System and method for managing communications over a wireless network during an emergency

ABSTRACT

A system and method for managing an emergency over a wireless network. A wireless station receives an emergency information string broadcast by a string broadcast station. The string broadcast station is operated by law enforcement or other authorized personnel. A wireless station obtains the emergency information string and obtains an emergency alert message from a server. The message may be retransmitted by the wireless station. A listener module may be deployed that can be used to identify wireless stations that are within an area affected by the emergency and to provide the emergency alert message to the identified wireless stations.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority under 35 U.S.C. §119(e) fromprovisional application No. 61/487,549 filed May 18, 2011, fromprovisional application No. 61/491,431 filed May 31, 2011, and fromprovisional application 61/547,271 filed Oct. 14, 2011. The 61/487,549,the 61/491,431 and the 61/547,271 provisional applications areincorporated by reference herein, in their entireties, for all purposes.

BACKGROUND

Wireless networks are used by consumers, businesses, serviceorganizations (among others) to establish or extend local area networksto locations that are not readily or desirably connected to wire networkinterface cards.

Networks may be operated so as to restrict access to authorized users.Alternatively, a wireless network may be open to access to anyone,either for a fee or without charge. For example, open networks or “hotspots” are often operated by retail establishments, transportation hubs,medical facilities, and educational institutions to permit access to theInternet to users of wireless stations, such as laptops, smartphones,and tablets, through a base station or access point (AP).

A wireless network typically communicates using a protocol that definesmessage structures (sometimes referred to herein as “frames”). A messageframe may include a field for a network identifier or name, the mediaaccess controller address (MAC) of the station from which the frame isbroadcast, and other information. In order to connect to a network, awireless station must first find a compatible network that is withinrange of its transceiver. This process is typically accomplished througheither passive or active scanning. In passive scanning, an AP broadcastsits network name and other information in a message frame. In activescanning, the wireless station requests a response from an access pointby broadcasting the network ID of the network it is seeking to join.Alternatively, an active scanning process may include broadcasting arequest for a response from any network within range of the wirelessstation. The APs that are within range broadcast their SSIDs to thewireless station. The wireless station may select a wireless AP toassociate with from the list of responders.

Another architecture allows wireless stations to announce their presenceto other wireless stations and to form networks in which there is no AP.In this case, the wireless station seeking other wireless stationsbroadcasts its network identifier and receives a response from otherwireless stations within range.

Once a compatible network is found, the wireless station establishes aconnection to a wireless network through an exchange of messages thatauthenticates the wireless station to an access point (or a wirelessstation when there is no AP present) and then associates the wirelessstation with that access point or wireless station. By way ofillustration and not by way of limitation, an IEEE 802.11 network (ormore commonly, “Wi-Fi” network) provides communications between a Wi-FiAP and Wi-Fi enabled device. The Wi-Fi AP transmits the network name inthe form of a service set identifier (SSID). The SSID is typically a 1to 32 byte value that segments the airwaves for usage. If two wirelessnetworks are physically close, the SSIDs label the respective networks,and allow the components of one network to ignore those of the other.The SSID is present in beacon messages sent by an AP, a probe requestsent by a wireless station, probe responses sent by an AP, anassociation request sent by a probe request sent by a wireless station,and a re-association request sent by a wireless station. When wirelessstations are operated without an access device (IBSS or ad-hoc mode),probe requests from one wireless station may be answered by anotherwireless station with a probe response.

A beacon message is sent by an AP 5 to 20 times per second. The beacontypically includes the SSID, the time, capabilities, supported datarates, and physical layer parameter sets that regulate the smoothoperation of a wireless network.

SUMMARY

Embodiments are directed to configuring a string broadcast station (SBS)to transmit a network information string that may be used by wirelessstations to initiate an action. As used herein, a string broadcaststation encompasses a device that is capable of broadcasting a beaconmessage that contains a network information string. A “string”encompasses a series of alpha-numeric characters. For example, thenetwork information string may be all or part of a network identifier,for example, the service set identifier (SSID) of a Wi-Fi network. Inanother embodiment, the network information string may be the MACaddress of the SBS that broadcasts the beacon message. The MAC addressmay be used as the network information string either alone or incombination with the network identifier. A network information stringmay be registered with an information string server.

The network information string may be used to convey content or amessage to another SBS or wireless station. In an embodiment, thenetwork information string and the resulting action are unrelated to theoperation of the wireless network.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flow diagram illustrating a process by which a networkinformation string may be registered with an information string serveraccording to an embodiment.

FIG. 2 is a flow diagram illustrating a process by which contentassociated with a network information string may be stored in adatastore according to an embodiment.

FIG. 3 is a block diagram illustrating the acquisition of contentassociated with a network information string according to an embodiment.

FIG. 4 is a flow block illustrating operations performed by a listenermodule according to an embodiment.

FIG. 5A is a block diagram illustrating the operation of a wirelessstation in response to receipt of a network information string accordingto an embodiment.

FIG. 5B is a block diagram illustrating a process for triggering awireless station to take an action according to an embodiment.

FIG. 6 is a block diagram illustrating a messaging system according toan embodiment.

FIG. 7 is a flow diagram illustrating a process for conveying a messageto a wireless station according to an embodiment.

FIG. 8 is a block diagram illustrating components of a wireless station.

FIG. 9 is a block diagram illustrating a computing device.

FIG. 10 is a block diagram illustrating a server device.

DETAILED DESCRIPTION

Embodiments are directed to utilizing a network information stringtransmitted by an SBS to convey a string that may be received and usedby wireless stations to initiate an action. In an embodiment, thenetwork information string and the resulting action are unrelated to theoperation of the wireless network. Embodiments are also directed toassociating content with a network identifier of a wireless network,storing the associated content on a server, and providing access to thecontent to wireless stations based on the network identifier.

Various embodiments are described in the context of a Wi-Fi network. Thedescription is intended to be illustrative only and not limiting.Wireless networks that utilize a network identifier that is broadcast ina message frame (for example and not as a limitation, an 802.11management frame) either by a string broadcast station or by a wirelessstation may be used to convey the network information strings and tofacilitate the association of content, which may be entirely unrelatedto network operation, as described below. For example, wireless networksmay include RFID networks, Zigbee networks, Bluetooth networks and 3G/4Gnetworks.

As used herein, a string broadcast station or “SBS” encompasses a devicethat is capable of broadcasting a beacon message and includes devicesthat are configured to provide connectivity to a network, not soconfigured or not capable of providing connectivity to a network.

As used herein, a “beacon message” encompasses a signal transmitted by abase station or an SBS of a wireless network that may be received by awireless station, which signal conveys a message that identifies thenetwork and provides information about the network, includinginformation to allow a wireless station to join the network.

As used herein, a “probe message” encompasses a signal transmitted by awireless station that may be received by a wireless station or an SBS,which signal conveys a message that identifies the wireless station andrequests information about a particular wireless network or all wirelessnetworks within range of the wireless station.

As used herein, a network information string encompasses a characterstring that is included in a beacon message broadcast by an SBS or in aprobe message broadcast by a wireless station. In an embodiment, thenetwork information string may encompass all or a portion of the networkidentifier broadcast by the SBS, such as for example and not aslimitation, a service set identifier (SSID) of a Wi-Fi network, the MACaddress broadcast by the SBS, or the MAC address in combination with allor part of the network identifier.

As used herein, a “server” encompasses a computing device comprising atleast one processor that may be configured to interact in an automatedfashion with other devices over a network to serve content and webpages, to issue responses to communications from other network devicesand to respond to queries from other network devices.

As used herein, a “gateway” encompasses a computing device that may beconfigured to provide connections between different networks, includingconnections between a single “outside network” and multiple “insidenetworks.”

Registration of Network Information Strings

FIG. 1 is a flow diagram illustrating a process by which a networkinformation string may be registered with an information string serveraccording to an embodiment.

