format into the content. In anotherembodiment, the media processor may convert textual symbols, such asemoticons, to an equivalent image representation.

The recommendation processor 255 of the data intermediation module isconfigured to proactively push real-time recommendations to mobileusers. Using location-based and user-profile back channel data, therecommendation processor 255 can proactively push out location-basedrecommendations regarding a variety of user preferences and parameters.As indicated further in connection with FIG. 2B, these might includevideo sources for rich-media downloads, preferred music sources and blogforums, social network friends whose mobile terminals are relativelygeographically nearby, and interesting local opportunities to users onthe go. As users travel, they can thereby receive reports from therecommendation processor 255 and communicate therewith on a convenientand region-specific basis. In certain systems, these region-specificrecommendations and alerts utilize region-specific data sharing anddistribution via a region-specific cache, as previously discussed.

The traffic manager 256 of the data intermediation module is configuredto provide traffic management in the network. In an embodiment, thetraffic manager regulates the flow of content traffic between thefunctional elements of the system. For example, when a mobile stationrequests content from a content provider, the traffic manager regulatesthe data transfer rate by delaying or throttling back the transmissionof the content. In an embodiment, the traffic manager delays thetransfer of content by terminating the Transmission Control Protocol(TCP) connection when a mobile station initiates the transfer process.In an embodiment, the traffic manager throttles back the transfer ofcontent by delaying the sending of TCP SYN packets from the dataintermediation module to the mobile station while the content is beingtransferred. Other types of traffic management can be implemented by thetraffic manager.

The workflow engine 258 of the data intermediation module is configuredto process the content and, in response to the processing, to determinewhere/whether to cache the content based on the aforementioneddiscussion. In an embodiment, the workflow engine determineswhere/whether the content currently resides relative to one or morecache locations. This determination can be used to decide how best toretrieve the content, such as whether to access the content providerthrough the Internet gateway or from another data intermediation module.

In one implementation, the workflow engine can access resources from anyof the traffic manager, the VASP interface, the billing interface, theAAA interface, the cache storage module, the context parameter database,and the media processor in order to help make routing/caching/controldecisions and any of the criteria described above with respect to thetraffic manager, the VASP interface, the billing interface, the AAAinterface, cache storage module, the context parameter database, and themedia processor can be considered by the workflow engine. Additionally,the workflow engine may dictate how content is processed within the dataintermediation node. For example, the workflow engine may specify aparticular type of transcoding for the content based on the capabilitiesof the intended recipient-mobile station.

In a particular embodiment, a billing node may be located between theGGSN and the data intermediation module.

FIG. 3 depicts an example wireless network consistent with variouscellular systems and an embodiment of the present disclosure. Data pathsare indicated by solid connection lines and control paths are indicatedby broken lines. As discussed herein, embodiments of the presentdisclosure allow for location-based cache control to be implementedusing existing control paths. If desired, the control data can be sentconsistent with the SS7 and related control protocols. This allows foradditional flexibility including backward compatibility across disparatesystems. Moreover, since the existence of stored data may eliminateand/or reduce the necessity for an end-to-end data path between sourceand destination devices, the use of the control protocols can beparticularly useful in determining this necessity before setting up datapath(s).

For instance, connection to content might be established using HTTP orsession-initiation-protocol (SIP). An intervening control server/devicecan check the status of various storage devices relative to the desiredcontent indicated by the connection request for a given population ofmobile terminals in a particular location. If the desired content isindeed readily available and/or cached, the intervening control canintercept the connection request and establish a link with the storagedevice instead of the destination indicated by the requestinguser/mobile device.

In various embodiments of the present disclosure, the storage devicesoperate to maintain synchronicity with content providers. In particular,content providers may change the content and thereby render the versionsof the content out-of-date. The synchronicity can be maintained in anumber of different manners. One mechanism involves periodically, or inresponse to user device requests, checking the version/status of thecontent at the content provider. If the content has changed, the versionstored in the storage devices can be updated. Another mechanism is toallow for content providers to push new updates directly to the storagedevices. This allows content providers to have more control over thecontent delivery, but may require more interaction with the contentproviders, e.g., establishment of preexisting protocols and otheragreements.

