Patent classifications
H04M15/882
Controlling communications
Apparatuses and methods for controlling communication of a user terminal in a communication system are provided. The solution comprises determining that a data connection of an access point name or data network name of the user terminal does not fulfil a predetermined condition, and transmitting to a network unit maintaining information on subscriber information of users of the network a message on the basis of determination, the message indicating the access point name or data network name of the user terminal is to be deactivated or the data connection of the access point name or data network name is to be directed to a predetermined server.
Call processing system for modifying inmate communication limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
Device and Process for Data Throttling for Wireless Device
The disclosure provides a system and method for controlling on a wireless device the amount and speed of data transferred between a wireless device and the Internet, and a wireless device with a metering client that can throttle data speeds and types based on how much data a user has used. Specifically, the wireless device includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client determines that the amount of data available has exceeded a pre-determined threshold, the wireless device inhibits further data transmission amounts and speeds.
METHOD AND SYSTEM FOR ACCESS PROTOCOL OPTIMIZATION FOR NARROW BAND INTERNET-OF-THINGS DEVICES WITHIN A NETWORK ENVIRONMENT
A method, apparatus and computer program product are provided in accordance with example embodiments in order to provide methods, apparatuses, and/or systems that reduce and/or eliminate network inefficiencies caused by the traffic profile associated with narrow band Internet-of-Things (NB-IoT) devices and similar devices, by applying and optimizing protocols governing the allocation of network resources to such devices. In some example implementations, a serving gateway (SGW) and/or a packet data network gateway (PGW) is locally configured with a threshold set that includes limits on the permissible traffic associated with a NB-IoT device and/or a similar device over a given unit of time. To the extent that the traffic remains within such limits, generation of charging data records (CDRs) and signaling to an online charging server may be reduced or eliminated.
CALL PROCESSING SYSTEM FOR MODIFYING INMATE COMMUNICATION LIMITS
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
Systems and methods for providing indications of network connectivity status to a user device
A device receives, from a user device, a connection request for connecting to a core network associated with the device, and determines, based on receiving the connection request, that a usage associated with the user device exceeds a usage threshold. The device generates a first network connectivity status indicator based on determining that the usage associated with the user device exceeds the usage threshold, and provides, to the user device, information indicating the first network connectivity status indicator. The information indicating the first network connectivity status indicator is to cause the user device to display the first network connectivity status indicator.
Device and process for data throttling for wireless device
The disclosure provides a system and method for controlling on a wireless device the amount and speed of data transferred between a wireless device and the Internet, and a wireless device with a metering client that can throttle data speeds and types based on how much data a user has used. Specifically, the wireless device includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client determines that the amount of data available has exceeded a pre-determined threshold, the wireless device inhibits further data transmission amounts and speeds.
Ad-hoc peer-to-peer communications to access various services via a cellular network
A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.
Efficient service authorization and charging in a communication system
An approach is disclosed for service authorization and service charging in a communication network relying on executing a real time service authorization for a requested service by determining an upper estimate of a service charge for the requested service, comparing the upper estimate with a balance value of an account used for charging the requested service and when affirmative authorizing the requested service. Then follows a calculation of an accurate service charge for the requested service in a batch mode without real time requirements after the real time service authorization.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.