H04M15/39

Packet data connectivity control with volume charged service limitation

A node of a wireless communication network (150; 160; 170; 210; 220; 230; 240) receives an indication from a user equipment (10). The indication indicates that a limitation of volume charged packet data services is required for the user equipment (10). Depending on the received indication, the node (150; 160; 170; 210; 220; 230; 240) prevents transmission of packet data associated with the volume charged packet data services and allows transmission of packet data associated with one or more other packet data services.

Blocked Device Checking in Roaming Scenarios
20180098264 · 2018-04-05 ·

In certain cellular communication systems, a roaming communication device may attempt to establish a connection with a visited wireless communication network. Before allowing the connection, the visited network may check to see whether the International Mobile Equipment Identity (IMEI) of the device has been listed in an Equipment Identity Register (EIR) as being blocked, and may refuse the connection if the IMEI is listed as being blocked. In addition, when the home network of the device receives a request to authorize usage of the device, the home network may also check its own EIR to determine whether the IMEI has been blocked. If the IMEI has been blocked in the EIR of the home network, the home network indicates to the visited network that the connection should be refused.

METHOD AND SYSTEM TO CONTROL EXPENSE AND USAGE OF SUBSCRIPTIONS IN A MOBILE DEVICE
20180020100 · 2018-01-18 ·

A system to control usage of a subscription in a mobile device comprising: a plurality of subscriptions of at least two or more mobile networks; a subscription profile associated with each subscription; a UICC/eUICC/USIM/SIM card capable of switching among different networks; an applet running on the said SIM card; a server which communicates with the said mobile device through a network interface; a server process which stores identity and network related data of each subscription profile; stores network territory and coverage map; stores history of network drops and subscription profile switch events; stores quota-price-validity-bandwidth attached to each subscription profile; connects to the networks providing the subscription profile periodically, to retrieve, calculate and store actual usage and outstanding quota and validity for SMS, data and minutes for each subscription profile; connects to the SIM applet to receive information from the applet about network loss and network coverage; determines and stores best network, preferred network, and available network periodically; and communicates and commands the SIM card applet to initiate selection of subscription based on available quota, validity and coverage.

Protocols for facilitating broader access in wireless communications

Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a communication device (smartphone or wearable device, e.g.) or other wireless communication participant (motor vehicle having a wireless communication capability, e.g.).

Techniques to transform network resource requests to zero rated network requests

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

TECHNIQUES TO TRANSFORM NETWORK RESOURCE REQUESTS TO ZERO RATED NETWORK REQUESTS

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

Detection of a delinquent mobile device

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

Transmission of location and directional information associated with mobile communication devices
09807563 · 2017-10-31 · ·

A method and arrangement for providing location information of a called mobile communication device to a calling party are implemented through a mobile device locator platform disposed in the communication network. A mobile device subscriber to the location service initiates a process where the location of his mobile device is updated on a regular basis and the location information stored in a database on the platform. When a call is placed to his subscribed device, the location information is transmitted to the calling party prior to setting up the call to the called device, allowing the calling party to determine whether or not to proceed with the call, as well as eliminating the need to ask the common question where are you? when placing a call to a mobile device.

COMMUNICATIONS METHODS AND APPARATUS RELATED TO WEB INITIATED SESSIONS
20170289261 · 2017-10-05 ·

A client device, e.g., a smartphone including a web browser, requests a call authorization token from a web server, e.g., a web page server. The web server, acting on behalf of a company, whose web page is hosted and whose phone corresponds to the called party, screens incoming requests and decides whether or not to issue an authorization token, e.g., a signed token including an encrypted portion. The web server issues a call authorization token and communicate the issued token to the client device. The client device includes the received issued call authorization token in a signal, e.g., a SIP INVITE signal, which it generates and sends to a session border controller (SBC). The session border controller processes the received authorization token and checks the authorization token to validate the received token. The SBC establishes a communications session if the received token passes the validation check.

Techniques for zero rating through redirection

Techniques for zero rating through redirection are described. In one embodiment, an apparatus may comprise a client proxy component operative to receive a proxy network packet from a local gateway application on a client device, the proxy network packet containing an application network packet for delivery to a network server device; and forward the application network packet to the network server device based on a determination that a local user application is authorized to use the proxy server device; and a proxy access component operative on the processor circuit to determine that the application network packet is associated with the local user application on the client device; and determine that the local user application is authorized to use the proxy server device. Other embodiments are described and claimed.