Consistent with embodiments of the present disclosure, various processes(algorithms) can be implemented in connection with location-based backchannel data features. According to one such process, a controlprocessor(s) is configured to access a database of context parameters.The particular parameters and their respective weight in the analysiscan be selected according to a number of criteria. According to one suchcriterion, a lookup table of desired context parameters is indexedaccording to the content type. The content type can include suchcharacterizations as media type (e.g., video, audio or text), contentsource, real-time requirements (e.g., streaming/live data) and/or datasize. The lookup table then provides a list of context parameters alongwith instructions on how to use the context parameters. The controlprocessor uses these parameters to determine whether, to which types ofmobile devices, and/or where to send messages, recommendations and/orcontent. The control processor, using the user profile of prospectiverecipients of such data, can also determine whether or not to limitaccess thereto based on user preferences and the location-based backchannel data.

In a particular implementation, the control processor node assesses thepropriety of proceeding with such user-directed communications by firstrating the message or content and then comparing the content rating topreviously stored content as indicated in a user profile. If thenew/current content has a higher rating, then the control processorinstructs the relevant nodes for delivery of the content and/or itsstorage for later access.

The above-mentioned processes (algorithms) show the diversity and wideranging application of embodiments of the present disclosures andtherefore are not meant to be limiting. Variations of theabove-discussed embodiments, for example, are based on combinations ofthe disclosed aspects as set forth above and/or in the claims thatfollow. Variations of the embodiments may be employed for wirelesscommunication networks based on 3G (e.g. CDMA, UMTS, HSPA, HSPA+) or 4G(e.g. WiMax, LTE, LTE-Advanced) standards.

FIG. 4 depicts an example network, including a wireless network,consistent with various cellular systems and embodiments of the presentdisclosure and further including expanded example block diagrams ofrelevant hardware-software circuits of both a user device andprocessor-node circuitry applicable to many of the embodiments discussedand illustrated herein. The mobile or user device 184 includes anAdaptive Autonomous Location Push (AALP) mobile agent 410 to interfacewith an AALP adapter provided in the mobile positioning center(MPC—internal to the wireless communications network 182 and RAN 194.The mobile or user device 184 also includes other hardware-softwarecircuits such as client application program interfaces (APIs) 420, aSecure User Plane for Location (SUPL) interface 422, and a GPS interface426. Such applications are further described in US Patent ApplicationPublication No. 2007/0026871, assigned to the instant assignee.

The mobile device 184 further includes specialized-privilegedapplication program interfaces 424 and 428 which are configured topermit the mobile device 184 to implement a variety of network-specificand network-cooperative location-based operations. For instance, thespecialized-privileged application program interface 428 providesfeature control for the mobile device, in response to a communicationfrom the wireless-technology equipment that a user-alert indicatorshould be changed in the mobile terminal when the mobile terminal is ina geographic region. The user-alert indicator can change between modesof an audible alert and a vibrating alert, e.g., when the regiondesignates a worship service, quiet hours such as during classroom time.

As another example, the specialized-privileged application programinterface 424 can provide the wireless communication network 182user-profile updates such as personal travel calendar information usefulfor assisting in preparing location-specific processors and (cache)memory devices within the wireless communication network 182 in advanceof the anticipated travel.

The processor node 190 and its related memory device 192 is alsoexpanded, thereby illustrating the intermediation interface foracquiring and processing the location-based back channel data. Theintermediation interface has a front end processor 450 which acts as agateway for accessing selected user profiles as a function of receipt ofregional region-relevant alerts of user devices from the RAN equipment194. The intermediation interface has a BCD (back channel data)processor 452 which performs the translations and matching between theback channel data received from the front end processor 450 and otherstored data. For sets of programmed operations that specialize theprocessor nodes to provide certain features (benefitting the mobileusers, the wireless network and/or third parties), the BCD processor 452carries out immediate local access and (cache-like) processing of therelevant user profiles in processor module 454, third party profiles andrelated instructions in processor module 456 and network-specificBCD-related operating and access rules in processor module 458. Anotherprocessor module 460 is generally configured for other functionalitysuch as that discussed above in connection with the lower portion ofblock 220 of FIG. 2A.

