Cellco Partnership d/b/a Verizon Wireless Patent applications |
Patent application number | Title | Published |
20150350884 | EFFICIENT SUBSCRIBER DEVICE MANAGEMENT USING PROFILE IDENTIFIERS - A system may be configured to receive profile identifiers from a set of user devices; identify, based on the profile identifiers, one or more user devices, of the set of user devices, for which updated parameters should be provided, the parameters relating to operation of the one or more user devices with respect to a telecommunications network; and provide, to the identified one or more user devices, the updated parameters. | 12-03-2015 |
20150348178 | Method and System for Renting and Sub-Renting Vehicles - A system and method for sub-renting a vehicle to a secondary/sub-renter after the vehicle has been rented to a primary renter. The vehicle may comprise a telematics control unit to enhance the sub-renting process. A rental duration of secondary renter(s) may be compared to an idle timeframe specified by the primary renter. Other rental parameters may be compared to enhance sub-renting of the vehicle, such as an idle location and a vehicle class of the vehicle, for example. In this manner, rented vehicles can be utilized more, particularly during periods when the primary renter has no need to use the rented vehicle. Secondary renters are enabled to use/rent the vehicle during these idle periods and the primary renter can avoid paying for more than he or she needs. | 12-03-2015 |
20150348146 | IN-STORE SELF-SERVE AND ZONING USING GEO-FENCING - A geo-fencing system includes a plurality of beacons defining zones within a venue. The system receives a first beacon identifier from a mobile device and registers the mobile device in a first zone corresponding to the first beacon. The system causes a first menu to be displayed on the mobile device, indicating options for the first zone. In response to selection of one of the options, the system registers the mobile device as being active in the first zone. The system then receives a second beacon identifier and registers the mobile device as being in the second zone. The system also suspends the activity of the mobile device in the first zone and causes options to be displayed to continue or terminate the activity in the first zone. | 12-03-2015 |
20150341897 | DUAL REGISTRATION COORDINATION FOR TUNE AWAY - A method, a device, and a non-transitory storage medium having instructions to receive tune away data from a multimode mobile device and to adjust network processes based on the tune away data including downlink scheduling, uplink scheduling, and handover procedures. | 11-26-2015 |
20150341779 | Systems and Methods for Providing Modem Behavior-Based Setup for User Devices - Systems and methods are described for enabling a mobile device to connect with a data network, based on the type of account associated with the mobile device. The system transmits a first signal to the data network and receives one or more network codes in response. The network codes may correspond to a type of SIM card associated with the mobile device. The system may display one or more setup screens on the mobile device based on the received network codes. The setup screens may guide the user of the mobile device to access the data network using an existing account, or setup a new account to access the data network. | 11-26-2015 |
20150334591 | M2M GATEWAY COLLOCATED WITH A BASE STATION USING A CPRI CONNECTION - A system may include a machine-to-machine (M2M) gateway. The M2M gateway may receive M2M information associated with an M2M application. The M2M gateway may mark the M2M information to create marked information. The marked information may be created to allow the marked information to be identified as M2M information. The M2M gateway may provide the marked information. The marked information may be provided via a wired common public radio interface (CPRI) connection to a base station to permit the base station to identify the marked information as M2M information and provide the marked information to a management device based on identifying the marked information as M2M information. | 11-19-2015 |
20150334442 | PRESENTING MULTIMEDIA CONTENT FROM MULTIPLE SOURCES AT A SAME TIME - A device is configured to tune multiple tuners to multiple television channels. The device may receive image data and audio data for the television channels from the tuners. The device may provide the image data from the tuners for display on a display device and for display at a same time. The device may assign the audio data from a group of the tuners to respective audio channels. The device may provide the audio data from the group of tuners for output at the same time via the respective audio channels. | 11-19-2015 |
20150332417 | PROPERTY NOTIFICATION AND TRIP PLANNING - A server device may receive information identifying property features relating to for-sale properties; identify a plurality of properties having one or more of the property features; identify particular properties, of the plurality of properties, having the one or more of the property features; receive location information for the particular properties; and generate, based on the location information, a trip plan identifying the particular properties. The trip plan may identify a sequence in which the particular properties should be visited and a route that should be taken when traveling between the particular properties. The server device may store or output the trip plan. | 11-19-2015 |
20150332156 | Predictive Modeling Based on Summary Data and Modeling User's Age at Line Level - A system and method are disclosed for classifying a record of data when the record of data does not contain class membership information. In one example, summary data is utilized with predictive modeling to predict the age range of a user of a line of service. A prior probability that a user within the summary data belongs to a respective class, a first conditional probability of a first predictor within the summary data and a second conditional probability of a second predictor within the summary data are calculated. For each record of data, a probability of class membership is calculated based on the calculated prior probability and the first and second conditional probabilities. | 11-19-2015 |
20150327030 | MULTIMEDIA MESSAGING SERVICE (MMS) ORIGINATOR AUTHENTICATION - A multimedia messaging service (MMS) center (MMSC) receives an MMS message associated with forwarding multimedia content, associated with a source device, to a recipient device. The multimedia content is tagged with tagging data that is generated based on a numerical key. The MMSC parses the modified MMS message to determine the source device and the tagging data. MMSC uses the tagging data to determine the sending device using the tagging data. For example, the MMSC may access an identifier for the sending device, as stored by a subscriber profile controller, using the tagging data and/or a Lightweight Directory Access Protocol (LDAP) interface. The MMSC determines whether the source device associated with the MMS message corresponds to the sending device (e.g., whether the MMS message correctly identifies the sending device), and the MMSC discards the MMS message when the source device and the sending device differ. | 11-12-2015 |
20150317063 | Systems and Methods for Efficiently Searching Applications - Systems and methods for efficiently searching for applications on a mobile device are presented. A user may be provided with an interface on the display screen of his mobile device. The interface may display a collection of categories associated with one or more applications. If the user selects a category, the interface may display a collection of one or more subcategories associated with the selected category, and a selectable cursor that is configured to allow the user to select one of the subcategories by moving the cursor through a grid in the interface. In response to the user selecting one of the subcategories, the interface may display a collection of applications associated with the selected subcategory, and the user may select one of the applications using the selectable cursor and grid. A user can select an application to purchase and/or download onto his mobile device. | 11-05-2015 |
20150312731 | METHOD AND SYSTEM FOR COORDINATING A COMMUNICATION RESPONSE - An approach for coordinating a communication response is described. A response coordination platform determines delivery of a notification to at least one device associated with a user. The response coordination platform further determines, based on the delivery, messaging content, a user specified response time, or a combination thereof for generating a message for responding to the notification. The response coordination platform then generates, based on the response time, at least one instruction for triggering an alert, a communication session, or a combination thereof by the at least one device associated with the user, other devices associated with the user, a device that sent the notification, or a combination thereof. | 10-29-2015 |
20150312635 | USER CONFIGURED SOCIAL MEDIA FEEDS ASSOCIATED WITH AN INTERACTIVE PROGRAM GUIDE - A device may receive an indication associated with media content identified in an interactive program guide (IPG). The device may determine social media feed parameters associated with the IPG. The device may determine, based on the social media feed parameters, that a social media feed is to be displayed along with the media content. The social media feed may be associated with the media content. The device may identify a social media tag associated with the media content. The device may receive social media information associated with the social media tag. The social media information may include information associated with a social media application. The device may provide, for display, the social media feed along with the media content. The social media feed may include the social media information, and may be provided in accordance with the social media feed parameters. | 10-29-2015 |
20150312634 | PROGRAM GUIDE WITH GAMIFICATION OF USER METADATA - A device may receive user metadata associated with media content identified in an interactive program guide (IPG). The user metadata may be based on input provided by a user via the IPG, and the media content may be associated with a media content identifier. The device may determine a manner in which the user metadata is to be processed. The device may process the user metadata in the manner in which the user metadata is to be processed. The user metadata may be processed to permit the user to view the user metadata, via the IPG, at a later time, or the user metadata may be processed to permit another user, associated with another device, to view the user metadata | 10-29-2015 |
20150312222 | DIGITAL ENCRYPTION SHREDDER AND DOCUMENT CUBE REBUILDER - A method of storing a document includes converting the document into a table of symbols and shredding the table into a plurality of randomly selected strips of symbols. The method further includes randomly selecting a plurality of storage locations and storing the strips of data in the plurality of locations. The method generates a key including pointers to the plurality of locations and encrypts the key. | 10-29-2015 |
20150312183 | VARIABLE IMAGE ACQUISITION AND PROCESSING TECHNIQUES BASED ON IMAGE DATA TYPE - A server device may receive file data from a user device via a web browser application associated with the user device. The file data may be extracted by an application, different from the web browser application, associated with the user device. The server device may determine an acquisition technique based on the file data; obtain a computer file, associated with the file data, using the acquisition technique; receive, from the user device, a request to transmit a message including the computer file; insert the computer file in the message; and transmit the message. | 10-29-2015 |
20150312101 | GEO-REDUNDANT PCRF MRA WITH MPE ALLOCATION VIA IMSI HASHING AND IP INDEXED TABLE - A system includes a wireless access network, a gateway that controls communications between the wireless access network and a packet data network, and a policy-charging-and-rule-function (PCRF). The PCRF includes a routing agent in communication with the gateway and a group of multi-media processing engines (MPEs) that are associated with the routing agent. The routing agent receives from the gateway a request to establish a session for a piece of user equipment, and selects one of the MPEs to handle the session based on an IMSI of the piece of user equipment. The routing agent maintains a table indexed by IP address, and makes an entry therein that points to the selected MPE. | 10-29-2015 |
20150304307 | APPLICATION SIGNING - Systems and methods for application signing are disclosed. In some implementations, an application package identifier and a password may be received at an application signing server. Upon authenticating the application package identifier and the password, a fingerprint identifying the developer is received. Upon receipt of the fingerprint, the application signing server generates a secure key for the application based on the fingerprint, where the secure key is provided to the developer for inclusion within the application. Upon determining that the application package identifier and the secure key included in a request from an operating system of a mobile device matches an authorized application package identifier and an authorized secure key stored at the application signing server, the application signing server provides the requested list of the one or more APIs to the operating system to grant the application access to the APIs in the list. | 10-22-2015 |
20150294398 | PRECISION ENABLED RETAIL DISPLAY - A system includes a highlighter that is installed in a store to highlight a physical position of an item on display in the store. The system also includes a processor installed in the store to determine a location and identification (ID) of a mobile device, and retrieve a profile of a user of the mobile device based on the ID. The processor controls the highlighter to highlight the item when the location of the mobile device is determined to be within a predetermined distance of the item, and when the item is determined to be of interest to the user of the mobile device based on information obtained in the profile. | 10-15-2015 |
20150294304 | SECURE PAYMENT METHODS, SYSTEM, AND DEVICES - Methods, systems, and devices for securely processing transactions using payment cards are disclosed. A transaction may be initiated using an identification value corresponding to a mobile device. The mobile device may then be contacted by remote servers to obtain payment card information. The mobile device may obtain the payment card information directly from a payment card that is present at the mobile device during the transaction. | 10-15-2015 |
20150293980 | DATA COMPASS - A system contains at least one load server that receives subscriber files including encrypted and unencrypted data from a vendor server connected to a subscriber network. The load server includes a load server processor that sorts the encrypted files to a decryption route and the unencrypted files to a direct loading route. The decryption route includes a decryption module that decrypts the encrypted files. The data warehouse includes at least one data warehouse processor having a job tasking module that assigns dedicated load jobs to each file. The data warehouse processor includes a staging module that loads data to a staging table. The data warehouse processor loads data from the staging table to a target table and aggregates the data into a report. | 10-15-2015 |
20150289231 | METHOD AND APPARATUS FOR SCHEDULING DELIVERY OF CONTENT ACCORDING TO QUALITY OF SERVICE PARAMETERS - An approach for scheduling and delivery of contents from one or more sources to one or more service areas according to one or more QoS parameters. The approach includes receiving a request to schedule a content package for delivery to a service area over a multicast data channel, wherein the multicast data channel is associated with a default scheme for scheduling the delivery. The approach also includes identifying a prioritization parameter associated with the content package, a provider of the content package, or a combination thereof. Additionally, the approach includes determining whether to initiate an override of the default scheme for the delivery of the content package based on the prioritization parameter. Further, the approach includes scheduling the content package based on the override, the default scheme, or a combination thereof. | 10-08-2015 |
20150289222 | LOCAL CALL SERVICE CONTROL FUNCTION SERVER SELECTION - A selection server device may receive a first registration request and determine that a user device is associated with a non-local call service control function (CSCF) server device and that the user device is located outside of a service area associated with the non-local CSCF server; output a non-preferred server indication to the non-local CSCF server device to cause the non-local CSCF server device to be disassociated with the user device; receive a second registration request from the user device; determine that the user device is not associated with any CSCF server; and output the second registration request to a local CSCF server device, associated with a service area in which the user device is located, to cause the local CSCF server device to register the user device with the local CSCF server device. | 10-08-2015 |
20150289152 | REMOTE DIAGNOSTICS FOR MOBILE DEVICES - Systems and methods for remote diagnostics are disclosed. In some implementations, a request for a device diagnostic session is provided from a mobile device to a diagnostic server. In response to the request, a messaging service message from the diagnostic server may be received at the mobile device. The messaging service message may include an authentication token. Upon receipt of the messaging service message including the authentication token, a diagnostic client resident at the mobile device may be initialized. Upon authenticating the authentication token included in the received messaging service message, a secure connection for the device diagnostic session may be established between the diagnostic server and the initialized diagnostic client. Diagnostic commands may be received at the diagnostic client from the diagnostic server via the established secure connection. The diagnostic commands may cause the diagnostic server to retrieve device diagnostics of the mobile device. | 10-08-2015 |
20150289149 | ESTIMATING LONG TERM EVOLUTION NETWORK CAPACITY AND PERFORMANCE - Systems and methods for estimating network capacity or performance are disclosed. In some implementations, a target network resource is selected for evaluation. Key performance indicators for computing a target network resource value for the target network resource are determined. The determined key performance indicators are filtered out of a set of key performance indicators. A data set is gathered. The data set comprises multiple points. Each point indicates a key performance indicator value for at least one of the determined key performance indicators and the target network resource value. A calculation module is trained to calculate the selected target network resource value based on key performance indicator values included in the gathered data set. The calculation module is tested using a testing data set. The testing data set has a same probability distribution of key performance indicator values and target network resource values as the gathered data set. | 10-08-2015 |
