摘要:
A method, system, and medium are provided for facilitating message recalls. One embodiment includes receiving an indication that a message has been communicated in association with a user device. A confirmation message is communicated to the user device. The confirmation message includes a recall option that, if selected, initiates a recall of the voice message. An indication of a user selection of the recall option is received and, thereafter, a recall of the message is initiated.
摘要:
What is disclosed is a method of operating a communication system to reconfigure a wireless communication device. The method includes, in the wireless communication device, optically receiving image data. The method also includes processing the image data to display a configuration interface, and receiving an instruction into the configuration interface to reconfigure the wireless communication device.
摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
A method, system, and medium are provided for applying call events in association with user devices based on priority levels is provided. One embodiment of the method includes referencing an active event level associated with a user device. The active event level indicates an extent of call events, such as dropped calls and/or blocked calls, in association with the user device. When it is determined that the active event level is unacceptable, a priority level associated with the user device is adjusted based on the active event level to reconcile the unacceptable active event level.
摘要:
Computer-readable media and methods are provided for identifying a mobile device as a legitimate subscriber to a communications network or as a clone device. A clone device is not legitimately subscribed to the network but poses as a legitimate device to gain usage of the legitimate mobile device's subscribed services. An application on the legitimate mobile device tracks call detail data for calls of the mobile device. The mobile device has a unique identifier. A network server compares the tracked call detail data against a master list of call detail data for the unique identifier. A mismatch between the mobile device's call detail data and the master list indicates a potential clone. A mobile device using the unique identifier but not providing substantially matching call detail data is identified as a clone. Countermeasures are provided to defeat the clone's usage of the network.
摘要:
A method, system, and medium are provided for identifying participants of video conference sessions. One embodiment of the method includes receiving enhanced video content that identifies one or more participants at a particular location of a video conference session. Each participant may be associated with a mobile device. Video conference participants are identified based on wireless communications from the mobile device, which has an electronic module, that is associated with the corresponding participant. The enhanced video content is displayed on a display screen. Such enhanced video content includes video content captured by a video camera that is aggregated with participant data that provides an indication of at least one participant.
摘要:
Computer-readable media and methods are provided for utilizing analytics collected by a mobile device to inform a user and to implement rules that instruct the mobile device on handling of calls. Analytics that include data about calls made and received by the mobile device are collected by the mobile device. An application on the mobile device uses the analytics to rank callers and provides the rankings to the user. A rule is received by the mobile device that indicates how to handle inbound and outbound calls based at least on the rankings. The analytics and rules are also useable for promotional purposes and can be shared with other services.
摘要:
Systems, methods, and computer media are provided for preserving network address translation (NAT) state for a wireless device across wireless sessions. In response to a state preservation request received during a first wireless session, a device account is created for the wireless device, the account storing NAT state that defines approved content providers from whom inbound data traffic is permitted for the wireless device. Upon determining that the first wireless session has ended and that the wireless device has established a second wireless session, the stored NAT state for the wireless device is activated such that the NAT state of the first wireless session is preserved for the second wireless session. New unsolicited data traffic from approved content providers received during the second wireless session is subsequently permitted and forwarded to the wireless device.
摘要:
Systems, methods, and computer-readable media for restricting mobile device services between an occurrence of an account change and an acquisition of a security code. The method includes recognizing that a low level of security is in effect in association with a user device, or a set of credentials associated therewith. In accordance with the low level of security, an indication is provided to restrict one or more services initially provided for the user device, or the set of credentials associated therewith. In addition, an indication is provided to initiate an authentication event. Performance of such an authentication event results in the user device, or the set of credentials associated therewith, obtaining a security code that results in application of an increased level of security in effect in association with the user device, or the set of credentials associated therewith.
摘要:
Systems, methods, and computer-readable media, for facilitating incoming spoof call determinations are provided. In some embodiments, the method includes receiving call-setup data including a point code associated with origination of a call intended for a receiving device. The point code can be utilized to determine that the call intended for the receiving device is a spoof call. Such a spoof call can be initiated by a spoof-calling party associated with a number and is intended to provide an indication to the receiving device that the call is associated with another number.