H04M15/39

Techniques to transform network resource requests to zero rated network requests

Techniques to transform network resource requests to zero rated network requests are described. Some embodiments are particularly directed to techniques transform network resource requests on a cellular network to zero rating by replacing the destination of the request with a zero-rated source for the network resource. In one embodiment, for example, an apparatus may comprise a data store and a network access component. The data store may be operative to store a plurality of zero-rating rewrite rules. The network access component may be operative to receive a network request from an application component on the mobile device, the network request for access to a network resource; compare the network resource to the plurality of zero-rating rewrite rules to identify a zero-rating rewrite rule matching the network resource; transform the network request to a zero-rated network request for the network resource using the identified zero-rating rewrite rule; and perform the zero-rated network request. Other embodiments are described and claimed.

METHOD AND SYSTEM FOR PROVIDING ADVERTISEMENTS TO A MOBILE DEVICE
20170055143 · 2017-02-23 ·

A system for providing advertisements to a wireless user device (WUD) includes a (WUD), a carrier server (CS), and a business entity server (BES). The WUD includes a graphical user interface for rendering options and receiving a selection of an option. The WUD includes a processor for executing computer program instructions (CPI) and transmitting the selection as data to a CS via a communications network. The CS comprises a non-transitory computer readable storage medium (NCRSM) for storing CPI defined by modules of the system. The processor is communicatively coupled to the NCRSM to execute the CPI. A data communications module (DCM) receives the selection. An analysis module dynamically analyzes the selection and generates data variables. The DCM transmits the generated data variables and information to the BES and the WUD via the communications network. The WUD displays advertisements of a business entity and receives free wireless service.

Transmission of Location and Directional Information Associated With Mobile Communication Devices
20170048675 · 2017-02-16 · ·

A method and arrangement for providing location information of a called mobile communication device to a calling party are implemented through a mobile device locator platform disposed in the communication network. A mobile device subscriber to the location service initiates a process where the location of his mobile device is updated on a regular basis and the location information stored in a database on the platform. When a call is placed to his subscribed device, the location information is transmitted to the calling party prior to setting up the call to the called device, allowing the calling party to determine whether or not to proceed with the call, as well as eliminating the need to ask the common question where are you? when placing a call to a mobile device.

Packet-switched core network architecture for voice services on second- and third-generation wireless access networks

Communications systems and methods with an evolved packet-switched core network architecture to enable voice services on second- and third-generation wireless access networks. The systems and methods permit unmodified 2G and 3G mobile devices to conduct voice calls using conventional circuit-switched user-plane and control-plane protocols at the air interface while the voice calls are switched at the back-end using a packet-switched core network. The system may include a translation module at a controller component that is configured to provide both user-plane and control-plane translation functions between an unmodified 2G/3G mobile device that utilizes circuit-switched protocols for a voice call and the packet-switched core network that utilizes packet-switched protocols to switch the voice call.

Detection and blocking of cloned mobile devices

A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.

Method and apparatus for information exchange in online charging
12388933 · 2025-08-12 · ·

A method and an apparatus for information exchange in online charging in order to reduce frequency of information exchange between a Charging Trigger Function (CTF) device and an Online Charging System (OCS), and reduce a pressure of information transmission between the CTF device and the OCS, where the method includes receiving, by a CTF device, a credit control answer (CCA) message that carries a non-real-time Trigger and sent by an OCS, recording, by the CTF device, charging information before and after a corresponding event of the non-real-time Trigger happens each time before sending a credit control request (CCR) message to the OCS next time, and sending, by the CTF device, the CCR message to the OCS.

Information processing apparatus, information processing system, information processing method, and non-transitory computer-readable medium
12495467 · 2025-12-09 · ·

An information processing apparatus (1) includes: an acquisition unit (11) that acquires information regarding a position of each of a plurality of communication terminals connected to a network; a first identification unit (12) that identifies a communication terminal located in a disaster region among the plurality of communication terminals as a first disaster response terminal based on an acquisition result; a second identification unit (13) that identifies a second disaster response terminal communicating with the first disaster response terminal based on a communication record; and a charging unit (14) that generates charging data for communication such that charging is not performed for communication from the first disaster response terminal and the second disaster response terminal.

Methods, network function nodes and computer readable media for event report management

Methods for event report management in a network comprising a set of NF nodes, and corresponding NF nodes. The A method is implemented at a first NF node for providing an event exposure service for a User Equipment, UE, to a second NF node which subscribes the event exposure service includes starting a report mute guard timer upon receiving a first presence status report for the UE from a third NF node. The method includes avoiding a transmission of an event report to the second NF node while the report mute timer is running and transmitting an event report corresponding to a latest presence status report received during the running of the report mute guard timer to the second NF node when the report mute guard timer expires. The present disclosure further provides corresponding NF nodes and computer readable medium.