H04M15/39

Techniques to transform network resource requests to zero rated network requests

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

RESTORING FUNCTIONALITY OF A MOBILE DEVICE
20170230515 · 2017-08-10 ·

A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.

PACKET-SWITCHED CORE NETWORK ARCHITECTURE FOR VOICE SERVICES ON SECOND- AND THIRD- GENERATION WIRELESS ACCESS NETWORKS
20170222821 · 2017-08-03 ·

Communications systems and methods with an evolved packet-switched core network architecture to enable voice services on second- and third- generation wireless access networks. The systems and methods permit unmodified 2G and 3G mobile devices to conduct voice calls using conventional circuit-switched user-plane and control-plane protocols at the air interface while the voice calls are switched at the back-end using a packet-switched core network. The system may include a translation module at a controller component that is configured to provide both user-plane and control-plane translation functions between an unmodified 2G/3G mobile device that utilizes circuit-switched protocols for a voice call and the packet-switched core network that utilizes packet-switched protocols to switch the voice call.

METHOD AND DEVICE FOR CONTROLLING USE OF EXTERNAL DATA NETWORK VIA MOBILE ACCESS POINT
20170223606 · 2017-08-03 ·

A method and a device for controlling external data network use via a mobile Access Point (AP) are provided. A host device set as the mobile AP determines whether a data-less mode is set, blocks a client device from using the external data network via the mobile AP, if the data-less mode is set, and permits the client device to use the external data network via the mobile AP, if the data-less mode is released. A client device connected to a mobile AP determines whether a data-less mode is set for a host device set as the mobile AP, if the client device is connected to the host device in a state of being connected to a wireless data network, maintains the connection to the wireless data network, if the data-less mode is set, and releases the connection to the wireless data network, if the data-less mode is released.

MANAGING LIVE VIDEO STREAM CONNECTIONS AND DATA USAGE

Exemplary embodiments of the present disclosure are related to minimize data usage over a costly or slow communication link, this method allows a camera to stream only when a user or a plurality of users are actively watching the video. When the user(s) are not watching the video stream the stream is terminated preventing any further data usage on the metered data connection. The system may also include a user device and a back-end network with a stream manager service. The stream manager service terminates streaming over a wireless channel by an application of the user device when the user device determines one of inactivity of a user of the user device with the application or navigation on the user device away from the application.

Techniques for zero rating through web reconstruction

Techniques for zero rating through web reconstruction are described. In one embodiment, an apparatus may comprise a client access component operative to receive a web request from a client device, the web request for a web page hosted on a network server device; and transmit a zero-rating transformed web page to the client device in response to the web request; and a web reconstruction component operative on the processor circuit to retrieve the web page from the network server device; identify one or more non-zero-rated resource references in the retrieved web page; transform the one or more non-zero-rated resource references to form one or more zero-rated resource references; and replace the one or more non-zero-rated resource references with the one or more zero-rated resource references in the web page to form the zero-rating transformed web page. Other embodiments are described and claimed.

Device and Method for Implementing Data Service
20170155772 · 2017-06-01 ·

A device and a method for implementing a data service in order to avoid generating an unnecessary data usage fee for user equipment (UE) and further avoid data usage waste after a data service switch of the UE is turned off. The method includes determining, by a first network-side device, a status of a data service switch of UE, and sending, by the first network-side device, a first notification message to a second network-side device when the data service switch of the UE is turned off, where the UE is already registered with a network, the first notification message includes first instruction information and an identity of the UE, and the first instruction information instructs the second network-side device to skip charging for data packets of the UE flowing through the second network-side device.

TECHNIQUES TO TRANSFORM NETWORK RESOURCE REQUESTS TO ZERO RATED NETWORK REQUESTS

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

DETECTION AND BLOCKING OF CLONED MOBILE DEVICES

A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.

Method and device for controlling use of external data network via mobile access point

A method and a device for controlling external data network use via a mobile Access Point (AP) are provided. A host device set as the mobile AP determines whether a data-less mode is set, blocks a client device from using the external data network via the mobile AP, if the data-less mode is set, and permits the client device to use the external data network via the mobile AP, if the data-less mode is released. A client device connected to a mobile AP determines whether a data-less mode is set for a host device set as the mobile AP, if the client device is connected to the host device in a state of being connected to a wireless data network, maintains the connection to the wireless data network, if the data-less mode is set, and releases the connection to the wireless data network, if the data-less mode is released.