Patent classifications
H04M15/8027
SYSTEM AND METHOD FOR SUBSCRIBER TIER PLAN ADJUSTMENT IN A COMPUTER NETWORK
A method for subscriber tier plan adjustment including: monitoring traffic flow for one or more subscriber of a plurality of subscribers on an operator’s network; determining a bandwidth requirement for each of the one or more subscribers; determining a recommended tier plan for each subscriber based on the subscribers’ bandwidth requirement; and providing the recommended tier plan for each of the subscribers to a network operator. A system for subscriber tier plan adjustment including: a learning module configured to monitor traffic flow for one or more subscribers of a plurality of subscribers on a network and determine a bandwidth requirement of each of the one or more subscribers; an analysis module configured to determine a recommended tier plan for each of the subscribers based on each subscriber’s bandwidth requirement; and a notification module configured to provide the recommended tier plan for each subscriber.
Toll-free telecommunications and data management platform
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Collaborative scheduling of last hop cellular traffic
An eNodeB or other cell access point device can receive demand data from mobile devices served by the cell. The demand data can represent an estimate of demand over a future period for network resources (e.g., bandwidth). The cell can aggregate this demand data and determine price data for the time period or for various intervals of the time period, then transmit the price data to the mobile devices. The price data can operate as a collaborative approach to scheduling traffic. For example, data (e.g., delay tolerant data) can be shifted (e.g., delayed for a few seconds) based on an examination of the price data in conjunction a determined priority of the data. Such can be applicable to data traffic not traditionally thought of as delay tolerant such as streaming video or web browsing, and can be accomplished without negatively impacting the quality of service or experience of the client.
Limiting contact in a networked contact center environment
This document discusses, among other things, limiting contact to a networked contact center that is a host to multiple tenants. In an example embodiment, a communication is received by a networked contact center. In determining whether to allow the communication to reach contact center resources, a contact rate value may be examined. The contact rate value may represent an allowable quantity of contact within a time interval. For some example embodiments, a determination of whether the network contact center is to accept or reject the communication is made based on the contact rate value.
System and method for encoding of local bandwidth conditions into tunneling message
A method, a system, and a non-transitory storage medium provide for encoding a general packet radio service (GPRS)-tunnel endpoint identifier (GTP-TEID) with data identifying radio frequency (RF) bandwidths supported in a local radio environment (LRE) from which a user equipment (UE) device accesses the wireless access station; sending, via a signaling channel, the GTP-TEID to a core network device; notifying one or more core network devices of an RF bandwidth category level corresponding to the identified RF bandwidths; and applying at least one of a policy rule or a charging rule to a packet data unit (PDU) session for the UE device, based on the RF bandwidth category level.
SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS
A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.
METHOD FOR PREHEATING A RESOURCE FILE AND CENTRAL MANAGEMENT SYSTEM
The present disclosure discloses a method for preheating a resource file, and a central management system, and relates to the field of network communication technology. The method includes: according to historical bandwidth data of a target intermediate node, determining a bandwidth off-peak period of the target intermediate node; during the bandwidth off-peak period of the target intermediate node, pre-caching the resource file on an edge node corresponding to the target intermediate node.
System, method and apparatus for subscriber user interfaces
Methods, apparatus, and systems manage use of shared network resources among subscribers to a data communication service. In some implementations, a first metric is computed representing a subscriber's use of the shared network resources. A second metric may also be computed that represents the amount of network congestion of the shared network resources. Data derived from the first metric and the second metric may then be presented to the subscriber. The data may be transmitted to the subscriber over a network and/or the data may be displayed to the subscriber on an electronic display.
COLLABORATIVE SCHEDULING OF LAST HOP CELLULAR TRAFFIC
An eNodeB or other cell access point device can receive demand data from mobile devices served by the cell. The demand data can represent an estimate of demand over a future period for network resources (e.g., bandwidth). The cell can aggregate this demand data and determine aggregation data for the time period or for various intervals of the time period, then transmit the aggregation data to the mobile devices. The aggregation data can operate as a collaborative approach to scheduling traffic. For example, data (e.g., delay tolerant data) can be shifted (e.g., delayed for a few seconds) based on an examination of the aggregation data in conjunction a determined priority of the data. Such can be applicable to data traffic not traditionally thought of as delay tolerant such as streaming video or web browsing, and can be accomplished without negatively impacting the quality of service or experience of the client.
System and method for subscriber tier plan adjustment in a computer network
A method for subscriber tier plan adjustment including: monitoring traffic flow for one or more subscriber of a plurality of subscribers on an operator's network; determining a bandwidth requirement for each of the one or more subscribers; determining a recommended tier plan for each subscriber based on the subscribers' bandwidth requirement; and providing the recommended tier plan for each of the subscribers to a network operator. A system for subscriber tier plan adjustment including: a learning module configured to monitor traffic flow for one or more subscribers of a plurality of subscribers on a network and determine a bandwidth requirement of each of the one or more subscribers; an analysis module configured to determine a recommended tier plan for each of the subscribers based on each subscriber's bandwidth requirement; and a notification module configured to provide the recommended tier plan for each subscriber.