H04M15/58

Method and apparatus for flexible and efficient analytics in a network switch

Embodiments of the present invention relate to a centralized network analytic device, the centralized network analytic device efficiently uses on-chip memory to flexibly perform counting, traffic rate monitoring and flow sampling. The device includes a pool of memory that is shared by all cores and packet processing stages of each core. The counting, the monitoring and the sampling are all defined through software allowing for greater flexibility and efficient analytics in the device. In some embodiments, the device is a network switch.

ADJUSTABLE AND DYNAMIC THRESHOLDS IN WIRELESS NETWORKS
20220321704 · 2022-10-06 ·

Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.

Method and Apparatus for Service Charging in a Communication Network
20230155849 · 2023-05-18 ·

Charging operations carried out in relation to service consumption by users of a communication network reduce signaling overhead and memory or storage requirements by adopting a bifurcated approach to structuring and accessing the data containers used for controlling and tracking service consumption by individual users commonly governed by the same consumption control information. With bifurcation, a parent data container holds the common consumption control information commonly applicable to each user, while an individual child data container for each user holds consumption-tracking information specific to the user. The approach reduces signaling overhead inasmuch as operations involving only the consumption control information need not retrieve or access the child data containers, and the approach reduces overall storage requirements by eliminating redundant inclusion of the common information in the child data containers.

INTERACTIVE VOICE RESPONSE USING INTENT PREDICTION AND, FOR EXAMPLE A 5G CAPABLE DEVICE
20230145947 · 2023-05-11 ·

Disclosed here is a method to determine a user intent when a user device initiates an interactive voice response (IVR) call with a wireless telecommunication network. A processor can detect the IVR call initiated with the network and determine whether the user device is a member of the network. Upon determining that the user device is a member of the network, the processor can obtain user history including interaction history between the user and the network. Based on the user history, the processor can predict the user intent when the user initiates the IVR call. The processor can detect whether user device is a 5G capable device. Upon the determining that the device is 5G capable and based on the predicted user intent, the processor can suggest to the user an application configured to execute on the user device and configured to address the predicted user intent.

Real-time usage detection of software applications

A system and method that allows for information relating to data and communication resource usage to be gathered and analyzed such that particular data transactions and usage of network accessible software applications can be classified based on purpose and/or type. Further, the system and method provide reporting based on amount of usage and/or purpose or type of usage so that associated costs and usage can be calculated applied and allocated to particular accounts, divisions, groups or individuals within and outside of a company or entity. Further, the system may disable features of or access to network accessible software applications based on lack or use, limited use or other metrics that fall outside of threshold ranges or values.

Upgrade recommendations for wireless wide area networks

A method to generate upgrade recommendations for wireless wide area networks may include receiving parameters associated with an existing network configuration, customer usage, and a network demand, and identifying recommendations for locations of potential new cell sites corresponding with sectors within a geographical region associated with the network, where the identifying is based on the existing network configuration and customer usage. The method may include predicting a performance impact on the network based on the recommendations for potential new cell site locations, and selecting network upgrades based on the recommendations for potential new cell site locations, the network demand, and the predicted performance impact.

SYSTEMS AND METHODS FOR PHONE NUMBER FRAUD PREDICTION

A method including: receiving one or more datasets indicating call activity corresponding to a phone number; analyzing the one or more datasets to identify unusual call activity; and generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

Information Processing Method and Apparatus
20230133980 · 2023-05-04 ·

An information processing method includes: obtaining, by a data analytics network element, terminal behavioral information of a plurality of terminals; determining, by the data analytics network element, network-side expected terminal behavioral information based on the terminal behavioral information; and sending, by the data analytics network element, the network-side expected terminal behavioral information to a user data management network element.

DETECTING FRAUD RINGS IN MOBILE COMMUNICATIONS NETWORKS

An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.