Patent classifications
H04M15/882
MULTI-CARD RESOURCE MANAGEMENT METHOD, DEVICE AND MULTI-CARD TERMINAL
A multiple subscriber identity module cards (multi-SIM) resource management method, device and multi-SIM terminal. The method comprises: acquiring a subscriber identity module card list in a terminal, the subscriber identity module card list comprising all subscriber identity module cards in the terminal; and if a remaining quantity of a service resource on a subscriber identity module card currently used in the terminal is less than or equal to a preset remaining quantity threshold, then automatically switching to a subscriber identity module card having a sufficient service resource and in the subscriber identity module card list.
Ad-hoc peer-to-peer communications to access various services via a cellular network
A method for accessing a network. In one embodiment, the method includes at least one computer processor identifying a request from a first device to utilize wireless communication capabilities of a second device to communicate with a wireless network. The method further includes generating a secure peer-to-peer communication link between the first device and the second device. The method further includes establishing a wireless communication link between the second device and the wireless network. The method further includes transmitting one or more communications from the first device to the wireless network, via the wireless communication capabilities of the second device.
LICENSE MANAGEMENT SYSTEM, LICENSE MANAGEMENT METHOD, INFORMATION PROCESSING APPARATUS AND STORAGE MEDIUM
In a case where a second license for an application corresponding to a first license that is issued based on license information is to be issued based on different license information including a licensed period continuous to the licensed period of the first license, a usage period is set such that the ending time of the first license can be continuous to the starting time of the second license to issue the second license.
Enhanced redirection handling from policy server
Systems and methods are disclosed for directing a mobile device user with insufficient mobile credit to secondary pay sites. A PCRF receives a request from a mobile device corresponding to a user. The PCRF detects credit associated with a user mobile network usage account is below a threshold and assigns a tag to the request, the tag including redirect site information and secondary site information, the redirect site information including at least one network identifier corresponding to a redirect site and the secondary site information including at least one network identifier corresponding to a payment site accessible by the user when the credit associated with the user mobile network usage account is below the threshold. The PCRF transmits the request and the corresponding tag to a PCEF for routing the user to the at least one of the redirect site and the at least one payment site.
Recharging method for virtual identity module, and device
Embodiments of the present disclosure provide a recharging method for a virtual identity module, and a device. A first recharge request that is sent by user equipment and carries user account information and recharge information is received; a to-be-recharged virtual identity module and a recharge amount are determined according to the recharge information; a second recharge request is sent to an operations support system of the to-be-recharged virtual identity module, where the second recharge request carries the recharge amount and the user account information, so that the operations support system of the to-be-recharged virtual identity module deducts the recharge amount from an account corresponding to the user account information, and recharges the to-be-recharged virtual identity module. Recharging manners are diversified, and a recharging process is more flexible and convenient.
Bandwidth sharing between members of a group of subscribers of a communication service
Methods and apparatus to allocate bandwidth between first and second subscribers of a communications network are disclosed. An example method includes, based on a projection that a first data allotment for a first network access account of the first subscriber within a time period will be exceeded, identifying the second subscriber. The first and second subscribers are in a same subscriber group. The second subscriber is projected to have a second network data usage that is below a second data allotment for a second network access account of the second subscriber within the time period. The first and second subscribers have different billing addresses. Assent from the second subscriber to transfer a portion of the second data allotment to the first subscriber is determined. In response, the portion of the second data allotment from the second network access account is transferred to the first network access account.
Managing resource requests that exceed reserved resource capacity
A computer system that provides clients access to pooled resources in order to provide computing or data storage services may receive service requests (which explicitly or implicitly include requests for pooled resources), may service at least some of those requests, and may determine pricing for the serviced requests. The pricing for each request may be dependent on whether it was serviced using a portion of a resource pool that was reserved for the use of the client on whose behalf it was received or using burst capacity (e.g., unreserved or otherwise idle capacity within the resource pool). Pricing for the use of reserved capacity may be fixed, regardless of the amount of reserved capacity used. Pricing for burst capacity may depend on actual use, and may be demand-based (e.g., using a spot-market-based dynamic pricing model). Clients with reserved capacity may optionally request access to burst capacity.
Call processing system for modifying inmate communication limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
MOBILE ELECTRONIC COMMUNICATIONS WITH GRACE PERIOD
A mobile communications device receives an indication of a balance from a server when establishment of a voice call or sending of a message is requested. The mobile communications device determines whether the balance is sufficient to place the voice call or send the message over a mobile network. If the balance is sufficient to place the voice call or send the message over the mobile network, the voice call is established or the message is sent under normal operating conditions. If the balance is insufficient to place the voice call or send the message over the mobile network, a grace period is activated and the voice call is established or the message is sent during the grace period over an available wireless local-area network.
METHODS AND APPARATUS TO ALLOCATE BANDWIDTH BETWEEN SUBSCRIBERS OF A COMMUNICATIONS NETWORK
Methods and apparatus to allocate bandwidth between first and second subscribers of a communications network are disclosed. An example method includes, based on a projection that a first data allotment for a first network access account of the first subscriber within a time period will be exceeded, identifying the second subscriber. The first and second subscribers are in a same subscriber group. The second subscriber is projected to have a second network data usage that is below a second data allotment for a second network access account of the second subscriber within the time period. The first and second subscribers have different billing addresses. Assent from the second subscriber to transfer a portion of the second data allotment to the first subscriber is determined. In response, the portion of the second data allotment from the second network access account is transferred to the first network access account.