Patent classifications
H04L2101/65
PROCESSING MESSAGES WITH A DEVICE SERVER OPERATING IN A TELEPHONE
A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium in a telephone having computer instructions to execute a web server application in the telephone. The web server application can be operable to detect an incoming plain old telephone service call, identify a calling party identifier from the incoming plain old telephone service call, and direct one of a plurality of devices detected by web server application to present the calling party identifier. Other embodiments are disclosed.
METHOD AND SYSTEM FOR ASSIGNING NUMBER FOR ROUTING CALL FROM ELECTRONIC DEVICE
A computer-implemented method for routing a call from an electronic device to a first target organization. The method, executed by a server, comprises: receiving a request for a first digital content item; generating the first digital content item with an indication of a unique telephone number; and mapping the unique telephone number to the user and the first digital content item. After a predetermined activity time, the unique telephone number is disassociated from the first digital content item and placed into a quarantine pool. After a predetermined quarantine time, the unique number is removed from the quarantine pool and assigned to a second target organization selected by: determining a first business profile associated with the first target organization; determining a second business profile associated with the second target organization; and verifying that the first business profile and the second business profile are different.
Method and apparatus of providing messaging service and callback feature to mobile stations
Disclosed are an apparatus and method of performing automated administrative operations on a mobile device. One example method may include determining via a hosted server that an action needs to be performed by a mobile device under management. The method may further include generating a message via the hosted server, the message includes the action, and transmitting the message to the mobile device under management, and receiving a result message from the mobile device under management responsive to the transmitted message, the result message indicating that the action has been satisfied.
METHOD AND APPARATUS FOR ZERO-TOUCH BULK IDENTITY ASSIGNMENT, PROVISIONING AND NETWORK SLICE ORCHESTRATION FOR MASSIVE IOT (MIOT) DEPLOYMENTS
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
System and method for detecting and controlling contraband devices in a controlled environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
USER IDENTITY DETERMINING METHOD, APPARATUS, AND DEVICE
A user identity determining method includes: acquiring target multidimensional feature information of a target user, wherein the target multidimensional feature information includes at least two types of feature information in at least one of biometric feature information or non-biometric feature information; comparing the target multidimensional feature information with multidimensional feature information of a plurality of designated users, respectively, to obtain a comparison result; and determining an identity of the target user based on the comparison result.
METHOD FOR REQUESTING TRANSPORTATION SERVICES
A method for safely and efficiently requesting transportation services through the use of mobile communications devices capable of geographic location is described. Individual and package transportation may be provided. New customers may be efficiently serviced, and the requester and transportation provider locations may be viewed in real time on the mobile devices.
Telephone number selection
An example method of assigning a telephone number to a user account in a communications system is provided. The method includes obtaining a mnemonic seed and obtaining a subset of telephone numbers filtered from a global telephone number pool based on the mnemonic seed. The alphanumeric representation of each telephone number in the subset is within a threshold Hamming distance of the mnemonic seed. The method further includes receiving an indication of a selected telephone number from the subset and assigning the selected telephone number to the user account.
Independent internet connection generation
A method and system for generating an automated Internet connection is provided. The method includes receiving from a first communication hardware device of a first user, a first telephone number and a first Internet protocol (IP) address. A second telephone number and a second Internet protocol (IP) address are received from a second communication hardware device of a second user. A request for connecting the first communication hardware device to the second communication hardware device via an Internet connection is received and it is determined that the second communication hardware device is currently connected the first communication hardware device. The request is transmitted to the second communication hardware device. Based on the second user approving the request, the second IP address is automatically transmitted to the first communication device and a secure private Internet link between the first communication hardware device and the second communication hardware device is generated.
Method and System for Implementing Telephone Solicitation Prevention
Novel tools and techniques are provided for implementing telephone solicitation prevention using enhanced voice over Internet protocol (VoIP) functionalities in conjunction with STIR/SHAKEN protocols. In various embodiments, in response to receiving a call setup message or a call request from a calling party, a call server might send a verification request to a secure telephone identity (STI) verification server (VS). The STI-VS might verify and send the call setup message to a no solicitation application server, which might instruct a media server to connect to a first gateway device and to play a no solicitation message requesting a response from the calling party, and which might verify whether the response is an appropriate response. If so, a call is established. If not, the call might be disconnected and/or forwarded to a voicemail server to play a voicemail message to the calling party in accordance with preferences of the called party.