H04M15/59

INFORMATION PROCESSING SYSTEM
20210176365 · 2021-06-10 · ·

In a system in which a wireless access network and another network are connected to each other, an accurate fee may be charged in a case where data held in an application server disposed in the wireless access network is used. The application server may hold an application and data relating to the application. A usage mode information generating unit may generate usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit may measure a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit may charge a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.

Machine-to-machine network optimization and online charging

Systems and methods for improving efficiency in a mobile communications network are described. In one embodiment, a method for conserving network resources comprises releasing network resources related to a User Equipment (“UE”) session at one or more network nodes without notifying the UE. A subset of the session information that can be used to connect with the UE is stored at a network node. If data is received for the UE, the stored subset of information can be used to 1) establish network resources related to the UE that were previously released and 2) deliver the data to the UE. In another embodiment, shared data resources are granted to one or more subscribers associated with a Designated User Group (“DUG”). An online charging session is assigned to the DUG that identifies policy data for granting shared data resources to the Designated User Group.

Connected vehicle bandwidth-based network selection
11109308 · 2021-08-31 · ·

Generally described, one or more aspects of the present application correspond to techniques for dynamic management of the network used for data transfer between a connected vehicle and a remote computing system. For example, during navigation a connected vehicle may switch between connections to a number of different networks, and the pricing of these networks may be periodically recalculated based on current network load. The disclosed techniques can select from among available networks to dynamically optimize the cost of data transfer, even as a vehicle navigates through different networks and as network pricing is changed.

System and method for real time fraud analysis of communications data

A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.

Charging control in roaming scenario

A home SMF of a home PLMN receives a first message from a visited SMF of visited PLMN. The first message requests creation of a packet data unit (PDU) session of a wireless device. The first message comprises first charging policy information determined based on a first policy of the visited PLMN. The home SMF determines a second charging policy information for the PDU session based on the first charging policy information and a second policy of the home PLMN. The second charging policy information comprises: a charging method for the PDU session, and a charging parameter indicating a charging level for the PDU session. The home SMF sends a second message to the visited SMF. The second message comprises the second charging policy information.

METHOD AND SYSTEM FOR FAIRLY CHARGING TALK TIME OF VIDEO CALL THAT INTRODUCES NEW PERSON
20210127239 · 2021-04-29 · ·

A computer-implemented billing method including displaying, on a video call screen, video data related to a counterpart terminal with which a video call is connected, recognizing reaction information input from the counterpart terminal based on the video data related to the counterpart terminal displayed on the video call screen, and generating billing data related to the recognized reaction information of the counterpart terminal based on a billing policy may be provided.

Information processing system
10931830 · 2021-02-23 · ·

In a system in which a wireless access network and another network are connected to each other, an accurate fee is charged in a case where data held in an application server disposed in the wireless access network is used. The application server holds an application and data relating to the application. A usage mode information generating unit generates usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit measures a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit charges a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.

Trustful Service Traffic Handling in a Core Network Domain

A technique of configuring a core network domain of a wireless communication network for detection of service traffic that is to be trustfully handled in accordance with traffic handling information stored in a blockchain is provided. A method implementation of this technique comprises receiving, from a service provider, traffic detection information for service traffic that is to be handled in accordance with the traffic handling information. The method further comprises triggering an association, in the blockchain, of the received traffic detection information with the traffic handling information, and providing the traffic detection information to the core network domain for detecting the service traffic that is to be handled in accordance with the traffic handling information.

Machines and process for managing a service account

A machine and process for accepting customer payments and placing orders for telecommunications services is disclosed. The machine and process include a kiosk operable to accept account set-up information from an individual, accept payment from the individual, collect identifying data from the individual, and communicate with a system to activate a telecommunication account for the individual. The kiosk may be placed wherever quick telecommunication account set-up and payment verification is necessary, for example: a correctional facility or college campus.

System and method for real time fraud analysis of communications data

A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.