Patent classifications
H04M15/83
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
Method and Apparatus for Service Charging in a Communication Network
Charging interval authorizations according to the techniques disclosed herein provide for credit reservation and charging of whole charging intervals across two or more credit containers(36) in or linked to a subscriber account (34), without the need for redefining the charging interval size, even where the types of credit units differ between or among the credit containers (36) used to authorize the charging interval. Among the various advantages, the disclosed techniques preserve the original charging interval size, which may be defined for reasons of signaling efficiency, while simultaneously allowing the reservation or consumption of credit units from credit containers (36) having insufficient remaining credit for authorization of the full charging interval.
Adjustable and dynamic thresholds in wireless networks
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.
Continuous rewarded feedback system and method to improve ad targeting on a mobile device
A system and method including a downloadable application which forces to view targeted advertisements on their mobile device in order to gain access to use of the mobile device. The ads appear on a lock screen of the mobile device upon powering up or waking up of the mobile device. The user can take one of several actions with respect to the displayed ad and upon such action screen is unlocked and the user is provided with full function of the mobile device. The user can be incented for each action through the accumulation of points which can be used towards paying the user's phone bill or for receiving another reward.
Application Awareness of Credit Conditions in Communication Network
A method performed by an application function, AF, for a communication network, wherein the AF has been informed, in a first notification, about an out-of-credit event associated with a user of a service provided by the AF, the method comprising sending subscription request, to a network function, NF, for requesting notifications about reallocation-of-credit events associated with one or more users of a service provided by the AF; receiving, from the NF, a second notification of a reallocation-of-credit event associated with the user of the service provided by the AF for which the AF has been informed about the out-of-credit event, such that the AF can perform one or more second actions with respect to the service.
Information presenting device, information presenting method and recording medium
To provide portable information processing devices which is capable of effectively presenting to a user an action that improves communication quality. The information presenting devices include: a communication quality acquisition means that acquires current communication quality and communication quality when a user takes an action; an action cost calculation means that calculates a cost of the action; an information presentation determining means that determines whether information about the action is to be displayed, based on the current communication quality, the communication quality when the action is taken, and the action cost; an action information generating means that determines the action based on the communication quality when the action is taken and the action cost when the information presentation determining means determines that information about the action is to be displayed; and an information presenting means that displays information about the action determined by the action information generating means.
System and method for notification of listening devices
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a transceiver; a local user display; and instructions encoded within the memory to instruct the processor to: locate via the transceiver at least one nearby device; receive observational profile information for the nearby device; and display on the local user display information about the nearby device's observation abilities.
Message exchange
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a global token based on a time duration specified for multiple meters that are in communication with the headend system through at least a mesh network in a normal condition. The global token is associated with the time duration and is applicable to the multiple meters. The headend system causes the global token to be broadcast via a broadcast network. After receiving the global token, the meter verifies the global token and determines the time duration associated with the global token. The meter further connects premises associated with the meter to a resource distribution network for at least the time duration associated with the global token.