Patent classifications
H04M15/59
Emergency data statistics aggregation with data privacy protection
One disclosed method includes filtering incoming emergency data using at least one filtering criteria, as the emergency data is received in response to initiation of emergency events; generating at least one data bin representing a tally of emergency data meeting the at least one filtering criteria, without storing any of the emergency data used to generate the at least one data bin; and generating a statistical report using the at least one data bin. The statistical report may be generated real-time and displayed on a remote display.
MACHINE AND PROCESS FOR MANAGING A SERVICE ACCOUNT
A machine and process for managing restrictions of a wireless device associated with an inmate service account. The machine and process include a kiosk operable to exchange data with the wireless device, including limited-use restrictions related to: an inmate associated with the inmate service account, a correctional facility, and/or a parole requirement. The kiosk may also unlock the wireless device when the inmate is released from the correctional facility by removing the limited-use restrictions from the wireless device.
SYSTEM AND METHOD FOR ONLINE CHARGING TELECOMMUNICATION SERVICES IN REAL TIME
Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.
System and method for real time fraud analysis of communications data
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.
System and method for determining data usage in a converged charging system
Systems and methods described herein include receiving, at a network device and from a session management device, a first message that includes a first identifier associated with a subscriber and a second identifier associated with a first service that is charged using an online charging system. The network device transmits a second message that indicates a first time period in which to report data usage associated with the first service and a second time period in which to report data usage associated with one or more second services that are charged using an offline charging system. The network device receives first data usage information associated with the first service after the first time period and second data usage information associated with the one or more second services after the second time period. The network device processes the data usage information.
Toll-free telecommunications management platform
A method including receiving a natural language input and determining a telecommunications routing code based at least in part on the natural language input. The telecommunications routing code is associated with routing calls to a telecommunications number. The method further includes populating the telecommunications routing code at a node of a call routing decision tree to generate a populated call routing decision tree comprising a call routing template.
SYSTEM AND METHOD FOR ONLINE CHARGING TELECOMMUNICATION SERVICES IN REAL TIME
Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.
SYSTEM AND METHOD FOR REAL TIME FRAUD ANALYSIS OF COMMUNICATIONS DATA
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.
Charging Policy Information for a Home Session Management Function
A home session management function (SMF) of a home public land mobile network (PLMN) receives, from a visited SMF of a visited PLMN from a visited SMF of a visited PLMN, a request for creation of a packet data unit (PDU) session of a wireless device. The request comprises first charging policy information determined based on a first policy of the visited PLMN. The home SMF sends, to the visited SMF and based on the request, a second charging policy information comprising: a charging method for the PDU session; and a charging parameter indicating a charging level for the PDU session.
ADAPTIVE M2M BILLING
A computer implemented method, system and computer readable medium for use in machine to machine (M2M) or internet of Things (IoT) network including network devices are disclosed. The computer implemented method comprises providing a guaranteed price plan to a customer for a predetermined time period and learning about network device usage over the predetermined time period to provide a learned price plan. The computer implemented method also comprises determining a new price plan based on the learned price plan. Finally, the computer implemented method comprises utilizing the new price plan with customer's network devices.