H04L12/1414

Wireless authorization and access network-neutral advice of charge techniques
11818649 · 2023-11-14 · ·

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.

WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES
20220408346 · 2022-12-22 ·

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.

SYSTEM AND METHOD FOR ONLINE CHARGING TELECOMMUNICATION SERVICES IN REAL TIME
20220279325 · 2022-09-01 · ·

Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.

Cross check confirmation system for utility usage and spend

Presented are methods and systems to universally assess composite utility consumption (1) in which a plurality of real-time and batch sensor readings such as from multiple disparate utility sensor data inputs (3) may be acquired and stored such as into a local device (2) or a central data warehouse (6). A composite utility estimated cost generator (9) can generate missing or uncorrelated data and a collected composite utility data information correlator (11) can correlate the data so it can be applied to determine some type of composite utility cost information. For real-time calculation, a disparate utility rate information accessor (8) can obtain multiple items of disparate rate information and this can use with correlated data to create a composite utility consumption and spend so a user can manage and control utility usage for a home, building, facility, plant, specific equipment, or the like. Cost information, such as a rate of spend or spend amount(s) to date or for a period may be presented to user in a variety of visualizations and reporting formats including specific time usage and spend information, specific time range usage and spend, and “time-of-use” billing information for specific real-time data points. The visualization and reporting may be used to answer a plurality of usage questions along with specific characterizations of utility spend across time of day domains and specific equipment usage domains thus affording more effective utility cost management.

Network Slice Charging Method and Apparatus
20220217005 · 2022-07-07 ·

This application provides a network slice charging method and an apparatus. The method includes: A network slice management network element receives a first request including a charging requirement of a network slice. The network slice management network element sends to a network slice subnet management network element, a second request including the charging requirement. The network slice management network element receives first charging data of the network slice, which is collected based on the charging requirement. The network slice management network element sends the first charging data to a charging network element for the charging network element to charge the network slice.

WIRELESS AUTHORIZATION AND ACCESS NETWORK-NEUTRAL ADVICE OF CHARGE TECHNIQUES

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.

Wireless authorization and access network-neutral advice of charge techniques

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include obtaining, by a home network, a request to authorize access of a roaming subscriber for a visited network; determining whether the request includes visited network charging information and visited network metric information; based on determining that the request includes the visited network charging information and the visited network metric information, determining whether one or more visited network metrics satisfy one or more threshold metrics for the roaming subscriber; and based on determining that the one or more visited network metrics satisfy the one or more threshold metrics for the roaming subscriber, authorizing access of the roaming subscriber for the visited network.

Wireless authorization and access network-neutral advice of charge techniques
11438825 · 2022-09-06 · ·

Presented herein are techniques to facilitate wireless authorization based on in-line assurance and tariffing information. In one example, a method may include determining, by a roaming subscriber, that a visited network is a chargeable network; querying, by the roaming subscriber, the visited network for charging policies for at least two identity realms; obtaining, by the roaming subscriber, charging policy metadata associated with the charging policies for the at least two identity realms; selecting, by the roaming subscriber, an identity realm through which to connect to the visited network based on the charging policy metadata for the at least two identity realms; and connecting to the visited network using the selected identity realm.

Automatic recharging of data quota for successful completion of transaction

A method, computing system, and computer program product are provided. A processor of a computer system estimates an amount of bandwidth to be used to complete a transaction based on a usage history. Responsive to determining that the amount of the estimated bandwidth to be used exceeds a predefined threshold of an amount of available bandwidth and to determining that an account has any offers for additional bandwidth at no additional cost, the amount of available bandwidth is automatically recharged using at least some of the any offers until either the any offers are exhausted or the estimated amount of the bandwidth to be used would be less than the predefined threshold. When the estimated amount of the bandwidth to be used continues to exceed the predefined threshold, the bandwidth is automatically recharged using an advanced amount of bandwidth to increase a likelihood that the transaction will complete successfully.

SYSTEM AND METHOD FOR ONLINE CHARGING TELECOMMUNICATION SERVICES IN REAL TIME
20210314746 · 2021-10-07 · ·

Computer-implemented method for online charging telecommunication services in real time, comprising: (i) running a money-to-time algorithm, computing a time balance based on charging parameters and a wallet balance; (ii) if greater than zero, creating a charging data record, CDR, and writing a start timestamp therein, setting a terminate session timer based on the time balance, and confirming the communication session; (iii) if not greater than zero, or upon expiration of the terminate session timer, instructing to terminate the communication session, wherein upon expiration of the terminate session timer an end timestamp is written in the CDR. Online charging system, OCS, implementing the method.