H04M15/41

SYSTEM AND METHODS FOR DYNAMICALLY EXTENDING ANALYTICS IN A CLOUD COMMUNICATIONS PLATFORM
20210392189 · 2021-12-16 ·

The disclosed technology provides a system and method for correlating events from a single application run in a cloud communications network using session identifiers uniquely identifying a communication session, and event identifiers uniquely identifying events in network elements of the cloud communication network. A data manager of the cloud communications network maps common fields and event-specific fields of network element event records to common fields and generic fields of a data warehouse based on the event type of the event to be recorded.

OVER THE TOP NETWORK TRAFFIC CLASSIFICATION
20210392007 · 2021-12-16 ·

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.

METHOD AND USER EQUIPMENT FOR DETECTING A POTENTIALLY FRAUDULENT CALL

A method and a User Equipment, UE (120) for detecting that the UE has received a fraudulent missed call, e.g. from a non-legitimate device (150). When receiving a missed call which is ended before a user of the UE has answered the incoming call, the UE determines the duration of the missed call, and indicates, e.g. to a user of the UE, the 5 duration of the missed call. The missed call may be determined as potentially fraudulent if the duration of the missed call is below or equal to a predetermined threshold.

Method and system for identification of a remote host in an out-of-band verification network
11196873 · 2021-12-07 · ·

A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.

SYSTEMS AND METHODS FOR IDENTIFYING SERVICE TYPE OF DATA USAGE ON 5G NEW RADIO (NR) RADIO ACCESS TECHNOLOGY TYPE

Aspects of the subject disclosure may include, for example, obtaining a message associated with a 5th Generation (5G) wireless service, the message containing: a first section including a service type identifier entry and a first timestamp that corresponds to the service type identifier entry; and a second section including a secondary radio access technology (RAT) entry, one or more data volume entries, and a second timestamp that corresponds to the secondary RAT entry and to the one or more data volume entries; matching the first timestamp and the second timestamp based upon a first value of the first timestamp equaling a second value of the second timestamp; and responsive to the matching of the first timestamp and the second timestamp, associating the service type identifier entry of the first section with the one or more data volume entries of the second section. Other embodiments are disclosed.

Smart Meter For Monitoring And Controlling Internet Usage
20220210020 · 2022-06-30 · ·

Systems and methods for implementing a network metering system which includes a classifier which measures network usage by device, application, device and application and time of day, where the device is given an end-user identifiable device type name based on characteristics of network traffic the device carried, and at least in part based on the upstream domain names the device has interacted with; and a traffic shaper that allows device network traffic and application network traffic to be individually controlled with control settings, including blocking, blocking by time of day, blocking when usage limits are reached, rate limiting and rate limiting by time of day.

System and method for online charging telecommunication services in real time
11368821 · 2022-06-21 · ·

Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.

Methods and systems for reducing customer service calls

Methods and devices for redirecting calls made to a customer service center of an enterprise include monitoring activities of a mobile device user, predicting (e.g., based on the monitored activities, information stored in memory, or information received from another device, etc.) a reason that the mobile device user has commenced calling the customer service center or will commence calling the customer service center in the near future, selecting a media element based on the predicted reason that the mobile device user has commenced calling the customer service center or will commence calling the customer service center in the near future, and rendering the selected media element on a screen of a mobile device of the mobile device user prior to completing a call to the customer service center associated with the enterprise and until the mobile device user interacts with the mobile device or the rendered media element.

SYSTEM AND METHOD FOR DETECTING FRAUD IN INTERNATIONAL TELECOMMUNICATION TRAFFIC
20220182486 · 2022-06-09 ·

A system for detecting fraud in international telecommunication traffic, includes: a transactions registry accessible by multiple operators and/or carriers; a logging module installed with multiple operators and/or carriers configured to add an entry in the transactions registry by an operator and/or carrier handling a call, wherein an entry comprises the calling number, the called number and timing information for the call; a fraud detection and classification module configured to: select from the transactions registry a group of correlated entries representing the call; compare the correlated entries to detect an anomaly due to fraud and to classify the call into a fraud type.

BLOCKCHAIN FOR COMMUNICATION OF SUBSCRIBER DATA RECORDS BETWEEN PUBLIC LAND MOBILE NETWORKS

Mechanisms for implementing a billing process between a first Public Land Mobile Network (PLMN1) and a second Public Land Mobile Network (PLMN2) for a subscriber of the PLMN1 that visits the PLMN2. A method comprises establishing a smart contract between the PLMN1, the PLMN2, and a Data Clearance House (DCH). The method comprises sending a subscriber usage record, represented by a distributed ledger, of the subscriber from the PLMN2 to the DCH using a blockchain upon the subscriber having visited the PLMN2, wherein the blockchain is based on the smart contract. The method comprises sending the subscriber usage record from the DCH to the PLMN1 using the blockchain.