H04M15/50

SYSTEMS AND METHODS FOR UPDATING EMAIL ADDRESSES BASED ON EMAIL GENERATION PATTERNS

The present disclosure relates to systems and methods for updating email addresses based on email generation patterns. The method includes accessing a plurality of electronic activities used to update a plurality of member node profiles. The method includes determining that the plurality of member node profiles is linked to a group node profile of a group entity. The methods includes identifying, for each of the plurality of member node profiles, a first field-value pair of the member node profile corresponding to an email address. The method includes determining, for each member node profile, a correlation between the email address, a second field-value pair corresponding to a first name and a third field-value pair corresponding to a last name. The method includes determining, based on the determined correlation, an electronic account identifier pattern. The method includes storing an association between the group node and the electronic account identifier pattern.

SYSTEMS AND METHODS FOR DETECTING EVENTS BASED ON UPDATES TO NODE PROFILES FROM ELECTRONIC ACTIVITIES

The present disclosure relates to methods, systems, and storage media for detecting events based on updates to node profiles from electronic activities. Exemplary implementations may access an electronic activity transmitted or received via an electronic account associated with a data source provider; generate a plurality of activity field-value pairs; maintain a plurality of node profiles; identify a first state of a first node profile of the plurality of node profiles; update the first node profile using the electronic activity; identify a second state of the first node profile subsequent to updating the first node profile using the electronic activity; detect a state change of the first node profile based on the first state and the second state; determine that the state change satisfies an event condition; and store an association between the first node profile and an event type corresponding to the event condition.

SYSTEMS AND METHODS OF GENERATING AN ENGAGEMENT PROFILE

The present disclosure relates to systems and methods for determining an engagement profile of a participant by associating electronic activities to a profile. It may generate the engagement profile based on analysis of the electronic activity level. An example implementation may contain the following steps. The system may access for a first record object a plurality of electronic activities linked with the first record object. The system may identify for a participant from the plurality of electronic activities a set of electronic activities including the participant. The system may determine an engagement profile of the participant based on a first number of electronic activities of the set of electronic activities sent by the participant, a second number of the set of electronic activities received by the participant and a temporal distribution of the set of electronic activities. The system may store the engagement profile in one or more data structures.

APPARATUS AND METHOD FOR PROVIDING MOBILE EDGE COMPUTING SERVICES IN WIRELESS COMMUNICATION SYSTEM
20210282012 · 2021-09-09 ·

The disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.

Systems and methods for generating node profiles using electronic activity information

The present disclosure relates to systems and methods for generating new node profiles using information from electronic activities. The system is configured to maintain node profiles corresponding to unique entities; access electronic activities transmitted or received via electronic accounts associated with data source providers; identify a first email address of a sender and second email addresses of respective recipients of an electronic activity; identify that the first email address matches a value of a field of a first node profile; link the electronic activity to the first node profile; determine that a second email address of a respective recipient of the electronic activity cannot be matched to any node profile associated with the respective participant; and generate, responsive to determining that the electronic activity cannot be matched to any node profile of the plurality of node profiles, a new node profile including the second email address of the respective recipient.

CROSS NETWORK AUTHENTICATION METHOD AND SYSTEM

The described embodiments concern one or more methods, systems, apparatuses, and computer readable mediums storing processor-executable process steps to authenticate mobile subscribers for using a foreign application when they are outside of their home telecom carrier's mobile network zone (“foreign zone”). A mobile subscriber can be authenticated through data roaming service, voice roaming service, and/or WiFi service. After cross network authentication, a mobile subscriber can use the foreign application to provide the same or similar services in a foreign zone, such as foreign country, through the home services in connection with the subscriber's home telecom carrier in a similar manner like he/she can use in his/her home zone, such as home country.

Systems and methods for updating email addresses based on email generation patterns

The present disclosure relates to systems and methods for updating email addresses based on email generation patterns. The method includes accessing a plurality of electronic activities used to update a plurality of member node profiles. The method includes determining that the plurality of member node profiles is linked to a group node profile of a group entity. The methods includes identifying, for each of the plurality of member node profiles, a first field-value pair of the member node profile corresponding to an email address. The method includes determining, for each member node profile, a correlation between the email address, a second field-value pair corresponding to a first name and a third field-value pair corresponding to a last name. The method includes determining, based on the determined correlation, an electronic account identifier pattern. The method includes storing an association between the group node and the electronic account identifier pattern.

Apparatus and method for providing mobile edge computing services in wireless communication system

The disclosure relates to a 5.sup.th generation (5G) or pre-5G communication system for supporting a data transmission rate higher than that of a 4.sup.th generation (4G) system, such as long-term evolution (LTE). The disclosure relates to authentication and authorization for edge computing applications, and an operation method of a user equipment (UE) in a wireless communication system. The method may include transmitting, to a server, a first message including at least one of information related to the UE or a type of user agent, performing an authentication procedure for an edge computing service according to an authentication method determined based on the first message, receiving a second message indicating authority granted to the edge computing service, based on an authentication code generated by the server according to the performed authentication procedure, and using the edge computing service in a range corresponding to the granted authority.

FINANCIAL SETTLEMENT SYSTEM FOR OWNER-OPERATED WIRELESS NETWORKS
20210160378 · 2021-05-27 ·

A system and method that matches owner-operated wireless radios to a carrier network for voice and data services, using a marketplace model that geographically identifies and values the need for such radios and allows owners to claim rights to operate such radios. The purpose of the settlement system is to encourage individuals and businesses to operate a wireless radio to enhance a carrier network, establishing greater coverage and additional access points for wireless carriers, whilst the owner is compensated for the operations of one or more wireless radios based on radio usage. In the next generation of wireless networks, the number of wireless radios is expected to significantly increase, causing resource constraints for carriers to secure land and permits to install wireless radios. By utilizing the system, carriers may build networks faster by leveraging owners who assist with the installation and operation of radios, as an owner-operated network.

SYSTEMS AND METHODS FOR SELECTIVE PROVISIONING OF A CHARGING FUNCTION IN A WIRELESS NETWORK
20210152380 · 2021-05-20 ·

A system described herein may provide for the selection of a charging function (“CHF”) associated with a particular user equipment (“UE”). A particular CHF may be selected, from a group of candidate CHFs, based on CHF selection criteria respectively associated with the candidate CHFs and attribute information associated with the UE. The attribute information may describe attributes of the UE, profile information associated with the UE, and/or attributes of traffic and/or bearers associated with the UE.