Patent classifications
H04M17/00
METHOD AND APPARATUS FOR PROVIDING A PRE-PAID SERVICE IN A CELLULAR COMMUNICATION NETWORK
The present disclosure generally relates to wireless communication technology. More particularly, the present disclosure relates to a method for providing a pre-paid service in a cellular communication network. The present disclosure also relates to apparatus and computer program product adapted for the same purpose. According to one embodiment, a method for providing a pre-paid service in a cellular communication network includes the following steps carried out at a first node: sending to a second node a request for subscribing to an event where resources for one of a group of subscribers have run out; and in response to a message on occurrence of the event from the second node, sending to a terminal device using the resources a notification that the resources have run out, wherein the first node is a node for application function (AF), and the second node is a node for exposing network capabilities and events.
Controlling communications
Apparatuses and methods for controlling communication of a user terminal in a communication system are provided. The solution comprises determining that a data connection of an access point name or data network name of the user terminal does not fulfil a predetermined condition, and transmitting to a network unit maintaining information on subscriber information of users of the network a message on the basis of determination, the message indicating the access point name or data network name of the user terminal is to be deactivated or the data connection of the access point name or data network name is to be directed to a predetermined server.
Wireless Service Card Having Machine Readable Codes and Device and Process for Use Therewith
A process for authorizing wireless service includes providing a generally rectangular flat form factor card having a first surface and opposing second surface. The process further includes providing a machine-readable activation code arranged on the first surface, wherein the machine-readable activation code is configured to authorize the wireless service when provided to a system associated with a wireless service provider, receiving the machine-readable activation code in a server, the machine-readable activation code being captured by a wireless device, and provisioning the wireless service to the wireless device from a wireless network when the machine-readable activation code is provided to the system associated with the wireless network.
FEATURE MANAGEMENT OF A COMMUNICATION DEVICE
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
FEATURE MANAGEMENT OF A COMMUNICATION DEVICE
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
Inserting value into customer account at point of sale using a customer account identifier
A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
Inserting value into customer account at point of sale using a customer account identifier
A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
Method and apparatus for threat identification through analysis of communications signaling events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
Use of ESIM profiles
Use of embedded subscriber identity modules, eSIM, profiles: compiling a list of geographical locations for a predetermined period in future, and communicating wirelessly the list and the predetermined period to a service provider before the predetermined period; detecting a home wireless network, and downloading wirelessly a set of eSIM profiles into one or more eSIM chips of a mobile from the service provider before the predetermined period; using the set of the eSIM profiles for wireless service in one or more geographical locations of the list during the predetermined period; and detecting the home wireless network after the predetermined period, and removing the set of the eSIM profiles from the one or more eSIM chips.
AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.