Processing wireless emergency alert messages with uniform resource locators to reduce cellular network load

ABSTRACT

A method, a mobile device, and a computer-readable medium for accessing target data of a uniform resource locator received in a wireless emergency alert message are disclosed. For example, a method may include a processor for receiving a wireless emergency alert message including a uniform resource locator via a cellular broadcast, determining that a non-cellular access network is available for the mobile device, accessing target data from the uniform resource locator via the non-cellular access network, when the non-cellular access network is available, and presenting the target data on the mobile device.

The present disclosure relates generally to methods, computer-readablemedia and apparatuses for accessing target data of a uniform resourcelocator received in a wireless emergency alert message.

BACKGROUND

The Wireless Emergency Alert (WEA) system is capable of providingmessages indicative of a variety of types of alerts. Via the WEA system,mobile devices can receive messages pertaining to weather conditions,disasters, child abduction America's Missing: Broadcast EmergencyResponse (AMBER) alerts, and any alerts for imminent threats to life orproperty issued by authorized government entities, for example. Due tobroadcast capabilities, bandwidth constraints, and limitations of mobiledevices (e.g., limited number of characters displayable on the mobiledevice), the size of the WEA message may be limited, e.g., to 90characters of alphanumeric text.

SUMMARY

In one example, the present disclosure discloses a method, acomputer-readable medium, and an apparatus for accessing target data ofa uniform resource locator received in a wireless emergency alertmessage. For example, a processor of a mobile device may receive awireless emergency alert message including a uniform resource locatorvia a cellular broadcast, determine that a non-cellular access networkis available for the mobile device, access target data from the uniformresource locator via the non-cellular access network, when thenon-cellular access network is available, and present the target data onthe mobile device.

BRIEF DESCRIPTION OF THE DRAWINGS

The teachings of the present disclosure can be readily understood byconsidering the following detailed description in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates an example system related to the present disclosure;

FIG. 2 illustrates a flowchart of an example method for accessing targetdata of a uniform resource locator received in a wireless emergencyalert message, according to the present disclosure; and

FIG. 3 illustrates a high-level block diagram of a computing devicespecially configured to perform the functions, methods, operations andalgorithms described herein.

To facilitate understanding, identical reference numerals have beenused, where possible, to designate identical elements that are common tothe figures.

DETAILED DESCRIPTION

The present disclosure broadly discloses methods, computer-readablemedia and mobile devices for accessing target data of a uniform resourcelocator received in a wireless emergency alert message. The WirelessEmergency Alert (WEA) system is a set of network components, protocols,and interfaces that enables authorities to send alerts to mobile devicesof a cellular network in a designated alert area. WEA messages, maypertain to such things as geophysical events, such as a landslide,meteorological events, such as windstorms, tornados, hurricanes,tsunamis, lightning storms, thunderstorms, hurricanes, freezing rain,blizzards, fog, etc., child abductions, chemical, biological,radiological, nuclear or explosive (CBRNE) threat or attack, or thelike.

In general, an authorized alert originator, such as a governmentalagency, is responsible for the generation request to broadcast a WEAmessage and submit the request to a cellular network. The request mayinclude a message content for the WEA message and a designation of analert area. The request may also include a duration of time for whichthe alert is applicable and a designation of a category of the alertand/or a specific alert type. For instance, under Federal CommunicationCommission (FCC) guidelines a WEA message (other than a presidentialalert) should include five information elements: an event type, an areaaffected, a recommended action, an expiration time (with time zone), anda sending agency. In addition, in one example, WEA messages may have adesignated maximum size/length of 90 characters of alphanumeric text.For example, 90 characters have been designated as a standard maximumWEA message size by the FCC. In accordance with the present disclosure,and as described in greater detail below, a request to broadcast a WEAmessage may include alternative or additional information for themessage content, e.g., a uniform resource locator (URL).

In one example, after receiving a request to broadcast a WEA message, acellular network may then broadcast the WEA message via wirelessbroadcast transmissions from cell towers covering the alert area, e.g.,the “area affected” in alerting terminology. In one example, users donot subscribe to WEA messages. Instead, WEA message may be delivered toand received by all mobile devices that are capable of receiving WEAmessages within an alert area. In one example, the WEA messages are senton dedicated broadcast channels to all mobile devices in an alert area.This is in contrast to subscription alerts that comprise point-to-pointmessages that can cause network congestion issues. In one example, a WEAmessage may be received by a mobile device, but not presented to theuser based upon a configuration of the mobile device and the category ortype of WEA message. For instance, a user may elect to not receive AMBERalerts at the user's mobile device.

In one example, the present disclosure comprises a mobile devicereceiving a WEA message that is broadcast by a cellular network andwhich includes a uniform resource locator (URL) pointing to additionalinformation. In response to receiving a WEA message that includes a URL,the mobile device may determine whether the mobile device has anon-cellular network connection available (e.g., a wired access networkconnection, such as a local area network (LAN), a digital subscriberline (DSL) connection, a wireless local area network (WLAN) connection,e.g., Institute of Electrical and Electronics Engineers (IEEE) 802.11and/or wireless fidelity (Wi-Fi), and so forth) and connecting to theURL to obtain the additional information, when such a non-cellularnetwork connection is available. The mobile device may then present theadditional information on the mobile device. Notably, the cellularnetwork is well suited to handle the broadcast of WEA messages, sincededicated broadcast resources are utilized. However, if a large numberof mobile devices were to simultaneously attempt to access a URL via thecellular network, the cellular network could be overwhelmed, dependingupon the nature and/or size of the target data, the current network loadin relevant portions of the cellular network, and so forth. Thus, mobiledevices may be configured (e.g., at the operating system or firmwarelevel) to verify that a non-cellular network connection exists beforeattempting to retrieve the additional information from the URL.

