H04M15/41

Over the top network traffic classification

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.

Method of enabling digital music content to be downloaded to and used on a portable wireless computing device

The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.

SYSTEMS AND METHODS FOR IDENTIFYING A SEQUENCE OF EVENTS AND PARTICIPANTS FOR RECORD OBJECTS
20220038548 · 2022-02-03 · ·

Methods, systems, and storage media for identifying a sequence of events and participants for record objects are disclosed. Exemplary implementations may: access record objects of a system of record; identify a subset of record objects associated with a group entity and having a first record object status; identify one or more electronic activities linked to the record objects; determine an event-participant pattern based on the electronic activities linked to the record object; identify electronic activities linked with a second record object; determine that a first event is performed by the a participant type and a second event is not yet performed by a second participant type; generate a content item identifying an action to trigger a performance of the second event; and transmit the content item to a device of a participant of at least one electronic activity linked with the second record object.

Blocking unsolicited calls from CallerID-spoofing autodialing devices

Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.

Wireless access point having metering capability and metering display
09736320 · 2017-08-15 · ·

The disclosure provides a system and method for metering on a prepaid wireless access point the amount of data transferred between a wireless device and the Internet and inhibiting further data transmission when the amount of prepaid data available reaches or drops below a pre-determined threshold. Specifically, the wireless access point includes a metering client to track one of data usage or an amount of prepaid data available. When the metering client indicates that the amount of data available has dropped below a pre-determined threshold, the wireless access point inhibits further data transmission.

CHARGING METHOD, APPARATUS, AND SYSTEM
20220038871 · 2022-02-03 · ·

Embodiments of this application disclose a charging method and a related product. A charging function CHF apparatus receives a first charging request sent by a charging trigger function CTF apparatus, where the first charging request carries event charging information. Then, the CHF apparatus determines a first event charging processing mode based on the event charging information, and processes the first charging request according to the first event charging processing mode. According to the method, the CHF apparatus may determine the first event charging processing mode based on the first charging request, and perform event charging processing. Therefore, charging can be accurately and efficiently performed on an event charging service.

Cellular systems having elements modified for access control based on expectation data records in accordance with novel cellular communications protocols and network architectures utilizing cellular network hosted access controlling schemas, and methods for use thereof
11432154 · 2022-08-30 ·

In some embodiments, the present disclosure is directed to an exemplary system, including: an access controlling platform, executing software instructions that instruct to record an expectation data record as an access control mechanism to access an access-restricted digital resource, the expectation data record including: access code and identity linked to a computing device; where the access code is associated with the access-restricted digital resource; receive, while the access controller interface element is displayed, a mobile originating communication having data that includes the access code and the identity; perform a confirmation of the expectation data record with the mobile originating communication; instruct a cellular communications network to perform, based on at least one part of the data, at least one action with the cellular network hosted access controlling schema to generate a session record associated with the identity.

SESSIONIZATION OF NETWORK FLOWS IN A WIRELESS COMMUNICATION NETWORK
20220038380 · 2022-02-03 ·

Systems and methods discussed herein are directed to combining multiple network flows with respect to usage of applications into sessions. A record of a plurality of network flows may be obtained where the record relates to usage of the application by a user device in a wireless communication network. The plurality of network flows may be combined into a session, where an earliest start time of a network flow represents a session start time for the session and a latest end time of a network flow represents a session end time for the session. Based at least in part on the session start time and the session end time, a usage of the application during the session by the user device may be determined. Based at least in part on a plurality of sessions, usage of the application in the wireless communication network may be estimated.

COORDINATING CELLULAR AND CABLE/FIBER BROADBAND NETWORKS
20220311682 · 2022-09-29 ·

Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit—small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit—small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.

Fraud detection on a communication network
09729727 · 2017-08-08 · ·

A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.