Patent classifications
H04M1/66
System and method for capturing data sent by a mobile device
Data can originate from at least one device. The data can be received by at least one network element corresponding to a network. The data can be sent over the network by the at least one device. The data can be analyzed to determine a presence of one or more keywords or key phrases in the data received. A determination can be performed to determine whether or not to filter or block the data. The data can be blocked or filtered according to the determination.
System and method for capturing data sent by a mobile device
Data can originate from at least one device. The data can be received by at least one network element corresponding to a network. The data can be sent over the network by the at least one device. The data can be analyzed to determine a presence of one or more keywords or key phrases in the data received. A determination can be performed to determine whether or not to filter or block the data. The data can be blocked or filtered according to the determination.
Identifiers in a wireless communication system
A method performed by a resolver in a core network of a wireless communication system, where the method comprise: receiving, from a requester in the core network, a request to resolve a provided identifier that is one of a subscription identifier and a pseudonym identifier serving in the core network as a pseudonym for the subscription identifier; and transmitting, to the requester as a response to the request, a resolved identifier that is the other of the subscription identifier and the pseudonym identifier.
SPAMMER LOCATION DETECTION
The described technology is generally directed towards spammer location detection, and in particular, to locating a spammer that makes multiple calls from a given location via a cellular communications network. In some examples, network equipment can obtain call trace records associated with the multiple calls, identify a group of call trace records based on a shared call trace feature, aggregate data from call trace records within the group, and determine an estimated location based on the aggregated data.
SPAMMER LOCATION DETECTION
The described technology is generally directed towards spammer location detection, and in particular, to locating a spammer that makes multiple calls from a given location via a cellular communications network. In some examples, network equipment can obtain call trace records associated with the multiple calls, identify a group of call trace records based on a shared call trace feature, aggregate data from call trace records within the group, and determine an estimated location based on the aggregated data.
System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.
Communication apparatus, method for controlling communication apparatus, and storage medium
There is provided a communication apparatus. A first communication unit receives an advertise signal from an external apparatus. A second communication unit wirelessly communicates with the external apparatus by using a predetermined protocol. A control unit determines whether the external apparatus supports the predetermined protocol on the basis of the advertise signal from the external apparatus. If it is determined that the external apparatus does not support the predetermined protocol, the control unit performs control so that a request to start encrypted communication is sent to the external apparatus via the first communication unit. If it is determined that the external apparatus supports the predetermined protocol, the control unit performs control so that a request to start unencrypted communication is sent to the external apparatus via the first communication unit.
Methods and systems for providing enterprise services to wearable and mobile devices
Methods and systems are provided for enhancing communications mobility in an enterprise using a distributed communication controller. The distributed communication controller identifies a user device, verifies the device and delivers enterprise communication services to the user via the user device without requiring the execution of an enterprise communication application by the wearable device. When the user device is a wearable device, a wireless message is sent from the wearable device in physical proximity to the distributed communication controller that contains identification information. Based on the identification information, user information associated with the user of the user device is retrieved and then used to determine whether enterprise communication services are available for the user. Next, the user is verified through an interaction with the user device and the distributed communication controller and the enterprise communication services are provided to the user by the distributed communication controller.
Methods and systems for providing enterprise services to wearable and mobile devices
Methods and systems are provided for enhancing communications mobility in an enterprise using a distributed communication controller. The distributed communication controller identifies a user device, verifies the device and delivers enterprise communication services to the user via the user device without requiring the execution of an enterprise communication application by the wearable device. When the user device is a wearable device, a wireless message is sent from the wearable device in physical proximity to the distributed communication controller that contains identification information. Based on the identification information, user information associated with the user of the user device is retrieved and then used to determine whether enterprise communication services are available for the user. Next, the user is verified through an interaction with the user device and the distributed communication controller and the enterprise communication services are provided to the user by the distributed communication controller.
Apparatus and method for access control on eSIM
The present disclosure relates to a communication technique that combines a 5G communication system for supporting a data rate that is higher than that of a beyond 4G system with IoT technology, and a system thereof. The present disclosure may be applied to intelligent services on the basis of 5G communication technology and IoT related technology, such as smart home, smart building, smart city, smart car or connected car, health care, digital education, retail, security and safety related services. More specifically, the present disclosure relates to an apparatus and a method in which a terminal performs communication connection by downloading and installing a communication service in a communication system.