H04M15/41

Systems and methods for maintaining extracted data in a group node profile from electronic activities

The present disclosure relates to maintaining extracted data in a group node profile from electronic activities. A group node profile associated with a group entity is maintained. A first data point including an electronic activity or a record object is accessed. The first data point is parsed using a value detection policy to obtain a first value. The group node profile is updated based on the first value. An association score between the group node profile and the first value is generated. A second data point is accessed. The second data point is parsed. The association score between the group node profile and the first value is updated.

Systems and methods for merging tenant shadow systems of record into a master system of record

The present disclosure is related to systems and methods of merging tenant shadow systems of record into a master system of record. First tenant record objects of a first tenant system of record can be accessed. A master record object for a master system of record can be generated using the corresponding first tenant record object. A second tenant record object of a second tenant system of record can be accessed. Whether the second tenant record object is to be merged into the corresponding master record object can be determined. When determined to merge, the second tenant record object can be merged into the corresponding master record object. When determined to not merge, a new master record can be generated.

Voice over long-term evolution (VoLTE) call normalization and alert policy system
11381612 · 2022-07-05 · ·

The present disclosure describes techniques that facilitate detecting a Voice over Long-Term Evolution (VoLTE) call request with a recipient call number that lacks a country code. The VoLTE call request may be initiated by a subscriber device while roaming in a VPLMN. Specifically, a Normalization and Alert Policy (NAP) system is described that is configured to analyze the VoLTE call request and determine an intended country code and adjust the recipient call number to include the country code. Further, the NAP system may analyze the adjusted recipient call number to determine whether initiating a VoLTE call in response to the VoLTE call request may trigger an alert condition. An alert condition may relate to determining that the VoLTE call request may initiate a cost-prohibitive VoLTE communication or that the VoLTE call request relates a fraudulent communication.

Enhanced roaming services and converged carrier networks with device assisted services and a proxy
11412366 · 2022-08-09 · ·

A method performed by a network system communicatively coupled to a wireless device by a wireless access network, the network system including a network element corresponding to a network element destination, the method comprising providing at least a portion of a device policy to the wireless device, wherein the device policy is configured to assist in detecting wireless device traffic associated with a service activity, identifying the service activity as being included in a service usage activity classification, and directing or routing the wireless device traffic associated with the service activity over the wireless access network based on information identifying the network element destination; providing a network element policy to the network element corresponding to the network element destination; detecting, at the network element, traffic associated with the wireless device; and applying the network element policy at the network element to the traffic associated with the wireless device.

Proactive customer care in a communication system

Aspects of the subject disclosure may include, for example, automatically detecting a service issue of a telecommunication system that may impact a customer of a telecommunication service provider of the telecommunication system, predicting, by the processing system, a future customer care interaction by the customer as a result of the service issue, initiating a resolution action of the telecommunication system for the service issue before the customer contacts a customer care agent of the telecommunication service provider, wherein the initiating is responsive to the predicting the future customer care interaction and modifying a component of the telecommunication system to improve efficiency of operation of the telecommunication system by reducing a number of customer care contacts by customers of the telecommunication service provider. Other embodiments are disclosed.

Implementation of Rules in a Computing System
20220245474 · 2022-08-04 · ·

A rule to be implemented in a computing system is formulated as a set of at least three conditions in a hierarchical structure including a parent condition, two or more child conditions, and an outcome. One or more monitoring devices of at least some of the child conditions are instructed to report the status of the corresponding child condition. The status of the parent condition is then determined using the received status of the child conditions.

NETWORK SLICE CHARGING METHOD AND APPARATUS
20220224552 · 2022-07-14 ·

This application provides a network slice charging method and an apparatus. The method includes: A network slice management network element receives a first request including a charging requirement of a network slice, which includes a charging type being network slice usage charging. The network slice management network element sends to a network slice subnet management network element, a second request including the charging requirement. The network slice management network element receives first charging data of the network slice which is collected based on the charging requirement, and includes usage of the network slice. The network slice management network element sends the first charging data to a charging network element for the charging network element to perform network slice charging.

Network Slice Charging Method and Apparatus
20220217005 · 2022-07-07 ·

This application provides a network slice charging method and an apparatus. The method includes: A network slice management network element receives a first request including a charging requirement of a network slice. The network slice management network element sends to a network slice subnet management network element, a second request including the charging requirement. The network slice management network element receives first charging data of the network slice, which is collected based on the charging requirement. The network slice management network element sends the first charging data to a charging network element for the charging network element to charge the network slice.

System and method for securing identity identifiers for data engineering processing

Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.

Telecommunication network subscriber conversion using cluster-based distance measures

A processing system deployed in a telecommunication network may obtain data records including data associated with subscribers, cluster the subscribers into a plurality of clusters in accordance with the data, identify a first set of subscribers enrolled in automated clearing house (ACH) payment agreements, and identify a second set of subscribers not enrolled in ACH payment agreements, calculate distance measures for the second set of subscribers, where for each respective subscriber of the second set of subscribers, the distance measures include a respective distance measure of the respective subscriber to a feature centroid for a subset of the first set of subscribers in a same cluster as the respective subscriber, select a subset of the second set of subscribers based upon the plurality of distance measures for receiving an offer in an ACH payment agreement, and present communications to the subset of the second set of subscribers with the offer.