20150289146 | ANALYZING AND FORECASTING NETWORK TRAFFIC - Systems and methods for analyzing and forecasting network traffic are disclosed. In some implementations, multiple points are received. Each point represents a time value and a network traffic value. For each point in the multiple points, the network traffic value is decomposable into a trend component, a seasonality component, a burst component, and a random error component. A trend equation is generated for calculating the trend component based on the time value. A seasonality equation is generated for calculating the seasonality component based on the time value. A burst equation is generated for calculating the burst component based on the time value. A random error equation is generated for calculating the random error component. A network traffic equation is generated for calculating the network traffic value based on the time value by combining the trend equation, the seasonality equation, the burst equation, and the random error equation. | 10-08-2015 |
20150288997 | METHOD AND APPARATUS FOR PROVIDING DYNAMIC CHANNEL AND CONTENT PROVISIONING - An approach for implementing a content provisioning platform for accurate provisioning of one or more dynamic multicast data channels (e.g., eMBMS) for initiating multicast transmission of contents. The approach includes analyzing content usage data to determine content consumption trend data associated with a topic in a service area. The approach also includes selecting a content package based on the topic, the content consumption trend data, or a combination thereof. Additionally, the approach includes provisioning a dynamic multicast data channel for initiating a multicast transmission of the content package to a plurality of devices in the service area. | 10-08-2015 |
20150288465 | EVALUATING DEVICE QUALITY - Systems and methods for evaluating device quality are disclosed. Some implementations include receiving, operational parameters for a mobile device, where the operational parameters include data related to service disturbances in a plurality of areas of operational performance of the mobile device, computing, for each dimension of a plurality of dimensions, a curve indicative of a relationship between a device quality index (DQI) and operational parameters of the mobile device, where each dimension corresponds to a particular area of operational performance of the mobile device, identifying cliff points in each dimension of a multi-dimensional surface fitted to each computed curve, where each cliff point corresponds to a reduction in a user's quality of experience in a particular area of operational performance, and projecting the identified cliff points in each dimension of the multi-dimensional surface to determine a horizontal space in the multi-dimensional surface corresponding to a region of acceptable DQIs. | 10-08-2015 |
20150287059 | FORECASTING DEVICE RETURN RATE - Systems and methods for forecasting device return rates are disclosed. Some implementations include identifying correlations between device return cause codes and corresponding device return rates for one or more devices, computing, based on the identified correlations, correlation indexes for each of the device return cause codes, ranking the computed correlation indexes associated with each of the device return cause codes, selecting, a subset of device return cause codes, determining a relationship between the selected subset of the return cause codes and corresponding device return rates, mapping one or more measured key performance indicators (KPIs) of a particular device to return cause codes of the device, and estimating a device return rate for the particular device based on the mapped KPIs and the determined relationship. | 10-08-2015 |
20150281362 | SYSTEM FOR MOBILE APPLICATION NOTARY SERVICE - An example of a system that provides notary services on behalf of an application client running on a mobile device is described. The application client requests a notarization token from an application notary service client running on the same mobile device. The application notary service client utilizes a SIM card of the mobile device to generate a notarization token request which is sent to an application notary service server. The application notary service server utilizes a SIM signature validator server to validate the notarization token request and generates the notarization token for delivery to the application client via the application notary service client. The application client includes the notarization token in a request to an application server, which uses the notarization token to validate the application client for access to a function or data of the server. | 10-01-2015 |
20150281235 | SELF-ACTIVATION OF USER DEVICE - A first user device and second user device may be coupled, such as by an audio interface included in the second user device. The second user device is unable to generate a registration request, and the first user device may acquire device data associated with the second user device and form the registration request. The registration request may include the device data and information associated with the first user device. The registration request may be authenticated, and activation data may be generated based on the information associated with the first user device and the device data. The activation data is forwarded to the second user device to enable the second user device to access a restricted service or data. | 10-01-2015 |
20150278906 | PRODUCT NOTIFICATION AND RECOMMENDATION TECHNOLOGY UTILIZING DETECTED ACTIVITY - An exemplary system and method provides a product notification and recommendation technology for monitoring a computing device to detect particular use-cases of device activity and providing a notification through a user interface that indicates at least one product corresponding to the detected particular use-cases. In this way, the product notification and recommendation technology adds a new dimension of usage-based personalization to targeted advertising that results in timely product and service recommendations. | 10-01-2015 |
20150278478 | CONTAINER FOR ACCURATELY DISPENSING MEDICATION - A container may include a secure chamber to hold a medication, a lockable lid that covers an opening of the secure chamber, a dispensing device, and one or more processors. The container may receive prescription information indicating a frequency to dispense the medication and indicating a dose of the medication to dispense at a dispense time. The container may determine the dispense time based on the frequency to dispense the medication. The dispense time may be a time to dispense a dose of the medication. The container may cause the dispensing device to dispense the dose of the medication from the secure chamber at the dispense time. | 10-01-2015 |
20150272825 | PRESCRIPTION CONTAINER AND SERVICE FOR MONITORING PATIENTS - A container includes a chamber to hold a medication, a lockable lid that covers an opening of the chamber, a biometric sensor, a scale, and one or more processors. The container may store prescription information indicating how often the medication should be provided. The container may measure a weight of the medication held by the chamber using the scale. The container may receive biometric information sensed by the biometric sensor. The biometric information may indicate a biometric feature of a person attempting to open the container. The container may selectively unlock the lockable lid based on at least one of the prescription information, the weight of the medication, or the biometric information. | 10-01-2015 |
20150271547 | STREAMING AN INTERACTIVE PROGRAM GUIDE USED FOR MEDIA CONTENT AND HOME AUTOMATION - A device may be configured to store interactive program guide (IPG) data for generating an IPG. The IPG data may include information related to a media content service for providing media content and including information related to a home automation service for managing a home device. The device may receive input information from a media client device that causes display of the IPG. The input information may indicate an input related to the home device. The device may generate a part of the IPG related to the home automation service based on the input information and a part of the IPG data. The device may obtain home device information from a management server based on the input information. The device may provide the home device information and the part of the IPG to the media client device for display. | 09-24-2015 |
20150270979 | INTERFACE FOR ACCESSING EVOLVED MULTIMEDIA BROADCAST MULTICAST SERVICES (eMBMS) MIDDLEWARE SERVICES - A device provides, to another device, a start request for an evolved multimedia broadcast multicast services (eMBMS) session, and receives eMBMS session traffic from the other device based on the start request. The device determines track information from the eMBMS session traffic, and decodes the eMBMS session traffic into a format understood by the device. The device determines quality information associated with the eMBMS session traffic, and presents, for display, the decoded eMBMS session traffic, the track information, and the quality information associated with the eMBMS session traffic. | 09-24-2015 |
20150269586 | Method and System for Crowd-Sourcing Customer Care - A method and system are disclosed that enables crowd-sourcing of customer care. The disclosed crowd sourcing system may use a diverse workforce, including a business's customer base, an online community, and an employee base. The exemplary crowd-sourcing system may use a service level agreement for the crowd care providers that includes a time constraint period during which the crowd care provider may submit a response to a customer request. Customer requests may be routed to one or more particular crowd care providers or crowd care tiers, whose expertise and/or experience may be taken into account during such routing. In this manner, customer requests may be resolved in a timely fashion without relying solely on an employee base. | 09-24-2015 |
20150269585 | DEVICE RETIREMENT PROBABILITY RATE - Systems and methods for determining an action plan with respect to a returned device are disclosed. In some implementations, a computer receives an identifier of a returned device being processed by a replacement center. The computer provides the identifier of the returned device to a data repository. The computer receives, from the data repository, in response to the identifier of the returned device, data related to the returned device. The computer calculates a device retirement metric based on the data related to the returned device received from the data repository. The computer determines, based on the device retirement metric, an action plan to take with respect to the returned device. The computer provides an indication of the action plan with respect to the returned device. | 09-24-2015 |
20150268059 | Systems and Methods for Monitoring Vehicle Health With Connected Applications - Systems and methods that allow a user to enhance the experience on their mobile device and provide better information to make decisions based on sharing vehicle health information received from diagnostic systems on the car with applications on their mobile device. The system may receive trip information from a user device and vehicle health information from the vehicle and the user device. The system may generate an interactive map based on the trip information and the vehicle health information. The system may provide one or more notifications for the user based on the trip information and the vehicle health information. The system may receive calendar information and generate interactive maps and notifications based on the vehicle health information and the calendar information. | 09-24-2015 |
20150264709 | CONTROLLING CONNECTION TO AN ACCESS NETWORK BY MACHINE-TO-MACHINE DEVICES - A device receives a pilot channel from an access network, without connecting to the access network. The pilot channel includes information identifying an actual usage associated with the access network. The device determines whether the actual usage of the access network is greater than a particular usage associated with the access network, and selectively connects to the access network based on whether the actual usage of the access network is greater than the particular usage. The device connects to the access network, to provide data to a core network, when the actual usage of the access network is not greater than the particular usage. The device does not connect to the access network when the actual usage of the access network is greater than the particular usage. | 09-17-2015 |
20150264182 | VOICE OVER LONG TERM EVOLUTION - CALLED PARTY STATUS - Devices and methods are provided for implementing a network resource management system that reduces network signaling traffic through a network. A network server utilizing a communication signaling protocol is configured with functionality that reduces call set-up signaling traffic. Instead of exchanging communication signaling protocol related signaling between a calling end user device and a destination end user device when attempting to set up the call, the disclosed examples provide for determining a call status of the destination end user device before sending any communication signaling protocol related messages to the destination end user device. If the destination end user device is unavailable or is on another call, the network server uses communication signaling protocol related messages to connect the calling end user device with a voice mail server related to the destination end user device and foregoes sending communication signaling protocol related messages to the destination end user device. | 09-17-2015 |
20150262244 | CUSTOMIZABLE USER PREFERENCE INFORMATION FOR USER DEVICES - A user device receives, from a device associated with a vendor, a request for user preferences associated with a user of the user device. The user preferences are stored in a memory associated with the user device. The user device authenticates the vendor, and determines particular user preferences, from the user preferences, that are relevant to the vendor. The device approves the request for the user preferences when the vendor is authenticated. The device retrieves the particular user preferences from the memory based on the approval of the request for the user preferences, and provides the particular user preferences to the device. The particular user preferences are used to determine products, services, or content, of the vendor, to offer to the user. | 09-17-2015 |
20150257112 | BEACON DEVICE FOR CONTROLLING SIGNAL STRENGTHS IN TARGET LOCATIONS - A device is configured to store target location information indicating an acceptable signal strength at a target location. The device may receive a signal emitted from a base station. The signal may be received at the target location. The device may measure the signal strength of the signal at the target location. The device may transmit a signal strength message including information based on the signal strength. The signal strength message may cause the base station to adjust a power with which signals are emitted from the base station such that the signals satisfy the acceptable signal strength at the target location. | 09-10-2015 |
20150257004 | SYMBIOTIC BIOMETRIC SECURITY - The method, system and device examples provide for a mobile device biometric authentication that authenticates an application user via a biometric input, and thereby reduce the need to enter complex user credentials into a mobile device to gain access to a mobile application. The examples leverage the biometric recognition operations managed by the operating system of the mobile device to allow a mobile application to authenticate the user as a valid user of the mobile application. In an example, a successfully unlocking of a mobile device via a biometric input from a user is used by the mobile application to perform an authentication operation with assistance from an authentication server to authenticate the user of the mobile device as a valid user of the mobile application. As a result, the mobile application grants access to the mobile application based on the user's biometric input. | 09-10-2015 |
20150256511 | METHODS AND IMPROVEMENTS IN UICC POLLING MECHANISM FOR UICC MANAGEMENT - Systems and methods for handling an OPEN CHANNEL command from a universal integrated circuit card (UICC) of a mobile device are disclosed. In some implementations, a mobile device hosting a UICC receives, from the UICC, an initiation of an OPEN CHANNEL command with a uniform resource locator (URL) of a subscriber identity module over the air (SIMOTA) server. The mobile device signals for attempting to resolve the URL to an Internet Protocol (IP) address. Upon successfully resolving the URL to the IP address, the mobile device obtains the IP address associated with the SIMOTA server, connects to the SIMOTA server using the IP address, and returns a successful TERMINAL RESPONSE to the UICC. Upon failing to resolve the URL to the IP address, the mobile device returns an unsuccessful TERMINAL RESPONSE to the UICC. | 09-10-2015 |
20150249989 | DETERMINING A FREQUENCY FOR A CLIENT DEVICE TO USE TO CONNECT TO A NETWORK - A device is configured to obtain network information indicating an amount of client devices, of each device type, registered in an operator network. The device is configured to obtain client device information identifying a client device and determine a device type of the client device based on the client device information. The device is configured to determine a frequency for the client device to use to communicate with the operator network based on the device type of the client device and the amount of client devices of each of the device types registered in the operator network. The device is configured to provide an instruction to the client device to use the frequency to communicate with the operator network. | 09-03-2015 |
20150249584 | METHOD AND APPARATUS FOR PROVIDING AN ANTI-BULLYING SERVICE - An approach is provided for an anti-bullying service. A service platform monitors interaction data from one or more applications, wherein the interaction data is associated with an interaction between a source and a target. The service platform analyzes the interaction data to parse one or more indicators of a monitored conduct between the source and the target. The service platform then initiates at least one of (a) a recording of the interaction data; (b) a transmission of an alert message, the one or more indicators, the interaction data, the monitored conduct, or a combination thereof to a third party; and (c) a pushing of an anti-conduct application to a source device associated with the source, a target device associated with the target, or a combination thereof based on the monitored conduct, the one or more indicators, or a combination thereof. | 09-03-2015 |
20150248686 | INTEGRATED PLATFORM EMPLOYEE TRANSACTION PROCESSING FOR BUY YOUR OWN DEVICE (BYOD) - Secure associate ordering and transaction methods and systems. An order for an alternative device different from a baseline device is received at an order processing platform. The alternative device is available for purchase by the associate at a cost differential between the alternative and baseline devices. The cost differential is based on a predetermined enterprise discount. A message including a secure link associated with the order is sent to the associate. Payment information associated with the cost differential is received by a secure payment (SP) platform from the associate via a secure website using the secure link. The payment information is submitted to a payment institution. The order processing platform receives a transaction confirmation from the SP platform when the payment information is accepted and adds at least features of the alternative device associated with the baseline device to a service account of the enterprise customer for the service provider. | 09-03-2015 |
20150245361 | SELECTING FREQUENCY FOR MULTI-BAND SMALL CELL - A device is configured to obtain interference information indicating interference levels at frequencies. The device is configured to determine a frequency for a small cell to use to communicate with a client device based on the interference information. The small cell is capable of using the frequencies to communicate and the frequency is determined from among the frequencies. The device is further configured to provide frequency information to the small cell instructing the small cell to communicate with the client device using the frequency. | 08-27-2015 |
