Patent classifications
H04M15/41
SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
Charging control in roaming scenario
A home SMF of a home PLMN receives a first message from a visited SMF of visited PLMN. The first message requests creation of a packet data unit (PDU) session of a wireless device. The first message comprises first charging policy information determined based on a first policy of the visited PLMN. The home SMF determines a second charging policy information for the PDU session based on the first charging policy information and a second policy of the home PLMN. The second charging policy information comprises: a charging method for the PDU session, and a charging parameter indicating a charging level for the PDU session. The home SMF sends a second message to the visited SMF. The second message comprises the second charging policy information.
METHOD AND SYSTEM FOR FAIRLY CHARGING TALK TIME OF VIDEO CALL THAT INTRODUCES NEW PERSON
A computer-implemented billing method including displaying, on a video call screen, video data related to a counterpart terminal with which a video call is connected, recognizing reaction information input from the counterpart terminal based on the video data related to the counterpart terminal displayed on the video call screen, and generating billing data related to the recognized reaction information of the counterpart terminal based on a billing policy may be provided.
Facilitation of follow-the-user data service for 5G or other next generation network
Follow-the-user (FTU) service can be implemented within a telecommunication data services platform to provide flexibility for end users to use their service subscriptions with any capable devices/vehicles. Currently, service subscriptions are generally tied to one device/vehicle that can be used to access the services, instead of the actual end user who uses the services. Therefore, a device/vehicle identifier can be utilized in accordance with an online billing and identification platform to identify end-user subscribers and associate their subscription services to a device/vehicle for which they are utilizing collect service usage, as well as to assign to its owner for the billing.
System and methods for dynamically extending analytics in a cloud communications platform
The disclosed technology provides a system and method for correlating events from a single application run in a cloud communications network using session identifiers uniquely identifying a communication session, and event identifiers uniquely identifying events in network elements of the cloud communication network. A data manager of the cloud communications network maps common fields and event-specific fields of network element event records to common fields and generic fields of a data warehouse based on the event type of the event to be recorded.
Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept an API call directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
APPARATUS AND METHOD FOR BACKGROUND DATA TRANSFER
An exposure node (50) receives a first request for resource management for future background data transfer between an application service provider and a plurality of radio terminals (10) from a server (60) associated with the application service provider and send a second request to a policy control node (40) in response to receiving the first request. The first request includes a parameter indicating whether background data transfer not complying with a previously agreed or negotiated transfer policy should be stopped, or whether the background data transfer should continue under a charging rule different from a previously agreed charging rule. The second request includes the parameter obtained from the first request. This enables the application service provider to negotiate with the radio communication network about handling of background data transfer not complying with a previously agreed transfer policy.
INTERMEDIARY SERVICE BUREAU SYSTEM AND METHOD
The present disclosure provides details on an intermediary service bureau (ISB) system which includes an ISB center that acts as an intermediary communication center between communication devices used by correctional facilities and contract providers. The ISB records communications, stores security data, and provides front end processing to facilitate an inmate to communicate with an outside party by way of a contract provider. Further, the ISB provides accounting services for inmates and friends and family that use services provided the contract provider. The contract provider provides security and routing services for the ISB by obtaining data from the ISB and updating data at the ISB according to the communications.
20451433.1
FEE RE-RATING FOR A WIRELESS CARRIER NETWORK
A business logic used to generate call details records (CDRs) for a plurality of subscribers by a wireless carrier network is imported. A selection of one or more data collector applications that are listed in the business logic is received and one or more configuration parameters in the business logic are updated based on one or more inputted parameter updates. A selection of one or more CDR distributor applications listed in the business logic is also received. A particular set of CDRs in the specific group of CDRs is further selected based on one or more inputted selection parameters. Reprocessed CDRs that correspond to the particular set of CDRs are generated according to at least the one or more updated configuration parameters in the business logic and sent to the one or more billing systems via the one or more CDR distributor applications to trigger recalculation of service fees.
METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICE
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.