Patent classifications
H04L12/14
SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS
A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
SYSTEM AND METHOD FOR PROVIDING USER NOTIFICATIONS
A method performed by an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or more notification requests from a network element in response to the device action; performing one of the one or more notification actions in response to the notification request, the notification action causing the end user device to retrieve at least a portion of a notification message associated with a status of the use, the at least a portion of the notification message being separate from the one of the one or more notification requests; and presenting the notification message on a user interface of the end user device.
Method for assisting unregistered user device to access private network service and communication system
The disclosure provides a method for assisting an unregistered user device to access private network services and a communication system. The method includes steps as follows. A request to access a private service of a private network is sent by a user device. In response to determining that the user device not registered on the private network wants to access the private service, the user device is assisted to obtain a temporary user profile by a mobile edge computing server through an emergency type attachment procedure. In response to determining that the user device is registered on the private network through the emergency type attachment procedure, a regular attachment procedure is executed by the user device based on the temporary user profile. In response to determining that the user device executes the regular attachment procedure, the mobile edge computing server provides the user device with the private service.
Techniques for extending a cellular quality of service bearer through an enterprise fabric
Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.
Adapting network policies based on device service processor configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Adapting network policies based on device service processor configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Method and apparatus for collecting network data
Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.
Virtual network function management
Embodiments of the present disclosure relate to methods, apparatuses and computer readable mediums for Virtual Network Function (VNF) management. In example embodiments, there is provided a method of managing a VNF. The method includes sending, from a VNF manager to a charging component, at least one request for charging information associated with at least one VNF. The VNF manager manages the at least one VNF. The charging information indicates respective rates for charging the at least one VNF under different network conditions. The method further includes, in response to receiving the charging information, managing lifecycle of the at least one VNF at least in part based on the charging information.
Virtual network function management
Embodiments of the present disclosure relate to methods, apparatuses and computer readable mediums for Virtual Network Function (VNF) management. In example embodiments, there is provided a method of managing a VNF. The method includes sending, from a VNF manager to a charging component, at least one request for charging information associated with at least one VNF. The VNF manager manages the at least one VNF. The charging information indicates respective rates for charging the at least one VNF under different network conditions. The method further includes, in response to receiving the charging information, managing lifecycle of the at least one VNF at least in part based on the charging information.
Transaction-enabled systems and methods for royalty apportionment and stacking
Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.