Patent classifications
H04M15/49
Cross network authentication method and system
The described embodiments concern one or more methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps to authenticate mobile subscribers for using a foreign application when they are outside of their home telecom carrier's mobile network zone (“foreign zone”). A mobile subscriber can be authenticated through data roaming service, voice roaming service, and/or WiFi service. After cross network authentication, a mobile subscriber can use the foreign application to provide the same or similar services in a foreign zone, such as foreign country, through the home services in connection with the subscriber's home telecom carrier in a similar manner like he/she can use in his/her home zone, such as home country.
SYSTEM AND METHOD FOR MITIGATING INTERNATIONAL REVENUE SHARE FRAUD
Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.
Automated device provisioning and activation
There is provided a wireless end-user device including a wireless wide area network (WWAN) modem, a memory storing a WWAN network access policy including one or more first policy instructions associated with a first software application, and one or more processors to provide, using the WWAN modem, one or more network data traffic flows between the wireless end-user device and the WWAN, associate the first software application with a first one of the one or more network data traffic flows, and when (i) the wireless end-user device communicates or attempts to communicate data over the WWAN, and (ii) the first software application is associated with the first one of the one or more network data traffic flows, apply the one or more first policy instructions associated with the first software application to the first one of the one or more network data traffic flows.
Vehicle, network node, apparatus, computer program, and method for selecting a mobile communications system for a mobile communications service
A transportation vehicle, a network node, an apparatus, a computer program, and a method for selecting a mobile communications system for a mobile communications service. The method includes obtaining for each of multiple mobile communications services information on a required quality of service (rQoS) of the mobile communications services, determining for each of multiple mobile communications systems information on a predicted quality of service, and selecting from the multiple mobile communications systems a mobile communications system for each of multiple mobile communications services based on the information on the rQoS and the pQoS of the mobile communications system.
Over the air provisioning of mobile device settings
A mobile device has a display, a memory, an antenna, a transceiver connected to the antenna for communicating voice and data through a wireless communication system, at least one processor, and executable instructions stored in the memory. The executable instructions, when executed by the at least one processor, (i) cause the mobile device to communicate wirelessly with one or more remote servers; (ii) cause the mobile device to display on the display, a user interface for enabling the user of the mobile device to select a mobile network service provider; (iii) in response to a selection, cause the mobile device to be configured for use with a first one of a plurality of mobile network service providers and enable access by the mobile device of wireless communication service; and (iv) in response to a selection, cause the mobile device to be configured for use with a second one of the plurality of mobile network service providers and enable access by the mobile device of wireless communication service provided by the second one of the plurality of mobile network service providers for a service plan offered by the second one of the plurality of mobile network service providers.
Wireless authorization and access network-neutral advice of charge techniques
Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.
Automated device provisioning and activation
An end-user device including a service control device link agent, a memory configured to store a first encryption key, a modem configured to enable communications with a network system over a service control link, and a plurality of device agents communicatively coupled to the service control device link agent, each of the plurality of device agents identifiable by an associated one of a plurality of device agent identifiers. The service control device link agent configured to receive an encrypted agent message from a network element of the network system, decrypt the encrypted agent message, using the first encryption key, to obtain an agent message having a device agent identifier and message content for delivery to a device agent identified by the device agent identifier, the message content being from a server communicatively coupled to the network element, and deliver the message content to the device agent.
WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES
Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.
Network service plan design
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Automated Device Provisioning and Activation
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials.