Patent classifications
H04M15/39
Method and apparatus for modifying charging mode, mobile terminal, and network side device
A method and an apparatus for modifying a charging mode, a mobile terminal and a network side device are provided in the present disclosure. The method includes: transmitting a signaling message containing information of modifying roles of current calling and called parties or modifying a charging mode to a network side, after receiving a signaling message containing calling information; and receiving a signaling message transmitted by the network side that contains information that the roles of the current calling and called parties are modified, or the charging mode is modified. In the present disclosure, calling and called parties can be modified in real time through network, which is convenient to operate, and can save network signaling overhead and can avoid a current call being interrupted by the network side due to insufficient tariffs of a current calling party.
POLICING OF PACKET SWITCHED SERVICES
A method, computer program product, user equipment (UE) and packet data network gateway (P-GW) are provided for activating Data Off services using protocol configuration options (PCO). The UE sends a first indication to a first network node as part of the PCO. The first indication includes a Data Off indication indicating whether a Data Off service is activated. The first network node may be a P-GW. If the Data Off indication indicates that the Data Off service is deactivated, the UE receives downlink data from the first network node. If the Data Off indication indicates that the Data Off service is activated, the UE either receives no downlink data from the first network node or receives an error message from the first network node.
DETECTION AND BLOCKING OF CLONED MOBILE DEVICES
A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.
CONTROL OF START AND STOP OF PAUSE OF CHARGING IN A WIRELESS NETWORK
A method, system and apparatus are disclosed. According to one or more embodiments, a control plane node is provided. The control plane node includes processing circuitry configured to: determine to one of pause and resume a usage measurement; and cause transmission, to a user plane node, of a request indicating to one of pause and resume the usage measurement for a plurality of Usage Reporting Rules, URRs, based on the determination.
Device and Method for Implementing Data Service
A device and a method for implementing a data service in order to avoid generating an unnecessary data usage fee for user equipment (UE) and further avoid data usage waste after a data service switch of the UE is turned off. The method includes determining, by a first network-side device, a status of a data service switch of UE, and sending, by the first network-side device, a first notification message to a second network-side device when the data service switch of the UE is turned off, where the UE is already registered with a network, the first notification message includes first instruction information and an identity of the UE, and the first instruction information instructs the second network-side device to skip charging for data packets of the UE flowing through the second network-side device.
Blocked device checking in roaming scenarios
In certain cellular communication systems, a roaming communication device may attempt to establish a connection with a visited wireless communication network. Before allowing the connection, the visited network may check to see whether the International Mobile Equipment Identity (IMEI) of the device has been listed in an Equipment Identity Register (EIR) as being blocked, and may refuse the connection if the IMEI is listed as being blocked. In addition, when the home network of the device receives a request to authorize usage of the device, the home network may also check its own EIR to determine whether the IMEI has been blocked. If the IMEI has been blocked in the EIR of the home network, the home network indicates to the visited network that the connection should be refused.
Packet-switched core network architecture for voice services on second- and third-generation wireless access networks
Communications systems and methods with an evolved packet-switched core network architecture to enable voice services on second- and third-generation wireless access networks. The systems and methods permit unmodified 2G and 3G mobile devices to conduct voice calls using conventional circuit-switched user-plane and control-plane protocols at the air interface while the voice calls are switched at the back-end using a packet-switched core network. The system may include a translation module at a controller component that is configured to provide both user-plane and control-plane translation functions between an unmodified 2G/3G mobile device that utilizes circuit-switched protocols for a voice call and the packet-switched core network that utilizes packet-switched protocols to switch the voice call.
Method and system to control expense and usage of subscriptions in a mobile device
A system to control usage of a subscription in a mobile device comprising: a plurality of subscriptions of at least two or more mobile networks; a subscription profile associated with each subscription; a UICC/eUICC/USIM/SIM card capable of switching among different networks; an applet running on the said SIM card; a server which communicates with the said mobile device through a network interface; a server process which stores identity and network related data of each subscription profile; stores network territory and coverage map; stores history of network drops and subscription profile switch events; stores quota-price-validity-bandwidth attached to each subscription profile; connects to the networks providing the subscription profile periodically, to retrieve, calculate and store actual usage and outstanding quota and validity for SMS, data and minutes for each subscription profile; connects to the SIM applet to receive information from the applet about network loss and network coverage; determines and stores best network, preferred network, and available network periodically; and communicates and commands the SIM card applet to initiate selection of subscription based on available quota, validity and coverage.
DATA SERVICE CONTROL METHOD AND RELATED DEVICE
A data service control method and a related device are disclosed. The method includes: determining, by a PGW, a status of a data service switch of UE; if the status of the data service switch is that the data service switch is turned off, after the PGW receives a first data packet that comes from or goes to the UE, determining, by the PGW, whether the first data packet belongs to a specified type; and forwarding, by the PGW, the first data packet if the first data packet belongs to the specified type; or discarding, by the PGW, the first data packet if the first data packet does not belong to the specified type. During implementation of embodiments of the present disclosure, when the data service switch of the UE is turned off, data traffic of the UE can be saved.
Personalized devices for out-bound and in-bound inmate calling and communication
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.