Patent classifications
H04M15/885
SYSTEMS AND METHODS FOR PROVIDING TELECOMMUNICATION SERVICE
System and methods are disclosed that improve the speed, efficiency and usefulness of providing telecommunication service by computerized telecommunication service. In some embodiments, systems and methods described herein enable a user to receive the telecommunication service to a mobile device of the user, such as by adding data service, minutes and/or text messages to the prepaid plan, in response to having an advertisement played on or otherwise delivered via the mobile device. An ad may be displayed or otherwise played on the mobile device or inserted into messages sent by the user via the mobile device for the user to received minutes, data or texts added to their prepaid plan. The service carrier may split compensation received from an advertiser for playing an ad on a customer's device between the service carrier and the customer.
Method for regulating access to data connection by an electronic device
A method for monitoring and limiting access to a data connection by an electronic which has means for enabling/disenabling selectively the data connection is disclosed. The method includes a) detecting the initial and final time of each access to data connection during a predetermined time interval; b) counting the overall duration of the accesses to the data connection during the predetermined time interval; and c) if the overall duration reaches a value equal to a maximum duration value pre-set before the end of the predetermined time interval, actuating the means for disenabling the data connection until the end of the predetermined time interval. The method can provide a detailed report and a check in real time, by remote access, of the accesses and durations of a web site, of the time use of installed applications on the device, telephone calls, texts and screenshots of the devices placed under control.
QUALITY OF SERVICE FOR A VIDEO STREAMING SERVICE
Methods and apparatus for managing quality of service for video streaming, in which a Policy and Charging Rules Function (PCRF) in a Policy Charging Control (PCC) architecture of a telecommunications system receives from a Policy Control Enforcement Function (PCEF) a notification indicating that a video service has started for streaming video content to a user equipment (UE). A first Quality of Service (QoS) setting for streaming the video service to the UE is determined. First QoS setting data identifying the first QoS setting is transmitted to the PCEF. The PCEF transmits a further notification to the PCRF indicating that a particular stage has been reached. The PCRF receives the notification from the PCEF. In response to the further notification, a second QoS setting specifying a lower QoS than the first QoS setting for streaming the video service after the particular stage is determined. The PCRF identifies the second QoS setting to the PCEF.
Network access control
A network access control method includes obtaining network information of an electronic device, determining, using the network information, whether the electronic device needs to use a first access point name (APN) network channel, and generating a network channel switching instruction in response to determining that the electronic device needs to use the first APN network channel. The network channel switching instruction instructs to switch the electronic device from a second APN network channel to the first APN network channel. The second APN network channel has access to more network resource addresses than the first APN network channel.
Systems and methods for monitoring data and bandwidth usage
Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access).
Operating system supporting cost aware applications
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network.
Information throttle that enforces policies for workplace use of electronic devices
Information throttle that modifies a device's access to applications, features, or information to enforce workplace use policies. May be used with bring your own devices that belong to a user but are also used at work. For example, the system may disable games, media players, or social media when it determines that a device is used at work. A usage context monitor determines the context in which the device is currently used. The monitor may determine that a device is used for work when the time matches working hours, the device location matches a work site location, or the network connected to a device matches a workplace network. In addition to blocking access to inappropriate features, the information throttle may allow access to sensitive information only when the device is at work. Access may also depend on factors such as user credentials and the identity and configuration of the device.
Systems and Methods for Monitoring Data and Bandwidth Usage
Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access).
Electronic device and content transmitting and receiving method thereof
An electronic device is provided. The electronic device includes a communication module configured to communicate with an external electronic device and a processor configured to determine a size of content, transmit or receive the content at a first speed if the size of the content is less than a specific size, and transmit or receive the content at a second speed, which is slower than the first speed, if the size of the content is greater than or equal to the specific size.
Restoring functionality of a mobile device
A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.