In one example, a WEA message may include alert data and a URL pointingto additional information. Thus, in one example, the alert data of theWEA message may be immediately displayed on the mobile device before orsimultaneous with the mobile device determining whether there is anon-cellular connection, accessing the URL, and presenting theadditional information. As such, there is no delay in the display of theinitial WEA message content (e.g., alert data) to the user. Thealphanumeric text of the URL may be presented in addition to the alertdata, or may be omitted from display. In one example, the mobile devicemay also omit displaying the alphanumeric text of the URL if it isdetermined that there is no non-cellular network connection available.In another example, when it is determined that there is no non-cellularnetwork connection available, the URL may be included with the displayof the alert data, but the URL may be presented in text-only form (e.g.,in a non-selectable, or non-hyperlink format).

In one example, the URL may be included in a data field of a WEA messageaccording to a format of the WEA message. For instance, in one example,the URL may comprise at least a portion of a “recommended action” field,or other field of the WEA message. In another example, the URL may beincluded as an additional field of a WEA message format that may be usedprimarily for inclusion of URLs when desired by alert originators. Inone example, the WEA message may maintain conformance with a size limit.For instance, a WEA message may still have a maximum permittedlength/size, e.g., 90 characters of alphanumeric text, inclusive of anyURL that may be included in such a WEA message. However, in anotherexample, a WEA message may be permitted to exceed a default maximumpermitted length/size in order to include a URL. In one example, a linkshortener may be used to generate a new, shorter URL that redirects tothe target data of an original, longer URL.

In another example, when the mobile device determines that there is anon-cellular network connection available, the mobile device may presentthe WEA message content including the alert data and the URL, while itis left to the user to select the URL to access the additionalinformation. In one example, a single WEA message may be broadcast bothwith alphanumeric/text alert data and the URL. In another example, afirst WEA message may be broadcast with alphanumeric text only, while asecond message related to the first message may be broadcast with theURL. Thus, examples of the present disclosure enable additionalinformation to be provided to and/or accessed by mobile devices inaddition to a default WEA message, e.g., 90 characters/alphanumeric textonly, when the accessing of such additional information via a URL willnot unduly burden the cellular network due to the availability of anon-cellular network connection.

To illustrate, an alert originator may wish to not only provide awarning as to an imminent threat to life or safety, but may also desireto provide additional information for action in response to the threat.Thus, in one example, a portion of the 90 characters of a WEA messagecontent may be used to convey that there is a tornado approaching, togive its current location and trajectory, and to identify the alertgenerator. The WEA message may also provide a limited recommendedaction, e.g., “take shelter.” In accordance with the present disclosure,the WEA message content may then further include a URL that may link toadditional information (target data). For instance, the target data maycomprise various types of media, such as a document, an image, a videocontent, an audio content, and interactive and/or multimedia content,and so forth. To illustrate, in one example the URL may provide accessto a text document, a portable document format document, hypertextmarkup language (HTML) document, e.g., a webpage, or the like, which mayinclude different sets of targeted instructions addressed to recipientswho are already indoors, those travelling in vehicles, those who areoutside in an urban environment, those who are in open spaces, and soforth. In another example, the target data may comprise a map of analert area with an evacuation plan illustrated on the map. In stillanother example, the URL may link to a video that helps describe how torespond to a tornado. If information regarding the event is also beingbroadcast via radio and television, the target data of the URL may alsoprovide details on an appropriate channel or frequency. For example, ifthe WEA message is a weather alert originated by the National WeatherService (NWS) of the National Oceanic and Atmospheric Administration(NOAA), the target data of the URL could indicate that further detailsare available on the NOAA National Weather Alert Radio and indicate theavailable weather radio channels.

Notably, the cellular network may have capacity to handle the broadcastof the WEA message, by may be overwhelmed by a large number of mobiledevices attempting to access the target data of the URL over thecellular network. Thus, examples of the present disclosure help ensurethat mobile devices access the target data of the URL via a non-cellularaccess network, when available. Although some examples may permit mobiledevices to access the target data of the URL via the cellular network,it may require substantial and deliberate user action in order to enablethe access via the cellular network. For example, the URL may bepresented in a non-selectable format (e.g., in a non-hyperlink,plain-text format) along with alert data of the WEA message. However,the user may copy-and-paste or retype the URL into a web browser of themobile device in order to access the target data. Nevertheless, thenumber of users who perform these steps may be far less than the totalnumber of recipients of the WEA message. As such, it may be anticipatedthat this level of activity will result in a lesser probability ofoverburdening the cellular network.

