摘要:
Systems, methods, and computer media are provided for preserving network address translation (NAT) state for a wireless device across wireless sessions. In response to a state preservation request received during a first wireless session, a device account is created for the wireless device, the account storing NAT state that defines approved content providers from whom inbound data traffic is permitted for the wireless device. Upon determining that the first wireless session has ended and that the wireless device has established a second wireless session, the stored NAT state for the wireless device is activated such that the NAT state of the first wireless session is preserved for the second wireless session. New unsolicited data traffic from approved content providers received during the second wireless session is subsequently permitted and forwarded to the wireless device.
摘要:
A method, system, and medium are provided for facilitating message recalls. One embodiment includes receiving an indication that a message has been communicated in association with a user device. A confirmation message is communicated to the user device. The confirmation message includes a recall option that, if selected, initiates a recall of the voice message. An indication of a user selection of the recall option is received and, thereafter, a recall of the message is initiated.
摘要:
What is disclosed is a method of operating a communication system to reconfigure a wireless communication device. The method includes, in the wireless communication device, optically receiving image data. The method also includes processing the image data to display a configuration interface, and receiving an instruction into the configuration interface to reconfigure the wireless communication device.
摘要:
A method, system, and medium are provided for applying call events in association with user devices based on priority levels is provided. One embodiment of the method includes referencing an active event level associated with a user device. The active event level indicates an extent of call events, such as dropped calls and/or blocked calls, in association with the user device. When it is determined that the active event level is unacceptable, a priority level associated with the user device is adjusted based on the active event level to reconcile the unacceptable active event level.
摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
Computer-readable media and methods are provided for identifying a mobile device as a legitimate subscriber to a communications network or as a clone device. A clone device is not legitimately subscribed to the network but poses as a legitimate device to gain usage of the legitimate mobile device's subscribed services. An application on the legitimate mobile device tracks call detail data for calls of the mobile device. The mobile device has a unique identifier. A network server compares the tracked call detail data against a master list of call detail data for the unique identifier. A mismatch between the mobile device's call detail data and the master list indicates a potential clone. A mobile device using the unique identifier but not providing substantially matching call detail data is identified as a clone. Countermeasures are provided to defeat the clone's usage of the network.
摘要:
A method, system, and medium are provided for identifying participants of video conference sessions. One embodiment of the method includes receiving enhanced video content that identifies one or more participants at a particular location of a video conference session. Each participant may be associated with a mobile device. Video conference participants are identified based on wireless communications from the mobile device, which has an electronic module, that is associated with the corresponding participant. The enhanced video content is displayed on a display screen. Such enhanced video content includes video content captured by a video camera that is aggregated with participant data that provides an indication of at least one participant.
摘要:
Computer-readable media and methods are provided for utilizing analytics collected by a mobile device to inform a user and to implement rules that instruct the mobile device on handling of calls. Analytics that include data about calls made and received by the mobile device are collected by the mobile device. An application on the mobile device uses the analytics to rank callers and provides the rankings to the user. A rule is received by the mobile device that indicates how to handle inbound and outbound calls based at least on the rankings. The analytics and rules are also useable for promotional purposes and can be shared with other services.
摘要:
The invention is directed to methods and systems for managing communications between a user of a mobile device and a content provider. Registration information is received from a mobile device indicating that a communications manager is authorized to communicate with the content provider and act on behalf of the mobile device with respect to blocking and unblocking certain messages received from the content provider. The content provider registers with the communications manager so that the communications manager knows specific codes and methods for communicating with the content provider. Modified user preferences are received from the mobile device, and these are communicated to the content provider by the communications manager.
摘要:
Systems, methods, and computer-readable media for facilitating enforcement of PRL restrictions are provided. The method includes receiving a registration request from a user device. The registration request includes a device identifier that identifies the user device and a network identifier that identifies a network selected for use. The device identifier is used to reference a list of networks permitted for use or prohibited for use by the user device. Thereafter, it is determined that the network selected for use by the user device is unauthorized based on a comparison of the network identifier that identifies the network selected for use to the list of networks permitted or prohibited for use by the user device. Based on the determination that the network selected for use by the user device is unauthorized, the user device is prevented from utilizing the selected network for voice or data services.