Patent classifications
H04M15/00
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS
The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.
SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS
A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
Method for minimizing financial risk for wireless services
A method and system for managing financial risk through the use of postpaid processing during use of wireless services is presented within the scope of the following invention. The present invention uses credit card authorization to pre-reserve credit card funds for wireless services in excess of planned usage. Authorizations eliminate the credit risk associated with overages and payment timing, and also maintain a customer experience identical to postpaid processing. The authorizations are invisible to the customer and no charge is brought to a customer's credit card until the monthly bill is settled. Separating the authorization and settlement stages of retail wireless payment processing allows the branded wireless provider to avoid inherent areas of credit risk during the tenure of a customer's wireless service, while maintaining a familiar customer experience.
Method for updating policy information, network device and terminal device
Provided are a wireless communication method, a network device and a terminal device. The method includes: after acquiring a PSI parameter of a terminal device, a first network device determines whether to update policy information of the terminal device, wherein the PSI parameter is used for identifying a part of policy information for the terminal device under a subscribed user. In an implementation of the present disclosure, after acquiring a Policy Section Identifier (PSI) parameter of a terminal device, a first network device directly determines whether to update policy information of the terminal device.
Adapting network policies based on device service processor configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Adapting network policies based on device service processor configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Apparatus and method for using an intelligent network for analyzing an event external to a signaling network
A system and method in an intelligent network are provided for analyzing an event external to the intelligent network. A set of intelligent network subscribers is selected in a selected geographic area. Next, signal message data is obtained from a signaling network in the intelligent network, wherein the signal message data indicates status of subscribers in the set of intelligent network subscribers. External data related to the selected geographic area is obtained, wherein the external data is external to the intelligent network. The signal message data and the external data are then fused to produce synthetic data. In response to the synthetic data, an alert of an external event is produced. The alert can be graphically represented on a display.
Policy charging control and session management interaction method, apparatus, and system
A policy control method, an apparatus, and a system, where the method includes: receiving, by a session management network element, a first message from a terminal device, where the first message includes a quality of service (QoS) rule identifier and a first operation indication; sending, by the session management network element, a second message to a policy control network element, where the second message includes a policy and charging control (PCC) rule identifier corresponding to the QoS rule identifier and a second operation indication corresponding to the first operation indication; and receiving, by the policy control network element, the second message, and performing, by the policy control network element on a PCC rule corresponding to the PCC rule identifier, a second operation indicated by the second operation indication.
Method and apparatus for collecting network data
Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.
Virtual network function management
Embodiments of the present disclosure relate to methods, apparatuses and computer readable mediums for Virtual Network Function (VNF) management. In example embodiments, there is provided a method of managing a VNF. The method includes sending, from a VNF manager to a charging component, at least one request for charging information associated with at least one VNF. The VNF manager manages the at least one VNF. The charging information indicates respective rates for charging the at least one VNF under different network conditions. The method further includes, in response to receiving the charging information, managing lifecycle of the at least one VNF at least in part based on the charging information.