H04M15/888

SYSTEMS AND METHODS FOR SWITCHING ZERO CHARGE CALLERS
20220030119 · 2022-01-27 ·

Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert to the call signal at the asynchronous signaling switch, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.

Distributed ledger system for management and implementation of exchanges of wireless services between wireless service providers
11234116 · 2022-01-25 · ·

The present disclosure is directed to using distributed ledger architectures. In one example, a distributed ledger system includes a first wireless provider and a second wireless provider configured to provide wireless services to one or more of end users of the first wireless provider to roam on; and a plurality of nodes associated with one or more of the wireless providers. Each of the plurality of nodes is configured to access a digital record of an exchange of wireless services between the first wireless provider and the second wireless provider; enable roaming of the one or more of the end users on the second wireless provider upon detecting a first triggering condition; monitor usage of the wireless services; verify the roaming based on the monitoring of the wireless services; and terminate the roaming of the one or more of the end users upon detecting a second triggering condition.

NETWORK-BASED PROTECTION AGAINST SCAM APPLICATIONS
20210360407 · 2021-11-18 ·

Outgoing communications from a user device are monitored following a notification that an application is installed on a user device. When a number of the outgoing communications to a premium-rate number during a predetermined period of time exceeds a corresponding quantity threshold, the pattern of the outgoing communications may be ascertained to be anomalous. A user device is directed to present a prompt that requests an input as to whether the outgoing communications are authorized. In response to a first input that the outgoing communications are unauthorized, additional outgoing communications from the user device to the premium-rate number are blocked for a predesignated amount of time. Further, the first input is stored as a corresponding vote that the application is malicious. In response to a second input that the outgoing communications are authorized, the second input is stored as a corresponding vote that the application is non-malicious.

Determining a time to permit a communications session to be conducted
11171864 · 2021-11-09 · ·

A system and method to facilitate communication between telecommunications participants in a telecommunications network is disclosed. In one aspect, a method of determining a time to permit a communication session by telecommunications participants to be conducted includes causing a telecommunications processor to retrieve, from a data storage: a free time value that is representative of a free time attributed to a participant in the communications session, a funds balance held by the participant, a pre-stored cost per unit time value, and a representation of a billing pattern for the participant. The method also includes causing the telecommunications processor to determine a maximum time to permit the communication session to be conducted as a function of the free time value, the funds balance, the cost per unit time value and the billing pattern. The telecommunications processor initiates ending the communication session when the time to permit the communication session to be conducted expires.

Methods, policy node and charging node for enabling spending limit control

Methods, a policy node and a charging node for enabling spending limit control for a user equipment in a telecommunication network. The policy node obtains an identifier related to the user equipment, an identifier of a policy counter and a set of policy counter statuses to be monitored by the policy node. The set of policy counter statuses are related to the identifier of the policy counter. The policy node sends, a request for reporting of policy counter statuses related to the user equipment for the policy counter. The request includes the identifier related to the user equipment, the identifier of the policy counter and the set of policy counter statuses. A policy counter status of the set of policy counter statuses is determined. The policy counter status has changed as determined by the charging node. A response to the request is sent and includes the policy counter status that has changed.

Systems and methods for switching zero charge callers
11622248 · 2023-04-04 · ·

Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A first device call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert the modified call signal at the asynchronous signaling switch to the call signal, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.

Systems and methods for switching zero charge callers
11805209 · 2023-10-31 · ·

Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert to the call signal at the asynchronous signaling switch, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.

SYSTEM AND METHOD FOR ONLINE CHARGING TELECOMMUNICATION SERVICES IN REAL TIME
20220279325 · 2022-09-01 · ·

Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.

NETWORK EXCEPTION SYSTEMS AND METHODS FOR PACKET-SWITCHED TELEPHONY
20220256039 · 2022-08-11 ·

Asynchronous and/or synchronous telephony protocol systems and methods may include an asynchronous signaling node (ASN) and/or a call duration time quota from a charging onset to place and complete a call based on a first device call request as received from a first user mobile device on a packet switched network. The asynchronous systems include instructions to automatically modify the telephony address with a prefix and destination address when the first device has insufficient or independent balance or upon a network exception; route the modified call signal to the ASN; and deliver and automatically disconnect the call when the call is completed. The synchronous systems are balance-independent and include instructions to automatically set the call duration time quota upon such exception, and deliver and automatically disconnect the call from the second user telephony device when the call is completed or when the call duration time quota is exceeded.

Network-based protection against scam applications
11451962 · 2022-09-20 · ·

Outgoing communications from a user device are monitored following a notification that an application is installed on a user device. When a number of the outgoing communications to a premium-rate number during a predetermined period of time exceeds a corresponding quantity threshold, the pattern of the outgoing communications may be ascertained to be anomalous. A user device is directed to present a prompt that requests an input as to whether the outgoing communications are authorized. In response to a first input that the outgoing communications are unauthorized, additional outgoing communications from the user device to the premium-rate number are blocked for a predesignated amount of time. Further, the first input is stored as a corresponding vote that the application is malicious. In response to a second input that the outgoing communications are authorized, the second input is stored as a corresponding vote that the application is non-malicious.