H04M15/8033

Subscriber identity module (SIM) selection in multi-SIM communication devices
09735821 · 2017-08-15 · ·

A method relates to identifying, by a processing device, a plurality of subscriber identity modules (SIMs) coupled to the processing device, each of the plurality of SIMs storing data enabling a set of communication services provided by a respective one of a plurality of communication service providers, determining a request parameter comprising at least one of a time, a location of the processing device, or a destination to provide a first communication service, determining a plurality of cost rates to provide the first communication service by the respective one of the plurality of communication service providers in view of a cost rate table and the request parameter, selecting a first SIM from the plurality of SIMs in view of the plurality of cost rates, and displaying, on a screen of the processing device, a first icon indicating the selected first SIM to provide the first communication service.

BANDWIDTH THROTTLING IN A RADIO ACCESS NETWORK
20220312269 · 2022-09-29 ·

Systems, methods, and software of managing bandwidth allocated to User Equipment (UE). In one embodiment, a bandwidth management system collects cell load information for a plurality of cells within a Radio Access Network (RAN), and processes the cell load information to determine a cell load status for each of the cells. The system performs bandwidth throttling for the UE by determining a location of the UE, identifying the cell load status for one or more cells in a region of the RAN corresponding with the location of the UE, determining whether the region of the RAN is overloaded based on the cell load status, and controlling a downgrade of bandwidth allocated to the UE in the RAN responsive to a determination that the region is overloaded.

APPARATUS AND METHODS FOR ENTRY CONTROL OVER A CELLULAR NETWORK

Apparatus and methods for controlling physical access to a location include an entry system including at least one barrier at the physical location, with the barrier configured to selectively permit access into and/or from and/or within the physical location upon proper credentials and/or authorization. A cellular device is connected to or integrated with the entry system and is configured to transmit and receive voice and/or data information to the entry system that includes the credentials and/or authorization. The cellular device can be a retrofit to prior art/installed systems, can be external to an otherwise operational system, and/or can be integrated natively into the entry system. Methods and apparatus are disclosed to determine the power status and network link state of the cellular device and/or to establish communication through/to same, as well as for the cellular device to be connected to and control a plurality of entry systems and/or barriers. A plurality of entry systems and/or barriers can be controlled by one or more cellular devices, and the usage (and associated billing charges from cellular service providers) on any/all of those cellular devices monitored and selected to optimize (reduce) the expense of any data or other charges imposed by a cellular carrier associated with the cellular device. Optimization can include allocation to the aforementioned voice and/or data cellular plans related to specific of the plurality of entry systems and/or barriers.

SYSTEMS AND METHODS FOR ENABLING OPTIMIZED REPORTING RELATED TO POLICY CONTROL REQUEST TRIGGERS

A first network device may receive, from a second network device, a first policy control create request and may provide, to the second network device, a common policy control request trigger. The first network device may receive a second policy control create request associated with a user equipment (UE) and may cause a UE policy to be provided to the UE. The first network device may receive, from a third network device, a third policy control create request and may provide a network device policy to the third network device. The first network device may receive, from the second network device, a policy control update request based on the common policy control request trigger and may generate an updated UE policy or an updated network device policy based on the policy control update request.

Method for detecting misuse of identity in electronic transactions
09727867 · 2017-08-08 ·

The invention provides methods for determining whether a transaction has taken place in geographic proximity to a wireless device. Upon receiving a notification to authenticate the use of an identity at a transaction location, where the identity is associated with a wireless terminal, the method determines an approximate location of the wireless terminal based on cached position information, GPS location, cellular geo-location, and/or Wi-Fi geolocation, and determines whether one or more of these is in geographic proximity to the location of the transaction.

COLLABORATIVE POLICY MANAGEMENT STRATEGIES AT A MOBILE DEVICE
20170222820 · 2017-08-03 ·

A method is provided. The method includes electing a mobile device optimization strategy at a mobile device, web interface, or through direction to the provider. In exchange for a user selecting the mobile device optimization strategy, a network or service provider provides one or more plan-related incentives. A related system and mobile device are also disclosed.

Information providing apparatus, information providing method, and communication system
09819775 · 2017-11-14 · ·

An information providing apparatus includes: a map information storage unit which maintains map information with which at least one of position information, address information, and names of buildings or shops is associated; a communication parameter obtaining unit which obtains communication parameters associated with the position information; an image information creating unit which creates image information in which the communication parameters associated with the position information are described on the map information; and a display unit which displays the image information created by the image information creating unit.

Charging mechanism for communication network

There is provided a charging control mechanism allowing flexible charging in specified communication areas of a communication network, for example of a WLAN. When it is detected that a UE tries to access in a specified communication network area, a charging setting to be used for a communication in the specified communication network area is determined and a rating information in the form of a rating attribute is included in each CDR for indicating the charging setting to be used for charging a communication of the UE in the specified communication network area. A rating/charging engine uses the rating attribute for determining the charging amount for the communication.

Protocols for facilitating broader access in wireless communications responsive to charge authorization statuses

Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a communication device (smartphone or wearable device, e.g.) or other wireless communication participant (motor vehicle having a wireless communication capability, e.g.).

Method and apparatus for supporting proximity discovery procedures

A method and apparatus are described for supporting a two-stage device-to-device (D2D) discovery using a D2D interworking function (IWF). A D2D IWF component may be configured to perform mapping between an application running on an application server and a third generation partnership project (3GPP) network, and provide a set of application programming interfaces (APIs) to allow discovery to be provided as a service to D2D applications. An application identifier may be mapped to a 3GPP identifier. Further, a method and apparatus are described for performing client-server discovery. A first wireless transmit/receive unit (WTRU) may be configured for a listen-only operation, and a second WTRU may be configured to transmit beacons. The first and second WTRUs may perform a radio access network (RAN) discovery procedure at an access stratum (AS) layer. A method and apparatus for performing charging for D2D service using a D2D IWF are also described.