Patent classifications
H04M15/725
MESSAGE EXCHANGE SYSTEM
Disclosed are systems, methods, and non-transitory computer-readable media for selecting a routing provider that is best suited to deliver each individual message. The message exchange system selects a routing provider based on customer criteria provided by the customer, bids provided by the routing providers and/or performance of the routing providers. The message exchange system ranks the bids based on a ranking value calculated for each bid based on the cost value associated with the bid, the quality score of the associated routing provider and the customer criteria. The message exchange system selects a bid based on the resulting ranking values. For example, the message exchange system selects the bid that is ranked the highest based on the ranking values. The message exchange system then transmits the message to its intended recipient via the routing provider associated with the selected bid.
METHOD AND SYSTEM FOR QUALITY-OF-SERVICE AUTHORIZATION BASED ON TYPE OF RADIO ACCESS TECHNOLOGY AND OTHER DATA SESSION ATTRIBUTES
A computer-implemented system and method for automated traffic flow control using quality of service authorization based on type of radio access technology and other parameters for one or more devices enabled for connectivity over cellular network are disclosed. The computer-implemented method includes receiving credit control request for the one or more devices from a subscriber; receiving quality of service (QoS) configuration authorized for the one or more devices for the subscriber from a configuration database; combining the authorized QoS parameters for the subscriber; comparing them against the requested QoS by the subscriber; and updating charging rules for the subscriber as an answer to the credit control request.
SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING
Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.
Apparatus and method for the generation of charging information
The proposed solution relates to a method and an apparatus in a communication system. The solution comprises creating (400) a bearer for user terminal communication; transmitting (402) a credit control request message to Online Charging System, storing (404) the message to a transmission buffer, receiving (406) a credit control answer message as a reply to the request message and, if the credit control answer message comprises an error code: opening (412) a charging data record and timestamping the opening with the time the bearer was created, copying (414) the message from the transmission buffer to the charging data record, adding (416) information regarding rating groups affected by the error to the charging data record as containers and closing the containers and updating (418) result code-field of the charging data record according to the error code.
Access point connection method and terminal
Embodiments of this application relate to the communications field, and provide an access point connection method and a terminal, so as to preferentially connect to a traffic-free access point, reduce traffic consumption of a user, and improve video experience of the user. The method specifically includes: A terminal first obtains a charging type of each of at least one AP, where the AP charging type includes a traffic-free AP and a traffic-charged AP; and then the terminal selects an AP for connection based on the charging type of each of the at least one AP and an AP connection priority. A connection priority of the traffic-free AP is higher than that of the traffic-charged AP. This application is used to connect to an AP by a terminal.
Communications Method and Apparatus
A communications method and apparatus, the method including receiving, by a policy control network element, from a first session management network element, a policy request message, sending, by the policy control network element, to the first session management network element, according to the policy request message, policy information, where the policy information comprises a data network access identifier (DNAI), and establishing, by the first session management network element, according to the DNAI, a first user plane network element for a first protocol data unit (PDU) session for a terminal device.
Call Processing System for Modifying Inmate Communication Limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
Customized service plan generation
Systems, methods, and computer-readable media are described for generating customized service plans for a wireless telecommunications network. An operator of a wireless telecommunications network may allow users to access the network in accordance with a service plan, which may specify terms and conditions associated with usage of the network (e.g., types of usage, amounts of usage, geographic areas, associated mobile devices and users, subscription fees, etc.). Customized, user-specific service plans for the wireless network may be generated and implemented by determining that a user satisfies one or more criteria for applying service plan modifications. A user may be required to agree to specified conditions, such as upgrading a mobile device or subscribing for a specified time period, in order to accept a customized service plan. Multiple modifications may be applied to a base service plan, and plans and/or modifications for which the user is eligible may be identified.
Call processing system for modifying inmate communication limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
CERTIFICATION AND ACTIVATION OF USED PHONES ON A WIRELESS CARRIER NETWORK
Telecommunication services systems and methods are disclosed. The telecommunication services systems and methods preferably enable a buyer to certify and activate a used wireless telecommunications device. The systems and methods may also be employed to provide the buyer with specialized pricing options and other customized services.