Patent classifications
H04M15/858
Apparatus and Methods for Alternative Sponsored Data Services
The present invention faces the issue of a user ignoring an alternative second service usable instead of a first service that the user is using, and which is a service subscribed by the user. To solve this issue, the present invention provides for associating a first service identifier and a second service identifier with a same service category at a subscription repository; upon detecting at a policy enforcer the first service is used by the user, notifying a policy controller of the first service identifier; obtaining, by the policy controller from the subscription repository, the second service identifier associated with the same service category as the first service identifier; offering the user, either directly from the policy controller or via the policy enforcer, to accept using the second service instead of the used first service; and, upon user accepting to use the second service, enforcing control rules for the second service at the policy enforcer.
MECHANISM FOR ESTIMATED OVER-THE-TOP (OTT) MEDIA STREAMING DATA USAGE AND DATA RATE NOTIFICATION
Systems and methods obtain, prior to streaming an over the top (OTT) multimedia asset, meta-data associated with the multimedia asset. The metadata includes a duration of the multimedia asset and a data rate at which the asset is provided. The systems and methods estimates, based on the meta-data, an amount of data usage resulting from use of the one data rate at which the multimedia asset is provided. The user is them prompted to indicate whether to stream the multimedia asset, and upon receipt of an indication to stream the multimedia asset, the multimedia asset is streamed.
METHOD AND APPARATUS FOR ADAPTIVE CHARGING AND PERFORMANCE IN A SOFTWARE DEFINED NETWORK
Aspects of the subject disclosure may include, for example, a method including instantiating a virtual network function to provide a network resource in the network, accessing data usage information associated with facilitation of a service to a communication device via the network, determining whether the communication device exceeds a data limit threshold according the data usage information, accessing a data limit instruction associated with the communication device responsive to determining that the communication device exceeds the data limit threshold, determining a modification to the virtual network function associated with the facilitation of the service according to the data limit instruction, and communicating with the network to cause the modification to the virtual network function. Other embodiments are disclosed.
METHOD FOR COLLECT CALL SERVICE BASED ON VOIP TECHNOLOGY AND SYSTEM THEREOF
One embodiment of the present invention provides a collect call method and system thereof, more particularly, in order to charge the called party with a uniform toll for collect call, which is determined by only the type and location of called party terminal. In one embodiment, the collect call method, system and a counsel service providing method use a free VoIP network for part of the voice call link and a charge PSTN network for the rest of the voice call link. In one embodiment, if the first link corresponding to the collect call request is established, the collect call switch calls the called party terminal to establish the second link, and billing on the second link is initiated.
Congestion Information Management Method and Apparatus
Disclosed are a method and an apparatus for managing congestion information. The method includes: a policy and charging rules function (PCRF) receiving an RAN user plane congestion information, RUCI, report sent by an RAN congestion awareness function (RCAF) herein, the RUCI report includes a user identifier and a Packet Data Network, PDN, identifier; if not receiving an answer message for a modify UEcontext request(MUR) message sent to the RCAF, the PCRF rejecting the RUCI report, herein, the MUR message includes request information for deleting the context of the user identifier and the PDN identifier stored in the RCAF.
Method and apparatus for reloading a mobile number
A method, an apparatus, and a non-transitory computer-readable storage medium used in reloading a mobile number are disclosed. According to some embodiments, in performing the method, the apparatus receives a request of reloading the mobile number. The request is sent by a terminal, but the mobile number does not correspond to the terminal. The apparatus then obtains information on the mobile number, and determines whether the mobile number is a trusted number based on the obtained information. When the mobile number is a trusted number, the apparatus reloads the mobile number. When the mobile number is not a trusted number, the apparatus alerts the terminal that the mobile number is not a trusted number.
Determining communications charging
A system for determining a communication charge comprising a charging equation determiner, an inflection point determiner, and a charge determiner. The charging equation determiner for determining a charging equation based at least in part on a normalized set of inputs. The inflection point determiner for determining an inflection point based at least in part on a charging structure database. The charge determiner for determining a communication charge based at least in part on the charging equation and the inflection point.
RADIO COMMUNICATION CONTROL DEVICE AND RADIO COMMUNICATION SYSTEM
A radio communication control device accepts a call-up from a radio communication terminal and includes a unit configured to detect the degree of jamming in a cell, a unit configured to confirm the intention of a user of a terminal concerned as to whether the call-up is continued regardless of addition of an extra to the user's telephone call charge when the call-up has been made from a radio communication terminal in the cell concerned in a specific jammed state, a unit configured to block the call-up concerned in accordance with the confirmed intention of the user of the terminal concerned and a unit configured to change charge setting so as to add an extra to the user's telephone call charge when the call-up has not been blocked in the specific jammed state.
Systems and methods to provide connections via callback acceptance
Systems and methods to selectively block calls from reaching destinations based on an input received from a callback connection. One embodiment includes a web server to receive a selection of an advertisement from an customer and to obtain a communication reference from the customer in response to the selection; a session border controller to interface with a packet switched network; and one or more telecommunication servers coupled to the session border controller and the web server, the one or more telecommunication servers to establish a connection for real time communications using the communication reference, to initiate a connection for real time communications with an advertiser of the advertisement after receiving an indication of acceptance of the connection established using the communication reference; where the advertiser is charged an advertisement fee in response to establishing a connection for real time communications between the advertiser and the customer.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.