The invention provides a system and method for detecting message drift within registered message campaigns to ensure compliance with predefined use case parameters. Utilizing a messaging compliance registry (MCR), the system downloads campaign data and employs control vectors derived from sample texts, representing intended communications within specific use cases. These vectors enable real-time comparison of incoming messages against expected messaging, employing methods such as cosine similarity measures and various vectorization models. If an incoming message's vector significantly deviates from the established threshold, indicating message drift, the system can delay, quarantine, or tag the message, while notifying the MCR. The process ensures that messages adhere to their registered campaign's guidelines, enhancing regulatory compliance and content integrity across messaging platforms.
The invention provides computer-readable media for detecting message drift within registered message campaigns to ensure compliance with predefined use case parameters. Utilizing a messaging compliance registry (MCR), the media includes instructions for downloading campaign data and employing control vectors derived from sample texts, representing intended communications within specific use cases. These vectors enable real-time comparison of incoming messages against expected messaging, employing methods such as cosine similarity measures and various vectorization models. If an incoming message's vector significantly deviates from the established threshold, indicating message drift, the media can delay, quarantine, or tag the message, while notifying the MCR. The process ensures that messages adhere to their registered campaign's guidelines, enhancing regulatory compliance and content integrity across messaging platforms.
A system and method for delivering and receiving messages between users connected to satellite and cellular networks. The system includes a communication device capable of operating in either satellite or cellular modes, a satellite service provider, a satellite proxy network, and a cellular operator. The method involves monitoring the network mode of the user device, relaying information about the user device's connection to the satellite network and registering the user device with a cellular operator when in satellite mode. The satellite proxy network serves as an anchoring point for sending and receiving messages, ensuring seamless message exchange between satellite network users and cellular network users. The user device is designed to automatically switch between satellite and cellular modes based on network availability, ensuring continuous communication. This invention enables improved messaging services and enhances communication between users on different networks.
This invention is a system and method for allocating and monetizing resources on a 5G infrastructure. A service manager module receiving a slice request from a client. A real-time analytics engine gauges the optimum resource path which then then requested from a resource manager. A slice offer for the resource is made to the client which is accepted. The service manager module sends a post to a distributed ledger, the post comprising a client identification, a slice identification, a provider identification, a service request, a QOS parameter, a transaction identification, a cost of service and a timestamp. Scripting software running on top of the ledger platform automatically transacts payment for the resource from the client to the provider.
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04W 28/24 - Négociation de l'agrément du niveau de service [SLA Service Level Agreement]Négociation de la qualité de service [QoS Quality of Service]
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
The invention provides a system and method for detecting message drift within registered message campaigns to ensure compliance with predefined use case parameters. Utilizing a messaging compliance registry (MCR), the system downloads campaign data and employs control vectors derived from sample texts, representing intended communications within specific use cases. These vectors enable real-time comparison of incoming messages against expected messaging, employing methods such as cosine similarity measures and various vectorization models. If an incoming message's vector significantly deviates from the established threshold, indicating message drift, the system can delay, quarantine, or tag the message, while notifying the MCR. The process ensures that messages adhere to their registered campaign's guidelines, enhancing regulatory compliance and content integrity across messaging platforms.
This invention provides a method and system for secure messaging on a mobile network, leveraging public/private key encryption. The method includes steps for deploying a trusted application by a mobile carrier on a device with a Trusted Execution Environment (TEE). A wireless Software Development Kit (SDK) on the subscriber device interacts with the trusted application and a wireless original equipment manufacturer (OEM) cloud service for mutual attestation, confirming the identity and trustworthiness of the device. A pair of public and private keys are generated, with the private key secured on the device. Messages are encrypted with the public key at a cloud messaging application, and decrypted with the private key at the device, enabling secure, viewable messages. The system can support secure transmission of one-time-passwords (OTPs) from an enterprise application, as well as encrypted chat functionality for device responses to the enterprise application.
G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
This invention is a system and method for verifying a sender of messages on a mobile network. Software on a cloud messaging service generates a public/private key pair. The private key is securely retained in a cloud wallet service and is accessible to a messaging cloud service (the trusted sender). The public key is shared with a subscriber device that receives messages from the messaging cloud service. The cloud messaging service receives an inbound message for the subscriber device from a trusted enterprise application via a secure connection. The cloud messaging service signs a special header to the message with its private key. When the message is received by the subscriber device, the public key resident on the device verifies the message header signed with the public key of the cloud messaging service thereby verifying the sender.
SMS services are provided to roaming mobile devices at visiting networks. This invention implements interworking between VoLTE and circuit-switched (CS) SMS and handles roaming towards both the VPLMN (visited public land mobile network) and HPLMN (home public land mobile network). The interworking function translates CS signals from the VPLMN into IMS signals for the IMS core at the HPLMN and performs location-update registration at the HSS at the HPLMN to exchange SMS communications.
