Patent 11991601
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Active provider: Google · gemini-2.5-pro
Derivative works
Defensive disclosure: derivative variations of each claim designed to render future incremental improvements obvious or non-novel.
Defensive Disclosure and Prior Art Generation
RE: U.S. Patent 11,991,601 “Wireless messaging method and server”
Publication Date: May 13, 2026
This document serves as a defensive publication of derivative concepts and technical variations related to the art described in U.S. Patent 11,991,601 (hereafter 'the '601 patent'). The purpose is to place these concepts into the public domain, thereby establishing them as prior art to preclude future patenting of these or similar obvious variations by third parties. The disclosures herein build upon the core method of dynamic bearer selection for messaging based on recipient subscriber status, as outlined in the claims of the '601 patent.
Section 1: Derivative Works Based on Core Method (Claim 1)
The core method involves a mobile device downloading a client, authenticating via SMS, and then dynamically selecting between a packet-switched bearer (e.g., WLAN) for fellow subscribers and a circuit-switched bearer (SMS/EMS) for non-subscribers.
1.1. Material & Component Substitution
Derivative 1.1.1: USSD-Based Authentication and Status Check
- Enabling Description: The authentication process, instead of using the SMS protocol, utilizes Unstructured Supplementary Service Data (USSD). When the client program is first launched, it generates a unique device identifier and sends a USSD message (e.g.,
*123*<auth_identifier>#) to a service number. The messaging server receives this request in real-time via the mobile network's HLR/VLR, authenticates the device's phone number (MSISDN) instantly, and adds it to the subscriber list. Subsequent checks for a recipient's status are also performed via a USSD query, which provides a synchronous, low-latency response indicating subscriber status without consuming the user's SMS inbox. This is more efficient for machine-to-machine checks than the store-and-forward nature of SMS. - Mermaid Diagram:
sequenceDiagram participant Client as Mobile Client participant MSC as Mobile Switching Center participant Server as Messaging Server Client->>MSC: Initiate USSD Session (*123*AuthID#) MSC->>Server: Forward USSD Request (MSISDN, AuthID) Server->>Server: Validate AuthID, Add MSISDN to Subscribers Server-->>MSC: USSD Response (Success) MSC-->>Client: Display/Process USSD Response Client->>MSC: Initiate USSD Query (*124*RecipientMSISDN#) MSC->>Server: Forward USSD Query Server->>Server: Check Subscriber List for RecipientMSISDN Server-->>MSC: USSD Response (Is_Subscriber: true/false) MSC-->>Client: Process Response to Select Bearer
Derivative 1.1.2: Data Transport Using Protocol Buffers over QUIC
- Enabling Description: The message content sent over the packet-switched bearer is not formatted as an XML ASCII string but is instead serialized using Google's Protocol Buffers (Protobuf). This provides a more compact and efficient binary format, reducing latency and bandwidth consumption. The transport protocol used is QUIC (Quick UDP Internet Connections) instead of TCP. This further reduces connection establishment latency and provides multiplexing without head-of-line blocking, making it superior for real-time messaging, especially on mobile networks with frequent connection interruptions. The fallback to SMS/EMS for non-subscribers remains unchanged.
- Mermaid Diagram:
graph TD A[Message Content Generation] --> B{Serialize with Protobuf}; B --> C[Establish QUIC Session]; C --> D[Transmit Protobuf Datagrams]; D --> E[Recipient Client]; E --> F{Deserialize Protobuf}; F --> G[Display Message];
1.2. Operational Parameter Expansion
Derivative 1.2.1: High-Frequency M2M Communication in Vehicular Networks
- Enabling Description: The messaging method is applied to a Vehicle-to-Everything (V2X) network at an industrial scale. Each vehicle acts as a "mobile wireless device." The "client program" is embedded in the vehicle's Telematics Control Unit (TCU). Vehicles subscribe to a central traffic management service. When a vehicle needs to send a critical safety message (e.g., "hard braking event"), it queries the recipient vehicle's status. If the recipient is a subscriber with an active 5G URLLC (Ultra-Reliable Low-Latency Communication) connection (the packet-switched bearer), the message is sent as a rich data packet containing precise GPS coordinates, deceleration curves, and LIDAR point-cloud data. If the recipient vehicle is not a subscriber or is only reachable via a legacy DSRC (Dedicated Short-Range Communications) or C-V2X on a 4G network (the "SMS bearer" equivalent), the TCU formats a basic, standardized safety message with only the event type and location.
