Patent classifications
H04M15/68
SERVICE PROCESSING METHOD, PCRF, AND SERVICE PROCESSING SYSTEM
Embodiments of the present disclosure disclose a service processing method, a PCRF, and a system. The method performed by the PCRF includes: obtaining service information of a service, where the service information includes a service identity; obtaining, according to user information and the service information, information indicating that the service requires QoS guarantee, and service chain information; when determining, according to the service chain information, that a network resource occupied by the service may be changed, sending the service identity and the information indicating that the service requires the QoS guarantee to a value-added service processor; receiving target service information, returned by the value-added service processor, of the service corresponding to the service identity; generating a first control policy according to the target service information; and sending the first control policy to a PCEF, so that the PCEF reserves a first network resource according to the first control policy.
Virtualized Policy & Charging System
A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.
Wireless end-user device providing ambient or sponsored services
A wireless end-user device is disclosed. One or more user inputs indicate that a user of the wireless end-user device authorizes the device to send a first file to a server over a network of a first network type, and that the user does not authorize the device to send a second file to the server over the network of the first type. Based on the one or more user inputs and a determination that the device is connected to the network of the first type, the device sends the first file, but not the second file, to the server over the network of the first network type. Upon detecting that the device is connected to a network of the second network type, the device sends the second file to the server over the network of the second network type.
MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
Virtualized policy and charging system
A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.
Wireless End-User Device Providing Ambient or Sponsored Services
A wireless end-user device is disclosed. One or more user inputs indicate that a user of the wireless end-user device authorizes the device to send a first file to a server over a network of a first network type, and that the user does not authorize the device to send a second file to the server over the network of the first type. Based on the one or more user inputs and a determination that the device is connected to the network of the first type, the device sends the first file, but not the second file, to the server over the network of the first network type. Upon detecting that the device is connected to a network of the second network type, the device sends the second file to the server over the network of the second network type.
System and method for running a multi-module telephony application
A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.
Asynchronously initiating online charging triggers in mobile networks
Techniques and mechanisms for asynchronously initiating online charging triggers in mobile networks are described. A control plane gateway or “GW-C” may obtain from a mobility management entity (MME) a create session request associated with an attach request for a user equipment (UE). The GW-C may send to an online charging system (OCS) a Gy credit-control request for requesting a quota of units (e.g. a resource usage quota) associated with a subscriber of the UE. Prior to sending the Gy credit-control request or obtaining a Gy credit-control answer, the GW-C may send to the MME a create session response which prompts an attach accept or reject of the attach request. The Gy credit-control request may be sent to the OCS during an attach procedure associated with the attach request for the UE or, alternatively, in response to receiving a user data packet of the session as a notification.
Mobile device roaming optimization and operation
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
SYSTEM AND METHOD FOR RUNNING A MULTI-MODULE TELEPHONY APPLICATION
A system and method of a telephony application platform can include receiving a communication session request specifying a destination endpoint, connecting the communication session through a first application module according to the destination endpoint, receiving an instruction to transition communication control to a second application module, transitioning communication control of the communication session to the second application module, independently metering resource usage of the communication session of each application module, and accounting the metered usage of the communication session.