-
公开(公告)号:US10390202B2
公开(公告)日:2019-08-20
申请号:US16027245
申请日:2018-07-03
Applicant: T-Mobile U.S.A., Inc.
Inventor: Christopher Lihosit , Tyler Axdorff
Abstract: Systems and methods for automatically modifying computing devices are provided. Various embodiments allow multiple control beacons (e.g., Bluetooth low energy beacons) with GPS to automatically pre-configure by discovering each other using location provided by the GPS in the beacons. These beacons can then be used to enforce multiple rules or policies on the computing device (e.g., restrict the activities/functionality of a mobile device). For example, a beacon can be installed at a family's dinner table and can be used as a trigger to restrict (or activate) phone features (e.g., allow only incoming calls while near this beacon during dinner times). In some embodiments, the GPS on the beacon can be used to notify administrators (e.g., parents) if the beacon is moved from its current location.
-
公开(公告)号:US10305657B2
公开(公告)日:2019-05-28
申请号:US15727405
申请日:2017-10-06
Applicant: T-Mobile U.S.A., Inc.
Inventor: Mayank Kaul , Shujaur Rehman Mufti
Abstract: Systems and methods are described herein for handling E911 communications within IMS networks, such as Voice over LTE (VoLTE) networks. In some embodiments, the systems and methods, via various communication nodes, handle or otherwise govern emergency calls within the VoLTE network, by sending an INVITE message from a sender node of the VoLTE network to a recipient node of the VoLTE network, and starting a retry timer at the sender node that is specific to handling E911 calls by the VoLTE network.
-
公开(公告)号:US20180317074A1
公开(公告)日:2018-11-01
申请号:US16027245
申请日:2018-07-03
Applicant: T-Mobile U.S.A., Inc.
Inventor: Christopher Lihosit , Tyler Axdorff
CPC classification number: H04W4/80 , H04W4/33 , H04W40/244 , H04W48/04 , H04W48/12
Abstract: Systems and methods for automatically modifying computing devices are provided. Various embodiments allow multiple control beacons (e.g., Bluetooth low energy beacons) with GPS to automatically pre-configure by discovering each other using location provided by the GPS in the beacons. These beacons can then be used to enforce multiple rules or policies on the computing device (e.g., restrict the activities/functionality of a mobile device). For example, a beacon can be installed at a family's dinner table and can be used as a trigger to restrict (or activate) phone features (e.g., allow only incoming calls while near this beacon during dinner times). In some embodiments, the GPS on the beacon can be used to notify administrators (e.g., parents) if the beacon is moved from its current location.
-
公开(公告)号:US20180288229A1
公开(公告)日:2018-10-04
申请号:US16000840
申请日:2018-06-05
Applicant: T-Mobile U.S.A., Inc.
Inventor: Michael Lasso , Samir Hodroj , Della Conley , Omar Hassan , Dragos Lazar
Abstract: Systems and methods for adapting traditional landline telephones to make and receive Voice over Internet Protocol (VoIP) calls and other communications are described. In some embodiments, an adapter, adaptor, or other device or apparatus connects an IP router, such as a WiFi router or other access point, to a traditional landline telephone (e.g., a phone using dual-tone multi-frequency, or DTMF, signaling), enabling the traditional landline phone to make and/or receive VoIP calls.
-
公开(公告)号:US20180219914A1
公开(公告)日:2018-08-02
申请号:US15417548
申请日:2017-01-27
Applicant: T-Mobile, U.S.A. Inc.
Inventor: Greg Reith , Brett Peppe
IPC: H04L29/06
CPC classification number: H04L63/20 , G06N7/005 , G06N20/00 , H04L63/104 , H04L63/1425 , H04W12/00508 , H04W12/08
Abstract: A methods and systems of providing security based on an identified susceptibility profile of a user are provided. Behavioral data related to an account of a user is received for a predetermined period. The behavioral data is analyzed for a pattern of on-line behavior of the user. A susceptibility profile of the user is created based on the pattern of on-line behavior. Environment parameters are received from a database. A security threat model is created based on the susceptibility profile and the environment parameters. A report data packet based on the created threat model is sent to an account of the user.
-
公开(公告)号:US20180218377A1
公开(公告)日:2018-08-02
申请号:US15421102
申请日:2017-01-31
Applicant: T-Mobile, U.S.A., Inc.
