scispace - formally typeset
Search or ask a question
Author

Irah H. Donner

Bio: Irah H. Donner is an academic researcher. The author has contributed to research in topics: Mobile device & Event (computing). The author has an hindex of 1, co-authored 1 publications receiving 242 citations.

Papers
More filters
Patent
05 Jan 2005
TL;DR: In this paper, the authors present a method, system, server architecture and/or tangible medium to determine and establish communication with a mobile device user, which includes, for example, receiving a communication from, or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication.
Abstract: A method, system, server architecture and/or tangible medium determines and/or transmits and/or establishes communication with a mobile device user. The method includes, for example, receiving a communication from and/or transmitting a communication to, an event customer, and optionally updating a database to reflect the communication. The method also includes obtaining at least one mobile address, e.g., a telephone number and a communication network used thereon by the event user and building a data address therefrom to establish the communication with the event user. In one embodiment, the method does not require the event user to provide a bbnetwork address associated with the mobile contact address. Various optional embodiments are disclosed.

242 citations


Cited by
More filters
Patent
29 Mar 2004
TL;DR: In this article, the authors present a system providing one or more users with a private personal network formed from contacts with one or several entities known directly or indirectly to the user and allow a user to apply a selective interaction with the entities for a predetermined activity by controlling the entities to be included according to their degree of separation from the user.
Abstract: The present invention provides a system providing one or more users with a private personal network formed from contacts with one or more entities known directly or indirectly to the user and allows a user to apply a selective interaction with the entities for a predetermined activity by controlling the entities to be included according to their degree of separation from the user.

557 citations

Patent
12 Oct 2010
TL;DR: In this article, the authors proposed a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device's hardware identification information, thus forming a majority of hardware instruction interpretations.
Abstract: Embodiments provide a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device's hardware identification information, thus forming a plurality of hardware instruction interpretations. The embodiment also combines each of the plurality of hardware instruction interpretations and hashes the combination to form a quasi-hardware device identifier. An encryption process is based on the quasi-hardware encryption device identifier and the media is then encrypted using the encryption process. The encrypted media is transferred to the mobile device wherein the mobile device decrypts the media based at least in part on the mobile device's internal knowledge of the quasi-hardware device identification.

528 citations

Patent
13 Dec 2007
TL;DR: In this article, the authors present a method and system for delivery of content on a mobile media platform, providing an automated tag processing facility, and delivering content to a mobile device, wherein content delivery is based at least in part on the automatic tag processing.
Abstract: In embodiments, the present invention provides a method and system for delivery of content on a mobile media platform, providing an automated tag processing facility, and delivering content to a mobile device, wherein content delivery is based at least in part on the automated tag processing.

448 citations

Patent
25 May 2011
TL;DR: In this article, a device assisted service (DAS) for protecting network capacity is provided, which includes monitoring a network service usage activity of the communications device in network communication and classifying the network service activity for differential network access control for protecting the network capacity.
Abstract: Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.

400 citations