H04M15/882

Multi-card resource management method, device and multi-card terminal
10178240 · 2019-01-08 · ·

A multiple subscriber identity module cards (multi-SIM) resource management method, device and multi-SIM terminal. The method comprises: acquiring a subscriber identity module card list in a terminal, the subscriber identity module card list comprising all subscriber identity module cards in the terminal; and if a remaining quantity of a service resource on a subscriber identity module card currently used in the terminal is less than or equal to a preset remaining quantity threshold, then automatically switching to a subscriber identity module card having a sufficient service resource and in the subscriber identity module card list.

CALL PROCESSING SYSTEM FOR MODIFYING INMATE COMMUNICATION LIMITS
20190007559 · 2019-01-03 ·

A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.

Call processing system for modifying inmate communication limits
10171680 · 2019-01-01 · ·

A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.

AD-HOC PEER-TO-PEER COMMUNICATIONS TO ACCESS VARIOUS SERVICES VIA A CELLULAR NETWORK

A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.

AD-HOC PEER-TO-PEER COMMUNICATIONS TO ACCESS VARIOUS SERVICES VIA A CELLULAR NETWORK

A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.

AD-HOC PEER-TO-PEER COMMUNICATIONS TO ACCESS VARIOUS SERVICES VIA A CELLULAR NETWORK

A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.

Methods and Systems for Abuse Detection of Zero-Rated Data
20180288175 · 2018-10-04 ·

A method for detecting abuse of zero-rated data includes monitoring usage patterns of a group of users for a particular data type, including zero-rated data usage by the group of users and setting a zero-rated data-usage threshold for the particular data type based at least in part on the monitored usage. The method also includes continuing to monitor the usage patterns of the group of users for the particular data type during a period of time, including the zero-rated data usage of the group of users. The method further includes determining whether a zero-rated data usage for the particular data type by a user in the group during the period of time satisfies the zero-rated threshold, and in response to determining that the zero-rated data usage by the user during the period of time satisfies the zero-rated threshold, flagging an account associated with the user as a potential abuser.

MANAGING RESOURCE REQUESTS THAT EXCEED RESERVED RESOURCE CAPACITY

A computer system that provides clients access to pooled resources in order to provide computing or data storage services may receive service requests (which explicitly or implicitly include requests for pooled resources), may service at least some of those requests, and may determine pricing for the serviced requests. The pricing for each request may be dependent on whether it was serviced using a portion of a resource pool that was reserved for the use of the client on whose behalf it was received or using burst capacity (e.g., unreserved or otherwise idle capacity within the resource pool). Pricing for the use of reserved capacity may be fixed, regardless of the amount of reserved capacity used. Pricing for burst capacity may depend on actual use, and may be demand-based (e.g., using a spot-market-based dynamic pricing model). Clients with reserved capacity may optionally request access to burst capacity.

BUDGETING AND QUOTA MANAGEMENT SYSTEM FOR DATA CONSUMPTION
20180227722 · 2018-08-09 ·

Systems and methods may provide for establishing a data usage budget based on one or more of user input and historical usage data, wherein the data usage budget distinguishes between usage types and distinguishes between connection types. Additionally, a data usage of one or more client devices may be monitored in accordance with the data usage budget. In one example, the usage types are designated as one or more of a high bandwidth usage and a low bandwidth usage, and the connection types are designated as one or more of a capped connection and a non-capped connection.

Universal ring free
12132867 · 2024-10-29 · ·

A method and system are disclosed for sending notifications asynchronously over a telephony network. The method and system include receiving a request over a first telephony connection from a first communication device associated with a first user identifying a second communication device associated with a second user, sending one or more response communications over the first telephony connection to the first communication device associated with the first user, disconnecting the first telephony connection with the first communication device of the first user, and sending a notification over a second telephony connection to the second communication device associated with the second user, the notification including information sufficient to allow the second user to identify the first user or the first communication device associated with the first user.