Patent classifications
H04M15/41
CENTRALIZED SHARED NETWORK CONSUMPTION TRACKING
A network device executes an account management function that pre-authorizes network service unit consumption by multiple subscribers that are members of a same, shared network service account. The account management function receives, from multiple charging systems distributed within the network, network unit consumption charges associated with each of the multiple subscribers, where the network device is centrally located within a network relative to multiple locations associated with the plurality of charging systems. The account management function updates a consumption counter for the same, shared network service account based on the network unit consumption charges associated with the multiple subscribers received from the multiple charging systems distributed within the network.
Charging filtering function
In one example, a charging filtering function may obtain a request for one or more rules that control whether or when one or more charging data records associated with a user equipment are to be provided to one or more billing systems. The request includes an identification of the user equipment. Based on the identification of the user equipment, the charging filtering function may identify the one or more rules. The charging filtering function may provide the one or more rules to control whether or when the one or more charging data records associated with the user equipment are to be provided to the one or more billing systems.
SYSTEMS AND METHODS FOR CLASSIFYNG ELECTRONIC ACTIVITIES BASED ON SENDER AND RECEPIENT INFORMATION
The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.
Systems and methods relating to caller-centric call data
Systems and methods described herein may describe how enterprise system devices (e.g., servers) may be used to consolidate multiple disparate data sources (e.g., databases) into a single data source (i.e., “Datamart”). The Datamart may be a database or cluster of aggregated data from disparate data sources, which the Datamart may convert into a compatible format using various application programmable interfaces (APIs). In some cases, a software product may query the Datamart and then generate reports for understanding the data pulled from disparate sources. The reporting software application may enable enhanced analytics by humans or additional software applications, to build a more sophisticated understand around a member's call experience, reasons for call transfers, effectiveness of sales by a member service representative (MSR), and how to better train or equip MSRs to optimize their efforts.
TELECOMMUNICATION NETWORK SUBSCRIBER CONVERSION USING CLUSTER-BASED DISTANCE MEASURES
A processing system deployed in a telecommunication network may obtain data records including data associated with subscribers, cluster the subscribers into a plurality of clusters in accordance with the data, identify a first set of subscribers enrolled in automated clearing house (ACH) payment agreements, and identify a second set of subscribers not enrolled in ACH payment agreements, calculate distance measures for the second set of subscribers, where for each respective subscriber of the second set of subscribers, the distance measures include a respective distance measure of the respective subscriber to a feature centroid for a subset of the first set of subscribers in a same cluster as the respective subscriber, select a subset of the second set of subscribers based upon the plurality of distance measures for receiving an offer in an ACH payment agreement, and present communications to the subset of the second set of subscribers with the offer.
SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
RADIO COMMUNICATION NETWORK, MOBILITY MANAGEMENT ENTITY, LOCAL GATEWAY, AND CONTROL PLANE NODE
A radio communication network includes: a control plane (C-plane) node (24) located in a core network (20); a local gateway (14) located in a Radio Access Network (RAN) (10) including a base station (11). The C-plane node (24) has a C-plane of a PDN gateway and provides a first C-plane interface for communicating with a PCC entity relating to Policy and Charging Control (PCC). The local gateway (14) has a user plane of a PDN gateway and provides IP connectivity to the base station (11) to offload a particular type of traffic. The local gateway (14) further provides a second control plane interface for communicating with the C-plane node (24).
MOBILE COMMUNICATION DEVICE MONITORING SYSTEMS AND METHODS
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services a mobile communication device's applications maybe monitored against smart contracts stored in a central data center repository and/or written to a blockchain. Other data services may include all forms of communications between the mobile communication device and a third party along with changes to application or data within the mobile communication device. Monitoring the mobile communication device may be done to determine compliance with the smart contracts and whether a penalty or reward on device usage should be applied.
Open roaming multi-access cost optimizer service
A method is performed at a control center in a home network. The control center (CC) detects roaming of a user equipment (UE) engaged in a call across different access networks operated by different service providers and that employ different types of radio access technology (RAT) to attach to the UE. The CC identifies the different service providers and the different types of RAT associated with the different access networks. While the UE is roaming, the CC tracks different data usages for the UE on the different access networks. The CC categorizes the different data usages based on the different service providers and the different types of RAT associated with the different access networks. When the call terminates, the CC determines a total cost for data usage on the call based on the different data usages, the different types of RAT, and the different service providers.
SYSTEMS AND METHODS FOR IDENTIFYING SERVICE TYPE OF DATA USAGE ON 5G NEW RADIO (NR) RADIO ACCESS TECHNOLOGY TYPE
Aspects of the subject disclosure may include, for example, obtaining a message associated with a 5th Generation (5G) wireless service, the message containing: a first section including a service type identifier entry and a first timestamp that corresponds to the service type identifier entry; and a second section including a secondary radio access technology (RAT) entry, one or more data volume entries, and a second timestamp that corresponds to the secondary RAT entry and to the one or more data volume entries; matching the first timestamp and the second timestamp based upon a first value of the first timestamp equaling a second value of the second timestamp; and responsive to the matching of the first timestamp and the second timestamp, associating the service type identifier entry of the first section with the one or more data volume entries of the second section. Other embodiments are disclosed.