In an embodiment, a wireless network, such as for example and withoutlimitation a Wi-Fi network, broadcasts a message, such as a beaconmessage, that includes a network identifier, such as a service setidentifier (SSID). All or part of the network identifier may represent anetwork information string. In this embodiment, a network informationstring registration request is received at an information string server.(Block 102.) A determination is made whether the request includes anetwork information string. (Block 104.) If the request does not includea network information string (the determination at Block 104 is “No”), anetwork information string may be generated by the information stringserver (Block 106), and the process continues at block 114 (describedbelow).

If the request includes a network information string (the determinationat Block 104 is “Yes”), a determination is made whether the requestednetwork information string has been previously registered. (Block 108).In an embodiment, the determination as to whether a network informationstring has been previously registered may be based on matching all of apreviously registered network information string or a portion of thepreviously registered network information string.

If the network information string has been previously registered (thedetermination at Block 108 is “Yes”), the registration request isrejected. (Block 110.) A message is sent advising the requestor that theregistration request has been rejected. (Block 112.) In an embodiment,the rejection message may include one or more available networkinformation strings. If the network information string has not beenpreviously registered (the determination at Block 108 is “No”), theregistration request is granted.

Upon either the generation of a network information string (Block 106)or the granting of a requested network information string (Block 108), arecord is created at the information string server associated with thenetwork information string. (Block 114.) The requestor may be requiredto present credentials to the information string server prior topresenting a request to register the network information string. Forexample, the requestor may be required to first obtain a user ID andpassword from the information string server or from an authenticationserver utilized by the information string server.

As indicated previously, the network information string may include allor a portion of a network name identifier, all or a portion of a MACaddress of a string broadcast station that will broadcast the networkinformation string in a beacon message, or a combination of a networkname identifier and a string broadcast station MAC address.

In an embodiment, the network information string includes all or part ofthe network name identifier and may be registered in association withone or more MAC addresses. For example, a single network informationstring based on the network name identifier may be registered inassociation with the MAC addresses of multiple string broadcaststations. The string broadcast stations may be used in differentlocations. As discussed in detail below, the association of the networkinformation string with the string broadcast station MAC address allowsinformation to be associated with a network information string that isspecific to that particular SBS.

Content Storage

FIG. 2 is a flow diagram illustrating a process by which contentassociated with a network information string may be stored in adatastore according to an embodiment.

In an embodiment, content, or a link to content, may be stored in therecord associated in a datastore in association with the networkinformation string. Content may be stored by either the operator of theSBS and/or by a user of a wireless station. By way of illustration andnot by way of limitation, the content may include coupons,announcements, menus, news alerts, messages, photos, directions or linksto additional content on other servers.

A wireless station 202, such as for example and without limitation aWi-Fi enabled device, comprises a transceiver 204, a processor 206, amemory 208, a wireless station application 212 and a display 214. Thewireless station 202 also operates an instance of string utilizationapplication 210. The wireless station application 212 providesinstructions to the processor 206 of the wireless station 202 to enablethe wireless station 202 to interact with the string broadcast station(SBS) 220, such as for example and without limitation a Wi-Fi stringbroadcast station, as is known in the art.

In an embodiment, an SBS 220 comprises a transceiver 222, a processor224, a memory 226, and an SBS application 228. The SBS 220 also operatesan instance of the string utilization application 210. The SBSapplication 228 provides instructions to the processor 224 of the SBS220 to enable the SBS 220 to at least enable the SBS 220 to transmitbeacon message 230.

In an embodiment, the SBS 220 broadcasts a beacon message 230 thatincludes a network information string. The network information stringmay be an SSID or a portion of an SSID as previously described.

Content may be delivered to, and stored in, a content datastore 244 byeither the operator of the SBS 220 and/or the user of the wirelessstation 202. The content datastore 244 is illustrated as supporting tworecords. The record 246 allows content to be stored in association witha network information string without regard to the ownership of theregistration of the network information string. Thus, the operator ofthe SBS 220 or the user of the wireless station 202 may submit contentto the content datastore for association with a network informationstring and the content will be stored in the record 246. The record 248is reserved for storage of content by a registered owner of a networkinformation string.

In an embodiment, an operator of the SBS 220 may send a message 232 overa link 234 conveying content or a link to content and the networkinformation string to the information string server 240. The informationstring server stores the content or the record 246 in the contentdatastore 244 associated with the network information string or inrecord 248 if the network information string has been registered by theoperator of the SBS 220. The content may be associated with a networkinformation string rule allowing delivery of the content during aparticular time period. For example, a business may operate an SBS. Theadditional content scheduled for evening and night hours may indicatenightly specials, a message that the business is currently closed, orother time-sensitive information. During those specific time periods,potential customers may be directed to the business's website for moreinformation.

In another embodiment, the additional content is stored in a record ofthe information string server 240 in association with the MAC address ofan SBS. The MAC address may also be used in combination with the networkinformation string or alone. The association of an SBS MAC address witha network information string allows the record 246 or the record 248 tostore content that is specific to a particular SBS. When information isrequested from the content data store 244, the MAC address may beincluded in the request. In this way, the content that is returned isspecific to an SBS and the area that is served by that SBS. For example,a network information string may be used by the operator of a businessthat has multiple locations each with its own SBS. The operator mayelect to issue a coupon for one location only. By tying the coupon tothe MAC address of that specific SBS, the coupon will be served onlywhen a request for content (described below) includes both the networkinformation string and the correct MAC address.

In another embodiment, content is provided by a user of a wirelessstation, such as for example and without limitation a Wi-Fi enableddevice. In this embodiment, a beacon message 230 is received at thewireless station 202 operating the string utilization application 210.By way of illustration and not by way of limitation, the wirelessstation 202 may be a cell phone, a smart phone, or a laptop computer.The string utilization application 210 may be utilized to receive orcreate content for association with the network information stringbroadcast by the SBS 210. The string utilization application 210 createsa message 216 conveying the content and the network information string,and optionally, the MAC address of the SBS 210 that transmitted thebeacon message 230, to the information string server 240 via link 216.The content datastore 244 stores the content in association with thenetwork information string in a record 246 that is associated with thenetwork information string supplied in the message. When the SBS MACaddress is included in the message 216, the content is stored inassociation with both the network information string and the MACaddress. The MAC address may be used to establish a general location ofthe SBS 210, which location may be used in certain messages. Forexample, an operator of a wireless station may leave a message to gatherat a location proximate to the location of the SBS 220 that broadcasts aparticular network information string. As another example, the operatorof a wireless station may also leave comments about a venue that isproximate to the location of the SBS 220 that broadcasts a particularnetwork information string, such as feedback or a review of theirproducts or services.

In an embodiment, the owner of the network information string hasprivileges that allow it to control the content in both record 246 andrecord 248. For example, the registered owner of a network informationstring may remove some or all of the content in record 246 that isassociated with the registered network information string. A registeredowner may also block the association of content to the registerednetwork information string except by the registered owner.

As illustrated in FIG. 2, the content datastore 244 is physicallyseparate from the information string server 240. In this configuration,the content data store 244 may be located on a server that is accessibleto the information string server 240 via a link 242 and to the wirelessstation 202 via the link 216. In another embodiment, the contentdatastore 242 is a component of the information string server 240 andthe content datastore 244 is served by the information string server 240to the wireless station 202 via the communication link 216.

Requests to share content may be logged in the log datastore 250. Thelogged data may include identifying information of the wireless station202, identifying information of the user of the wireless station 202,the network information string associated with the requested content,the time when the request for content was made and the location of thewireless station when the request for content was made. The logged datacaptured in log datastore 250 may be used to identify user preferences,determine the response of the user of the wireless station 202 to thecontent 234 associated with the network information string, and measurethe interest of the user of the wireless station 202 in types ofcontent.

