Automatic response to localized input

ABSTRACT

Automatic response to localized input is provided. Where a first user equipment enters a service area, the presence of the first user equipment can be determined from an identification information. The identification information can be employed to access information relating to the identification information. Where either the identification information or the information associated with the identification information satisfy one or more predetermined rules, a response can be determined. The determined response can be made accessible. As such, a second user equipment can receive the response based, at least in part, on the first user equipment entering the service area.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority to, U.S.patent application Ser. No. 13/097,349 (now U.S. Pat. No. 8,892,082),filed on 29 Apr. 2011, and entitled “AUTOMATIC RESPONSE TO LOCALIZEDINPUT,” the entirety of which is incorporated herein by reference.

TECHNICAL FIELD

The disclosed subject matter relates to mobile devices and networks andmore particularly to proximity notification in response to the positionof a mobile device in a mobile network.

BACKGROUND

Technologies that use global position system (GPS) to detect thepresence of mobile device in a much broader geographic area can requireGPS components in the mobile device. These GPS components can increasethe cost of the mobile device making it less accessible to consumers.Further, the GPS components can consume additional power lessening theuseable time of the device between charges. Moreover, GPS systems can beassociated with granularity that may be insufficient to easily identifya location with sufficient accuracy, especially in verticalconstruction. For example, a GPS can have difficulty determining if acell phone is on the 3^(rd) floor or 4^(th) floor of an office building.

The above-described deficiencies of conventional presence detectionsystems are merely intended to provide an overview of some of problemsof current technology, and are not intended to be exhaustive. Otherproblems with the state of the art, and corresponding benefits of someof the various non-limiting embodiments described herein, may becomefurther apparent upon review of the following detailed description.

SUMMARY

The following presents a simplified summary of the disclosed subjectmatter in order to provide a basic understanding of some aspects of thevarious embodiments. This summary is not an extensive overview of thevarious embodiments. It is intended neither to identify key or criticalelements of the various embodiments nor to delineate the scope of thevarious embodiments. Its sole purpose is to present some concepts of thedisclosure in a streamlined form as a prelude to the more detaileddescription that is presented later.

In contrast to GPS enabled systems, employing localized access points torespond to the proximity of a mobile device can offer numerousadvantages as will be appreciated from the subject disclosure. Automaticresponse to localized input can include a localized access pointreceiving an indicator from a proximate mobile device. The indicator canbe employed in determining a response to the proximate presence of themobile device.

To the accomplishment of the foregoing and related ends, the disclosedsubject matter, then, comprises one or more of the features hereinaftermore fully described. The following description and the annexed drawingsset forth in detail certain illustrative aspects of the subject matter.However, these aspects are indicative of but a few of the various waysin which the principles of the subject matter can be employed. Otheraspects, advantages and novel features of the disclosed subject matterwill become apparent from the following detailed description whenconsidered in conjunction with the drawings.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is an illustration of a system that facilitates access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure.

FIG. 2 is a depiction of a system that facilitates access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure.

FIG. 3 illustrates a system that facilitates access to an automaticresponse to a localized input in accordance with the disclosed subjectmatter.

FIG. 4 is a depiction of a system that facilitates access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure.

FIG. 5 illustrates a system that can facilitate access to an automaticresponse to a localized input received by a femtocell in accordance withthe disclosed subject matter.

FIG. 6 is a diagram of an exemplary non-limiting system that facilitatesaccess to an automatic response to a localized input for a building inaccordance with aspects of the subject disclosure.

FIG. 7 illustrates aspects of a method facilitating access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure.

FIG. 8 illustrates aspects of a method facilitating access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure.

FIG. 9 illustrates a method for receiving an automatic response to alocalized input in accordance with aspects of the subject disclosure.

FIG. 10 illustrates a block diagram of an exemplary embodiment of anaccess point to implement and exploit one or more features or aspects ofthe subject disclosure.

FIG. 11 is a block diagram of an exemplary embodiment of a mobilenetwork platform to implement and exploit various features or aspects ofthe subject disclosure.

FIG. 12 illustrates a block diagram of a computing system operable toexecute the disclosed systems and methods in accordance with anembodiment.

DETAILED DESCRIPTION

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of the subject disclosure. It may be evident, however,that the subject disclosure may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to facilitate describing the subjectdisclosure.

FIG. 1 is an illustration of a system 100, that facilitates access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure. System 100 can include access point response(APR) component 110 that can receive identification information (IDI)122 from a mobile device, such as a cell phone, pager, smartphone,tablet computer, laptop computer, vehicle, etc. Identificationinformation can include nearly any type of identifier, such as asubscriber identity module (SIM) identifier, an electronic SIM (eSIM)identifier, an internet protocol (IP) address, a Media Access Control(MAC) address, a phone number, a password, a user id, e.g., a useridentifier to log into a computer system, a website, a service, etc., apersonal identification number (PIN), etc. Numerous other examples arenot explicitly recited for brevity but are to be considered within thescope of the present disclosure.

APR component 110 can include a receiving component 120. Receivingcomponent 120 can be configured to receive IDI 122. Receiving component120 can be communicatively coupled to lookup component 130. Lookupcomponent 130 can be configured to receive information related to IDI122. As a non-limiting example, lookup component 130 can receive anaccount owner identification associated with a received SIM identifier(e.g., IDI 122). In some embodiments, lookup component 130 can accessinformation related to an IDI 122 from a local, remote, or distributeddata store.

APR component 110 can further include result component 140. Resultcomponent 140 can be communicatively coupled to lookup component 130.Result component 140 can automatically determine a response 152 to areceived IDI 122. This automatically determined response 152 can bebased on the IDI 122 itself or can be based on the informationassociated with the IDI 122, such as the information received by lookupcomponent 130. Result component 140 can be communicatively coupled tooutput component 150. Output component 150 can be configured tofacilitate access to an automatically determined response 152 fromresult component 140.

As a non-limiting example of system 100, APR component 110 can receive aSIM identifier (e.g., IDI 122) from a tablet computer within apredefined proximity to receiving component 120. The SIM identifier(e.g., IDI 122) can be communicated to lookup component 130 that canreceive the name of the owner of the tablet computer associated with theSIM identifier (e.g., IDI 122) from a query of a subscriber agreementfor the tablet computer. The name of the owner can be communicated toresult component 140. Result component 140 can automatically determinethat the name of the owner can be emailed to the owner of the premisesin which receiving component 120 is located (e.g., response 152). Thisautomatically determined response 152 can be communicated to outputcomponent 150. Output component 150 can facilitate generating apreformatted email and inserting the name of the owner of the tabletcomputer. The email (e.g., response 152) can then be sent to the ownerof the premises in which receiving component 120 is located. It is to benoted that this non-limiting example is presented merely to illustratesome aspects of the disclosed subject matter and should not be construedto limit the subject disclosure in any way.