20150245267 | SWITCHOVER SERVICE FOR NETWORK SELECTION FALLBACK - A method, a device, and a non-transitory storage medium having instructions to receive channel information from a node of a first network, wherein the channel information indicates a channel to use to access a second network when a switchover is invoked, wherein the first network and the second network operate according to different communicative standards; store the channel information; attempt to establish a session with another device via the first network; determine whether an establishment of the session via the first network is successful; and invoke the switchover, wherein the switchover includes using the channel information to attempt to establish a same session via the second network, in response to a determination that the establishment of the session via the first network failed. | 08-27-2015 |
20150245259 | OPTIMIZING MOBILE DEVICE HANDOFF PARAMETERS - A device receives a default cell handoff parameter set from a base station within a cellular network. The device receives a modified handoff parameter set, wherein the modified handoff parameter set is different than the default cell handoff parameter set, and tests a mobile device in different geographic locations served by the base station, using the modified handoff parameter set, to measure one or more network/call service parameters associated with handoff of the mobile device to a neighboring cell. The device identifies optimum modified handoff parameters for the mobile device based on the measured one or more network/call service parameters. | 08-27-2015 |
20150244979 | MANAGING COMPLEX VIDEO CALL SCENARIOS IN VOLTE CALLS - A device may determine to adjust from a first state for an existing communication between the device and another device. The first state may be associated with utilizing a first audio and/or video configuration for communication. The device may determine a second state associated with a second audio and/or video configuration for the communication. The second audio and/or video configuration may be different from the first audio and/or video configuration. The device may provide state information associated with the second audio and/or video configuration via a first session initiation protocol message. The first session initiation protocol message may include directionality information associated with the second audio and/or video configuration. The device may receive confirmation information via a second session initiation protocol message based on providing the state information. The device may adjust from the first state to the second state, during the communication, based on receiving the confirmation information. | 08-27-2015 |
20150237593 | POWER CONSERVATION ON USER DEVICES HAVING LOCATION IDENTIFICATION HARDWARE - A user device may detect, using a first radio associated with the user device, a presence of a location reference device; and determine a location associated with the user device. When determining the location associated with the user device, the user device is to receive location information from the location reference device, via the first, and refrain, based on detecting the presence of the location reference device, from determining the location using a second radio associated with the user device while the user device is within a communication range of the location reference device. | 08-20-2015 |
20150237512 | NETWORK DATA OPTMIZATION - A device is configured to obtain base station information for base stations indicating whether data communicated via a respective base station should receive optimization processing. The device may obtain a base station identifier from a base station. The device may determine whether the data communicated via the base station should receive the optimization processing based on the base station information and the base station identifier. The device may receive non-optimized data to be sent to a client device via the base station. The device may selectively cause the optimization processing to be performed on the non-optimized data based on whether the data communicated via the base station should receive the optimization processing. The device may provide optimized data generated by the optimization processing or the non-optimized data to the client device via the base station based on selectively causing the optimization processing to be performed. | 08-20-2015 |
20150237196 | PROVIDING A VISUAL INTERFACE BASED ON A DIALED NUMBER - A system, or device, may be configured to receive a request to place a voice call; forgo placing the requested voice call; and present a visual interface, associated with an intended callee of the requested voice call, in lieu of placing the requested voice call. The system or device may determine to place the voice call to the original number, or to a different number, based on an input, which is based on the visual interface, from a user who may have, or may not have, made the request. | 08-20-2015 |
20150236970 | HANDLING OF SNAPSHOT MESSAGES AS A RESULT OF DELIVERY FAILURE IN A TWO-WAY PUSH CONNECTION - A system allows for storage of failed push data intended for delivery to a mobile device through a mobile network via a persistent connection between the mobile device and a push engine. Delivery of the push data fails upon failure of the persistent connection. Upon failure of the persistent connection, failed push data corresponding to applications for which the mobile device is registered is stored in a database. Failed push data stored in the database is delivered when the persistent connection is reestablished. | 08-20-2015 |
20150227989 | Method and System for Enforcing Acknowledgement of Terms and Conditions - A method and system are disclosed that ensure that customers are aware of and express agreement to the terms and conditions of a service contract before using or managing services associated with their service contract. The present invention may confirm whether a user has accepted the terms and conditions of a service contract independently of validating a user's UserID and password, which may be received when the user attempts to manage the services associated with their service contract. | 08-13-2015 |
20150227478 | OFF-NETWORK CONTENT SHARING FOR NEAR FIELD COMMUNICATION DEVICES - An exemplary system and method enables direct transfers of content between devices to be evaluated by service providers in support of marketing services and the like to those devices (and their users). The system and method utilizes cards and records during the direct transfers to capture user activity information and then provides those cards and records to the service providers. Thus, even though the direct transfer is off-network or outside of the service provider system, the use of cards and records by the system and method provides the user activity information to the service provider for enhancing marketing services. | 08-13-2015 |
20150223060 | MEDIATION OF INFORMATION CARRIED VIA A COMMON PUBLIC RADIO INTERFACE - A device may receive first common public radio interface (CPRI) information associated with a first CPRI format. The device may determine a translation key associated with the first CPRI format. The translation key may include information associated with translating the first CPRI information to a second CPRI format. The second CPRI format may be different from the first CPRI format. The device may generate second CPRI information based on processing the first CPRI information with the translation key. The second CPRI information may be associated with the second CPRI format. The device may provide the second CPRI information associated with the second CPRI format. | 08-06-2015 |
20150223051 | COMMUNITY-BASED REQUEST FULFILLMENT - A coordinator device receives registration data regarding user devices and determines a group that includes two or more of the user devices based on registration data. The coordinator device receives a request, related to receiving a good or service, from a first user device included in the group. The registration data may include financial data for a user of the first user device, and the coordinator device uses the financial data to verify that the user has sufficient funds to pay a fee for the request. Based on verifying the sufficient funds, the coordinator device determines status data for other user devices included in the group and selects a second user device from the group based on the status data. The status data identifies, for example, locations associated with the group. The coordinator device then causes data associated with the request to be forwarded to the selected second user device. | 08-06-2015 |
20150220837 | RULE-BASED NETWORK DIAGNOSTICS TOOL - A system may be configured to receive performance information regarding a set of network devices; compare the performance information to a set of rule objects; and detect an occurrence of a particular network event. The detecting may include determining that the performance information, associated with a particular network device, of the set of network devices, meets the set of conditions associated with a particular rule object with which the particular network event is associated. The system may further present information regarding the particular rule object, such as information regarding the particular network event, and information regarding a recommendation regarding the particular network event. | 08-06-2015 |
20150215346 | ADMISSION CONTROL FOR A NETWORK - One or more devices are provided that receive a request, from a client device, to connect to an operator network. The request is received at a request time. The one or more devices obtain information identifying a connect time at which the client device is permitted to connect to the operator network and determine whether the request time matches the connect time. If the request time is determined to be different than the connect time, the one or more devices reject the request to connect to the operator network based on the request time being determined to be different than the connect time. If the request time is determined to match the connect time, the one or more devices establish a communication session between the client device and the operator network based on the request time being determined to match the connect time. | 07-30-2015 |
20150215160 | DEVICE REGISTRATION AWARENESS FOR OVER-THE-AIR UPDATES - A device may determine that a user device is to receive an update. The device may determine that the user device is not registered to a network associated with receiving the update. The device may provide a registration notification request based on determining that the user device is not registered to the network. The registration notification request may include information identifying the user device. The device may receive a response to the registration notification request. The response may indicate that the user device is registered to the network. The device may provide, based on receiving the response, an update message associated with the update. The update message may be destined for the user device and may include information indicating that the user device is to receive the update. The device may provide the update to the user device after providing the update message. | 07-30-2015 |
20150208275 | PROVIDING QUALITY OF SERVICE BASED ON BANDWIDTH - A method for determining a Quality of Service (QoS) policy can be based on requested bandwidth. The method may initially receive a connection request which includes a requested bandwidth that corresponds to an application. The method may then determine a policy for an application data flow associated with the application based on the connection request. A bandwidth designation, which is based on the requested bandwidth, may be assigned to the application data flow based on the determined policy. Finally, the policy and the bandwidth designation may be provided so that a bearer can be assigned. | 07-23-2015 |
20150200904 | COMMUNICATING VIA A VIRTUAL COMMUNITY USING OUTSIDE CONTACT INFORMATION - A device is provided that creates an account for a first member of a virtual community. The account includes a contact identifier used for communicating with the first member outside of the virtual community. The device receives a message via the virtual community from a second member of the virtual community. A recipient of the message being selected by the second member using outside contact information for a contact, and the outside contact information corresponding to contact information used to communicate with the contact outside of the virtual community. Additionally, the device identifies the first member of the virtual community as the recipient of the message based on the contact identifier included in the account and the outside contact information indicated by the message. Furthermore, the device transmits the message to the first member via the virtual community. | 07-16-2015 |
20150199401 | PERSONAL ASSISTANT APPLICATION - A mobile device may receive user input for requesting personal information for a subject in proximity of a mobile device and based on the user input, selecting one of available functions. The functions may include a first function for obtaining personal information using a first identifier. The functions may also include a second function for obtaining the personal information using the first identifier. The mobile device may output the personal information as an image to a display or as speech to speaker. | 07-16-2015 |
20150195707 | SYSTEM AND METHODS OF TRANSACTION ORIGINATOR IDENTIFIER FOR ON-LINE COMMERCIAL TRANSACTION - A packet gateway in a mobile network generates a unique identifier related to a mobile device owner and inserts the unique identifier into a data request. A merchant website receives and forwards the unique identifier to a customer information mediation server. The customer information mediation server utilizes the unique identifier to retrieve information related to the mobile device owner and provides the retrieved information to the merchant website. The merchant website, in turn, provides portions of the retrieved information to the mobile device as part of the response to the data request. The provided portions of the retrieved information may be included as pre-populated fields, for example in a check-out form of a web page. The mobile device owner may then complete the check-out or other transaction without entering any, or entering only limited, information related to the owner. | 07-09-2015 |
20150195281 | ESTABLISHING CONNECTIONS FOR SECURE ELEMENT COMMUNICATIONS - A server is configured to establish connections for secure element communication sessions. The server receives a request from a device to establish a first secure connection, and establishes the first secure connection with the device in response to the received request. The server sends a request to a Trusted Service Manager (TSM). The sent request instructs the TSM to establish a second secure connection between the TSM and a secure memory. The server receives an authentication request from the TSM to establish the second secure connection, and forwards the authentication request to the device over the first secure connection. | 07-09-2015 |
20150195150 | PROVIDING NETWORK CONGESTION INFORMATION TO MOBILE DEVICES FOR SPONSORED DATA - A third-party application, executing at a mobile device, may be provided with information describing congestion levels in a network, such as a cellular wireless network through which the mobile device connects. In one implementation, the third-party application may select, based on the information describing the congestion levels, a data flow, from a number of data flows, to use when communicating with a destination device, each of the data flows being associated with different quality of service (QoS) parameters and being associated with different charging rates. The mobile device may communicate, through a proxy server, and using the selected data flow, with the destination device. The communication with the destination device may be implemented using sponsored data that is not charged to an account associated with an owner of the mobile device. | 07-09-2015 |
20150189552 | MOBILE DEVICE WITH GUARANTEED QOS - A mobile device includes a transceiver that receives data from a network, and transmits data to the network, an input interface that receives input data from a user of the device, and a processor. The processor is configured to receive an input from the input interface indicating a desired quality of service (QoS) requested by the user for a communication session through the network. The processor is also configured to append a code corresponding to the desired QoS to a session initiation protocol (SIP) invite message relating to set-up of the communication session, and transmit the SIP invite message to the network by the transceiver to control the network to provide the desired QoS during communication between the mobile device and another device via the communication session through the network. | 07-02-2015 |
20150189542 | CONTENT MANAGEMENT DELIVERY SYSTEM (CMDS) FACILITATED LOCAL ACCESS SYSTEM - A method of sharing a streaming content item to a target user equipment (UE) device on a network includes identifying a UE device on the network that is currently receiving the content item. The method determines whether the target and source UE devices are serviced by a common base station. If they are, the method commands the base station to multicast the content item to the UE device and the target UE device. The method also includes sharing a content item stored on a first UE device with a second UE device by commanding the first UE device to send the content item to the second UE device without going through the network or by commanding the first UE device to upload the content item to the base station and then downloading the content item from the base station to the first UE device. | 07-02-2015 |
20150189525 | METHOD AND SYSTEM FOR PLATFORM-BASED DEVICE FIELD TESTS - An approach for receiving an input for specifying one or more parameters for evaluating a device under testing. The approach further involves generating a test route based on the input, wherein the test route represents a test environment in which the device under testing is expected to be subjected to the one or more parameters. | 07-02-2015 |
20150189483 | SESSION MANAGED MESSAGING - Systems and methods for session managed messaging are disclosed. Some implementations include receiving, from an enterprise application and at a session manager, a messaging service message including a session ID and a phone number of a mobile device configured to receive the messaging service message, determining, at the session manager and based on the session ID, whether the messaging service message is part of a new conversation or an existing conversation between the enterprise application and the mobile device, and based on a result of the determining step, assigning a particular code to the messaging service message at the session manager, where the particular code allows the mobile device to group messaging service messages associated with a particular conversation together, and forwarding, from the session manager and to a SMS gateway, the messaging service message along with the assigned particular code. | 07-02-2015 |
20150189459 | Subscriber Identification Module ("SIM") Based Machine-to-Machine ("M2M") Client Systems, Methods, and Apparatuses - Exemplary subscriber identification module (“SIM”) based machine-to-machine (“M2M”) client systems, methods, and apparatuses are described herein. An exemplary M2M device includes an M2M SIM client implemented on a SIM card installed in the M2M device. The M2M SIM client provides a platform messaging interface through which the M2M device communicates with an M2M platform, provides a device-side interface through which the M2M device interfaces with the M2M SIM client, and provides a set of one or more M2M services to the M2M device. The set of M2M services may include one or more of the exemplary M2M services described herein. Corresponding systems, methods, and apparatuses are also described. | 07-02-2015 |
