H04M15/8083

Smart vehicle navigation and tracking system
10949864 · 2021-03-16 ·

A computer implemented method includes: receiving location information and data about a pre-established trip from one or more vehicles each having a respective navigation device; retrieving a comprehensive computerized map of parking spaces and tow zones within a target area; a processor of the data processing system providing navigation information that enables vehicle operators to locate at least one of approved parking spaces and safe parking spaces; and the processor providing alerts for drivers to avoid parking in tow zones and other restricted parking spaces in response to receipt of location information which indicates the driver's vehicle is in close proximity of a restricted parking space.

TOLL-FREE NUMBERS METADATA TAGGING, ANALYSIS AND REPORTING

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

SYSTEM AND METHOD FOR UTILITY RANKING AND FUNDING FOR CLOUD STORAGE
20210067358 · 2021-03-04 ·

Disclosed herein are systems and methods for managing access to data objects in cloud storage. In one aspect, an exemplary method comprises storing, by a processor, a data object in a storage device of a cloud storage service for a duration of time, wherein the data object is accessible to a plurality of user accounts. The method comprises extending the duration of time for retaining the data object on the storage device to a first extended duration when a degree of access of the data object by the plurality of user accounts meets a target threshold value during the duration of time. The method further comprises extending the duration of time for retaining the data object on the storage device to a second extended duration when the degree of access does not meet the target threshold value during the duration of time.

Information processing system

An information processor comprises a terminal-side controller programmed to execute: (A1) a process of allowing a creation of a message to the information processor of a transmission destination; and (A2) a process of expanding a representable range of the message on condition of charging when the message is created, and a server comprises a server-side controller that calculates a charge amount charged for the message in the information processor by referring to a charge amount determination data, and a server-side memory that stores the charge amount correspondingly to each of the information processors.

Increasing processing capacity of processor cores during initial program load processing

According to one or more embodiments of the present invention, a computer-implemented method includes allocating a set of computing resources to a first partition from a plurality of partitions in a computer server, and monitoring a usage duration of the set of computing resources by the first partition. The method further includes generating a billing statement based on the usage duration of the computing resources by the first partition. The method further includes detecting an abnormal event in operation of the first partition and adjusting one or more settings of the set of computing resources to increase processing capacity associated with the first partition to complete the abnormal event. The method further includes monitoring a first usage duration of the computing resources during completion of the abnormal event and adjusting the usage duration of based on the first usage duration, and adjusting the billing statement using the adjusted usage duration.

TOLL-FREE TELECOMMUNICATIONS AND DATA MANAGEMENT PLATFORM

A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.

System, network, device and stacked spectrum method for implementing spectrum sharing of multiple contiguous and non-contiguous spectrum bands utilizing universal wireless access gateways to enable dynamic security and bandwidth policy management

A system and method in various embodiments implements a virtual spectrum band stacking technique facilitating spectrum sharing by converting and combining spectrum bands consisting of several different RF channels, common air interfaces, and radio channel protocols in the radio frequency channel domain to form IP Virtual Radio Channels (IP-VRCs) in the packet data domain. This virtual spectrum stacking technique combines the transmissions of contiguous and non-contiguous RF channels with differing physical layers into IP-VRCs. This technique enables simultaneous parallel high-speed wireless transmission; virtual radio channel hopping for enhanced security; and customized security schemes for different IP-VRC Groups. The deployment of the combination of IP-VRC Groups; Universal Small Cell Base Stations; and Universal Wireless End-Point Devices allows the aggregation of all available spectrum bands for use within a building environment. Some benefits of this deployment include expansion of spectrum utilization, service quality, security, applications and transmission throughput for wireless end-point devices.

METHODS AND SYSTEMS OF USING REMOTE SUBSCRIBER IDENTIFICATION MODULES AT A DEVICE

The present invention discloses methods and systems for communicating at a cellular router between a first wireless communication module and a first subscriber identity module (SIM). The cellular router receives a first request from a first wireless communication module and encapsulates the first request in a first modified request. The cellular router then sends the first modified request to a first SIM card in a first communication apparatus and waits for a first modified reply. While waiting for the first modified reply the cellular router sends at least one halt message to the first wireless communication module after a first time threshold. After receiving the first modified reply, the cellular router decapsulates the first modified reply to retrieve a first reply and sends the first reply to the first wireless communication module where the first modified reply is a reply to the first.

ADVERTISEMENT PRESENTATION SYSTEM AND ADVERTISEMENT PRESENTATION METHOD
20210217057 · 2021-07-15 ·

An advertisement presentation system includes at least one display device that is detachably provided to a vehicle, an information processing device, and a management server. The information processing device is configured to acquire advertisement information representing an advertisement, and to output the acquired advertisement information to the display device. The display device is configured to present the advertisement information output from the information processing device such that the advertisement information is directed outward from the vehicle. The information processing device is configured to transmit task report information representing a presentation task report for the advertisement information by the display device to the management server. The management server is configured to determine remuneration to cover both incurred data communication costs and advertising costs associated with presentation of the advertisement information, in accordance with the task report information transmitted from the information processing device.

Method and device for rewarding wireless access point

The objective of the present application is to provide a method, a device, and a system for rewarding a wireless access points. Compared with the prior art, in the present application, after establishing a wireless connection between a user device and a target wireless access point, rewarding prompt information regarding the target wireless access point is presented on the user device. Further, rewarding operation information regarding the target wireless access point submitted by the user according to the rewarding prompt information is sent to a corresponding network device through the wireless connection. Accordingly, the network device receives the rewarding operation information. Further, according to the rewarding operation information, the network device transfers a corresponding rewarding resource from a corresponding account of the user device to a corresponding account of the target wireless access point.