Patent classifications
H04M15/41
Method and system for fairly charging talk time of video call that introduces new person
A computer-implemented billing method including displaying, on a video call screen, video data related to a counterpart terminal with which a video call is connected, recognizing reaction information input from the counterpart terminal based on the video data related to the counterpart terminal displayed on the video call screen, and generating billing data related to the recognized reaction information of the counterpart terminal based on a billing policy may be provided.
VOLUME-BASED ONLINE CHARGING IN HYBRID NETWORKS
A method for enabling a charging of packet switched data transfer between an authorized customer and a network. The method includes transferring a total data volume via at least a first data path and a second data path between an equipment related to the authorized customer and a hybrid access aggregation point (HAAP) as an access to the network. Each of the at least a first data path and a second data bath use a different access technology for transferring its respective part of the total data volume. The total data volume is determined as a sum of the respective parts of the total data volume transferred in both the first path and the second path. The total data volume is used by a central charging unit for a charging.
METHOD AND SYSTEM FOR TRANSITION OF APPLICATIONS TO A SECOND CELLULAR DATA NETWORKING INTERFACE FOR A VIRTUAL SIM SERVICE
A method at a user equipment to facilitate splitting of data billing between at least two parties, the method assigning a first subset of application to a first forwarding information base (“FIB”) on the user equipment; associating the first FIB with a first cellular data interface; activating the splitting of data billing on the user equipment; and replacing the association in the first FIB to the first cellular interface with an association between a second cellular data interface and the first FIB.
SYSTEM AND METHOD FOR A MEDIA INTELLIGENCE PLATFORM
A multi-tenant media processing platform system and method. At least a first media analysis service of a plurality of media analysis services is activated for at least a portion of an active communication session of an entity in the platform system. The first activated media analysis service performs a first media analysis on media of the active communication session that is collected by the platform system. The first activated media analysis service performs the first media analysis on the collected media while the communication session is active to generate a first media analysis result. During the active communication session, at least one media analysis result is applied.
Method and system for performing charging on network resource, and device
This application provides example methods, systems, and devices for performing charging on a network resource. One example method includes sending, by a network slice charging function device, a first message to a network slice management function device, where the first message includes an identifier of a network slice instance and filtering information, the filtering information indicates the network slice management function device to send a value that is of a network slice performance indicator of the network slice instance and that matches the filtering information, and the network slice performance indicator describes network performance of the network slice instance. The network slice charging function device can then receive a second message from the network slice management function device, where the second message includes the value. The network slice charging function device can then perform charging on the network slice instance based on the value.
TELEPHONY APPLICATION SERVER CHARGING FOR EVOLVED PACKET SYSTEM FALLBACK
A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.
Method and user equipment for detecting a potentially fraudulent call
A method and a User Equipment, UE (120) for detecting that the UE has received a fraudulent missed call, e.g. from a non-legitimate device (150). When receiving a missed call which is ended before a user of the UE has answered the incoming call, the UE determines the duration of the missed call, and indicates, e.g. to a user of the UE, the 5 duration of the missed call. The missed call may be determined as potentially fraudulent if the duration of the missed call is below or equal to a predetermined threshold.