Patent classifications
H04M15/725
CALL PROCESSING SYSTEM FOR MODIFYING INMATE COMMUNICATION LIMITS
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
IDENTIFYING AND RESOLVING TELECOMMUNICATION NETWORK PROBLEMS USING NETWORK EXPERIENCE SCORE
The disclosed system identifies and resolves telecommunication network problems and/or problems with devices utilizing the network. The system segments the user devices into groups having similar characteristics, by grouping together devices more likely to leave the network, and devices less likely to leave the network. Each group of devices has a trained machine learning model, to predict the NEX score for each device. The system focuses on devices with a low NEX score. The system determines whether the problem is with the network and/or the problem is with the device. The system gathers information from network monitoring software and determine which tower caused, for example, the call to drop. The system determines technological capability of the device from the device TAC number. The system suggests solutions to the network problems by suggesting adding a sector, tuning an antenna, etc., or if the device has problems, adjusting phone settings.
System and method for securing identity identifiers for data engineering processing
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
Methods, systems and computer program products for determining root causes of detected anomalies in a telecommunications network
Methods for determining a cause of a detected anomalous event in a telecommunications system are provided. The methods include detecting an anomalous event in the telecommunications system and retrieving relevant call detail record (CDR) data associated with the detected anomalous event for at least one identified time interval responsive to detecting the anomalous event. The relevant CDR data includes both current CDR data for the at least one identified time interval and historical CDR data for past intervals corresponding to the at least one identified time interval. The relevant CDR data including the current CDR data and the historical CDR data is preprocessed and the preprocessed relevant CDR data is processed to determine a root cause of the detected anomalous event. Processing the preprocessed relevant CDR data includes comparing the current CDR data and the historical CDR data to determine the root cause of the detected anomalous event.
Method and system for quality-of-service authorization based on type of radio access technology and other data session attributes
A computer-implemented system and method for automated traffic flow control using quality of service authorization based on type of radio access technology and other parameters for one or more devices enabled for connectivity over cellular network are disclosed. The computer-implemented method includes receiving credit control request for the one or more devices from a subscriber; receiving quality of service (QoS) configuration authorized for the one or more devices for the subscriber from a configuration database; combining the authorized QoS parameters for the subscriber; comparing them against the requested QoS by the subscriber; and updating charging rules for the subscriber as an answer to the credit control request.
EVENT MANAGEMENT MECHANISM IN 5G SYSTEMS AND METHODS
Systems and methods for dynamically collecting information regarding network events in a 5G network are disclosed. The method includes locally storing event data initially and implementing post-event collection of the locally stored data when one or more collecting nodes become available.
CHARGING FILTERING FUNCTION
In one example, a charging filtering function may obtain a request for one or more rules that control whether or when one or more charging data records associated with a user equipment are to be provided to one or more billing systems. The request includes an identification of the user equipment. Based on the identification of the user equipment, the charging filtering function may identify the one or more rules. The charging filtering function may provide the one or more rules to control whether or when the one or more charging data records associated with the user equipment are to be provided to the one or more billing systems.
System for determining whether mobile subscribers are line holders or not
The present invention relates to a system for determining whether subscribers of mobile network operators are line holders for the line being used by them or not. The data collection unit, the data interpretation unit, the learning unit, the estimation unit and the database are included within the inventive system.
METHOD AND DEVICE OF CHARGING SESSION MANAGEMENT
Embodiments of the present disclosure provide a method of charging session management. The method comprises, at a first node of a communication system, receiving an indication of charging termination associated with a terminal device from a second node of the communication system, where the indication of charging termination at least specifies a time length; detecting traffic for the terminal device in response to receiving the indication of charging termination; and in response to the traffic for the terminal device being lower than a predetermined threshold, starting a timer for terminating a charging session of the terminal device after the time length. Embodiments of the present disclosure further provide a corresponding device.
BILLING METHOD AND APPARATUS IN WIRELESS COMMUNICATION SYSTEM
A method for billing in a wireless communication system, according to an embodiment, includes: transmitting billing data to an upper entity; determining whether the billing data has been normally transmitted; and executing a supplementary operation based on a result of the determining.