Patent classifications
H04M17/00
System and method for distributing personal identification numbers over a computer network
The present invention comprises a system and method for managing an inventory of PINs in a PIN distribution network. The distribution network includes a hub coupled to a one or more servers and each of the servers is coupled to at least one client terminal. The system includes a hub for dynamically allocating PINs of the inventory among the servers so as to substantially maintain a quantity of PINs at each server at a desired level for each server. Additionally, the hub acquires additional PINs in response to at least one PIN in the inventory being distributed to at least one user from at least one of the client terminals. In variations, the hub maintains centralized databases and synchronizes the centralized databases with corresponding databases at each server.
System and method for distributing personal identification numbers over a computer network
The present invention comprises a system and method for managing an inventory of PINs in a PIN distribution network. The distribution network includes a hub coupled to a one or more servers and each of the servers is coupled to at least one client terminal. The system includes a hub for dynamically allocating PINs of the inventory among the servers so as to substantially maintain a quantity of PINs at each server at a desired level for each server. Additionally, the hub acquires additional PINs in response to at least one PIN in the inventory being distributed to at least one user from at least one of the client terminals. In variations, the hub maintains centralized databases and synchronizes the centralized databases with corresponding databases at each server.
Inserting value into customer account at point of sale using a customer account identifier
A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
Inserting value into customer account at point of sale using a customer account identifier
A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
System and Process for Implementing a Virtual Airtime Card for Wireless Services
A wireless service provider system for authorizing wireless service on a wireless device, where the wireless device includes a processor configured to implement a virtual airtime card application, a camera configured to capture an image of an airtime card code, and the processor further configured to implement the virtual airtime card application to generate a virtual airtime card based on the image of the airtime card code.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Wireless Service Provider System for Selling and/or Activating Wireless Services for a Wireless Device
A method and system for the purchase and activation of services on a wireless device are provided. The method and system include the use of an airtime card with a near field communication tag with a unique identifier code used to improve a user's experience and ease of activation/provisioning of services for the wireless device. In some aspects, the unique identifier may be generated during the activation and purchase of the wireless service and it is not required that the unique identifier code be recorded in a backend system of the wireless provider prior to activation. The services to be purchased and activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, data, and/or SMS enrollments or data content.
System and Method for Dynamically Providing Communication Profiles for Mobile Devices
The mobile device stores a plurality of communication profiles comprising one or more local communication profiles and a global communication profile. The mobile device determines local access requirements for connecting to a local cellular network operator and determines whether the plurality of communication profiles comprises a local communication profile that satisfies the local access requirements. When the plurality of communication profiles does not comprise a local communication profile that satisfies the local access requirements: the mobile device connects to a global cellular network operator using the global communication profile; receives, from the global cellular network operator, a new local communication profile that satisfies the local access requirements and connects to the local cellular network operator using the new local communication profile. Subsequently, the mobile device communicates with another device via the local cellular network operator as if the mobile device was a local mobile device.
System and method for provisioning temporary telephone numbers
Systems, methods, and computer program products for provisioning a temporary disposable number are described. A user can be provided with a pool of available temporary disposable numbers that have a limited shelf life. The user can select one of the available temporary disposable numbers while submitting a permanent phone number associated with a communications device (e.g., mobile phone, home phone, business phone, etc.). Prior to activating the selected temporary disposable number, the temporary disposable number is linked to the permanent phone number. After activation, when an incoming call to the temporary disposable number is received, the permanent phone number is identified to be associated with the temporary disposable number being called. The incoming call is then forwarded to the communications device on which the permanent phone number is established.
METHOD AND APPARATUS FOR PROVIDING A PRE-PAID SERVICE IN A CELLULAR COMMUNICATION NETWORK
The present disclosure generally relates to wireless communication technology. More particularly, the present disclosure relates to a method for providing a pre-paid service in a cellular communication network. The present disclosure also relates to apparatus and computer program product adapted for the same purpose. According to one embodiment, a method for providing a pre-paid service in a cellular communication network includes the following steps carried out at a first node: sending to a second node a request for subscribing to an event where resources for one of a group of subscribers have run out; and in response to a message on occurrence of the event from the second node, sending to a terminal device using the resources a notification that the resources have run out, wherein the first node is a node for application function (AF), and the second node is a node for exposing network capabilities and events.