20150189090 | UNIFORM RCS VOICE/VIDEOMAIL SERVICES - Videomail and/or voicemail methods for mobile devices and systems are provided. A communication session request is received from a source device for communication with a destination device. Responsive to the request, it is determined whether the requested session will be established with the destination device. When the requested session will not be established with the destination device, the source device is caused to present a message request to a source device user. Responsive to the message request, a message generated by the source device user is received which includes at least one of video or audio information. A file transfer (FT) message is generated from the received message. The FT message is temporarily stored on a messaging server, and is sent to the destination device via the messaging server, without maintaining a stored copy of the FT message on the messaging server. | 07-02-2015 |
20150189005 | MACHINE-TO-MACHINE SERVICE BASED ON COMMON DATA FORMAT - A method, a device, and a non-transitory storage medium having instructions to establish a connection with the simple sensor device; receive sensor data from the simple sensor device via the connection; convert the sensor data into common data of a common data format, wherein the common data includes metadata that supports an ontology; store the common data; and transmit the common data to a network device of a network. | 07-02-2015 |
20150188907 | REMOTE AUTHENTICATION METHOD WITH SINGLE SIGN ON CREDENTIALS - Systems and methods for remote authentication using Single Sign-On (SSO) credentials are disclosed. An implementation includes transmitting a request for an identification code from an application to a wireless service provider, the request provided through an encrypted transport protocol, receiving the identification code as a messaging service message from the wireless service provider, securely routing the received identification code to the requesting application, upon receipt of the identification code at the application, retrieving an authentication token for the application through the encrypted transport protocol and providing the authentication token to an application content server to allow content transfer between the application content server and the application. | 07-02-2015 |
20150188877 | APN-BASED DNS QUERY RESOLUTION IN WIRELESS DATA NETWORKS - Systems and methods for APN-based DNS query resolution for wireless data networks are disclosed. Some implementations include receiving a domain name system (DNS) query for a domain name from a device having a source IP address, the DNS query being associated with an access point name, determining whether the source IP address is within a predetermined IP address range, upon determining the source IP address is within the predetermined IP address range, updating the DNS query to include an updated domain name unique to the predetermined IP address range, forwarding the updated DNS query to a DNS server for resolution, receiving an IP address corresponding to the updated DNS query from the DNS server, the IP address being different from an IP address associated with the DNS query, and providing the device with the IP address corresponding to the updated DNS query. | 07-02-2015 |
20150186621 | SECURE ELEMENT-CENTRIC DIGITAL RIGHTS MANAGEMENT - The examples provided herein relate to digital rights management keys that allow for the presentation of content on output devices of a content presentation device. The examples describe subscriber-specific digital rights management keys that are provided to a subscriber by a mobile network operator instead of a device manufacturer. The digital rights management keys are associated with the subscriber account maintained by the mobile network operator. As a result, the mobile network operator provides the capability to transfer the digital rights management keys between multiple devices because the digital rights management keys are subscriber-specific instead of device-specific. | 07-02-2015 |
20150186564 | NETWORK DEVICE AND CALL SIMULATION TOOL - A first network device executing a device simulation tool receives a selection of a second network device in a communications network. The first network device receives a selection of at least one use case, scenario or error condition associated with operation of the second network device or the communications network, and executes a network simulation of the communications network based on the at least one use case, scenario or error condition. The first network device generates a call flow diagram, which involves the selected second network device, based on the executed network simulation, and provides a graphical display of the generated call flow diagram. | 07-02-2015 |
20150186467 | MARKING AND SEARCHING MOBILE CONTENT BY LOCATION - A mobile station automatically stores location information and, optionally, time stamps as metadata associated with objects created or accessed by the mobile station. The location information indicates the location of the mobile station when the object is created. The objects stored on the mobile station may then be searched based on the stored location information or on a combination of the stored location information and stored timestamp metadata. | 07-02-2015 |
20150181550 | PROCESSING OF A COARSE LOCATION REQUEST FOR A MOBILE DEVICE - A location proxy server receives a network-initiated location request. The location proxy server determines the location request is a coarse location request for a mobile device. The location proxy server forwards the coarse location request for the mobile device to a location server. The location server completes a control plane function to determine the location of the mobile device and provides a location answer to the location proxy server. The location proxy server provides the location answer to the application server initiating the location request. | 06-25-2015 |
20150181549 | MOBILE DEVICE LOCATING USING LONG TERM EVOLUTION SIGNALS - The described examples provide a system and methods for identifying a location of a mobile device within an indoor venue using cellular communication signals obtained while the mobile device is within the indoor venue. An array of antennas arranged within the indoor venue detects cellular communication signals transmitted by the mobile device. The detected cellular communication signals have detectable and measurable signal parameters that allow the location of the mobile device within the indoor venue and an identifier of the mobile device to be determined. The determined identifier of the mobile device may also be used to identify the mobile device subscriber. The mobile device indoor location information may be used to update an anonymized subscriber profile associated with the mobile device subscriber. | 06-25-2015 |
20150181419 | 4G LTE POWER ON ACTIVATIONS - A customer is permitted to self-activate a mobile device purchased via a commercial sales channel. Upon powering on the mobile device, the mobile device establishes a restricted service session through the network to a self-activation service and the mobile device queries the self-activation service for any pending order related to the mobile device which may have been generated during the purchase process. The communications with the self-activation service, however, support completing the pending order, activating the mobile device and communicating to the user that activation is complete. Part of the activation procedure configures one or more network elements to provide service for the device in a normal unrestricted manner. When provisioning is complete, the restricted access configuration used to establish the session with the self-activation service is removed. | 06-25-2015 |
20150181409 | CONTENT SUPPORTED WIRELESS COMMUNICATION SERVICE - Methods and systems are configured for accessing content supported wireless communications services. A method for obtaining non-subscription access to a network may include sending a request to access a network, and determining if subscription access to the network was granted. When subscription access is not granted, the method may further include receiving terms for non-subscription access to the network upon determining subscription access was not granted, determining if the received terms for non-subscription access were accepted, and then receiving advertising content and non-subscription access to the network in response to determining the terms for non-subscription access were accepted. | 06-25-2015 |
20150181401 | VOLTE DEVICE PREFERENCE FOR E911 - A mobile device has several ways to determine position, some of which rely on interaction with the network. Once mobile device establishes a call, the call may remain on the network access technology and band over which the call was established, even if the call requires services not supported by the network access technology and/or band. So, when a call requires a position determination (e.g. emergency call), the mobile device selects a network access technology and band which will potentially improve the probability and accuracy of position determination, even if interaction with the network is not required because other position determination techniques (e.g. GPS) may be available. | 06-25-2015 |
20150181364 | MOBILE DEVICE SELF-PROVISIONING - Systems and methods for self-provisioning of mobile devices are disclosed. An implementation includes determining whether the SIM of a mobile device is associated with a wireless network provider, sending an attachment request to a wireless data network of the wireless network provider when the mobile device is within a coverage area of the wireless data network, receiving an attachment response from the wireless data network of the wireless network provider in response to the attachment request, determining from the attachment response, whether attachment to the wireless data network of the wireless network provider is successful, reviewing an error code provided by the wireless network provider and based on the error code, displaying a user interface allowing a user to provision the SIM for receiving service from the wireless network provider. | 06-25-2015 |
20150180858 | SINGLE SIGN ON (SSO) AUTHORIZATION AND AUTHENTICATION FOR MOBILE COMMUNICATION DEVICES - Single sign on (SSO) functionality is provided across native and hybrid applications executing on a mobile communication device, such that both native and hybrid applications can access authenticated services offered through respective application servers without repeatedly providing authentication credentials. In operation, the mobile device obtains an SSO token from an SSO server providing the SSO functionality, and native applications executing on the mobile device retrieve the SSO token from memory for use in accessing authenticated services. In the case of hybrid applications, an alias is assigned to the mobile device in response to receiving a page request received from the hybrid application. The alias is associated with SSO token of the mobile device in the SSO server, and is used to provide the SSO token directly to the hybrid application from the SSO server such that the hybrid application can use the SSO token for authentication. | 06-25-2015 |
20150179069 | ACCIDENT PREVENTION SYSTEM - A vehicle system may include a communication device configured to receive road data. The system may also include an application, having a processor and a memory, configured to analyze the road data in view of the at least one vehicle attribute included in vehicle data. The application may also determine whether the road data is relevant and transmit, in response to the road data being relevant, a command to a display unit to display information based on the analysis of the road data. | 06-25-2015 |
20150179037 | USING DATA FUSION TO ELECTRONICALLY DETECT LIQUID IN MOBILE DEVICES - Liquid ingress event detection methods and detectors are provided. Temperature and moisture data are synchronously collected from at least one sensor unit coupled to an electronic device susceptible to liquid damage. A rate of change of each of the temperature data and the moisture data are determined, to form respective temperature change rate data and moisture change rate data. Each of the temperature change rate data and the moisture change rate data are compared to at least one predetermined liquid ingress condition. A liquid ingress event is identified when at least one of the temperature change rate data or the moisture change rate data matches the predetermined liquid ingress condition. An indication of the identified liquid ingress event is stored. | 06-25-2015 |
20150178721 | DYNAMIC GENERATION OF QUICK RESPONSE (QR) CODES FOR SECURE COMMUNICATION FROM/TO A MOBILE DEVICE - Dynamically generated quick response (QR) codes are used for secure communication to/from mobile devices. In one example, a QR code identifies a product or service selected by a user using a mobile device. The mobile device generates the QR code identifying the user's selection, and displays the QR code for reading by a retail kiosk. The retail kiosk, such as movie-rental kiosk, extracts the product or service selection encoded in QR code and provides the identified product or service to the user. The QR code can additionally identify a user account, such that payment for the product or service is automatically charged to the account identified from the QR code. In another example, the QR code is used to transfer money and/or credits between a user and a retailer, or between two users. | 06-25-2015 |
20150178490 | System For And Method Of Generating Visual Passwords - Systems and methods for creating a visual password are presented. A user having an account or profile is given the option to create a visual password via a graphical user interface. The interface displays a plurality of themes to the user, wherein each theme represents a category of images. The user selects a theme and is presented with a plurality of images within the category. The user selects one or more images in a certain order to create a visual password. The selected images and order of selection are saved as the user's visual password. When the user later attempts to electronically access his account, the user will be required to select the correct pictures in the correct sequence in order to access his account. | 06-25-2015 |
20150178061 | APPLICATION ASSISTED SOFTWARE UPDATE FOR CONNECTED DEVICES WITHOUT A DISPLAY - An exemplary system and method avoids unannounced software updates for a connected device by acquiring installation consent from the user for each software update to the connected device. Consent is acquired by leveraging an extended interface application described below, to facilitate notifications from the connected device to the user and receive user inputs indicating consent in response to the notifications. | 06-25-2015 |
20150163811 | SYSTEM AND METHOD TO DELIVER DIFFERENT SERVICES OVER CELLULAR OR WIFI NETWORKS DEPENDING ON OPERATOR OR USER PREFERENCES - A method includes attaching to a Packet Data Network (PDN) supporting services over a long term evolution (LTE) network to establish a first network connection. The method includes connecting to a wireless local area network, e.g. a WiFi network, to establish a second network connection. The method further includes launching an application accessing at least one of the supported services and receiving a request from the application to switch between the first and second network connections, according to the supported service, e.g. a policy associated with the service. Switching from the first network connection to the second network connections includes connecting to the PDN via an evolved Packet Data Gateway (ePDG). | 06-11-2015 |
20150163659 | INBOUND ROAMING CONTROLS IN A SHARED NETWORK - A method includes receiving, at a network device in a shared network that includes a plurality of PLMNs, a request from an inbound roaming user device to connect to a home network of the inbound roaming user device. The method also includes identifying, by the network device, a PLMN selected by the inbound roaming user device, and accessing a listing of allowed PLMNs and disallowed PLMNs for roaming in the shared network. The method includes determining whether the selected PLMN is an allowed PLMN and blocking the connection to the home network in response to a determination that the selected PLMN is not an allowed PLMN. | 06-11-2015 |
20150163647 | MESSAGE TIMESTAMP RE-ALIGNMENT FOR MESSAGE THREAD CONSISTENCY ACROSS MULTIPLE DEVICES - Systems and methods for message timestamp re-alignment for message thread consistency across multiple devices are disclosed. In some implementations, an outbound message originating at a mobile phone is received at an integrated messaging server. The outbound message is associated with a messaging protocol. A timestamp representing a send time for the outbound message associated with the messaging protocol at the mobile phone is determined, at the integrated messaging server, by receiving an indication of the send time from the mobile phone. The outbound message and the timestamp are stored at the integrated messaging server. The outbound message and the timestamp representing the send time for the outbound message are provided from the integrated messaging server to a client computing device different from the mobile phone. | 06-11-2015 |
20150163642 | ENHANCED 911 FOR FIXED WIRELESS - A previously obtained location of a fixed wireless device is stored and available for processing of a call or the like from the device when a location determination may be desirable. In some circumstances, the previously obtained location of the fixed wireless device may be retrieved to provide information to a public-safety answering point (PSAP) during handling of an emergency call initiated by the fixed wireless device over a wireless network. | 06-11-2015 |
20150163533 | TAKE IT WITH YOU PREMIUM VIDEO CONTENT - To allow a user to temporarily move access to premium content to another location, e.g. outside the vicinity of the home, while adequately protecting the rights of a broadcast content provider, the various examples implement a transfer of an object for an identified right of content usage between premium content reproduction devices and a mobile device. The mobile device enables such transfer to support viewing of the premium content by a user outside of the user's home. | 06-11-2015 |
20150163301 | SYSTEM FOR AND METHOD FOR MEDIA UPLOAD MULTITHREADING FOR LARGE FILE UPLOADS - Exemplary embodiments provide a system and method for uploading large files to a remote server faster. The system and method divide the file into smaller file chunks and utilize parallel thread execution to prepare and upload the file chunks to the remote server. The uploading may further utilize a plurality of HTTP connections. Once all chunks have been uploaded to the remote server, the chunks may be consolidated into the original file by using content tokens and chunk numbers associated with the uploaded chunks. | 06-11-2015 |
20150163181 | MULTIPURPOSE INTERNET MAIL EXTENSIONS ("MIME") METADATA FOR GROUP MESSAGING - A user device may be configured to generate a multipart message (e.g., a multimedia messaging service (“MMS”) message). A message part of the multipart message may include conversation metadata that includes information regarding a messaging conversation between the user device and at least one other user device. The message part may include a multipart type indicator (e.g., a Multipurpose Internet Mail Extensions (“MIME”) type indicator) that indicates that a type of the at least one part is a type associated with conversation metadata. The user device may output the multipart message to the other user device. | 06-11-2015 |