In another embodiment, content is stored in a memory of a wirelessstation, such as, for example and without limitation, memory 208 ofwireless station 202. By way of illustration and not by way oflimitation, the content may be stored in memory 208 of the wirelessstation 202 at the direction of a user of the wireless station 202, byvirtue of the configuration of string utilization application 210, or inresponse to the acquisition of content by the wireless station 202 fromthe content datastore 244 (acquisition of content from the contentdatastore 244 is discussed in detail below). For example, a user mayconfigure a wireless station to play an audio file when in proximity toan SBS that is broadcasting a network information string that includesthe word “coffee.” The string utilization application 210 may alsoacquire content (for example, a coupon for a pastry) in response toreceipt of a network information string from a first SBS that includesthe word “coffee,” wherein the coupon is presented when the wirelessstation receives a network information string (for example, “helen'scakes”) from a second SBS.

Content Acquisition

FIG. 3 is a block diagram illustrating the acquisition of contentassociated with a network information string according to an embodiment.

A wireless station 202, such as for example and without limitation aWi-Fi enabled device, comprises a transceiver 204, a processor 206, amemory 208, a wireless station application 212 and a display 214. Thewireless station 202 also operates an instance of string utilizationapplication 210. The wireless station application 212 providesinstructions to the processor 206 of the wireless station 202 to enablethe wireless station 202 to interact with the SBS 220 as is known in theart.

In an embodiment, an SBS 220 comprises a transceiver 222, a processor224, a memory 226, and SBS application 228. The SBS 220 also operates aninstance of string utilization application 210. The SBS 228 providesinstructions to the processor 224 of the SBS 220 to at least enable theSBS 220 to transmit beacon message 230.

In an embodiment, the SBS 220 broadcasts a beacon message 230 thatincludes a network information string that is associated with contentstored on the information string server 240. The network informationstring may be associated with content stored in a record 246 or 248 heldon content data store 244. The beacon message 230 may also include theMAC address of the SBS 220. In an embodiment, the SBS 220 provideswireless stations that associate with SBS 220 access to a network (notillustrated). In another embodiment, the SBS 220 is configured tobroadcast beacon message 230 but is not configured to provide networkaccess. In another embodiment, the SBS 220 not capable of providingconnectivity to a network.

A wireless station 202 is configured with a string utilizationapplication 210 to be executed by processor 206. By way of illustrationand not by way of limitation, the wireless station 202 may be a cellphone, a smart phone, a laptop computer, a vending machine or a cashregister.

The wireless station 202 may receive one or more beacon messages,including beacon message 230. In an embodiment, the string utilizationapplication 210 examines the network identifier of each beacon messageto determine if the network identifier contains a network informationstring included on a network information string list stored in a memoryaccessible to the wireless station 202, such as memory 208. When thestring utilization application 210 receives a listed network informationstring, the string utilization application 210 may check a memoryaccessible to the wireless station 202, such as memory 208, for contentthat is associated with the network information string. If the contentis not found in the memory accessible to the wireless station 202, thewireless station 202 may send a content request message 302 thatincludes the network information string to the information string server240 via link 216.

Alternatively, the string utilization application 210 passes the networkidentifier from each beacon message to the information string server 240for inspection without first examining the network information string.The information string server 240 examines the network identifier ofeach beacon message to determine if the network identifier contains anetwork information string associated with content stored in a datastored device accessible to information string server 240, such ascontent datastore 244.

As previously described, the network information string may include allor a portion of the network identifier (e.g., the SSID) that isbroadcast by the string broadcast station 220. For example, a coffeeshop chain may assign the SSIDs joesjava1, joesjava2 . . . joesjava[n]to its “n” shops. It may register the network information string“joesjava” to provide the same message to all of its patrons regardlessof which shop a patron is visiting. It may also register joesjava[n] inassociation with string broadcast station MAC addresses to providemessages on a per-shop basis.

In another embodiment, the acquisition of content is based at least inpart on the MAC address of the string broadcast station 220 that isincluded in the beacon message 230. In this embodiment, the MAC addressmay be associated with the network information string and with thecontent on the content datastore 244. The MAC address may be used toacquire content that is specific to a particular venue at which the SBS220 is located.

The content request message 302 may also include credentials of the userof the wireless station 202. The credentials are evaluated by theinformation string server 240 prior to responding to a request to obtaincontent from the information string server. For example, the requestormay be required to first obtain a user ID and password from theinformation string server or from an authentication server utilized bythe information string server. In an embodiment, the string utilizationapplication 210 operating on the wireless station 202 may be configuredto present the credentials required to access the information stringserver 240.

In another embodiment, the user of the wireless station 202 mayestablish a session of a fixed time period with the information stringserver 240 by presenting the required credentials to the informationstring server 240.

The information string server 240 responds by sending a content responsemessage 304 to the wireless station 202 via the link 216. By way ofillustration and not by way of limitation, the additional content mayinclude coupons, announcements, menus, news alerts, photos, directionsor links to additional content on other servers. As illustrated in FIG.3, the content datastore 232 is physically separate from the informationstring server 240. In this configuration, the content datastore 244 maybe located on a server that is accessible to the information stringserver 240 via a link 242 and to the wireless station 202 via the link216. In another embodiment, the content datastore 244 is a component ofthe information string server 240 and the content is served by theinformation string server 240 to the wireless station 202 via the link216.

The wireless station 202 communicates with the information string server240 and receives content from the content datastore 232 via acommunication link 216. The link 216 may be a wired link, a wirelesslink that is provided via a cellular network or a wireless link that isprovided over a variety of wireless protocols. Alternatively, the link216 may be provided wirelessly through a gateway (not illustrated) thatconnects a wireless network to a wired network such as the Internet. Thewireless portion of the link may be provided through string broadcaststation 220 or through another string broadcast station (notillustrated).

Requests for content may be logged in the log datastore 250. The loggeddata may include identifying information of the wireless station 202,identifying information of the user of the wireless station 202, thenetwork information string associated with the requested content, thetime when the request for content was made, and the location of thewireless station when the request for content was made. The logged datacaptured in log datastore 250 may be used to identify user preferences,determine the response of the user of the wireless station 202 to thecontent associated with the network information string, and measure theinterest of the user of the wireless station 202 in types of content.

Embodiments hereof allow a message to be addressed to any wirelessstation that enters the range of a beacon signal sent by an SBS. Cellphones, smart phones, laptop computers, automated software, vendingmachines and cash registers can perform the functions using the systemof the invention. The messages may convey marketing information, publicservice information, traffic information, instructions for persons withdisabilities, sports scores, weather information, time schedules, andemergency instructions among other information. The messages may bedisplayed as text, images or audio or a combination of the same.

Listener Module

FIG. 4 is a block diagram illustrating operations performed by alistener module according to an embodiment.

Wireless listener module A and B (elements 402 and 406) are configuredto listen for beacon messages 416 transmitted by string broadcaststations, such as SBS A, SBS B and SBS C (elements 410, 412 and 414). Inan embodiment, an SBS beacon message 416 comprises a network informationstring. A wireless listener module (elements 402 and 406) operating astring utilization application (element 404) receives one or more beaconmessages 416 and obtains the network information string from eachreceived beacon message. The wireless listener modules (elements 402 and406) also receive a probe message 422 from a wireless station 202. Theprobe message includes the media access controller (MAC) address of thewireless station 202. Wireless station 202 operates string utilizationapplication 210. In another embodiment, wireless listener module 402also receives probe message 444 from wireless station 442. The probemessage 444 includes the media access controller (MAC) address of thewireless station 442. Wireless station 442 does not operate an instanceof the string utilization application 210. Similarly, wireless listenermodule 404 also receives probe message 448 from wireless station 446.The probe message includes the MAC address of the wireless station 446.Wireless station 446 also does not operate an instance of the stringutilization application 210. Thus, a wireless listener module receivesprobe and beacon messages from wireless stations and SBSs that arewithin range of the wireless listener module.