In this regard, it should be noted that in some cases, the cellularnetwork may indicate that access to the target data of a URL included ina WEA message should not be restricted. For example, the alert area of aWEA message may be a small non-populous area. As such, it may bedetermined that an anticipated increase in cellular network load couldbe accommodated, even if all or a substantial portion of the recipientsof the WEA messages were to access the target data of the URL via thecellular network. In general, a determination that the cellular networkmay handle an anticipated increase in network load may be determinedfrom various factors, such as historical network usage data associatedwith past events and/or past WEA messages, the type of alert and/or thetype of threat to which the alert pertains, the time of day, day ofweek, season, etc., a percentage of recipients for which the mobiledevices have non-cellular access networks available, the type of targetinformation of the URL, e.g., a document of less than 100 kilobytes maybe anticipated to generate a relatively small load as compared to a tenminute video comprising many megabytes, and so on. In one example, thecellular network may indicate a permission to deviate from operations ofthe present disclosure (i.e., first verifying a non-cellular accessnetwork is available before accessing target data of a URL) by includinga signal in the WEA message, or in a separate message. For example, aspecial character may be included in the first position or last positionof the WEA message, or in a field of the WEA message, to indicate apermission to disregard operations of the present disclosure. Thus, insome situations, mobile devices may be permitted by the cellular networkoperator to access target data of the URL via the cellular network,without first verifying a non-cellular access network is available.

As such, in accordance with the present disclosure, a network operatormay provide enhanced services to WEA message originators and recipientsin selected instances, while at the same time maintaining the integrityof the network infrastructure. For example, it is undesirable for a WEAmessage to cause an overload of the network such that users who need tomake 911 emergency calls are unable to do so. Therefore, the presentdisclosure balances the benefits of delivering as much relevantinformation as possible via a WEA message and via target data of a URLcontained in the WEA message, while at the same time ensuring that thenetwork remains operational. These and other aspects of the presentdisclosure are described in greater detail below in connection with thediscussion of FIGS. 1-3.

To better understand the present disclosure, FIG. 1 illustrates anexample network, or system 100 suitable for implementing embodiments ofthe present disclosure for accessing target data of a uniform resourcelocator received in a wireless emergency alert message. In one example,the system 100 comprises a cellular network, e.g., a Long Term Evolution(LTE) network 101, an IP network 113, and a core network 115, e.g., anIP Multimedia Subsystem (IMS) core network 115. In one example, LTEnetwork 101 and IMS core network 115 may be provided and operated by asame cellular network operator. FIG. 1 also illustrates various userendpoint devices, e.g., mobile devices 116 and 117. The mobile devices116 and 117 may each comprise a cellular telephone, a smartphone, atablet computing device, a laptop computer, a pair of computing glasses,a wireless enabled wristwatch, or any other mobile telephony andcomputing device equipped for both cellular and non-cellularcommunications, (broadly, “mobile devices”).

In one example, the LTE network 101 comprises an access network, e.g.,an evolved Universal Terrestrial Radio Access Network (eUTRAN) 103 and acore network, e.g., an Evolved Packet Core (EPC) network 105. TheeUTRANs are the air interfaces of the 3^(rd) Generation PartnershipProject (3GPP) LTE specifications for mobile networks. In one example,EPC network 105 provides various functions that support wirelessservices in the LTE environment. For instance, EPC network 105 maycomprise an Internet Protocol (IP) packet core network that supportsboth real-time and non-real-time service delivery across LTE network101, e.g., as specified by the 3GPP standards. In one example, eNodeBs111 and 112 in the access network 103 are in communication with the EPCnetwork 105. The eNodeBs may comprise LTE components that are similar tocellular base stations or base transceiver stations (BTSs) in cellularaccess networks employing pre-LTE and/or non-LTE architectures. Inoperation, LTE user equipment, e.g., mobile devices 116 and 117 mayaccess cellular wireless services via the eNodeBs 111 and 112 located inthe access network 103. It should be noted that any number of eNodeBscan be deployed in eUTRAN 103.

In EPC network 105, network devices Mobility Management Entity (MME) 107and Serving Gateway (SGW) 108 support various functions as part of theLTE network 101. For example, MME 107 is the control node for the LTEaccess network, e.g., eUTRAN 103. In one embodiment, MME 107 isresponsible for UE (User Equipment) tracking and paging (e.g., such asretransmissions), bearer activation and deactivation process, selectionof the SGW, and authentication of a user. In one embodiment, SGW 108routes and forwards user data packets, while also acting as the mobilityanchor for the user plane during inter-eNodeB handovers and as theanchor for mobility between LTE and other wireless technologies, such as2G and 3G wireless networks.

In addition, EPC network 105 may comprise a common backbone including aHome Subscriber Server (HSS) 109 that contains subscription-relatedinformation (e.g., subscriber profiles), performs authentication andauthorization of a subscriber's mobile device, and provides informationabout the mobile device's location. The EPC network 105 may alsocomprise a public data network (PDN) gateway 110 which serves as agateway that provides access between the EPC network 105 and variousdata networks, e.g., another IP network 113, an IMS core network 115,and the like. In one example, IP network 113 may comprise the Internetin general. The public data network gateway is also referred to as a PDNgateway, a PDN GW or a PGW.

The EPC network 105 may also include an application server (AS) 190. Inone embodiment, AS 190 may comprise a computing system, such ascomputing system 300 depicted in FIG. 3, and may be configured toprovide one or more functions and/or to performing various operations inaccordance with the present disclosure. Accordingly, the AS 190 may beconnected directly or indirectly to any one or more network elements ofEPC network 105, and of the system 100 in general, that are configuredto gather and forward network analytic information, such as signalingand traffic data, and other information and statistics to AS 190 and toreceive instructions from AS 190. In addition, AS 190 may be configuredto receive requests to broadcast WEA messages from alert originatordevices 175 deployed in one or more alert originating networks 170, eachof which may be associated with an authorized alert originator. Forexample, one or more of the alert originator devices 175 may compriseall or a portion of a Federal Emergency Management Administration (FEMA)Integrated Public Alert and Warning System (IPAWS).

