Patent classifications
H04M15/49
Security techniques for device assisted services
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
METHOD FOR PROVIDING ROAMING SERVICE BY USING BLOCKCHAIN AND APPARATUS THEREFOR
The present disclosure in some embodiments relates to a method and an apparatus for providing a roaming service, which more efficiently processes internetwork roaming services and settlements between different mobile communication network operators by using a blockchain and a smart contract.
WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES
Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.
METHOD AND SYSTEM FOR MULTI-OPERATOR ANCHOR SERVICE
A method, a device, and a non-transitory storage medium are described in which a multi-operator anchor service is provided. A multi-operator anchor device may provide a centralized user plane anchor for traffic of end devices associated with multiple networks and operators. The multi-operator anchor device may provide virtual routing and forwarding to isolate traffic among the networks and operators. The multi-operator anchor device may provide a charging service for traffic and a handover service based on end device mobility.
Wireless authorization and access network-neutral advice of charge techniques
Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.
Wireless authorization and access network-neutral advice of charge techniques
Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.
ADAPTIVE RESOURCE ALLOCATION TO FACILITATE DEVICE MOBILITY AND MANAGEMENT OF UNCERTAINTY IN COMMUNICATIONS
Communications services are provided to a device. For instance, where a communications resource is being used by a device via a first communications service provider (CSP) component associated with a first CSP, based on a probabilistic analysis of loading parameters received from a device at the first CSP component. A likelihood that the device will move can be predicted, comprising determining the likelihood is not less than a threshold likelihood. If likely to move, and based on the loading parameters, a loading profile associated with a user of the device is updated resulting in updated likelihoods of usages of the communication resource by the device via respective other CSP components other than the first CSP component. Further, based on the updated likelihoods of usages of the communication resource, at least part of the communications resource can be allocated to the respective other CSP components to facilitate communications with the device.
Volume-based online charging in hybrid networks
A method for enabling a charging of packet switched data transfer between an authorized customer and a network. The method includes transferring a total data volume via at least a first data path and a second data path between an equipment related to the authorized customer and a hybrid access aggregation point (HAAP) as an access to the network. Each of the at least a first data path and a second data bath use a different access technology for transferring its respective part of the total data volume. The total data volume is determined as a sum of the respective parts of the total data volume transferred in both the first path and the second path. The total data volume is used by a central charging unit for a charging.
Over the air provisioning of mobile device settings
A mobile device has a display, a memory, at least one processor, and executable instructions stored in the memory. The executable instructions, when executed by the at least one processor, (i) cause the mobile device to communicate over a cellular network with one or more remote servers to receive mobile network carrier option data for the mobile device, wherein the one or more remote servers are operated by an entity that is not a mobile network carrier identified by the mobile network carrier option data, (ii) display on the display, based on the received mobile network carrier option data, a user interface presenting a plurality of mobile network carriers, and (iii) in response to a selection, by a user of the mobile device from the user interface, of one of the plurality of mobile network carriers, cause the mobile device to be activated for use with the selected one of the plurality of mobile network carriers and enable access by the mobile device of wireless communication services provided by the selected one of the plurality of mobile network carriers for a service plan offered by the selected one of the plurality of mobile network carriers.
METHOD, APPARATUS AND SYSTEM OF CHARGING MANAGEMENT
A method, apparatus and system are provided for a charging management in the future network. An aspect of the disclosure provider for a charging method. Such a method includes receiving a charging request requesting for charging a service, wherein the service spans a plurality of network functions (NFs) operated by more than one providers, wherein the charging request includes an identifier (ID) of the requester, and wherein the more than one providers are untrusted by a consumer of the service. Such a method further includes sending a charging process request for a charging result according to the received information, the charging process request including the ID of the requester. Such a method further includes receiving the charging result indicating how to charge the service for the requester. Such a method further includes charging the service for the requester according to the received charging result.