Patent classifications
H04M15/47
Secure remote user device unlock
A device unlock application on a user device may interact with a server to automatically carrier unlock the user device. The server may receive a carrier unlock request for a user device. The server may determine one or more verifications to be performed based at least on a unlock scenario requested by the carrier unlock request. The server may perform the one or more verifications to determine whether the user device is eligible for a carrier unlock. The server may send a unlock command to the user device in response to determining that the user device is eligible for the carrier unlock. The unlock command may disable a comparison of a device carrier code of the user device to a subscriber identity module (SIM) carrier code stored in a SIM card of the user device.
LOGGING SYSTEM FOR BLACKLISTING URLS IN TOLL-FREE DATA SERVICE
A method, a device, and a non-transitory storage medium that stores instructions to load a first web page; scan each embedded uniform resource locator (URL) of the first web page; select each embedded uniform resource locator (URL) that is signed to indicate support of a toll-free data service; transmit each signed embedded URL to a first network device; receive, from the first network device, at least one replacement URL; render the first web page using the at least one replacement URL; receive a user input via one of the at least one replacement URL; load a second web page in response to the user input; scan the second web page for an embedded URL; determine whether the second web page includes at least one unsigned embedded URL; and transmit to a second network device, blacklist data that includes the at least one unsigned embedded URL.
Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
System and method of associating and transferring financially valuable information recorded against an unregistered mobile phone number to a new mobile phone number
A system and method of associating and transferring financially valuable information recorded against an unregistered mobile phone number with an external identifier comprising the external identifier; an application program; at least one originating communications device having an unregistered mobile phone number assigned thereto; and at least one replacement communications device having a separate mobile phone number assigned thereto, the application program automatically obtains the external identifier and operates to direct at least one third party who holds financially valuable information recorded against at least one of the unregistered mobile phone numbers allocated to the at least one originating communications device to associate such financially valuable information with the external identifier; and where the application program directs the at least one third party to transfer the financially valuable information associated with the unregistered mobile phone number to the separate mobile phone number.
COMMUNICATION DATA ACCOUNT PROCESSING METHOD AND DEVICE THEREOF
A communication data account processing method is disclosed. The method includes: establishing a communication data account associated with a terminal user for the terminal user, and storing communication data resource information corresponding to the communication data account; receiving an operation instruction of the terminal user for the communication data account, the operation instruction including a mobile communication identifier; identifying a communication service provider corresponding to the mobile communication identifier; establishing a connection with a system interface of the communication service provider, and sending the mobile communication identifier and the operation instruction of the user to the system interface of the communication service provider; receiving response information of the system interface of the communication service provider; and performing an operation on the communication data account according to the response information. By using the present disclosure, a data allotment can be transferred conveniently without suffering any limitation due to an operator.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MANAGING SUSPECT SUBSCRIBER BINDINGS
Methods, systems, and computer readable media for managing suspect subscriber bindings. In some examples, a method is performed by a Diameter signaling router (DSR) for a telecommunications network. The method includes binding a subscriber to a first policy and charging rules function (PCRF) server selected from a plurality of PCRF servers for the telecommunications network. The method includes determining that one or more messages destined to the first PCRF server have failed according to one or more user-configurable rules defining failure. The method includes tearing down the binding between the subscriber and the first PCRF server.
Fraud detection on a communication network
A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.
Method and apparatus for verifying the correctness of a roaming account balance
This application discloses a roaming charging method and apparatus. A blockchain network stores information related to roaming fee settlement, to reduce a possibility that the information related to roaming fee settlement is tampered with. In addition, a digital signature algorithm is used to sign roaming service statistics to generate an abstract, to further prevent the roaming service statistics from being tampered with. In this way, when a home carrier verifies a roaming account balance by using the roaming service statistics and a roaming charging rule, accuracy of a verification result can be ensured, and the home carrier can obtain an accurate roaming fee of a user.
Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.
Mapping item categories to ambiguous queries by geo-location
A method, system, and article of manufacture for disambiguating ambiguous queries based on location information. The system receives a query and location information for where the query was transmitted. Business information is requested from a GPS service. Based on the business information, a plurality of item categories are constrained to an item category related to the business information that satisfies the query. The constrained item category is sent to the user. The system may detect the absence of an item category related to the business information that satisfies the query, and may then determine one or more item category that does not meet the query but is related to the business information, to provide to the user. Other information related to the transmission of the query, such as the type of device, background audio, and the activity of the user, may used to constrain the plurality of item categories.