Patent classifications
H04M15/43
REAL-TIME SYSTEM TO IDENTIFY AND ANALYZE BEHAVIORAL PATTERNS TO PREDICT CHURN RISK AND INCREASE RETENTION
Implementations are directed to identifying potential churn of a user of one or more computer-implemented systems provided by an enterprise. In some examples, actions include identifying potential churn of providing a plurality of event profiles based on historical data, each event profile being representative of interactions of users with the enterprise and corresponding to churn of the users, at least one event profile being representative of an interaction of users with the one or more computer-implemented services, providing a pulse of the user at least partially based on historical data associated with the user, and one or more event profiles of the plurality of event profiles, and determining that the user is at-risk of churn based on the pulse of the user and a risk index value, and in response, displaying an indication that the user is at-risk of churn in a graphical user interface.
System and method of associating and transferring financially valuable information recorded against an unregistered mobile phone number to a new mobile phone number
A system and method of associating and transferring financially valuable information recorded against an unregistered mobile phone number with an external identifier comprising the external identifier; an application program; at least one originating communications device having an unregistered mobile phone number assigned thereto; and at least one replacement communications device having a separate mobile phone number assigned thereto, the application program automatically obtains the external identifier and operates to direct at least one third party who holds financially valuable information recorded against at least one of the unregistered mobile phone numbers allocated to the at least one originating communications device to associate such financially valuable information with the external identifier; and where the application program directs the at least one third party to transfer the financially valuable information associated with the unregistered mobile phone number to the separate mobile phone number.
METHOD, USER EQUIPMENT AND CHARGING SYSTEM FOR CHARGING PROXIMITY BASED SERVICES
The method includes obtaining charging related information of a proximity based service used by user equipment; generating a charging request for the proximity based service used by the user equipment based on the charging related information; and transmitting the charging request to a charging system of the wireless communication network.
METHOD AND SYSTEM FOR PERFORMING CHARGING ON NETWORK RESOURCE, AND DEVICE
This application provides example methods, systems, and devices for performing charging on a network resource. One example method includes sending, by a network slice charging function device, a first message to a network slice management function device, where the first message includes an identifier of a network slice instance and filtering information, the filtering information indicates the network slice management function device to send a value that is of a network slice performance indicator of the network slice instance and that matches the filtering information, and the network slice performance indicator describes network performance of the network slice instance. The network slice charging function device can then receive a second message from the network slice management function device, where the second message includes the value. The network slice charging function device can then perform charging on the network slice instance based on the value.
Multi-tier quality of service wireless comfmunications networks
The present invention pertains to improved communication quality of service in communication networks. A customer may pay different fees for different tiers of service relating to voice quality and bandwidth access. Higher service tiers may guarantee that a specific vocoder or bit rate is used; or guarantee that communication is supported by parameters such as maximum allowed dropped calls rate, jitter and latency. Availability may be guaranteed per the contract between subscribers and service providers. Different tiers may be associated with customers' records for billing purposes. High end devices may be afforded higher voice quality by comparing a given device to a look up table indicating what service level is associated therewith. A calling device or a receiving device may ask the other device to change the vocoder or bit rate to ensure a higher quality call. The user may also change the quality level before or during a call.
Over the top network traffic classification
A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.
SERVICE MONITORING AND OPTIMIZATION SYSTEMS AND METHODS
A system and method for selecting an optimal service may include: (1) querying a device to determine the location at which the service is provided and the parameters of the service being used, (2) based on the information obtained from the query, comparing the parameters of competing services offered in the location, and (3) based on the comparison, selecting one of the competing services.
Hierarchical service policies for creating service usage data records for a wireless end-user device
A non-transitory computer-readable storage medium storing one or more machine-executable instructions that, when executed by one or more processors, cause the one or more processors to: determine whether a traffic flow of a wireless end-user device is associated with a first service activity, the traffic flow comprising one or more attempted or successful communications over a wireless access network; if it is determined that the traffic flow is associated with the first service activity, create a first data record, the first data record identifying the first service activity; if it is determined that the traffic flow is not associated with the first service activity, determine whether the traffic flow is associated with a second service activity; and if it is determined that the traffic flow is associated with the second service activity, create a second data record, the second data record identifying the second service activity.
Mobile device sharing facilitation methods and systems featuring a subset-specific source identification
Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.
Wireless network service interfaces
A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently.