H04M15/10

ALLOCATING EXPENSE OF DATA TRANSFERS BETWEEN PARTICIPANTS
20170099394 · 2017-04-06 ·

There are provided systems and methods for allocating expense of data transfers between participants. An initiating endpoint may request to establish a voice data transfer with a receiving endpoint. A payment provider may receive data transfer information associated with the voice data transfer, which may include identifiers for the endpoints or users for their respective endpoints, as well as information used to determine a cost associated with the voice data transfer. The data transfer may also be a text or other data transfer. The payment provider may determine an endpoint initially assigned responsibility for payment of the voice data transfer by a service provider. The payment provider may receive a request from the endpoint initially responsible for payment to allocate at least a portion of the cost to the other endpoint. If the request is accepted, the payment provider may provide payment to the service provider or between the endpoints.

METHOD OF DETERRING UNSOLICITED TELEPHONE CALLS
20250080657 · 2025-03-06 ·

The present disclosure relates in general to tools and techniques for deterring or blocking unsolicited telephone calls which includes searching and determining that the originating telephone number is in phone directory/phone book/contact list of the called party, and based on this determination, connecting the calling party to the called party if the originating telephone number is present in the phone directory/phone book/contact list. The method further comprises disconnecting the call, in case the calling party cannot be charged. The calling party may optionally be informed through a text message that their call could not be connected without payment of charges as the call to the called party is chargeable.

METHOD FOR RESOURCE RESERVATION EXECUTED BY A NETWORK ELEMENT OF A MOBILE COMMUNICATION NETWORK FOR A COMMUNICATION CONNECTION BETWEEN A MOBILE DEVICE AND A COMMUNICATION DESTINATION
20170048755 · 2017-02-16 ·

A method for resource reservation executed by a network element of a mobile communication network for a communication connection between a mobile device and a communication destination includes: receiving a request for establishing the communication connection between the mobile device and the communication destination originating from an application of the mobile device; determining the type of application requesting the communication connection between the mobile device and the communication destination; estimating the required Quality of Service (QoS) for the requested communication connection with respect to the upload and/or download requirements under consideration of the type of application requesting the communication connection between the mobile device and the communication destination; checking whether the communication connection between the mobile device and the communication destination can provide the estimated required QoS; and reserving if possible the resources for the communication connection between the mobile device and the communication destination to provide the required QoS.

METHOD FOR RESOURCE RESERVATION EXECUTED BY A NETWORK ELEMENT OF A MOBILE COMMUNICATION NETWORK FOR A COMMUNICATION CONNECTION BETWEEN A MOBILE DEVICE AND A COMMUNICATION DESTINATION
20170048755 · 2017-02-16 ·

A method for resource reservation executed by a network element of a mobile communication network for a communication connection between a mobile device and a communication destination includes: receiving a request for establishing the communication connection between the mobile device and the communication destination originating from an application of the mobile device; determining the type of application requesting the communication connection between the mobile device and the communication destination; estimating the required Quality of Service (QoS) for the requested communication connection with respect to the upload and/or download requirements under consideration of the type of application requesting the communication connection between the mobile device and the communication destination; checking whether the communication connection between the mobile device and the communication destination can provide the estimated required QoS; and reserving if possible the resources for the communication connection between the mobile device and the communication destination to provide the required QoS.

Fee re-rating for a wireless carrier network
12401973 · 2025-08-26 · ·

A business logic used to generate call details records (CDRs) for a plurality of subscribers by a wireless carrier network is imported. A selection of one or more data collector applications that are listed in the business logic is received and one or more configuration parameters in the business logic are updated based on one or more inputted parameter updates. A selection of one or more CDR distributor applications listed in the business logic is also received. A particular set of CDRs in the specific group of CDRs is further selected based on one or more inputted selection parameters. Reprocessed CDRs that correspond to the particular set of CDRs are generated according to at least the one or more updated configuration parameters in the business logic and sent to the one or more billing systems via the one or more CDR distributor applications to trigger recalculation of service fees.

Fee re-rating for a wireless carrier network
12401973 · 2025-08-26 · ·

A business logic used to generate call details records (CDRs) for a plurality of subscribers by a wireless carrier network is imported. A selection of one or more data collector applications that are listed in the business logic is received and one or more configuration parameters in the business logic are updated based on one or more inputted parameter updates. A selection of one or more CDR distributor applications listed in the business logic is also received. A particular set of CDRs in the specific group of CDRs is further selected based on one or more inputted selection parameters. Reprocessed CDRs that correspond to the particular set of CDRs are generated according to at least the one or more updated configuration parameters in the business logic and sent to the one or more billing systems via the one or more CDR distributor applications to trigger recalculation of service fees.

System and Method of deterring unsolicited telephone calls
20250385971 · 2025-12-18 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.

System and Method of deterring unsolicited telephone calls
20250385971 · 2025-12-18 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.

System and method of deterring unsolicited telephone calls
12549671 · 2026-02-10 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.

System and method of deterring unsolicited telephone calls
12549671 · 2026-02-10 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.