Patent classifications
H04M15/41
System and method for secure billing for IMS-based VoIP networks
Methods and systems for independent security scrubbing and billing of calls through an IP Multimedia Core Network Subsystem (IMS) are provided. The system includes a core IMS network and a security network cloud securely connected via session border controllers. The IMS network is configured to route calls to the security network cloud. The security network includes call-processing and billing servers that implement security checks on calls from OSI model layer three to seven and analyze the call to collect and generate billing data. After successful security and billing operations, the call is routed back to the IMS network for handling according to conventional workflows. Accordingly, the disclosed invention serves to enhance security for IMS traffic, improve the accuracy of customer billing and conserves IMS network resources which would otherwise be consumed by malicious attacks and billing responsibilities.
Responding to a termination reason in an accounting record
Technology to respond to a termination reason of an accounting record via an improved charging component is disclosed. The disclosed subject matter can be backwards compatible to support responding to a conventional SIP BYE method and a conventional SIP CANCEL method. Additionally, the disclosed subject matter can respond to other SIP methods, empty reason-headers, etc. In an aspect, a reason-header can be forced into an accounting record based on received session termination information. In an embodiment, the reason-header can be determined to satisfy a rule related to acceptable reason-headers. Where the rule is determined to be unsatisfied, a query can be generated toward a device that supported the now terminated communication, wherein a response to the query can comprise another reason-header that can be determined to satisfy the rule. The accounting record can be updated based on the other reason-header and employed in generating a charging data record that can alter corresponding billing.
Systems and methods for filtering electronic activities by parsing current and historical electronic activities
The present disclosure relates to systems and methods for filtering electronic activities. The method includes identifying an electronic activity. The method includes parsing the electronic activity to identify one or more electronic accounts in the electronic activity. The method includes determining, responsive to parsing the electronic activity, that the electronic activity is associated with an electronic account of the one or more electronic accounts. The method includes selecting, based on the electronic account, one or more filtering policies associated with the data source provider to apply to the electronic activity. The method includes determining, by applying the selected one or more filtering policies to the electronic activity, to restrict the electronic activity from further processing based on the electronic activity satisfying at least one of the selected one or more filtering policies. The method includes restricting, the electronic activity from further processing.
Method and system for detection of call signal manipulation
A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.
Usage data index for wireless communication networks
In a wireless communication network, index circuitry transfers a reference Distributed Ledger (DL) request to reference circuitry. The reference circuitry transfers a response indicating a reference DL ID to the index circuitry. The index circuitry transfers the reference DL ID to the wireless communication network. The reference circuitry receives usage data and the reference DL ID from the wireless communication network. The reference circuitry stores the usage data in reference DL blocks, generates a usage abstraction of the usage data, and transfers the reference DL ID and the usage abstraction to the index circuitry. The index circuitry stores the usage abstraction and the reference DL ID in index DL blocks. The index circuitry receives requests having the reference DL ID and returns the usage abstraction. The reference circuitry receives requests having the reference DL ID and usage abstraction ID and returns the usage data.
Preprocessing and storage of cloud service usage reports
Systems and methods for streaming billing data associated with third-party network resources consumed by a managed network to a remote network management platform are disclosed. Streaming of billing usage data associated with third-party resources may use resource identifiers to associate resources with line items in a service bill generated by the third-party network. A proxy server in the managed network may intermediate streaming from the third-party network to a remote server in a computational instance of the remote network management platform. Billing data may be recorded partly in a metric-base database configured for storing time series data corresponding to usage quantities of third-party resources consumed by the managed network per unit time, and partly in a static records database configured for storing database records associated with the time series data, and including data for identifying the third-party resources and for recording static information relating to billing for the third-party resources.
DOMINANT CUSTOMER LOCATIONS IDENTIFICATION SYSTEMS AND METHODS
Systems and methods for identifying dominant user locations so that optimum user experience improvement solutions can be deployed at the identified locations are disclosed. One of the purposes of the dominant customer location identification system is to plan for site capacity (for example, small cell planning, hot-spots planning, and dense area capacity planning) and to offer optimum/premium customer experience. The system does this by understanding the customer's dominant locations over a certain period of time (for example, monthly) so that the customer's overall experience can be enhanced. Once a customer's dominant locations are identified, then the telecommunications service provider can gain a better understanding of the primary sites providing service to the customer, and deploy/implement/execute one or more optimum customer experience improvement solutions at the identified sites.
Service allocation method and apparatus
Embodiments of the present invention provide a service allocation method and apparatus. The method includes: firstly, generating, by a core network side device, a first dedicated network identifier according to an association relationship sent by user equipment UE, where the first dedicated network identifier is used to identify the association relationship; secondly, sending, by the core network side device, the first dedicated network identifier to the UE; receiving, by the core network side device, a service request message sent by the UE; and finally, allocating a service to the UE according to the service request message and the first dedicated network identifier. Because each wireless router has a unique first dedicated network identifier, the core network side device can provide, according to the first dedicated network identifier, a targeted service or tariff policy for UE corresponding to each wireless router.
TAILORED CONTACT PLAN GENERATION
A system generates a tailored contact plan using a set of contact commands that represent a contact plan of communication opportunities between nodes in a network, an identification of restricted nodes in the network, and an identification of a target node. The system processes the records in the contact plan by writing a record to the tailored contact plan when the record is not a contact command; or writing the record to the tailored contact plan when the record includes the contact command, and a source node in the record is not a restricted node or the source node in the record is the target node; or writing the record to the tailored contact plan when the record includes the contact command and the destination node in the record is the target node. The target node uses the tailored contact plan to route data through the network.
MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME
An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices. A services framework at the gateway device implements the communications and processing infrastructure for enabling service management, service configuration, and authentication of user of services at the intelligent gateway. The framework provides a storage and execution environment for supporting and executing received service logic modules relating to use, management, and support of the digital endpoint devices. Thus, the gateway device provides a network-based services point of presence for a plurality of digital endpoint devices at the premises.