Inventor: Aaron Drake , Jonathan Morrow
CPC classification number: G06Q30/0201 , G06Q50/01 , H04L51/32 , H04L67/22 , H04M3/2218 , H04M3/5158 , H04M15/58 , H04M15/8044 , H04W4/14
Abstract: Some users of communications systems and social networks have more influence over other users due to having more contacts and communications with people through the systems and networks. The techniques described herein identify these more influential users. Data from such users is used to provide a scoring metric for each user, and user can be ranked according to the scoring metric. Communications can then be made to a subset of users based on the rankings.
-
公开(公告)号:US10015651B1
公开(公告)日:2018-07-03
申请号:US15396065
申请日:2016-12-30
Applicant: T-Mobile, U.S.A., Inc.
Inventor: Kanakrai Chauhan
Abstract: A device switching technique that can be used when a user switches from a first cell phone to a second cell phone is described, wherein a phone provider detects an event indicating that a device switch is imminent and sets up temporary storage associated with a first device. At the user's convenience, the user performs a data transfer process to transfer a portion of user data from the first device to the temporary storage. When the user receives the second device, such as in a phone store, remaining user data is transferred from the first device to the second device, thereby decreasing the amount of time necessary to set up the second device.
-
公开(公告)号:US20180184307A1
公开(公告)日:2018-06-28
申请号:US15390886
申请日:2016-12-27
Applicant: T-Mobile, U.S.A, Inc.
Inventor: Sivakumar Periyasamy , Dragan Stankic , Gezim Krasniqi , Ashwin Thomas
CPC classification number: H04W24/02 , H04M15/61 , H04W4/50 , H04W28/085 , H04W72/042 , H04W84/042 , H04W88/02 , H04W88/08
Abstract: Systems and methods are provided to administer a wireless telecommunication network (WTN) having a plurality of cell sites. Network data is received from a data source for a subject cell site. A baseline performance of the subject cell site is determined. Parameters to optimize for the subject cell site based on the baseline performance are identified. Load balancing is performed on the subject cell site by comparing a normalized user equipment (UE) downlink (DL) throughput at a first cellular frequency band to a second cellular frequency band. A cellular coverage of the subject cell site is adjusted based on a voice over LTE (VoLTE) drop call rate for a predetermined time period and a normalized UE DLL throughput. A layer management is performed on the subject cell site.
-
公开(公告)号:US20180150884A1
公开(公告)日:2018-05-31
申请号:US15466459
申请日:2017-03-22
Applicant: T-Mobile U.S.A., Inc.
Inventor: Aaron Drake , Brian Ehrhart
CPC classification number: G06Q30/0269 , G06Q30/0277 , H04L63/0428 , H04L63/0807 , H04L67/10 , H04L67/125 , H04L67/18 , H04L67/306 , H04W8/18 , H04W8/22
Abstract: Targeted electronic advertising media may be provided to users of user devices that access and seek data resources on the Internet through encrypted data streams across a telecommunication network. When an encrypted data stream is received at a cellular telecommunication network server from a user device resident application requesting access to a data resource on the Internet, a user profile token is created for the user device that at least includes the user device identification data to access the cellular telecommunication network. The user profile token may be provided to one or more advertising servers along with data indicative of the requested Internet data resource to enable an advertising server to identify of the user and send targeted advertising media to the requesting user device.
-
公开(公告)号:US09967723B2
公开(公告)日:2018-05-08
申请号:US15489557
申请日:2017-04-17
Applicant: T-Mobile, U.S.A, Inc.
Inventor: Nassereddine Sabeur , Hichem Zait
CPC classification number: H04W4/90 , H04W8/08 , H04W8/12 , H04W76/50 , H04W84/042
Abstract: A roaming wireless user device on a Visited Public Land Mobile Network (VPLMN) may initiate a Long-Term Evolution (LTE) emergency call to a Public Safety Answering Point (PSAP). Accordingly, a Proxy Call Session Control Function (P-CSCF) of the VPLMN may receive an anonymous Session Initiation Protocol (SIP) invite message for the LTE emergency call. The anonymous SIP invite message lacks a Mobile Station International Subscriber Directory Number (MSISDN) of the wireless user device but has an International Mobile Equipment Identity (IMEI) of the wireless user device. The anonymous SIP invite message is forwarded to a Location Retrieval Function (LRF) in a Gateway Mobile Location Center (GMLC) of the VPLMN. The LRF obtains a MSISDN of the wireless user device that matches the IMEI in the anonymous SIP invite message from a database of the GMLC, such that the MSISDN is routed with the LTE emergency call to the PSAP.
-
-
-
-
-
-
-
-
-