As a further non-limiting example of system 100, an APR component 110can have a service area approximating the region occupied by a dwelling.Where the APR component 110 is located in Homeowner's home and Homeownerhas a teenage child that carries a mobile phone, when the child's mobilephone enters the APR service area a response (e.g., response 152) canautomatically be generated by the system to notify Homeowner that thechild's phone has entered the APR service area. This can be, forexample, by sending Homeowner a text message with the notification.Similarly, where the child leaves the service area, such as leaving thehome to go to study group, another notice (e.g., response 152) can besent to Homeowner that the child's phone has left the service area ofthe APR component 110. Moreover, where another child of Homeowner alsohas a cell phone, notifications (e.g., response 152) can be sent toHomeowner about the second phone entering and leaving the service areaof the APR component 110. This simple non-limiting example can provide aworking parent a convenient way of knowing when a child comes home fromschool, etc.

Similar examples can be presented for numerous other circumstances, suchas, notifying a shopkeeper of the arrival of a customer, notification ofan employer of the arrival/departure of an employee, etc. Further, insome embodiments, system 100 can provide additional layers of security,for example, where a protective order is in place, an APR component 110can alert (e.g., response 152) a petitioner to the presence of apotentially dangerous situation. One example of this can be that an APRcomponent 110 at a place of work can notify a woman at work that herabusive ex-husband is at her place of work (e.g., response 152), givingher precious extra time to avert a potentially disastrous confrontation.Further, system 100 can notify both the woman and law enforcementcontemporaneously (e.g., response 152). Moreover, the presence of theex-husband, or at least a mobile device associated with him, can berecorded in an objective manner that can illustrate a time, date, andlocation (e.g., within the service area of the APR component 110).Notification can also be sent (e.g., response 152) to the ex-husbandsuch that, where the intrusion by the ex-husband is unintentional, hecan remedy the situation. Further, where the response (e.g., response152) can be conditioned on the lookup information related to the IDI122, even where the ex-husband has a “new” mobile IDI 122, the response(e.g., response 152) can still be sent to the woman because the new IDI122 can still be associated with the ex-husband, such as by a name on asubscriber agreement, etc., thus reducing the ease of circumventing thesystem.

FIG. 2 is a depiction of a system 200 that can facilitate access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure. System 200 can include APR component 210 thatcan receive IDI 222 from a mobile device (not illustrated). APRcomponent 210 can include a receiving component 220. Receiving component220 can be configured to receive IDI 222. Receiving component 220 can becommunicatively coupled to lookup component 230. Lookup component 230can be configured to receive information related to IDI 222. Lookupcomponent 230 can be communicatively coupled to data store 270. Datastore 270 can be local, remote, or distributed, and can be a repositoryfor information related to IDI 222. As such, information related to IDI222 can be received by lookup component 230 from data store 270.

APR component 210 can further include result component 240. Resultcomponent can be communicatively coupled to lookup component 230. Resultcomponent 240 can automatically determine a response 252 related to anIDI 222 received at receiving component 220. Result component 240 can becommunicatively coupled to rule component 260. Rule component 260 canfacilitate receiving at least one rule at result component 240. Theautomatically determined response 252 of result component 240 can bebased on an IDI 222, information associated with the IDI 222, or a rulereceived from rule component 260. Result component 240 can becommunicatively coupled to output component 250. Output component 250can be configured to facilitate access to an automatically determinedresponse 252 from result component 240.

In some embodiments, rule component 260 can facilitate receiving rulesrelated to an IDI 222, such as IDI 222 received at receiving component220. Further, in some embodiments rule component 260 can include a ruleengine (not illustrated) to facilitate generating rules. These generatedrules can be related to an IDI 222 received at receiving component 220.Moreover, rule component 260 can be coupled to a local, remote, ordistributed data store (not illustrated). Examples of rules can include,but are not limited to, sending a response (e.g., 252) based on a classof identifier, sending a response (e.g., 252) based on an identifiedperson related to an IDI (e.g., 222), sending a response (e.g., 252)based on a length of time an IDI source is within an area, prioritizinga response (e.g., 252) based on an IDI (e.g., 222) or condition,delaying a response (e.g., 252) based on an IDI (e.g., 222) orcondition, etc. Numerous other rules are not explicitly illustrated forbrevity but are to be considered within the scope of the subjectdisclosure.

As a more detailed non-limiting example of rules, an IDI 222 can beidentified as belonging to Child. Child can enter the service area ofthe APR component 210. A rule received by result component 240, fromrule component 260, can indicate that a response (e.g., 252) is to besent to Parent only when Child has been in the service area of the APRcomponent 210 for at least 5 minutes. A second rule can indicate that aresponse (e.g., 252) is to be sent to Parent when Child leaves theservice area after having been in the service area for more than 10minutes. Thus, where Child forgets their lunch on the way to school andruns back into the house (i.e., the service area) to grab the sack lunchand leave again in less than 5 minutes, a response (e.g., 252) is notsent to Parent. However, when Child returns home (i.e., the servicearea) after school and is there more than five minutes, a response(e.g., 252) can be sent to Parent indicating that Child is home.Further, where Child is home for 10 minutes and then gets a call from afriend to go for a walk, when Child leaves the house (i.e., the servicearea), a response (e.g., 252) can be sent to Parent notifying them thatChild has left.

FIG. 3 illustrates a system 300 that facilitates access to an automaticresponse to a localized input in accordance with the disclosed subjectmatter. System 300 can include APR component 310 that can receive IDI322 from a mobile device. APR component 310 can include a receivingcomponent 320. Receiving component 320 can be configured to receive IDI322. Receiving component 320 can be communicatively coupled to lookupcomponent 330. Lookup component 330 can be configured to receiveinformation related to IDI 322. Lookup component 330 can becommunicatively coupled to data store 370 or 371. Data store 370 or 371can be local, remote, or distributed, and can be repositories forinformation related to IDI 322. As such, information related to IDI 322can be received by lookup component 330 from data store 370 or 371.

APR component 310 can further include result component 340. Resultcomponent can be communicatively coupled to lookup component 330. Resultcomponent 340 can automatically determine a response 352 related to anIDI 322 received at receiving component 320. Result component 340 can becommunicatively coupled to rule component 360. Rule component 360 canfacilitate receiving at least one rule at result component 340. Theautomatically determined response 352 of result component 340 can bebased on an IDI 322, information associated with the IDI 322, or a rulereceived from rule component 360. Result component 340 can becommunicatively coupled to output component 350. Output component 350can be configured to facilitate access to an automatically determinedresponse 352 from result component 340.

