Patent classifications
H04M15/58
Update and procurement of telecom lines using automated reconciliation of device information
A system and method of performing automated reconciliation of devices and features in telecom expense management systems prior to running programs to optimize expense relative to usage or procuring new lines. The reconciliation accessing and carrier systems and devices and using enterprise configurable rules and live data from end point management systems. The system ensures accurate and up to date data is available for processing by downstream robotic process automation systems that perform the procurement/modification of plans and devices.
Detecting fraud rings in mobile communications networks
An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
SYSTEMS, METHODS AND COMPUTER READABLE MEDIUM FOR WIRELESS SOLICITATIONS
Product offering systems are provided. Product offering systems may include sending an offer to a customer that possesses a mobile computing device and has agreed to receive offers for products via the mobile computing device. Agreeing to receive offers would result in the unique data about the customer being available to offer provider. Unique customer data may include data related to the customers wireless service provider or from a financial account in a financial institution, and collecting customer data about the customer, wherein the customer data comprises financial data and personal data. Product offering systems may further include registering a wireless computing device of the customer to able the device to receive the offer, and determining opportunities to send the offer to the customer by monitoring the customer and the customer data. Product offering systems may also include sending the offer to the customer's registered device based on the determination of opportunities.
METHOD FOR DETECTING FRAUDULENT OR ABUSIVE USE OF A TELEPHONE SERVICE PROVIDED BY A TELEPHONE OPERATOR
Method for detecting fraudulent or abusive use of telephone services comprising the following steps: collecting data on telephone communication exchanges carried out over a given study period from/to telephone numbers and involving roaming and/or interconnection; creating individual files for compiling exchange data for each studied number; revaluing communications based on pre-established revaluation rules to obtain a wholesale cost amount for each studied number; a step E4 of identifying suspicious numbers for which the amount of wholesale costs exceeds a predetermined threshold value over the study period; a step E7 of detecting fraudulent use by analysing exchange data compiled in the files associated with the identified numbers and/or the multiparametric indicators obtained from said data.
Methods for detecting fraudulent or abusive use of telephone services.
METHOD FOR PREHEATING A RESOURCE FILE AND CENTRAL MANAGEMENT SYSTEM
The present disclosure discloses a method for preheating a resource file, and a central management system, and relates to the field of network communication technology. The method includes: according to historical bandwidth data of a target intermediate node, determining a bandwidth off-peak period of the target intermediate node; during the bandwidth off-peak period of the target intermediate node, pre-caching the resource file on an edge node corresponding to the target intermediate node.
Mobile WLAN gateway
A technique for operating a mobile station as wireless local-area network [“WLAN”] gateway. The mobile station is provided with a gateway application to control the following operations: activating (3-0) the WLAN means as a WLAN base station capable of communicating with at least one WLAN terminal over a WLAN network; creating a network identifier (3-2, 3-4) for the WLAN base station; assigning (3-8, 3-10) an internet protocol address for the at least one WLAN terminal; resolving domain name service [“DNS”] queries (3-12 . . . 3-18) in cooperation with an external DNS service system; assigning at least one port number for each protocol supported by the gateway application; and tunneling internet traffic (3-30 . . . 3-36) between the at least one WLAN terminal and an internet host over the broadband connection.
Decentralized computing networks, architectures and techniques for processing events across multiple channels
This disclosure relates to decentralized computing networks, architectures and techniques for collecting, analyzing, and processing data over multiple channels. A decentralized computing network comprises a plurality of computing nodes, each of which is dedicated to analyzing and processing events for a particular channel corresponding to a geographic region. Each node of the decentralized computing network can operate independently to process channel analysis data for a corresponding channel. The decentralized configuration of the nodes enables efficient processing of data collected over large geographic areas, increases the reliability of the system, and facilitates easy scaling of the system. Other embodiments are disclosed herein as well.
METHOD AND ARRANGEMENTS RELATING TO GROUP TRANSMISSION IN A WIRELESS COMMUNICATION NETWORK
Methods and devices for supporting charging relating to a group transmission in a wireless communication network. The group transmission involving a group of wireless devices configured to, via one or more direct communication links between each other, participate in transmission of user data between a source wireless device and the network. It is obtained, for each one of wireless devices of the group, a data amount indicator indicating how much data the wireless device has been involved in transmitting as part of the group transmission. It is provided one or more reports based on the obtained data amount indicators to one or more core network nodes.
Support for Threshold as Well as Quota Based Usage-Monitoring for the Same Monitoring Key
A method and computer readable media are disclosed to supply values for either/both of volume/time for usage-monitoring from/to PCRF for a particular usage monitoring key. In one embodiment, the method includes identifying a monitoring key AVP used by a PCRF to provide at least one of a volume usage threshold level for a Policy and Charging Enforcement Function (PCEF) and a time of usage threshold level for a PCEF; wherein the monitoring key includes at least one of a volume threshold total for the monitoring key; a volume quota uplink threshold for the monitoring key; a volume quota downlink threshold for the monitoring key; and a time threshold for the monitoring key; and supplying values for at least one of volume for usage-monitoring for a PCRF for a particular usage monitoring key; and time for usage-monitoring for a PCRF for a particular usage monitoring key.
System, method and apparatus for subscriber user interfaces
Methods, apparatus, and systems manage use of shared network resources among subscribers to a data communication service. In some implementations, a first metric is computed representing a subscriber's use of the shared network resources. A second metric may also be computed that represents the amount of network congestion of the shared network resources. Data derived from the first metric and the second metric may then be presented to the subscriber. The data may be transmitted to the subscriber over a network and/or the data may be displayed to the subscriber on an electronic display.