Patent classifications
H04M15/88
Automated device provisioning and activation
Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a communications device stores a set of device credentials for activating the communications device for a service on a network; and sends an access request to the network, the access request including the set of device credentials.
BUDGETING AND QUOTA MANAGEMENT SYSTEM FOR DATA CONSUMPTION
Systems and methods may provide for establishing a data usage budget based on one or more of user input and historical usage data, wherein the data usage budget distinguishes between usage types and distinguishes between connection types. Additionally, a data usage of one or more client devices may be monitored in accordance with the data usage budget. In one example, the usage types are designated as one or more of a high bandwidth usage and a low bandwidth usage, and the connection types are designated as one or more of a capped connection and a nan-capped connection.
Functions and method for handling a credit pool of service units
The embodiments herein relate to a method performed by a Control Plane (CP) function (401) for handling a credit pool comprising granted service units to be used by multiple services. The multiple services are grouped in at least one first Rating Group (RG). The CP function (401) creates an individual Usage Reporting Rule (URR) for each of the at least one first RG. Each individual URR comprises a first credit pool threshold. The CP function provides the individual URRs to a User Plane (UP) function (405). The CP function (401) creates a Usage Reporting Rule for the Credit Pool (URR CRPL). The URR CRPL comprises instructions to the UP function (405) to aggregate service unit usage for all individual URRs for all first RGs. The URR CRPL further comprises the first credit pool threshold. The CP function (401) provides the URR CRPL to the UP function (405).
Data cap management of super heavy users based on monthly usage and service plan limits
An apparatus and method for data cap management of users exceeding or violating bandwidth policies in a communication system. A model is created for identifying super heavy users, and trained usage data for all current users of the communication system for a predetermined time interval. Usage patterns of each user are analyzed over a second duration using the trained model in order to identify current super heavy users based, at least in part, on the analysis. Traffic flow control restrictions are then applied to some or all of the traffic associated with identified super heavy users.
INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes a processor configured to calculate allocations of a profit from a service to a plurality of entities involved in provision of the service by referring to involvement information stored in a memory, the involvement information indicating involvement of each of the plurality of entities in the provision of the service, and output the calculated allocations.
Systems and methods for reducing wireless network congestion
A computer-implemented method for reducing wireless network congestion comprising receiving an initial request for network access from a mobile device and transmitting a request to a PCRF. The method includes receiving, from the PCRF, a rejection message denying access to data, and denying the initial request for network access based on the rejection message. The method includes, in response to receiving the rejection message, storing information identifying the mobile device and the user associated with the initial request. The method includes receiving a subsequent request for network access, and scanning the memory to determine that identifying information associated with the subsequent request for network access matches the stored information associated with the initial request for network access. Based on the matching stored information associated with the initial and subsequent requests for network access, the method includes denying the subsequent request for network access.
Methods, apparatus and machine-readable mediums relating to charging in a communication network
One aspect provides a method performed by a network node implementing a network function repository function in a core network. A registration request message to register a CHF in a repository of network functions is received, the registration request message includes an indication of one or more sets of charging characteristics supported by the CHF and addressing information to reach the CHF. Each CHF in the repository is registered. A discovery request message including one or more search parameters for identifying a CHF, including at least an indication of a set of charging characteristics to be applied for the packet data connection is received. A CHF that supports the indicated set of charging characteristics is identified based on the one or more search parameters. A discovery response message comprising the addressing information to reach the identified CHF is transmitted.
SYSTEMS AND METHODS FOR REDUCING WIRELESS NETWORK CONGESTION
A method for reducing wireless network congestion including receiving an initial request for network access from a mobile device and determining a customer support time period associated with an initial location. In response to receiving the initial request for network access, the method includes transmitting a request to a network node and receiving, from the network node, a rejection message denying access to the network. The method includes denying the initial request based on the rejection message. The method includes receiving a subsequent request for network access that includes a subsequent location. The method includes determining that identifying information associated with the subsequent request matches identifying information associated with the initial request. The method includes denying the subsequent request when the subsequent location is the same as the initial location and a request time of the subsequent request is outside the customer support time period.
ACHIEVING SEAMLESS SERVICE DURING UNREACHABILITY OF CHARGING FUNCTION ENTITY
In one example, a session management function entity is configured to obtain an indication of a backup resource usage quota associated with a rating group of a user session for a user equipment configured to communicate via a mobile core network. The rating group is subject to online charging. The session management function entity determines that a charging function entity configured to provide an indication of a primary resource usage quota associated with the rating group is unreachable. In response to determining that the charging function entity is unreachable, the session management function entity allocates the backup resource usage quota associated with the rating group while the charging function entity is unreachable.
Methods, systems and computer readable media for selecting and delivering electronic value certificates using a mobile device
Methods, systems, and computer readable media for selecting and delivering an electronic value certificate to a mobile device are disclosed. According to one aspect, the method includes utilizing a certificate selection device to generate electronic certificate selection information and providing the electronic certificate selection information and associated recipient data to a merchant server. From the merchant server, electronic value certificate data derived from the certificate selection information is received. The method also includes establishing a communications link with a mobile device corresponding to the recipient data. The electronic value certificate data is provisioned on the mobile device over the communications link via over the air (OTA) communications.