In some embodiments, rule component 360 can facilitate receiving rulesrelated to an IDI, such as IDI 322 received at receiving component 320.Further, in some embodiments rule component 360 can include a ruleengine (not illustrated) to facilitate generating rules. These generatedrules can be related to an IDI 322 received at receiving component 320.Moreover, rule component 360 can be coupled to a local, remote, ordistributed data store (not illustrated). Further, rule component can becommunicatively coupled to input component 380.

Input component 380 can be communicatively coupled to target component390. Target component 390 can be embodied in any appropriatelyconfigured target device. A target device can be a cell phone, a tabletcomputer, a laptop, a personal computer, a pager, a vehicle computer,etc. Further, a target device can include legacy devices andtechnologies such as a cell phone enabled to receive a text message,voicemail, push alert, specific ringtone or ringtone pattern, etc.Numerous other target devices and technologies are not explicitlyillustrated for brevity but are to be considered within the scope of thesubject disclosure. Target component 390 can be communicatively coupledto output component 350.

In some embodiments, input component 380 can facilitate interactionbetween target component 390 and rule component 360. This can facilitatedynamically adapting rules or rule selection parameters. Further, thiscan facilitate generation of new rules or deletion of rules. As anon-limiting example, target component 390 can indicate that a rulerelating to an IDI (e.g., 322) for Child is to be added, deleted ormodified. As a second non-limiting example, target component 390 canindicate that no responses (e.g., 352) are to be generated during apredetermined time window, such as a meeting, etc. Numerous otherinteractions by way of input component 380 are not explicitlyillustrated for brevity but are to be considered within the scope of thesubject disclosure.

FIG. 4 is a depiction of a system 400 that facilitates access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure. System 400 can include an IDI source 404, suchas, but not limited to, cell phone, pager, laptop computer, tabletcomputer, smartphone, etc. System 400 can further include APR component410. IDI source 404 can transmit an IDI 422 that can be received by APRcomponent 410. As a non-limiting example, a cell phone or smartphone cantransmit SIM or eSIM identifiers (e.g., IDI 422) to register withwireless communications system equipment, such as a NodeB, Femtocell,microcell, picocell, etc. The exemplary SIM/eSIM identifiers (e.g., IDI422) can be received by APR component 410 to facilitate determining aresponse 452. For example, where IDI source 404 enters the service areaof APR component 410, the IDI 422 can be employed to send a response 452to a target component.

FIG. 5 illustrates a system 500 that can facilitate access to anautomatic response to a localized input received by a femtocell inaccordance with the disclosed subject matter. System 500 can include anIDI source 504, such as, but not limited to, cell phone, pager, laptopcomputer, tablet computer, smartphone, etc. System 500 can furtherinclude APR component 510. APR component 510 can be included infemtocell component 508. Femtocell component 508 can be a small cellularbase station, typically designed for use in a home or small business.Femtocell 508 can connect a service provider network to mobile phones(e.g., IDI sources 504) in a residential setting or enterprise setting.Femtocell 508 can facilitate extending cellular service coverageindoors. Femtocell 508 can employ any appropriate wirelesscommunications standard, such as Global System for Mobile Communication(GSM), long-term evolution (LTE) solutions, etc. IDI source 504 cantransmit an IDI 522 that can be received by femtocell 508 including APRcomponent 510. Femtocell 508 can facilitate access to a response 552generated by APR component 510. For example, femtocell 508 can transmita response 552 based on an IDI 522, IDI 522 received from IDI source504, to a target component.

FIG. 6 is a diagram of an exemplary non-limiting system 600 thatfacilitates access to an automatic response to a localized input for abuilding in accordance with aspects of the subject disclosure. System600 can include Person 602 having cell phone 604 and Person 603 havingcell phone 605. It is to be noted that this example employs cell phones604 and 605 as IDI sources merely for ease of comprehension and that anyIDI source could be substituted without departing from the scope of thesubject disclosure, such as cell phone 604 could just as easily be atablet computer, smartphone, pager, laptop computer, etc.

System 600 can further include building 606. Building 606 can be anybuilding, such as a residential home, an apartment, a condominium, acommercial building, an office, a shop, a factory, etc. Building 606 ispresented merely to illustrate one possible context or use of thesubject disclosure and should not be considered limiting to the subjectdisclosure, which is equally capable of being deployed without anybuilding at all. Building 606 can include femtocell component 608 havinga service area of 609. Femtocell component 608 can include APR component610. The service area of femtocell component 608 can be the same as theservice area of APR component 610.

The service area 609 can be substantially more granular thanconventional cellular phone networks. That is, service area 609 cantypically be associated with a limited geographical area. Further, insome embodiments, service area 609 can be tuned to adjust the size,shape, and location of service area 609 to match or approximate apredetermined geographic area. For example, service area 609 can includebuilding 606 and areas near building 606. As a second example, servicearea 609 can be tuned to include an apartment and to exclude neighboringapartments or apartments above or below, for example by tuning theservice area to be a “flattened sphere” with a circular or ovular crosssection (e.g., an ellipsoid of the equation,

${{\frac{x^{2}}{a^{2}} + \frac{y^{2}}{b^{2}} + \frac{z^{2}}{c^{2}}} = 1},$wherein a=b≠c or a≠b≠c). As a third example, service area 609 can betuned to include predetermined entrances to a shopping mall and toexclude other entrances to the shopping mall. Numerous other examples ofadapting service area 609 to a particular size, shape, or location arenot explicitly illustrated for brevity but are to be considered withinthe scope of the subject disclosure.

Wherein Person 602 with cell phone 604 enters service area 609, an IDI622 can be received by APR component 610 from cell phone 604. Incontrast, where Person 603 with cell phone 605 is beyond the servicearea 609, IDI 623 will not be received by ARP component 610. A response652 to receiving the IDI 622 can be received by a target component, suchas the personal computer of the owner of Building 606. As a non-limitingexample, where building 606 is a residence and APR component 610 hasbeen configured to notify Parent (e.g., target component is one or moredevices of Parent) when Child (e.g., 602) returns home, where Child 602returns home and enters service area 609 associated with home, an IDI622 can be received at APR component 610 from Child's cell phone (e.g.,604) and a response 652, such as “Child Home” can be transmitted toParent's cell phone and email account (e.g., target components). As asecond non-limiting example, where service area 609 is associated with aticketing counter at an airport terminal (e.g., a portion of airportterminal 606), when a ticket holder (e.g., Person 602) has registered acell phone (e.g., 604) with the ticket and the ticket holder 602 arrivesin the service area 609, the IDI 622 from the cell phone 604 can besearched against registered cell phones and a “passenger arrived”response (e.g., response 652) can be received by the airport ticketingcomputer (e.g., a target component). As a third non-limiting example, anemergency room can be covered by service area 609. Doctor and nursepagers (e.g., IDI sources 604) can be registered with APR component 610such that as doctors and nurses (e.g., Persons 602) come on and off duty(e.g., enter and leave the emergency room) a reader board (e.g., targetcomponent) can receive updates to display emergency room staffinginformation. Thus, for example, where a doctor 602 leaves the emergencyroom with a patient to take them to a hospital room, the reader boardcan update that the doctor 602 is not available and when she left theemergency room. Numerous other examples are not explicitly illustratedfor brevity but are to be considered within the scope of the subjectdisclosure.

