Patent classifications
H04M15/858
Base station that confirm the intention of a user to continue a call
A radio communication control device accepts a call-up from a radio communication terminal and includes a unit configured to detect the degree of jamming in a cell, a unit configured to confirm the intention of a user of a terminal concerned as to whether the call-up is continued regardless of addition of an extra to the user's telephone call charge when the call-up has been made from a radio communication terminal in the cell concerned in a specific jammed state, a unit configured to block the call-up concerned in accordance with the confirmed intention of the user of the terminal concerned and a unit configured to change charge setting so as to add an extra to the user's telephone call charge when the call-up has not been blocked in the specific jammed state.
Method and device for confirming and executing payment operations
A method and device for providing one-step payment approval and confirmation are disclosed. The device concurrently displays a data entry region and a confirmation region in a user interface of the device, where the data entry region is to accept user entry of payment data associated with a payment operation and the confirmation region is to require a sliding input to cause execution of the payment operation. While displaying the data entry region containing payment data received from a user, the device detects a user input in the confirmation region of the user interface. The device determines, in accordance with a predetermined criterion, whether the detected user input qualifies as a sliding input that follows a predefined motion path. Upon determining that the detected user input qualifies as the required sliding input, the electronic device executes the payment operation in accordance with the received payment data.
METHOD AND DEVICE FOR ESTABLISHING A COMMUNICATION
One embodiment relates to a method for establishing communication between at least one calling terminal and one called terminal, implemented by the calling terminal. The method comprises detecting the activation by the calling terminal of a request to establish a communication with the called terminal, obtaining a first piece of communication context information related to the calling terminal, and obtaining at least a second piece of communication context information related to the called terminal. The method also comprises determining a communication service to use in order to establish the requested communication with the called terminal, the determining being carried out from at least the first piece of communication context information and the second piece of communication context information, and sending, to the called terminal, a request for communication according to the determined communication service.
Method and System for Providing a Personalized Product Catalog Enabling Rating of Communication Events Within a User Device
Disclosed is a method and a user device for real time processing of rating associated to one or more telecommunication services. The user device comprises a personalized product catalogue module for receiving a personalized product catalogue comprising one or more telecommunication services. The personalized product catalogue further comprises a plurality of rules associated with rating of each of the one or more telecommunication services. The user device further may comprise a monitoring module for monitoring an event triggered for establishing a communication. The user device may further capture service consumption data pertaining to the appropriate telecommunication service being consumed for the processing of the event. The user device may further rate the event based on the service consumption data and at least one rule, of the plurality of rules, stored in the personalized product catalogue corresponding to the appropriate service.
ELECTRONIC DEVICE AND CONTENT TRANSMITTING AND RECEIVING METHOD THEREOF
An electronic device is provided. The electronic device includes a communication module configured to communicate with an external electronic device and a processor configured to determine a size of content, transmit or receive the content at a first speed if the size of the content is less than a specific size, and transmit or receive the content at a second speed, which is slower than the first speed, if the size of the content is greater than or equal to the specific size.
System and methods for enabling sponsored data access across multiple carriers
A service and system for providing sponsored data, wherein the data usage is not charged to a mobile subscriber but, rather, paid for by a sponsor. The system and service is mobile-operator neutral and exists separate and apart from any given mobile network. The system provides, to mobile network operators and sponsoring entities, a single domain name (TLD). The TLD is white-listed, in wild-card form, by the mobile network operator so that the operator will know to zero rate any data traffic associated with the TLD. Sponsoring entities are also provided with a unique identifier. The unique identifier is concatenated, as a pre-pend, to the TLD, thereby generating a FQDN that (1) identifies associated data traffic as being sponsored and (2) identifies the entity sponsoring the data. The system monitors data usage associated with each FQDN and prepares a bill that charges each sponsoring entity for the data usage associated with the particular FQDN.
System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
CELL-PHONE BAZAAR
A cell-phone comprising a set of executable instructions that configures the cell-phone to receive and display a menu showing a plurality of service plans for selection by the user, each service plan being characterized with one or more terms under which the user uses the services of a cell-phone phone network; determine a selection that a user makes; and transmit a message via a communication network making the selection of the service plan known.
METHOD AND APPARATUS FOR RELOADING A MOBILE NUMBER
A method for reloading a mobile number includes receiving a request for reloading the mobile number sent by a terminal, obtaining information on the mobile number, and determining whether the mobile number is a trusted number based on the obtained information. The method further includes reloading the mobile number if it is determined that the mobile number is a trusted number, and alerting the terminal that the mobile number is not a trusted number if it is determined that the mobile number is not a trusted number. The mobile number does not correspond to the terminal.