In an embodiment, a wireless listener module, such as module A and B,may also be configured to operate as an SBS and broadcast an SBS beaconmessage that comprises a network information string.

A wireless listener module, such as wireless listener module A, 402associates the MAC address of the wireless station 202, the MAC addressof wireless station 442, the MAC address of wireless station 444 and theMAC address of listener module A with the network information stringsreceived from each beacon message 416 and sends the information stringsand the MAC addresses to a list data server 430 for storage in alistener datastore 432. The wireless listener module A 402 may alsoprovide a timestamp that indicates when the wireless station 202 wasproximate to the listener module A 402.

As illustrated in FIG. 4, wireless listener module A 402 connects to thelist data server 430 via a link 420 and wireless listener module B 406connects to list data server 430 via link 422. The links 420 and 422 maybe wireless links, such as via a wireless LAN or a wireless telephonenetwork, or may be a wired link, such as via DSL line, a cable network,or a fiber network. In another embodiment, wireless listener modules A402 and B 406 communicate with each other and other wireless listenermodules via a mesh network (not illustrated).

Using an instance of the string utilization application 210, thewireless station 202 may send a string data request message 450 for alist of network information strings proximate to its current locationfrom the list server that have been reported by one or more listenermodules, such as wireless listener module A 402, that have also detectedthe probe message and the MAC address of the wireless station 202. Thestring data request message 450 includes the MAC address of the wirelessstation 202. The list server 440 may respond to the string data requestmessage by acquiring a list of network information strings associatedwith the MAC address of the wireless station 202 from the listenerdatastore 432 and sending the list to the wireless station 202 in astring data response message.

In an embodiment, a wireless listener module, such as wireless listenermodule A 402, may listen for probe messages periodically. The time ofreceipt of a probe message 422 is captured by a time stamp. When awireless station moves out of range of the wireless listener module A402, the elapsed time between a current time and the time indicated by alast time stamp will increase. This elapsed time period may be used bythe datastore 442 to measure the age of data relating to a MAC addressand to log data (for example, MAC address and associated networkinformation strings) to the listener datastore 432 or to delete data ofa particular age.

While FIG. 4 illustrates two listener modules A and B, the illustrationis not limiting. Any number of listener modules may be deployed in aphysical space to form a listener network. Because the location of eachlistener module within the listener network is known, the location of awireless station that broadcasts a probe message (without regard towhether the wireless station operates a string utilization application)may be tracked within the listener network. Time stamping of the receiptof probe messages by each listener module within the listener networkallows the presence, path, time at location, number of visits to alocation, and other metrics to be determined on a per wireless stationbasis. Additionally, the tracking data may be used to construct reports.For example, the tracking data may indicate that 3,000 wireless stationpassed by a particular listener module during a single day and that 78%of these also passed by the listener module the previous day. Thetracking data may be of interest to city planners, businesses and publicsafety officials. For example, traffic outside a potential terroristtarget could be monitored to determine if the behavior of a particularwireless station is suspicious.

FIG. 4 illustrates a list data server 430 and a listener datastore 432.In an embodiment, these structures are components of information stringserver 240 (see, FIG. 2).

Commanding Software Applications

FIG. 5A is a block diagram illustrating the operation of a wirelessstation in response to receipt of a network information string accordingto an embodiment. (Note that FIG. 5A illustrates only a limited numberof structural elements for the ease of discussion. See, FIGS. 2 and 3.)In an embodiment, a wireless station 202, such as, for example andwithout limitation a Wi-Fi enabled device, is configured with a stringutilization application (string utilization application) 210 executed byprocessor 206 (not illustrated). By way of illustration and not by wayof limitation, the wireless station 202 may be a cell phone, a smartphone, a laptop computer, a vending machine or a cash register.

The memory 208 and the content datastore 244 may include a list ofnetwork information strings that are associated with command codes,which list is accessible to string utilization application 210. Thewireless station 202 may receive one or more beacon messages, includingbeacon message 230, from the string broadcast station 220. The stringutilization application 210 examines the network identifier (for exampleand not as a limitation, an SSID) of each beacon message. In anembodiment, the string utilization application 210 may determine if thenetwork identifier contains a network information string on the commandcode list stored in memory 208. Alternatively, the string utilizationapplication 210 may forward a received network information string toinformation string server 240 (not illustrated). The string server 240may respond with content that is stored in content datastore 244 thatincludes a command code.

When the string utilization application 210 receives a listed networkinformation string associated with a command code that is stored inmemory 208 or content datastore 244, the string utilization application210 refers the listed command code to a command-responsive application520 or to the operating system 522 of the wireless station. Thecommand-responsive application 520 and the operating system 522 may beconfigured to take an action in response to the receipt of the commandcode. For example, the command-responsive application 520 may be abrowser that is configured to open a particular web page in response toa particular command code. The device operating system 522 may beconfigured to load a command-responsive application 520 from memory orto download a command-responsive application from the Internet. Otheractions may include displaying a reminder message or playing audiocontent.

FIG. 5B is a block diagram illustrating a process for triggering awireless station to take an action according to an embodiment. In anembodiment, the string utilization application 210 is downloaded from adownload/application server 570 to a wireless station 202 that receiveswireless services from a wireless service provider 576. During theinstallation process, the download/application server 570 acquireswireless station information, including its MAC address and a uniquetoken, and user information and stores the station and user informationin a datastore 572. The wireless station 202 may be configured toreceive a notification from the wireless service provider and toinitiate a response based on this notification. In an embodiment, thestring utilization application 210 is configured by a listener serviceprovider 580 to respond to the receipt of the notification in aparticular way.

In an embodiment, the notification service provider 580 monitors one ormore wireless listener modules, such as wireless listener module A 402as illustrated in FIG. 4, via a monitoring server 582. When the presenceof the wireless station 202 is detected in proximity to a particularwireless listener module, the monitoring server 582 may send a messageto the wireless service provider 576 to send a notification to thewireless station 202. The message from the monitoring server 582 to thewireless service provider 576 includes the unique token associated withthe wireless station 202. The notification service provider 576 directsnotification server 578 to send the notification to the wireless station202, based on the unique token sent from the monitoring server. Thereceipt of the notification by the wireless station 202 conveys alocation-relevant instruction to the string utilization application 210operating on the wireless station 202. By way of illustration and not byway of limitation, the instruction may cause the wireless station 202 todownload a coupon for a nearby merchant, render content, operate anapplication, connect to a website, etc.

Messaging Using Network Information Strings

Embodiments are directed to conveying information in a networkidentifier that may be received by wireless stations. The informationmay be unrelated to the operation of the wireless network.

FIG. 6 is a block diagram illustrating a messaging system according toan embodiment.

FIG. 7 is a flow diagram illustrating a process for conveying a messageto a wireless station according to an embodiment.

In an embodiment, an SBS 220 (as described in regards to FIGS. 2 and 3above) operates a string utilization application 210. The stringutilization application 210 receives text input from a user of the SBS220 and generates a network information string that includes the textinput as a text message. By way of illustration and not by way oflimitation, the text input may be user settings, a message log, contactdetails, links to websites, links to email addresses, links to phonenumbers, advertisements, coupons, and offers among others. The generatednetwork information string may then be broadcast by the SBS 220 in thebeacon message 230 using the SBS application 228.

A wireless station A 616 (as described in regards to FIGS. 2 and 3above) also operates an instance of string utilization application 210.Using the wireless station application 212, the processor 206 and thetransceiver 204, the wireless station A 616 receives the generatednetwork information string from the SBS 220. The instance of the stringutilization application 210 operating on the wireless station A 616recognizes the network information string as encoded with a message (asfurther described below) and extracts the message from the networkinformation string. The message may then be rendered on the display 214.

