Patent classifications
H04M15/51
INTERMEDIARY SERVICE BUREAU SYSTEM AND METHOD
The present disclosure provides details on an intermediary service bureau (ISB) system which includes an ISB center that acts as an intermediary communication center between communication devices used by correctional facilities and contract providers. The ISB records communications, stores security data, and provides front end processing to facilitate an inmate to communicate with an outside party by way of a contract provider. Further, the ISB provides accounting services for inmates and friends and family that use services provided the contract provider. The contract provider provides security and routing services for the ISB by obtaining data from the ISB and updating data at the ISB according to the communications.
SECONDARY INTERNET ACCESS FOR MOBILE DEVICES
In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.
System and method for providing a network service in a distributed fashion to a mobile device
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Determining a time to permit a communications session to be conducted
A system and method to facilitate communication between telecommunications participants in a telecommunications network is disclosed. In one aspect, a method of determining a time to permit a communication session by telecommunications participants to be conducted includes causing a telecommunications processor to retrieve, from a data storage: a free time value that is representative of a free time attributed to a participant in the communications session, a funds balance held by the participant, a pre-stored cost per unit time value, and a representation of a billing pattern for the participant. The method also includes causing the telecommunications processor to determine a maximum time to permit the communication session to be conducted as a function of the free time value, the funds balance, the cost per unit time value and the billing pattern. The telecommunications processor initiates ending the communication session when the time to permit the communication session to be conducted expires.
Apparatus and method for background data transfer
An exposure node (50) receives a first request for resource management for future background data transfer between an application service provider and a plurality of radio terminals (10) from a server (60) associated with the application service provider and send a second request to a policy control node (40) in response to receiving the first request. The first request includes a parameter indicating whether background data transfer not complying with a previously agreed or negotiated transfer policy should be stopped, or whether the background data transfer should continue under a charging rule different from a previously agreed charging rule. The second request includes the parameter obtained from the first request. This enables the application service provider to negotiate with the radio communication network about handling of background data transfer not complying with a previously agreed transfer policy.
Cross network authentication method and system
The described embodiments concern one or more methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps to authenticate mobile subscribers for using a foreign application when they are outside of their home telecom carrier's mobile network zone (“foreign zone”). A mobile subscriber can be authenticated through data roaming service, voice roaming service, and/or WiFi service. After cross network authentication, a mobile subscriber can use the foreign application to provide the same or similar services in a foreign zone, such as foreign country, through the home services in connection with the subscriber's home telecom carrier in a similar manner like he/she can use in his/her home zone, such as home country.
SYSTEM AND METHOD FOR MITIGATING INTERNATIONAL REVENUE SHARE FRAUD
Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.
System and method of automated customizable portal creation
A system is provided enabling creation of a portal to telecommunications services managed by an enterprise user on behalf of accountholders of the enterprise. The system includes a first layer providing access to at least a business support system, an operational support system, a provisioning system, a home location register, and a billing system. The system also includes a second layer providing access to a wizard interface programmed for: creating a portal by the enterprise user with an application enabled to selectively access and/or modify data and settings accessible through a security layer from the first layer; and publishing the portal. The system also includes a third layer providing access to the portal by an accountholder of the enterprise after publishing. The application is: a glanceable application showing the data or settings in a summary visual fashion; or a full application showing the data or settings in a detailed fashion.
Over the air provisioning of mobile device settings
A mobile device has a display, a memory, an antenna, a transceiver connected to the antenna for communicating voice and data through a wireless communication system, at least one processor, and executable instructions stored in the memory. The executable instructions, when executed by the at least one processor, (i) cause the mobile device to communicate wirelessly with one or more remote servers; (ii) cause the mobile device to display on the display, a user interface for enabling the user of the mobile device to select a mobile network service provider; (iii) in response to a selection, cause the mobile device to be configured for use with a first one of a plurality of mobile network service providers and enable access by the mobile device of wireless communication service; and (iv) in response to a selection, cause the mobile device to be configured for use with a second one of the plurality of mobile network service providers and enable access by the mobile device of wireless communication service provided by the second one of the plurality of mobile network service providers for a service plan offered by the second one of the plurality of mobile network service providers.
SYSTEMS AND METHODS FOR FLEXIBLE ACCESS TO PRIORITY ACCESS TIERS IN SHARED RADIO FREQUENCY (RF) SPECTRUM BANDS
Embodiments include systems and methods for flexible access to priority access tiers in shared radio frequency (RF) spectrum bands. An example embodiment provides automated mechanisms for network operators to obtain the benefits of using a priority access license (PAL) in the Citizens Broadband Radio Service (CBRS), including access to such protected frequency bands, on an as-needed and/or on-demand basis without having to own a PAL (CBRS-As-A-Service (CAAS)). This CAAS thereby provides an “interference insurance” service to network operators. In response to receiving an indication of the at least one condition being met (e.g., a current interference level surpassing a threshold), a priority access tier license controller automatically causes the wireless network operator to be able to operate a wireless network using the PAL to the shared frequency spectrum band and thus be protected from RF interference by lower priority access users.