H04M15/88

Callback Notification From Devices With Insufficient Credit For Communication
20170331946 · 2017-11-16 · ·

A method and a callback notification system (CNS) are provided for sending a missed call ring alert (MCRA) from a source number to a destination number. The CNS receives communication information from a calling party device (CGPD) or a network thereof, when an unsuccessful communication attempt is made by the CGPD to contact a called party device (CDPD), and places a call to the destination number with an identification of an originator of the call as the source number using the communication information. The CNS identifies a ring of the CDPD when the call successfully reaches the destination number and terminates the call before chargeable completion of the call, thereby sending an MCRA from the source number of the CGPD to the destination number of the CDPD. The CNS sends one or more alternative callback notifications to the destination number, concurrently with the MCRA or if the MCRA is unsuccessful.

CENTRALIZED SHARED NETWORK CONSUMPTION TRACKING

A network device executes an account management function that pre-authorizes network service unit consumption by multiple subscribers that are members of a same, shared network service account. The account management function receives, from multiple charging systems distributed within the network, network unit consumption charges associated with each of the multiple subscribers, where the network device is centrally located within a network relative to multiple locations associated with the plurality of charging systems. The account management function updates a consumption counter for the same, shared network service account based on the network unit consumption charges associated with the multiple subscribers received from the multiple charging systems distributed within the network.

ACCESS NODE, SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO THE INTERNET AND TO TELEVISION
20220053003 · 2022-02-17 ·

A client device receives, from a user, a request to connect to a medium. The client device sends a request to a server to inquire whether a sufficient amount of credits is stored in an account for the user. The client device then receives a response to the inquiry. If the user account contains at least one credit, a connection is established between the client device and the medium. The server receives, from a controlling terminal, account information for the user, and a list of activities for reporting by the user. This information is stored in the user account. Credits are also stored in the user account. A report related to a performance of an activity part of the list of activities is received from the client device of the user. In response to receiving the report, the number of credits is incremented in the user account.

SYSTEM AND METHOD FOR DETERMINING DATA USAGE IN A CONVERGED CHARGING SYSTEM
20220046396 · 2022-02-10 ·

Systems and methods described herein include receiving, at a network device and from a session management device, a first message that includes a first identifier associated with a subscriber and a second identifier associated with a first service that is charged using an online charging system. The network device transmits a second message that indicates a first time period in which to report data usage associated with the first service and a second time period in which to report data usage associated with one or more second services that are charged using an offline charging system. The network device receives first data usage information associated with the first service after the first time period and second data usage information associated with the one or more second services after the second time period. The network device processes the data usage information.

SYSTEM FOR GRANT OF USER ACCESS AND DATA USAGE IN A PROCESS DATA NETWORK
20170243209 · 2017-08-24 ·

Embodiments enable a system operatively connected with a block chain distributed network to use a block chain distributed network for granting user access and/or data usage in a process data network. Embodiments receive a transaction record associated with a payment transaction initiated by a user, wherein the transaction record comprises transaction data indicating a payor account owned by a payor distinct from the user, a payee and an amount; access a distributed ledger stored in the memory device, wherein the distributed ledger is updated based on communications from a block chain distributed network; and determine, using the accessed distributed ledger, whether the user is authorized to conduct the payment transaction. In some cases, the system determines, using the accessed distributed ledger, that one or more payor restrictions have been placed on user use of the payor account; and applies the payor restrictions to processing of the payment transaction.

SYSTEM AND METHOD FOR DETERMINING DATA USAGE IN A CONVERGED CHARGING SYSTEM
20220312159 · 2022-09-29 ·

Systems and methods described herein include receiving, at a network device and from a session management device, a first message that includes a first identifier associated with a subscriber and a second identifier associated with a first service that is charged using an online charging system. The network device transmits a second message that indicates a first time period in which to report data usage associated with the first service and a second time period in which to report data usage associated with one or more second services that are charged using an offline charging system. The network device receives first data usage information associated with the first service after the first time period and second data usage information associated with the one or more second services after the second time period. The network device processes the data usage information.

Wireless access point having metering capability and metering display
09736320 · 2017-08-15 · ·

The disclosure provides a system and method for metering on a prepaid wireless access point the amount of data transferred between a wireless device and the Internet and inhibiting further data transmission when the amount of prepaid data available reaches or drops below a pre-determined threshold. Specifically, the wireless access point includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client indicates that the amount of data available has dropped below a pre-determined threshold, the wireless access point inhibits further data transmission.

DETECTION OF A DELINQUENT MOBILE DEVICE
20170230900 · 2017-08-10 ·

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

In-store reading system

A system and method for providing digital data content to a wireless device. Although a fee is typically charged for access to the digital data content, e.g., electronic books, the system and the method provides controlled access to this content for free while the wireless device is accessing the content in a specified location, e.g., a retail location. A content control server receives a request from the wireless device requesting access to the digital data content. The request is received over a secure connection, preferably a virtual private network (VPN). The content control server monitors how much of the digital data content has been provided to the wireless device, and/or an amount of time the wireless device has been accessing the digital data content. This content control server uses this monitored data to control, throttle, the provision of the digital data content to the wireless device.

Telecommunications data usage management
09730044 · 2017-08-08 · ·

Telecommunications data usage management may be provided. A network state associated with a communication network may be identified. Upon determining that the network state is not in compliance with a data usage policy, access to the communication network may be restricted for at least one application.