20150156601 | NEAR FIELD COMMUNICATION AUTOMATIC SELF-PROVISIONING - Examples are disclosed that facilitate using a mobile device to provision of a connectable device to a user account. The disclosed examples provide for provisioning a connected device by a mobile device that uses a near field communication (NFC) transceiver in the mobile device to obtain information identifying a connectable device. The information identifying the connectable device is obtained from a NFC transponder associated with the connectable device. The mobile device processor accesses user account-related information to retrieve user authenticating information. The user authenticating information and the information identifying the connectable device is transmitted via a wireless communication transceiver to a provisioning server for provisioning the connectable device in a network. A confirmation of the provisioning of the connectable device to the user account associated with the mobile device is presented in a user interface element of the mobile device. | 06-04-2015 |
20150156082 | SERVICE LEVEL AGREEMENT (SLA) BASED PROVISIONING AND MANAGEMENT - Service level agreement (SLA) based monitoring and configuration of a path for transmission of data is achieved by identifying an SLA associated with the data and determining transmission requirements associated with the SLA. A status of a network element in the path, such as data occupancy of a data queue included in the network element, may be determined and used to select one of a high bandwidth portion or a low bandwidth portion of the pathway. The occupancy of the queue may be used to estimate a transmission delay, and the estimated transmission delay is used to select between the high bandwidth portion and the low bandwidth portion. The data may be directed to the selected bandwidth portion by changing a quality of service (QoS) value or other attribute associated with the data. | 06-04-2015 |
20150154956 | AUTO-TAGGER THAT LEARNS - Examples perform context categorization by categorizing a transcription of a speech file based on the context of the subject matter of the transcription. A computer processor is configuration to provide a system that generates a normalized transcription of the speech file transcription and compares elements of the normalized transcription to elements of a context categorization model or a corpus of categorized transcriptions to determine whether the normalized transcription contains keywords of transcriptions that have previously been categorized. If the comparison yields a result indicating a specific match with a context category, the normalized transcription is assigned to the matching context category. As the number of successfully categorized transcriptions stored in the corpus increases, the more frequently the system and method examples perform successful comparisons. As a result, the context categorization accuracy increases and the system appears to learn. | 06-04-2015 |
20150154206 | SECURE MANAGEMENT OF MESSAGE ARCHIVES - A first server device may receive a group identifier, a first list including one or more first user device identifiers, and an instruction to archive messages associated with the one or more first user device identifiers; receive a second list including one or more second user device identifiers that are associated with the group identifier; and generate a third list including one or more third user device identifiers that are in the first list and the second list. The first server device may receive a message associated with a user device identifier; determine that the message is to be archived when the user device identifier associated with the message is included in the third list; and provide the message to a second server device based on the determination that the message is to be archived. | 06-04-2015 |
20150153924 | MANAGING USER INTERFACE ELEMENTS USING GESTURES - Systems and methods for managing user interface elements using gestures are disclosed. In some implementations, a block representing a plurality of user interface elements is displayed on a touch screen of a device. A first gesture initiated at a position corresponding to the block representing the plurality of the user interface elements is received via the touch screen. A first path corresponding to the first gesture is stored in a memory. At least a portion of the plurality of user interface elements are displayed on the touch screen in positions along the first path. | 06-04-2015 |
20150149939 | VARIABLE USER INTERFACE THEME CUSTOMIZATION - A mobile device receives, from a user, parameters for a user interface theme associated with an application. The user interface parameters define conditions for altering features of the user interface theme based on variable data fields. The mobile device verifies compatibility of the user interface parameters, obtains data for the user interface parameters that corresponds to the variable data fields, and applies the obtained data to the user interface parameters to generate the features of the user interface theme. The mobile device also monitors the variable data fields to obtain updated data and applies the updated data to the user interface parameters to alter the features of the user interface theme. | 05-28-2015 |
20150149937 | SHARING OF A USER INPUT INTERFACE OF AN APPLICATION SESSION OF ONE APPLICATION BETWEEN TWO OR MORE APPLICATIONS - A primary application and a secondary application installed on a mobile communication device are both configured to obtain input from a user of the device through an application session of the primary application. The primary application transmits a notification to cause the secondary application to begin execution in the background. The primary application further transmits a request for user interface (UI) information to the secondary application. Based on UI information received from the secondary application, the primary application generates a graphical user interface (GUI) including an interface for receiving user input relating to the secondary application. The generated GUI is displayed on the device in the application session of the primary application, and user input relating to the secondary application is received in the application session of the primary application. The primary application then transmits to the secondary application user input identified as relating to the secondary application. | 05-28-2015 |
20150148020 | METHOD AND APPARATUS FOR SELF-ACTIVATING A MOBILE DEVICE - To activate a pre-provisioned mobile device on a network, an initial data communication for device activation is allowed between the device and an self-activation portal. At this point, the network prevents other more regular communication of the mobile device via the network. The portal automatically collects identification information from the mobile device and collects information from the user to activate the device on a network service account. The portal causes a provisioning system to provision data to network elements to activate device service in the network. After provisioning is complete, a notification is sent to the mobile device; and after device communication is completed a record that controlled routing to the portal before activation is deleted. The mobile device then communicates via the network to obtain data for storage in the device, to complete activation and permit normal operation of the mobile device via the network. | 05-28-2015 |
20150146683 | CALL CONTINUITY USING SHORT-RANGE COMMUNICATIONS HANDOFF - A call is made from a user equipment (UE) device to a first other UE device that is is paired to a short range communications device. The first other UE device monitors the respective connections between short range communications device and the first other UE device and a second other UE device and automatically hands over the telephone call from the first other UE device to the second other UE device when the connection between the short range communications device and the second other UE device is stronger than the connection between the short-range communications device and the other first UE device. The cordless headset 172 is concurrently handed off from the first other UE device to the second other UE device. | 05-28-2015 |
20150146682 | CELL DEVICE FOR MULTI-NETWORK COMMUNICATION - A device is configured to receive a request to provide data traffic associated with a user device. The device is configured to determine network information associated with a set of networks. The device may be associated with a small cell long term evolution (“LTE”) network, which may connect to the set of networks. The set of networks may include a macro cell LTE network and a fiber optic network. The network information may include information that identifies a condition of the set of networks. The device is configured to identify a particular network, of the set of networks, based on the network information, and provide the data traffic, via the small cell LTE network and the particular network, based on identifying the particular network. | 05-28-2015 |
20150142677 | METHOD AND APPARATUS FOR DETERMINING A METRIC FOR A PREDICTED OPERATIONAL STATUS OF A PRODUCT - An approach for predicting potential reliability or performance issues associated with a product and presenting various options to address those potential issues includes determining one or more parameters associated with a transaction related to a product. The approach also includes obtaining, in response to the transaction and based on the one or more parameters, a metric describing a predicted operational status of the product. Further, the approach includes initiating a presentation, based on the metric, of one or more potential actions associated with the transaction and related to the product. | 05-21-2015 |
20150138989 | PERFORMANCE PATTERN CORRELATION - A method includes identifying a plurality of network components in a network topology of a data transmission network, identifying data transmission performance patterns based on at least one key performance indicator (KPI) for each of the plurality of network components, identifying at least one data transmission issue in the network, and identifying a model degraded performance pattern associated with the at least one data transmission issue. The method may also include matching the model degraded performance pattern to the data transmission performance patterns to form matched performance patterns, and identifying a root-cause component from the network components based on the matched performance pattern. | 05-21-2015 |
20150134703 | METHOD AND SYSTEM FOR UNIFIED TECHNOLOGICAL STACK MANAGEMENT FOR RELATIONAL DATABASES - An approach is described for providing unified technological stack management (e.g., via a global storage instance) where metadata is delocalized from storage nodes. The approach includes creating a global storage instance, wherein the global storage instance contains metadata for a storage layer including a plurality of storage nodes, and wherein the global storage instance is delocalized from the plurality of storage nodes. The approach also includes receiving a database operation request from an operating system layer. The approach further includes mediating the database operation request between the operating system layer and the storage layer using the global storage instance. | 05-14-2015 |
20150134428 | CONNECTED TOLL PASS - Examples are disclosed that facilitate provisioning of a toll system communication device used in an electronic toll collection system, such as EZ Pass. The toll system communication device (e.g., an EZ Pass tag) can have user credentials provided to it that are associated with a user payment account. As a user travels a toll road, the toll system communication device is interrogated at a toll booth location. In response to the interrogation, the toll system communication device provides information identifying the toll system communication device and associated user credentials. The user credentials may be obtained from or authenticated with a mobile device within close proximity to the vehicle equipped with the toll system communication device. Using the user credentials and the identifying information, a user payment account may be provisioned to pay tolls accrued by the vehicle using the toll road. | 05-14-2015 |
20150130591 | DEVICES AND METHODS FOR PROVIDING MOBILE CELLULAR BEACONS - Methods and devices are disclosed for providing audible, visual, and tactile alerts detectable by first responders in a geographic region impacted by a mass casualty event, such as a natural disaster or a terrorist attack. In certain aspects, an electronic device of an individual trapped within a damaged structure may establish wireless communications with a mobile cellular site and may receive a request to generate an alert audible to first responders. In response to the request, the electronic device may identify first device settings corresponding to the audible alert, and generate the audible alert in accordance with the obtained first device settings. In certain aspects, the audible alert may enable first responders to identify locations of victims trapped within structures damaged by the mass casualty event. | 05-14-2015 |
20150127940 | SECURE DISTRIBUTED INFORMATION AND PASSWORD MANAGEMENT - A method, performed by a computer device, may include receiving an indication that a first user has acquired rights to access a digital content; generating a key for the digital content; encrypting the digital content using the generated key to generate encrypted digital content; obtaining a first passcode; and providing the first passcode and the encrypted digital content to a user device associated with the first user. The method may further include receiving, from the user device, a request for the key, wherein the request include the first passcode; determining that the first passcode is valid; determining that the key has not expired; and providing the key to the user device, in response to determining that the first passcode is valid and that the key has not expired. | 05-07-2015 |
20150127428 | MOBILE PRICE MATCHING - A method may include receiving, from users, information identifying items purchased by the users, the information including a price for each of the items, and storing the information in a database. The method may also include receiving, from a second number of users, additional information identifying items purchased by the second users, the additional information including a price for each of the items, and identifying a first item in the database that matches a second item associated with purchases by one of the second users. The method may further include determining whether the price for the second item is lower than the price for the first item stored in the database and updating the database to include the second price for the first item, in response to determining that the second price is lower than the first price. | 05-07-2015 |
20150126109 | NFC NEGOTIATED PAIRING - A mobile device includes a transceiver for performing wireless communication, a microprocessor for operating said mobile device, a near field communications (NFC) system for performing wireless communication independent of the transceiver and at a lower amount of power than said transceiver, a contactless front end included in the NFC system for receiving or transmitting signals with an NFC capable device, and a pairing system implemented in the microprocessor for pairing one NFC capable device with another NFC capable device. The pairing system configures the mobile device to receive a tag or a device driver from one of the NFC capable devices that are to be paired with each other; and transfers the tag or a device driver obtained from the tag to the other of the NFC capable devices in order to enable interoperation between the two NFC capable devices. | 05-07-2015 |
20150121501 | CONNECTED AUTHENTICATION DEVICE USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for device-based authentication are disclosed. In some implementations, a device receives a Single Sign On PIN from a backend server. The device transmits, to a token server, the Single Sign On PIN and credentials of a subscriber identity module (SIM) to request a token for accessing a network resource via a computer different from the device. The token is associated with a user account. The device receives the token from the token server. The device stores the token at a local memory of the device. | 04-30-2015 |
20150121496 | REMOTE AUTHENTICATION USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for remote authentication using mobile single sign on credentials are disclosed. In some implementations, a proxy server receives, from a web access device, a request to access a secure online resource via the web access device. The proxy server receives, from a mobile device different from the web access device, one or more credentials for accessing the secure online resource. The proxy server determines that a geographic distance between the web access device and the mobile device is less than a geographic distance threshold. Upon determining that the geographic distance between the web access device and the mobile device is less than the geographic distance threshold, the proxy server enables the web access device access to the secure online resource. | 04-30-2015 |
20150121482 | MOBILE BASED LOGIN VIA WIRELESS CREDENTIAL TRANSFER - Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration request for a receiver device for accessing a secure resource. The proxy server registers the receiver device in response to the registration request. The proxy server receives, from a transmitter device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource. The proxy server identifies the receiver device based on the information identifying the transmitter device. The proxy server forwards, to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource. | 04-30-2015 |
20150120901 | DETECTING POOR PERFORMING DEVICES - A device is configured to determine a set of performance indicators associated with a base station and a set of user devices, and determine that a quantity of the set of user devices does not exceed a threshold. The device is configured to receive performance information based on the set of performance indicators, and store the performance information based on determining that the quantity of the set of user devices does not exceed the threshold. The device is configured to determine a performance problem, associated with the base station, based on the performance information, and determine that a user device, of the set of user devices, is associated with the performance problem. The device is configured to provide information that identifies the user device. | 04-30-2015 |
20150120549 | MOBILE AUTHENTICATION FOR WEB PAYMENTS USING SINGLE SIGN ON CREDENTIALS - Systems and methods for mobile authentication for web payments are disclosed. In some implementations, a proxy server receives, from a computing device different from a mobile device, a request from a user to process a web payment via a payment account associated with the mobile device, the web payment being associated with an online merchant. The proxy server verifies that the mobile device is associated with the user. The proxy server transmits, to a commerce server of the online merchant, payment information for the web payment in response to verifying that the mobile device is associated with the user. | 04-30-2015 |
20150120392 | Ranking of Store Locations Using Separable Features of Traffic Counts - A system may generate a matrix according to subscriber count data for a plurality of points of interest within a geographical area over a period of time identified from aggregate subscriber data, the matrix including counts per subset of the period of time arranged according to subset of the period of time and point of interest. The system may further perform a factorization of the matrix of subscriber counts to extract feature components of the subscriber count data, identify at least a primary feature component and a secondary feature component according to the factorization, and provide a ranking of at least a subset of the points of interest according to at least one of the primary feature component and the secondary feature component. The system may also receive a request for a report, generate the report according to the identified feature components, and provide the report responsive to a request. | 04-30-2015 |
