H04M15/7652

Extending Use of a Cellular Communication Capabilities in a Wireless Device to Another Device
20220272781 · 2022-08-25 ·

Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device.

Apparatus and method for providing telecommunication services
09723156 · 2017-08-01 · ·

Methods and apparatus of improving telecommunication network efficiency by increasing user device registration with and use of the network are disclosed. Improved user device registration and use, and thus increased efficiency may be achieved by allocating revenue generated by operation of a telecommunication network between user devices, a network operator device, and a third party device. The allocation of revenue may be based, at least in part, on a hierarchical relationship between user devices registered with the network and information concerning the use of the telecommunication network by the user devices.

Mobile Device and Service Management

A wireless end-user device, comprising one or more modems enabling the wireless end-user device to communicate with a network system over a wireless access network, a touch-screen user interface, and one or more processors configured to execute one or more instructions that, when executed by the one or more processors, cause the one or more processors to detect a user input through the touch-screen user interface, the user input comprising a request to remove the wireless end-user device from an existing device group account, the existing device group account being associated with one or more devices including the wireless end-user device, and send a message to the network system over the wireless access network, the message conveying the request to remove the wireless end-user device from the existing device group account.

Mobile device sharing facilitation methods and systems featuring a subset-specific source identification

Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.

System, method, and computer program for managing a shared quota for a plurality of network subscribers in a consumer telecommunications network

A system, method, and computer program product are provided for managing a shared quota for a plurality of network subscribers in a consumer telecommunications network. In use, a first usage quota reservation out of a shared quota is allocated to at least one first subscriber among a plurality of network subscribers. Further, it is determined that at least a portion of the shared quota is available. Additionally, a progressively smaller at least one second usage quota reservation out of the at least a portion of the shared quota is recursively allocated to the at least one first subscriber among the plurality of network subscribers, the smaller at least one second usage quota reservation being smaller than the first usage quota reservation out of the shared quota.

METHODS AND SYSTEMS FOR ADDRESSING UNREPORTED THEFT OR LOSS OF MOBILE COMMUNICATIONS DEVICES

A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.

PAIR-THE-PLAN SYSTEM FOR DEVICES AND METHOD OF USE

A computer-implemented method and system are disclosed for connecting a device to subscriptions and cellular billing plans. The method includes enrolling a second device enabled for connectivity to cellular or other wireless service in a cellular subscription and associated billing plan associated with a first device, wherein the enrollment includes providing an identifier for the second device to a cellular service provider associated with the first device by a second user, and allowing a second user to use capabilities of the second device as governed by the cellular subscription and an associated billing plan associated with the first device; while the second device is also configured to allow a first user to use capabilities of the second device as governed by the cellular subscription and an associated billing plan of the first user's choice.

Extending use of a cellular communication capabilities in a wireless device to another device
11368992 · 2022-06-21 · ·

Extending cellular telecommunication service from a first UE to another device. The first UE may register for cellular telecommunication service with a cellular network using a first cellular service account, using a cellular communication link via a cellular radio. A second device may be discovered and a communication link may be established between the first UE and the second device. The second device may be registered to use cellular telecommunication capability provided by the first UE. Communications between the second device and the cellular network may be conveyed via the communication link between the first UE and the second device and the cellular communication link. Conveying communications between the second device and the cellular network may provide use of the first cellular service account for cellular telecommunication service to the second device.

MANAGING DATA TRANSFERS OVER NETWORK CONNECTIONS BASED ON PRIORITY AND A DATA USAGE PLAN

Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits.

METHODS AND SYSTEMS FOR ADDRESSING UNREPORTED THEFT OR LOSS OF MOBILE COMMUNICATIONS DEVICES

A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.