H04M15/49

METHOD TO DYNAMICALLY SELECT A MOBILE OPERATOR SUBSCRIPTION BASED ON THE TERMINAL LOCATION, ON THE RECEIVED SIGNAL STRENGTHS AND ON BUSINESS AGREEMENTS, CORRESPONDING SECURE ELEMENT AND HOME SUBSCRIBER SERVER

Provided is a method for dynamically selecting a mobile subscription for a secure element cooperating with a terminal in a telecommunication system comprising a network visited by the terminal and a HSS of a server The method includes sending from the secure element a random e-IMSI ephemeral IMSI in a first attachment request message to the HSS through the visited network, the visited network having the best received signal and having a roaming agreement with an e-IMSI service provider; and transmitting 101 from the HSS to the secure element in a signaling message a PLMN list of all the local operators having a commercial agreement with the e-IMSI service provider.

VOLUME-BASED ONLINE CHARGING IN HYBRID NETWORKS

A method for enabling a charging of packet switched data transfer between an authorized customer and a network. The method includes transferring a total data volume via at least a first data path and a second data path between an equipment related to the authorized customer and a hybrid access aggregation point (HAAP) as an access to the network. Each of the at least a first data path and a second data bath use a different access technology for transferring its respective part of the total data volume. The total data volume is determined as a sum of the respective parts of the total data volume transferred in both the first path and the second path. The total data volume is used by a central charging unit for a charging.

MOBILE COMMUNICATIONS TRANSMISSION SYSTEM FOR PROVIDING A MULTIPLICITY OF MOBILE COMMUNICATIONS CELLS IN A BUILDING OR CAMPUS

A mobile communications transmission system provides a plurality of mobile communications cells in a building or campus. It comprises a first baseband unit and a first gateway device, which is connectable to a data network. At least one transceiver unit is connected to the first baseband unit. The at least one transceiver unit is configured to provide at least one first mobile communications cell. By way of this first mobile communications cell, a subscriber device in the building can exchange information with the data network. A first control device is connected to the first baseband unit and the first gateway device. The first baseband unit and the first gateway device are installed in the building or campus in which the at least one transceiver unit provides the at least one first mobile communications cell, whereas the first control device is accommodated remote therefrom at an operating company.

5G network slicing with distributed ledger traceability and resource utilization inferencing

Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.

System and method for mitigating international revenue share fraud

Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.

DATA VOLUME EXCHANGE SERVER, INTERNATIONAL COMMUNICATION SYSTEM, DATA VOLUME EXCHANGE METHOD, AND DATA VOLUME EXCHANGE PROGRAM
20230217219 · 2023-07-06 ·

A data volume exchange server includes a terminal IF unit configured to receive an exchange request for a contract data volume of an own country and a contract data volume of another country from terminals of subscribers having contract data volumes of telecommunication carriers of countries different from each other, a data volume exchange unit configured to perform matching of a pair in which another country that requests a contract data volume in one of the received exchange requests matches the own country that provides a contract data volume in another of the received exchange requests, and a server IF unit configured to instruct the communication servers of the telecommunication carriers in the countries to transfer a contract data volume of a matched subscriber of the own country as an exchanged data volume of a subscriber of the other country who is a matching partner.

Methods for evaluating and optimizing preferred provider organization (PPO) network stacks and devices thereof

Methods, non-transitory machine readable media, and network stack analysis devices that generate optimized preferred provider organization (PPO) network stacks are disclosed. With this technology, electronic transactions are applied to each of a first plurality of network stacks to determine a cost reduction value for each of the first network stacks. Each of the first network stacks includes an ordered subset of networks. The first network stacks are resampled based on the determined cost reduction values. A determination is made when one or more convergence criteria are met by the resampled first network stacks. When the determination indicates that the convergence criteria are not met by the resampled first network stacks, one or more of the first network stacks are modified based on genetic crossover or mutation operation(s) to generate a second plurality of network stacks. The application, resampling, and determination are then repeated for the second network stacks.

MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION

A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.

Method for transmitting and receiving data in wireless communication system and terminal therefor
11596010 · 2023-02-28 · ·

Disclosed is a method in which a first terminal receives data in a wireless communication system. Specifically, the method may include transmitting a first message that includes a sidelink communication request and receiving sidelink communication data from a second terminal. In particular, the first terminal may be a subscriber of a first Public Land Mobile Network (PLMN), and the second terminal may be a subscriber of a second PLMN different from the first PLMN. In addition, the sidelink communication data may be received by using a carrier of the first PLMN. The first terminal is capable of communicating with at least one of another UE, a UE related to an autonomous driving vehicle, a base station or a network.

Partial Perceptual Image Hashing for Document Deconstruction

A system and method for deconstructing a document is described herein, where the method is an improvement over existing document deconstruction techniques. These improvements increase speed and accuracy by rapidly identifying the source in a document by splitting the document into a plurality of sections and performing a perceptual image hashing on each section. Then a hamming distance is used to compare the hash for each section with the hashes of known documents to identify the source who sent the document.