As illustrated in FIG. 6, a second wireless station B 618 also operatesan instance of string utilization application 210. The wireless stationB 618 also receives the generated network information string from theSBS 220. The instance of the string utilization application 210operating on the wireless station B 618 extracts the message from thenetwork information string. The message may then be displayed on thedisplay 214 operating on wireless station B 618.

In an embodiment, the wireless station application 212 operating onwireless station A 616 may further enable the wireless station A 616 tooperate as an SBS. In this embodiment, the instance of the stringutilization application 210 operating on wireless station A 616 may beused to rebroadcast (or “forward”) the generated network informationstring to the wireless station B 618. Thus, the wireless station B 618,which may be out of range of the SBS 220, may still receive thegenerated network information string. The instance of the stringutilization application 210 operating on the wireless station B 618 maythen extract the message from the forwarded network information string.The message may then be displayed on the display 214 operating onwireless station B 618.

As described above, the string utilization application 210 enables theSBS 220 to receive text from a user and to generate a networkinformation string that incorporates the received text as a message. Thestring utilization application 210 also enables the wireless stations616 and 618 to determine that a network information string includes textand to parse the network information string to obtain the message.

In an embodiment, a probe message from a wireless station is used toconvey a message. In this embodiment, a wireless station A 616 isconfigured to operate in the absence of an SBS. The string utilizationapplication 210 operating on the wireless station A 616 receives textinput from a user of the wireless station A 616 and generates a networkinformation string that includes the text input as a text message. Byway of illustration and not by way of limitation, the text input may beuser settings, a message log, contact details, links to websites, linksto email addresses, links to phone numbers, advertisements, coupons, andoffers among others. The generated network information string may thenbe broadcast by the wireless station 616 A in a probe message (notillustrated) using the wireless station application 212. The probemessage may be received by another a wireless station, such as wirelessstation B 618, that is also configured to operate in the absence of anSBS. In this embodiment, a string broadcast station is not required. Inthis embodiment, among other functions and not by way of limitation, theembodiment may serve to facilitate such tasks as text messaging.

In an embodiment, the network information string that is generated bythe string utilization application 210 operating on the SBS 220 conformsto a structure that is recognized by an instance of the stringutilization application 210 operating on a wireless station A 616. Anymessage structure may be adapted for use with the string utilizationapplication 210. The following structures and those shown in Tables 1, 2and 3, are provided as an illustrative example of a messaging structureand are not meant to be limiting.

In an embodiment, messages may be identified by type as set forth inTable 1.

TABLE 1 MESSAGE TYPES Message Type Code Relay Message Local L N MessageRegional R Y IM Here I N Emergency Help E N Deal Coupon C N Menu M NShop Info S n Non Radius network information W N strings GatheringDetails D Y City Assist (streets/busses/etc.) H N Sponsored Local Tourinfo T N

In an embodiment, the string utilization application 210 will generate anetwork information string containing a text message using messagingformatting rules as set forth in Tables 2 and 3. The message formattingrules are also recognized by the instance of the string utilizationapplication 210 running on a wireless station, such as wireless stationA 616.

TABLE 2 Format Coding Meaning Type MESSAGE Format: 123 = Message IDalphanumeric 0-Z 123D1A > 24 more (10 + 26 + 26 for each bytes . . .character) D = Message Type L, R, I, E, C, M, S, W, D, etc. 1 = MessagePart parts 0-4, Z (signifying last Code part) (*36 possible) A = MessageRelay alphanumeric (26 + 10), 0-Z Number >Code End Marker

FIG. 7 is a flow diagram illustrating a process for conveying a messageto a wireless station according to an embodiment.

A string utilization application 210 operating on an SBS, such as SBS220 illustrated in FIG. 6, receives text from a user. (Block 702.) Thestring utilization application 210 causes the SBS to assign a uniquemessage ID to the message. (Block 704.) In the embodiment illustrated inTable 2, the message ID is three bytes. However, this is not meant as alimitation. A message code is assigned to the message (as, for example,a code selected from Table 1). (Block 706.)

The message is divided into “N” parts or segments. (Block 712.) In anembodiment, a maximum number of message parts is established, such assix parts, and/or a maximum number of characters may be specified, suchas 144 characters.

The part number is sent to “1.” (Block 714). A network informationstring is generated for part number 1 (Block 716.) The generated networkinformation string is broadcast by the SBS in a beacon message. (Block718.)

A determination is made whether the last message part broadcasted by theSBS was message part “N.” (Block 720). If the last message partbroadcasted by the SBS was message part “N” (that is, the answer toBlock 720 is “YES”), the process terminates. (Block 724.) If the lastmessage broadcasted by the SBS is not message part “N” (that is, theanswer to Block 720 is “NO”), the part number is incremented by “1”(Block 722) and the process returns to Block 716 where a networkinformation string is generated for the next message part. The nextmessage part is broadcast by the SBS in a beacon message. (Block 718.)The process again checks to determine whether the last message partbroadcasted by the SBS was message part “N.” (Block 720) The processcontinues until all “N” message parts have been sent.

The string utilization application 210 operating on the SBS may beconfigured to establish the number of times a message part is broadcastand the time between broadcasts.

In an embodiment, the string utilization application 210 operating onthe wireless station 202 will continuously monitor all networkinformation strings received by the wireless station to identifygenerated network information strings. A generated network informationstring with the same message ID (for example, the first three bytes ofthe generated network information string) will be identified as part ofa single message. The string utilization application 210 uses themessage part code to assemble the message parts in the proper orderregardless of the order in which they are received. In an embodiment, amaximum number of message parts is established, such as six parts,and/or a maximum number of characters may be specified, such as 144characters.

The string utilization application 210 will only display messages of themessage types that match the message type settings in the applicationview settings. In an embodiment, a user of the string utilizationapplication 210 may specify the types of messages that may be receivedby the string utilization application 210.

In an embodiment, a message format includes a message relay numbercharacter. When a message is received by the string utilizationapplication 210 operating on wireless station 202 and the message typeis Regional or Gathering, a properly configured wireless station may usethe string utilization application 210 to relay or rebroadcast themessage on to others. The string utilization application 210 maintainsthe same unique message coding for the message. However, the stringutilization application 210 will increment the message relay number tothe next increment before rebroadcasting it.

In an embodiment, the string utilization application 210 may limit thenumber of rebroadcasts to a predetermined number, such as 36. When therelay code reaches the predetermined number, the message will bedisplayed in the application, but not relayed.

In another embodiment, the string utilization application 210 isconfigured such that the wireless station will only display or relay anyone message ID once regardless of the relay number. This preventsmessages relaying back and forth between devices.

The string utilization application 210 operating on a receiving wirelessstation may be configured to establish the number of times a messagepart is re-broadcast and the time between re-broadcasts.

In an embodiment, the string utilization application 210 may beconfigured to allow a wireless station to be instructed by a user toforward a message as new. If the message is sent as new, the samemessage and message ID may be used so that other wireless stationsoperating the string utilization application 210 that have alreadyprocessed the message may continue to ignore it. However, the “new”message will be sent with a message relay number of 1 thereby allowingthe message to be relayed up to the predetermined number of relays anddisplayed on wireless stations that have not processed the message.

In an embodiment, the string utilization application 210 may beconfigured to allow the wireless station 202 to automatically forwardmessages that have not exceeded the predetermined number of relays. Thisfunction is intended to enable a local area to spread messages among abroad range of devices beyond the signal range of a single SBS. Thestring utilization application 210 may also be configured to turn offautomatic forwarding.

In an embodiment, a message type “IM-HERE” has a unique messagestructure as set forth in Table 3.

