Patent classifications
H04M15/41
DATA VOLUME EXCHANGE SERVER, INTERNATIONAL COMMUNICATION SYSTEM, DATA VOLUME EXCHANGE METHOD, AND DATA VOLUME EXCHANGE PROGRAM
A data volume exchange server includes a terminal IF unit configured to receive an exchange request for a contract data volume of an own country and a contract data volume of another country from terminals of subscribers having contract data volumes of telecommunication carriers of countries different from each other, a data volume exchange unit configured to perform matching of a pair in which another country that requests a contract data volume in one of the received exchange requests matches the own country that provides a contract data volume in another of the received exchange requests, and a server IF unit configured to instruct the communication servers of the telecommunication carriers in the countries to transfer a contract data volume of a matched subscriber of the own country as an exchanged data volume of a subscriber of the other country who is a matching partner.
NETWORK ARCHITECTURES UTILIZING CELLULAR NETWORK HOSTED ACCESS CONTROLLING SCHEMAS AND COMPUTING PLATFORMS CONFIGURED TO FACILITATE INTERNET ACTIVITIES BASED ON EXPECTATION DATA RECORDS FOR ACCESS CONTROL, AND METHODS FOR USE THEREOF
In some embodiments, the present disclosure is directed to an exemplary system, including: an access controlling platform, executing software instructions that instruct to generate an expectation data record as an access control mechanism to access an access-restricted digital resource, the expectation data record including: access code and identity linked to a computing device; where the access code is associated with the access-restricted digital resource; receive a mobile originating communication having data that includes a particular access code and a particular identity; perform a confirmation of the expectation data record with the mobile originating communication; instruct a cellular communications network to perform, based on at least one part of the data, at least one action with the cellular network hosted access controlling schema to generate a session record associated with the particular identity; and instruct to unlock the access-restricted digital resource for the accessing via the computing device.
CALL GRAPHS FOR TELECOMMUNICATION NETWORK ACTIVITY DETECTION
A processing system may maintain a communication graph that includes nodes representing a plurality of phone numbers including a first phone number and edges between the nodes representing a plurality of communications between the plurality of phone numbers and may generate at least one vector via a graph embedding process applied to the communication graph, the at least one vector representing features of at least a portion of the communication graph. The processing system may then apply the at least one vector to a prediction model that is implemented by the processing system and that is configured to predict whether the first phone number is associated with a type of network activity associated with a telecommunication network and may implement a remedial action in response to an output of the prediction model indicating that the first phone number is associated with the type of network activity.
RELATIONSHIP GRAPHS FOR TELECOMMUNICATION NETWORK FRAUD DETECTION
A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.
Simultaneous voice and data content driven commercial data platform
One disclosed system includes dialer device with a dialer identifier that initiates a call with a receiver device with a receiver identifier over a voice channel. A database stores: interaction data in association with both the receiver identifier and the dialer identifier; a content quality metric in association with the interaction data; and a network topology in which the receiver identifier and the dialer identifier are associated with nodes and are connected by an edge. A server is programmed to: update, based on the content quality metric and the network topology, a rankings associated with the receiver identifier and the dialer identifier; and one of: surface the ranking associated with the dialer identifier and the ranking associated with the receiver identifier to an external searching agent using an external data channel and without using any voice channel; or rank the dialer identifier for an internal searching agent using the ranking.
Dynamic provisioning reconciliation of network elements in wireless communication networks
Systems and methods discussed herein are directed to a reconcile decision engine in communication with a network provisioning catalog. The network provisioning catalog may provide network elements of the wireless communication network related to the user service attributes, e.g., network elements that implement various aspects of the user service attributes to provide services to users in accordance with service plans (also referred to as rate plans). The network provisioning catalog also provides required network service attributes for each network element, where the required network service attributes are related to the user service attributes. The reconcile decision engine may query various network elements to reconcile the various network elements with respect to user information, e.g., the user's billing profile. The reconcile decision engine may reconcile the user profile with respect to one or more of the network elements that need reconciliation.
Coordinating cellular and cable/fiber broadband networks
Detect, at a cable/fiber broadband network termination unit of a cable/fiber broadband multi-service operator, an interruption in service to a cable/fiber broadband network customer unit—small cell pair. Responsive to detecting the interruption, the termination unit advises a charging server of the operator of the interruption in service, a corresponding identifier of the customer unit—small cell pair, and a corresponding account identifier. Responsive to termination unit advising the charging server, the charging server advises a backend server of an associated cellular network of a customer identifier corresponding to the account identifier. Responsive to the charging server advising the backend server, the backend server advises a policy control function of the associated cellular network to modify network parameters of the associated cellular network to compensate for the interruption in service.
Adjustable and dynamic thresholds in wireless networks
Techniques and architectures enable a wireless communications network to allow for dynamic changes or on-the-fly selections of Fair Usage thresholds or other thresholds and to allow for the Fair Usage thresholds to be associated with individual subscribers of the wireless communications network. Subscriber groups of relatively small granularity or individual subscribers may be assigned a profile that sets forth actions to be applied to subscribers in response to the subscribers reaching particular thresholds of data usage.
System and method for collecting consumption
Various embodiments disclosed herein are related to a non-transitory computer readable storage medium. In some embodiments, the medium includes instructions stored thereon that, when executed by a processor, cause the processor to identify, at an edge network, resource consumption data including a status that indicates whether a service hosted on a cluster of nodes on the edge network is powered on, a type of a resource being consumed by the service, a quantity of the resource being consumed by the service, and a time stamp associated with the resource being consumed by the service and provide, to a remote server in communication with the edge network, the resource consumption data. In some embodiments, the remote server meters resource consumption based on the resource consumption data.
METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR RESOURCE CLEANUP IN COMMUNICATIONS NETWORKS
Methods, systems, and computer readable media for resource cleanup in communications networks are disclosed. One method for resource cleanup in a communications network comprises: at a policy control function (PCF) comprising at least one processor: receiving, from a binding support function (BSF), a first notification indicating a potentially stale or inactive first binding record, wherein the first notification includes context data associated with the first binding record; determining that resource cleanup associated with the first binding record should be performed; and initiating, using the context data, resource cleanup associated with the first binding record at one or more network entities.