H04M15/886

MULTI-CARD RESOURCE MANAGEMENT METHOD, DEVICE AND MULTI-CARD TERMINAL
20180191913 · 2018-07-05 ·

A multiple subscriber identity module cards (multi-SIM) resource management method, device and multi-SIM terminal. The method comprises: acquiring a subscriber identity module card list in a terminal, the subscriber identity module card list comprising all subscriber identity module cards in the terminal; and if a remaining quantity of a service resource on a subscriber identity module card currently used in the terminal is less than or equal to a preset remaining quantity threshold, then automatically switching to a subscriber identity module card having a sufficient service resource and in the subscriber identity module card list.

Method and system for financing of inmate mobile devices
10003698 · 2018-06-19 · ·

A method for financing a mobile device for an inmate involves receiving a plurality of mobile device rules comprising limitations on usage of the mobile device by the inmate within a controlled facility, receiving the mobile device, and installing, on the mobile device, a mobile application, wherein the mobile application conforms the mobile device to the plurality of mobile device rules. The method also involves receiving a payment for the mobile device, and executing, by the mobile device, the mobile application.

Prevention of bandwidth abuse of a communications system
09942794 · 2018-04-10 · ·

A user of a communications network is prevented from consuming an excessive amount of channel bandwidth by restricting use of the channel in accordance with the type of data being downloaded to the user. The user is provided an initial number of credits. As the user consumes the credits, the data being downloaded is checked to determine if is permissible or non-permissible. Non-permissible data includes file-sharing files and movie downloads if user subscription does not permit such activity. If the data is permissible, the user is provided another allotment of credits equal to the initial allotment. If the data is non-permissible, the user is provided an allotment of credits less than the initial allotment. Various restriction policies also can be applied, such as levying additional fees and/or terminating the user's access to the channel. Also, incentives can be provided to entice the user curb the misuse.

TRACKING DATA USAGE IN WIRELESS NETWORKS

A method may include determining a number of user devices that can access data services in a wireless network and storing information identifying the determined number of user devices for each of a number of sectors for each of a number of periods of time. The method may also include receiving a request from a first user device associated with a first user for access to data services during a first period of time, accessing the stored information to determine whether to grant the request and providing access to data services via the wireless network to the first user device. The method may further include excluding data usage by the first user device during the first period of time from being applied against a data limit associated with the user's data plan.

Tracking data usage in wireless networks

A method may include determining a number of user devices that can access data services in a wireless network and storing information identifying the determined number of user devices for each of a number of sectors for each of a number of periods of time. The method may also include receiving a request from a first user device associated with a first user for access to data services during a first period of time, accessing the stored information to determine whether to grant the request and providing access to data services via the wireless network to the first user device. The method may further include excluding data usage by the first user device during the first period of time from being applied against a data limit associated with the user's data plan.

Method for implementing specific termination cause codes in termination requests

A method includes a wireless mobile device communicating with a wireless network via an evolved high rate packet data (eHRPD) interface. The wireless mobile device may receive a vendor specific network control protocol (VSNCP) packet such as a terminate-request packet, for example, that indicates the wireless network has requested a PDN disconnection. The VSNCP packet includes a cause code that indicates a reason for the PDN disconnection request. The wireless device may use the cause code to determine the reason for the PDN disconnection request. Accordingly, in response to receiving the VSNCP packet, the wireless mobile device may perform one or more operations in an effort to resolve any issues that may have caused the PDN disconnection request.

Methods and systems for sharing data usage at a plurality of network devices

The present invention discloses methods and systems for sharing data usage by a plurality of SIM cards at a plurality of network devices. Each of the plurality of network devices is capable of housing at least one SIM card from the plurality of SIM cards. The method comprises the steps of determining the total data usage allowance. A remaining total data usage allowance is determined by either retrieving it from a carrier server or by subtracting aggregated data usage information from the total data usage allowance. The method further comprises restricting use of one or more of the plurality of SIM cards when the remaining total data usage allowance is below a first threshold until the remaining total data usage allowance is above the first threshold. The total data usage allowance is changed to a first value periodically or according to an administrator's instruction.

METHODS AND SYSTEMS FOR SHARING DATA USAGE AT A PLURALITY OF NETWORK DEVICES

The present invention discloses methods and systems for sharing data usage by a plurality of SIM cards at a plurality of network devices. Each of the plurality of network devices is capable of housing at least one SIM card from the plurality of SIM cards. The method comprises the steps of determining the total data usage allowance. A remaining total data usage allowance is determined by either retrieving it from a carrier server or by subtracting aggregated data usage information from the total data usage allowance. The method further comprises restricting use of one or more of the plurality of SIM cards when the remaining total data usage allowance is below a first threshold until the remaining total data usage allowance is above the first threshold. The total data usage allowance is changed to a first value periodically or according to an administrator's instruction.

COMMUNICATION METHOD AND APPARATUS
20250016274 · 2025-01-09 · ·

This application provides a communication method and apparatus. In the method, a first network element determines that a policy related to a terminal device is related to a spending limit of the terminal device; and the first network element may send an identifier of a first charging network element to a second network element. The first network element is a policy control network element, and the second network element is a mobility management network element. In this way, the policy control network element and the mobility management network element select a same charging network element, to support the policy control network element in determining, based on a status of the policy control network element, the policy related to the terminal device, and provide a mechanism that can support the policy control network element in determining, based on the status of the policy counter, the policy related to the terminal device.

SECOND PARTY CONTROL OVER MOBILE DEVICE USAGE

A mechanism is provided whereby a parent, or other second party, can monitor and/or control a child's or other first party's wireless device usage. An interface can allow the parent to set rules for the child's usage, and can specify that the parent should receive messages when a call is made to or from the child's wireless device. In addition to call information, the message may prompt the parent for approval of the call connection. Thus, a parent can decide whether a call that is incoming from or outgoing to a third party should be permitted.