H04M15/8038

Method and apparatus for establishing guaranteed bit rate (GBR) quality of service (QoS) flow in session

A method includes receiving, by a session management function (SMF), first information from an access and mobility management function (AMF), obtaining, by the SMF, protocol data unit (PDU) session management subscription information from a unified data management (UDM) module, and when dynamic policy and charging control (PCC) is not deployed, establishing, by the SMF based on the first information and at least one of the PDU session management subscription information and local PDU session policy information of the SMF, a default GBR QoS flow in the PDU session.

Systems and methods for enabling optimized reporting related to policy control request triggers

A first network device may receive, from a second network device, a first policy control create request and may provide, to the second network device, a common policy control request trigger. The first network device may receive a second policy control create request associated with a user equipment (UE) and may cause a UE policy to be provided to the UE. The first network device may receive, from a third network device, a third policy control create request and may provide a network device policy to the third network device. The first network device may receive, from the second network device, a policy control update request based on the common policy control request trigger and may generate an updated UE policy or an updated network device policy based on the policy control update request.

METHOD FOR DETECTING FRAUDULENT OR ABUSIVE USE OF A TELEPHONE SERVICE PROVIDED BY A TELEPHONE OPERATOR
20230120157 · 2023-04-20 ·

Method for detecting fraudulent or abusive use of telephone services comprising the following steps: collecting data on telephone communication exchanges carried out over a given study period from/to telephone numbers and involving roaming and/or interconnection; creating individual files for compiling exchange data for each studied number; revaluing communications based on pre-established revaluation rules to obtain a wholesale cost amount for each studied number; a step E4 of identifying suspicious numbers for which the amount of wholesale costs exceeds a predetermined threshold value over the study period; a step E7 of detecting fraudulent use by analysing exchange data compiled in the files associated with the identified numbers and/or the multiparametric indicators obtained from said data.

Methods for detecting fraudulent or abusive use of telephone services.

Event subscription notification
11632472 · 2023-04-18 · ·

Systems, methods, apparatuses, and computer program products for event subscription notification(s) are provided. One method may include providing, from a first network entity, a policy control request trigger about subscriptions for event exposure to a second network entity. The method may also include receiving a notification, from the second network entity, about the policy control request trigger, and installing or updating at least one policy and charging control (PCC) rule based on the information received in the notification from the second network entity.

ELECTRONIC DEVICE AND METHOD FOR REGISTERING EXTERNAL DEVICE USING DEVICE INFORMATION
20220330357 · 2022-10-13 ·

An electronic device is provided. The electronic device includes a display, a communication module, a memory, and a processor configured to receive external device information by establishing a communication connection with a server using the communication module, display a graphic object indicating an external device corresponding to the received external device information on the display, provide a configuration user interface (UI) capable of changing configuration information of the external device based on a user input for the graphic object, store the changed configuration information of the external device based on a user input for the configuration UI, obtain a plurality of device information by searching the external device, establish the communication connection by selecting the device corresponding to the external device information among the plurality of device information, and transmit the stored configuration information to the external device through the communication connection.

System and method for network initiated embedded subscriber identity module profile changes

An information handling system may include a processor; a memory; a network interface device to communicatively couple the information handling system to a first wireless communication networks of a plurality of wireless communication networks; an embedded subscriber identity module (eSIM) to provide data descriptive of wireless communication network-specific information to authenticate the information handling system; and an eSIM profile switching module to: monitor for signal strengths of each of a plurality of wireless communication networks. Upon discovering that the first wireless communication network has insufficient quality of service to sustain data transmission, send a request to a wireless communication network switching utility at a core communication network requesting roaming during a switch between the eSIM profile for a default wireless communication network to the second wireless communication network; and switch communication to the second wireless communication network while avoiding wireless service interruption with roaming if available.

Telephony application server charging for evolved packet system fallback

A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.

Manual roaming and data usage rights
11470204 · 2022-10-11 · ·

Disclosed is a 5G or pre-5G communication system to be provided to support a data transmission rate higher than that of a 4G communication system such as LTE. The present disclosure relates to a session management method through selection of a roaming operator and utilization of data usage rights of a local operator by a user in a 5G system. The user selects the local operator by switching the operator to a manual mode during roaming, accesses a data usage rights purchase agency through a limited service provided by the operator and then purchases the data usage rights of the local operator, and connects to a data network through authentication of a session by using authentication information included in the data usage rights.

EVOLVED PACKET CORE TO 5G CORE ROAMING USING N9 INTERFACE

A system is provided for supporting roaming between LTE EPC network and 5G network of a first mobile network operator by 5GC network of a second network operator. The system may include the EPC network including a serving gateway in communication with a 4G base station being in the EPC network. The system may also include the 5G network of the first mobile network operator including a vSMF in communication with a 5G base station being in the 5G network of the first network operator. The system may also include the 5GC network of the second network operator including a hSMF. The vSMF is configured to receive a communication from the serving gateway to anchor mobility between the LTE EPC network and the 5G network of the first mobile network operator, and to communicate with the hSMF in the 5GC network of the second network operator using 5G roaming interfaces.

System, method, and computer program for providing device centric payment authorization in roaming conditions
11470203 · 2022-10-11 · ·

A system, method, and computer program product are provided for providing device centric payments in roaming conditions. In operation, a device requests service from a visiting communication network. The device provides an identity associated with the device. The device records an amount of service utilized (e.g. utilizing blockchain technology, etc.). The device submits the amount of service utilized to the visiting network or to a blockchain, such that the visiting network is capable of determining whether the amount of service utilized recorded by the device is similar to an amount of service usage measured by the visiting network (e.g. when an established credit limit available has been utilized, etc.).