H04M15/8228

Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
11564266 · 2023-01-24 · ·

In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.

TSC-5G QoS MAPPING WITH CONSIDERATION OF ASSISTANCE TRAFFIC INFORMATION AND PCC RULES FOR TSC TRAFFIC MAPPING AND 5G QoS FLOWS BINDING

Systems and methods are disclosed herein that relate to Time Sensitive Communication (TSC) to Fifth Generation (5G) Quality of Service (QoS) mapping and associated QoS binding. In one embodiment, a method for QoS mapping in a 5G System (5GS) for a virtual Time Sensitive Networking (TSN) bridge comprises, at a first network function, obtaining information from a TSN Application Function (AF) comprising baseline TSC QoS parameters and one or more additional parameters comprising either or both of: (a) one or more additional TSC QoS attributes and (b) one or more additional traffic attributes. The method further comprises, at the first network function, generating one or more Policy and Charging Control (PCC) rules based on the obtained information and providing the one or more PCC rules to a second network function. The method further comprises, at the second network function, performing QoS binding based on the one or more PCC rules.

Method and Apparatus for Service Charging in a Communication Network
20230013156 · 2023-01-19 ·

Charging interval authorizations according to the techniques disclosed herein provide for credit reservation and charging of whole charging intervals across two or more credit containers(36) in or linked to a subscriber account (34), without the need for redefining the charging interval size, even where the types of credit units differ between or among the credit containers (36) used to authorize the charging interval. Among the various advantages, the disclosed techniques preserve the original charging interval size, which may be defined for reasons of signaling efficiency, while simultaneously allowing the reservation or consumption of credit units from credit containers (36) having insufficient remaining credit for authorization of the full charging interval.

NETWORK ARCHITECTURES UTILIZING CELLULAR NETWORK HOSTED ACCESS CONTROLLING SCHEMAS AND COMPUTING PLATFORMS CONFIGURED TO FACILITATE INTERNET ACTIVITIES BASED ON EXPECTATION DATA RECORDS FOR ACCESS CONTROL, AND METHODS FOR USE THEREOF
20230217250 · 2023-07-06 ·

In some embodiments, the present disclosure is directed to an exemplary system, including: an access controlling platform, executing software instructions that instruct to generate an expectation data record as an access control mechanism to access an access-restricted digital resource, the expectation data record including: access code and identity linked to a computing device; where the access code is associated with the access-restricted digital resource; receive a mobile originating communication having data that includes a particular access code and a particular identity; perform a confirmation of the expectation data record with the mobile originating communication; instruct a cellular communications network to perform, based on at least one part of the data, at least one action with the cellular network hosted access controlling schema to generate a session record associated with the particular identity; and instruct to unlock the access-restricted digital resource for the accessing via the computing device.

Message processing for subscriber sessions which stretch over different network domains

A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.

System and method for a media intelligence platform
11544752 · 2023-01-03 · ·

A multi-tenant media processing platform system and method. At least a first media analysis service of a plurality of media analysis services is activated for at least a portion of an active communication session of an entity in the platform system. The first activated media analysis service performs a first media analysis on media of the active communication session that is collected by the platform system. The first activated media analysis service performs the first media analysis on the collected media while the communication session is active to generate a first media analysis result. During the active communication session, at least one media analysis result is applied.

Method for Determining Policy Control Network Element, Apparatus, and System
20220417724 · 2022-12-29 ·

A method for determining a policy control network element, in which a mobility management network element obtains first indication information, where the first indication information indicates to select a same policy control network element as a policy control network element for access and mobility management and a policy control network element for session management; the mobility management network element receives a session establishment request from a terminal for establishing a first session; and the mobility management network element sends second indication information and information about a first policy control network element to a session management network element based on the first indication information, where the second indication information indicates to select a same policy control network element as a policy control network element used for access and mobility management and a policy control network element used for session management of the first session.

Method and apparatus for a chargeable party at a session management with required quality of service

Methods and apparatuses for data transmission. A method implemented at a first network function may comprise obtaining information related to network slice selection; and sending a reroute message to an access network node, wherein the reroute message including a container comprising at least one information element of the information related to network slicing selection.

Policy transmission method, policy control function (PCF) network element, and computer storage medium

A policy transmission method, a policy control function (PCF) network element, and a computer storage medium, where the method includes: obtaining, by a PCF network element, a connection management state of a terminal apparatus, where the connection management state includes a connected mode or an idle mode; and sending, by the PCF network element, policy rule information to the terminal apparatus when the connection management state of the terminal apparatus is the connected mode.

Usage of pre-authorized QoS

In one aspect, a device, operating in an access network that can provide a plurality of QoS levels for user data flowing to and from the device, establishes a packet data session via the access network and receives, from the access network, cost information associated with each of one or more QoS levels. The device selects, for user data for at least a first application or service, a QoS level from among the plurality of QoS levels based on the cost information. The device transmits packets carrying user data for the first application or service to the access network. The transmission includes applying a QoS treatment to the user data according to the selected QoS level.