Patent classifications
H04M15/8207
INFORMATION PROCESSING SYSTEM
In a system in which a wireless access network and another network are connected to each other, an accurate fee is charged in a case where data held in an application server disposed in the wireless access network is used.
The application server holds an application and data relating to the application. A usage mode information generating unit generates usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit measures a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit charges a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.
TIME-BASED NANO-TRANSACTION SYSTEM FOR REDUCING UNSOLICITED COMMUNICATIONS
A telecommunications system for selectively connecting originator nodes to recipient nodes includes an account database with one or more accounts each associated with corresponding ones of the originator nodes and the recipient nodes. There is a contacts database with recipient contact lists each associated with a specific one of the accounts of the recipient nodes. A transaction processor is receptive to an incoming telecommunications initiation request, which includes a recipient node identifier and a nano-transaction payment submission defined at least by a payment amount. The transaction processor responsively directs the establishment of the telecommunications link between the one of the originator nodes and the one of the recipient nodes upon receipt of the telecommunications initiation request. The nano-transaction payment submission is settled based at least in part upon an active duration of the telecommunications link.
Information processing system
In a system in which a wireless access network and another network are connected to each other, an accurate fee is charged in a case where data held in an application server disposed in the wireless access network is used. The application server holds an application and data relating to the application. A usage mode information generating unit generates usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit measures a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit charges a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.
METHOD AND APPARATUS FOR PROVIDING BIG DATA ANALYSIS SERVICE, AND COMPUTER READABLE STORAGE MEDIUM
Provided are a method and apparatus for providing a big data analysis service, and a computer readable storage medium. The method for providing a big data analysis service includes: generating, by network data analytics, big data information according to network operation and maintenance data, and sending the big data information to an application through a network exposure function.
INCREASING PROCESSING CAPACITY OF PROCESSOR CORES DURING INITIAL PROGRAM LOAD PROCESSING
According to one or more embodiments of the present invention, a computer-implemented method includes allocating a set of computing resources to a first partition from a plurality of partitions in a computer server, and monitoring a usage duration of the set of computing resources by the first partition. The method further includes generating a billing statement based on the usage duration of the computing resources by the first partition. The method further includes detecting an abnormal event in operation of the first partition and adjusting one or more settings of the set of computing resources to increase processing capacity associated with the first partition to complete the abnormal event. The method further includes monitoring a first usage duration of the computing resources during completion of the abnormal event and adjusting the usage duration of based on the first usage duration, and adjusting the billing statement using the adjusted usage duration.
Base station, a wireless device, and methods therein for controlling user data traffic between the wireless device and a local cloud
A base station method is provided to control user data traffic. A wireless device is associated with a limited volume of resources for user data traffic. When it remains resources in the limited volume associated the wireless device, the base station receives a first indicator from a core network node. The first indicator indicates that said user data traffic shall be routed to the local cloud. The base station routes the user data traffic over a split bearer. The split bearer comprises a first bearer between the base station and the local cloud in which said user data traffic is routed and a second bearer from the base station to a gateway node. In the second bearer a copy of said user data traffic is routed for measuring the volume of the user data traffic between the wireless device and the local cloud in relation to the limited volume.
On-demand roaming
A solution to provide on-demand roaming service to a user device. An available third-party wireless access point is detected. In a case the roaming user device is not authorized to access the detect third-party access point due to the existing subscription to home service provider and/or lack of roaming agreement between home service provider and the detected third-party access point, an on-demand roaming arrangement will be negotiated to enable the user device to access wireless resources associated with the third-party access point.
INFORMATION PROCESSING SYSTEM
In a system in which a wireless access network and another network are connected to each other, an accurate fee is charged in a case where data held in an application server disposed in the wireless access network is used.
The application server holds an application and data relating to the application. A usage mode information generating unit generates usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit measures a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit charges a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.
Information processing system
In a system in which a wireless access network and another network are connected to each other, an accurate fee is charged in a case where data held in an application server disposed in the wireless access network is used. The application server holds an application and data relating to the application. A usage mode information generating unit generates usage mode information which is information relating to a usage mode when the wireless terminal uses the held data. A network data usage amount measuring unit measures a network data usage amount when the wireless terminal uses data on another network via a wireless access network connected to the wireless terminal. A fee charging unit charges a fee on the basis of the measured network data usage amount and charge a fee on a basis of the generated usage mode information.
Multiple-factor authentication
One example involves a method for providing communications services to remotely-situated client entities, wherein each client entity is associated with users and each user is associated with a communication device. For providing the services verification may be realized by using a first authentication factor for a user among the users, and a communication request may be generated. The generated communication request may include a first portion specifying at least one target endpoint associated with the user and a second portion associated with or indicating the security code and that includes a set of instructions which: are specific to the user, which specify how to communicate the security code for the user, and which specify different security codes for different types of communications. The security code is sent to the user according to the set of instructions, and verified via a second authentication factor associated with or for the user by comparing input from the user to the security code.