Patent classifications
H04M15/8038
METHOD TO DYNAMICALLY SELECT A MOBILE OPERATOR SUBSCRIPTION BASED ON THE TERMINAL LOCATION, ON THE RECEIVED SIGNAL STRENGTHS AND ON BUSINESS AGREEMENTS, CORRESPONDING SECURE ELEMENT AND HOME SUBSCRIBER SERVER
Provided is a method for dynamically selecting a mobile subscription for a secure element cooperating with a terminal in a telecommunication system comprising a network visited by the terminal and a HSS of a server The method includes sending from the secure element a random e-IMSI ephemeral IMSI in a first attachment request message to the HSS through the visited network, the visited network having the best received signal and having a roaming agreement with an e-IMSI service provider; and transmitting 101 from the HSS to the secure element in a signaling message a PLMN list of all the local operators having a commercial agreement with the e-IMSI service provider.
OPTIMIZED SYSTEM AND METHOD FOR NOTIFYING A CALLED PARTY OF A CALL ATTEMPT
A system and method for notifying a called party of a call attempt is provided. The method comprises initiating a communication request by a calling party; routing the communication request to an intelligent network via an mobile service center; validating the communication request by the intelligent network; and handing over the communication request to an intelligent platform by the intelligent network in the event of a nonstandard trigger event such as calling party insufficient balance. The processing of communication request by the intelligent platform includes monitoring number of call attempts, introducing a delay in sending notification, monitoring availability of called party and performing one or more actions based on the delay and the availability of the called party.
METHOD FOR ACCESSING A ROAMING DEVICE AND CORRESPONDING PROXY NETWORK
A roaming device sends, through a visited network and a proxy network, to a home network, an identifier for a first subscription. The home network sends, through the proxy network, to the visited network, data relating to the first subscription. The proxy network sends to the home network a first temporary address. The visited network sends to the proxy network a second temporary address. The device activates a second subscription. The device sends, through the visited network and the proxy network, to the roaming provider network, an identifier for the second subscription. The roaming provider network sends, through the proxy network, to the visited network, data relating to the second subscription. The proxy network registers the first subscription identifier, the second subscription identifier, the first temporary address and the second temporary address. The proxy network sends to the roaming provider network the first temporary address.
COMMUNICATION USING VIRTUAL NUMBERS
Examples disclosed herein involve receiving a request from a calling device to establish a communication session between a mobile device and the calling device, the mobile device assigned a virtual telephone number, retrieving location information corresponding to a location of the mobile device from a location register, and sending a redirect to a session border controller (SBC) to establish the communication session between the calling device and the mobile device based on the location information.
5G network slicing with distributed ledger traceability and resource utilization inferencing
Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.
TELEPHONY APPLICATION SERVER CHARGING FOR EVOLVED PACKET SYSTEM FALLBACK
A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.
Method and Apparatus for Signaling Session Terminations in a Communication Network
Protocol Data Unit (PDU) sessions in a communication network (10) provide logical interconnections between Data Networks (DNs) (16) and respective User Equipments (UEs) (12) that access the DNs (16) via the communication network (10), and the communication network (10) establishes one or more affiliated sessions in conjunction with each PDU session, such as an affiliated charging or policy control session. Rather than requiring the high signaling overhead associated with mass terminations of these affiliated sessions on a per session basis, the Network Functions (NFs) (32, 34, 36) contemplated herein provide for batch termination of a potentially large plurality affiliated sessions, based on the exchange of a corresponding batch termination message. Disclosed batch termination techniques include the exchange of information during session establishment, for later determination of which affiliated sessions are subject to batch termination.
Virtualized Policy & Charging System
A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.
Context aware cloud service availability in a smart city by renting temporary data centers
The present invention may include a computer identifies an event in an area. The computer predicts a demand for one or more cloud services for the event. The computer identifies a vehicle in an area of the event, where the vehicle have a dynamic vehicle cloud server and the computer caches the one or more cloud services for the event to the dynamic vehicle cloud server.
SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.