Patent classifications
H04M15/41
Method and Apparatus for Service Charging in a Communication Network
Charging operations carried out in relation to service consumption by users of a communication network reduce signaling overhead and memory or storage requirements by adopting a bifurcated approach to structuring and accessing the data containers used for controlling and tracking service consumption by individual users commonly governed by the same consumption control information. With bifurcation, a parent data container holds the common consumption control information commonly applicable to each user, while an individual child data container for each user holds consumption-tracking information specific to the user. The approach reduces signaling overhead inasmuch as operations involving only the consumption control information need not retrieve or access the child data containers, and the approach reduces overall storage requirements by eliminating redundant inclusion of the common information in the child data containers.
INTERACTIVE VOICE RESPONSE USING INTENT PREDICTION AND, FOR EXAMPLE A 5G CAPABLE DEVICE
Disclosed here is a method to determine a user intent when a user device initiates an interactive voice response (IVR) call with a wireless telecommunication network. A processor can detect the IVR call initiated with the network and determine whether the user device is a member of the network. Upon determining that the user device is a member of the network, the processor can obtain user history including interaction history between the user and the network. Based on the user history, the processor can predict the user intent when the user initiates the IVR call. The processor can detect whether user device is a 5G capable device. Upon the determining that the device is 5G capable and based on the predicted user intent, the processor can suggest to the user an application configured to execute on the user device and configured to address the predicted user intent.
METHODS, SYSTEMS, AND DEVICES FOR MASKING CONTENT TO OBFUSCATE AN IDENTITY OF A USER OF A MOBILE DEVICE
Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.
Multiple usage rates
An example communications system for providing communication services between communications devices may employ multiple usage rates for metered communication services. A method for adjusting usage amounts to account for multiple usage rates may include determining a usage adjustment factor for a communications event; determining a metered usage amount for the communications event; and determining an adjusted usage amount based on the usage adjustment factor and the metered usage amount for the communications amount. Thus, a billing system in the communications system may determine an invoice amount based on the adjusted usage amount and a predetermined bill rate.
Mobile device roaming optimization and operation
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
DETECTING FRAUD RINGS IN MOBILE COMMUNICATIONS NETWORKS
An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
SYSTEM AND METHOD FOR RUNNING A MULTI-MODULE TELEPHONY APPLICATION
A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES
The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.
SYSTEMS AND METHODS FOR AVOIDING DOUBLE ACCOUNTING UPON SESSION FAILOVER
Systems, methods, and software that perform offline charging. One embodiment comprises a Charging Data Function (CDF) of an Offline Charging System (OFCS). The CDF receives accounting requests for a session from a Charging Trigger Function (CTF), and generates an incomplete Charging Data Record (CDR) for the session based on the accounting requests. The CDF identifies request identifiers (ID) assigned to the accounting requests used to generate the first incomplete CDR, and inserts the request IDs in the incomplete CDR. The CDF determines whether one or more of the accounting requests used to generate the incomplete CDR were indicated as a re-transmitted accounting request by the CTF, and inserts content information for the re-transmitted accounting request(s) in the incomplete CDR.
VIDEO INTERCONNECT TERMINATION CHARGING
This disclosure describes a video interconnect system that may establish a Video over Long Term Evolution (ViLTE) communication session between two interacting client devices. In some examples, the video interconnect system may selectively establish a ViLTE communication based on one or more rules associated with the domain information of interacting client devices, availability of network bandwidth, bandwidth consumption of a video component of the ViLTE communication, or established service agreements between telecommunication service providers of the interacting client devices. Further, the video interconnect system may facilitate generating termination charges for a video and/or audio communication session of a ViLTE communication. For example, a video component of the ViLTE communication may be charged and metered based on data usage, and an audio component of the ViLTE communication may be charged and metered based on the duration and relative location of the interacting client devices.