Patent classifications
H04M15/48
Mobile device roaming optimization and operation
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
Usage tracking for software as a service (SaaS) applications
Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (SaaS) applications and tracking usage of the SaaS applications. First, a user, e.g. employee of an enterprise, logs into a SaaS usage proxy using a first set of credentials. The first set of credentials is known by the user, e.g. preexisting credentials for an enterprise-wide authentication system. Once a SaaS application is selected by the user, the SaaS usage proxy logs into the SaaS application using a second set of credentials. However, the second set of login credentials is encrypted and not known by the user, which causes the SaaS application to be accessible only through the SaaS usage proxy. This allows the SaaS usage proxy to monitor all usage of the SaaS application, even if multiple network-accessible devices are used to log into the SaaS usage proxy.
COMMUNICATION DATA ACCOUNT PROCESSING METHOD AND DEVICE THEREOF
A communication data account processing method is disclosed. The method includes: establishing a communication data account associated with a terminal user for the terminal user, and storing communication data resource information corresponding to the communication data account; receiving an operation instruction of the terminal user for the communication data account, the operation instruction including a mobile communication identifier; identifying a communication service provider corresponding to the mobile communication identifier; establishing a connection with a system interface of the communication service provider, and sending the mobile communication identifier and the operation instruction of the user to the system interface of the communication service provider; receiving response information of the system interface of the communication service provider; and performing an operation on the communication data account according to the response information. By using the present disclosure, a data allotment can be transferred conveniently without suffering any limitation due to an operator.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING AND MANAGING SUSPECT SUBSCRIBER BINDINGS
Methods, systems, and computer readable media for managing suspect subscriber bindings. In some examples, a method is performed by a Diameter signaling router (DSR) for a telecommunications network. The method includes binding a subscriber to a first policy and charging rules function (PCRF) server selected from a plurality of PCRF servers for the telecommunications network. The method includes determining that one or more messages destined to the first PCRF server have failed according to one or more user-configurable rules defining failure. The method includes tearing down the binding between the subscriber and the first PCRF server.
Methods Circuits Devices Systems and Functionally Associated Computer Executable Code to Support Edge Computing on a Communication Network
The present application discloses methods, circuits, devices, systems and functionally associated computer executable code to support edge computing on a communication network, such as a wireless access communication network. There are disclosed a data network architectures including: (a) at least one network core with one or more network elements to perform each of one or more network management functionalities; and (b) at least one network edge segment or zone including one or more access nodes, edge computing resources and a secure link gateway to convey to the core network elements information about data services provided by the edge computing resources to connected client devices.
Method and apparatus for verifying the correctness of a roaming account balance
This application discloses a roaming charging method and apparatus. A blockchain network stores information related to roaming fee settlement, to reduce a possibility that the information related to roaming fee settlement is tampered with. In addition, a digital signature algorithm is used to sign roaming service statistics to generate an abstract, to further prevent the roaming service statistics from being tampered with. In this way, when a home carrier verifies a roaming account balance by using the roaming service statistics and a roaming charging rule, accuracy of a verification result can be ensured, and the home carrier can obtain an accurate roaming fee of a user.
Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.
METHOD AND APPARATUS FOR IMPLEMENTING TELEPHONE PAYMENTS
There is provided a method of implementing a payment in relation to a telephone call between a customer and a merchant or service provider, the telephone call consisting of a signalling component and a media component. The method comprises, when establishing the telephone call, routing the signalling component to the merchant/service provider via a payment service system and routing the media component directly to the merchant/service provider. The method further comprises, at a communication management system of the merchant or service provider, sending an indication that the customer is required to make a payment to the payment service system and, at the payment service system, upon receipt of the indication that the customer is required to make a payment, using the signalling component of the telephone call to implement a redirection of the media component of the telephone call via the payment service system, extracting payment details of the customer from the redirected media component, and providing the payment details to a payment processing system to action the payment.
Destination device billing according to call recipient
A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices.
System and method for secure payment processing using subscriber identity module cards
The present disclosure relates generally to electronics systems, and more specifically to mobile communications systems and devices and including subscriber identification modules to which mobile currency, i.e. airtime minutes converted into mobile currency in pre-paid denominations from a telecommunications service provider, may be uploaded and used for payment transactions in a manner that is easier and more secure by providing a system and method related to a mobile phone having one or more subscriber identification module cards.