H04M15/751

DYNAMIC SUBSCRIBER PROFILE MANAGEMENT
20210105591 · 2021-04-08 ·

A dynamic subscriber profile management system allows subscriber device profiles to be selected and applied based on the subscriber profile based on device type, a location of the device, or a combination of both. The system may receive information relating to the subscriber, the type of device, and the location of the device to perform a lookup of available profiles or profile settings and either update an existing profile for current use or select a profile from a catalog of available profiles.

Online charging for multi-user agent instances served by different telephony application servers
10972294 · 2021-04-06 · ·

Techniques for allowing access based online charging in cases of multiple user agents (multi-UAs) scenarios where the instances are registered to different telephony application servers (TASs) are discussed herein. For example, a user device may support a native number and multiple virtual numbers linked via a user account. When servicing a call, the user device may determine a served number to service the call from. If the served number is not the native number but a virtual number, the native-line server may handle the call session, but the online charging session will be handled by the virtual-line server. The native-line server may use session initiation protocol (SIP) information to send updated information for charging parameters to the virtual-line server including network access transfer for accuracy in online charging logic.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
10992606 · 2021-04-27 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept an API call directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

Traffic Package Providing Method and Related Device
20210051234 · 2021-02-18 ·

Embodiments of the present invention provide a traffic package providing method. The method includes: obtaining, by a terminal device, travelling schedule information; sending the travelling schedule information to an access platform server; receiving information about multiple traffic packages that is sent by the access platform server, where each of the N travelling schedule nodes is corresponding to information about at least one traffic package in the information about the multiple traffic packages, and the information about the multiple traffic packages is provided by an operator; determining, from the multiple traffic packages, a target traffic package to be used by the terminal device in each of the N travelling schedule nodes; sending a traffic package subscription message to the access platform server, where the traffic package subscription message includes an identity of the determined target traffic package and identity information of the terminal; obtaining N profiles; and installing the N profiles.

Late stage call setup management
10868918 · 2020-12-15 ·

A method for revenue assurance in a telephone network. The method comprises receiving a call request from a first user device on a network to a second user device, where the user device associated with a first user account has an account credit value insufficient to complete the requested call. A call timer duration is set to instantly expire on encountering a chargeable event. The call is continued toward the second user device. Upon encountering a chargeable event, the call is released. The chargeable event may be presenting a Ring Back Tone to the caller and confirming that the second device is ringing. The chargeable event may be detecting when the call has been answered.

Traffic package providing method and related device

A traffic package providing method and a related device, where the method includes obtaining, by a terminal device, travelling schedule information, sending the travelling schedule information to an access platform server, receiving information about multiple traffic packages from the access platform serve, where each of the N travelling schedule nodes corresponding to information about at least one traffic package in the information about the traffic packages, and the information about the traffic packages are provided by an operator, sending a traffic package subscription message to the access platform server, where the traffic package subscription message includes an identity of a determined target traffic package and identity information of the terminal, obtaining N profiles, and installing the N profiles.

OPTIMIZATION FOR PRIORITY-BASED NETWORK IDENTIFIER SCANS
20200305069 · 2020-09-24 ·

Battery life of a user equipment (UE) can be extended when the UE is roaming internationally in a country that has multiple carrier networks each utilizing multiple public land mobile network (PLMN) identifiers. Scan control tables, stored in a universal integrated circuit card (UICC) of the UE, are populated with the identifiers of a PLMN having the highest priority in a defined area (e.g., Circle). A roaming control applet of the UICC can compare serving cell data with the scan control tables to determine if the UE is to perform a higher priority (HP) PLMN search. Utilization of the scan control table avoids unnecessary searches for HPPLMNs that are unavailable in the UE's current location and accordingly extends battery life of the UE.

IOT-CONNECTED DEVICES AND EQUIPMENT AUTOMATED LOGIN SYSTEM
20200260269 · 2020-08-13 ·

A modified telecommunications system is provided herein in which UEs can be associated with a user account using information other than SIM card data or a username and password combination. For example, when a subscriber activates a user account, the subscriber may be requested to provide a signature. A signature can include a unique PIN, a sample voice command, a fingerprint, a retinal scan, and/or the like. The signature may be stored in a data store in an entry corresponding to the user account. To associate a UE with a user account, the subscriber can provide a signature via the UE. The UE can then transmit the provided signature and a UE address to a management system. The management system can then store the UE address in the data store in an entry associated with the user account that corresponds with the provided signature.

Optimization for priority-based network identifier scans

Battery life of a user equipment (UE) can be extended when the UE is roaming internationally in a country that has multiple carrier networks each utilizing multiple public land mobile network (PLMN) identifiers. Scan control tables, stored in a universal integrated circuit card (UICC) of the UE, are populated with the identifiers of a PLMN having the highest priority in a defined area (e.g., Circle). A roaming control applet of the UICC can compare serving cell data with the scan control tables to determine if the UE is to perform a higher priority (HP) PLMN search. Utilization of the scan control table avoids unnecessary searches for HPPLMNs that are unavailable in the UE's current location and accordingly extends battery life of the UE.

Method and a system for detecting telephone numbers used by SIM boxes for soliciting telephone calls

The invention relates to a method (100) of detecting a soliciting telephone number that is being used fraudulently for soliciting calls to target numbers. The method (100) comprises a plurality of iterations of a detection stage (104) comprising the following steps: sending (106) a telephone call to at least one target number; receiving (108) at least one message; detecting (110) at least one soliciting number from said received message; and detecting a new target number in said received message; the method being characterized in that it includes a new iteration of the detection stage (104) using said new target number when said target number is a new number. The invention also provides a system for performing such a method (100).