摘要:
A method and apparatus for advertising on a mobile phone. In one embodiment the method includes the steps of downloading an advertisement to the mobile phone using an advertisement server; selecting the downloaded advertisement on the mobile phone by a user of the mobile phone; providing by a server additional information in response to the user selection; and tracking the selection and additional information by the server. In another embodiment the compensation provided is in response to the display screen of said advertisement. In another embodiment the step of providing additional information includes the step of using space reserved, in the user interface of the mobile phone, for advertisements. Another aspect the invention relates to a system for displaying advertisements on a mobile phone. In one embodiment the system includes a server; and a mobile phone in communication with said server.
摘要:
A method of validating cellular device location record accuracy is intended to validate and refine cellular carrier records accuracy for investigation and litigation purposes. Records provided by a cellular carrier and other information are analyzed to validate or refine a possible and/or estimated location of a specified cellular device during a specified time frame. More specifically, the location of a specified radio communications transceiver cell site is verified, a nominal cellular wireless signal coverage map is produced, and various pieces of information regarding potential service disruptions during the specified time frame are analyzed in order to produce a more accurate coverage map during the specified time frame for the purpose of quantitatively defining probable or potential locations for the specified cellular device.
摘要:
Methods, systems, and devices are described that provide for directing a voice or video call using least cost dialing. Rules for directing a call may be generated by a server or a mobile device. The rules may be applied at a mobile device, facilitating a least-cost call with little or no input from the user of the mobile device. The rules may be based on identifying information about a caller or an intended call, or both. In determining what constitutes a least-cost option, a number of resources and factors, both monetary and non-monetary, may be considered. In some examples, a call identifier may be sent from a mobile device to a server, and the mobile device may receive, in response, one or more rules for directing a call. The rules may be applied at the mobile device, and the call may be placed accordingly.
摘要:
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.
摘要:
A Bring Your Own Device (BYOD) process allows isolation of data usage between corporate and personal endpoints. This process promotes BYOD usage in a corporate environment because of the ability to segregate data (i.e., corporate or personal). This enables BYOD users to bear the financial responsibility of data transmitted as part of such users' personal data plan and not data transmitted for corporate use. The process enhances productivity of corporate employees by removing cost barriers created by accessing corporate data on personal data plans.
摘要:
An apparatus, system or method for use of encrypted or confidential location or position, time, and unique identifier information (LPTI Information) comprising mobile device encoded unique identifiers (UIs), to register the presence of one or more persons in a retail or service store or outlet, vehicle, financial, educational, governmental, transportation, shipping, cargo, residential, vacation, travel, power generation or distribution, water or food supply or storage, or data storage location or position, for use in identifying potential suspects, conspirators, participants or witnesses for criminal, regulated, tort, or prohibited activity for use by law enforcement or a court, and which information is kept encrypted until authorized access is granted to law enforcement or a court by issuance or a warrant or other appropriate legal authorization.
摘要:
A server computing device may be deployed in telecommunication signaling network and configured to communicate with a subscriber profile repository, policy management component, a charging component, and/or other components in the network to intelligently determine whether a user equipment device should receive/use a service via a communication tunnel, to authorize and/or create a communication tunnel between a user equipment device and a tunnel termination function component, and to implement policy charging rules for the use of the service via the communication tunnel. The communication tunnel may carry a portion or a segment of a data flow for a specific service (or a portion of the communication link) between the user equipment device and a destination component. The server computing device may be configured to authorize/create different communication tunnels for different services and to implement different policy charging rules for different tunnels.
摘要:
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.
摘要:
Roaming of mobile devices is tracked and accounted for automatically and accurately. Revenue records are received for at least one service provider due to roaming of mobile devices within a geographical area served by the at least one service provider for mobile devices that do not have a subscription for service with the service provider for the geographic area. Expense records are received for the service provider due to roaming of mobile devices within other geographical areas served by at least one other service provider and not served by the at least one service provider. Each of the revenue and expense records is associated with a mobile device and includes a code identifying a service and a geographical area. If the codes are valid, the revenue records and expense records received over a period of time are compiled and summarized.
摘要:
An apparatus, system or method for use of encrypted or confidential location or position, time, and unique identifier information (LPTI Information) comprising mobile device encoded unique identifiers (UIs), to register the presence of one or more persons in a retail or service store or outlet, vehicle, financial, educational, governmental, transportation, shipping, cargo, residential, vacation, travel, power generation or distribution, water or food supply or storage, or data storage location or position, for use in identifying potential suspects, conspirators, participants or witnesses for criminal, regulated, tort, or prohibited activity for use by law enforcement or a court, and which information is kept encrypted until authorized access is granted to law enforcement or a court by issuance or a warrant or other appropriate legal authorization.