Patent classifications
H04M15/39
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
Mobile network handling of simultaneous usage sessions
Concepts and technologies are disclosed herein for mobile network handling of simultaneous data usage session records. A system can include a network session server that has a processor and a memory storing instructions that configure a processor to perform operations. The operations can include obtaining, from a session probe within a core network device, a raw mobile data set associated with a user equipment. The operations can include determining that the user equipment engages in a simultaneous usage session based on the raw mobile data set. The operations can include identifying targeted domains that are present within the raw mobile data set, and creating a raw session record for each of the targeted domains associated with the simultaneous usage session.
NETWORK SWITCHING DETECTION FOR TOLL-FREE DATA SERVICE PROVISION
A device determines a connection status of a Public Land Mobile Network (PLMN) communication interface and a wireless Local Area Network (LAN) communication interface, and stores the connection status in a queue. The device waits, subsequent to storing the connection status, for expiration of a time delay; and retrieves, subsequent to the expiration of the time delay, the connection status or another connection status from the queue. The device sends, based on the retrieved connection status or the other connection status, a service validation request to a server associated with the PLMN, and receives from the server, in response to the service validation request, a validation response that authorizes service delivery to the device via a PLMN.
BANDWIDTH AWARE NETWORK STATISTICS COLLECTION
Herein disclosed are systems, methods, and apparatus for controlling data usage statistics in network-connected devices. The ‘stats’ collection can be suppressed during minimum window periods, thereby reducing CPU and resources usage needed to processes the stats collection. Further, the minimum window can be a function of a link speed of the communication channel as well as a data usage proximity to a data usage warning limit. Further, stats collection can be triggered by expiration of a timer or data usage that meets a buffer threshold, where both the timer and threshold are selected based on the communication channel link speed, and buffer threshold is further a function of the data usage proximity to the warning limit.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.
UTILIZING CLIENT DATA USAGE INFORMATION TO ADJUST BANDWIDTH IN AN ADAPTIVE BIT RATE DEVICE
An Adaptive Bit Rate (ABR) device and method are described herein for utilizing client data usage information when consuming digital content from an ABR server. In one embodiment, the ABR device is configured to: (i) transmit, to the ABR server, a request for a digital content; (ii) receive, from the ABR server, a manifest associated with the digital content; (iii) select a bit rate from the manifest; (iv) obtain a data threshold (T); (v) obtain data usage information; (vi) compare the data usage information to the data threshold (T); (vii) choose a final bit rate from the manifest based on the comparison result; and (viii) receive, from the ABR server, all segments of the digital content at the final bit rate.
Detecting application store ranking spam
A server, which may be configured to manage distribution of content to users, may receive content related information associated with a particular user, and analyze the content related information. Such analysis may comprise comparing parameters in the content related information with corresponding predefined parameters in the server for determining acceptable content related activities, and classifying users based on the analysis of the content related information. The content related information may comprise one or more of content usage related data, content download related metrics, or user session related metrics relating to one or more sessions utilized by users in conjunction with use of content managed via the server.
Communications methods and apparatus related to web initiated sessions
A client device, e.g., a smartphone including a web browser, requests a call authorization token from a web server, e.g., a web page server. The web server, acting on behalf of a company, whose web page is hosted and whose phone corresponds to the called party, screens incoming requests and decides whether or not to issue an authorization token, e.g., a signed token including an encrypted portion. The web server issues a call authorization token and communicate the issued token to the client device. The client device includes the received issued call authorization token in a signal, e.g., a SIP INVITE signal, which it generates and sends to a session border controller (SBC). The session border controller processes the received authorization token and checks the authorization token to validate the received token. The SBC establishes a communications session if the received token passes the validation check.
DETECTION OF A DELINQUENT MOBILE DEVICE
A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.
MANAGING LIVE VIDEO STREAM CONNECTIONS
Exemplary embodiments of the present disclosure relate to minimizing data usage over a communication link. A system may include a server configured to receive, via a first connection, a video stream from at least one camera. The server may also be configured to provide, via a second connection, the video stream to a user device. Further, the server may be configured to continue to provide the video stream to the user device via the second connection in response to reception of an indicator indicating that a user of the user device is actively viewing the video stream. Moreover, the server may be configured to cause the video stream from the server to the user device to be terminated in response to lack of receipt of the indicator within a predetermined time interval. Associated methods and systems are also disclosed.