H04M15/751

METHOD TO DYNAMICALLY SELECT A MOBILE OPERATOR SUBSCRIPTION BASED ON THE TERMINAL LOCATION, ON THE RECEIVED SIGNAL STRENGTHS AND ON BUSINESS AGREEMENTS, CORRESPONDING SECURE ELEMENT AND HOME SUBSCRIBER SERVER

Provided is a method for dynamically selecting a mobile subscription for a secure element cooperating with a terminal in a telecommunication system comprising a network visited by the terminal and a HSS of a server The method includes sending from the secure element a random e-IMSI ephemeral IMSI in a first attachment request message to the HSS through the visited network, the visited network having the best received signal and having a roaming agreement with an e-IMSI service provider; and transmitting 101 from the HSS to the secure element in a signaling message a PLMN list of all the local operators having a commercial agreement with the e-IMSI service provider.

SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
20230231820 · 2023-07-20 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

DYNAMIC EMBEDDED-SIM CONFIGURATION

Embodiments of the present invention provide computer-implemented methods, computer program products, and computer systems. Embodiments of the present invention can dynamically determine an optimal embedded subscriber identification module (eSIM) configuration of respective edge devices connected to a network. Embodiments of the present invention can then dynamically change a data plan associated with the eSIM of respective edge devices connected to the network such that activity can be executed with required quality by the respective edge devices based on contextual need of data processing, volume of data transfer, and speed of data transfer among the respective edge devices.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
11615253 · 2023-03-28 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

Online charging for multi-user agent instances served by different telephony application servers
11621860 · 2023-04-04 · ·

Techniques for allowing access based online charging in cases of multiple user agents (multi-UAs) scenarios where the instances are registered to different telephony application servers (TASs) are discussed herein. For example, a user device may support a native number and multiple virtual numbers linked via a user account. When servicing a call, the user device may determine a served number to service the call from. If the served number is not the native number but a virtual number, the native-line server may handle the call session, but the online charging session will be handled by the virtual-line server. The native-line server may use session initiation protocol (SIP) information to send updated information for charging parameters to the virtual-line server, including network access transfer for accuracy in online charging logic.

METHOD AND APPARATUS FOR CREATING AND USING A ROAMING LIST BASED ON A USER ROAMING PLAN

A server of a wireless operator creates a roaming list based on a user's roaming plan and sends the roaming list to the user's wireless device. The roaming list includes a list of public land mobile networks (PLMNs). When the user travels away from their home wireless network to another geographic area, the wireless device scans based on the roaming list for radio signals. The roaming list contributes to user satisfaction because timely attachment to a radio network while away from home occurs efficiently since the wireless operator creates the roaming list based on both i) roaming agreements that the wireless operator is a party to with other wireless operators, ii) the user's roaming plan, iii) the radio access technology (RAT) capabilities of the wireless device and iv) the RAT capabilities of other wireless operators in particular geographic regions.

System and method for securely connecting network devices

A platform, apparatus and method for Internet of Things Implementations. For example, one embodiment of a system comprises: an Internet of Things (IoT) hub comprising a network interface to couple the IoT hub to an IoT service over a wide area network (WAN), and programming logic to program an identification device with one or more encryption keys usable to establish encrypted communication with an IoT device; and at least one IoT device interfacing with the identification device following programming of the identification device by the IoT hub; wherein once the identification device is programmed and interfaced with the IoT device, the IoT device uses the one or more keys to establish a secure communication channel with the IoT hub and/or the IoT service.

POLICY ENFORCEMENT IN A 3GPP ENVIRONMENT WHILE ENSURING CONGESTION AVOIDANCE ON USER PLANE FUNCTION NORTHBOUND INTERFACES

Systems and methods are provided for providing differential treatment to user traffic involving optimized reporting of start and stop traffic. The systems and method can include detecting, at a user plane function, an initiation of a type of traffic being performed at the user plane function, providing, by the user plane function, a start event trigger of the type of traffic detected by the user plane function to a session management function, and receiving, at the user plane function, a policy associated with the type of traffic from the session management function, the policy including instructions preventing submissions of subsequent event triggers to the session management function until an end of the type of traffic, the subsequent event triggers being associated with the type of traffic detected by the user plane function.

Method and system for dynamic cellular networking activation for virtual SIM service

A method at a user equipment to facilitate activation and splitting of data billing between at least two parties, the method including starting, at the user equipment, a virtual subscriber identity module platform (‘VSP’) service on the user equipment; verifying VSP configuration information with a network server; upon verification, starting a data networking access point name (‘APN’) based on the configuration information on the user equipment; and setting a status indicator on the user equipment to indicate the VSP service is enabled.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
11256875 · 2022-02-22 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.