H04M15/72

Method and system for fairly charging talk time of video call that introduces new person
11558721 · 2023-01-17 · ·

A computer-implemented billing method including displaying, on a video call screen, video data related to a counterpart terminal with which a video call is connected, recognizing reaction information input from the counterpart terminal based on the video data related to the counterpart terminal displayed on the video call screen, and generating billing data related to the recognized reaction information of the counterpart terminal based on a billing policy may be provided.

Service design center for device assisted services

A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.

Toll-free telecommunications and data management platform

A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.

Toll-free numbers metadata tagging, analysis and reporting

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

Adjustable and dynamic thresholds in wireless networks

Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.

MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION

A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.

SYSTEM, METHOD, AND COMPUTER PROGRAM FOR ORCHESTRATING RE-PROVISIONING OF NETWORK SUBSCRIBER DEDICATED NETWORK SLICES
20220345995 · 2022-10-27 ·

As described herein, a system, method, and computer program are provided for orchestrating re-provisioning of network subscriber dedicated network slices. A request is received from an entity for use of a network. Network slice information indicating a plurality of slices of the network dedicated to a plurality of network subscribers is accessed. Provisioning of one of more slices of the plurality of slices to the entity is orchestrated, according to the request.

SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS

A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.

Service Design Center for Device Assisted Services

A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.

System, method, and computer program for orchestrating re-provisioning of network subscriber dedicated network slices

As described herein, a system, method, and computer program are provided for orchestrating re-provisioning of network subscriber dedicated network slices. A request is received from an entity for use of a network. Network slice information indicating a plurality of slices of the network dedicated to a plurality of network subscribers is accessed. Provisioning of one of more slices of the plurality of slices to the entity is orchestrated, according to the request.