摘要:
A system, method, and computer readable medium comprising instructions for handling insufficient account balance of subscribers in a mobile communications network is disclosed. A request for communication is received from a mobile station. A determination is made as to whether a subscriber of the mobile station has an insufficient account balance. If the subscriber has an insufficient account balance, the request is withheld and the mobile station is notified by a short message.
摘要:
Disclosed herein is a method for providing an offer which includes selecting at least one offer for presentation by applying at least one rule dictated by a merchant to a set of offers, applying at least one rule dictated by a financial institution to the offers, and applying a filter to identify offers with the highest likelihood of being accepted by the user. The selected offer is then presented to the user. An authorization request from a merchant for a user transaction is received by a remote computer and analyzed to determine one or more categories or sub-categories of the merchant or item in the transaction. The system then determines whether the selected offer is for a merchant or item in a related but different category from the one for which the authorization request was received, and if it is, the system reminds the user of the selected offer.
摘要:
A method for providing a savings opportunity includes receiving an authorization request for a user transaction by a first remote computer. By analyzing, at the first remote computer, the authorization request, it can be determined if the currency being used during the transaction is different from the preferred currency (as indicated by a user profile). If there is a difference, a savings opportunity indication for the foreign transaction is generated. The savings opportunity indication may be transmitted to a second remote computer where a savings opportunity from a database of savings opportunities is matched to the user. Then, at least one of the user and the merchant is notified by the second remote computer of the savings opportunity. Alternatively, the matched savings opportunity is returned to the first remote computer for transmittal to at least one of the user and the merchant along with an authorization of the transaction.
摘要:
Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections.
摘要:
Disclosed herein is a method for a merchant to gain information about the purchasing characteristics of a group with which the merchant wishes to interact. Merchants wishing to target group members are not able to specifically identify members of the group through depersonalized transaction data available from financial institutions. Group members are therefore identified through a traditional method: market research. The method also includes noting the purchasing behavior of group members, including providers of goods and services to group members, merchants not patronized by members of the group, and demographic characteristics of the group. An example of such a group is the so-called “millennials”. The identification of group members may be validated through test runs of financial data and fine-tuned to ensure correct identification of group members.
摘要:
Methods and systems for exchanging various forms of value, including coins, paper currency, credit, and/or debit, for Internet service and digital content. Such digital content can include, for example, online games and content for mobile phones. In one embodiment, a value exchange machine includes a coin input region, a coin sorting/counting apparatus, a card reader, and a communications facility configured to communicate with a remote computer network. A user wishing to purchase Internet service, for example, can visit the value exchange machine, select the desired transaction, and pay for the Internet service with coins, paper currency, a credit card, a debit card, and/or bank account funds. After confirming payment, the value exchange machine can issue a code to the user, for example, on a card enabling the user to obtain the Internet service.
摘要:
A system and method in a cellular telecommunication network for indicating tariff-related information to an end user having the ability to access network areas with different charging tariffs. In one embodiment, a Charging Indication Data Base (CIDB) in the access network stores charging indications for different combinations of end users and cell identities, and a Rate Indication Data Base (RIDB) stores tariff information for the core network. When the end user accesses the cellular network through an identified cell, a radio network controller (RNC) retrieves a charging indication from the CIDB and sends it to a Mobile Switching Center (MSC). The MSC uses the charging indication to retrieve tariff-related information from the RIDB and sends it to the end user. The CIDB and RIDB may also be co-located in the core network.
摘要:
A phone appliance and method of use are provided where the phone appliance can be used to make VoIP communications calls. In a preferred embodiment, the phone appliance includes an RF connection for connecting to a computer or other computing device for facilitating the placement of the VoIP communications calls. The phone appliance further includes a display or portal for depicting advertisements provided by various advertisers. The advertisements provided can be used to defray all or part of the cost associated with making VoIP communications calls. The portal can also be used to communicate with businesses for ordering products, such as ordering a pizza, and to perform various services, such as purchasing stocks. In an exemplary system, the phone appliance is used to transmit to a control center information related to the user of the phone appliance, such as interests and buying habits, and queries for receiving additional information for various advertised products and services. The control center transmits the queries to the appropriate vendors for providing the user with additional information. Other functions and features are provided to the phone appliance, such as being able to download e-mail messages stored within or received by the computer.
摘要:
Disclosed herein is a method of classifying financial transactions by usage patterns of a user. The method includes analyzing metadata extracted from the information associated with financial transactions in accordance with at least one business rule. Where the analysis includes sequentially analyzing the metadata using a constant-time lookup data structure, a Radix tree, a Lucene tree and fuzzy logic methods, until a unique identifier is found that is associated with the metadata. The metadata with the unique identifier is then added to the constant-time lookup data structure to update the constant-time lookup data structure. The transaction data is then classified based on the unique identifier.
摘要:
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems.