H04M15/48

BLOCKCHAIN-BASED DATA VERIFICATION SYSTEM AND METHOD, COMPUTING DEVICE AND STORAGE MEDIUM
20210287216 · 2021-09-16 ·

The present specification provides a blockchain-based data verification system and method, a computing device, and a storage medium. The blockchain-based data verification system includes: a first verification system, a second verification system, and a first blockchain node and a second blockchain node on a blockchain network; the first verification system is configured to: collect first service data based on a predetermined condition and generate a first verification file including the first service data, and send a verification request to the second verification system; the second verification system is configured to: receive the verification request, verify the first service data with second service data in a local database of the second verification system, generate and send a verification result notification to the first verification system, and send successfully verified second service data in the local database to the first blockchain node on the blockchain network; wherein the first verification system is further configured to: receive the verification result notification, and send successfully verified first service data to the second blockchain node on the blockchain network.

Method and apparatus for providing roaming service
11128757 · 2021-09-21 · ·

A method of a roaming user equipment (UE) according to an embodiment of the disclosure includes obtaining billing information of the roaming UE from a message received from a communication carrier server, sending a billing information authentication request message including the obtained billing information to an authentication server, and receiving an authentication result regarding whether the billing information is valid.

Method and system for location-dependent billing for services
11102356 · 2021-08-24 · ·

A method for location-dependent billing for a services that are available to a mobile terminal, a local communication connection is set up to a fixably installed external location tag with a corresponding wireless interface between the fixably installed tag and the mobile terminal, the method including the steps of accessing the external location tag and transmitting a billing rate code from the external location tag to the mobile terminal, forwarding the billing rate code from the mobile terminal to a central unit of a mobile communication network, in which the mobile terminal is logged, determining a geographic location identification of the external location tag by evaluation of the billing rate code at the central unit, and selecting a billing rate for billing for the service available to the user based on the billing rate code at the central unit.

METHOD AND APPARATUS FOR IMPLEMENTING TELEPHONE PAYMENTS
20210224779 · 2021-07-22 ·

There is provided a method of implementing a payment in relation to a telephone call between a customer and a merchant/service provider, the telephone call consisting of signalling and media components. The method comprises, when establishing the telephone call, routing the signalling component to the merchant/service provider via a payment service system and routing the media component directly to the merchant/service provider. The method further comprises, at a communication management system of the merchant/service provider, sending an indication that the customer is required to make a payment to the payment service system and, at the payment service system, upon receipt of the indication, using the signalling component to implement a redirection of the media component via the payment service system, extracting payment details of the customer from the redirected media component, and providing the payment details to a payment processing system to action the payment.

APPARATUS AND METHOD FOR PROVIDING MOBILE EDGE COMPUTING SERVICES IN WIRELESS COMMUNICATION SYSTEM
20210282012 · 2021-09-09 ·

The disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.

SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
20210185498 · 2021-06-17 ·

In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.

Apparatus and method for providing mobile edge computing services in wireless communication system

The disclosure relates to a 5.sup.th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4.sup.th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.

TRACKING DEVICE IDENTIFICATION DATA AND ACCOUNT ACTIVITIES FOR ACCOUNT CLASSIFICATION
20210158348 · 2021-05-27 ·

Device identification data, network connection data, and other related data may be analyzed to determine an account classification, particularly before the account has even been used (or before extensive use has occurred). An account with direct or indirect access to databases may be created by a user, where a service provider may wish to assess the account's creation to detect if a bad actor is generating the account to engage in malicious computing actions or fraud. The account's creation data may be scored by an intelligent engine that detects malicious or fraudulent account creations, for example, based on whether a virtual private network is used to create the account, whether a VoIP phone number is being used, etc. The account may be monitored over a period of time and the account activities analyzed again to determine whether technical data associated with the account indicates a particular risk classification is appropriate.

Methods Circuits Devices Systems and Functionally Associated Computer Executable Code to Support Data Services from a Radio Access Network of a Wireless Communication Network to a Wireless Device Communicatively Coupled to the Communication Network
20210168633 · 2021-06-03 ·

The present application discloses methods, circuits, devices, systems and functionally associated computer executable code to support data services provided by one or more edge data service providers/applications running on edge computing resources, integral or otherwise functionally associated with a Radio Access Network (RAN) segment of a wireless communication network, to one or more wireless communication devices communicatively coupled to the wireless communication network through the RAN segment. Embodiments of the present invention include a wireless communication network comprising with at least one network core having one or more network elements to perform each of one or more network management functions, including to managing wireless communication device (User Equipment—UE) related information. The network also includes at least one network edge segment which includes: (a) one or more wireless access nodes to which a UE associated with the network can communicatively couple; and (b) at least one edge computing resource to provide one or more edge data services to a communicatively coupled UE. A network edge gateway between said network core and the network edge segment may include a tokenizer to generate UE specific tokens and to send the tokens to the at least one edge computing resource.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20210112046 · 2021-04-15 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.