In one example, AS 190 may receive a request to broadcast a WEA messagefrom one of the alert originator devices 175 that includes alert data,e.g., alphanumeric text information, and a URL that provides a link toadditional information associated with the WEA message. For example, analert originator may wish to not only provide a warning as to animminent threat to life or safety, but may also desire to provideadditional information for action in response to the threat that iseither in non-text format, or that would not fit within a WEA messageformat. For instance, the alert originator may have text that exceeds 90characters, or a map, a video, and so forth that the alert originatorwould like to provide to target recipients of the WEA message. Thus, theadditional information may be provided as target data of a URL thatenables mobile devices of the recipients to access the target data byfollowing the URL.

In one example, the URL may link to one or more servers storing thetarget data. For instance, the target data may be stored by the alertoriginator or another party on one of the servers 179 in one of thenetworks 170. In such case, the URL may provide a link to access thetarget data on the one of the servers 179. In another example, the URLmay link to one of servers 114 deployed in and/or accessible via IPnetwork 113 that stores the target data. In still another example, thetarget data may be stored in a device within EPC core network 105 or IMScore network 115. For instance, a telecommunications service provideroperating LTE network 101 and/or IMS core network 115 may provide aservice to alert originators for storing target data of URLs included inWEA messages.

In one example, AS 190 may also be configured to broadcast WEA messagesto mobile devices being served by wireless access networks in an alertarea, such as mobile devices 116 and 117. For example, AS 190 mayconfirm that a message content for the WEA message and other aspects ofthe request, such as the time duration, the alert area, and so forth,conform to various requirements and then provide the WEA message to abroadcast server 194. The broadcast server 194 may provide the WEAmessage to eNodeB 111, eNodeB 112, and/or other eNodeBs, or similaraccess network components to be broadcast to mobile devices that arebeing serviced by the cells of the alert area. In various examples, AS190 may alternatively or additionally be referred to as a cell broadcastcenter (CBC), an emergency alert server (EAS), or a WEA server. In oneexample, AS 190 may be deployed in a network operations center (NOC) ofa cellular network operator, e.g., an entity operating the EPC network105, LTE network 101, eUTRAN 103, and so on. Due to the relatively largenumber of connections available between AS 190 and other networkelements, none of the actual links to the application server are shownin FIG. 1. Similarly, links between MME 107, SGW 108, broadcast server194, eNodeBs 111 and 112, PDN gateway 110, and other components ofsystem 100 are also omitted for clarity.

In still another example, system 100 may be configured such thatcommunications between alert originator devices 175 and AS 190 maybypass PDN gateway 110, and other components. For instance, dedicatedgateways and network connections that are not shared with other externalentities may be provided for guaranteeing access by alert originatorsdevices 175 to AS 190. For example, a WEA gateway 192 may be included asa point of ingress to and egress from EPC network 105 for communicationsbetween alert originator devices 175 in WEA networks 170 and AS 190 inEPC network 105. Such a WEA gateway 192 may alternatively be referred toas a commercial mobile service provider (CMSP) gateway or a commercialmobile alert system (CMAS) gateway.

As mentioned above, the broadcast server 194 may provide WEA message toeNodeB 111, eNodeB 112, and/or other eNodeBs, or similar access networkcomponents to be broadcast to mobile devices that are being serviced bythe cells of an alert area. In the example of FIG. 1, one or more WEAmessages may be broadcast from both eNodeBs 111 and 112 and received bymobile devices 116 and 117 relating to an emergency. For instance, inone example, a first WEA message may be sent with alert data, followedby another WEA message with a URL linking to target data with additionalinformation regarding the emergency. In another example, a single WEAmessage may be broadcast from eNodeBs 111 and 112 that may include bothalert data and a URL linking to target data with additional informationregarding the emergency.

In one example, mobile devices 116 and 117 may each comprise a computingsystem, such as computing system 300 depicted in FIG. 3, and may beconfigured to provide one or more functions and/or to perform variousoperations in accordance with the present disclosure. For example,mobile devices 116 and 117 may perform operation of the example methodof FIG. 2, discussed in greater detail below. In one example, mobiledevices 116 and 117 may each display alert data from a WEA message. Inaddition, mobile devices 116 and 117 may each determine whether anon-cellular access network is available (e.g., a wired or wirelesslocal access network connection, and so forth). Thus, in one example,the alert data of the WEA message may be immediately displayed on themobile device before or simultaneous with the mobile device determiningwhether there is a non-cellular access network. As such, there is nodelay in the display of initial WEA message content (e.g., alert data)to the users.

In the example of FIG. 1, mobile device 116 may be located nearnon-cellular access network 120 and detects a connection to access point(AP) 125, e.g., a wireless router. As such, mobile device 116 maypresent the URL in a hyperlink format for selection by a user of themobile device 116, or may automatically follow the URL to access thetarget data of the URL. For instance, the URL may cause mobile device116 to access target data stored on one of servers 179 in one of thenetworks 170 via access network 120 and/or via IP network 113. Uponaccessing the target data, mobile device 116 may then present the targetdata, e.g., using a display, a speaker, or other output component of themobile device 116.

