Patent classifications
H04M15/48
Wireless Service Card Having Machine Readable Codes and Device and Process for Use Therewith
A process for authorizing wireless service includes providing a generally rectangular flat form factor card having a first surface and opposing second surface. The process further includes providing a machine-readable activation code arranged on the first surface, wherein the machine-readable activation code is configured to authorize the wireless service when provided to a system associated with a wireless service provider, receiving the machine-readable activation code in a server, the machine-readable activation code being captured by a wireless device, and provisioning the wireless service to the wireless device from a wireless network when the machine-readable activation code is provided to the system associated with the wireless network.
Usage tracking for software as a service (SaaS) applications
Various of the disclosed embodiments concern computer systems, methods, and programs for brokering logins to software as a service (SaaS) applications and tracking usage of the SaaS applications. First, a user, e.g. employee of an enterprise, logs into a SaaS usage proxy using a first set of credentials. The first set of credentials is known by the user, e.g. preexisting credentials for an enterprise-wide authentication system. Once a SaaS application is selected by the user, the SaaS usage proxy logs into the SaaS application using a second set of credentials. However, the second set of login credentials is encrypted and not known by the user, which causes the SaaS application to be accessible only through the SaaS usage proxy. This allows the SaaS usage proxy to monitor all usage of the SaaS application, even if multiple network-accessible devices are used to log into the SaaS usage proxy.
Methods and systems for relaying a payment card detail during a telephone call between a customer's telephone and a vendor's telephone
There is provided a method for relaying a payment card detail during a telephone call between a customer's telephone and a vendor's telephone, the customer's telephone storing the payment card detail therein, the method comprising: initiating a telephone call between the customer and the vendor; the customer's telephone receiving a predetermined input; during the telephone call, the customer's telephone accessing the payment card detail stored in the customer's telephone based on the predetermined input; and the customer's telephone audibly relaying to the vendor the accessed payment card detail, wherein audibly relaying to the vendor the accessed payment card detail comprises the customer's telephone converting, using at least one text-to-speech algorithm, the accessed payment card detail to an audible message containing the payment card detail and audibly relaying the audible message during the telephone call.
SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
Facilitation of follow-the-user data service for 5G or other next generation network
Follow-the-user (FTU) service can be implemented within a telecommunication data services platform to provide flexibility for end users to use their service subscriptions with any capable devices/vehicles. Currently, service subscriptions are generally tied to one device/vehicle that can be used to access the services, instead of the actual end user who uses the services. Therefore, a device/vehicle identifier can be utilized in accordance with an online billing and identification platform to identify end-user subscribers and associate their subscription services to a device/vehicle for which they are utilizing collect service usage, as well as to assign to its owner for the billing.
Methods and Systems for Relaying a Payment Card Detail During a Telephone Call Between a Customer's Telephone and a Vendor's Telephone
There is provided a method for relaying a payment card detail during a telephone call between a customer's telephone and a vendor's telephone, the customer's telephone storing the payment card detail therein, the method comprising: initiating a telephone call between the customer and the vendor; the customer's telephone receiving a predetermined input; during the telephone call, the customer's telephone accessing the payment card detail stored in the customer's telephone based on the predetermined input; and the customer's telephone audibly relaying to the vendor the accessed payment card detail, wherein audibly relaying to the vendor the accessed payment card detail comprises the customer's telephone converting, using at least one text-to-speech algorithm, the accessed payment card detail to an audible message containing the payment card detail and audibly relaying the audible message during the telephone call.
Roaming Charging Method and Apparatus
This application discloses a roaming charging method and apparatus. A blockchain network stores information related to roaming fee settlement, to reduce a possibility that the information related to roaming fee settlement is tampered with. In addition, a digital signature algorithm is used to sign roaming service statistics to generate an abstract, to further prevent the roaming service statistics from being tampered with. In this way, when a home carrier verifies a roaming account balance by using the roaming service statistics and a roaming charging rule, accuracy of a verification result can be ensured, and the home carrier can obtain an accurate roaming fee of a user.
System and method for secure billing for IMS-based VoIP networks
Methods and systems for independent security scrubbing and billing of calls through an IP Multimedia Core Network Subsystem (IMS) are provided. The system includes a core IMS network and a security network cloud securely connected via session border controllers. The IMS network is configured to route calls to the security network cloud. The security network includes call-processing and billing servers that implement security checks on calls from OSI model layer three to seven and analyze the call to collect and generate billing data. After successful security and billing operations, the call is routed back to the IMS network for handling according to conventional workflows. Accordingly, the disclosed invention serves to enhance security for IMS traffic, improve the accuracy of customer billing and conserves IMS network resources which would otherwise be consumed by malicious attacks and billing responsibilities.
Smart cascading security functions for 6G or other next generation network
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
Methods Circuits Devices Systems and Functionally Associated Computer Executable Code to Support Edge Computing on a Communication Network
The present application discloses methods, circuits, devices, systems and functionally associated computer executable code to support edge computing on a communication network, such as a wireless access communication network. There are disclosed a data network architectures including: (a) at least one network core with one or more network elements to perform each of one or more network management functionalities; and (b) at least one network edge segment or zone including one or more access nodes, edge computing resources and a secure link gateway to convey to the core network elements information about data services provided by the edge computing resources to connected client devices.