H04M15/50

DIFFERENTIAL CHARGING FOR LICENSED AND UNLICENSED SPECTRUM USAGE
20180007212 · 2018-01-04 · ·

Embodiments of the present disclosure describe systems, devices, and methods for charging architectures in cellular networks. Various embodiments may include an eNB collecting information about licensed and unlicensed spectrum resource usage on a per bearer basis and transmitting the information to a core network node. Other embodiments may be described or claimed.

5G network slicing with distributed ledger traceability and resource utilization inferencing

Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.

TELEPHONY APPLICATION SERVER CHARGING FOR EVOLVED PACKET SYSTEM FALLBACK
20230239665 · 2023-07-27 ·

A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.

MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION

A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.

SYSTEMS AND METHODS FOR DETERMINING THE SHAREABILITY OF VALUES OF NODE PROFILES
20230031801 · 2023-02-02 · ·

The present disclosure relates to determining the shareability of values of node profiles. Record objects and electronic activities of a system of record corresponding to a data source provider may be accessed. Each record object may correspond to a record object type and have one or more object field-value pairs. Node profiles may be maintained. Values of fields corresponding to a predetermined type of field including fewer than a predetermined threshold number of data source providers may be identified. A restriction tag used to restrict populating other node profiles may be generated. Provision of the value with a second data source provider may be restricted.

SYSTEMS AND METHODS FOR UPDATING RECORD OBJECTS OF A SYSTEM OF RECORD

The present disclosure relates to generating performance profiles of member nodes. A plurality of electronic activities can be accessed. A subset of electronic activities from the plurality of electronic activities can be identified. The subset of electronic activities can be parsed to identify participants of the electronic activities. A second node profile can be accessed for each participant. Participant types can be identified from each second node profiles. A distribution of the subset of electronic activities can be determined. A performance profile can be generated.

METHOD OF ENABLEMENT OF SERVICE API EXPOSED BY EAS AND DEVICES FOR PERFORMING THE SAME

Provided are a method of enablement of service APIs exposed by an EAS and devices for performing the same. A service API enablement method includes performing, by a first edge application server (EAS), an onboarding process with an edge enabler server (EES), discovering, by the first EAS, a service API in the EES, and invoking, by the first EAS, the service API discovered in the EES and published by a second EAS.

Apparatus, methods, and articles of manufacture for filtering calls and reducing spoofing and spamming
11665277 · 2023-05-30 ·

Unsolicited electronic communications such as robocalls and person-initiated solicitation calls are reduced by imposing tolls for completion of the connections to the called parties, and refunding the tolls to the entities indicated by the electronic communications as the calling parties. In this way, a dishonest originator of a spoofed call bears the cost of the toll, and the toll is not refunded to the dishonest originator. On the other hand, the toll collected from an honest originator of a non-spoofed call is refunded to the honest originator, making the toll transparent to the honest originator and avoiding annoyance of the honest caller caused by the toll. Unsolicited calls may be subjected to filtering, particularly filtering based on the indications of the origins of the calls.

FEDERATED MEC FRAMEWORK FOR AUTOMOTIVE SERVICES
20230164241 · 2023-05-25 ·

A computing node to implement a federation management entity associated with a federated MEC network includes a NIC and processing circuitry coupled to the NIC. The processing circuitry is configured to detect a request for a MEC service, the request originating from a MEC application instantiated on a first MEC host within a first MEC system of the federated MEC network. A second MEC system of the federated MEC network is selected, which includes a second MEC host providing the MEC service. A set of common credentials for secure communication between the first and second MEC systems is determined. A response to the request is generated for communication to the first MEC system via the NIC. The response includes the set of common credentials and identification information of a MEC management entity in the second MEC system. The MEC management entity provides access to the MEC service.

Telephony application server charging for evolved packet system fallback

A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.