20150120391 | ENHANCED WEIGHING AND ATTRIBUTES FOR MARKETING REPORTS - A computing device may generate target area breakdowns of demographic information for a plurality of geographic areas based on identified key demographic variables of subscribers of a subscriber network, determine subscriber demographic breakdowns for each of the target area breakdowns based at least in part on subscriber base information descriptive of subscribers of the subscriber network, and perform rim weighting of the subscriber demographic breakdowns to generate rim weights for each subscriber according to the respective target area breakdowns. The device may further generate index scores according to weighted subscriber information indicative of relative likelihood of a subscriber being associated with an attribute as compared to the population of the associated geographic area, identify business rules including criteria for association of a subscriber with an advanced attribute, the criteria including a minimum index score for an attribute; and assign the advanced attribute to the subscriber based on subscriber index score. | 04-30-2015 |
20150119108 | MOBILE DEVICE MODE OF OPERATION FOR VISUALLY IMPAIRED USERS - A mobile device operates in a standard mode of operation, or operates in a visually impaired (VI) mode of operation designed for visually impaired users and in which a display screen of the mobile device is turned off by default. The display screen may thus remain turned off in the VI mode even when conditions under which the display screen is turned on in the standard mode are satisfied. The display screen may further remain turned off in the VI mode even when conditions under which a touch-screen input interface of the mobile device is turned on in either of the standard and VI modes. The mobile device may be configured to automatically transition from the VI mode to the standard mode in response to detecting a gaze directed towards the display screen. | 04-30-2015 |
20150119047 | DYNAMIC SMALL CELL PROVISIONING AND FREQUENCY TUNING - A system may include a macro cell base station configured to determine a service quality associated with the macro cell base station; determine whether the service quality is below a quality threshold; and instruct a small cell base station to switch from a sleep mode to an awake mode, when the service quality is below the quality threshold. The system may further include a small cell base station, located within a coverage area of the macro cell base station, configured to enter an awake mode, when instructed to enter the awake mode by the macro cell base station; and inform the macro cell base station that the small cell base station is in awake mode. The macro cell base station may be further configured to hand over one or more user devices to the small cell base station, when the small cell base station is in the awake mode. | 04-30-2015 |
20150118995 | INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) AUTHENTICATION FOR NON-IMS SUBSCRIBERS - A call session control function (“CSCF”), of an Internet Protocol Multimedia Subsystem (“IMS”) core network, may receive a set of authentication credentials that do not include IMS authentication credentials; and may use the set of authentication credentials, which do not include IMS authentication credentials, to authenticate a user device for the IMS core network. | 04-30-2015 |
20150117184 | MANAGEMENT OF ACCESS NETWORK RETRY ACROSS POWER CYCLE - A device creates a list of permanent evolved packet system (EPS) mobility management (EMM) failure events associated with the device, where the list includes information associated with one or more permanent EMM failure events encountered by the device. The device stores the list of permanent EMM failure events, provides an attach request message to an access network, and receives, from the access network, a reject message as a response to the attach request message. The device performs a power cycle based on receiving the reject message, and erases, based on the power cycle, a forbidden public land mobile network (PLMN) list and a forbidden tracking area list maintained by the device. The device repopulates the forbidden PLMN list and the forbidden tracking area list with information included in the list of permanent EMM failure events. | 04-30-2015 |
20150115987 | APPARATUS AND METHOD FOR TESTING PORTABLE DEVICES - An apparatus is disclosed for testing portable devices. The apparatus includes a base upon which the portable device is mounted, and a top mold which fits over the base to immobilize the portable device. Templates can also be formed on the top mold or base. The templates contain test patterns that are defined by a plurality of apertures. A stylus is used to test the portable device by engaging or contacting different locations through the apertures in the test pattern. | 04-30-2015 |
20150113441 | LAYER-BASED IMAGE UPDATES - A system for layered-based image updates is disclosed. In the system, a server may receive information corresponding to a modification to an image made by a user; generate a layer that includes the modification to the image; store the layer; and publish the image as an updated image, including the layer, to cause a user device to display the updated image, information identifying the user, and an indication that the user is associated with the layer. | 04-23-2015 |
20150113262 | ADAPTIVE APPLICATION OF ACCESSORY DEVICE SETTINGS - A system for adaptive application of device settings is disclosed. In the system, a first device may receive information identifying settings that are applied to one or more second devices. The settings may correspond to interactions, by a user, with the one or more second devices over a period of time. The one or more second devices be may non-mobile devices associated with one or more facilities. The first device may determine information identifying one or more conditions, associated with environmental conditions or conditions associated with the user's mood or physical state, under which the settings are applied to the one or more second devices; store information that correlates the settings of the one or more second devices with the one or more conditions; determine that at least one of the one or more conditions is met; and apply the settings to the one or more second devices. | 04-23-2015 |
20150113109 | FEATURE ACTIVATION ON DEVICE - A system is configured to receive account information associated with a subscriber and a set of user devices, and receive user input, from a device associated with the subscriber, indicating that a feature is to be activated for the set of user devices. The device is configured to determine an association between the set of user devices and a feature code associated with the feature. The device is configured to receive a request to activate the feature from a user device, of the set of user devices, and determine that the user device is eligible to receive the feature based on the association between the set of user devices and the feature code. The device is configured to activate the feature for the user device based on determining that the user device is eligible to receive the feature. | 04-23-2015 |
20150111535 | METHOD AND APPARATUS FOR PROVIDING SERVICE BASED ON VOICE SESSION AUTHENTICATION - An approach for providing a service over a communication session based on an authentication from a voice session is described. A voice session enhancement platform may determine that a voice session is established among a plurality of devices. The voice session enhancement platform may further retrieve one or more authentication parameters associated with the voice session for the plurality of devices. The voice session enhancement platform may also initiate a service among the plurality of devices, wherein the service is separate from the voice session. Additionally, the voice session enhancement platform may authenticate the plurality of devices for the service based on the one or more authentication parameters. | 04-23-2015 |
20150110088 | SENDING AND RECEIVING MESSAGES OVER WIRELESS LOCAL AREA NETWORKS - A device may receive a text message or a multimedia message to be received by a receiving device. The message may be stored by one or more storage devices. The device may determine that the message is to be received by the receiving device via a wireless local area network (WLAN). The device may send, to the receiving device, a notification associated with the message. The device may identify a storage device, of the one or more storage devices, to provide the message to the receiving device. The device may manage a synchronization between the receiving device and the storage device via the WLAN. The synchronization may cause the message to be received by the receiving device. The device may receive an indication that the receiving device has received the message, and may provide closure information. The closure information may prevent the message from being delivered via a cellular network. | 04-23-2015 |
20150110009 | INTER-LAYER QUALITY OF SERVICE PRESERVATION - A server device may store inter-layer quality of service (“QoS”) information, indicating a set of link layer QoS levels that are associated with a particular device, a set of network layer QoS levels that are associated with the set of link layer QoS levels, and a set of MPLS QoS levels that are associated with the set of link layer QoS levels. A network device may establish a set of bearers, that correspond to the set of link layer QoS levels, with a particular device; output information regarding the set of network layer QoS levels that are associated with the set of link layer QoS levels, to allow the particular device to select a bearer, of the set of bearers, via which to output traffic to the network device; receive, from the particular device, traffic via the bearer; and determine a particular MPLS QoS level associated with the received traffic. | 04-23-2015 |
20150110005 | PRIORITIZED PUSH-TO-TALK SESSION USING QUALITY OF SERVICE (QoS) OVER AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) - A device establishes a quality of service (QoS) framework with a network connected to the device. The device includes a push-to-talk (PTT) application, and the QoS framework assigns priorities to different types of traffic associated with the device. The device utilizes the PTT application to establish a PTT session with another device via the network, and prioritizes, based on the QoS framework, PTT traffic, provided in the PTT session, over best effort traffic during the PTT session with the other device. | 04-23-2015 |
20150109908 | MANAGING HIDDEN SECURITY FEATURES IN USER EQUIPMENT - A device determines whether a PTT application is authenticated to access a first API and a second API, and prevents the PTT application from accessing the first and second APIs when the PTT application is not authenticated. The device permits the PTT application to access the first and second APIs when the PTT application is authenticated, and modifies, via the first API, a timer that dictates when the device checks for traffic received from a network. The device establishes, via the second API, a data connection with the network, and determines, based on the data connection, a QoS framework for the network. The device utilizes the PTT application and the timer to establish a PTT session with another device via the network, and prioritizes, based on the QoS framework, PTT traffic provided in the PTT session with the other device. | 04-23-2015 |
20150106202 | DYNAMIC AGGREGATION AND MANAGEMENT OF MOBILE APPLICATIONS AND APPLICATION DATA - A mobile station configured to communicate across a mobile wireless communication network has a plurality of retail applications installed thereon. A retail application aggregator running on the mobile station is operative to dynamically manage the retail applications and aggregate data from the retail applications. A user of the mobile station identifies retail applications to include in an application grouping, and filter parameters to associate with the application grouping and used to identify content of interest to the user. For each retail application in the grouping, the aggregator accesses the retail application to obtain information on current offers extended by a retailer associated with the application. The aggregator filters the obtained information on current offers based on the filter parameters, and provides the user with the current offers matching the filter parameters. | 04-16-2015 |
20150098601 | APPARATUS FOR ENHANCING SOUND FROM PORTABLE DEVICES - An apparatus is disclosed for enhancing the sound level of portable devices by providing a sound reflector between the portable device and a case. The sound reflector includes a shield which functions to redirect output from rear facing speakers toward the front. The sound reflector can be extended for redirecting sound or retracted when not in use. A case incorporating a retractable sound reflector is also disclosed. | 04-09-2015 |
20150095014 | METHOD AND APPARATUS FOR PROVIDING CONTENT SCREENING AND RATING - An approach is provided for content screening and rating. A content rating platform processes content directed to or originating from a user to determine one or more elements in the content. The content rating platform calculates a content rating for the content by comparing the one or more elements against at least one user-configurable dictionary, and then selects an operation for processing the content based on the content rating. | 04-02-2015 |
20150094018 | NETWORK BILLING FOR MESSAGES - A device receives a message from a fixed user device associated with a first user. The first user is associated with a first mobile user device, and the message is destined for a second mobile user device associated with a second user. The device generates a first charge record for the first user based on the message and on a telephone number associated with the first mobile user device, and provides the first charge record to a billing system. The device generates a copy of the message, provides the copy of the message to the first mobile user device, and forwards the message toward the second mobile user device. | 04-02-2015 |
20150092590 | CATEGORY 1 M2M DEVICE DATA TRANSMISSION VIA A LONG TERM EVOLUTION NETWORK - A scheduler device may receive machine-to-machine (M2M) transmission information associated with a data transmission between a base station and a category 1 M2M device. The scheduler device may determine other transmission information associated with the base station. The other transmission information may include information associated with another data transmission between the base station and another device which is not a category 1 M2M device. The scheduler device may generate a resource assignment schedule associated with the category 1 M2M device and the other device. The resource assignment schedule may be based on the M2M transmission information and the other transmission information. The resource assignment schedule may identify a set of resources to be allocated to the category 1 M2M device during an increment of time. The scheduler device may provide the resource assignment schedule. | 04-02-2015 |
20150089621 | SECURE LOGIN FOR SUBSCRIBER DEVICES - A network service may receive an authentication request from a subscriber device, the authentication request including a user credential and a device identifier of the subscriber device. The service may validate the authentication request based at least in part on the included user credential, and when the authentication request is validated, provide an authentication reply to the subscriber device indicative of allowance of the subscriber device to access the service, the authentication reply including a hash token keyed to the device identifier of the subscriber device for use in validation of subsequent authentication requests. The service may further generate a second hash token based on the device identifier of a subsequent authentication request; validate a subsequent authentication request according to the hash token and the second hash token; and when the subsequent authentication request is validated, allowing the subscriber device to access the service. | 03-26-2015 |
20150087414 | CLOUD GAMING IMPLEMENTED USING A MOBILE DEVICE AND A DISPLAY DEVICE - Techniques are described herein in which a mobile device may enable cloud gaming. In one implementation, the mobile device may receive an information stream, from a remote game server, relating to an online game. The method may further include receiving user input relating to the online game; transmitting the user input to the game server; and screencasting, to a local display device, a video stream that is based on the information stream, the video stream representing a display corresponding to the online game. | 03-26-2015 |
20150081617 | OUT OF HOME MEDIA MEASUREMENT - A system may include at least one data source configured to provide network usage data indicative of the existence of communications with subscriber devices, and web and application usage data indicative of data usage of the subscriber network by the subscriber devices. The system may also include a data warehouse server configured to perform operations including correlating the network usage data and web and application usage data into subscriber-level data; associating, with the subscriber-level data, subscriber attributes indicative of a preference of the subscriber for content in a particular category of content, and profile attributes indicative of demographic characteristics of the subscriber; matching the subscriber-level data with a set of subscriber profiles, each of the set of subscriber profiles including a set of subscriber attributes and profile attributes associated with the respective subscriber profile; and aggregating the subscriber-level data into aggregate-level data according to the matching subscriber profiles. | 03-19-2015 |
20150081488 | MARKETING INCLUSION LIST MANIPULATION - A system may include a service data warehouse configured to execute an inclusion list module to perform operations including receiving opt-out data from a billing system of a subscriber network, the opt-out data associated with use of subscriber information by at least one third-party information service, receiving an eligible subscriber list from an enterprise data warehouse of the subscriber network; and generating a customer inclusion list from the eligible subscriber list and the opt-out data, the customer inclusion list including a listing of subscribers identifiers of subscribers of the subscriber network who have opted into use of the at least one third-party information service of the subscriber network. The system may further include a notification system configured to provide privacy notices to subscribers, and automatically opt the subscribers in or out of inclusion on the customer inclusion list based on subscriber receipt of the privacy notices. | 03-19-2015 |
20150081421 | ADVERTISING UNIT VIEW AREA - A system may generate a view area based on a field of view of an advertising unit, a sight distance from the advertising unit and a view direction associated with the advertising unit; identify a set of road segments that fall within the view area of the advertising unit; and associate the advertising unit as being viewable to mobile subscribers of a network service provider traversing the identified set of road segments. The system may further receive a request for a report including information regarding an audience available to the advertising unit over a period of time; query a data warehouse for aggregate subscriber data associated with locations of the set of road segments over the period of time; and generate the report regarding the audience for the ad unit over the period of time based on the retrieved aggregate subscriber data. | 03-19-2015 |
20150079950 | DOMAIN INDICATOR TONE FOR A CALLING PARTY - A device may receive information identifying a call attempt associated with a calling device. The device may select a domain network, of a plurality of domain networks, for the call attempt. Each of the plurality of domain networks may be associated with a respective domain type. The device may identify the respective domain type associated with selected domain network. The device may cause a tone, associated with the respective domain type, to be output by the calling device to notify a user of the calling device that the call attempt is being made via the selected domain network. | 03-19-2015 |