- Mermaid Diagram:
stateDiagram-v2 state "Vehicle A (Sender)" as A state "Vehicle B (Recipient)" as B [*] --> A A --> CheckRecipient: Hard Braking Event state CheckRecipient <<fork>> CheckRecipient --> Subscriber: If B is on 5G URLLC CheckRecipient --> NonSubscriber: If B is on legacy DSRC/4G Subscriber --> SendRichData: Send full sensor data via 5G NonSubscriber --> SendBasicAlert: Send standardized alert via DSRC SendRichData --> B SendBasicAlert --> B B --> [*]
1.3. Cross-Domain Application
Derivative 1.3.1: Aerospace - Satellite Constellation Tasking
- Enabling Description: The method is used for communication between a ground station and a constellation of Earth observation satellites. The "client" is on the ground station. When a new imaging task is submitted, the ground station must command a specific satellite. It first checks the satellite's status with a constellation management server. If the satellite is capable and has an active high-bandwidth Ka-band link (the packet-switched bearer), the server sends a detailed command packet including precise orbital adjustments, sensor calibration settings, and a complex imaging schedule. If the satellite is in a power-saving mode or only has a low-bandwidth S-band telemetry link available (the SMS bearer equivalent), the ground station sends a highly compressed, essential command (e.g., "Image_Grid_XYZ_Now") which the satellite's onboard system expands using pre-stored parameters.
- Mermaid Diagram:
sequenceDiagram participant GroundStation participant ConstellationManager participant Satellite GroundStation->>ConstellationManager: Query Satellite Status (ID: Sat-01) ConstellationManager-->>GroundStation: Response (Status: Active, Link: Ka-Band) GroundStation->>Satellite: Send Detailed Tasking Packet (Ka-Band) alt Satellite S-Band Only GroundStation->>ConstellationManager: Query Satellite Status (ID: Sat-02) ConstellationManager-->>GroundStation: Response (Status: Low Power, Link: S-Band) GroundStation->>Satellite: Send Compressed Command (S-Band) end
Derivative 1.3.2: AgTech - Smart Irrigation System
- Enabling Description: The system manages communication between a central farm server and various irrigation controllers in fields. The farm server checks if a specific controller is a "subscriber" to the farm's private LoRaWAN network (the packet-switched bearer). If so, it sends a detailed irrigation schedule with variable flow rates based on real-time soil moisture sensor data. If a controller is older or in a location only covered by public cellular IoT networks like NB-IoT or LTE-M (the SMS bearer equivalent), the server sends a simple on/off command with a fixed duration, which is less efficient but ensures basic functionality. The authentication is done when a new controller is installed, sending its hardware ID via an NB-IoT message to register with the server.
- Mermaid Diagram:
graph TD subgraph Farm Server A[New Schedule] --> B{Check Controller Status}; end subgraph Field Controller C[Controller X] D[Controller Y] end B -- LoRaWAN Subscriber --> E[Format Rich LoRaWAN Packet]; E --> C; B -- NB-IoT Only --> F[Format Simple NB-IoT SMS]; F --> D; C --> G[Execute Variable Flow Schedule]; D --> H[Execute Simple On/Off];
1.4. Integration with Emerging Tech
Derivative 1.4.1: AI-Optimized Predictive Bearer Selection
- Enabling Description: The client program integrates a lightweight, on-device machine learning model. Instead of querying the server for every message, the model predicts the recipient's subscriber status and likely network availability based on historical communication patterns, time of day, user location (with consent), and current network performance telemetry. The model outputs a probability score for packet-switched success. If the score is above a configurable threshold (e.g., 95%), the client sends the message via the packet-switched bearer without a preliminary check, reducing latency. If the score is low, it defaults to SMS. The model is continuously updated (federated learning) based on the actual success/failure of message deliveries, improving its accuracy over time.
- Mermaid Diagram:
flowchart LR A[Compose Message] --> B[Input to ML Model: Recipient, Time, Location]; B --> C{Predict PS_Success_Prob}; C -- Prob > 0.95 --> D[Send via Packet-Switched]; C -- Prob <= 0.95 --> E[Send via SMS Bearer]; D --> F{Delivery Success?}; E --> F; F -- Yes/No --> G[Update On-Device ML Model];
Derivative 1.4.2: Blockchain-Managed Decentralized Subscriber List
- Enabling Description: The subscriber list is not maintained by a central server but on a permissioned blockchain (e.g., Hyperledger Fabric). When a user authenticates, a transaction is written to the distributed ledger, mapping their phone number's hash to their public key and subscriber status. To check a recipient's status, the client program queries a node of the blockchain. This provides a tamper-proof, decentralized, and auditable record of subscribers, removing the single point of failure and control of a central server. Messages on the packet-switched bearer can be encrypted using the recipient's public key retrieved from the ledger.
- Mermaid Diagram:
sequenceDiagram participant ClientA as Sending Client participant BlockchainNode participant ClientB as Receiving Client ClientA->>BlockchainNode: Query hash(ClientB_PhoneNumber) BlockchainNode-->>ClientA: Return Record {is_subscriber: true, pub_key: '...'} ClientA->>ClientA: Encrypt message with ClientB_pub_key ClientA->>ClientB: Send encrypted packet-switched message
1.5. The "Inverse" or Failure Mode
Derivative 1.5.1: Graceful Degradation to Ad-Hoc Mesh Network
- Enabling Description: When the client program cannot connect to the central messaging server to verify a recipient's status (due to a server outage or lack of internet), it enters a "degraded" mode. In this mode, it uses local peer-to-peer networking technologies like Wi-Fi Aware or Bluetooth Mesh to discover other clients in the vicinity. It broadcasts a Bloom filter containing the hashes of its intended recipients' phone numbers. Nearby clients check this filter against their own number's hash. If there's a match, the recipient's client responds, and a direct device-to-device link is established for packet-switched messaging, bypassing both the server and the cellular network. If no peer is found after a timeout, the client falls back to sending a standard SMS.
