Patent classifications
H04M15/73
Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management
Access management to femto cell service is provided through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.
System and method for modifying settings on electronic devices
The application is directed to a method for improving a user's experience on an electronic device. An application for modifying data service is displayed on a display of an electronic device. A request is received by the application from a user to modify a current data service with a new data service. The application evaluates the requested, new data service in view of predetermined information based upon the user. The application updates the electronic device with the new data service after its evaluation.
DYNAMIC USAGE INEQUITY DETECTION AND/OR REMEDY
An architecture that can dynamically detect and/or automatically remedy service usage inequities in a communications network is provided. For example, based upon a comparison of incoming call detail records (CDRs) to various subscriber information entities (e.g., service plan, blacklisted devices for the service plan, historic or current billing cycle usage, etc.), the architecture can identify when a usage inequity occurs or is likely to occur, substantially in real time.
Method and system for location-dependent billing for services
A method for location-dependent billing for a services that are available to a mobile terminal, a local communication connection is set up to a fixably installed external location tag with a corresponding wireless interface between the fixably installed tag and the mobile terminal, the method including the steps of accessing the external location tag and transmitting a billing rate code from the external location tag to the mobile terminal, forwarding the billing rate code from the mobile terminal to a central unit of a mobile communication network, in which the mobile terminal is logged, determining a geographic location identification of the external location tag by evaluation of the billing rate code at the central unit, and selecting a billing rate for billing for the service available to the user based on the billing rate code at the central unit.
Interface for access management of femto cell coverage
Access to femto cell service is managed through access control list(s), or white list(s). Such white list(s) can be configured via a networked interface which facilitates access management to a femto cell. White list(s) includes a set of subscriber station(s) identifier numbers, codes or tokens, and can also include additional fields for femto cell access management based on desired complexity. Various interfaces and user profiles are associated with granting different levels of access to requesting UEs.
Fee re-rating for a wireless carrier network
A business logic used to generate call details records (CDRs) for a plurality of subscribers by a wireless carrier network is imported. A selection of one or more data collector applications that are listed in the business logic is received and one or more configuration parameters in the business logic are updated based on one or more inputted parameter updates. A selection of one or more CDR distributor applications listed in the business logic is also received. A particular set of CDRs in the specific group of CDRs is further selected based on one or more inputted selection parameters. Reprocessed CDRs that correspond to the particular set of CDRs are generated according to at least the one or more updated configuration parameters in the business logic and sent to the one or more billing systems via the one or more CDR distributor applications to trigger recalculation of service fees.
VoWiFi registration control method and apparatus, electronic device, and server
A VoWiFi registration control method and apparatus, an electronic device, and a server, are provided. A method on an electronic device side includes: obtaining first feature information of an electronic device; and controlling, in a case that the first feature information does not match second feature information, termination of VoWiFi registration in a process of performing VoWiFi registration. The first feature information is position feature information determined based on a first position of the electronic device, and the second feature information is position feature information determined based on a second position of the electronic device.
System and Method of deterring unsolicited telephone calls
Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.
INFORMATION PROCESSING METHOD, SYSTEM AND APPARATUS, COMMUNICATION DEVICE, AND STORAGE MEDIUM
A method for processing information is performed by a first network function, and includes: receiving a downlink data packet actively dropped and labeled by an access network device in a procedure of packet data unit (PDU) set based quality of service (QoS) handling; and performing a charging offset of downlink data based on the downlink data packet, or reporting a usage of the downlink data packet to a second network function, wherein the usage is configured to perform the charging offset of the downlink data.
System and method of deterring unsolicited telephone calls
Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.