Patent classifications
H04M15/48
Method and System for Location-Dependent Billing for Services
A method for location-dependent billing for a services that are available to a mobile terminal, a local communication connection is set up to a fixably installed external location tag with a corresponding wireless interface between the fixably installed tag and the mobile terminal, the method including the steps of accessing the external location tag and transmitting a billing rate code from the external location tag to the mobile terminal, forwarding the billing rate code from the mobile terminal to a central unit of a mobile communication network, in which the mobile terminal is logged, determining a geographic location identification of the external location tag by evaluation of the billing rate code at the central unit, and selecting a billing rate for billing for the service available to the user based on the billing rate code at the central unit.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Apparatus and method for providing mobile edge computing services in wireless communication system
The disclosure relates to a 5.sup.th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4.sup.th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.
SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
Trusted method for consuming and sharing Wi-Fi internet access
A method (and structure) to connect a mobile device to a local Wi-Fi network includes providing an input capability for a user of the mobile device to request to make a connection to a local Wi-Fi network. A processor on the mobile device retrieves, from a memory device of the mobile device, a listing of registered local Wi-Fi networks available at the user's current location. A request to connect to a selected one of the registered local Wi-Fi networks listed on the retrieved listing of registered local Wi-Fi networks is transmitted from the mobile device. The mobile device is connected to the selected registered local Wi-Fi network upon receipt of an indication by the selected registered local Wi-Fi network that the user has been validated and verified as trustable.
METHODS AND SYSTEMS FOR RELAYING A SENSITIVE INFORMATION DETAIL DURING A TELEPHONE CALL BETWEEN A USER'S TELEPHONE AND A RECIPIENT'S TELEPHONE
There is provided a method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, the user's telephone storing the sensitive information detail therein, the method comprising: initiating a telephone call between the user and the recipient; the user's telephone receiving a predetermined input; during the telephone call, the user's telephone accessing the sensitive information detail stored in the user's telephone based on the predetermined input; and the user's telephone audibly relaying to the recipient the accessed sensitive information detail, wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.
System and method for securing identity identifiers for data engineering processing
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
METHOD, APPARATUS AND SYSTEM OF CHARGING MANAGEMENT
A method, apparatus and system are provided for a charging management in the future network. An aspect of the disclosure provider for a charging method. Such a method includes receiving a charging request requesting for charging a service, wherein the service spans a plurality of network functions (NFs) operated by more than one providers, wherein the charging request includes an identifier (ID) of the requester, and wherein the more than one providers are untrusted by a consumer of the service. Such a method further includes sending a charging process request for a charging result according to the received information, the charging process request including the ID of the requester. Such a method further includes receiving the charging result indicating how to charge the service for the requester. Such a method further includes charging the service for the requester according to the received charging result.
Method and system for processing resource exchange information
A computer-implement method of processing resource exchange information includes the following steps: obtaining a data package including a user card identifier and a social network application identifier from a mobile phone; establishing a correspondence between the user card identifier and the social network application identifier and storing the correspondence in the computer system; obtaining user card data and resource exchange information from a payment terminal, wherein the user card data includes the user card identifier; performing security verification to the user card data and obtaining the corresponding social network application identifier when the security verification succeeds; processing a resource transfer request according to the social network application identifier and the resource exchange information and generating corresponding processing state information; and returning the corresponding processing state information to the payment terminal.
Cross-provisioning of mobile device capabilities in wireless communication networks and an OTA SIM update
Systems and methods discussed herein are directed to enabling users to remain in a first network billing system but access a second network for wireless communication network services. This occurs via an OTA update of a user's UE SIM, where the update changes the primary public land mobile network (PLMN) from the first network to the second network. Additionally, the network capabilities for the UE are cross-provisioned from the first network to the second network, where the first network provides a service or rate plan to the second network.