H04M15/83

SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS

A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.

Method and apparatus for collecting network data

Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.

USER SERVICE PROCESSING METHOD, SYSTEM, AND RELATED DEVICE
20230045030 · 2023-02-09 ·

A user service processing method in a charging system is as follows: A charging trigger device provides initial quota application mode indication information for a charging processing device, so as to indicate an initial quota request mode previously applied by the charging trigger device for a user service. The charging processing device performs charging processing on the user service based on the indication information, and delivers a charging processing result to the charging trigger device, to enable the charging trigger device to change a charging operation on the user service. In this way, by changing a cooperation relationship between the charging processing device and the charging trigger device, a balance between performance of the charging system and a credit control risk, or between an access delay and a credit control risk is implemented.

Method and system for fairly charging talk time of video call that introduces new person
11558721 · 2023-01-17 · ·

A computer-implemented billing method including displaying, on a video call screen, video data related to a counterpart terminal with which a video call is connected, recognizing reaction information input from the counterpart terminal based on the video data related to the counterpart terminal displayed on the video call screen, and generating billing data related to the recognized reaction information of the counterpart terminal based on a billing policy may be provided.

MOBILE DEVICE WITH DISABLING FEATURE
20180005225 · 2018-01-04 ·

A method and system for payments for mobile phone payments with a disabling feature is disclosed. The method includes activating a mobile phone containing contactless payment systems, and having a timeout feature disable the contactless payment systems after a set period of time.

OPTIMIZED SYSTEM AND METHOD FOR NOTIFYING A CALLED PARTY OF A CALL ATTEMPT
20180007198 · 2018-01-04 ·

A system and method for notifying a called party of a call attempt is provided. The method comprises initiating a communication request by a calling party; routing the communication request to an intelligent network via an mobile service center; validating the communication request by the intelligent network; and handing over the communication request to an intelligent platform by the intelligent network in the event of a nonstandard trigger event such as calling party insufficient balance. The processing of communication request by the intelligent platform includes monitoring number of call attempts, introducing a delay in sending notification, monitoring availability of called party and performing one or more actions based on the delay and the availability of the called party.

Methods and Systems for Facilitating Subsidized Access by a User to Network Content

An exemplary method includes a subsidized access management system detecting a request provided by a user of an access device for the user to receive subsidized access to network content, identifying a plurality of user parameters provided by the user and that define a plurality of conditions associated with the subsidized access to the network content and that the user is willing to experience in order to receive the subsidized access to the network content, selecting a sponsor from a pool of potential sponsors and that is willing to sponsor the subsidized access to the network content in accordance with the plurality of user parameters, and providing the user with the subsidized access to the network content by way of the access device in accordance with a subsidized access arrangement between a subsidized access provider and the sponsor. Corresponding systems and methods are also described.

Phone appliance with display screen and methods for using the same
11563834 · 2023-01-24 ·

A phone appliance and method of use are provided where the phone appliance can be used to make VoIP communications calls. In a preferred embodiment, the phone appliance includes an RF connection for connecting to a computer or other computing device for facilitating the placement of the VoIP communications calls. The phone appliance further includes a display or portal for depicting advertisements provided by various advertisers. The advertisements provided can be used to defray all or part of the cost associated with making VoIP communications calls. The portal can also be used to communicate with businesses for ordering products. such as ordering a pizza, and to perform various services, such as purchasing stocks. In an exemplary system, the phone appliance is used to transmit to a control center information related to the user of the phone appliance, such as interests and buying habits, and queries for receiving additional information for various advertised products and services. The control center transmits the queries to the appropriate vendors for providing the user with additional information. Other functions and features are provided to the phone appliance, such as being able to download e-mail messages stored within or received by the computer.

System and method for authenticating called parties of individuals within a controlled environment
11563734 · 2023-01-24 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20230231843 · 2023-07-20 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.