On the other hand, in the same example, mobile device 117 may not detecta connection to a non-cellular access network. As such, mobile device117 may display the alert data alone (e.g., without displaying the URL)or may display the URL in a non-selectable formal (e.g., in anon-hyperlink, text-only format) along with the alert data. Thus, themobile devices 116 and 117 may be configured (e.g., at the operatingsystem or firmware level) to verify that a non-cellular networkconnection exists before attempting to retrieve the target data of theURL. The operations of an example mobile device in response to receivingone or more WEA messages is described in greater detail below inconnection with the example method 200 of FIG. 2.

The foregoing description of the system 100 is provided as anillustrative example only. In other words, the example of system 100 ismerely illustrative of one network configuration that is suitable forimplementing embodiments of the present disclosure. As such, otherlogical and/or physical arrangements for the system 100 may beimplemented in accordance with the present disclosure. For example, AS190, broadcast server 194 and/or other network components may bedeployed in the IMS core network 115 instead of being deployed withinthe EPC network 105, or in other portions of system 100 that are notshown, while providing essentially the same functionality. Variouselements of access network 103 and EPC network 105 are also omitted forclarity, including gateways or border elements providing connectivitybetween such networks.

In addition, although aspects of the present disclosure have beendiscussed above in the context of a long term evolution (LTE)-basedwireless network, examples of the present disclosure are not so limited.Thus, the teachings of the present disclosure can be applied to othertypes of wireless networks (e.g., 2G network, 3G network and the like),for use in connection with broadcasting WEA messages and for mobiledevices accessing target data of a URL received in a WEA message. Thus,these and other modifications are all contemplated within the scope ofthe present disclosure.

FIG. 2 illustrates a flowchart of an example method 200 for accessingtarget data of a uniform resource locator (URL) received in a wirelessemergency alert (WEA) message. In one embodiment, the steps, operationsor functions of the method 200 may be performed by any one or more ofthe components of the system 100 depicted in FIG. 1. For example, in oneembodiment, the method 200 is performed by one of mobile devices 116 or117. In another embodiment, the method 200 is performed by a mobiledevice in coordination with other components of the system 100, such asWEA gateway 192, broadcast sever 194, eNodeBs 111 and 112, and so forth.Alternatively, or in addition, one or more steps, operations orfunctions of the method 200 may be implemented by a computing devicehaving a processor, a memory and input/output devices as illustratedbelow in FIG. 3, specifically programmed to perform the steps, functionsand/or operations of the method. Although any one of the elements insystem 100 of FIG. 1 may be configured to perform various steps,operations or functions of the method 200, the method will now bedescribed in terms of an embodiment where steps of the method areperformed by a processor, such as processor 302 in FIG. 3. For example,the processor may comprise a processor of a mobile device that isequipped for both cellular and non-cellular communications.

The method 200 begins in step 205 and may proceed to optional step 210or to step 220. In optional step 210, the processor may receive a firstWEA message that may include alert data. For instance, the alert datamay comprise alphanumeric text conveying basic information regarding animminent threat to life or property. In one example, the first WEAmessage is received from a cellular network via a cellular broadcastover a broadcast channel. For example, the WEA message may be broadcastby one or more eNodeB's and/or base stations in an alert area forreception by all cellular-capable mobile devices within communicationrange. In one example, the alert data may conform to a WEA messageformat, e.g., 90 characters of alphanumeric text.

At optional step 215, the processor may display the alert data of thefirst WEA message. For instance, the processor may comprise a processorof a mobile device. In addition, the alert data may comprisealphanumeric text. Therefore, the processor may display the alert dataon a display screen of the mobile device at optional step 215.

At step 220, the processor receives a WEA message that includes auniform resource locator (URL). In one example, the WEA message isreceived from the cellular network via a cellular broadcast over abroadcast channel. The WEA message received at step 220 may comprise adifferent WEA messages from the first WEA message that may be receivedat optional step 210. For instance, in one example, an alert originatorand/or a cellular network operator may provide the first WEA messagewith basic text information regarding an emergency, while another WEAmessage may follow that contains a URL for accessing target datacomprising additional information regarding the emergency. However, inanother example, a single WEA message received at step 220 may includeboth alert data and a URL for accessing additional information regardingthe emergency. In such case, optional steps 210 and 215 may be omitted.

In any event, the WEA message received at step 220 may include a URL foraccessing target data comprising additional information regarding theemergency. For instance, the target data may comprise a document, animage, a video content, an audio content, and so forth. In one example,the URL is for accessing a server or other network-based devices thatstore the target data and for retrieving the target data from thestorage location. In one example, the WEA message received at step 220(as well as the WEA message that may be received at optional step 210)may comprise multiple data fields that may include: an event type, anarea affected, a recommended action, an expiration time (with timezone), a sending agency, and so forth. In one example, the “alert data”may comprise the information contained in all or a portion of this setof data fields. In addition, in one example, the URL may be included ina data field of a WEA message according to a format of the WEA message.For instance, in one example, the URL may comprise at least a portion ofa “recommended action” field, or other field of a WEA message. Inanother example, the WEA message may be in accordance with a WEA messageformat that includes a field assigned exclusively or primarily forconveying URLs.

