Patent classifications
H04M2215/0188
Call routing in a communications network
There is provided a mechanism that allows automated calls made from a set of one or more numbers to be detected and routed in an appropriate manner. The calls are classified based, at least in part, on one or more features of a call frequency time series that is generated from data representing a plurality of calls previously made from a set of one or more numbers by determining a respective number of calls made by the set of numbers during each of a plurality of time intervals. The classification indicates whether the calls include automated calls. Further calls from the set of numbers are routed in accordance with the classification.
Indexing and searching content behind links presented in a communication
Among other disclosures, a method may include identifying content in an electronic communication, the content including a link. The method may include characterizing content associated with the link and storing the characterization. Upon detecting a match of a characterization, presenting one or more of the communication or portion thereof, the link or content associated with the link.
Automated device provisioning and activation
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials.
Wireless network buffered message system
A network server system maintains secure Internet data message links with respective device link agents on each of many wireless end-user devices. Through a network interface, the server system receives messages from network elements, for which delivery is requested to specific software components on specific ones of the devices. A message buffer system buffers such messages for delivery, and logic determines whether one of several potential triggers has happened to cause the system to deliver buffered messages to a particular one of the devices. For at least some messages, receiving the message at the buffer will not trigger delivery. At least one trigger identifies a time-critical message, however, which can cause all buffered messages for a particular device to be delivered. Such a system balances wireless network efficiency and opportunistic delivery with a potential for fast message delivery, when needed.
Handheld electronic device having improved phone call log, and associated method
An improved handheld electronic device and an associated method provide an improved call log that presents information relating to logged phone calls in a collapsed manner, meaning that for each phone number having a call stored in the memory of the device, only the most recent in time call is listed on the call log. An improved handheld electronic device and an associated method also provide a call history for any phone call from the improved call log that is selected by the user. The call history includes a listing of all of the calls stored by the device that are associated with the selected call log call.
Multiple Device and Multiple Line Connected Home and Home Monitoring
Systems, devices, and techniques for multiple device and multiple line enabled computing devices and computing appliances are described herein. A device number can be assigned to a computing device and can be unique to the computing device. A plurality of alias numbers can be provided to the computing device and enabled for use by the computing device. Alias numbers can be enabled on multiple computing appliances, such that a user can transfer voice or video calls between devices using the alias numbers. Further, monitoring components in a home environment, for example, can be associated with one or more alias number so that security alerts can be provided to the various computing devices and computing appliances associated with the alias numbers.
Security Techniques for Device Assisted Services
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
Network Service Plan Design
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
System and method to determine network usage
A method includes determining, at a network tracking system, a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network. The method also includes determining, at the network tracking system, a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network. The method further includes generating a cumulative usage value based on the first usage value and the second usage value.
Mobile device and service management
A wireless end-user device, comprising one or more modems enabling the wireless end-user device to communicate with a network system over a wireless access network, a touch-screen user interface, and one or more processors configured to execute one or more instructions that, when executed by the one or more processors, cause the one or more processors to detect a user input through the touch-screen user interface, the user input comprising a request to remove the wireless end-user device from an existing device group account, the existing device group account being associated with one or more devices including the wireless end-user device, and send a message to the network system over the wireless access network, the message conveying the request to remove the wireless end-user device from the existing device group account.