Method of Triggering Location Based Events in a User Equipment
First Claim
1. A method performed by a user equipment, comprising the steps of:
- receiving at least one network cell-identity from a first server host,storing the at least one received network cell-identity in a database in the user equipment,obtaining a current network cell-identity to which the user equipment currently is connected,comparing the current network cell-identity with network cell-identities stored in the database, andretrieving content associated with the current network cell-identity if the current network cell-identity is among the network cell-identities stored in the database.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, a user equipment, a server host, a client application, computer program products, and a server computer program. These methods and components can be utilized by a location based service. One method regards triggering of events in the user equipment based on a position of the user equipment, comprising the steps of:—looking up, in a server database at least one network cell-identity associated with a predefined geographical area,—sending the network cell-identity to the user equipment,—storing the network cell-identity in a database in the user equipment,—obtaining a current network cell-identity to which the user equipment currently is connected,—comparing in the user equipment the current network cell-identity with network cell-identities stored in the database, and—retrieving content associated with the current network cell-identity if the current network cell identity is among the network cell-identities in the database.
-
Citations
61 Claims
-
1. A method performed by a user equipment, comprising the steps of:
-
receiving at least one network cell-identity from a first server host, storing the at least one received network cell-identity in a database in the user equipment, obtaining a current network cell-identity to which the user equipment currently is connected, comparing the current network cell-identity with network cell-identities stored in the database, and retrieving content associated with the current network cell-identity if the current network cell-identity is among the network cell-identities stored in the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client application comprising computer readable code means which when run on a user equipment causes the user equipment to:
-
receive at least one network cell-identity from a first server host, store the at least one received network cell-identity in a database in the user equipment, obtain a current network cell-identity to which the user equipment currently is connected, compare the current network cell-identity with network cell-identities stored in the database, and retrieve content associated with the current network cell-identity if the current network cell-identity is among the network cell-identities stored in the database. - View Dependent Claims (10)
-
-
11. A method performed by a user equipment, comprising the steps of:
-
receiving from a first server host at least one cryptographically hashed network cell-identity cryptographically hashed according to a cryptographic hash function, storing the at least one cryptographically hashed network cell-identity in a database in the user equipment, obtaining a current network cell-identity to which the user equipment currently is connected, generating a cryptographically hashed current network cell-identity by cryptographically hashing the current network cell-identity according to the cryptographic hash function, comparing the cryptographically hashed current network cell-identity with cryptographically hashed network cell-identities stored in the database, and retrieving content associated with the cryptographically hashed current network cell-identity if the cryptographically hashed current network cell-identity is among the cryptographically hashed network cell-identities stored in the database. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A client application comprising computer readable code means which when run on a user equipment causes the user equipment to:
-
receive from a first server host at least one cryptographically hashed network cell-identity cryptographically hashed according to a cryptographic hash function, store the at least one cryptographically hashed network cell-identity in a database in the user equipment, obtain a current network cell-identity to which the user equipment currently is connected, generate a cryptographically hashed current network cell-identity by cryptographically hashing the current network cell-identity according to the cryptographic hash function, compare the cryptographically hashed current network cell-identity with cryptographically hashed network cell-identities stored in the database, and retrieve content associated with the cryptographically hashed current network cell-identity if the cryptographically hashed current network cell-identity is among the cryptographically hashed network cell-identities stored in the database. - View Dependent Claims (20)
-
-
21. A method performed by a first server host in a communications network, comprising the steps of
looking up, in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receiving from the server database the at least one network cell-identity, and sending the at least one network cell-identity to a user equipment together with content associated with the at least one network cell-identity.