- Mermaid Diagram:
stateDiagram-v2 state "Online" as Online state "Degraded" as Degraded state "P2P Discovery" as P2P state "SMS Fallback" as SMS [*] --> Online Online --> Degraded: Server Unreachable Degraded --> P2P: Initiate P2P Broadcast P2P --> Degraded: Peer Found, Direct Connection P2P --> SMS: Timeout, No Peer Found Degraded --> Online: Server Reachable Again SMS --> Online: Server Reachable Again
Section 2: Combination with Open-Source Standards
Combination 2.1: Integration with RCS Universal Profile
- Enabling Description: The subscriber check mechanism of the '601 patent is implemented as a proprietary capability extension within the open Rich Communication Services (RCS) standard. A standard RCS client, upon initiating a chat with a contact, performs the standard SIP OPTIONS query to determine RCS capabilities. In addition, it performs a background HTTPS query to the '601 patent's server to check for "premium subscriber" status. If the recipient is a premium subscriber, the client enables an extension in the
application/vnd.gsma.rcs-ft-http+xmlmessage body, allowing it to send proprietary, interactive objects (e.g., polls, payment requests) that are rendered by the recipient's client. If the recipient is only a standard RCS user, these options are disabled, and only standard RCS features (chat, file transfer) are used. If the user has no RCS capabilities, the client falls back to SMS as per the standard. - Mermaid Diagram:
sequenceDiagram participant SenderClient participant RCSServer participant ProprietaryServer participant RecipientClient SenderClient->>RCSServer: SIP OPTIONS for Recipient RCSServer-->>SenderClient: Standard RCS Capabilities SenderClient->>ProprietaryServer: HTTPS GET /status?id=Recipient ProprietaryServer-->>SenderClient: {is_premium: true} SenderClient->>RecipientClient: RCS Message with Proprietary Payload
Combination 2.2: Federation via XMPP (Jabber) with SMS Gateway
Enabling Description: The packet-switched messaging backbone is implemented using the open and federated XMPP (Extensible Messaging and Presence Protocol) standard. Each user's identifier is their phone number mapped to a JID (Jabber ID), e.g.,
+15551234567@messaging.com. When a user sends a message, the client first attempts to resolve the recipient's JID via standard XMPP server-to-server federation. If the recipient's server is found and the user is online, the message is delivered via XMPP. If the JID is not resolvable or the user is offline (as per XMPP presence), the sender's XMPP server (acting as the "message server" from the '601 patent) forwards the message to an integrated SMS gateway, which then delivers the content as a standard SMS to the recipient's phone number. The initial authentication is also handled by the XMPP server, which sends an SMS with a one-time code to verify ownership of the phone number before creating the JID.Mermaid Diagram:
graph TD ClientA[Client A] --> ServerA[Server A (XMPP)]; ServerA --> B{Recipient JID Resolvable?}; B -- Yes --> ServerB[Recipient Server B (XMPP)]; ServerB --> ClientB[Client B]; B -- No --> SMSGW[SMS Gateway]; SMSGW --> C[Deliver as SMS to Phone Number];
Combination 2.3: End-to-End Encryption using the Signal Protocol
- Enabling Description: The method from the '601 patent is combined with the open-source Signal Protocol for end-to-end encryption. The message server, in addition to storing subscriber status, also acts as a key distribution server, storing users' public pre-keys, as is standard in Signal Protocol implementations. When a client checks a recipient's status and confirms they are a subscriber, it also fetches the recipient's public key bundle from the server. It then establishes an encrypted session using Signal's Double Ratchet Algorithm and sends the message payload over the packet-switched bearer. The server only sees encrypted blobs and cannot read the message content. If the recipient is not a subscriber, the client falls back to sending the message as a standard, unencrypted SMS or EMS message, explicitly warning the user that the communication is not secure.
- Mermaid Diagram:
sequenceDiagram participant ClientA participant Server participant ClientB ClientA->>Server: Get status & key bundle for ClientB alt Subscriber Server-->>ClientA: {is_subscriber: true, keys: [...]} ClientA->>ClientA: Establish Signal Protocol Session ClientA->>ClientB: Send E2E Encrypted Message else Not a Subscriber Server-->>ClientA: {is_subscriber: false} ClientA->>ClientA: Display "Unsecure SMS" Warning ClientA->>ClientB: Send Plaintext SMS Message end
Generated 5/13/2026, 12:33:26 AM