FIG. 5 depicts an example network, including a wireless network,consistent with various cellular systems and embodiments of the presentdisclosure including many discussed herein involving third partyrequests and BCD-related accesses. An example application involves acommunication network with a wireless network 182 that provides accessto back channel data to nodes 510 managed by third parties. A processornode 190 in the wireless network uses and processes location-basedmobile-terminal data as geographically-tagged information sources forreview and possibly further processing and analysis by the thirdparties. Processor 514, acting as an agent of the network 182,anonymizes the sensitive BCD data before publishing thesegeographically-tagged information sources. In some configurations, theprocessor node 190 receives from third parties' requests and feedbackvia processor interface, and/or input from other resources such as aserver over the Web 520 and privately-held databases 522 which mightinclude adaptively re-processed versions of the data previously providedto the third parties. Database 522 and results analysis processor 530,feed and/or are controlled by a third party, are depicted as receivinginstructions and rules from third parties for demographically refiningwork product received from the processor node 190 with at least oneiteration for refining the work product such as by including additionalparameters latently obtained regarding the set of demographicinformation. In some configurations, the processor 514 receives suchrefined work product from the third party node 510 and reverses the“tokenization” of the sensitive user data; in this manner the processornode 190 is able to re-process in the ensuing iterative steps with morecomplete information than would otherwise be accessible to the thirdparty. A BCD combiner 540 is a processor node adapted to reconstructuseable data for the processor node 190 based on the (the reverse“tokenization” of the sensitive user data) output from the processor 514and the refined rules and/or parameters received from the third partynode 510.

This methodology can be extremely useful in a variety of situationsincluding, for example, use of the processor node as an independentauditor for a transaction between two parties (bidding auction,business-business dispute settlement, etc.). In one such independentauditing transaction, the processor node 190 acts on behalf of agovernment entity to monitor suspicious communication activity withreports being issued to a judge in respect of the privacy rights ofthose being monitored. An example of such suspicious communicationactivity might entail the government entity providing demographicuser-based and location-based rules for monitoring calls where certainterms are used (see related processing in blocks 220 of FIGS. 2A and 190of FIG. 4). Sensitive user data provided by way of the back channel datacan be encrypted and delivered in various forms with a key provided to(or accessible by) the judge for decrypting before analyzing the data(e.g., in deciding whether to issue a subpoena for desensitizing thedata), or by another entity for reprocessing and further monitoringwithin the network.

As a function of subscriber-based agreements or other authorizedprotocols (examples being provided herein), a memory circuit stores theabove-discussed user profiles (including subscriber data such asidentity, age, and other particulars and demographics) on behalf of anoperator for the wireless communication network for access to thenetwork. On behalf of a third party, the memory circuit also storescommunication rules relevant to a geographic region of service providedby the communication network. The processor node is configured withinthe wireless-technology equipment for assimilating back channel data,such as current location data regarding the user terminals and with theuser profiles, for generating assimilated current location-based anduser-characterizing data. The generated data is provided to anotherprocessor node (such as at a third party). In one configuration, inresponse thereto, a modified set of data and a set of rules are receivedfrom the third party for generating another set of assimilated currentlocation-based and user-characterizing data.

Various embodiments described above, in the claims that follow, in thefigures and related discussion may be implemented alone, in one or morecombinations with other aspects and/or in other manners. One or more ofthe elements depicted in the figures can also be implemented in a moreseparated or integrated manner, or removed, as is useful in accordancewith particular applications. It is also within the spirit and scope toimplement a program or code that can be stored in a machine-readablemedium to permit a computer to perform one or more aspects of theapproaches described above, such as those involving the storage andretrieval of data. In view of the description herein, those skilled inthe art will recognize that many changes may be made thereto withoutdeparting from the spirit and scope of the present disclosure.

