Patent classifications
H04M15/725
Parallel and sequential execution of automated online charging test procedures
Systems and methods are described herein for performing automated testing of online charging systems associated with telecommunications networks. In some embodiments, the systems and methods utilize various components associated with an online charging system, such as an event mediator, to convert data associated with test cases to be simulated by the online charging system (e.g., data from spreadsheets) into various test requests actionable during the online charging system under when simulating the test cases.
CALL PROCESSING SYSTEM FOR MODIFYING INMATE COMMUNICATION LIMITS
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
Call processing system for modifying inmate communication limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
OVERLOAD CONTROL HANDLING IN CASE OF AN OVERLOAD STATE OF A CHARGING ENTITY
The present invention provides apparatuses, methods, and computer program products regarding overload control handling in case of an overload state of a charging entity. The method comprises controlling a charging control session with a charging entity, receiving an overload report from the charging entity, and preventing to send any charging related request messages to the charging entity until a predetermined period has elapsed.
Custom mobile telecommunication device configuration management
A method of managing a custom configuration manifest, comprising: collecting by an application configuration selections about a user equipment (UE) that are dynamically configured to create the custom configuration manifest; processing by a server the configuration selections and dynamically configuring the configuration selections to create the manifest; transmitting by the server the manifest to both the UE and a database with a plurality of custom configuration manifests; receiving by a custom configuration manifest handling application authorization through one or more authorization options, but not authentication credentials, to allow the manifest handling application to install preferred applications on the UE; installing by the manifest handling application the preferred applications on the UE without providing the authentication credentials; and customizing by the manifest handling application the UE based on the manifest.
System and method of enhancing a mobile device upgrade offer
In an embodiment, a system comprises an application that is configured to identify features of a current mobile service plan associated with a current mobile device, wherein the features of the current mobile service plan comprises at least an amount of time remaining on a current mobile service plan contract, identify different mobile devices, wherein identifying the different mobile devices comprises identifying a retail price for each of the different mobile devices generate an available price for each of the different mobile devices based on at least the features of the current mobile service plan associated with the current mobile device and the retail price for each of the different mobile devices, and to provide the generated available price for each of the different mobile devices to a user associated with the current mobile device.
DATA PACKET PROCESSING METHOD AND APPARATUS
A data packet processing method and apparatus is disclosed. According to the method, a storage apparatus disposed on a network side stores a correspondence between an identifier and data flow characteristic information. When configuring a policy for a data packet including a first identifier, a network-side device requests the storage apparatus for data flow characteristic information corresponding to the first identifier. A PCEF receives a data packet that is sent by UE, matches the data packet against the data flow characteristic information, and when the data packet matches the data flow characteristic information, executes a policy on the data packet according to policy information corresponding to the first identifier. According to the method provided in embodiments of the present disclosure, transmitting a considerable amount of data flow characteristic information on an interface of an SCEF is avoided, and load on the SCEF is relieved.
Detecting application leaks
A method for detecting application leaks is described. In one embodiment, the method may include the method may include identifying a first application as a known application, assigning a first identifier to the first application, appending the first identifier to data generated by the first application, identifying a second application as an unknown application, assigning a second identifier to the second application, identifying a data usage by the second application, appending the second identifier to data associated with the data usage by the second application, and determining whether the data usage by the second application is associated with the data generated by the first application based at least in part on the first identifier and the second identifier. In some cases, the data usage includes at least one of generating data, modifying data, and transmitting data.
USAGE-BASED BANDWIDTH OPTIMIZATION
Systems, graphical user interfaces, and methods are provided to optimize bandwidth usage associated with a local network. As part of the bandwidth optimization techniques, a network regulation entity may maintain a plurality of usage statistics for a plurality of electronic devices. These usage statistics may be presented by an electronic device as part of a usage summary interface. In addition to displaying the usage statistics, the usage summary interface may enable a user to modify how the network regulation entity regulates traffic. Accordingly, the network regulation entity may update an access profile in accordance with the modification. Subsequently, the traffic received from the electronic device is processed based on the user-indicated modification. Thus, compliance with network neutrality principles may be maintained.
Call processing system for modifying inmate communication limits
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.