In view of the example system(s) described above, example method(s) thatcan be implemented in accordance with the disclosed subject matter canbe better appreciated with reference to flowcharts in FIG. 7-FIG. 9. Forpurposes of simplicity of explanation, example methods disclosed hereinare presented and described as a series of acts; however, it is to beunderstood and appreciated that the claimed subject matter is notlimited by the order of acts, as some acts may occur in different ordersand/or concurrently with other acts from that shown and describedherein. For example, one or more example methods disclosed herein couldalternatively be represented as a series of interrelated states orevents, such as in a state diagram. Moreover, interaction diagram(s) mayrepresent methods in accordance with the disclosed subject matter whendisparate entities enact disparate portions of the methodologies.Furthermore, not all illustrated acts may be required to implement adescribed example method in accordance with the subject specification.Further yet, two or more of the disclosed example methods can beimplemented in combination with each other, to accomplish one or moreaspects herein described. It should be further appreciated that theexample methods disclosed throughout the subject specification arecapable of being stored on an article of manufacture (e.g., acomputer-readable medium) to allow transporting and transferring suchmethods to computers for execution, and thus implementation, by aprocessor or for storage in a memory.

FIG. 7 illustrates aspects of a method 700 facilitating access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure. At 710, method 700 can receive an identifierfrom a first user equipment. The first user equipment can be nearly anyuser device that makes identifiable information available to bereceived. The first user equipment can include a cell phone, smartphone,pager, laptop computer, tablet computer, vehicle computer, etc. Theidentifier can be an IDI, and can include nearly any type of identifier,such as a subscriber identity module (SIM) identifier, an electronic SIM(eSIM) identifier, an internet protocol (IP) address, a Media AccessControl (MAC) address, a phone number, a password, a user id, e.g., auser id to log into a computer system, a website, a service, etc., apersonal identification number (PIN), etc. Numerous other examples arenot explicitly recited for brevity but are to be considered within thescope of the present disclosure.

At 740, a response can be determined based on the identifier received.As a non-limiting example, where a tablet computer MAC address isreceived, a response can indicate that that the MAC address wasreceived. At 750, access to the determined response can be facilitated.As a non-limiting example, the response that the MAC address wasreceived can be accessed from a remote personal computer. Numerous otherexamples are not explicitly recited for brevity but are to be consideredwithin the scope of the present disclosure. At this point method 700 canend. Generally, method 700 can be associated with a particular servicearea, such that receiving an identifier is associated with receivingsaid identifier in a particular service area. Further, the service areacan be related to a target of any determined response, such as a homeservice area belonging to an owner of a cell phone that is a target ofautomatically generated responses. As a non-limiting example, method 700can be employed in a femtocell deployed in Subscriber's home.Subscriber's spouse can have a cell phone with a SIM. A response can bedetermined and sent to Subscriber, such as by text message, when thecell phone of spouse enters the service area of Subscriber's femtocell.

FIG. 8 illustrates aspects of a method 800 facilitating access to anautomatic response to a localized input in accordance with aspects ofthe subject disclosure. At 810, method 800 can receive an identifierfrom a first user equipment. The first user equipment can include a cellphone, smartphone, pager, laptop computer, tablet computer, vehiclecomputer, etc. The identifier can be an IDI, and can include nearly anytype of identifier, such as a subscriber identity module (SIM)identifier, an electronic SIM (eSIM) identifier, an internet protocol(IP) address, a Media Access Control (MAC) address, a phone number, apassword, a user id, e.g., a user id to log into a computer system, awebsite, a service, etc., a personal identification number (PIN), etc.Numerous other examples are not explicitly recited for brevity but areto be considered within the scope of the present disclosure.

At 820, information related to the identifier received at 810 can bereceived. The identifier received at 810 can be employed to lookup,access, or receive information relating to the identifier. As anon-limiting example, where a SIM identifier is received, an associatedtelephone number can be accessed from a subscriber account for the SIM,etc. Numerous other examples are not explicitly recited for brevity butare to be considered within the scope of the present disclosure.

At 830, a rule can be received based, at least in part, on theidentifier received at 810 or the information received at 820. Eitherthe identifier or the information can facilitate receiving one or morerules relating to determining a response to receiving the identifier at810. As a non-limiting example, a rule can be accessed based on a SIM ora phone number associated with a SIM. Numerous other examples are notexplicitly recited for brevity but are to be considered within the scopeof the present disclosure.

At 840, a response can be determined based, at least in part, on theidentifier, the information, or the rule received. As a non-limitingexample, where a laptop computer static IP address is received, aresponse can be generated that indicates that that the laptop computeris in the service area. At 850, access to the determined response can befacilitated for a second user equipment. Numerous other examples are notexplicitly recited for brevity but are to be considered within the scopeof the present disclosure. At this point method 800 can end.

FIG. 9 illustrates a method 900 for receiving an automatic response to alocalized input in accordance with aspects of the subject disclosure. At960, method 900 can receive a response at a second user equipment. Theresponse can be based, at least in part on a received identifier,information related to the identifier, or rule related to the identifieror the information. The identifier can be received from a first userequipment. At this point method 900 can end.

An identifier can be received from a first user equipment. The firstuser equipment can include a cell phone, smartphone, pager, laptopcomputer, tablet computer, vehicle computer, etc. The identifier can bean IDI, and can include nearly any type of identifier, such as a SIMidentifier, eSIM identifier, an IP address, a MAC address, a phonenumber, a password, a user id, e.g., a user identifier to log into acomputer system, a website, a service, etc., a PIN, etc. Numerous otherexamples are not explicitly recited for brevity but are to be consideredwithin the scope of the present disclosure.

Information related to the identifier can also be received. Anidentifier can be employed to lookup, access, or receive informationrelating to the identifier. A rule can be received based, at least inpart, on the identifier or the information. Either the identifier or theinformation can facilitate receiving one or more rules relating todetermining a response to receiving the identifier. A response can bedetermined based, at least in part, on the identifier, the information,or the rule received. Access to the determined response can befacilitated from a second user equipment. At 960, a second userequipment can receive the response.

