Patent classifications
H04M15/10
Method for resource reservation executed by a network element of a mobile communication network for a communication connection between a mobile device and a communication destination
A method for resource reservation executed by a network element of a mobile communication network for a communication connection between a mobile device and a communication destination includes: receiving a request for establishing the communication connection between the mobile device and the communication destination originating from an application of the mobile device; determining the type of application requesting the communication connection between the mobile device and the communication destination; estimating the required Quality of Service (QoS) for the requested communication connection with respect to the upload and/or download requirements under consideration of the type of application requesting the communication connection between the mobile device and the communication destination; checking whether the communication connection between the mobile device and the communication destination can provide the estimated required QoS; and reserving if possible the resources for the communication connection between the mobile device and the communication destination to provide the required QoS.
SYSTEMS AND METHODS TO CUSTOMIZE THE PRESENTATION OF PROMPTS TO ESTABLISH COMMUNICATION CONNECTIONS
Methods and apparatuses to selectively present and customize user prompts in establishing anonymized communication connections, based on available information about the parties to be connected and/or user preferences. For example, the information can be transmitted from a mobile device to a connection server for association with the communication reference of the mobile device in response to an input from the user of the mobile device. The association is configured to expire after a predetermined period of time. During the predetermined period of time, if a connection server receives a call from the mobile device, the information associated with the communication reference of the mobile device is used to customize the interactive voice response prompts for further connecting the call to a service provider.
SYSTEMS AND METHODS TO CUSTOMIZE THE PRESENTATION OF PROMPTS TO ESTABLISH COMMUNICATION CONNECTIONS
Methods and apparatuses to selectively present and customize user prompts in establishing anonymized communication connections, based on available information about the parties to be connected and/or user preferences. For example, the information can be transmitted from a mobile device to a connection server for association with the communication reference of the mobile device in response to an input from the user of the mobile device. The association is configured to expire after a predetermined period of time. During the predetermined period of time, if a connection server receives a call from the mobile device, the information associated with the communication reference of the mobile device is used to customize the interactive voice response prompts for further connecting the call to a service provider.
Systems and methods to customize the presentation of prompts to establish communication connections
Methods and apparatuses to selectively present and customize user prompts in establishing anonymized communication connections, based on available information about the parties to be connected and/or user preferences. For example, the information can be transmitted from a mobile device to a connection server for association with the communication reference of the mobile device in response to an input from the user of the mobile device. The association is configured to expire after a predetermined period of time. During the predetermined period of time, if a connection server receives a call from the mobile device, the information associated with the communication reference of the mobile device is used to customize the interactive voice response prompts for further connecting the call to a service provider.
Systems and methods to customize the presentation of prompts to establish communication connections
Methods and apparatuses to selectively present and customize user prompts in establishing anonymized communication connections, based on available information about the parties to be connected and/or user preferences. For example, the information can be transmitted from a mobile device to a connection server for association with the communication reference of the mobile device in response to an input from the user of the mobile device. The association is configured to expire after a predetermined period of time. During the predetermined period of time, if a connection server receives a call from the mobile device, the information associated with the communication reference of the mobile device is used to customize the interactive voice response prompts for further connecting the call to a service provider.
METHOD AND SYSTEM FOR MANAGING COMMUNICATION SERVICES USE OF A MOBILE COMMUNICATIONS UNIT
Disclosed is a method for managing the use by a wireless communications unit including a SIM card of wireless communications routed via a gateway node, a charging server and a BSS, which gateway node categorizes communication services into a set of access types. The BSS provides a digital communications interface, accepting requests from third parties regarding the access to services of specific types to the user, a session is initiated between the unit and the gateway, pertaining to a certain access type, the gateway queries the charging server and the BSS regarding the availability of the certain access type, the BSS provides to the charging server and the gateway such information based upon the requests, the gateway provides access to the service, and the gateway provides information to the charging server and the BSS regarding service usage.
Blocking Unsolicited Calls from CallerID-Spoofing Autodialing Devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Blocking Unsolicited Calls from CallerID-Spoofing Autodialing Devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Systems and Methods of Split Billing
A method includes receiving input during execution of a first application at an electronic device. The input indicates that data usage of the electronic device is to be billed to a first data usage account of a plurality of data usage accounts associated with the electronic device. The method further includes generating a request during execution of a second application at the electronic device. The method also includes, based on the input, encapsulating, by the electronic device, the request to generate an encapsulated request that identifies a destination endpoint provisioned for the first data usage account. The method further includes transmitting the encapsulated request from the electronic device to a network element.
Monitoring and combining mobile device data and vehicle use records
The inappropriate use of a mobile device and/or a motor vehicle may be ameliorated through audit by a supervisor, parent or peer using a system that monitors vehicle movements and mobile device use and notifies the supervisor, parent or peer of potentially inappropriate use, such as simultaneous vehicle and mobile device use, use of the mobile device generally at times when such use is normally inappropriate according to a calendar of events, and use of the motor vehicle generally at a location or at a time and location that is normally inappropriate.