Patent classifications
H04M15/854
SYSTEMS AND METHODS FOR DISTRIBUTED CHARGING IN DIGITAL TELECOMMUNICATIONS NETWORKS
Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.
Application Awareness of Credit Conditions in Communication Network
A method performed by an application function, AF, for a communication network, wherein the AF has been informed, in a first notification, about an out-of-credit event associated with a user of a service provided by the AF, the method comprising sending subscription request, to a network function, NF, for requesting notifications about reallocation-of-credit events associated with one or more users of a service provided by the AF; receiving, from the NF, a second notification of a reallocation-of-credit event associated with the user of the service provided by the AF for which the AF has been informed about the out-of-credit event, such that the AF can perform one or more second actions with respect to the service.
APPARATUS, METHODS, AND COMPUTER PROGRAMS
There is provided an apparatus, method and computer program for an apparatus for a first policy control function, that causes to apparatus to: receive, from a session management function, a request for a policy to be established for a session for a subscriber, wherein the subscriber is subscribed in a second domain and the first policy control function is configured to operate in a first domain; determine a policy for the requested session, the determined policy comprising an indication of an allowed usage for the subscriber and at least one trigger condition for the policy to be updated; signal the at least one trigger condition to the session management function; and monitor the allowed usage for the subscriber by updating the policy in response to receipt of an indication that the at least one trigger condition has been met.
ENHANCED REAL-TIME NETWORK CONSUMPTION TRACKING FOR WIRELESS NETWORKS
A real-time network consumption tracking service is provided. A charging function (CHF) device receives transaction records of network consumption by user equipment (UE) devices in a wireless network and generates individual event messages based on each of the transaction records. Each of the individual event messages includes a detailed record based on one of the transaction records. The CHF device associates each of the individual event messages with a message bus topic, formats each of the individual event messages for publication on the message bus, and publishes each of the formatted individual event messages to the message bus. The message bus is accessible to external systems that generate dynamic network consumption data sets based on the formatted individual event messages.
Charging method, apparatus, and system
Example charging methods and apparatus are described. One example method includes sending a service resource create request to a charging system by a charging trigger apparatus. The charging trigger apparatus receives a service resource create response sent by the charging system. The service resource create request is used to request the charging system to create a service resource corresponding to a service in a session. The session is used to provide a data connection service to user equipment. The service resource is used to manage requesting for a quota for the service in the session and/or manage reporting of usage information of the service in the session. The service resource create response includes a first resource identifier, and the first resource identifier is used to identify the service resource that corresponds to the service in the session and that is created by the charging system.
DYNAMIC BANDWIDTH SERVICE LIMITS
A network services provider delivers bandwidth services to users in relation to a dynamic limit based on an average user consumption, rather than a fixed amount per subscriber. An average user consumption is employed to compute a consumption limit from relative portions of a user community substantially exceed the average, typically defined as “heavy users.” Usage levels below the consumption limit have an increased availability up to the consumption limit. The consumption limit may vary from a total capacity of the service infrastructure, which changes, generally in an increasing manner, as additional resources are added to the network. The consumption limits may be defined over different service intervals, such as daily, weekly or monthly, and for different groups of users depending on network layout.
Message exchange
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
Systems and methods for distributed charging in digital telecommunications networks
Techniques for distributed charging in digital telecommunications networks are disclosed. In one particular embodiment, the techniques may be realized as a method that includes provisioning a data path that carries a plurality of network flows, receiving a shared usage quota associated with the plurality of network flows, and allocating the shared usage quota among the plurality of network flows. For each network flow among the plurality of network flows, the method includes providing the data path with data indicative of an amount of the shared usage quota allocated to the network flow, configuring the data path to collect metering data associated with the network flow, and configuring the data path to enforce the shared usage quota based on the metering data associated with the network flow and the amount of the shared usage quota allocated to the network flow.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.
Secure tokens for controlling access to a resource in a resource distribution network
A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a global token based on a time duration specified for multiple meters that are in communication with the headend system through at least a mesh network in a normal condition. The global token is associated with the time duration and is applicable to the multiple meters. The headend system causes the global token to be broadcast via a broadcast network. After receiving the global token, the meter verifies the global token and determines the time duration associated with the global token. The meter further connects premises associated with the meter to a resource distribution network for at least the time duration associated with the global token.