Patent classifications
H04M15/51
5G network slicing with distributed ledger traceability and resource utilization inferencing
Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.
Enhanced gradient boosting tree for risk and fraud modeling
Methods and systems are presented for generating a machine learning model using enhanced gradient boosting techniques. The machine learning model is configured to receive inputs corresponding to a set of features and to produce an output based on the inputs. The machine learning model includes multiple layers, wherein each layer includes multiple models. To generate the machine learning model, multiple models are built and trained in parallel for each layer of the machine learning model. The multiple models use different subsets of features to produce corresponding output values. After a layer in built and trained, a collective error may be determined for the layer based on the output values from the different models in the layer. An additional layer of models may be added to the machine learning model to reduce the collective error of a previous layer.
Managing service user discovery and service launch object placement on a device
Methods and apparatuses to manage service user discovery and service launch object placement on a device. A method comprising: obtaining information to assist in identifying a portion of a user interface of a wireless device, the wireless device communicatively coupled to a network system over a wireless access network; determining a differentiating attribute of the identified portion of the user interface; obtaining one or more service launch objects for placement in the identified portion of the user interface; and sending configuration information to the wireless device over the wireless access network to assist the wireless device in placing the one or more service launch objects in the identified portion of the user interface.
System and method for mitigating international revenue share fraud
Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.
DATA VOLUME EXCHANGE SERVER, INTERNATIONAL COMMUNICATION SYSTEM, DATA VOLUME EXCHANGE METHOD, AND DATA VOLUME EXCHANGE PROGRAM
A data volume exchange server includes a terminal IF unit configured to receive an exchange request for a contract data volume of an own country and a contract data volume of another country from terminals of subscribers having contract data volumes of telecommunication carriers of countries different from each other, a data volume exchange unit configured to perform matching of a pair in which another country that requests a contract data volume in one of the received exchange requests matches the own country that provides a contract data volume in another of the received exchange requests, and a server IF unit configured to instruct the communication servers of the telecommunication carriers in the countries to transfer a contract data volume of a matched subscriber of the own country as an exchanged data volume of a subscriber of the other country who is a matching partner.
System and method for providing a network service in a distributed fashion to a mobile device
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Data management apparatus, data management method, and data communication system
A data management apparatus manages a plurality of data items output by a plurality of communication devices that output data. The data management apparatus includes at least one memory configured to store instructions, and at least one processor configured to execute the instructions. The instructions, when executed by the at least one processor, include receiving a data acquisition request, including an application identification of an application from the data acquisition apparatus, extracting data output by the application on a communication device corresponding to the application identification included in the data acquisition request, among the plurality of data items received from the plurality of communication devices via a relay apparatus, and transmitting the extracted data to the data acquisition apparatus.
MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
Overlay network encapsulation to forward data message flows through multiple public cloud datacenters
Some embodiments establish for an entity a virtual network over several public clouds of several public cloud providers and/or in several regions. In some embodiments, the virtual network is an overlay network that spans across several public clouds to interconnect one or more private networks (e.g., networks within branches, divisions, departments of the entity or their associated datacenters), mobile users, and SaaS (Software as a Service) provider machines, and other web applications of the entity. The virtual network in some embodiments can be configured to optimize the routing of the entity's data messages to their destinations for best end-to-end performance, reliability and security, while trying to minimize the routing of this traffic through the Internet. Also, the virtual network in some embodiments can be configured to optimize the layer 4 processing of the data message flows passing through the network.
SYSTEM AND METHOD FOR MITIGATING INTERNATIONAL REVENUE SHARE FRAUD
Aspects of the subject disclosure may include, for example, a non-transitory, machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations including receiving a call; selecting a next carrier to handoff the call; generating a call data record (CDR) for the handoff to the next carrier; encrypting the CDR using a call encryption key, thereby creating an encrypted CDR; encrypting the encrypted CDR using a committee encryption key, thereby creating a double encrypted CDR; recording the double encrypted CDR to a blockchain; and sending the call encryption key to the next carrier. Other embodiments are disclosed.