Patent application number | Description | Published |
20080287111 | Method And System For The Prevention Of Unwanted Wireless Telecommunications - A method and system for the prevention of unwanted wireless telecommunications, which is implemented as part of a computer program product in (preferentially) the telecommunications operator's network. The method and system meets and/or exceeds much of current, proposed, and even academically anticipated legislative (and by necessity, technical) criteria, and thus the broader body of consumer requirements associated with wireless telecommunications spam filtering. Indeed, the method and system provides for a remarkably flexible and customizable advance in the art through the utilization of a progressive filtering algorithm. This algorithm offers both the subscriber and the service provider with the capability to block and/or extract potentially harmful or unsolicited SMS, MMS and other such messages on the basis of an extensive range of parameters and rules. | 11-20-2008 |
20090115836 | REAL-TIME MOBILE CONFERENCING SOLUTION - A method of conferencing communication devices in a system having (i) a conference server, (ii) a voice interface unit (VIU), and (iii) at least one conference bridge, the method including, at a first communication device: (a) establishing a first connection between the VIU and the first communication device via the switching point, the switching point enabled to establish connections for the communication devices; (b) sending first validation data from the first communication device to the VIU for forwarding to the conference server for validating the first validation data, and, in response to the validating the first validation data: (b)(i) terminating the first connection; and (b)(ii) establishing a second connection between the at least one conference bridge and said first communication device, to establish a conferencing session. | 05-07-2009 |
20090168697 | METHOD FOR THE INTERCEPTION OF GTP-C MESSAGES - Disclosed is a species of control-message intercept method which includes a passive monitoring approach whereby the relevant control packets are inspected for the purpose of providing additional information for the purpose of facilitating the operation of some primary or ‘master’ Internet Protocol (IP) charging/rating middleware platform/gateway system (intended to equip network operators with the ability to rate and bill IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are injected for the purpose of altering the state of a given data session in an more aggressive fashion (e.g. to drop a data session when the subscriber runs out of money in his/her prepaid account). | 07-02-2009 |
20100330965 | METHOD AND SYSTEM FOR THE PREVENTION OF UNWANTED WIRELESS TELECOMMUNICATIONS - The invention of present speaks to a method and system for the prevention of unwanted wireless telecommunications which is implemented as part of a computer program product in (preferentially) the telecommunications operator's network, which meets and/or exceeds much of current, proposed and even academically anticipated legislative (and by necessity, technical) criteria, and indeed, thereby complies with the broader body of prima facie consumer requirements associated with wireless telecommunications spam filtering. Indeed, the invention provides for a remarkably flexible and customizable advance in the art through the utilization of a progressive filtering algorithm. This algorithm offers both the subscriber and the service provider with the capability to block and/or extract potentially harmful or unsolicited SMS, MMS and other such messages on the basis of an extensive range of parameters and rules. | 12-30-2010 |
20110082779 | BILLING PROFILE MANAGER - A billing profile management system and method is provided. In an embodiment, a billing profile manager is configured to cooperate with an existing network and prepaid server. The billing profile manager is configured to modify the prepaid server and maintain a billing profile for each subscriber that is separate from the billing profile on the prepaid server and which can ultimately override the prepaid server. Additional billing functionality to an existing network and prepaid server is thereby provided. | 04-07-2011 |
20110137791 | SYSTEM, METHOD AND APPARATUS FOR PROVIDING A UNIVERSAL FINANCIAL TRANSACTION GATEWAY FOR COMPUTING DEVICES - A universal financial transaction gateway for mobile computing devices is provided. The universal financial transaction gateway can comprise at least one core mobile network interface for connecting to a mobile electronic device via a core mobile network. The at least one interface is configured to emulate an interface inherent to the core mobile network. The gateway also comprises a transaction engine connected to the interface and configured to receive transaction instructions from the mobile electronic device via the core mobile network interface. The gateway also comprises a plurality of financial server interfaces for connecting to a plurality of accounts associated with a plurality of financial servers. The plurality of financial server interfaces is configured to emulate an interface inherent to each of the financial servers. The transaction engine is configured to effect the transaction instructions on the financial servers via the financial server interfaces. | 06-09-2011 |
20110264726 | METERING OF TELECOMMUNICATIONS SERVICES - A configurator is provided that connects with various disparate elements in a telecommunication system. The configurator is adapted to receive a traffic plan that has a plurality of different aspects that are implemented across the disparate elements. The configurator is adapted to generate processing schemas and/or databases that can be used by the disparate elements in order to implement the traffic plan. | 10-27-2011 |
20110269421 | SYSTEM AND METHOD FOR DYNAMIC PROVISIONING - A system and method for dynamic provisioning is provided. In an embodiment, a provisioning engine receives data representing a device profile, a device state and a network state, and to the extent that the device profile, device state and network state are not consistent, the engine can dynamically re-provision the device to achieve an alternative provisioning. | 11-03-2011 |
20110312351 | Method and System for the Prevention of Unwanted Wireless Telecommunications - A method and system for filtering unwanted wireless telecommunications includes structure and steps/function for monitoring traffic associated with roaming subscribers, the traffic being carried via inter-network Internet Protocol links. Structure and steps/function are also provided for intercepting a send-routing-information message from an originating node within the traffic, and initiating a response to the originating node so as to direct the originating node to send a short message service (SMS) or Multimedia Messaging Service (MMS) associated with the send-routing-information message to a SPAM-filter via an SMS or MMS delivery message. Structure and steps/function are further provided for receiving the SMS or MMS at the SPAM-filter, and determining, at the SPAM-filter, whether the SMS or MMS constitutes an unwanted message. Also, structure and steps/function are provided for invoking an action for managing the SMS based on results of the determining process. | 12-22-2011 |
20120036559 | SYSTEM, METHOD AND APPARATUS FOR SECURITY MANAGEMENT OF AN ELECTRONIC DEVICE - A system, method and apparatus for security management of an electronic device or subscriber are provided. In one aspect, the system includes a profile server and an inspection point server that are both connectable to a mobile electronic device. The mobile electronic device is configured to send contextual data such as location data or information pertaining to the identity of the subscriber from the device and into a network attached to the mobile electronic device. The profile server is configured to authorize (or deny authorization) the release of contextual data such as location data or information pertaining to the identity of the subscriber. The inspection point server is configured to intercept the contextual data such as location data or information pertaining to the identity of the subscriber being sent from the device and query the profile server to determine if the request was authorized. | 02-09-2012 |
20120327817 | METHOD FOR THE INTERCEPTION OF GTP-C MESSAGES - Disclosed is a species of control-message intercept method which includes a passive monitoring approach whereby the relevant control packets are inspected for the purpose of providing additional information for the purpose of facilitating the operation of some primary or ‘master’ Internet Protocol (IP) charging/rating middleware platform/ gateway system (intended to equip network operators with the ability to rate and bill IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are injected for the purpose of altering the state of a given data session in an more aggressive fashion (e.g. to drop a data session when the subscriber runs out of money in his/her prepaid account). | 12-27-2012 |