H04M15/852

Application Awareness of Credit Conditions in Communication Network

A method performed by an application function, AF, for a communication network, wherein the AF has been informed, in a first notification, about an out-of-credit event associated with a user of a service provided by the AF, the method comprising sending subscription request, to a network function, NF, for requesting notifications about reallocation-of-credit events associated with one or more users of a service provided by the AF; receiving, from the NF, a second notification of a reallocation-of-credit event associated with the user of the service provided by the AF for which the AF has been informed about the out-of-credit event, such that the AF can perform one or more second actions with respect to the service.

APPARATUS, METHODS, AND COMPUTER PROGRAMS

There is provided an apparatus, method and computer program for an apparatus for a first policy control function, that causes to apparatus to: receive, from a session management function, a request for a policy to be established for a session for a subscriber, wherein the subscriber is subscribed in a second domain and the first policy control function is configured to operate in a first domain; determine a policy for the requested session, the determined policy comprising an indication of an allowed usage for the subscriber and at least one trigger condition for the policy to be updated; signal the at least one trigger condition to the session management function; and monitor the allowed usage for the subscriber by updating the policy in response to receipt of an indication that the at least one trigger condition has been met.

DYNAMIC BANDWIDTH SERVICE LIMITS
20230090673 · 2023-03-23 ·

A network services provider delivers bandwidth services to users in relation to a dynamic limit based on an average user consumption, rather than a fixed amount per subscriber. An average user consumption is employed to compute a consumption limit from relative portions of a user community substantially exceed the average, typically defined as “heavy users.” Usage levels below the consumption limit have an increased availability up to the consumption limit. The consumption limit may vary from a total capacity of the service infrastructure, which changes, generally in an increasing manner, as additional resources are added to the network. The consumption limits may be defined over different service intervals, such as daily, weekly or monthly, and for different groups of users depending on network layout.

Secure tokens for controlling access to a resource in a resource distribution network

A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a time-based token based on a time duration specified for a meter. The time-based token indicates the time duration for the meter. The time-based token is further generated based on an identifier of the meter. The headend system transmits the time-based token to the meter via at least a mesh network. After receiving the time-based token, the meter validates the time-based token to determine that the time-based token is generated for the meter based on information related to the identifier of the meter. If the meter determines that the time-based token is valid, the meter connects premises associated with the meter to a resource distribution network for at least the time duration specified in the time-based token.

System, method, and computer program for dynamic switching between online and offline charging for a network session
11477040 · 2022-10-18 · ·

As described herein, a system, method, and computer program are provided for dynamic switching between online and offline charging for a network session. In use, a network session is monitored. Additionally, during the network session, one or more characteristics of the network session are determined, based on the monitoring of the network session. Further, a dynamic selection is made between offline charging and online charging for the network session, based on the one or more characteristics of the network session.

Distributed backup of unshipped charging data records
11665225 · 2023-05-30 · ·

A first charging data record (CDR) generating node can receive charging server information and available CDR storage information from a second CDR generating node. The first CDR generating node can detect that the charging server is unavailable to receive CDRs from the first CDR generating node. The first CDR generating node can also determine that a CDR storage area corresponding to the first CDR generating node should not be used to store additional CDRs. The first CDR generating node can also select the second CDR generating node for storing the additional CDRs that are generated by the first CDR generating node. The second CDR generating node can be selected based at least in part on the charging server information and the available CDR storage information. The first CDR generating node can cause at least one CDR to be sent to the second CDR generating node.

Support for Threshold as Well as Quota Based Usage-Monitoring for the Same Monitoring Key
20220329698 · 2022-10-13 ·

A method and computer readable media are disclosed to supply values for either/both of volume/time for usage-monitoring from/to PCRF for a particular usage monitoring key. In one embodiment, the method includes identifying a monitoring key AVP used by a PCRF to provide at least one of a volume usage threshold level for a Policy and Charging Enforcement Function (PCEF) and a time of usage threshold level for a PCEF; wherein the monitoring key includes at least one of a volume threshold total for the monitoring key; a volume quota uplink threshold for the monitoring key; a volume quota downlink threshold for the monitoring key; and a time threshold for the monitoring key; and supplying values for at least one of volume for usage-monitoring for a PCRF for a particular usage monitoring key; and time for usage-monitoring for a PCRF for a particular usage monitoring key.

DISTRIBUTED BACKUP OF UNSHIPPED CHARGING DATA RECORDS
20230114981 · 2023-04-13 ·

A first charging data record (CDR) generating node can receive charging server information and available CDR storage information from a second CDR generating node. The first CDR generating node can detect that the charging server is unavailable to receive CDRs from the first CDR generating node. The first CDR generating node can also determine that a CDR storage area corresponding to the first CDR generating node should not be used to store additional CDRs. The first CDR generating node can also select the second CDR generating node for storing the additional CDRs that are generated by the first CDR generating node. The second CDR generating node can be selected based at least in part on the charging server information and the available CDR storage information. The first CDR generating node can cause at least one CDR to be sent to the second CDR generating node.

ADJUSTABLE AND DYNAMIC THRESHOLDS IN WIRELESS NETWORKS
20220321704 · 2022-10-06 ·

Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.

Consumer mobile application for three way communication
11641537 · 2023-05-02 · ·

Embodiments relate to a closed loop communication system. The system can include a consumer mobile device configured with a mobile application to identify its load consumption pattern and communicate the identified load consumption pattern to a utility device. The mobile device also sets a limit for maximum energy consumption through the mobile application. The system can also include the utility device that receives the identified load consumption pattern, and configured to send a short message service (SMS) alert to the mobile device to alert the mobile device to read meter energy consumption reading from energy meter and share with utility device due to direct connection failure with an energy meter. The system can also include an energy meter configured to communicate with the utility device, wherein the utility device attempts to receive the meter energy consumption reading from the energy meter.