H04M15/8351

OPTIMIZED SYSTEM AND METHOD FOR NOTIFYING A CALLED PARTY OF A CALL ATTEMPT
20180007198 · 2018-01-04 ·

A system and method for notifying a called party of a call attempt is provided. The method comprises initiating a communication request by a calling party; routing the communication request to an intelligent network via an mobile service center; validating the communication request by the intelligent network; and handing over the communication request to an intelligent platform by the intelligent network in the event of a nonstandard trigger event such as calling party insufficient balance. The processing of communication request by the intelligent platform includes monitoring number of call attempts, introducing a delay in sending notification, monitoring availability of called party and performing one or more actions based on the delay and the availability of the called party.

INFORMATION PROCESSING TERMINAL
20230239411 · 2023-07-27 ·

An information processing terminal allowing a user to view a content stored in an external server via contracted communication lines comprises a communication data amount management unit configured to manage an amount of data communicated via a high-speed communication line of the communication lines, and a display control unit configured to execute display control, and in a case where there is a possibility that an amount of data necessary for viewing of the content is about to exceed an amount of data remaining within a contracted amount of data, the communication data amount management unit calculates, as a purchase price, a price to additionally purchase a predetermined amount of data of the high-speed communication line based on a predetermined condition, and the display control unit displays the calculated purchase price.

System and method for authenticating called parties of individuals within a controlled environment
11563734 · 2023-01-24 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20230231843 · 2023-07-20 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

MONITORING RESOURCE CONSUMPTION BASED ON FIXED COST FOR THRESHOLD USE AND ADDITIONAL COST FOR USE ABOVE THE THRESHOLD
20170359233 · 2017-12-14 ·

A method includes establishing a cost for consumption of a given resource by a given resource consumer for a designated period of time, the cost comprising a fixed cost for consumption of the given resource up to a threshold consumption level for the designated time period and an additional cost associated with consumption of the given resource exceeding the threshold consumption level for the designated period of time, monitoring consumption of the given resource by the given resource consumer, determining whether resource consumption by the given resource consumer is projected to exceed the threshold consumption level over the designated time period, generating an alert responsive to determining that resource consumption by the given resource consumer is projected to exceed the threshold consumption level over the designated time period, and providing the alert for presentation via a user interface of a user device associated with the given resource consumer.

Method and apparatus for content presentation in association with a communication connection
09838541 · 2017-12-05 · ·

A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party. Presentation of specified content may include assisted sharing, wherein both parties view the same content and one guides or assists the other. A received call may be split into signal and voice channels, with the signal channel used to notify a call controller of the call and the voice channel being directed to an agent selected by the call controller to handle the call.

Systems and methods for establishing wireless connections based on access conditions

The subject matter described herein includes managing access conditions and determining which access point to use by a wireless device based on terms and conditions (TCs) for allowing access (TCsAA) and terms and conditions for utilizing access (TCsUA) provided and updated by various parties in a system for alternative network access provision (ANAPS) comprising of a cloud based server system and a wireless device and its connection manager software system. The TCs may depend on a number of variables including one or more of the following: price, availability, relative signal strengths and communication speeds of different cellular base pay and or access points and connections through the stations or access points to the Internet or other backend systems, the location and possible motion of the device, the time of day, week, month or year as well as the cost of communication alternatives.

Charging information for WLAN network selection in 3GPP-WLAN data offloading
09742928 · 2017-08-22 · ·

A user equipment (UE) may receive charging data and use the charging data in determinations of whether to offload data from a mobile communication network, such as a 3GPP cellular network, to another wireless access network, such as a wireless local area network (WLAN). For example, the UE may receive, from the mobile communication network, charging data regarding one or more WLANs in the vicinity of the UE. The UE may also receive rules regarding whether to offload communication traffic from the cellular communication network to a particular WLAN based on charging data relating to the particular WLAN. The UE may detect one of the WLANs and determine whether to offload communication traffic to the WLAN based at least in part on the received rules and the received charging data regarding the WLAN. The determination may be further based on user preferences saved on the UE regarding the charging data.

Peer-enabled network access extension using yield management

Aspects of the present disclosure provide for yield management models for dynamically pricing access to wireless communication services. In some examples, access to a network is intermediated by a surrogate access point, which may act as a proxy or relay, expanding communication services to client devices that otherwise may lack a subscription, or may lack a suitable communication interface, to communicate directly with the wireless network. Here, the surrogate access point may be a subscriber device or user equipment. By utilizing the yield management model, the surrogate access point may receive compensation for sharing its connection to the network with nearby client devices. Other aspects, embodiments, and features are also claimed and described.

METHODS AND APPARATUS TO GENERATE AUDIENCE MEASUREMENT DATA FROM POPULATION SAMPLE DATA HAVING INCOMPLETE DEMOGRAPHIC CLASSIFICATIONS
20220272204 · 2022-08-25 ·

Methods and apparatus to generate audience measurement data from population sample data having incomplete demographic classifications are disclosed. An example method includes detecting that a number of impressions a time segment of a video occurred based on messages; detecting that no impressions for the time segment of the video were detected by the database proprietor; determining respective percentages of exposures of the video that are attributable to corresponding ones of multiple demographic groups, determining the respective percentages being based on the first demographic information provided by the database proprietor for exposures of other time segments of the video; attributing respective portions of the number of impressions to the demographic groups based on the respective percentages to determine imputed numbers of impressions; generating adjusted numbers of impressions based on the imputed numbers of impressions; and determining ratings information for the video using the adjusted numbers of impressions.