H04M15/73

Operational business service verification system
10044571 · 2018-08-07 · ·

A method and a system are described for providing operational business service verification in a telecommunication network. The method comprises the steps of: (i) receiving information which relates to transactions from a plurality of information sources, wherein the transactions are associated with one or more pre-defined applications; (ii) based upon the information received, determining whether that at least one pre-defined transaction criterion has been met; and (iii) if the at least one pre-defined transaction criterion has been met, providing verification of the legitimacy of the respective transaction that relate to that pre-defined application.

MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME

An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices. A services framework at the gateway device implements the communications and processing infrastructure for enabling service management, service configuration, and authentication of user of services at the intelligent gateway. The framework provides a storage and execution environment for supporting and executing received service logic modules relating to use, management, and support of the digital endpoint devices. Thus, the gateway device provides a network-based services point of presence for a plurality of digital endpoint devices at the premises.

Methods, systems, and products for monitoring service usage

Usage information is determined that describes usage of different services by a user device. A combined usage of the different services utilized by the user device is determined and compared to monitoring criteria. When the monitoring criteria are satisfied, an electronic message is sent to an address associated with the user device.

Detecting application leaks
10019582 · 2018-07-10 · ·

A method for detecting application leaks is described. In one embodiment, the method may include the method may include identifying a first application as a known application, assigning a first identifier to the first application, appending the first identifier to data generated by the first application, identifying a second application as an unknown application, assigning a second identifier to the second application, identifying a data usage by the second application, appending the second identifier to data associated with the data usage by the second application, and determining whether the data usage by the second application is associated with the data generated by the first application based at least in part on the first identifier and the second identifier. In some cases, the data usage includes at least one of generating data, modifying data, and transmitting data.

METHOD AND SYSTEM FOR DETECTING ANOMALIES IN CONSUMPTION OF DATA AND CHARGING OF DATA SERVICES
20180183939 · 2018-06-28 ·

System and method for detecting anomalies in the recorded consumption of data volume and charging of data services in a communication network is described. Data records for each session may be captured from multiple sources. The data records may comprise parameters indicating usage volume pertaining to services being consumed for each session. Further, the data records may be aggregated and reconciled to detect volume gap in each session. Each session may be categorized into a session category based upon the detection of the volume gap. The data records may further be enriched by tagging each data record with the session category. The data records enriched may then be aggregated across the parameters. Finally, a root-cause parameter for the volume gap pertaining to each session may be identified by computing a total volume, a total volume gap and a probability of gap root-cause for each parameter using the aggregated data records.

Routing of diameter protocol messages based on a subscriber policy

A device may determine a subscriber identifier associated with a subscriber device. The device may obtain a service indicator based on the subscriber identifier. The service indicator may identify a network service to which a subscriber, associated with the subscriber identifier, is subscribed. The device may obtain a charging data function (CDF) identifier based on the service indicator. The CDF identifier may identify a destination CDF for charging messages associated with the network service. The device may establish a communication session associated with the subscriber device and the network service. The device may transmit one or more charging messages, associated with the communication session, to the destination CDF identified by the CDF identifier.

Dynamic usage inequity detection and/or remedy
09979832 · 2018-05-22 · ·

An architecture that can dynamically detect and/or automatically remedy service usage inequities in a communications network is provided. For example, based upon a comparison of incoming call detail records (CDRs) to various subscriber information entities (e.g., service plan, blacklisted devices for the service plan, historic or current billing cycle usage, etc.), the architecture can identify when a usage inequity occurs or is likely to occur, substantially in real time.

System and method for tracking call billing
09961211 · 2018-05-01 · ·

Tracking a status of an ongoing call includes monitoring, by a computer of a contact center, the ongoing call that is connected with a human agent and that originated from a provider network and determining when an automated agent instead of the human agent is connected with the ongoing call. The computer of the contact center can then send a first message to the provider network, wherein the first message comprises first data indicative that the automated agent instead of the human agent is connected with the ongoing call.

SYSTEM AND METHOD FOR TRACKING CALL BILLING
20180115651 · 2018-04-26 ·

Tracking a status of an ongoing call includes monitoring, by a computer of a contact center, the ongoing call that is connected with a human agent and that originated from a provider network and determining when an automated agent instead of the human agent is connected with the ongoing call. The computer of the contact center can then send a first message to the provider network, wherein the first message comprises first data indicative that the automated agent instead of the human agent is connected with the ongoing call.

CHARGING PROCESSING METHOD AND SYSTEM, AND RELATED DEVICE
20240380625 · 2024-11-14 · ·

A charging processing method includes: when a charging processing device for a user service is unavailable, storing charging data of the user service during the failure period, where the charging data includes charging data that is not sent or charging data that is not processed; and after it is determined that a charging processing device for the user service transitioned from unavailable to available, sending a charging request message that includes the charging data during the failure period to the available charging processing device, so that the available charging processing device performs charging processing on the charging data before a charging processing device transitioned to available. In this method, when the charging processing device or a network is faulty, interruption of the user service can be avoided, and a loss caused for an operator can be avoided.