Patent classifications
H04M15/751
Determining mobile operators for mobile devices
Determining a mobile operator for a mobile device. The mobile operator is determined using one or more of an international mobile subscriber identity (IMSI) and a current operator name (CON) and service provider name (SPN) pair. Correlations between the IMSI and mobile operators, and between the CON/SPN pairs and mobile operators, are maintained. Correlations between unrecognized CON/SPN pairs and mobile operators are created based on a quantity of requests received from the mobile devices. In some embodiments, identifying the mobile operator enables financial transactions by the mobile device when visiting, for example, a mobile applications store.
METHOD AND APPARATUS FOR CONNECTING A MOBILE DEVICE TO A PAY-FOR-USAGE COMMUNICATION NETWORK
A method and apparatus for connecting/attaching a mobile device to a network. Service information, such as pricing and plan information, associated with one or more networks is provided to a mobile device. The mobile device requests and receives configuration details for a selected one of the networks. The configuration details can include identity information such as is stored in a reprogrammable SIM, usable for connecting/attaching the mobile device to the selected network. The mobile device then registers and connects with the selected network based on the configuration details.
Optimization for priority-based network identifier scans
Battery life of a user equipment (UE) can be extended when the UE is roaming internationally in a country that has multiple carrier networks each utilizing multiple public land mobile network (PLMN) identifiers. Scan control tables, stored in a universal integrated circuit card (UICC) of the UE, are populated with the identifiers of a PLMN having the highest priority in a defined area (e.g., Circle). A roaming control applet of the UICC can compare serving cell data with the scan control tables to determine if the UE is to perform a higher priority (HP) PLMN search. Utilization of the scan control table avoids unnecessary searches for HPPLMNs that are unavailable in the UE's current location and accordingly extends battery life of the UE.
Policy enforcement in a 3GPP environment while ensuring congestion avoidance on user plane function northbound interfaces
Systems and methods are provided for providing differential treatment to user traffic involving optimized reporting of start and stop traffic. The systems and method can include detecting, at a user plane function, an initiation of a type of traffic being performed at the user plane function, providing, by the user plane function, a start event trigger of the type of traffic detected by the user plane function to a session management function, and receiving, at the user plane function, a policy associated with the type of traffic from the session management function, the policy including instructions preventing submissions of subsequent event triggers to the session management function until an end of the type of traffic, the subsequent event triggers being associated with the type of traffic detected by the user plane function.
POLICY ENFORCEMENT IN A 3GPP ENVIRONMENT WHILE ENSURING CONGESTION AVOIDANCE ON USER PLANE FUNCTION NORTHBOUND INTERFACES
Systems and methods are provided for providing differential treatment to user traffic involving optimized reporting of start and stop traffic. The systems and method can include detecting, at a user plane function, an initiation of a type of traffic being performed at the user plane function, providing, by the user plane function, a start event trigger of the type of traffic detected by the user plane function to a session management function, and receiving, at the user plane function, a policy associated with the type of traffic from the session management function, the policy including instructions preventing submissions of subsequent event triggers to the session management function until an end of the type of traffic, the subsequent event triggers being associated with the type of traffic detected by the user plane function.
NETWORK EXCEPTION SYSTEMS AND METHODS FOR PACKET-SWITCHED TELEPHONY
Asynchronous and/or synchronous telephony protocol systems and methods may include an asynchronous signaling node (ASN) and/or a call duration time quota from a charging onset to place and complete a call based on a first device call request as received from a first user mobile device on a packet switched network. The asynchronous systems include instructions to automatically modify the telephony address with a prefix and destination address when the first device has insufficient or independent balance or upon a network exception; route the modified call signal to the ASN; and deliver and automatically disconnect the call when the call is completed. The synchronous systems are balance-independent and include instructions to automatically set the call duration time quota upon such exception, and deliver and automatically disconnect the call from the second user telephony device when the call is completed or when the call duration time quota is exceeded.
IoT-connected devices and equipment automated login system
A modified telecommunications system is provided herein in which UEs can be associated with a user account using information other than SIM card data or a username and password combination. For example, when a subscriber activates a user account, the subscriber may be requested to provide a signature. A signature can include a unique PIN, a sample voice command, a fingerprint, a retinal scan, and/or the like. The signature may be stored in a data store in an entry corresponding to the user account. To associate a UE with a user account, the subscriber can provide a signature via the UE. The UE can then transmit the provided signature and a UE address to a management system. The management system can then store the UE address in the data store in an entry associated with the user account that corresponds with the provided signature.
ONLINE CHARGING FOR MULTI-USER AGENT INSTANCES SERVED BY DIFFERENT TELEPHONY APPLICATION SERVERS
Techniques for allowing access based online charging in cases of multiple user agents (multi-UAs) scenarios where the instances are registered to different telephony application servers (TASs) are discussed herein. For example, a user device may support a native number and multiple virtual numbers linked via a user account. When servicing a call, the user device may determine a served number to service the call from. If the served number is not the native number but a virtual number, the native-line server may handle the call session, but the online charging session will be handled by the virtual-line server. The native-line server may use session initiation protocol (SIP) information to send updated information for charging parameters to the virtual-line server, including network access transfer for accuracy in online charging logic.
Semiconductor integrated circuit cards and communication systems including the same
A semiconductor integrated card includes an external package, a subscriber identification module (SIM) circuit, a plurality of SIM pins, a storage device and a plurality of memory pins. The SIM circuit is formed inside of the external package and is configured to store subscriber information. The SIM pins are formed on a surface of the external package and are electrically connected to the SIM circuit. The storage device is formed inside of the external package and is separated from the SIM circuit. The storage device includes a nonvolatile memory device. The memory pins are formed on the surface of the external package and are electrically connected to the storage device.
LATE STAGE CALL SETUP MANAGEMENT
A method for revenue assurance in a telephone network. The method comprises receiving a call request from a first user device on a network to a second user device, where the user device associated with a first user account has an account credit value insufficient to complete the requested call. A call timer duration is set to instantly expire on encountering a chargeable event. The call is continued toward the second user device. Upon encountering a chargeable event, the call is released. The chargeable event may be presenting a Ring Back Tone to the caller and confirming that the second device is ringing. The chargeable event may be detecting when the call has been answered.