Patent classifications
H04M15/41
AUTOMATED CONTENT TAG PROCESSING FOR MOBILE MEDIA
In embodiments, the present invention provides a method and system for delivery of content on a mobile media platform, providing an automated tag processing facility, and delivering content to a mobile device, wherein content delivery is based at least in part on the automated tag processing.
Detection and blocking of cloned mobile devices
A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.
Enhanced roaming services and converged carrier networks with device assisted services and a proxy
A method performed by a network system communicatively coupled to a wireless device by a wireless access network, the network system including a network element corresponding to a network element destination, the method comprising providing at least a portion of a device policy to the wireless device, wherein the device policy is configured to assist in detecting wireless device traffic associated with a service activity, identifying the service activity as being included in a service usage activity classification, and directing or routing the wireless device traffic associated with the service activity over the wireless access network based on information identifying the network element destination; providing a network element policy to the network element corresponding to the network element destination; detecting, at the network element, traffic associated with the wireless device; and applying the network element policy at the network element to the traffic associated with the wireless device.
DYNAMICALLY-ASSIGNED RESOURCE MANAGEMENT IN A SHARED POOL OF CONFIGURABLE COMPUTING RESOURCES
Disclosed aspects manage a shared pool of configurable computing resources. A resource demand value is identified for a target host. Resource supply values of dynamically-assigned resources are computed for donor hosts. Using the resource demand value and the resource supply values, dynamically-assigned resources are reclaimed from the donor hosts and distributed to the target host.
Detailed call records for voice over LTE calls
A performance monitoring system and method is based on a Detailed Call Record (DCR). A DCR contains records of events occurring in different network domains (14, 20, 40) that are related to a single, specific VoLTE call. The DCR events for each VoLTE call cover all legs of the call, and for each call leg, the relevant events are ordered by time. A DCR also contains basic information to identify the call: the IMS Charging Identifier (ICID), the International Mobile Subscriber Identity (IMSI) of all involved subscribers, and the start and stop timestamps of the call. A DCR has all the relevant user plane measurement, radio measurement, and control plane data from all the involved domains (14, 20, 40) for all call legs of a VoLTE call, in contrast to prior art systems that focus only on a single subscriber's activities for a given call. The DCR thus provides a complete view of the call, allowing more complete analytics and troubleshooting. Furthermore, the data are collected and assembled automatically, with results available real-time, or with a few seconds delay.
FRAUD DETECTION IN INTERACTIVE VOICE RESPONSE SYSTEMS
Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.
MULTI-CHANNEL COMMUNICATION SYSTEM
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving from a first system information comprising a message and an identifier of a user, selecting a channel from a plurality of different third party communication channels for sending the message based on one or more properties of communications on the channel, determining a channel-specific user identifier for the selected channel based on the identifier of the user, creating a channel-specific message formatted for the selected channel based on the message, and sending the message to the user on the selected channel using the channel-specific user identifier.
User interface with interactive elements having dynamically determined functionality
Certain aspects of the present disclosure provide techniques for a method of displaying a user interface on a mobile device, comprising: receiving a transaction file; performing text recognition on the transaction file to extract one or more transaction elements; determining a transaction characteristic based on the one or more transaction elements; displaying a transaction characteristic user interface element within an interactive cell displayed in the user interface; receiving a user touch gesture associated with the interactive cell via the user interface; and displaying an action user interface element in response to receiving the user touch gesture, wherein the action user interface element is configured to perform an action based on the transaction characteristic associated with the interactive cell.
GENERATING AND PROCESSING CHARGING DATA RECORDS BASED ON PREDICTED RECORD LENGTH
The present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (CDRs) in a telecommunication environment (e.g., a fourth generation (4G) a fifth generation (5G), or future generation mobile network). The systems described herein involve predicting lengths of CDRs prior to encoding and providing the CDRs to a charging gateway function to ensure that the CDRs do not exceed a maximum allowable length that the charging gateway function is capable of processing while also reducing the total number of CDR packages that are encoded and transmitted. Indeed, the systems described herein can predict the length of the CDRs incrementally as charging containers are added, thus limiting the number of CDRs that are generated and processed.
Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitate protocol mediated payment activities via cellular networks methods for use thereof
In some embodiments, the present disclosure provides a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part, corresponding to the MACRO band parameter, and at least one second identity; executing, by the session controlling Internet platform, based on the domain name and the MACRO band parameter, an activity between a first digital wallet associated with the at least one first identity and a second digital wallet associated with the at least one second identity after: the MICRO band part of the multi-part multi-functional address signaling sequence has been accepted by the cellular communications network and at least one portion of the data is confirmed to match an expected session record.