NEW JERSEY, United States
NEW JERSEY, United States

Cellco Partnership doing business as Verizon Wireless, , is a wholly owned subsidiary of Verizon Communications. Verizon Wireless provides wireless services to 125.3 million subscribers. It is the largest wireless telecommunications provider in the United States.Headquartered in Basking Ridge, New Jersey, the company was originally a joint venture of American telecommunications firm Bell Atlantic, which would soon become Verizon Communications, and global British telecommunications company Vodafone.Verizon Wireless' slogan is "That's Powerful", a slogan that is also used in other Verizon assets. Wikipedia.


Time filter

Source Type

Patent
Verizon Wireless | Date: 2016-12-16

Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between headsets worn by the user and the user devices. As information passes from the headset toward a corresponding user device, an encryption relay device may encrypt the information before the information reaches the user device so that the user device transmits encrypted call information to the other user participating in the call. When encrypted information is received, and travels from the user device to the headset, the encryption relay device may decrypt the information before it reaches the headset. Thus, the techniques described herein provide an end-to-end encryption solution to telephone calls.


A device may receive an identifier for a subscriber of a first network. The subscriber may be associated with the device. The device may store the identifier and receive a request for content. The device may generate a modified request by adding the identifier to the request. The device may send the modified request using a network communication. The network communication may communicate via a second network without using the first network, and the first network may be different than the second network. The device may receive the content and targeted content based on the modified request. The targeted content may be targeted to the subscriber based on the identifier.


Patent
Verizon Wireless | Date: 2016-10-10

An approach for automatically securing a public wireless network is disclosed. A VPN connection platform maintains a list of available trusted wireless access identifiers to connect to a public wireless network from a mobile device. The trusted wireless access identifiers are provided to an application associated with the mobile device that selectively initiates a virtual private connection when the mobile device cannot utilize any one of the trusted wireless access identifiers.


Patent
Verizon Wireless | Date: 2016-12-12

Network devices receive configuration settings for a portable data account with a service provider. The portable data account provides for mobile data over a broadband cellular network. The network devices receive, via a mobile device, user credentials, for a user, to activate a portable data service for the mobile device. The network devices determine that the user credentials correspond to the portable data account, the portable data account being different than a default account associated with the mobile device. The network devices map a temporary mobile directory number (MDN), which is associated with the portable data account, to a unique identifier for the mobile device, and enforce the configuration settings for a portable data session, associated with the temporary MDN, for the portable data account. The network devices log mobile data, used by the mobile device, for the portable data session and create a billing record for the portable data session, the billing record being based on the logging and associated with the portable data account.


Patent
Verizon Patent and Licensing Inc. | Date: 2017-02-07

A system may be configured to allow for network-based authentication of a user device, which may reduce or eliminate the need for a user to provide credentials. The authentication may be performed when the user device attempts to access content provided by a third party content provider. The network-based authentication may be performed by, or in conjunction with, a device that (a) is associated with the same telecommunications network as the user device, and (b) can authenticate the identity of the user device.


A customer is provided with a personalized retail experience using a retail kiosk or mobile device that is enabled for near-field communication (NFC). The kiosk is provided with customer identifying information through an NFC-based communication with a customers user device. The kiosk authenticates the customer based on the identifying information, retrieves retail information associated with the customer from a back-end server, and provides the personalized retail experience using the retrieved information. In one example, the personalized retail experience is provided based on customer-input received through an NFC reader of the kiosk. Also, the mobile device can be provided with a retail store identifier through an NFC-based communication link with an NFC tag for the store. The personalized retail experience can then be provided through the mobile device based on retail information for the retail store that is retrieved by the mobile device based on the identifier obtained through NFC.


Patent
Verizon Patent and Licensing Inc. | Date: 2015-11-30

A method, a device, and a non-transitory storage medium having instructions to receive data and first channel information pertaining to a transmission of the data; store first constellation data and demodulate the data; determine whether any error exists pertaining to the data; receive retransmitted data and second channel information when an error exists; demodulate the retransmitted data; calculate error vector magnitude data; generate corrective constellation data based on the error vector magnitude data, the first channel information, and the second channel information, wherein the corrective constellation data includes at least one reference constellation point that is repositioned on a constellation plane relative to at least one corresponding reference constellation point of a default constellation data; and use the corrective constellation data when demodulating additional data that is subsequently received.


Patent
Verizon Patent and Licensing Inc. | Date: 2015-11-30

Techniques described herein may allow for information, regarding neighboring cells, to be used in interference cancellation techniques in a carrier aggregation environment. A serving base station (or cell) may provide information, regarding neighboring cells that operate at a primary component carrier and one or more secondary component carriers, to a user device that employs carrier aggregation. The user device may use the information, regarding the neighboring cells, to filter interference, caused by the neighboring cells, at the primary component carrier and the secondary component carrier(s).


Patent
Verizon Patent and Licensing Inc. | Date: 2015-11-30

A status of an Internet of Things (IoT) device included in a local area cloud is identified. The local area cloud includes IoT devices that are connected in a wireless local area network (WLAN), and one IoT device functions as a leader of the local area cloud. A cloud server associated with the IoT device is identified and information identifying the status is forwarded to the cloud server via a wireless wide area network (WWAN). The cloud server selects an action to be performed by the IoT device and forwards data identifying the action. The leader receives and distributes information identifying the action to the IoT device via the local area cloud. The action may include actions by multiple IoT devices in the local area cloud or IoT devices included in multiple local area clouds. A user may input data to control the cloud server.


Patent
Verizon Patent and Licensing Inc. | Date: 2017-02-10

A computer initializes a configuration specified in an extensible markup language (XML) configuration file. The XML configuration file specifies at least one data source, a dimension to map each item of a plurality of items that include products, product accessories, or product support documents in the at least one data source, and a display priority for each item. Next, the computer reads data from the at least one data source specified in the configuration file. The computer generates an XML dimension hierarchy file for the read data using the configuration file. The XML dimension hierarchy file includes a dimension node for each item. Each dimension node has at least one property attached to each item and at least one synonym that is searchable to index each item. Finally, the computer preprocesses the XML dimension hierarchy file to index the at least one data source.

Loading Verizon Wireless collaborators
Loading Verizon Wireless collaborators