Patent classifications
H04M15/10
Charging for Timing Resiliency Service
A base station receives, from a network function, a message comprising a charging control for time service indicator, wherein the charging control for time service indicator is for a time resiliency service for a wireless device. the base station collects, based on the charging control for time service indicator, usage information associated with the time resiliency service for the wireless device. The base station sends, to a mobility management function, the usage information associated with the time resiliency service.
FUNCTION AS A SERVICE CONSOLE FOR AN ONLINE APPLICATION EXCHANGE PLATFORM
A method for managing an application exchange platform includes receiving, from a developer, a service function, wherein the service function includes configuration details for an application available through an online application exchange. The method includes deploying the service function in the application exchange, identifying a first domain event requesting access to the service function from a user, and calling the service function in the online application exchange, in response to the first domain event. The method also includes recording a metric associate with the service function and a return parameter, emitting a second domain event indicative of a completion of the service function, and charging, with a billing tool, an appropriate party based on a usage metadata for the service function. A system and a non-transitory, computer-readable memory storing instructions to cause the system to perform the above method are also provided.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.
Telephone session initiation system
A method is presented that allows for coordination between parties wanting to communicate. The method serves to replace the current ‘synchronous’ method of phone session initiation (which allows random people to interrupt one's flow) with a system that allows both parties to indicate when they are ready and willing to communicate with particular parties. Instead of a first party directly calling a second party, both indicate readiness to talk to each other by means of (for instance) status indicators on a smartphone, thereby eliminating the obtrusive nature of the time-limited phone ring. The method also includes an apparatus that determines which is the optimal party to actually place the call such that overall expenses may be minimized.
Telephone session initiation system
A method is presented that allows for coordination between parties wanting to communicate. The method serves to replace the current ‘synchronous’ method of phone session initiation (which allows random people to interrupt one's flow) with a system that allows both parties to indicate when they are ready and willing to communicate with particular parties. Instead of a first party directly calling a second party, both indicate readiness to talk to each other by means of (for instance) status indicators on a smartphone, thereby eliminating the obtrusive nature of the time-limited phone ring. The method also includes an apparatus that determines which is the optimal party to actually place the call such that overall expenses may be minimized.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Function as a service console for an online application exchange platform
A method for managing an application exchange platform includes receiving, from a developer, a service function, wherein the service function includes configuration details for an application available through an online application exchange. The method includes deploying the service function in the application exchange, identifying a first domain event requesting access to the service function from a user, and calling the service function in the online application exchange, in response to the first domain event. The method also includes recording a metric associate with the service function and a return parameter, emitting a second domain event indicative of a completion of the service function, and charging, with a billing tool, an appropriate party based on a usage metadata for the service function. A system and a non-transitory, computer-readable memory storing instructions to cause the system to perform the above method are also provided.
Method and System for Managing Telecommunications
Methods and systems are disclosed that allow entities set up and send targeted calls and other communications over a network, to intended recipients, who recognize that an approved entity is calling them.