Patent classifications
H04M15/85
System and method for notification of listening devices
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a transceiver; a local user display; and instructions encoded within the memory to instruct the processor to: locate via the transceiver at least one nearby device; receive observational profile information for the nearby device; and display on the local user display information about the nearby device's observation abilities.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
METHOD AND APPARATUS FOR A CHARGEABLE PARTY AT A SESSION MANAGEMENT WITH REQUIRED QUALITY OF SERVICE
Methods and apparatuses for data transmission. A method implemented at a first network function may comprise obtaining information related to network slice selection; and sending a reroute message to an access network node, wherein the reroute message including a container comprising at least one information element of the information related to network slicing selection.
Adapting Network Policies Based on Device Service Processor Configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
System, method, and computer program for dynamic switching between online and offline charging for a network session
As described herein, a system, method, and computer program are provided for dynamic switching between online and offline charging for a network session. In use, a network session is monitored. Additionally, during the network session, one or more characteristics of the network session are determined, based on the monitoring of the network session. Further, a dynamic selection is made between offline charging and online charging for the network session, based on the one or more characteristics of the network session.
Systems and methods for enabling optimized reporting related to policy control request triggers
A first network device may receive, from a second network device, a first policy control create request and may provide, to the second network device, a common policy control request trigger. The first network device may receive a second policy control create request associated with a user equipment (UE) and may cause a UE policy to be provided to the UE. The first network device may receive, from a third network device, a third policy control create request and may provide a network device policy to the third network device. The first network device may receive, from the second network device, a policy control update request based on the common policy control request trigger and may generate an updated UE policy or an updated network device policy based on the policy control update request.
Event subscription notification
Systems, methods, apparatuses, and computer program products for event subscription notification(s) are provided. One method may include providing, from a first network entity, a policy control request trigger about subscriptions for event exposure to a second network entity. The method may also include receiving a notification, from the second network entity, about the policy control request trigger, and installing or updating at least one policy and charging control (PCC) rule based on the information received in the notification from the second network entity.
Support for Threshold as Well as Quota Based Usage-Monitoring for the Same Monitoring Key
A method and computer readable media are disclosed to supply values for either/both of volume/time for usage-monitoring from/to PCRF for a particular usage monitoring key. In one embodiment, the method includes identifying a monitoring key AVP used by a PCRF to provide at least one of a volume usage threshold level for a Policy and Charging Enforcement Function (PCEF) and a time of usage threshold level for a PCEF; wherein the monitoring key includes at least one of a volume threshold total for the monitoring key; a volume quota uplink threshold for the monitoring key; a volume quota downlink threshold for the monitoring key; and a time threshold for the monitoring key; and supplying values for at least one of volume for usage-monitoring for a PCRF for a particular usage monitoring key; and time for usage-monitoring for a PCRF for a particular usage monitoring key.
Electronic device for providing AP list and method for operating electronic device
An electronic device and method are disclosed herein. The electronic device includes a communication module, a display, a memory and a processor which implements the method. The method includes receiving access point (AP) information from at least one AP through the communication module, generating an AP list including an AP communicatively connectable with the electronic device based on the received AP information, storing the AP list in the memory, identifying a state of the electronic device, determining an arrangement criterion for arranging a display order of Aps included in the AP list based on state information about the electronic device, and controlling the display to arrange the AP list according to the determined arrangement criterion.
ADJUSTABLE AND DYNAMIC THRESHOLDS IN WIRELESS NETWORKS
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.