Patent classifications
H04M15/8214
Systems and methods for distributed charging in digital telecommunications networks
Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
System and method for encoding of local bandwidth conditions into tunneling message
A method, a system, and a non-transitory storage medium provide for encoding a general packet radio service (GPRS)-tunnel endpoint identifier (GTP-TEID) with data identifying radio frequency (RF) bandwidths supported in a local radio environment (LRE) from which a user equipment (UE) device accesses the wireless access station; sending, via a signaling channel, the GTP-TEID to a core network device; notifying one or more core network devices of an RF bandwidth category level corresponding to the identified RF bandwidths; and applying at least one of a policy rule or a charging rule to a packet data unit (PDU) session for the UE device, based on the RF bandwidth category level.
SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS
A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.
System and method for providing a network service in a distributed fashion to a mobile device
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Mobile network handling of simultaneous usage sessions
Concepts and technologies are disclosed herein for mobile network handling of simultaneous data usage session records. A system can include a network session server that has a processor and a memory storing instructions that configure a processor to perform operations. The operations can include obtaining, from a session probe within a core network device, a raw mobile data set associated with a user equipment. The operations can include determining that the user equipment engages in a simultaneous usage session based on the raw mobile data set. The operations can include identifying targeted domains that are present within the raw mobile data set, and creating a raw session record for each of the targeted domains associated with the simultaneous usage session.
METHOD AND ARRANGEMENTS RELATING TO GROUP TRANSMISSION IN A WIRELESS COMMUNICATION NETWORK
Methods and devices for supporting charging relating to a group transmission in a wireless communication network. The group transmission involving a group of wireless devices configured to, via one or more direct communication links between each other, participate in transmission of user data between a source wireless device and the network. It is obtained, for each one of wireless devices of the group, a data amount indicator indicating how much data the wireless device has been involved in transmitting as part of the group transmission. It is provided one or more reports based on the obtained data amount indicators to one or more core network nodes.
METHOD AND ARRANGEMENTS RELATING TO GROUP TRANSMISSION IN A WIRELESS COMMUNICATION NETWORK
Method and device(s) for supporting charging relating to a group transmission in a wireless communication network, said group transmission involving a group of wireless devices configured to, via one or more direct communication links between each other, participate in data transmission between a source wireless device and the wireless communication network. Data is transmitted on a device specific group bearer in a core network of the wireless communication network, which second data relates to the group transmission and to a wireless device of the group. Said device specific group bearer being configured specifically for data transmission usage relating to the wireless device when the data transmission is part of the group transmission.
Manual roaming and data usage rights
Disclosed is a 5G or pre-5G communication system to be provided to support a data transmission rate higher than that of a 4G communication system such as LTE. The present disclosure relates to a session management method through selection of a roaming operator and utilization of data usage rights of a local operator by a user in a 5G system. The user selects the local operator by switching the operator to a manual mode during roaming, accesses a data usage rights purchase agency through a limited service provided by the operator and then purchases the data usage rights of the local operator, and connects to a data network through authentication of a session by using authentication information included in the data usage rights.
ADJUSTABLE AND DYNAMIC THRESHOLDS IN WIRELESS NETWORKS
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.