FIG. 10 illustrates a block diagram of an example embodiment of anaccess point to implement and exploit one or more features or aspects ofthe subject innovation. Access point 1000 can be part of acommunications framework, for example, a femtocell (e.g., 508, 608), amicrocell, a picocell, a router, a wireless router, etc. In embodiment1000, AP 1005 can receive and transmit signal(s) (e.g., attachmentsignaling) from and to wireless devices like femtocell access points,access terminals, wireless ports and routers, or the like, through a setof antennas 1020 ₁-1020 _(N) (N is a positive integer). It can be notedthat antennas 1020 ₁-1020 _(N) can be part of communication platform1015, which comprises electronic components and associated circuitrythat provides for processing and manipulation of receivedelectromagnetic signal(s) and electromagnetic signal(s) to betransmitted. Such electronic components and circuitry embody, at leastin part, can comprise signaling and traffic components within acommunication framework. In some embodiments, communication platform1015 can include a receiver/transmitter 1016 that can convert signalfrom analog to digital upon reception, and from digital to analog upontransmission. In addition, receiver/transmitter 1016 can divide a singledata stream into multiple, parallel data streams, or perform thereciprocal operation. Coupled to receiver/transmitter 1016 is amultiplexer/demultiplexer 1017 that facilitates manipulation of signalin time and frequency space. Electronic component 1017 can multiplexinformation (data/traffic and control/signaling) according to variousmultiplexing schemes such as time division multiplexing (TDM), frequencydivision multiplexing (FDM), orthogonal frequency division multiplexing(OFDM), code division multiplexing (CDM), space division multiplexing(SDM). In addition, mux/demux component 1017 can scramble and spreadinformation (e.g., codes) according to substantially any code known inthe art; e.g., Hadamard-Walsh codes, Baker codes, Kasami codes,polyphase codes, and so on. A modulator/demodulator 1018 is also a partof communication platform 1015, and can modulate information accordingto multiple modulation techniques, such as frequency modulation,amplitude modulation (e.g., M-ary quadrature amplitude modulation (QAM),with M a positive integer), phase-shift keying (PSK), and the like.Communication platform 1015 also includes a coder/decoder (codec)component 1019 that facilitates decoding received signal(s), and codingsignal(s) to convey.

Access point 1005 can also include a processor 1035 configured to conferfunctionality, at least in part, to substantially any electroniccomponent in AP 1005. Power supply 1025 can attach to a power grid andinclude one or more transformers to achieve a power level that canoperate AP 1005 components and circuitry. Additionally, power supply1025 can include a rechargeable power component to ensure operation whenAP 1005 is disconnected from the power grid, or in instances, the powergrid is not operating.

Processor 1035 also is functionally connected to communication platform1015 and can facilitate operations on data (e.g., symbols, bits, orchips) for multiplexing/demultiplexing, such as effecting direct andinverse fast Fourier transforms, selection of modulation rates,selection of data packet formats, inter-packet times, etc. Moreover,processor 1035 is functionally connected, via a data or system bus, tocalibration platform 1012 and other components (not shown) to confer, atleast in part functionality to each of such components.

In AP 1005, memory 1045 can store data structures, code instructions andprogram modules, system or device information, code sequences forscrambling, spreading and pilot transmission, location intelligencestorage, determined delay offset(s), over-the-air propagation models,and so on. Processor 1035 is coupled to the memory 1045 in order tostore and retrieve information necessary to operate and/or conferfunctionality to communication platform 1015, calibration platform 1012,and other components (not shown) of access point 1005.

FIG. 11 presents an example embodiment 1100 of a mobile network platform1110 that can implement and exploit one or more aspects of the subjectinnovation described herein. Generally, wireless network platform 1110can include components, e.g., nodes, gateways, interfaces, servers, ordisparate platforms, that facilitate both packet-switched (PS) (e.g.,internet protocol (IP), frame relay, asynchronous transfer mode (ATM))and circuit-switched (CS) traffic (e.g., voice and data), as well ascontrol generation for networked wireless telecommunication. Mobilenetwork platform 1110 includes CS gateway node(s) 1112 which caninterface CS traffic received from legacy networks like telephonynetwork(s) 1140 (e.g., public switched telephone network (PSTN), orpublic land mobile network (PLMN)) or a signaling system #7 (SS7)network 1170. Circuit switched gateway node(s) 1112 can authorize andauthenticate traffic (e.g., voice) arising from such networks.Additionally, CS gateway node(s) 1112 can access mobility, or roaming,data generated through SS7 network 1170; for instance, mobility datastored in a visited location register (VLR), which can reside in memory1130. Moreover, CS gateway node(s) 1112 interfaces CS-based traffic andsignaling and PS gateway node(s) 1118. As an example, in a 3GPP UMTSnetwork, CS gateway node(s) 1112 can be realized at least in part ingateway GPRS support node(s) (GGSN). It should be appreciated thatfunctionality and specific operation of CS gateway node(s) 1112, PSgateway node(s) 1118, and serving node(s) 1116, is provided and dictatedby radio technology(ies) utilized by mobile network platform 1110 fortelecommunication.

In addition to receiving and processing CS-switched traffic andsignaling, PS gateway node(s) 1118 can authorize and authenticatePS-based data sessions with served mobile devices. Data sessions caninclude traffic, or content(s), exchanged with networks external to thewireless network platform 1110, like wide area network(s) (WANs) 1150,enterprise network(s) 1170, and service network(s) 1180, which can beembodied in local area network(s) (LANs), can also be interfaced withmobile network platform 1110 through PS gateway node(s) 1118. It is tobe noted that WANs 1150 and enterprise network(s) 1160 can embody, atleast in part, a service network(s) like IP multimedia subsystem (IMS).Based on radio technology layer(s) available in technology resource(s)1117, packet-switched gateway node(s) 1118 can generate packet dataprotocol contexts when a data session is established; other datastructures that facilitate routing of packetized data also can begenerated. To that end, in an aspect, PS gateway node(s) 1118 caninclude a tunnel interface (e.g., tunnel termination gateway (TTG) in3GPP UMTS network(s) (not shown)) which can facilitate packetizedcommunication with disparate wireless network(s), such as Wi-Finetworks.

In embodiment 1100, wireless network platform 1110 also includes servingnode(s) 1116 that, based upon available radio technology layer(s) withintechnology resource(s) 1117, convey the various packetized flows of datastreams received through PS gateway node(s) 1118. It is to be noted thatfor technology resource(s) 1117 that rely primarily on CS communication,server node(s) can deliver traffic without reliance on PS gatewaynode(s) 1118; for example, server node(s) can embody at least in part amobile switching center. As an example, in a 3GPP UMTS network, servingnode(s) 1116 can be embodied in serving GPRS support node(s) (SGSN).