Following step 220, the method 200 may proceed to optional step 225 orto step 230. At optional step 225, the processor may display alert dataof the WEA message received at step 220. For example, if alert data isincluded in the same WEA message as the URL, the alert data may bepresented immediately, e.g., upon receipt of the WEA message and subjectto any non-intentional delays, such as closing or interrupting otherapplications running on the mobile device, and so forth, and/or prior tothe processor performing additional steps, functions or operations ofthe method 200. As such, there is no delay in the display of the initialWEA message content (e.g., alert data) to the user of the mobile device.

At step 230, the processor determines whether a non-cellular accessnetwork is available to the mobile device. For instance, as mentionedabove, the processor may comprise a processor of a mobile device that isequipped for both cellular and non-cellular communications. Thus, theprocessor may receive a WEA message that is broadcast by components of acellular network. However, as mentioned above, if a large number ofmobile devices were to simultaneously attempt to access a URL via thecellular network, the cellular network could be overwhelmed, dependingupon the nature and/or size of the target data, the current network loadin relevant portions of the cellular network, and so forth. As such, atstep 230, the processor may first determine whether a non-cellularaccess network is available, e.g., for accessing the target data of theURL via the non-cellular access network. The determination of whether anon-cellular access network is available may comprise verifying thatcomponents of the non-cellular access network acknowledge the mobiledevice. For instance, the processor may confirm that an InternetProtocol (IP) address assigned to the mobile device remains valid. Inanother example, the processor may request an IP address assignment froma dynamic host configuration protocol (DHCP) server, which ifsuccessful, may confirm the availability of the non-cellular accessnetwork. In one example, step 230 may comprise sensing a sufficientsignal strength from an access point in a wireless local area network.Thus, the determination of whether a non-cellular access network isavailable may take various forms depending upon the capabilities of themobile device and the network(s) and environment(s) in which the mobiledevice is deployed.

When the processor determines that a non-cellular access network isavailable, the method 200 may proceed to optional step 235 or to step245.

At optional step 235, the processor may display the URL on the mobiledevice for selection by the user. For instance, a cellular networkoperator, a mobile device manufacturer, and/or the user of the mobiledevice may configure the processor and/or the mobile device to notautomatically follow the URL to obtain the target data via thenon-cellular access network, but to instead present the URL in aselectable format, e.g., as a hyperlink, or by presenting a dialog box,button, or other user interface for requesting a user input prior toaccessing the URL.

At optional step 240, the processor may receive a user input selectingthe URL. For instance, the user input may comprise a tapping on a touchdisplay screen where the URL is displayed or where a button ispresented, a voice command to follow the URL, a keyboard or a keypadentry, and so forth. The nature of the input received at optional step240 may depend upon the user interface capabilities of the mobiledevice, network operator permissions, customizations and/orconfigurations of the mobile device by the user, and so forth.

At step 245, the processor accesses target data of the URL. For example,the processor may instantiate a session with a server or othernetwork-based component via the non-cellular access network and/or oneor more additional intermediary networks in order to request andretrieve the target data of the URL. For instance, the processor maygenerate a hypertext transfer protocol (HTTP) request comprising the URLto retrieve the target data from an HTTP server hosting the target data.The accessing of the target data may utilize any one or moreclient/server and/or network communication protocols in order to accessthe target data. Thus, the present disclosure is not limited to HTTPcommunications, but may implement, for example, file transfer protocol(FTP), trivial file transfer protocol (TFTP), secure shell (SSH) filetransfer protocol (SFTP), real time streaming protocol (RTSP), and soon.

At step 250, the processor presents the target data of the URL that isaccessed at step 245 on the mobile device. This may include a visualdisplay output, an audio output, and so forth. The presentation of thetarget data may vary depending upon the nature or the target data and/orthe output capabilities of the mobile device, network operatorpermissions, customizations and/or configurations of the mobile deviceby the user, and so forth. For instance, if the target data comprises amap, step 250 may include rendering the map on a display of the mobiledevice. If the target data comprises audio instructions, step 250 maycomprise playing the audio instructions via a speaker or a headset ofthe mobile device, or via a similar component that is attached orconnected to the mobile device, and so forth. Following step 250, themethod 200 proceeds to step 295 where the method ends.

Returning to a discussion of step 230, if at step 230 the processordetermines that a non-cellular access network is not available, themethod 200 may proceed to optional step 255 or to optional step 260.

At optional step 255, the processor may omit display of the URLcontained in the WEA message received at step 220. For instance, theprocessor may present only the alert data contained in the WEA messagereceived at step 220 or contained in the first WEA message that may bereceived at optional step 210 in response to receiving the WEAmessage(s). Following optional step 255, the method 200 may proceed tostep 295 where the method ends.

At optional step 260, the processor may display the URL in anon-selectable format. For instance, the URL may be presented in aplain-text and/or a non-hyperlink format on the mobile device. In oneexample, the URL may be presented in the non-selectable format alongwith or following alert data that is contained in the WEA messagereceived at step 220 or the first WEA message that may be received atoptional step 210. Thus, the user of the mobile device may not becompletely foreclosed from accessing the target data of the URL via thecellular network. However, it may require substantial and deliberateuser action such as copying-and-pasting or retyping the URL into a webbrowser of the mobile device in order to access the target data.Nevertheless, the number of users who perform these steps may be farless than the total number of recipients of the WEA message. As such, itmay be anticipated that this level of activity will result in lesserprobability of overburdening the cellular network. In one example, theprocessor and/or the mobile device may be configured to alternativelyperform one of optional steps 255 or 260 based upon a preference of anoperator of the cellular network. Following optional step 260, themethod 200 may proceed to step 295 where the method ends.

