H04M15/8027

METHODS, SYSTEMS, AND DEVICES FOR MASKING CONTENT TO OBFUSCATE AN IDENTITY OF A USER OF A MOBILE DEVICE

Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.

Bandwidth throttling in a radio access network

Systems, methods, and software of managing bandwidth allocated to User Equipment (UE). In one embodiment, a bandwidth management system collects cell load information for a plurality of cells within a Radio Access Network (RAN), and processes the cell load information to determine a cell load status for each of the cells. The system performs bandwidth throttling for the UE by determining a location of the UE, identifying the cell load status for one or more cells in a region of the RAN corresponding with the location of the UE, determining whether the region of the RAN is overloaded based on the cell load status, and controlling a downgrade of bandwidth allocated to the UE in the RAN responsive to a determination that the region is overloaded.

LIMITING CONTACT IN A NETWORKED CONTACT CENTER ENVIRONMENT
20230143269 · 2023-05-11 ·

Certain exemplary aspects of the present disclosure are directed to a data-communications system including a networked contact center for which, in an example embodiment, a communication is received by a networked contact center. In determining whether to allow the communication to reach contact center resources, a contact rate value is examined. The contact rate value may represent an allowable quantity of contact within a time interval. For some example embodiments, a determination of whether the network contact center is to accept or reject the communication is made based on the contact rate value.

Quota allocation to subscribers based on consumption speed, location, allowance, or combinations of the same

It is provided a method, comprising monitoring if a request for granting a requested quota for a subscriber is received; calculating a quota consumption speed based on a consumption of a previous quota granted to the subscriber and a duration during which the previous quota is consumed; determining a determined quota size based on the quota consumption speed; granting a granted quota to the subscriber in response to the received request, wherein the granted quota has the determined quota size.

Systems and methods for reducing wireless network congestion
11689987 · 2023-06-27 · ·

A method for reducing wireless network congestion including receiving an initial request for network access from a mobile device and determining a customer support time period associated with an initial location. In response to receiving the initial request for network access, the method includes transmitting a request to a network node and receiving, from the network node, a rejection message denying access to the network. The method includes denying the initial request based on the rejection message. The method includes receiving a subsequent request for network access that includes a subsequent location. The method includes determining that identifying information associated with the subsequent request matches identifying information associated with the initial request. The method includes denying the subsequent request when the subsequent location is the same as the initial location and a request time of the subsequent request is outside the customer support time period.

SYSTEM, METHOD AND APPARATUS FOR SUBSCRIBER USER INTERFACES
20230188371 · 2023-06-15 ·

Methods, apparatus, and systems manage use of shared network resources among subscribers to a data communication service. In some implementations, a first metric is computed representing a subscriber's use of the shared network resources. A second metric may also be computed that represents the amount of network congestion of the shared network resources. Data derived from the first metric and the second metric may then be presented to the subscriber. The data may be transmitted to the subscriber over a network and/or the data may be displayed to the subscriber on an electronic display.

Limiting contact in a networked contact center environment
09838539 · 2017-12-05 · ·

This document discusses, among other things, limiting contact to a networked contact center that is a host to multiple tenants. In an example embodiment, a communication is received by a networked contact center. In determining whether to allow the communication to reach contact center resources, a contact rate value may be examined. The contact rate value may represent an allowable quantity of contact within a time interval. For some example embodiments, a determination of whether the network contact center is to accept or reject the communication is made based on the contact rate value.

SYSTEM AND METHOD FOR HYBRID NETWORK DATA CONSUMPTION TRACKING IN A WIRELESS NETWORK

Disclosed are systems and methods for intelligent, real-time network consumption tracking and traffic steering in fifth-generation (5G) networks via a network configuration and implementation. The disclosed hybrid network traffic steering is effectuated by using Diameter Routing Agent (DRA) and Subscriber Location Function (SLF) to route/steer fourth-generation (4G) network traffic by 5G subscribers to a 5G Charging Function (CHF) for 4G fallback network consumptions. Network currency consumption tracking is performed by the 5G CHF. The CHF dictates policy rules for 5G networks via the Policy Control Function (PCF) of the 5G Core, and dictates policy rules for 4G networks via the Policy and Charging Rules Functions (PCRF) for fallback sessions.

Reducing reauthorization request messages in communications networks

A method is provided in one example embodiment and includes evaluating by a first network node a current level of congestion experienced by a session in a communications network; predicting a level of congestion that will be experienced by the session beginning at a next time boundary; sending a request message to a second network node, the request message comprising at least one rule corresponding to the current level of congestion and the predicted level of congestion, in which the rule has associated therewith an activation time and a deactivation time; and refraining from sending an additional request message to the second network node at the next time boundary.

POLICY ENFORCEMENT IN A 3GPP ENVIRONMENT WHILE ENSURING CONGESTION AVOIDANCE ON USER PLANE FUNCTION NORTHBOUND INTERFACES

Systems and methods are provided for providing differential treatment to user traffic involving optimized reporting of start and stop traffic. The systems and method can include detecting, at a user plane function, an initiation of a type of traffic being performed at the user plane function, providing, by the user plane function, a start event trigger of the type of traffic detected by the user plane function to a session management function, and receiving, at the user plane function, a policy associated with the type of traffic from the session management function, the policy including instructions preventing submissions of subsequent event triggers to the session management function until an end of the type of traffic, the subsequent event triggers being associated with the type of traffic detected by the user plane function.