H04M15/41

SECONDARY INTERNET ACCESS FOR MOBILE DEVICES

In an approach for a secondary mobile internet access, a processor receives a request from a mobile device for a connection to a secondary wireless access point. A processor authorizes the connection request. A processor determines bandwidth associated with the mobile device. A processor adjusts bandwidth associated with the secondary wireless access point to include at least a sum of original bandwidth of the secondary wireless access point and the bandwidth associated with the mobile device to accommodate usage by the mobile device. A processor assigns temporary bandwidth to the mobile device based on the bandwidth associated with the mobile device. A processor executes a timer to a session associated with the authorized connection for the mobile device. A processor restores the original bandwidth of the secondary wireless access point upon detecting an end of the session.

Determining dropped call rates in IP multimedia networks

Systems and methods are described herein for determining dropped call rates (DCR) for various communications networks, such as IP Multimedia Networks (IMS), which include Voice over LTE (VoLTE) networks. For example, the systems and methods utilize data (e.g. abnormal cause codes) generated by layers of the IMS networks, such as a Session Initiation Protocol (SIP) layer of the IMS network, when determining dropped call rates for IMS networks.

Managing data transfers over network connections based on priority and a data usage plan

Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits.

Tailored contact plan generation
11178047 · 2021-11-16 · ·

A system generates a tailored contact plan using a set of contact commands that represent a contact plan of communication opportunities between nodes in a network, an identification of restricted nodes in the network, and an identification of a target node. The system processes the records in the contact plan by writing a record to the tailored contact plan when the record is not a contact command; or writing the record to the tailored contact plan when the record includes the contact command, and a source node in the record is not a restricted node or the source node in the record is the target node; or writing the record to the tailored contact plan when the record includes the contact command and the destination node in the record is the target node. The target node uses the tailored contact plan to route data through the network.

Simulating continuous millimeter wave band access to a telecommunications network
11224012 · 2022-01-11 · ·

The disclosed technology includes at least one method performed by a system of a telecommunications network. The system can establish a communications link between the wireless device and a network access node (NAN) of the 5G network. While connected over a non-mmW band, the wireless device autonomously schedules data downloads to occur when the wireless device is on an mmW band. The system then receives a request from the wireless device to perform the data downloads, which can be enabled by a packet gateway (PGW) upon receiving a confirmation by the NAN that the wireless device can connect over the mmW band. Otherwise, the PGW denies the wireless device's request to perform the data downloads, which can be enforced by the NAN.

SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIES

The present disclosure relates to systems and methods for filtering electronic activities. The method includes identifying an electronic activity. The method includes parsing the electronic activity to identify one or more electronic accounts in the electronic activity. The method includes determining, responsive to parsing the electronic activity, that the electronic activity is associated with an electronic account of the one or more electronic accounts. The method includes selecting, based on the electronic account, one or more filtering policies associated with the data source provider to apply to the electronic activity. The method includes determining, by applying the selected one or more filtering policies to the electronic activity, to restrict the electronic activity from further processing based on the electronic activity satisfying at least one of the selected one or more filtering policies. The method includes restricting, the electronic activity from further processing.

TELECOMMUNICATION NETWORK SUBSCRIBER CONVERSION USING CLUSTER-BASED DISTANCE MEASURES

A processing system deployed in a telecommunication network may obtain data records including data associated with subscribers, cluster the subscribers into a plurality of clusters in accordance with the data, identify a first set of subscribers enrolled in automated clearing house (ACH) payment agreements, and identify a second set of subscribers not enrolled in ACH payment agreements, calculate distance measures for the second set of subscribers, where for each respective subscriber of the second set of subscribers, the distance measures include a respective distance measure of the respective subscriber to a feature centroid for a subset of the first set of subscribers in a same cluster as the respective subscriber, select a subset of the second set of subscribers based upon the plurality of distance measures for receiving an offer in an ACH payment agreement, and present communications to the subset of the second set of subscribers with the offer.

DETECTING FRAUD RINGS IN MOBILE COMMUNICATIONS NETWORKS

An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

Member activity across channels

A computing system of an organization receives data through multiple channels of communication; a programmatic interface for each of the different channel infrastructures may be called to convert data about a user's contact with the system. Contact records for contain data such as a user ID and a channel identifier. An operational database may receive the converted contact records from the devices or software. A transaction application may perform various tasks resulting in the generation of transaction data. A transaction record containing the transaction data may be generated in a message queue or operational database. The interface for the communication channel may convert the transaction data in a message queue, after the transaction data is detected by a listening application that monitors the message queue and logs new transaction data to the operational database.

PROVIDING RADIO RESOURCE OWNERSHIP INDICATORS FOR USER EQUIPMENT CHARGING RECORDS IN A MOBILE NETWORK ENVIRONMENT

Techniques are described herein for providing radio resource ownership indicators in charging records for a charging function. In one example, a method may include determining, by a session management node of a mobile network, that a user equipment is utilizing a particular radio resource of a mobile network resource for a Protocol Data Unit (PDU) session of the user equipment, wherein the mobile network resource is capable of being utilized via a plurality of radio resources and the particular radio resources is associated with an enterprise entity; and reporting charging information for the PDU session of the user equipment to a charging function of the mobile network to facilitate storing a charging record for the user equipment that is to include an identifier of the enterprise entity that is associated with the particular radio resource.