Patent classifications
H04M15/8083
OPTIMIZATION APPARATUS, OPTIMIZATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM IN WHICH OPTIMIZATION PROGRAM IS STORED
An optimization apparatus (100) includes a setting unit (110) that sets a predetermined non-linear objective function, a policy determination unit (120) that determines a policy to be executed in online optimization in a bandit problem, based on the non-linear objective function, a policy execution unit (130) that acquires a reward as an execution result of the determined policy, an update rate determination unit (140) that determines an update rate of the non-linear objective function by a multiplicative weight update method, based on the acquired reward and the non-linear objective function, and an update unit (150) that updates the non-linear objective function, based on the update rate.
METHOD, COMPUTER PROGRAM, AND ALGORITHM FOR COMPUTING NETWORK SERVICE VALUE PRICING BASED ON COMMUNICATION SERVICE EXPERIENCES DELIVERED TO CONSUMERS AND MERCHANTS OVER A SMART MULTI-SERVICES (SMS) COMMUNICATION NETWORK
A system and method for providing multi-services within a communication network according to various exemplary embodiments can include storing, in a database of a computer, user-defined sets of rules and instructions for providing multi-services to end user devices connected to a communication network comprising a Hybrid Fiber-Wireless (HFW) network having policy management capabilities. The system and method can receive, at one or more processors, the user-defined sets of rules and instructions from a plurality of end users via a plurality of end user devices. The system and method can configure a virtual network for each end user within the communication network using the policy management capabilities based on the user-defined sets of rules and instructions provided by each end user. The user-defined sets of rules and instructions define provisioning and delivery of resources and services provided by the communication network to the end user.
Methods and Systems for Facilitating Subsidized Access by a User to Network Content
An exemplary method includes a subsidized access management system detecting a request provided by a user of an access device for the user to receive subsidized access to network content, identifying a plurality of user parameters provided by the user and that define a plurality of conditions associated with the subsidized access to the network content and that the user is willing to experience in order to receive the subsidized access to the network content, selecting a sponsor from a pool of potential sponsors and that is willing to sponsor the subsidized access to the network content in accordance with the plurality of user parameters, and providing the user with the subsidized access to the network content by way of the access device in accordance with a subsidized access arrangement between a subsidized access provider and the sponsor. Corresponding systems and methods are also described.
SYSTEM AND METHOD FOR SUBSCRIBER TIER PLAN ADJUSTMENT IN A COMPUTER NETWORK
A method for subscriber tier plan adjustment including: monitoring traffic flow for one or more subscriber of a plurality of subscribers on an operator’s network; determining a bandwidth requirement for each of the one or more subscribers; determining a recommended tier plan for each subscriber based on the subscribers’ bandwidth requirement; and providing the recommended tier plan for each of the subscribers to a network operator. A system for subscriber tier plan adjustment including: a learning module configured to monitor traffic flow for one or more subscribers of a plurality of subscribers on a network and determine a bandwidth requirement of each of the one or more subscribers; an analysis module configured to determine a recommended tier plan for each of the subscribers based on each subscriber’s bandwidth requirement; and a notification module configured to provide the recommended tier plan for each subscriber.
METHODS AND SYSTEMS OF USING REMOTE SUBSCRIBER IDENTIFICATION MODULES AT A DEVICE
The present invention discloses methods and systems for communicating at a cellular router between a first wireless communication module and a first subscriber identity module (SIM). The cellular router receives a first request from a first wireless communication module and encapsulates the first request in a first modified request. The cellular router then sends the first modified request to a first SIM card in a first communication apparatus and waits for a first modified reply. While waiting for the first modified reply the cellular router sends at least one halt message to the first wireless communication module after a first time threshold. After receiving the first modified reply, the cellular router decapsulates the first modified reply to retrieve a first reply and sends the first reply to the first wireless communication module where the first modified reply is a reply to the first modified request.
Virtualized Policy & Charging System
A network system for providing one or more services to one or more end-user devices communicatively coupled to the network system over a wireless access network, the network system comprising: a policy enforcement function, a first policy element, a second policy element, and a network element, wherein the network element is communicatively coupled to the policy enforcement function, the first policy element, and the second policy element, and wherein the network element is configured to communicate first policy information between the policy enforcement function and the first policy element, and communicate second policy information between the first policy enforcement function and the second policy element.
Toll-free telecommunications and data management platform
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Managing service user discovery and service launch object placement on a device
Methods and apparatuses to manage service user discovery and service launch object placement on a device. A method comprising: obtaining information to assist in identifying a portion of a user interface of a wireless device, the wireless device communicatively coupled to a network system over a wireless access network; determining a differentiating attribute of the identified portion of the user interface; obtaining one or more service launch objects for placement in the identified portion of the user interface; and sending configuration information to the wireless device over the wireless access network to assist the wireless device in placing the one or more service launch objects in the identified portion of the user interface.
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.