H04M15/56

Control of initial uplink grant based on random access request indicating planned initiation of packet-based real-time media session

Disclosed is a method and system that may help to expedite initiation of a packet-based real-time media session such as a VoIP session. Per the disclosure, the initial uplink grant that a base station provides to a UE in response to an access request may be an extent of uplink resources sufficient to carry just a radio-link-layer connection request. But when a UE is going to initiate a packet-based real-time media session, the UE may send a particular type of access request that is indicative of the plan to initiate a packet-based real-time media session, and responsive to the access request being of that particular type, the base station may then instead provide an initial grant of a greater extent of uplink resources sufficient to carry from the UE not only the radio-link-layer connection request but also a session initiation request (e.g., SIP INVITE) for the packet-based real-time media session.

Over the top network traffic classification

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.

Fraud detection on a communication network
09729727 · 2017-08-08 · ·

A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.

Node marking for control plane operation

A system assigns, to selected network devices in an intelligent transport network, a policy domain marker that identifies a particular network operation policy. The network devices that receive the policy domain marker delineate a region of enforcement for the particular policy. After an appropriate waiting period to permit the selected network devices to advertise their policy domain marker, the system distributes, to all network devices in the intelligent transport network that support control plane signaling or control plane routing, an enforcement signal to enforce the particular network operation policy for the delineated region.

METHOD AND APPARATUS FOR DATA CHANNEL AUGMENTED VOICE TELEPHONY SYSTEMS
20170279963 · 2017-09-28 ·

A computerized method of terminating audio telephone calls that provides the other party with more information as to why the telephone call was terminated. This method, which is particularly useful for computerized smartphones equipped with voice and data channel communications methods, automatically provides the user with a variety of different informative text messages that can be selected by the user and sent to the other party at the time that a voice call is terminated.

SYSTEM AND METHOD FOR MONITORING PROGRESS OF AUTOMATED CHAT CONVERSATIONS

In a system for managing chat automation, the system includes: a processor; and a memory coupled to the processor, wherein the memory stores instructions that, when executed by the processor, cause the processor to: receive a signal indicating a communication is being initiated by an end user operating an end user device; receive information from the end user device regarding the communication; select a conversation path based on the information regarding the communication; invoke an automated chat resource for engaging in a chat communication session with the end user device, wherein the automated chat resource is configured to follow the conversation path during the chat communication session; monitor confidence levels of automated chat responses during the chat communication session; and redirect the chat communication session to a second conversation path in response to at least one of the confidence levels falling below a threshold level.

Systems, methods, devices and arrangements for cost-effective routing
09769321 · 2017-09-19 · ·

A variety of methods, systems, devices and arrangements are implemented for assessing and/or controlling call routing for VoIP/VioIP calls. According to one such method, endpoint devices are used to monitor and/or assess the call-quality. The assessment is sent to a centralized server arrangement and call-routing is controlled therefrom. Endpoint devices employ a decentralized testing mechanism to further monitor and assess call quality including the use of test connections. Aspects of call quality are analyzed and attributed to endpoint devices and/or local connections or networks to distinguish intermediate routing issues from local/endpoint issues.

Method and apparatus for selecting a network access subscription

Various methods for selecting a network access subscription are provided. One example method includes receiving a request to participate in a communications session, determining that at least two subscriptions for network access are available, determining tariffs for one or more connection types that are available through each subscription, 5 determining cost factors for each connection type of the at least two subscriptions based on the tariffs, and selecting a target subscription and a target connection type for use in satisfying the request based on the cost factors. Similar and related example methods and example apparatuses are also provided.

Mobile electronic communications using internet protocol
11399099 · 2022-07-26 · ·

A database stores unique associations between account identifiers and mobile-network telephone numbers assigned by a mobile network to mobile communications devices. The account identifiers are also associated with voice-over-IP (VoIP) telephone numbers. Voice calls between the mobile communications devices are made as voice-over-IP (VoIP) calls using respective VoIP telephone numbers. Tracking of the VoIP calls is performed through the mobile network using respective mobile-network telephone numbers, so that a prepaid balance can be enforced.

OVER THE TOP NETWORK TRAFFIC CLASSIFICATION
20210392007 · 2021-12-16 ·

A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.