For radio technologies that exploit packetized communication, server(s)1114 in wireless network platform 1110 can execute numerous applications(e.g., location services, online gaming, wireless banking, wirelessdevice management, IDI response, . . . ) that can generate multipledisparate packetized data streams or flows, and manage (e.g., schedule,queue, format . . . ) such flows. Such application(s) can include add-onfeatures to standard services (for example, provisioning, billing,customer support . . . ) provided by wireless network platform 1110.Data streams (e.g., content(s) that are part of a voice call or datasession) can be conveyed to PS gateway node(s) 1118 forauthorization/authentication and initiation of a data session, and toserving node(s) 1116 for communication thereafter. In addition toapplication server, server(s) 1114 can include utility server(s), autility server can include a provisioning server, an operations andmaintenance server, a security server that can implement at least inpart a certificate authority and firewalls as well as other securitymechanisms, and the like. In an aspect, security server(s) securecommunication served through wireless network platform 1110 to ensurenetwork's operation and data integrity in addition to authorization andauthentication procedures that CS gateway node(s) 1112 and PS gatewaynode(s) 1118 can enact. Moreover, provisioning server(s) can provisionservices from external network(s) like networks operated by a disparateservice provider; for instance, WAN 1150 or Global Positioning System(GPS) network(s) (not shown). Provisioning server(s) can also provisioncoverage through networks associated to wireless network platform 1110(e.g., deployed and operated by the same service provider), such asfemtocell network(s) (not shown, e.g., 508, 608) that enhance wirelessservice coverage within indoor confined spaces and offload RAN resourcesin order to enhance subscriber service experience within a home orbusiness environment.

It is to be noted that server(s) 1114 can include one or more processorsconfigured to confer at least in part the functionality of macro networkplatform 1110. To that end, the one or more processor can execute codeinstructions stored in memory 1130, for example. It is should beappreciated that server(s) 1114 can include a content manager 1115,which operates in substantially the same manner as describedhereinbefore.

In example embodiment 1100, memory 1130 can store information related tooperation of wireless network platform 1110. Other operationalinformation can include provisioning information of mobile devicesserved through wireless platform network 1110, subscriber databases;application intelligence, pricing schemes, e.g., promotional rates,flat-rate programs, couponing campaigns; technical specification(s)consistent with telecommunication protocols for operation of disparateradio, or wireless, technology layers; and so forth. Memory 1130 canalso store information from at least one of telephony network(s) 1140,WAN 1150, enterprise network(s) 1160, or SS7 network 1170. In an aspect,memory 1130 can be, for example, accessed as part of an data storecomponent (e.g., 270, 370, etc.) or as a remotely connected memory store(e.g., 371, etc.), such stored information can be accessed by APRcomponents (e.g., 210, 310, etc.).

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 12, and the following discussion, are intended toprovide a brief, general description of a suitable environment in whichthe various aspects of the disclosed subject matter can be implemented.While the subject matter has been described above in the general contextof computer-executable instructions of a computer program that runs on acomputer and/or computers, those skilled in the art will recognize thatthe subject innovation also can be implemented in combination with otherprogram modules. Generally, program modules include routines, programs,components, data structures, etc. that perform particular tasks and/orimplement particular abstract data types.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

By way of illustration, and not limitation, nonvolatile memory, forexample, can be included in APR component 210, 310, etc., memory 1045,memory 1130, non-volatile memory 1222 (see below), disk storage 1224(see below), and memory storage 1246 (see below). Further, nonvolatilememory can be included in read only memory (ROM), programmable ROM(PROM), electrically programmable ROM (EPROM), electrically erasable ROM(EEPROM), or flash memory. Volatile memory can include random accessmemory (RAM), which acts as external cache memory. By way ofillustration and not limitation, RAM is available in many forms such assynchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM),double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), SynchlinkDRAM (SLDRAM), and direct Rambus RAM (DRRAM). Additionally, thedisclosed memory components of systems or methods herein are intended tocomprise, without being limited to comprising, these and any othersuitable types of memory.

Moreover, those skilled in the art will appreciate that the disclosedsubject matter can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, mini-computing devices, mainframe computers, as well aspersonal computers, hand-held computing devices (e.g., PDA, phone,watch, tablet computers, . . . ), microprocessor-based or programmableconsumer or industrial electronics, and the like. The illustratedaspects can also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network; however, some if not all aspects ofthe subject disclosure can be practiced on stand-alone computers. In adistributed computing environment, program modules can be located inboth local and remote memory storage devices.

FIG. 12 illustrates a block diagram of a computing system 1200 operableto execute the disclosed systems and methods in accordance with anembodiment. Computer 1212 (which can be, for example, part of thehardware of a femtocell (e.g., 508, 608, etc.), APR component (e.g.,110, 210, etc.), . . . ) includes a processing unit 1214, a systemmemory 1216, and a system bus 1218. System bus 1218 couples systemcomponents including, but not limited to, system memory 1216 toprocessing unit 1214. Processing unit 1214 can be any of variousavailable processors. Dual microprocessors and other multiprocessorarchitectures also can be employed as processing unit 1214.

System bus 1218 can be any of several types of bus structure(s)including a memory bus or a memory controller, a peripheral bus or anexternal bus, and/or a local bus using any variety of available busarchitectures including, but not limited to, Industrial StandardArchitecture (ISA), Micro-Channel Architecture (MSA), Extended ISA(EISA), Intelligent Drive Electronics, VESA Local Bus (VLB), PeripheralComponent Interconnect (PCI), Card Bus, Universal Serial Bus (USB),Advanced Graphics Port (AGP), Personal Computer Memory CardInternational Association bus (PCMCIA), Firewire (IEEE 1194), and SmallComputer Systems Interface (SCSI).

System memory 1216 includes volatile memory 1220 and nonvolatile memory1222. A basic input/output system (BIOS), containing routines totransfer information between elements within computer 1212, such asduring start-up, can be stored in nonvolatile memory 1222. By way ofillustration, and not limitation, nonvolatile memory 1222 can includeROM, PROM, EPROM, EEPROM, or flash memory. Volatile memory 1220 includesRAM, which acts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as SRAM, dynamic RAM(DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM),enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus direct RAM(RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM(RDRAM).

Computer 1212 also includes removable/non-removable,volatile/non-volatile computer storage media. FIG. 12 illustrates, forexample, disk storage 1224. Disk storage 1224 includes, but is notlimited to, devices like a magnetic disk drive, floppy disk drive, tapedrive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memorystick. In addition, disk storage 1224 can include storage mediaseparately or in combination with other storage media including, but notlimited to, an optical disk drive such as a compact disk ROM device(CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RWDrive) or a digital versatile disk ROM drive (DVD-ROM). To facilitateconnection of the disk storage devices 1224 to system bus 1218, aremovable or non-removable interface is typically used, such asinterface 1226.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

It is to be appreciated that FIG. 12 describes software that acts as anintermediary between users and computer resources described in suitableoperating environment 1200. Such software includes an operating system1228. Operating system 1228, which can be stored on disk storage 1224,acts to control and allocate resources of computer system 1212. Systemapplications 1230 take advantage of the management of resources byoperating system 1228 through program modules 1232 and program data 1234stored either in system memory 1216 or on disk storage 1224. It is to beappreciated that the disclosed subject matter can be implemented withvarious operating systems or combinations of operating systems.