TABLE 3 IM HERE FORMAT: 1: Intl Phone Number > Initial > 15 CharactersName . . . 2: Intl Phone Number > 123D1A > (Info Message Identifier) 3:123I1Z > (Multipart message with entered IM Here info to share, alwaysmessage code “I”, always repeat code Z) 1: 13 digit No relay, phoneFirst Initial and last name phone number number is ID key (the phonenumber is unique, names may not be.) 1: 1 Character First Name initialThe number and name Initial > Last and last name to go establish the IMName with the number Here listing 2: Phone # > Establishes this Uniquemessage contact belongs ID in standard to the following format messageID 3: Standard Standard message 3: can contain any information messageformat but “I” message the user entered into the with the MR ID typeallows it only IM Here setup form and indicated above to be displayed indisplayed on this same form the IM Here form in the receivingapplication

In this embodiment, the “IM-Here” message may include multiple parts andis non-relay only. The string utilization application 210 operating on awireless station may be configured to display a first part of an IM-Heremessage and to permit viewing of other parts of the IM-Here message inresponse to user selection of an “additional details” function.

In an embodiment, the IM-Here message format uses a phone number ininternational form as a unique message identifier. In this embodiment,the phone number and a first initial and a last name of the sender aredisplayed on the wireless station when the IM-Here message is receivedby the string utilization application 210.

In another embodiment, the IM-Here message broadcasts the phone number,the first initial and last name of the user. This will be very useful inconferences, meetings, or any other events where the user would like topresent a virtual, live business card to all in range of the SBS 220. Byway of illustration and not by way of limitation, some phone serviceproviders provide free phone numbers in most areas which permit theforwarding of text and calls to a selected phone. A user may set upIM-Here by entering a phone number and the name to be included in theIM-Here message. Optionally, the form as set up may also includeoptional fields for: LinkedIn, Facebook, email address, IM ID, URL1,URL2, etc. These data may be stored in a datastore.

The string utilization application 210 may be configured to broadcast anIM-Here formatted network information string message once every 30seconds. When a wireless station receives an IM Here message, thewireless station will register with the datastore and store the messagedetails so the user can see all IM-Here transmissions in the immediatearea (in the meeting, conference, etc.).

The user of the wireless station may choose to send a normal phone textmessage to the user via the phone number in the IM-Here message (privatemessage) or even call them directly. The user of the wireless stationmay also click on the LinkedIn or Facebook links (if the sender hasincluded them). If the receiver has a Mobile Data connection, the usermay go directly to LinkedIn/FaceBook/Email/etc.

In an embodiment, a string utilization application 210 is operated on acomputing device, such as a laptop computer or tablet. For example, thestring utilization application 210 is operated on a computing device ata registration desk for a meeting or conference. In this embodiment, thecomputing device collects IM-Here notifications from users of wirelessstations as a form of automatic registration. The computing device mayalso be used to broadcast messages to registrants or may use the IM-Hereinformation to send emails or text messages directly to certainregistrants. Similarly, the IM-Here message structure may be used inother situations where broadcast as well as private messages are needed.

In an embodiment, the message code may affect the behavior on thewireless station that receives a particular message. By way ofillustration and not by way of limitation, a message that is identifiedas an emergency message may be displayed immediately on the receivingwireless station. Additionally, a tone may be sounded or a vibrationfunction of the wireless station activated to announce the receipt of anemergency message.

The string utilization application 210 may be configured to allow awireless station to manage messages according to user preferences. Forexample, the wireless station may be configured to display messages whenthey are received or periodically. Messages may be grouped for displayby message codes.

The string utilization application 210 may be configured to allow a userof a wireless station to set other optional settings, including logs,links to websites, automatic broadcasts, and other features.

Embodiments hereof may be used in any number of applications. By way ofillustration and not by way of limitation, applications may include:

-   -   sending regular updates from machines;    -   sending notes from stores, offices, restaurants to communicate        with people during emergency situations where electricity and        internet are not available;    -   assisting those with limited communication ability and enabling        communication to those in the immediate area;    -   assisting people calling for help and broadcast to only those in        the immediate area and therefore most in a position to offer        help;    -   providing communication between passengers in separate cars or        houses nearby.

In an embodiment, messages may be collected at certain points and movedonto the Internet, where they may be accessed or rebroadcasted in otherlocations. Additionally, messages may be logged at certain locations foraccess by others who return to that location using an internetconnection.

Contributions to Countering Terrorism

As defined in 18 U.S.C. 2331, terrorism includes “activities that—(A)involve violent acts or acts dangerous to human life that are aviolation of the criminal laws of the United States or of any State, orthat would be a criminal violation if committed within the jurisdictionof the United States or of any State; [and] (B) appear to beintended—(i) to intimidate or coerce a civilian population; (ii) toinfluence the policy of a government by intimidation or coercion; or(iii) to affect the conduct of a government by assassination orkidnapping . . . .”

Embodiments herein materially contribute to countering terrorism byproviding an efficient and cost effective tool to disseminate emergencyinformation to individuals who may be directly affected by terroristactivity.

In an embodiment, a law enforcement agency registers a networkinformation string with information string server 240. For example, anemergency information string may be in the form: “EMERGENCY—YOU MAY BEIN DANGER—FURTHER INFORMATION TO FOLLOW.” In an embodiment, theinformation string server 240 may be configured to reserve networkinformation strings that are indicative of a threat to public safety forregistration by law enforcement agencies, government security agenciesand other organizations that are responsible for protecting the public.

A law enforcement officer may operate a computing device, such as asmart phone, to send content for registration with the informationstring server 240 that includes an emergency alert message. The alertmessage is associated with a registered emergency information string. Inan embodiment, the device that is used to communicate the emergencycontent message is verified as having been originated by an authorizedsource by requiring the presentation of credentials. The computingdevice of the law enforcement office may also notify the informationstring server 240 of network name identifiers received by the computingdevice from probe messages sent by wireless stations in proximity to thecomputing device. The information string server 240 may then push thealert message to the wireless stations identified by the computingdevice.

In another embodiment, the law enforcement officer may operate an SBS220 that sends the emergency alert message as a structured message asdescribed in reference to FIG. 7. The emergency alert message may thenbe forwarded by receiving network stations to other network stations aspreviously described. This may include communicating with the listserver to confirm and communicate information about the message.Alternatively, receiving wireless stations may interpret and/orauthenticate the received messages without requiring a connection to thestring server. Using this functionality, receiving wireless stations mayrelay messages even when all cellular and internet connections are nolonger active or are otherwise congested.

In other embodiments, the receipt of the registered emergencyinformation string or the emergency alert message by the wirelessstation may trigger the wireless station to take an action. The actiontaken may depend on the content of the emergency information string orthe emergency alert message. In these embodiments, the emergencyinformation string or the emergency alert message may trigger theexecution of an application running on the wireless station, whichapplication determines the behavior of the wireless station.

For example, when the wireless station is a telephone handset, thereceipt of the emergency alert message or the emergency informationstring may limit phone calls to a fixed duration or frequency (e.g., oneminute duration or one call in a five minute interval). Text messagesmay be limited to certain destinations or throttled to a fixed number oftext messages. These measures can immediately mitigate networkcongestion and allow emergency services to operate more effectively andmaintain their ability to communicate to the public.

In yet another embodiment, the receipt of the emergency alert message oremergency information string by the wireless station may cause thewireless station to emit an emergency sound to alert the user of theemergency or give audio instructions to the user over the speakerphone.

In still another embodiment, the receipt of the emergency alert messageor emergency information string by the wireless station may cause thewireless station to emit a high level audio signal, which may beultrasonic, that may be use to locate victims of a terrorist attack orother emergency event. In another embodiment, an first emergencyinformation string and/or message may be issued to warn of an attack orof an imminent event that poses a risk to public safety and a second(different) emergency information string and/or message may be issuedafter the occurrence of an event to help locate and/or assist victims ofthe event.