In addition, although not specifically specified, one or more steps,functions or operations of the method 200 may include a storing,displaying and/or outputting step as required for a particularapplication. In other words, any data, records, fields, and/orintermediate results discussed in the method 200 can be stored,displayed, and/or outputted either on the device executing therespective method or to another device, as required for a particularapplication. Furthermore, steps, blocks, functions, or operations inFIG. 2 that recite a determining operation or involve a decision do notnecessarily require that both branches of the determining operation bepracticed. In other words, one of the branches of the determiningoperation can be deemed as an optional step. Moreover, steps, blocks,functions, or operations of the above described method 200 can becombined, separated, omitted, and/or performed in a different order fromthat described above, without departing from the examples of the presentdisclosure.

As such, the present disclosure provides at least one advancement in thetechnical field of cellular wireless emergency alert (WEA) messageprocessing. In particular, in one example, the present disclosureenables a network operator to provide enhanced services to alertoriginators and WEA message recipients in selected instances, while atthe same time maintaining the integrity of the network infrastructure.For example, it is undesirable for a WEA message to cause an overload ofthe network such that users who need to make 911 emergency calls areunable to do so. Therefore, the present disclosure balances the benefitsof delivering as much relevant information as possible via one or moreWEA messages and via target data of a URL contained in the WEA message,while at the same time ensuring that the network remains operational.The present disclosure also provides a transformation of data. Forexample, network analytic data, e.g., data regarding whether or not anon-cellular access network is available, may be transformed into datacomprising a determination as to whether accessing of target data of aURL contained in a WEA message is to be permitted.

Examples of the present disclosure also improve the functioning of acomputing device, e.g., a mobile device. Namely, a new type of mobiledevice and/or components of a mobile device for selectively accessingtarget data of a URL received in a WEA message are provided. Forexample, a mobile device of the present disclosure may receive a WEAmessage including a URL via a cellular broadcast, determine that anon-cellular access network is available for the mobile device, accesstarget data from the URL via the non-cellular access network, when thenon-cellular access network is available, and present the target data onthe mobile device. Notably, no previous mobile device has performedthese functions as described herein. For example, previous mobiledevices may simply receive a WEA message comprising alphanumeric textonly.

In addition, an improved cellular network is provided in examples of thepresent disclosure. For instance, a new cellular network of the presentdisclosure may enable alert originators to send WEA messages containingURLs that provide access to target data comprising additionalinformation regarding an emergency, such as images, video, audio, and soforth, while at the same time, the cellular network is protected fromoverload conditions that may otherwise arise as a result of mobiledevices automatically accessing the target data of the URLs over thecellular network infrastructure.

FIG. 3 depicts a high-level block diagram of a computing device suitablefor use in performing the functions described herein. As depicted inFIG. 3, the system 300 comprises one or more hardware processor elements302 (e.g., a central processing unit (CPU), a microprocessor, or amulti-core processor), a memory 304 (e.g., random access memory (RAM)and/or read only memory (ROM)), a module 305 for accessing target dataof a uniform resource locator received in a wireless emergency alertmessage, and various input/output devices 306 (e.g., storage devices,including but not limited to, a tape drive, a floppy drive, a hard diskdrive or a compact disk drive, a receiver, a transmitter, a speaker, adisplay, a speech synthesizer, an output port, an input port and a userinput device (such as a keyboard, a keypad, a mouse, a microphone andthe like)). Although only one processor element is shown, it should benoted that the computing device may employ a plurality of processorelements. Furthermore, although only one computing device is shown inthe figure, if the method 200 as discussed above is implemented in adistributed or parallel manner for a particular illustrative example,i.e., the steps of the method, or the entire method is implementedacross multiple or parallel computing devices, then the computing deviceof this figure is intended to represent each of those multiple computingdevices.

Furthermore, one or more hardware processors can be utilized insupporting a virtualized or shared computing environment. Thevirtualized computing environment may support one or more virtualmachines representing computers, servers, or other computing devices. Insuch virtualized virtual machines, hardware components such as hardwareprocessors and computer-readable storage devices may be virtualized orlogically represented. The one or more hardware processors 302 can alsobe configured or programmed to cause other devices to perform one ormore operations as discussed above. In other words, the one or morehardware processors 302 may serve the function of a controller directingother devices to perform the one or more operations as discussed above.

It should be noted that the present disclosure can be implemented insoftware and/or in a combination of software and hardware, e.g., usingapplication specific integrated circuits (ASIC), a programmable gatearray (PGA) including a Field PGA, or a state machine deployed on ahardware device, a computing device or any other hardware equivalents,e.g., computer readable instructions pertaining to the method 200discussed above can be used to configure a hardware processor to performthe steps, functions and/or operations of the above disclosed methods.In one embodiment, instructions and data for the present module orprocess 305 for accessing target data of a uniform resource locatorreceived in a wireless emergency alert message (e.g., a software programcomprising computer-executable instructions) can be loaded into memory304 and executed by hardware processor element 302 to implement thesteps, functions or operations as discussed above in connection with theillustrative method 200. Furthermore, when a hardware processor executesinstructions to perform “operations,” this could include the hardwareprocessor performing the operations directly and/or facilitating,directing, or cooperating with another hardware device or component(e.g., a co-processor and the like) to perform the operations.