A user can enter commands or information, e.g., by way of a mobiledevice such as a cell phone, smartphone, tablet computer, etc., intocomputer 1211 through input device(s) 1236. Input devices 1236 include,but are not limited to, a pointing device such as a mouse, trackball,stylus, touch pad, keyboard, microphone, joystick, game pad, satellitedish, scanner, TV tuner card, digital camera, digital video camera, webcamera, cell phone, smartphone, tablet computer, etc. These and otherinput devices connect to processing unit 1214 through system bus 1218 byway of interface port(s) 1238. Interface port(s) 1238 include, forexample, a serial port, a parallel port, a game port, a universal serialbus (USB), an infrared port, a Bluetooth port, an IP port, or a logicalport associated with a wireless service, etc. Output device(s) 1240 usesome of the same type of ports as input device(s) 1236.

Thus, for example, a USB port can be used to provide input to computer1212 and to output information from computer 1212 to an output device1240. Output adapter 1242 is provided to illustrate that there are someoutput devices 1240 like monitors, speakers, and printers, among otheroutput devices 1240, which use special adapters. Output adapters 1242include, by way of illustration and not limitation, video and soundcards that provide means of connection between output device 1240 andsystem bus 1218. It should be noted that other devices and/or systems ofdevices provide both input and output capabilities such as remotecomputer(s) 1244.

Computer 1212 can operate in a networked environment using logicalconnections to one or more remote computers, such as remote computer(s)1244. Remote computer(s) 1244 can be a personal computer, a server, arouter, a network PC, a workstation, a microprocessor based appliance, apeer device, or other common network node and the like, and typicallyincludes many or all of the elements described relative to computer1212.

For purposes of brevity, only a memory storage device 1246 isillustrated with remote computer(s) 1244. Remote computer(s) 1244 islogically connected to computer 1212 through a network interface 1248and then physically connected by way of communication connection 1250.Network interface 1248 encompasses wire and/or wireless communicationnetworks such as local-area networks (LAN) and wide-area networks (WAN).LAN technologies include Fiber Distributed Data Interface (FDDI), CopperDistributed Data Interface (CDDI), Ethernet, Token Ring and the like.WAN technologies include, but are not limited to, point-to-point links,circuit switching networks like Integrated Services Digital Networks(ISDN) and variations thereon, packet switching networks, and DigitalSubscriber Lines (DSL). As noted below, wireless technologies may beused in addition to or in place of the foregoing.

Communication connection(s) 1250 refer(s) to hardware/software employedto connect network interface 1248 to bus 1218. While communicationconnection 1250 is shown for illustrative clarity inside computer 1212,it can also be external to computer 1212. The hardware/software forconnection to network interface 1248 can include, for example, internaland external technologies such as modems, including regular telephonegrade modems, cable modems and DSL modems, ISDN adapters, and Ethernetcards.

The above description of illustrated embodiments of the subjectdisclosure, including what is described in the Abstract, is not intendedto be exhaustive or to limit the disclosed embodiments to the preciseforms disclosed. While specific embodiments and examples are describedherein for illustrative purposes, various modifications are possiblethat are considered within the scope of such embodiments and examples,as those skilled in the relevant art can recognize.

In this regard, while the disclosed subject matter has been described inconnection with various embodiments and corresponding Figures, whereapplicable, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiments for performing the same, similar, alternative, or substitutefunction of the disclosed subject matter without deviating therefrom.Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the appended claims below.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising, but not limited to comprising, single-core processors;single-processors with software multithread execution capability;multi-core processors; multi-core processors with software multithreadexecution capability; multi-core processors with hardware multithreadtechnology; parallel platforms; and parallel platforms with distributedshared memory. Additionally, a processor can refer to an integratedcircuit, an application specific integrated circuit (ASIC), a digitalsignal processor (DSP), a field programmable gate array (FPGA), aprogrammable logic controller (PLC), a complex programmable logic device(CPLD), a discrete gate or transistor logic, discrete hardwarecomponents, or any combination thereof designed to perform the functionsdescribed herein. Processors can exploit nano-scale architectures suchas, but not limited to, molecular and quantum-dot based transistors,switches and gates, in order to optimize space usage or enhanceperformance of user equipment. A processor may also be implemented as acombination of computing processing units.

In the subject specification, terms such as “store,” “storage,” “datastore,” data storage,” “database,” and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can include both volatile andnonvolatile memory.

As used in this application, the terms “component,” “system,”“platform,” “layer,” “selector,” “interface,” and the like are intendedto refer to a computer-related entity or an entity related to anoperational apparatus with one or more specific functionalities, whereinthe entity can be either hardware, a combination of hardware andsoftware, software, or software in execution. As an example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration and not limitation, both anapplication running on a server and the server can be a component. Oneor more components may reside within a process and/or thread ofexecution and a component may be localized on one computer and/ordistributed between two or more computers. In addition, these componentscan execute from various computer readable media having various datastructures stored thereon. The components may communicate via localand/or remote processes such as in accordance with a signal having oneor more data packets (e.g., data from one component interacting withanother component in a local system, distributed system, and/or across anetwork such as the Internet with other systems via the signal). Asanother example, a component can be an apparatus with specificfunctionality provided by mechanical parts operated by electric orelectronic circuitry, which is operated by a software or firmwareapplication executed by a processor, wherein the processor can beinternal or external to the apparatus and executes at least a part ofthe software or firmware application. As yet another example, acomponent can be an apparatus that provides specific functionalitythrough electronic components without mechanical parts, the electroniccomponents can include a processor therein to execute software orfirmware that confers at least in part the functionality of theelectronic components.

In addition, the term “or” is intended to mean an inclusive “or” ratherthan an exclusive “or.” That is, unless specified otherwise, or clearfrom context, “X employs A or B” is intended to mean any of the naturalinclusive permutations. That is, if X employs A; X employs B; or Xemploys both A and B, then “X employs A or B” is satisfied under any ofthe foregoing instances. Moreover, articles “a” and “an” as used in thesubject specification and annexed drawings should generally be construedto mean “one or more” unless specified otherwise or clear from contextto be directed to a singular form.