20150078179 | SIGNAL STRENGTH INDICATOR FOR MULTICAST BROADCASTING IN A WIRELESS NETWORK - The quality of a multicast broadcast that is being received by a mobile device may be determined. In one implementation, a method may include receiving a radio signal corresponding to a multicast broadcast of content; measuring a strength of the received signal; determining a minimum signal strength to receive the content associated with the multicast broadcast; determining a signal quality metric, associated with the multicast broadcast, the signal quality metric being based on a difference between the measured strength of the signal and the determined minimum signal strength; and providing a visual indication of the signal quality metric. | 03-19-2015 |
20150078175 | SERVICE QUALITY MEASUREMENT AND INDICATION FOR MULTICAST BROADCAST IN A WIRELESS NETWORK - A service quality metric, that measures the quality of a multicast broadcast that is being received by a mobile device, may be determined. In one implementation, a method may include receiving a radio signal corresponding to a multicast broadcast of content that was encoded using a forward error correction (FEC) technique in which the content is segmented and encoded as a plurality of blocks; and reassembling the content corresponding to the received radio signal. The method may further include determining an FEC failure rate based on a relative occurrence of the successfully reassembled blocks to the unsuccessfully reassembled blocks; determining a service quality metric based on the FEC failure rate; and providing a visual indication of the service quality metric. | 03-19-2015 |
20150074802 | SPAM NOTIFICATION DEVICE - A device is configured to receive triggering information including a set of conditions associated with spam. The device is configured to receive a message from a sending device, and to determine that the message is spam based on determining that the message satisfies a threshold quantity of conditions of the set of conditions. The device is configured to provide a notification indicating that the message may be spam, and receive response information, based on the notification, indicating that the sending device is to be blacklisted. The device is configured to cause, based on the response information, a future message from the sending device to be blocked prior to being presented to a user. | 03-12-2015 |
20150067816 | AUTOMATED SECURITY GATEWAY - A security device may be configured to receive information regarding traffic that has been outputted by a particular user device; and compare the information regarding the traffic to security information. The security information may include device behavior information, traffic policy information, or device policy information. The security device may determine, based on the comparing, that a security threat exists with regard to the traffic; and take, based on determining that the security threat exists, remedial action with respect to the traffic. Taking the remedial action may include preventing the traffic from being forwarded to an intended destination associated with the traffic, providing an alert, regarding the security threat, to the particular user device, or providing an alert, regarding to the security threat, to another device. | 03-05-2015 |
20150067785 | METHOD AND APPARATUS FOR A DEVICE MANAGEMENT APPLICATION - An approach for implementing a local device management application for deterring misuse, loss, or theft of mobile devices includes determining that a use of a first device at least substantially satisfies one or more use criteria. The approach also includes generating a notification message regarding the use. Further, the approach includes initiating a transmission of the notification message from the first device to a second device. | 03-05-2015 |
20150066707 | Methods and Systems for Personalizing an In-Store Shopping Experience for a User in a Retail Store that Provides Accessories for Computing Devices - An exemplary method includes a shopping personalization system 1) detecting that a user is located within a geographic vicinity of a retail store that provides accessories for computing devices, 2) accessing, in response to the detecting that the user is located within the geographic vicinity of the retail store, a user profile associated with the user, 3) identifying a computing device associated with the user, and 4) providing a personalized in-store shopping experience for the user in accordance with the user profile and the identified computing device while the user is located within the geographic vicinity of the retail store. Corresponding methods and systems are also disclosed. | 03-05-2015 |
20150065180 | LOOPING PROTECTION FOR COPY FORWARD SMS SUBSCRIBERS - Short message service (SMS) copy forward and carbon copy methods and systems are provided. An SMS message is received at a first network device and is delivered to a first mobile device. A copy indication associated with the sender or the first mobile device instructs the first network device to send a copy of the received SMS message to a second mobile device. Responsive to the copy indication, the first network device replaces a teleservice type identifier in a teleservice space of the received SMS message with a message copy indicator based on a predetermined mapping between the teleservice type identifier and the message copy indicator, to form a modified SMS message. The modified SMS message is sent to a second network device associated with the second mobile device. The second network device detects the message copy indicator to determine whether the modified SMS message is enabled for further copying. | 03-05-2015 |
20150065173 | PROBABILISTIC LOCATION DETERMINATION FOR PRECISION MARKETING - Location methods for mobile devices and location systems are provided. A location method for a mobile station includes identifying a current probable location of the mobile station, defined by a position of the mobile station and an uncertainty of the position. A predetermined area is identified which at least partially overlaps the identified current probable location of the mobile station. A probability distribution of the mobile station proximate to the predetermined area from the position of the mobile station and the uncertainty of the position can then be used to estimate a probability that the mobile station is proximate to the predetermined area. An exemplary method may also involve associating an event for the mobile station based on the estimated probability. | 03-05-2015 |
20150065125 | CONNECTION STATE-BASED LONG TERM EVOLUTION STEERING OF ROAMING - A method, a device, and a non-transitory storage medium comprising instructions that provide steering of roaming services based on connection state data pertaining to Diameter connections between visited networks and an internetwork. The steering of roaming services include accepting or denying a request of a roaming user seeking to attach to a visited network and managing and deploying preferred visited network lists to user devices. | 03-05-2015 |
20150063218 | QUALITY OF SERVICE ACCESS DEVICE - A device is configured to determine quality of service information and determine a set of service classes, associated with a wireless local area network, based on the quality of service information. The device is configured to determine an association between the set of service classes and a set of service identifiers. The device is configured to receive data traffic and to determine a service class, of the set of service classes, associated with the data traffic based on the association between the set of service classes and the set of service identifiers. The device is configured to schedule delivery of the data traffic based on the service class and to deliver the data traffic via the wireless local area network. | 03-05-2015 |
20150063187 | ULTRA HIGH-FIDELITY CONTENT DELIVERY USING A MOBILE DEVICE AS A MEDIA GATEWAY - A system may include a group of user devices; and one or more base stations configured to receive programming content from a content provider, and distribute the received programming content, via a broadcast or multicast technique, to the group of user devices. A particular user device, of the group of user devices, may receive distributed programming content, and output, to device that is external to the user device, the programming content received from the particular base station. | 03-05-2015 |
20150062184 | RESIZING PREDICTIVE KEYBOARD - Systems and methods for keypad button resizing are disclosed. In some implementations, a keypad including multiple characters is displayed on a display of a touchscreen device. A selection of one of the multiple characters on the keypad is received. For each character in the multiple characters on the keypad, a likelihood value that the character is a next character to be typed is predicted and a button size for the character is selected based on the predicted likelihood value. The keypad is modified based on the selected button size for each character. The modified keypad is displayed on the display of the touchscreen device. | 03-05-2015 |
20150059006 | Secure Device Management Abstraction and Unification Module - An exemplary system that includes a computing device that stores an abstraction and unification module, the abstraction and unification module being executable by a processor of the computing device to receive from a frontend component a request for information located within a backend component of the computing device and validate that the frontend component is authorized to receive the information specified in the request. The abstraction and unification module may further pass the request to an abstraction engine that extracts the information from the backend component and provides the information extracted from the backend component to frontend component. | 02-26-2015 |
20150058416 | DETERMINING A COMMUNITY EMOTIONAL RESPONSE - Systems and methods for determining a community emotional response are disclosed. In some implementations, a plurality of user feedback items for an online content are received. The user feedback items describe reactions of users to the online content. A user's emotional response associated with each of the plurality of user feedback items is determined. The emotional responses are aggregated to determine a community emotional response to the online content. A signal is transmitted for displaying, on a display unit and in association with the online content, of a visual indication of the community emotional response to the online content. | 02-26-2015 |
20150058392 | PROVISIONING CHAIN QUEUING AND PROCESSING - A system for and method of provisioning chain queuing and processing. Chain queuing and processing defines and supports ordered provisioning of requests to be sent to network elements that either contain information on behalf of one another or are for a network activity that requires the presence of a properly provisioned record to perform an action. In contrast to conditional queuing that determines a provisioning need at the time of transaction execution, chain queuing may include a complex execution plan determined at the time of queuing based on a plurality of processing and dispatching rules. These rules may be based on a concept of one provisioning request being a prerequisite for at least one subsequent event. In other words, a parent-child relationship may exist between two or more resulting transactions derived from one request. These parent-child relationships may then be incorporated into dispatching, queuing, and processing rules to create a fully detailed execution plan. | 02-26-2015 |
20150058220 | PAYMENT PRE-AUTHORIZATION - A computing device may receive account information identifying a user account and may authenticate the computing device as authorized to configure pre-authorized transactions for the identified user account. The computing device may receive pre-authorization parameters specifying limitations on transactions to be performed using a payment card associated with the user account, the limitations being separate from limitations on use of the payment card specified in a cardholder agreement associated with the payment card, and may provide a pre-authorization request to a transaction authorization server authorizing transactions performed using the payment card, the pre-authorization request including the account information and the pre-authorization parameters. | 02-26-2015 |
20150056947 | MOBILE DEVICE RADIO POWER CONSUMPTION AND BATTERY CAPACITY MANAGEMENT - A mobile device may manage the battery of the mobile device by controlling radio power usage. In one implementation, a mobile device may determine a target power usage associated with a radio of the mobile device, the radio implementing a radio link with a base station associated with a cellular wireless network. The mobile device may also determine an actual power usage associated with the radio of the mobile device and compare the actual power usage to the target power usage. The mobile device may communicate with the base station, and based on the comparison of the actual power usage to the target power usage, to cause the base station to reduce a bit rate associated with the radio link. | 02-26-2015 |
20150055850 | System For and Method Of Paper Note Authentication and Tracking Through NFC - A system for and method of paper note authentication and tracking through NFC is presented. The system and method includes utilizing an authenticating device to receive paper note data using an NFC reader, transmit the paper note data to an authenticating party, receive an authentication determination and/or additional paper note data, and authenticate the paper note where the authentication determination indicates accordingly. The system and method may further include updating the paper note data upon authentication to prevent duplicate authentication attempts. | 02-26-2015 |
20150055773 | OUTBOUND PACING MECHANISM FOR IVR - A pacing system and method for determining information related to a state of a call queue of an automatic call distributor (ACD). The information is based on a number of calls in the ACD queue waiting to be connected to a live agent. The pacing system and method controls a number of outbound calls being made by the IVR based system to a number of end users based on the information related to the ACD queue state. | 02-26-2015 |
20150055446 | INTELLIGENT POLICY AND CHARGING RULE FUNCTION (PCRF) RESTORATION - A first device associated with an evolved packet core network receives a first update request from a second device associated with the evolved packet core network. The first update request is associated with a communication session previously provided between the first device and the second device, and the first update request is generated based on a voice/video request. The first device generates an update answer in response to the first update request, where the update answer includes a code requesting that the communication session be restored between the first device and the second device. The first device receives, based on the code, a second update request from the second device, where the second update request includes session information associated with the communication session. The first device restores, based on the session information, the communication session between the first device and the second device to create a restored communication session. | 02-26-2015 |
20150049865 | LINE SEIZURE IN AN ALARM SYSTEM HAVING AN ALARM SIGNAL PROCESSING DEVICE - A system and method of seizing a landline is disclosed. In seizing the landline, a first device may identify that a switch has been toggled by a second device; receive an alarm signal from the second device via a landline based on identifying that the switch has been toggled; determine a particular processing instruction, of one or more processing instructions, based on information included in the alarm signal; and execute the particular processing instruction to provide the alarm signal to a third device. | 02-19-2015 |
20150049754 | TELEPHONY ENABLED INFORMATION EXCHANGE - Systems and methods for IMS telephony enabled information exchange are disclosed. In some implementations, a transfer request to transfer a file from a first user to a second user is received at a IMS gateway and during an ongoing telephone call established between a first device associated with the first user and a second device associated with the second user. The second user on the ongoing telephone call is identified at the IMS gateway. Upon identifying the second user and responsive to the transfer request, the file is transferred from the first user to the second user. | 02-19-2015 |
20150046578 | MOBILE TROUBLE TICKET - A device is configured to determine that the device is experiencing a problem, and to determine a problem type associated with the problem. The device is configured to determine a set of questions, based on the problem type, and to provide the set of questions to a user of the device. The device is configured to receive user input including responses to the set of questions. The device is configured to determine device information associated with one or more hardware components, hardware attributes, or software attributes associated with the user device. The device is configured to generate a trouble ticket based on the set of questions, the user input and the device information, and to transmit the trouble ticket. | 02-12-2015 |
20150046228 | SYSTEM FOR AND METHOD FOR COMMISSION AND KPI TRACKER AGGREGATION AND CONTEXTUALIZATION - Exemplary embodiments provide a tool that aggregates data from multiple database sources and application programming interfaces. The tool takes the data collected from the sources and applies one or more pre-defined formulas to the data in order to execute enhanced performance calculations. The tool may receive updated data from the sources at defined intervals. Certain data may be provided in real time. The updated data and/or real time data can be used to refine the calculations and provide updated calculations. | 02-12-2015 |
20150040162 | DYNAMIC SPLITTING OF EVOLVED MULTICAST BROADCAST MULTIMEDIA SERVICE (EMBMS) - A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth. | 02-05-2015 |
20150039902 | DIGEST OBFUSCATION FOR DATA CRYPTOGRAPHY - Execution of an obfuscation application may cause a computing device to translate bits of a hashed value according to a sparse bit selection pattern, the sparse bit pattern including a translation of bits of the hashed value into reordered bit unit groupings sized according to a numeric base of a digit cypher; and generate an obfuscated value using the translated bit unit groupings of the hashed value as indices into the digit cypher, the digit cypher including a mapping of the indices to output values in the numeric base. The obfuscation application may further cause the device to receive a target value to be obfuscated in data records received from a data source, hash the target value using a hashing module to create the hashed value, in some cases truncate the hashed value, and replace the target value in the data records with the obfuscated value. | 02-05-2015 |
20150038110 | RESOURCE-BASED BILLING AND MONITORING FOR M2M - A device may obtain resource utilization data associated with a machine-to-machine device. The resource utilization data may include information identifying a quantity of data transmitted by the machine-to-machine device during a particular period of time, and an amount of network resources utilized by the machine-to-machine device during the particular period of time. The device may determine a billing metric based on the quantity of data and the amount of network resources utilized by the machine-to-machine device. The device may determine, based on the billing metric, a cost associated with the amount of network resources utilized by the machine-to-machine device. The device may charge the fee associated with the utilization of the network resources by the machine-to-machine device to an account of a subscriber associated with the machine-to-machine device. | 02-05-2015 |