A third string and/or message may be issued to return wireless stationsto normal operation.

In another embodiment, listener devices as described in reference toFIG. 4 may receive the registered network information string from thebeacon message broadcast by the SBS 220 and operated by the lawenforcement officer and the MAC addresses of wireless stations inproximity thereto. This information may be provided to a list server 430and stored in list datastore 432. In an embodiment, in response to theemergency network information string, the list server 430 may beconfigured to push an emergency message to the wireless stationsproximate to the SBS 220 operated by the law enforcement officer.

In another embodiment, the list server 430 also receives networkinformation strings broadcast by other SBSs operated by other entitiesproximate to the SBS 220 operated by the law enforcement officer. Inthis embodiment, the network information strings broadcast by theseother entities may be temporarily associated with the emergency alertmessage.

These and other embodiments materially contribute to counteringterrorism by providing anti-terrorist agents a tool to disseminatelocalized information regarding an imminent or presently occurringterrorist attack to the public. The information may be used by thepublic in real time to avoid exposure to such an attack.

A wireless device suitable for use with the various embodiments isillustrated in FIG. 8.

A wireless device 800 may include a processor 801 coupled to an internalmemory 802, to a display 803 and to a SIMM 821 or similar removablememory unit. Additionally, the wireless station 800 may optionally havea cellular antenna 804 for sending and receiving electromagneticradiation that is connected to a cellular transceiver 805 coupled to theprocessor 801. In some implementations, the transceiver 805 and portionsof the processor 801 and memory 802 may be used for multi-networkcommunications. The wireless device 800 may also include a key pad 806or miniature keyboard and menu selection buttons or rocker switches 807for receiving user inputs. The wireless device 800 may also include aGPS navigation device 820 coupled to the processor and used to determinethe location coordinates of the wireless device 800. Additionally, thedisplay 803 may be a touch-sensitive device that may be configured toreceive user inputs.

A wireless transceiver 830 provides wireless communications via wirelessantenna 832. By way of illustration and not by way of limitation, thewireless transceiver may be compliant with 802.11x standards.

The processor 801 may be any programmable microprocessor, microcomputeror multiple processor chip or chips that can be configured by softwareinstructions (applications) to perform a variety of functions, includingthe functions of the various embodiments described herein. In anembodiment, the wireless device 800 may include multiple processors 801,such as one processor dedicated to cellular and/or wirelesscommunication functions and one processor dedicated to running otherapplications.

Typically, software applications may be stored in the internal memory802 before they are accessed and loaded into the processor 801. Forexample, the internal memory 802 may include string utilizationapplication 824. In an embodiment, the processor 801 may include or haveaccess to an internal memory 802 sufficient to store the applicationsoftware instructions. The memory may also include an operating system822.

The internal memory of the processor may include a secure memory (notillustrated) which is not directly accessible by users or applicationsand that is capable of recording MDINs and SIMM IDs as described in thevarious embodiments. As part of the processor, such a secure memory maynot be replaced or accessed without damaging or replacing the processor.

Additionally, the internal memory 802 may be a volatile or nonvolatilememory, such as flash memory, or a mixture of both. For the purposes ofthis description, a general reference to memory refers to all memoryaccessible by the processor 801, including internal memory 802,removable memory plugged into the computing device, and memory withinthe processor 801 itself, including the secure memory.

In an embodiment, additional memory chips (e.g., a Secure Data (SD)card) may be plugged into the wireless device 800 and coupled to theprocessor 801.

FIG. 9 is a system block diagram of a computing device suitable for usewith various embodiments. A typical computing device 1000 may include aprocessor 1001 coupled to internal memory 1002, to a display 1003, andto a speaker 1008. Additionally, the computing device 1000 will includean antenna 1004 for sending and receiving electromagnetic radiationand/or data messages to and from the Internet and/or other networks. Thevarious embodiments may also be implemented on any of a variety ofcommercially available server devices, such as the server 1100illustrated in FIG. 10. Such a server 1100 typically includes aprocessor 1101 coupled to volatile memory 1102 and a large capacitynonvolatile memory, such as a disk drive 1103. The server 1100 may alsoinclude a floppy disc drive, compact disc (CD) or DVD disc drive 1104coupled to the processor 1101. The server 1100 may also include networkaccess ports 1106 coupled to the processor 1101 for establishing dataconnections with a network 1112, such as a local area network coupled toother broadcast system computers and servers. Servers 1100 may alsoinclude operator interfaces, such as a keyboard 1108, pointer device(e.g., a computer mouse 1110), and a display 1109.

The processors 1001, 1101 may be any programmable microprocessor,microcomputer or multiple processor chip or chips that can be configuredby software instructions (applications) to perform a variety offunctions, including the functions of the various embodiments describedbelow. In some mobile receiver devices, multiple processors may beprovided, such as one processor dedicated to wireless communicationfunctions and one processor dedicated to running other applications.Typically, software applications may be stored in the internal memory1002, 1102, and 1103 before they are accessed and loaded into theprocessor 1001, 1101. The processor 1001, 1101 may include internalmemory sufficient to store the application software instructions.

The foregoing method descriptions and the process flow diagrams areprovided merely as illustrative examples and are not intended to requireor imply that the steps of the various embodiments must be performed inthe order presented. As will be appreciated by one of skill in the artthe steps in the foregoing embodiments may be performed in any order.Words such as “then,” “next,” etc. are not intended to limit the orderof the steps; these words are simply used to guide the reader throughthe description of the methods. Although process flow diagrams maydescribe the operations as a sequential process, many of the operationscan be performed in parallel or concurrently. In addition, the order ofthe operations may be re-arranged. A process may correspond to a method,a function, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination may correspond to a return ofthe function to the calling function or the main function.

The various illustrative logical blocks, modules, circuits, andalgorithm steps described in connection with the embodiments disclosedherein may be implemented as electronic hardware, computer software, orcombinations of both. To clearly illustrate this interchangeability ofhardware and software, various illustrative components, blocks, modules,circuits, and steps have been described above generally in terms oftheir functionality. Whether such functionality is implemented ashardware or software depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentinvention.

Embodiments implemented in computer software may be implemented insoftware, firmware, middleware, microcode, hardware descriptionlanguages, or any combination thereof. A code segment ormachine-executable instructions may represent a procedure, a function, asubprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, etc. may be passed, forwarded, or transmitted via anysuitable means including memory sharing, message passing, token passing,network transmission, etc.

When implemented in software, the functions may be stored as one or moreinstructions or code on a non-transitory computer-readable orprocessor-readable storage medium. The steps of a method or algorithmdisclosed herein may be embodied in a processor-executable softwaremodule which may reside on a computer-readable or processor-readablestorage medium. A non-transitory computer-readable or processor-readablemedia includes both computer storage media and tangible storage mediathat facilitate transfer of a computer program from one place toanother. A non-transitory processor-readable storage media may be anyavailable media that may be accessed by a computer. By way of example,and not limitation, such non-transitory processor-readable media maycomprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage,magnetic disk storage or other magnetic storage devices, or any othertangible storage medium that may be used to store desired program codein the form of instructions or data structures and that may be accessedby a computer or processor. Disk and disc, as used herein, includecompact disc (CD), laser disc, optical disc, digital versatile disc(DVD), floppy disk, and blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media. Additionally, the operations of a method oralgorithm may reside as one or any combination or set of codes and/orinstructions on a non-transitory processor-readable medium and/orcomputer-readable medium, which may be incorporated into a computerprogram product.

When implemented in hardware, the functionality may be implementedwithin circuitry of a wireless signal processing circuit that may besuitable for use in a wireless receiver or mobile device. Such awireless signal processing circuit may include circuits foraccomplishing the signal measuring and calculating steps described inthe various embodiments.

