Patent classifications
H04M15/8214
METHODS AND SYSTEMS OF RESTRICTING DATA USAGE AT A PLURALITY OF NETWORK DEVICES
Methods and systems for sharing data usage by a plurality of SIM cards at a plurality of network devices are disclosed. Each of the plurality of network devices is capable of housing at least one SIM card from the plurality of SIM cards. The method comprises the steps of determining the total data usage allowance. A remaining total data usage allowance is determined by either retrieving it from a carrier server or by subtracting aggregated data usage information from the total data usage allowance. The method further comprises restricting use of one or more of the plurality of SIM cards when the remaining total data usage allowance is below a first threshold until the remaining total data usage allowance is above the first threshold. The total data usage allowance is changed to a first value periodically or according to an administrator's instruction.
System, method, and computer program for rating network transmissions based on user requested data
A system, method, and computer program product are provided for rating network transmissions based on user requested data. In use, a transmission of data over a network is identified, where the data includes user requested data and additional data. Additionally, a size of the user requested data is determined. Furthermore, the transmission of the user requested data is rated based on the size of the user requested data. The transmission of additional data may be charged to third parties such as advertisers.
Open roaming multi-access cost optimizer service
A method is performed at a control center in a home network. The control center (CC) detects roaming of a user equipment (UE) engaged in a call across different access networks operated by different service providers and that employ different types of radio access technology (RAT) to attach to the UE. The CC identifies the different service providers and the different types of RAT associated with the different access networks. While the UE is roaming, the CC tracks different data usages for the UE on the different access networks. The CC categorizes the different data usages based on the different service providers and the different types of RAT associated with the different access networks. When the call terminates, the CC determines a total cost for data usage on the call based on the different data usages, the different types of RAT, and the different service providers.
SYSTEMS AND METHODS FOR IDENTIFYING SERVICE TYPE OF DATA USAGE ON 5G NEW RADIO (NR) RADIO ACCESS TECHNOLOGY TYPE
Aspects of the subject disclosure may include, for example, obtaining a message associated with a 5th Generation (5G) wireless service, the message containing: a first section including a service type identifier entry and a first timestamp that corresponds to the service type identifier entry; and a second section including a secondary radio access technology (RAT) entry, one or more data volume entries, and a second timestamp that corresponds to the secondary RAT entry and to the one or more data volume entries; matching the first timestamp and the second timestamp based upon a first value of the first timestamp equaling a second value of the second timestamp; and responsive to the matching of the first timestamp and the second timestamp, associating the service type identifier entry of the first section with the one or more data volume entries of the second section. Other embodiments are disclosed.
LOGGING SYSTEM FOR BLACKLISTING URLS IN TOLL-FREE DATA SERVICE
A method, a device, and a non-transitory storage medium that stores instructions to load a first web page; scan each embedded uniform resource locator (URL) of the first web page; select each embedded uniform resource locator (URL) that is signed to indicate support of a toll-free data service; transmit each signed embedded URL to a first network device; receive, from the first network device, at least one replacement URL; render the first web page using the at least one replacement URL; receive a user input via one of the at least one replacement URL; load a second web page in response to the user input; scan the second web page for an embedded URL; determine whether the second web page includes at least one unsigned embedded URL; and transmit to a second network device, blacklist data that includes the at least one unsigned embedded URL.
System and method for reporting packet characteristics in a network environment
A method is provided in one example and includes receiving a request to initiate a communication flow associated with a subscriber and identifying one or more parameters to be monitored for the communication flow. The method further includes extracting one or more bits from packets associated with the communication flow; the bits are used to determine an operating system associated with the communication flow. A policy decision can be executed for the communication flow based on the operating system associated with the communication flow. In more specific examples, the bits are sent to a next destination in response to a threshold being reached for at least one of the parameters. The parameters can be associated a volume parameter or a time parameter. The policy decision could include blocking traffic associated with the subscriber, initiating billing, redirecting the communication, managing a quality of service level for the communication flow, etc.
Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
Mobile network communications method, communications apparatus, and communications system
Embodiments of the present invention provide a mobile network communications method, communications apparatus, and communications system. The method includes: receiving, by a transport packet data network gateway, a data packet to be sent to a mobile node, and determining a home packet data network gateway of the mobile node according to IP address information of the mobile node; then sending a data connection establishment request message to the home packet data network gateway, to request to establish a data connection to a base station or a serving gateway at a location of the mobile node; and finally sending the data packet to the base station or the serving gateway through a channel of the data connection, or receiving a data packet that is sent by the base station or the serving gateway through a channel of the data connection.
Method and system for dynamic managing of subscriber devices in mobile networks
A system and method for managing subscriber mobile devices comprising: a home network (400) of a first mobile network operator (MNO1), in which data associated with at least one physical SIM of a subscriber device with an embedded SIM card (eUICC) is obtained, and a destination network (300) of a second mobile network operator (MNO2) which the device travels to, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device. The dynamic data comprise a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600) on which the destination network (300) relies. The static data comprise IMSI/MSISDN identities and is stored in a pool (202) of the destination network (300). For a given virtual SIM, it is checked whether there is an association in a mapping table (106) of the first mobile network operator (MNO1) between the static data from the pool (202) and the physical SIM data from the home network (400).
Billing engine and method of use
A wireless communication device associated with a mobile operator network transmits an authentication request for network access via a wireless access point (AP) using a transceiver other than the cellular network transceiver. Device authentication can occur directly with the mobile operator network or via a proxy server. Upon authentication, the requesting device may access a wide area network in a data off-load operational mode and the data flow to and from the device via the AP is monitored and reported to mobile operator network associated with the requesting device. The wireless communication device can communicate with any of a plurality of APs distributed in a venue during the data off-load operational mode.