Patent classifications
H04M15/58
Automatic aftercall directory and phonebook entry advertising
This disclosure provides methods, services, and platforms that automatically prompt mobile phone users to add contact information to their phone book after a triggering event such as calling a phone number. The methods, services, and platforms allow mobile network operators to provide a service that allows businesses to potentially have their numbers added to the phonebook of a mobile phone after a disconnected call.
Automated Generation of Control Plane Logic in a Diameter Network
The present invention relates to computer implemented processes affected through a set of computer operations stored in a memory device and executed using a hardware processor. The embodiments disclosed herein comprise methods as well a computer hardware system comprising a hardware processor capable of executing the method steps. The computer operations facilitate processes for automating the creation of call flows and the instantaneous routing of calls within a wireless network operating over a Diameter protocol or a Diameter protocol extension. The call flows are generated by reading metadata stored in a finite state machine, which is required to be kept by the Diameter protocol standards.
LOGGING SYSTEM FOR BLACKLISTING URLS IN TOLL-FREE DATA SERVICE
A method, a device, and a non-transitory storage medium that stores instructions to load a first web page; scan each embedded uniform resource locator (URL) of the first web page; select each embedded uniform resource locator (URL) that is signed to indicate support of a toll-free data service; transmit each signed embedded URL to a first network device; receive, from the first network device, at least one replacement URL; render the first web page using the at least one replacement URL; receive a user input via one of the at least one replacement URL; load a second web page in response to the user input; scan the second web page for an embedded URL; determine whether the second web page includes at least one unsigned embedded URL; and transmit to a second network device, blacklist data that includes the at least one unsigned embedded URL.
Enhanced Curfew and Protection Associated with a Device Group
A first wireless end-user device is designated as subject to controls under a device group authorization from a master wireless end-user device. The first device receives a protection management profile from the master device, and compares settings in the profile to a device location change state (e.g., speed) and a device user I/O method state (e.g., touchscreen, hands-free, Bluetooth, voice-activated, etc.). According to the profile, at certain speeds and I/O methods, one or more device service and/or network activities are limited. The master device may send multiple such profiles to the first device, any of which if applicable can limit different service and/or network activities in different situations.
Adapting PCC rules to user experience
A method for policy management in a network comprises collecting data relating to one or more active user equipment in the network, processing said data, and responsive to said processing determining if policy management provided by a policy function of the network with respect to a respective user equipment is to be changed.
Usage tracking for software as a service (SaaS) applications
Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (SaaS) applications and tracking usage of the SaaS applications. First, a user, e.g. employee of an enterprise, logs into a SaaS usage proxy using a first set of credentials. The first set of credentials is known by the user, e.g. preexisting credentials for an enterprise-wide authentication system. Once a SaaS application is selected by the user, the SaaS usage proxy logs into the SaaS application using a second set of credentials. However, the second set of login credentials is encrypted and not known by the user, which causes the SaaS application to be accessible only through the SaaS usage proxy. This allows the SaaS usage proxy to monitor all usage of the SaaS application, even if multiple network-accessible devices are used to log into the SaaS usage proxy.
Method and system for dynamic managing of subscriber devices in mobile networks
A system and method for managing subscriber mobile devices comprising: a home network (400) of a first mobile network operator (MNO1), in which data associated with at least one physical SIM of a subscriber device with an embedded SIM card (eUICC) is obtained, and a destination network (300) of a second mobile network operator (MNO2) which the device travels to, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device. The dynamic data comprise a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600) on which the destination network (300) relies. The static data comprise IMSI/MSISDN identities and is stored in a pool (202) of the destination network (300). For a given virtual SIM, it is checked whether there is an association in a mapping table (106) of the first mobile network operator (MNO1) between the static data from the pool (202) and the physical SIM data from the home network (400).
System and method for a customized fifth generation (5G) network
An embodiment logical function architecture for next-generation 5G wireless networks may include a control plane comprising a software defined topology (SDT) logical entity configured to establish a virtual data-plane logical topology for a service, a software defined resource allocation (SDRA) logical entity configured to map the virtual data-plane topology to a physical data-plane for transporting service-related traffic over the wireless network, and a software defined per-service customized data plane process (SDP) logical entity configured to select transport protocol(s) for transporting the service-related traffic over a physical data-plane of the wireless network. An embodiment virtual service specific serving gateway (v-s-SGW) for next-generation 5G networks may be assigned specifically to a service being provided by a group of wirelessly enabled devices, and may be responsible for aggregating service-related traffic communicated by the group of wirelessly enabled devices.
MUTABLE GEO-FENCING SYSTEM
In various embodiments, boundaries of geo-fences can be made mutable based on principles described herein. The term “mutable” refers to the ability of a thing (in this case, the boundary of a geo-fence) to change and adjust. In a typical embodiment, a mutable geo-fence system is configured to generate and monitor a geo-fence that encompasses a region, in order to dynamically vary the boundary of the geo-fence based on a number of boundary variables. The term “geo-fence” as used herein describes a virtual perimeter (e.g., a boundary) for a real-world geographic area. A geo-fence could be a radius around a point (e.g., a store), or a set of predefined boundaries. Boundary variables, as used herein, refers to a set of variables utilized by the mutable geo-fence system in determining a location of the boundary of the geo-fence.
ACCESS NODE, SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO THE INTERNET AND TO TELEVISION
A client device receives, from a user, a request to connect to a medium. The client device sends a request to a server to inquire whether a sufficient amount of credits is stored in an account for the user. The client device then receives a response to the inquiry. If the user account contains at least one credit, a connection is established between the client device and the medium. The server receives, from a controlling terminal, account information for the user, and a list of activities for reporting by the user. This information is stored in the user account. Credits are also stored in the user account. A report related to a performance of an activity part of the list of activities is received from the client device of the user. In response to receiving the report, the number of credits is incremented in the user account.