The hardware used to implement the various illustrative logics, logicalblocks, modules, and circuits described in connection with the aspectsdisclosed herein may be implemented or performed with a general purposeprocessor, a digital signal processor (DSP), an application specificintegrated circuit (ASIC), a field programmable gate array (FPGA) orother programmable logic device, discrete gate or transistor logic,discrete hardware components, or any combination thereof designed toperform the functions described herein. A general-purpose processor maybe a microprocessor, but, in the alternative, the processor may be anyconventional processor, controller, microcontroller, or state machine. Aprocessor may also be implemented as a combination of computing devices,e.g., a combination of a DSP and a microprocessor, a plurality ofmicroprocessors, one or more microprocessors in conjunction with a DSPcore, or any other such configuration. Alternatively, some steps ormethods may be performed by circuitry that is specific to a givenfunction.

Any reference to claim elements in the singular, for example, using thearticles “a,” “an” or “the,” is not to be construed as limiting theelement to the singular.

The preceding description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the following claims and theprinciples and novel features disclosed herein.

1. A method for managing emergency communications over a wirelessnetwork comprising: receiving at an information string server device arequest to associate an emergency alert message with a registeredemergency information string, wherein the registered emergencyinformation string is selected from the group consisting of at least aportion of a network name identifier and at least a portion of a mediaaccess control (MAC) address and wherein the request comprisesauthentication information; determining by the information string serverdevice from the authentication information whether the request toassociate the registered emergency alert message with the emergencyinformation string is authorized; and storing by the information stringserver device the emergency alert message in association with theregistered emergency information string in a record of an informationstring datastore when the request to store content is authorized.
 2. Themethod of claim 1, wherein the authentication information is selectedfrom the group consisting of a password, a personal identificationnumber, a badge number, and a key.
 3. The method of claim 1, wherein thenetwork name identifier comprises at least a portion of a service setidentifier.
 4. The method of claim 1, wherein the emergency alertmessage comprises a text message and an audio message.
 5. The method ofclaim 1 further comprising: broadcasting by a string broadcast stationthe registered emergency information string in a beacon message;receiving by a listener module the beacon message; receiving by thelistener module probe messages broadcast by one or more wirelessstations proximate to the listener module, wherein the listener modulecomprises a MAC address of the listener module and wherein a probemessage comprises a MAC address of the wireless station from which theprobe message originated; and sending by the listener module the MACaddress of the listener module, the registered emergency informationstring and the MAC address of the one or more wireless stations to alist server device.
 6. The method of claim 5 further comprising:requesting by one of the one or more wireless stations a list from thelist server device of listed information strings associated with the MACaddress of the requesting wireless station; determining by the onewireless station whether the list includes the registered emergencyinformation string; requesting by the one wireless station the emergencyalert message associated with the registered emergency informationstring when the list includes the registered emergency informationstring; and displaying by the one wireless station the emergency alertmessage.
 7. The method of claim 1 further comprising: broadcasting by astring broadcast station the registered emergency information string ina beacon message; receiving by a wireless station the beacon messagebroadcast by the string broadcast station; obtaining by the wirelessstation the registered emergency information string from the beaconmessage; requesting by the wireless station the emergency alert messageassociated with the registered emergency information string from thestorage device; and displaying by the wireless station the emergencyalert message in response to the request.
 8. The method of claim 7,wherein the wireless station is selected from the group consisting of asmartphone, a tablet, a laptop computer, a Wi-Fi enabled device, aBluetooth enabled device, and a Zigbee enabled device.
 9. The method ofclaim 7, wherein the wireless station and the string broadcast stationcommunicate over a wireless network selected from the group consistingof a Wi-Fi network, an RFID network, a Zigbee network, a Bluetoothnetwork and a 3G/4G cellular network.
 10. The method of claim 7 furthercomprising taking by the wireless station one or more actions when thewireless station obtains the registered emergency information stringfrom the beacon message.
 11. The method of claim 10, wherein the one ormore actions are selected from the group consisting of executing anapplication, playing by the wireless station an emergency audio signal,playing by the wireless station an audio message over a speakerphone,controlling by the wireless station a length or frequency of telephonecalls, controlling by the wireless station the frequency or number oftext messages, broadcasting an audible location signal, and broadcastingan ultrasonic location signal.
 12. A system for managing emergencycommunications over a wireless network comprising: an information stringserver device comprising a first processor configured with softwareinstructions to cause the information string server device to performoperations comprising: receiving a request to associate an emergencyalert message with a registered emergency information string, whereinthe registered emergency information string is selected from the groupconsisting of at least a portion of a network name identifier and atleast a portion of a media access control address and wherein therequest comprises authentication information; determining from theauthentication information whether the request to associate theemergency alert message with the registered emergency information stringis authorized; and storing the emergency alert message in associationwith the registered emergency information string in a first record of aninformation string datastore when the request to store content isauthorized.
 13. The system of claim 12, wherein the authenticationinformation is selected from the group consisting of a password, apersonal identification number, a badge number, and a key.
 14. Thesystem of claim 12, wherein the network name identifier comprises atleast a portion of a service set identifier.
 15. The system of claim 12,wherein the emergency alert message comprises a text message and anaudio message.
 16. The system of claim 12 further comprising: a listenermodule, wherein the listener module comprises a MAC address and a thirdprocessor configured with software instructions that cause the listenermodule to perform operations comprising: receiving a beacon messagebroadcast by the string broadcast station, wherein the beacon messageincludes the registered emergency information string; receiving probemessages broadcast by one or more wireless stations proximate to thelistener module, wherein a probe message comprises a MAC address of thewireless station from which the probe message originated; and sendingthe MAC address of the listener module, the registered emergencyinformation string and the MAC address of the one or more wirelessstations to a list server device.
 17. The system of claim 16 furthercomprising a wireless station comprising a second processor configuredwith software instructions that cause the wireless station to performoperations comprising: requesting a list from the list server device oflisted information strings associated with the MAC address of therequesting wireless station; determining by the wireless station whetherthe list includes the registered emergency information string;requesting by the one wireless station the emergency alert messageassociated with the registered emergency information string when thelist includes the registered emergency information string; anddisplaying by the one wireless station the emergency alert message. 18.The system of claim 12, wherein the first processor is furtherconfigured with software instructions to cause the information stringserver device to perform operations comprising broadcasting by a stringbroadcast station the registered emergency information string in abeacon message, and wherein the system further comprises a wirelessstation comprising a second processor configured with softwareinstructions that cause the wireless station to perform operationscomprising: receiving the beacon message broadcast by the stringbroadcast station; obtaining the registered emergency information stringfrom the beacon message; requesting the emergency alert messageassociated with the registered emergency information string from thestorage device; and displaying the emergency alert message in responseto the request.
 19. The system of claim 18, wherein the wireless stationis selected from the group consisting of a smartphone, a tablet, alaptop computer a Wi-Fi enabled device, a Bluetooth enabled device, anda Zigbee enabled device.
 20. The system of claim 18, wherein thewireless station and the string broadcast station communicate over awireless network selected from the group consisting of a Wi-Fi network,an RFID network, a Zigbee network, a Bluetooth network and a 3G/4Gcellular network.
 21. The system of claim 18, wherein the secondprocessor is further configured with software instructions that causethe wireless station to perform operations comprising taking one or moreactions when the wireless station obtains the registered emergencyinformation string from the beacon message.
 22. The system of claim 21,wherein the one or more actions are selected from the group consistingof executing an application, playing by the wireless station anemergency audio signal, playing by the wireless station an audio messageover a speakerphone, controlling by the wireless station a length orfrequency of telephone calls, controlling by the wireless station thefrequency or number of text messages, broadcasting an audible locationsignal, and broadcasting an ultrasonic location signal.