1. For use in connection with a communication network having wireless-technology equipment, a system comprising: a memory circuit that stores on behalf of an operator for the communication network, user profiles that include wireless network subscriber data useful for providing network access to mobile terminals associated with the subscriber data, on behalf of a third party, communication rules relevant to a geographic region of service provided by the communication network; and a processor node configured within the wireless-technology equipment for assimilating current location data regarding locations of the mobile terminals with the user profiles, and generating assimilated current location-based and user-characterizing data, and providing the generated data to another processor node and, in response thereto, receiving a modified set of data and a set of rules for generating another set of assimilated current location-based and user-characterizing data.
 2. The invention set forth in claim 1, wherein the processor node is further configured for receiving modified sets of data for iterative processing according to at least one set of rules.
 3. The invention set forth in claim 2, wherein the modified sets of data refine sets of data for one of: advertising, fleet tracking, child finder, and traffic alerts.
 4. The invention set forth in claim 2, wherein the modified sets of data provide different types of information for different analytics, the different analytics relating to at least one of: advertising-directed demographics, fleet tracking, people finding, traffic, types, times and volumes of network communications.
 5. The invention set forth in claim 1, further including an invoicing module that generates an invoice, to the third party, for operations by the processor node configured within the wireless-technology equipment.
 6. The invention set forth in claim 1, further including a processing module for receiving and processing sets of data that relate to: advertising, fleet tracking, child finder, and/or traffic alerts.
 7. The invention set forth in claim 1, further including a processing module for receiving sets of data and related sets of new rules that pertain to advertising-directed demographics.
 8. The invention set forth in claim 1, wherein the other processor node is primarily dedicated to analytics processing configured to operate in part by rules provided from a third party.
 9. The invention set forth in claim 1, wherein the other processor node is configured to perform operations at least partly provided by rules received from third parties.
 10. The invention set forth in claim 1, wherein assimilating current location data and generating assimilated current location-based and user-characterizing data are iterative operations.
 11. For use in connection with a communication network having wireless-technology equipment, a method comprising: in a memory circuit, storing on behalf of an operator for the communication network, user profiles that include wireless network subscriber data useful for providing network access to mobile terminals associated with the subscriber data, on behalf of a third party, communication rules relevant to a geographic region of service provided by the communication network; and using a processor node configured within the wireless-technology equipment, assimilating current location data regarding locations of the mobile terminals with the user profiles, and generating assimilated current location-based and user-characterizing data, and providing the generated data to another processor node and, in response thereto, receiving a modified set of data and a set of rules for generating another set of assimilated current location-based and user-characterizing data.
 12. The invention set forth in claim 11, wherein the processor node is further configured for receiving modified sets of data for iterative processing according to at least one set of rules.
 13. The invention set forth in claim 12, wherein the modified sets of data refine sets of data for one of: advertising, fleet tracking, child finder, and traffic alerts.
 14. The invention set forth in claim 12, wherein the modified sets of data provide different types of information for different analytics, the different analytics relating to at least one of: advertising-directed demographics, fleet tracking, people finding, traffic, types, times and volumes of network communications.
 15. The invention set forth in claim 11, further including using an invoicing module to generate an invoice, to the third party, for operations by the processor node configured within the wireless-technology equipment.
 16. The invention set forth in claim 11, further including receiving and processing sets of data that relate to: advertising, fleet tracking, child finder, and/or traffic alerts.
 17. The invention set forth in claim 11, further including receiving sets of data and related sets of new rules that pertain to advertising-directed demographics.
 18. The invention set forth in claim 11, wherein the other processor node is primarily dedicated to analytics processing configured to operate in part by rules provided from a third party.
 19. The invention set forth in claim 11, wherein the other processor node is configured to perform operations at least partly provided by rules received from third parties.
 20. The invention set forth in claim 11, wherein the steps of assimilating current location data and generating assimilated current location-based and user-characterizing data are iterative operations. 