Patent classifications
H04M15/858
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Facilitation of follow-the-user data service for 5G or other next generation network
Follow-the-user (FTU) service can be implemented within a telecommunication data services platform to provide flexibility for end users to use their service subscriptions with any capable devices/vehicles. Currently, service subscriptions are generally tied to one device/vehicle that can be used to access the services, instead of the actual end user who uses the services. Therefore, a device/vehicle identifier can be utilized in accordance with an online billing and identification platform to identify end-user subscribers and associate their subscription services to a device/vehicle for which they are utilizing collect service usage, as well as to assign to its owner for the billing.
Dynamic Resource Granting Method and Device in Communication System, and Computer Readable Medium
Embodiments of the present disclosure relate to methods, devices and computer-readable media for dynamic resource authorization in a communication network. According to embodiments of the present disclosure, a device in a vendor network dynamically transmits a request to a network device in the vendor network according to a resource usage state in an operator network. In addition, the vendor and an operator negotiate on charging, so that resource requests and allocation are more reasonable, and the resource usage rate is improved. Furthermore, according to embodiments of the present disclosure, the operator further negotiates with a user on charging, so that the user is able to request and utilize a resource in a better manner.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Electronic device and content transmitting and receiving method thereof
An electronic device is provided. The electronic device includes a communication module configured to communicate with an external electronic device and a processor configured to determine a size of content, transmit or receive the content at a first speed if the size of the content is less than a specific size, and transmit or receive the content at a second speed, which is slower than the first speed, if the size of the content is greater than or equal to the specific size.
Apparatuses and methods for alternative sponsored data services
The present invention faces the issue of a user ignoring an alternative second service usable instead of a first service that the user is using, and which is a service subscribed by the user. To solve this issue, the present invention provides for associating a first service identifier and a second service identifier with a same service category at a subscription repository; upon detecting at a policy enforcer the first service is used by the user, notifying a policy controller of the first service identifier; obtaining, by the policy controller from the subscription repository, the second service identifier associated with the same service category as the first service identifier; offering the user, either directly from the policy controller or via the policy enforcer, to accept using the second service instead of the used first service; and, upon user accepting to use the second service, enforcing control rules for the second service at the policy enforcer.
Configuring captive portals with a cloud service
Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Method and apparatus for adaptive charging and performance in a software defined network
Aspects of the subject disclosure may include, for example, a method including instantiating a virtual network function to provide a network resource in the network, accessing data usage information associated with facilitation of a service to a communication device via the network, determining whether the communication device exceeds a data limit threshold according the data usage information, accessing a data limit instruction associated with the communication device responsive to determining that the communication device exceeds the data limit threshold, determining a modification to the virtual network function associated with the facilitation of the service according to the data limit instruction, and communicating with the network to cause the modification to the virtual network function. Other embodiments are disclosed.
Method and function for handling a subscriber's communication services
The embodiments herein relate to a method performed by a charging function (125) for handling a subscriber's communication services. The charging function (125) detects that a subscriber's credit account has reached or fallen below a credit threshold when the subscriber has multiple ongoing communication services consuming credit from the credit account. The charging function (125) sends a threshold notification to a UE (101) on which the subscriber has at least one of the multiple ongoing communication services. The charging function (125) determines if a response to the threshold notification has been received with prioritization of one of the multiple ongoing communication services. If a response with prioritization of one communication service has been received, the charging function (125) initiates termination of all ongoing communication services except the prioritized communication service, and provides all available credit to be available for the prioritized communication service.