H04M15/835

DETECTION OF A DELINQUENT MOBILE DEVICE
20180013898 · 2018-01-11 ·

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

Method, apparatus and mobile device for measuring internet traffic of mobile device
09781591 · 2017-10-03 · ·

An apparatus for measuring and displaying Internet traffic of a mobile device, which includes a traffic measurement module and a traffic display module. The apparatus also includes a SIM card account creation module configured to create a SIM card account for each of a plurality of SIM cards. The traffic measurement module measures the Internet traffic of each of the SIM card accounts. The traffic display module displays the Internet traffic of each of the SIM card accounts. The Internet traffic of each SIM card on the mobile device may be measured and displayed.

DETECTION OF A DELINQUENT MOBILE DEVICE
20170230900 · 2017-08-10 ·

A method and system of detecting a delinquent mobile user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card of the user device is determined by the user device. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS as to whether the IMSI is authorized for the user device. Upon determining that the IMSI is not authorized for the user device, a notification is displayed on a display of the user device.

Management and dissemination of information from a controlled-environment facility

Systems and methods for dissemination of information from a controlled-environment facility may offer a non-resident and/or resident an option to subscribe to notifications about a particular resident of a controlled-environment facility and/or notifications about the controlled-environment facility. Identification and contact information may be accepted from the non-resident to establish the non-resident as a paid or non-paid subscriber to notifications about the resident and/or the controlled-environment facility. A determination may be made, or an indication may be received from a controlled-environment facility administration and management system, when information about the resident hosted by the controlled-environment administration and management system changes and/or when a change is made to information about the controlled-environment facility. As a result, the subscriber is contacted and notified of the change(s).

Advice of charge in content centric networks

Advice of charge (AoC) enforcement is implemented in a content centric networking (CCN) gateway. The AoC enforcement receives a CCN interest packet from a user equipment in a network external to the CCN network and looks up a prefix of the CCN name in an AoC table. The AoC enforcement further, in response to determining a match between the prefix of the CCN name and an entry in the AoC table, generates an AoC request and forwarding the AoC request toward an AoC server identified by the entry in the AoC table determined to be the match with the prefix of the CCN name. In response to not determining the match between the prefix of the CCN name and the entry in the AoC table or in response to receiving a purchase accepted response from the AoC server, a CCN object identified by the CCN name is retrieved and forwarded to the user equipment.

Method and apparatus for providing roaming service
11128757 · 2021-09-21 · ·

A method of a roaming user equipment (UE) according to an embodiment of the disclosure includes obtaining billing information of the roaming UE from a message received from a communication carrier server, sending a billing information authentication request message including the obtained billing information to an authentication server, and receiving an authentication result regarding whether the billing information is valid.

Connectivity system for establishing data access in a foreign mobile network

This disclosure is directed to establishing data access for a mobile device in a foreign mobile network. An exemplary method comprises executing a first attach operation (e.g., an IMSI attach operation) for a mobile device, the first attach operation resulting in a successful first attachment for the mobile device; determining, for a particular period, non-execution of a second attach operation (e.g., a GPRS operation) for a second attachment for the mobile device; classifying, based on the successful first attachment and the non-execution of the second attach operation for the particular period, the mobile device as a silent roamer; and determining whether the mobile device is associated with a data package for establishing a first quota of data access.

Connectivity system for establishing data access in a foreign mobile network

This disclosure is directed to establishing data access for a mobile device in a foreign mobile network. An exemplary method comprises executing a first attach operation (e.g., an IMSI attach operation) for a mobile device, the first attach operation resulting in a successful first attachment for the mobile device; determining, for a particular period, non-execution of a second attach operation (e.g., a GPRS operation) for a second attachment for the mobile device; classifying, based on the successful first attachment and the non-execution of the second attach operation for the particular period, the mobile device as a silent roamer; and determining whether the mobile device is associated with a data package for establishing a first quota of data access.

Connectivity system for establishing data access in a foreign mobile network

This disclosure is directed to establishing data access for a mobile device in a foreign mobile network. An exemplary method comprises executing a first attach operation (e.g., an IMSI attach operation) for a mobile device, the first attach operation resulting in a successful first attachment for the mobile device; determining, for a particular period, non-execution of a second attach operation (e.g., a GPRS operation) for a second attachment for the mobile device; classifying, based on the successful first attachment and the non-execution of the second attach operation for the particular period, the mobile device as a silent roamer; and determining whether the mobile device is associated with a data package for establishing a first quota of data access.

Restoring functionality of a mobile device

A method and system of restoring a functionality of a mobile user device. A lock screen is displayed on the display of the user device. An international mobile subscriber identity (IMSI) of a subscriber identity module (SIM) card presently installed in the user device is determined. The IMSI is sent to a Remote Recovery Server (RRS). A message is received from the RRS indicating whether the IMSI is authorized for the user device and whether an account of the user device is replenished at least in part. Upon determining that the IMSI is authorized for the user device and the account of the user device is replenished at least in part, at least one function that was previously restricted is restored.