-
25. A server computer program comprising computer readable code means which when run on a first server host connectable to a user equipment causes the first server host to:
-
look up, in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receive from the server database the at least one network cell-identity, and send the at least one network cell-identity to a user equipment together with content associated with the at least one network cell-identity. - View Dependent Claims (26)
-
-
27. A method performed by a first server host in a communications network, comprising the steps of:
-
looking up, in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receiving from the server database the network cell-identity, generating a cryptographically hashed network cell-identity by cryptographically hashing the network cell-identity according to a cryptographic hash function, and sending the cryptographically hashed network cell-identity to a user equipment together with content associated with the network cell-identity. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A server computer program comprising computer readable code means which when run on a first server host connectable to a user equipment causes the first server host to:
-
look up, in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receiving from the server database the network cell-identity, generating at a cryptographically hashed network cell-identity by cryptographically hashing the network cell-identity according to a cryptographic hash function, and sending the cryptographically hashed network cell-identity to a user equipment together with content associated with the network cell-identity. - View Dependent Claims (33)
-
-
34. A user equipment comprising:
-
receiving means configured to receive at least one network cell-identity from a first server host, a database configured to store the received at least one network cell-identity, obtaining means configured to obtain a current network cell-identity to which the user equipment currently is connected, comparing means configured to compare the current network cell-identity with network cell-identities stored in the database, and retrieving means configured to retrieve content associated with the current network cell-identity if the current network cell-identity is among the network cell-identities stored in the database. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A user equipment comprising:
-
receiving means for receiving from a first server host at least one cryptographically hashed network cell-identity cryptographically hashed according to a cryptographic hash function, a database configured to store the at least one cryptographically hashed network cell-identity, obtaining means configured to obtain a current network cell-identity to which the user equipment currently is connected, hashing means configured to generate a cryptographically hashed current network cell-identity by cryptographically hashing the current network cell-identity according to the cryptographic hash function, comparing means configured to compare the cryptographically hashed current network cell-identity with cryptographically hashed network cell-identities stored in the database, and retrieving means configured to retrieve content associated with the cryptographically hashed current network cell-identity if the cryptographically hashed current network cell-identity is among the cryptographically hashed network cell-identities stored in the database. - View Dependent Claims (45, 46, 47, 48, 49, 50)
-
-
51. A first server host adapted for being connected to a communications network, comprising:
-
lookup means configured to look up in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, first receiving means configured to receive from the server database the at least one network cell-identity, and sending means configured to send the at least one network cell-identity to a user equipment together with content associated with the at least one network cell-identity. - View Dependent Claims (52, 53, 54)
-
-
55. A first server host adapted for being connected to a communications network, comprising:
-
lookup means configured to look up in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, first receiving means configured to receive from the server database the network cell-identity, cryptographic hashing means configured to generate at a cryptographically hashed network cell-identity by cryptographically hashing the network cell-identity according to a cryptographic hash function, and sending means configured to send the cryptographically hashed network cell-identity to a user equipment together with content associated with the network cell-identity. - View Dependent Claims (56, 57, 58, 59)
-
-
60. A method of triggering events in a user equipment based on a geographical position of the user equipment, comprising the steps of:
-
looking up, in a server database, which may be comprised in the first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receiving in the first server host the at least one network cell-identity from the server database, sending from the first server host the at least one network cell-identity to the user equipment, receiving in the user equipment the at least one network cell-identity, storing the at least one received network cell-identity in a database in the user equipment, obtaining in the user equipment a current network cell-identity to which the user equipment currently is connected, comparing in the user equipment the current network cell-identity with network cell-identities stored in the database, and retrieving in the user equipment content associated with the current network cell-identity if the current network cell-identity is among the network cell-identities stored in the database.
-
-
61. A method of triggering events in a user equipment based on a geographical position of the user equipment, comprising the steps of:
-
looking up, in a server database, which may be comprised in a first server host or a second server host, at least one network cell-identity associated with a predefined geographical area, receiving in the first server host the network cell-identity from the server database, generating in the first server host a cryptographically hashed network cell-identity by cryptographically hashing the network cell-identity according to a cryptographic hash function, sending the cryptographically hashed network cell-identity from the first server host to the user equipment, receiving in the user equipment the cryptographically hashed network cell-identity, storing the cryptographically hashed network cell-identity in a database in the user equipment, obtaining in the user equipment a current network cell-identity to which the user equipment currently is connected, generating in the user equipment an cryptographically hashed current network cell-identity by cryptographically hashing the current network cell-identity according to the cryptographic hash function, comparing the cryptographically hashed current network cell-identity with cryptographically hashed network cell-identities stored in the database, and retrieving in the user equipment content associated with the cryptographically hashed current network cell-identity if the cryptographically hashed current network cell-identity is among the cryptographically hashed network cell-identities stored in the database.
-
Specification