Patent classifications
H04M15/41
Proactively adjusting network infrastructure in response to reporting of real-time network performance
In one example, the present disclosure describes a device, computer-readable medium, and method for proactively adjusting the infrastructure of a communications network in response to reporting of real-time network performance. For instance, in one example, a method includes obtaining real-time network performance metrics directly from a user endpoint device operated by a customer of a telecommunication service provider network, correlating the real-time network performance metrics with data from another data source, wherein the data includes data other than network performance metrics, and adjusting an infrastructure of the telecommunication service provider network in response to an insight gleaned through the correlating.
System and method for running a multi-module telephony application
A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.
System, method, and computer program for dynamic switching between online and offline charging for a network session
As described herein, a system, method, and computer program are provided for dynamic switching between online and offline charging for a network session. In use, a network session is monitored. Additionally, during the network session, one or more characteristics of the network session are determined, based on the monitoring of the network session. Further, a dynamic selection is made between offline charging and online charging for the network session, based on the one or more characteristics of the network session.
System and methods for dynamically extending analytics in a cloud communications platform
The disclosed technology provides a system and method for correlating events from a single application run in a cloud communications network using session identifiers uniquely identifying a communication session, and event identifiers uniquely identifying events in network elements of the cloud communication network. A data manager of the cloud communications network maps common fields and event-specific fields of network element event records to common fields and generic fields of a data warehouse based on the event type of the event to be recorded.
Methods, systems, and computer readable media for resource cleanup in communications networks
Methods, systems, and computer readable media for resource cleanup in communications networks are disclosed. One method for resource cleanup in a communications network comprises: at a policy control function (PCF) comprising at least one processor: receiving, from a binding support function (BSF), a first notification indicating a potentially stale or inactive first binding record, wherein the first notification includes context data associated with the first binding record; determining that resource cleanup associated with the first binding record should be performed; and initiating, using the context data, resource cleanup associated with the first binding record at one or more network entities.
Detecting fraud rings in mobile communications networks
An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
PROACTIVELY ADJUSTING NETWORK INFRASTRUCTURE IN RESPONSE TO REPORTING OF REAL-TIME NETWORK PERFORMANCE
In one example, the present disclosure describes a device, computer-readable medium, and method for proactively adjusting the infrastructure of a communications network in response to reporting of real-time network performance. For instance, in one example, a method includes obtaining real-time network performance metrics directly from a user endpoint device operated by a customer of a telecommunication service provider network, correlating the real-time network performance metrics with data from another data source, wherein the data includes data other than network performance metrics, and adjusting an infrastructure of the telecommunication service provider network in response to an insight gleaned through the correlating.
REPLAY AGENT FOR DELIVERING CHARGING EVENT MESSAGES FROM A MESSAGE BROKER IN A MOBILE TELECOMMUNICATIONS NETWORK
A system for preserving charging event messages in a mobile telecommunications network when a charging server is unavailable includes a message broker comprising persistent storage. The system also includes a network element that generates a charging event message, attempts to send the charging event message to a charging server, and writes the charging event message to the message broker in response to determining that the attempt to send the charging event message to the charging server has failed. The system also includes a replay agent that subscribes to the message broker for notifications associated with the charging server, receives a notification from the message broker about the charging event message, reads the charging event message from the message broker, and causes the charging event message to be sent to the charging server when the charging server is available.
Security, fraud detection, and fraud mitigation in device-assisted services systems
Secure architectures and methods for improving the security of mobile devices are disclosed. Also disclosed are apparatuses and methods to detect and mitigate fraud in device-assisted services implementations.
Distributed backup of unshipped charging data records
A first charging data record (CDR) generating node can receive charging server information and available CDR storage information from a second CDR generating node. The first CDR generating node can detect that the charging server is unavailable to receive CDRs from the first CDR generating node. The first CDR generating node can also determine that a CDR storage area corresponding to the first CDR generating node should not be used to store additional CDRs. The first CDR generating node can also select the second CDR generating node for storing the additional CDRs that are generated by the first CDR generating node. The second CDR generating node can be selected based at least in part on the charging server information and the available CDR storage information. The first CDR generating node can cause at least one CDR to be sent to the second CDR generating node.