Patent classifications
H04M15/58
Adapting network policies based on device service processor configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Method and apparatus for collecting network data
Disclosed herein are a method and an NWDAF for collecting network data, including: transmitting a network exposure subscription request message including an event reporting granularity parameter to the NF; receiving a data set determined by the NF based on the event reporting granularity parameter from the NF through an event exposure notification message in at least one reporting cycle; and performing network data analysis using received data set.
Information processing method and apparatus
An information processing method includes: obtaining, by a data analytics network element, terminal behavioral information of a plurality of terminals; determining, by the data analytics network element, network-side expected terminal behavioral information based on the terminal behavioral information; and sending, by the data analytics network element, the network-side expected terminal behavioral information to a user data management network element.
System and Method for a Customized Fifth Generation (5G) Network
An embodiment logical function architecture for next-generation 5G wireless networks may include a control plane comprising a software defined topology (SDT) logical entity configured to establish a virtual data-plane logical topology for a service, a software defined resource allocation (SDRA) logical entity configured to map the virtual data-plane topology to a physical data-plane for transporting service-related traffic over the wireless network, and a software defined per-service customized data plane process (SDP) logical entity configured to select transport protocol(s) for transporting the service-related traffic over a physical data-plane of the wireless network. An embodiment virtual service specific serving gateway (v-s-SGW) for next-generation 5G networks may be assigned specifically to a service being provided by a group of wirelessly enabled devices, and may be responsible for aggregating service-related traffic communicated by the group of wirelessly enabled devices.
METHODS AND SYSTEMS FOR TRANSFERRING SIM CARD INFORMATION
The present invention discloses methods and systems for transferring SIM card information from a first device to a server. A first SIM card is housed in the first device or in a first modem connected to the first device. When the first device boots up, it identifies the first SIM card and retrieves SIM card information from the first SIM card. The first device then sends authentication information to the first server and requests historical SIM card activity information. Historical SIM card activity information received from the first server is stored in a storage medium, and is used for determining whether to use the first SIM card. The first server performs steps of receiving a first request message from the first device, and determining the SIM card identity specified in the first request message if the first request message is authentic. The first server retrieves and sends historical SIM card activity information of the first SIM card to the first device.
Service design center for device assisted services
A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
Toll-free telecommunications and data management platform
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Managing service user discovery and service launch object placement on a device
Methods and apparatuses to manage service user discovery and service launch object placement on a device. A method comprising: obtaining information to assist in identifying a portion of a user interface of a wireless device, the wireless device communicatively coupled to a network system over a wireless access network; determining a differentiating attribute of the identified portion of the user interface; obtaining one or more service launch objects for placement in the identified portion of the user interface; and sending configuration information to the wireless device over the wireless access network to assist the wireless device in placing the one or more service launch objects in the identified portion of the user interface.
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
System, method, and computer program for generating insights from home network router data
As described herein, a system, method, and computer program are provided for generating insights from home network router data. In use, network usage/connection data is collected from a home network router operating in a residential space. Additionally, the network usage/connection data is processed to generate insights for the network usage/connection data. Further, the insights are output for display to one or more users.