The processor executing the computer-readable or software instructionsrelating to the above described methods can be perceived as a programmedprocessor or a specialized processor. As such, the present module 305for accessing target data of a uniform resource locator received in awireless emergency alert message (including associated data structures)of the present disclosure can be stored on a tangible or physical(broadly non-transitory) computer-readable storage device or medium,e.g., volatile memory, non-volatile memory, ROM memory, RAM memory,magnetic or optical drive, device or diskette and the like. Furthermore,a “tangible” computer-readable storage device or medium comprises aphysical device, a hardware device, or a device that is discernible bythe touch. More specifically, the computer-readable storage device maycomprise any physical devices that provide the ability to storeinformation such as data and/or instructions to be accessed by aprocessor or a computing device such as a computer or an applicationserver.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and nota limitation. Thus, the breadth and scope of a preferred embodimentshould not be limited by any of the above-described exemplaryembodiments, but should be defined only in accordance with the followingclaims and their equivalents.

1. A method comprising: receiving, by a processor of a mobile device, afirst wireless emergency alert message, wherein the first wirelessemergency alert message comprises alert data; displaying, by theprocessor, the alert data on the mobile device; receiving, by theprocessor, a second wireless emergency alert message including a uniformresource locator via a cellular broadcast, wherein the second wirelessemergency alert message is received after the first wireless emergencyalert message; determining, by the processor, that a non-cellular accessnetwork is available for the mobile device; accessing, by the processor,target data from the uniform resource locator via the non-cellularaccess network, when the non-cellular access network is available; andpresenting, by the processor, the target data on the mobile device,wherein the target data is presented after the alert data is displayed.2.-3. (canceled)
 4. The method of claim 1, further comprising:determining that the second wireless emergency alert message includesthe uniform resource locator.
 5. The method of claim 4, wherein thedetermining that the non-cellular access network is available isperformed in response to determining that the second wireless emergencyalert message includes the uniform resource locator.
 6. The method ofclaim 1, wherein the uniform resource locator is displayed on the mobiledevice in a non-selectable format when the non-cellular access networkis not available.
 7. The method of claim 6, wherein the alert data isdisplayed on the mobile device with the uniform resource locator in thenon-selectable format.
 8. The method of claim 1, wherein when thenon-cellular access network is not available, the alert data isdisplayed on the mobile device and the uniform resource locator is notdisplayed on the mobile device. 9.-10. (canceled)
 11. A mobile devicecomprising: a processor; and a computer-readable medium storinginstructions which, when executed by the processor, cause the processorto perform operations comprising: receiving a first wireless emergencyalert message, wherein the first wireless emergency alert messagecomprises alert data; displaying the alert data on the mobile device;receiving a second wireless emergency alert message including a uniformresource locator via a cellular broadcast, wherein the second wirelessemergency alert message is received after the first wireless emergencyalert message; determining that a non-cellular access network isavailable for the mobile device; accessing target data from the uniformresource locator via the non-cellular access network, when thenon-cellular access network is available; and presenting the target dataon the mobile device, wherein the target data is presented after thealert data is displayed. 12.-13. (canceled)
 14. The mobile device ofclaim 11, wherein the operations further comprise: determining that thesecond wireless emergency alert message includes the uniform resourcelocator.
 15. The mobile device of claim 14, wherein the determining thatthe non-cellular access network is available is performed in response todetermining that the second wireless emergency alert message includesthe uniform resource locator.
 16. A non-transitory computer-readablemedium storing instructions which, when executed by a processor of amobile device, cause the processor to perform operations, the operationscomprising: receiving a first wireless emergency alert message, whereinthe first wireless emergency alert message comprises alert data;displaying the alert data on the mobile device; receiving a secondwireless emergency alert message including a uniform resource locatorvia a cellular broadcast, wherein the second wireless emergency alertmessage is received after the first wireless emergency alert message;determining that a non-cellular access network is available for themobile device; accessing target data from the uniform resource locatorvia the non-cellular access network, when the non-cellular accessnetwork is available; and presenting the target data on the mobiledevice, wherein the target data is presented after the alert data isdisplayed.
 17. The non-transitory computer-readable medium device ofclaim 16, wherein the uniform resource locator is displayed on themobile device in a non-selectable format when the non-cellular accessnetwork is not available.
 18. The non-transitory computer-readablemedium device of claim 17, wherein the alert data is displayed on themobile device with the uniform resource locator in the non-selectableformat.
 19. The non-transitory computer-readable medium device of claim16, wherein when the non-cellular access network is not available, thealert data is displayed on the mobile device and the uniform resourcelocator is not displayed on the mobile device.
 20. (canceled)
 21. Themobile device of claim 11, wherein the uniform resource locator isdisplayed on the mobile device in a non-selectable format when thenon-cellular access network is not available.
 22. The mobile device ofclaim 21, wherein the alert data is displayed on the mobile device withthe uniform resource locator in the non-selectable format.
 23. Themobile device of claim 11, wherein when the non-cellular access networkis not available, the alert data is displayed on the mobile device andthe uniform resource locator is not displayed on the mobile device. 24.The non-transitory computer-readable medium of claim 16, the operationsfurther comprising: determining that the second wireless emergency alertmessage includes the uniform resource locator.
 25. The non-transitorycomputer-readable medium of claim 24, wherein the determining that thenon-cellular access network is available is performed in response todetermining that the second wireless emergency alert message includesthe uniform resource locator.