20150038098 | FILTERING INTERFERENCE IN WIRELESS NETWORKS - A first device may receive a parameter to identify interference associated with a frequency; identify the frequency based on the parameter; filter signals associated with the frequency to prevent a second device from receiving the signals associated with the frequency; and provide information identifying the frequency to the second device to cause the second device to prevent a data flow from being assigned to the frequency. | 02-05-2015 |
20150037040 | MULTIPLE WIRELESS CONNECTIVITY HUB - A hub device detects, using a plurality of different wireless communication interfaces, the presence of a plurality of different wireless devices, wherein, initially, each of the plurality of different wireless devices implements an unknown type of wireless connectivity. The hub device detects a type of wireless connectivity, of a plurality of different types of wireless connectivity, for each of the plurality of different wireless devices whose presence is detected, and causes a connection to be established to the plurality of different wireless devices, via selected ones of the plurality of different wireless communication interfaces, based on the type of wireless connectivity detected for each of the plurality of different wireless devices. The hub device forwards data received from one of the plurality of different wireless devices to another of the plurality of different wireless devices using two different ones of the plurality of different types of wireless connectivity. | 02-05-2015 |
20150036928 | METHODS AND SYSTEMS FOR INITIATING ACTIONS ACROSS COMMUNICATION NETWORKS USING HAND-WRITTEN COMMANDS - A method and system for providing hand-written command processing includes a network-connected application server receiving from a user device data storing hand-written information. The hand-written information is processed to identify one or more hand-written characters included in the data. A determination is made as to whether the identified characters include a command for initiating an action across the communication network. Upon determining that the characters include a command, the application server automatically performs the action identified by the command across the communication network. The action can include generating and sending a messaging service message or an e-mail, creating a scheduled reminder, creating and storing a checklist or note, or retrieving a previously stored checklist or note, based on information included in the hand-written characters. The user device may be a tablet-type user device. | 02-05-2015 |
20150036494 | GROUPED MULTICAST/BROADCAST SINGLE FREQUENCY NETWORK (MBSFN) SPLITTING - A reporting server receives reports on content items being accessed by a plurality of UE devices through a first multicast/broadcast single frequency network (MBSFN). The reporting server determines, for each content item being accessed, which of the UE devices is accessing the content item. The UE devices are then grouped by the accessed content items such that at least one content item is accessed by a first group of UE devices and not accessed by a second group of UE devices. The reporting server then sends data representing the first and second groups to a broadcast video provisioning system (BVPS) with a recommendation to split the MBSFN into second and third MBSFNs. In another implementation, the reporting server receives reports from fourth and fifth MBSFNs and recommends joining the fourth and fifth MBSFNs to form a sixth MBSFN if broadcast bandwidth requirements are met. | 02-05-2015 |
20150035645 | MOBILE DEVICE SECURITY - Systems and methods for providing mobile device security are disclosed. In some implementations, a request for access to a security mechanism is received at a user terminal. A short-range radio connection of the user terminal at a time of receiving the request for access is identified responsive to the request. A memory of the user terminal is accessed to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection. Upon determining that the radio connection corresponds to the user-identified secure radio connection, the user is granted access to the security mechanism without soliciting the user of the user terminal for a predetermined security input. Upon determining that the radio connection does not correspond to the user-identified secure radio connection, the user is solicited for the predetermined security input. | 02-05-2015 |
20150033289 | ADAPTIVE AND CONTEXT BASED NFC ACCESS CONTROL FILTERING - A mobile device includes a transceiver for performing wireless communication; one or more secure elements which execute applications in a secure environment; a near field communication system for performing wireless communication independent of the transceiver and at a lower amount of power than said transceiver; and a contactless front end included in the near field communications system for receiving a data message from a near field communication device. The contactless front end includes a filter list for evaluating the data message and for controlling whether each data message is transmitted further into the mobile device. | 01-29-2015 |
20150031327 | CELL DEVICE PLANNING TOOL - A device is configured to receive signal information and demand information associated with a set of cell devices in a network. The device is configured to determine time usage information, based on the signal information and based on the demand information, and to provide the time usage information. The device is configured to determine a proposed cell device, for the network, based on the time usage information, and to determine modified signal information based on the proposed cell device and based on the signal information. The device is configured to determine modified time usage information based on the modified signal information, and to provide the modified time usage information. | 01-29-2015 |
20150026330 | GENERATING UNIQUE IDENTIFIERS FOR MOBILE DEVICES - Systems and methods for generating unique identifiers for devices are disclosed. In some implementations, a set of characteristics of a device is received. The set of characteristics identifies an operating system (OS) and a manufacturer of the device. Whether the set of characteristics also includes a first identifier of the device is determined. The first identifier uniquely identifies the device among devices of a same OS and a same manufacturer as the device. Upon determining the set of characteristics includes the first identifier, a unique ID for the device is generated based on the OS of the device, the manufacturer of the device, and the first identifier. Upon determining the set of characteristics lacks the first identifier, a second identifier associated with the device is received. The unique ID is generated based on the OS of the device, the manufacturer of the device, and the second identifier. | 01-22-2015 |
20150023170 | TRAFFIC MEASUREMENT SYSTEM FOR WIRELESS SERVICE PROVIDERS - A device receives packet information associated with a traffic flow and a network segment. The network segment includes a portion of a network via which the traffic flow is transmitted. The device associates the received packet information with a period of time. The device determines that the period of time has expired, and aggregates the received packet information based on determining that the period of time has expired. The device determines a network performance parameter associated with the traffic flow over the network segment based on the aggregated packet information. The device generates performance information that identifies the network performance parameter, the traffic flow, and the network segment. The device provides the performance information. | 01-22-2015 |
20140361735 | SELF OPTIMIZING ANTENNA FOR NFC AND WIRELESS CHARGING - A charging system may include a charging apparatus having a controller and a power transmitter. The controller may be configured to determine a device position relative to the controller based on at least one signal received from the device. The controller may also be configured to determine whether the device position is at an optimal position, and provide feedback indicative of the device position. | 12-11-2014 |
20140351099 | MOBILE DEVICE M2M GATEWAY - A device may determine an occurrence of a user interaction. The device may obtain information associated with the user interaction. The device may detect a mobile device transmitting a particular identifier. The mobile device may be associated with the user interaction. The device may establish a connection with the mobile device based on the particular identifier. The device may transmit the information associated with the user interaction to the mobile device to cause the mobile device to transmit the information associated with the user interaction to a server device associated with the device. | 11-27-2014 |
20140351075 | KIOSK FOR DISPENSING AND ACTIVATING USER DEVICES - A device may determine device information associated with a user device housed within a kiosk. The device information may identify the user device. The device may dispense the user device based on the device information. The device may receive an indication that the user device is to be purchased. The device may receive subscription information associated with the purchaser of the user device, based on receiving the indication. The device may provide activation information that permits the user device to be activated on a network. The activation information may be based on the subscription information. | 11-27-2014 |
20140350840 | CROWD PROXIMITY DEVICE - A device is configured to determine that a first user device and a second user device are associated with an event and determine a first user device location indicating a location of the first user device and a second user device location indicating a location of the second user device. The device is configured to determine a relationship between the first user device location and the second user device location and determine first event information and second event information based on the relationship, where the first event information and the second event information is associated with the event, and the first event information is different from the second event information. The device is configured to provide the first event information to the first user device and provide the second event information to the second user device. | 11-27-2014 |
20140349683 | DEVICE FOR MAPPING PHYSICAL WORLD WITH VIRTUAL INFORMATION - A device is configured to determine a geographic location of a user device and determine, based on the geographic location of the user device, that the user device is within a threshold distance of a structure that includes a quantity of objects. The device is configured to receive, from the user device, an image of an object of the quantity of objects, and analyze, based on receiving the image of the object and based on the user device being within the threshold distance of the structure, the image to identify the object. The device is configured to receive user information associated with the user device, determine, based on the user information, object information associated with the object; and provide the object information for display on the user device. | 11-27-2014 |
20140349609 | NETWORK DEVICE ACCESS ID ASSIGNMENT AND MANAGEMENT - One or more devices may receive an instruction to generate an index for a customer associated with a base station and may generate the index based on receiving the instruction. The index may include one or more spaces to store a corresponding one or more access identifiers (IDs) used to allow a user device to connect to the base station. The one or more devices may receive an instruction to add an access ID to the index; generate the access ID based on a format of the access ID, a customer type, a customer ID, or a space ID; store the access ID in one of the one or more spaces of the index; and provide the access ID to the user device and the base station. The access ID may permit the user device to connect to the base station to access a network via the base station. | 11-27-2014 |
20140348008 | IDENTIFYING BASE STATION TYPES - One or more devices may receive information that identifies a format of an identifier of a network device. The format of the identifier may indicate a portion of the identifier that identifies a type of the network device. The one or more devices may receive the identifier of the network device based on a user device connecting with the network device to communicate via the network device; determine the type of the network device connected to the user device based on the portion of the identifier and a format of the identifier that identifies the type of network device; and execute a processing instruction based on the type of network device connected to the user device. | 11-27-2014 |
20140344139 | PROCESSING ANALYTICS DATA RECEIVED BY SENSOR DEVICES - One or more devices may receive multiple data records from a sensor device when the sensor device receives an indication from a network device, associated with a service provider network, to provide the multiple data records via the service provider network. Each of the multiple data records may include analytics data collected by the sensor device. The one or more devices may store the multiple data records; receive, from a client device, a data request for one or more of the multiple data records meeting particular criteria; form, based on receiving the data request, processed data including the one or more of the multiple data records meeting the particular criteria; and provide the processed data to the client device. | 11-20-2014 |
20140344041 | TRIGGERED MOBILE CHECKOUT APPLICATION - A device may determine that a user device has detected an event that triggers the user device to execute a mobile checkout application associated with a retail store. The device may provide, to the user device, information that identifies a promotion associated with an item at the retail store. The device may receive, from the user device, item information that identifies the item. The device may provide, to the user device, checkout information associated with purchasing the item. The checkout information may be based on the item information and the promotion. The device may store the checkout information associated with the retail store. The device may store an association between the checkout information and other checkout information associated with the user device and another retail store. | 11-20-2014 |
20140342731 | ROAMING POLICY AWARE DEVICE CAPABILITIES - A user device may receive roaming policy information. The roaming policy information may identify a roaming network and one or more services available to the user device via the roaming network. The user device may determine that the user device is to connect to the roaming network. The user device may determine a service, of the one or more services, to be provided to the user device via the roaming network. The determination may be based on the roaming policy information. The user device may provide, to a network device associated with the roaming network, information identifying the service to be provided via the roaming network, based on determining that the user device is to connect to the roaming network. | 11-20-2014 |
20140337177 | ASSOCIATING ANALYTICS DATA WITH AN IMAGE - A device and method of capturing one or more images and determining associated interest information are provided. After receiving a data input, an item is identified based on the data input. Subsequently, an instruction to capture an image of the item is received and the image of the item is captured in response thereto. An interest level of the item is measured based on a quantity of times that the image of the item is captured and the interest information is then provided to a server device. The interest information may be used to identify an interest level trend of the item, and/or create or update a user profile that stores information regarding the item. | 11-13-2014 |
20140335815 | POLICY DECISIONS BASED ON SUBSCRIBER SPENDING LIMITS - A policy and charging rules function node of a network may receive from the network an indication of an element of user equipment connecting to the network, query a subscription profile repository to receive a subscriber profile associated with the user equipment, the subscriber profile including indicators used in the selection of subscriber policies associated with the subscriber, and create a spending limit session based on the subscriber profile without waiting to receive a request from the user equipment for data services. The node may receive the request for data services from the element of user equipment, identify the spending limit session specifically corresponding to the user equipment, and respond to the request according to spending limit rules of the spending limit session associated with the element of user equipment. The node may also respond to the request according to default spending limit rules without waiting for creation of the spending limit session. | 11-13-2014 |
20140329548 | TEXT MESSAGE LOCATION TRACKING USING COMET TRAIL REPRESENTING SPEED AND DIRECTION - A first mobile device may receive, via a text messaging application, first location information from a second mobile device. The first location information may indicate a first geographic location of the second mobile device. The first mobile device may receive, via the text messaging application, second location information from the second mobile device. The second location information may indicate a second geographic location of the second mobile device. The first mobile device may generate, based on the first location information and the second location information, a graphical representation. The graphical representation may represent a movement of the second mobile device from the first geographic location to the second geographic location. The first mobile device may provide the graphical representation for display via a display associated with the first mobile device. | 11-06-2014 |
20140327523 | STORING AND RETRIEVING ELECTRONIC DEVICE INFORMATION - An electronic device includes a processor, a memory, an embedded element storing information, and a short-range radio controller. The embedded element is readable by an external reader. The short-range radio controller is configured to receive a radio communication. If the short-range radio controller is being powered by a primary battery that powers the processor, the short-range radio controller is configured to route the radio communication to the embedded element if the radio communication is for accessing the embedded element, or route the radio communication to a component of the electronic device different from the embedded element if the radio communication is not for accessing the embedded element. If the short-range radio controller is not being powered by the primary battery, the short-range radio controller is configured to route the radio communication to the embedded element. | 11-06-2014 |
20140325025 | PROVIDING UNIQUE IDENTIFIERS VIA A USER DEVICE - A user device may receive a request for content; provide the request to a first server; receive an instruction based on providing the request for content; and provide a message to a second server based on receiving the instruction. The message may cause the second server to embed a unique identifier (ID) of the user device in the message to form a modified message for transmission to a third server. The modified message may cause the third server to form an object having the unique ID. The user device may receive the object based on providing the message to the second server; provide the object to the first server or to a fourth server; and receive, from the first server or the fourth server, particular content based on providing the object to the first server or the fourth server. The particular content may be based on the unique ID. | 10-30-2014 |