H04L12/1482

Method and Apparatus for Machine-to-Machine Event Data Recording
20170033938 · 2017-02-02 ·

According to example teachings herein, a Machine-to-Machine (M2M) event recording function records M2M events for a Network Services Capability Layer (N-SCL) in an M2M network. In an example configuration, the recording function considers certain M2M information elements as mandatory for recording with respect to a given M2M event, while others are optional according to configuration information that controls M2M event recording. Each such recorded M2M event includes a number of M2M information elements that are mandatory, and optionally includes one or more additional information elements. In at least one embodiment, the mandatory M2M information elements allow M2M network events to be correlated with corresponding events in an access network used to access the M2M network. The recorded M2M events can be also correlated at the M2M service layer to fulfill certain billing needs, for catering to the potentially large number of diverse applications that can utilize the M2M network.

Application-Aware Data Charging
20170019540 · 2017-01-19 ·

There is provided a method in a node of a communications network, the method comprising logging packet information for network traffic related to a client. The method further comprises sending the logged packet information for network traffic related to the client from a network layer to an host layer within the node. The method further comprises identifying application level payloads for network traffic related to the client at the host layer within the node. The method further still comprises correlating the packet information with the application level payloads for network traffic related to the client.

SYSTEM AND METHOD FOR CLASSIFYING AND HANDLING VOICE OVER IP TRAFFIC
20250193306 · 2025-06-12 ·

A system and method for handling Voice over Internet Protocol (VOIP) traffic flows on a computer network, and, in particular, encrypted VoIP traffic flows. The method including: collecting traffic flow data with respect to an IP session; collecting parameters associated with the IP session; determining whether the IP session is a VoIP session; correlating IP sessions having similar parameters to the collected parameters; and creating at least one Internet Protocol Detail Record (IPDR) or Call Detail Record (CDR) based on the correlated IP sessions. The system including: a collection module configured to collect traffic flow data; an analysis module configured to determine parameters and determine whether the IP session is a VoIP session; and a correlation module configured to correlate IP sessions having similar parameters; and create at least one Internet Protocol Detail Record (IPDR) or Call Detail Record (CDR) based on the correlated IP sessions.

Device assisted CDR creation, aggregation, mediation and billing
12395591 · 2025-08-19 · ·

There is provided a system including a processor of a network device in communication with a wireless network. The processor is configured to collect device generated service usage information for one or more devices in wireless communication on the wireless network, and provide the device generated service usage information in a syntax and a communication protocol that can be used by other network devices to augment or replace network generated service usage information for the one or more devices in wireless communication on the wireless network.

Device Assisted CDR Creation, Aggregation, Mediation and Billing
20250358373 · 2025-11-20 · ·

There is provided a system including a processor of a network device in communication with a wireless network. The processor is configured to collect device generated service usage information for one or more devices in wireless communication on the wireless network, and provide the device generated service usage information in a syntax and a communication protocol that can be used by other network devices to augment or replace network generated service usage information for the one or more devices in wireless communication on the wireless network.

TRAJECTORY MINING FOR DATA MESSAGE ROUTING
20260046238 · 2026-02-12 ·

A methodological technical approach is proposed herein that utilizes historical data to employ a heuristic optimization algorithm for data message routing. While not specifically limited to the banking sector and financial institutions, as a practical example, the approach can utilize historical data relating to patterns of transactions for analyzing customer behavior and detecting fraudulent activities. For example, trajectory mining can be used to analyze the transaction patterns of credit card users, or behavioural patterns of mobile banking users, such as checking account balance, transferring funds and paying bills.

Adapting network policies based on device service processor configuration

Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.