Moreover, terms like “user equipment (UE),” “mobile station,” “mobile,”subscriber station,” “subscriber equipment,” “access terminal,”“terminal,” “handset,” and similar terminology, refer to a wirelessdevice utilized by a subscriber or user of a wireless communicationservice to receive or convey data, control, voice, video, sound, gaming,or substantially any data-stream or signaling-stream. The foregoingterms are utilized interchangeably in the subject specification andrelated drawings. Likewise, the terms “access point (AP),” “basestation,” “Node B,” “evolved Node B (eNode B),” “home Node B (HNB),”“home access point (HAP),” and the like, are utilized interchangeably inthe subject application, and refer to a wireless network component orappliance that serves and receives data, control, voice, video, sound,gaming, or substantially any data-stream or signaling-stream to and froma set of subscriber stations or provider enabled devices. Data andsignaling streams can include packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,”“prosumer,” “agent,” and the like are employed interchangeablythroughout the subject specification, unless context warrants particulardistinction(s) among the terms. It should be appreciated that such termscan refer to human entities or automated components (e.g., supportedthrough artificial intelligence, as through a capacity to makeinferences based on complex mathematical formalisms), that can providesimulated vision, sound recognition and so forth.

Aspects, features, or advantages of the subject matter can be exploitedin substantially any, or any, wired, broadcast, wirelesstelecommunication, radio technology or network, or combinations thereof.Non-limiting examples of such technologies or networks include Geocasttechnology; broadcast technologies (e.g., sub-Hz, ELF, VLF, LF, MF, HF,VHF, UHF, SHF, THz broadcasts, etc.); Ethernet; X.25; powerline-typenetworking (e.g., PowerLine AV Ethernet, etc.); femtocell technology;Wi-Fi; Worldwide Interoperability for Microwave Access (WiMAX); EnhancedGeneral Packet Radio Service (Enhanced GPRS); Third GenerationPartnership Project (3GPP or 3G) Long Term Evolution (LTE); 3GPPUniversal Mobile Telecommunications System (UMTS) or 3GPP UTMS; ThirdGeneration Partnership Project 2 (3GPP2) Ultra Mobile Broadband (UMB);High Speed Packet Access (HSPA); High Speed Downlink Packet Access(HSDPA); High Speed Uplink Packet Access (HSUPA); GSM Enhanced Data Ratefor GSM Evolution (EDGE) Radio Access Network (RAN) or GERAN; UMTSTerrestrial Radio Access Network (UTRAN); or LTE Advanced.

What has been described above includes examples of systems and methodsillustrative of the disclosed subject matter. It is, of course, notpossible to describe every combination of components or methodologieshere. One of ordinary skill in the art may recognize that many furthercombinations and permutations of the claimed subject matter arepossible. Furthermore, to the extent that the terms “includes,” “has,”“possesses,” and the like are used in the detailed description, claims,appendices and drawings such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: receivingproximity information related to a proximity of a first user equipmentto an access point device; receiving account information associated withthe first user equipment in response to the first user equipment beingdetermined to satisfy a temporal rule related to an elapsed time duringwhich the first user equipment is determined to have satisfied aboundary condition with respect to a zone corresponding to a servicearea of the access point device; receiving consumer identificationinformation based on the account identification information;determining, in response to the consumer identification informationsatisfying an identity condition of an identity rule, notificationinformation based on the proximity information, wherein the rulemeasures a level of similarity between configurable consumer identityinformation and the account information; and facilitating access to thenotification information by a second user equipment.
 2. The system ofclaim 1, wherein the boundary condition relates to the first userequipment transitioning the zone corresponding to the service area ofthe access point device.
 3. The system of claim 1, wherein the boundarycondition relates to a time that the first user equipment has beendetermined to have occupied the zone corresponding to the service areaof the access point device.
 4. The system of claim 1, wherein theboundary condition relates to a number of times the first user equipmenthas been determined to have transitioned the zone corresponding to theservice area of the access point device.
 5. The system of claim 1,wherein the operations further comprise determining a notificationpriority based on the consumer identification information.
 6. The systemof claim 5, wherein the operations further comprise facilitating accessto the notification information for a third user equipment based on thenotification priority.
 7. The system of claim 6, wherein thefacilitating the access of the notification information by the seconduser equipment comprises selecting a process from defined processes foraccess of information of the system based on the notification priority.8. The system of claim 7, wherein the defined processes compriseelectronic messaging.
 9. The system of claim 7, wherein the definedprocesses comprise email messaging.
 10. The system of claim 7, whereinthe defined processes comprise telephone calling.
 11. The system ofclaim 7, wherein the defined processes comprise interaction via a website hosted by a web site server device.
 12. The system of claim 1,wherein the identity rule relates to determining that a portion of theaccount information matches another portion of the configurable consumeridentification information.
 13. The system of claim 12, wherein theportion of the account information comprises a variation of a spellingof a name associated with the other portion of the configurable consumeridentification information.
 14. A method, comprising: receiving, by adevice comprising a processor, proximity information related to aproximity of a first user equipment to an access point device;receiving, by the device, account information associated with the firstuser equipment in response to the first user equipment being determinedto have satisfied a temporal rule related to an elapsed time over whichthe first user equipment is determined to satisfy a boundary conditionwith respect to a zone corresponding to a service area of the accesspoint device; receiving, by the device, consumer identificationinformation based on the account identification information; determiningby the device, in response to the consumer identification informationbeing determined to have satisfied an identity condition of an identityrule, notification priority information based on the proximityinformation, wherein the rule determines corresponding informationbetween a consumer profile associated with configurable consumeridentity information and the account information; and facilitating, bythe device, access to notification information by a second userequipment based on the notification priority information.
 15. The methodof claim 14, wherein the receiving the account information is inresponse to the first user equipment being determined to havetransitioned the zone corresponding to the service area of the accesspoint device.
 16. The method of claim 14, wherein the receiving theaccount information is in response to the first user equipment beingdetermined to occupy the zone corresponding to the service area of theaccess point device for a defined period of time.
 17. The method ofclaim 14, wherein the receiving the consumer identification informationcomprises determining that a first portion of the account informationmatches a second portion of the consumer profile.
 18. The method ofclaim 17, wherein the first portion of the account information comprisesa variation of a spelling of a name associated with the second portionof the consumer profile.
 19. A device, comprising: a processor; and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: receivingproximity information related to a proximity of a first user equipmentto an access point device; receiving account information associated withthe first user equipment in response to the first user equipment beingdetermined to have satisfied a temporal rule related to an elapsed timeaccording to which the first user equipment is determined to satisfy aboundary condition with respect to a zone corresponding to a servicearea of the access point device; receiving consumer identificationinformation based on a portion of the account identification informationbeing determined to be same as another portion of a consumer profileassociated with the consumer identification information; in response tothe consumer identification information satisfying an identity conditionof an identity rule, determining notification priority information basedon the proximity information, wherein the rule relates to configurableconsumer identity information; and facilitating access to notificationinformation by a second user equipment based on the notificationpriority information.
 20. The mobile device of claim 19, wherein thefacilitating the access comprises selecting a technology, based on thenotification priority information, from technologies related toaccessing the notification information by the second user equipment.