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
H04W 8/20 - Transfert de données utilisateur ou abonné
H04W 76/16 - Établissement de connexions à liens multiples sans fil utilisant des technologies de réseaux centraux différentes, p. ex. une voie de commutation de paquets combinée à une voie de commutation de circuits
9.
Message routing system for cellular to satellite networks
A system and method for delivering and receiving Short Message Service (SMS) messages between users connected to satellite and cellular networks. The system includes a communication device capable of operating in either satellite or cellular modes, a satellite service provider, a satellite proxy network, and a cellular operator. The method involves monitoring the network mode of the user device, relaying information about the user device's connection to the satellite network via a specially formatted SMS payload and registering the user device with a cellular operator when in satellite mode. The satellite proxy network serves as an anchoring point for sending and receiving SMS messages, ensuring seamless message exchange between satellite network users and cellular network users. The user device is designed to automatically switch between satellite and cellular modes based on network availability, ensuring continuous communication. This invention enables improved messaging services and enhances communication between users on different networks.
This invention is a system and method for verifying a sender of messages on a mobile network. Software on a cloud messaging service generates a public/private key pair. The private key is securely retained in a cloud wallet service and is accessible to a messaging cloud service (the trusted sender). The public key is shared with a subscriber device that receives messages from the messaging cloud service. The cloud messaging service receives an inbound message for the subscriber device from a trusted enterprise application via a secure connection. The cloud messaging service signs a special header to the message with its private key. When the message is received by the subscriber device, the public key resident on the device verifies the message header signed with the public key of the cloud messaging service thereby verifying the sender.
This invention pertains to a method for provisioning and implementing two-factor authentication (2FA) for enterprise services. The system securely establishes a trusted identity for a subscriber device using an immutable hardware key and public/private key sets. The device's identity is verified by an Original Equipment Manufacturer (OEM) cloud service. The method includes generating unique transaction nonces for each 2FA request, securing private keys within a Trusted Execution Environment (TEE), and employing a cloud wallet service to store keys. The subscriber device interacts with the system, decrypting and re-encrypting transaction nonces using corresponding keys. This process enables secure transaction from enterprise applications. The system also integrates user consent into the 2FA process, displaying a prompt to approve or deny authentication. This technology enhances security in enterprise services, prioritizing user consent and secure data transfer.
A system and method for delivering and receiving Short Message Service (SMS) messages between users connected to satellite and cellular networks. The system includes a communication device capable of operating in both satellite and cellular modes, a satellite service provider, a satellite proxy network, and a cellular operator. The method involves monitoring the network mode of the user device, relaying information about the user device's connection to the satellite network via a specially formatted SMS payload and registering the user device with a cellular operator when in satellite mode. The satellite proxy network serves as an anchoring point for sending and receiving SMS messages, ensuring seamless message exchange between satellite network users and cellular network users. The user device is designed to automatically switch between satellite and cellular modes based on network availability, ensuring continuous communication. This invention enables improved messaging services and enhances communication between users on different networks.
This invention is a system and method for implementing a VoLTE and circuit switched voice and SMS interworking function to provide voice and SMS service to roaming mobile devices at visiting network based on Circuit-switched (CS) roaming towards VPLMN, and VoLTE voice and SMS roaming towards HPLMN. The interworking function translates CS signaling with VPLMN into IMS signaling towards IMS core at HPLMN. The interworking function also performs location-update registration at HSS at HPLMN for receiving mobile-terminated voice calls and SMS.
H04W 76/16 - Établissement de connexions à liens multiples sans fil utilisant des technologies de réseaux centraux différentes, p. ex. une voie de commutation de paquets combinée à une voie de commutation de circuits
H04W 8/20 - Transfert de données utilisateur ou abonné
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
14.
System and method for general data protection regulation (GDPR) compliant hashing in blockchain ledgers
A computer implemented system and method for providing general data protection regulation (GDPR) compliant hashing in blockchain ledgers. The invention guarantees a user's right to be forgotten, in compliance with the GDPR regulations, utilizing blockchain technologies.
G21K 5/04 - Dispositifs d'irradiation avec des moyens de formation du faisceau
C04B 35/553 - Produits céramiques mis en forme, caractérisés par leur compositionCompositions céramiquesTraitement de poudres de composés inorganiques préalablement à la fabrication de produits céramiques à base de non oxydes à base de fluorures
A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and generates a processing string. The sending entity appends the processing string to the message and sends the message to the receiving entity. The message is unreadable while the processing string is appended thereto. Upon receipt of the message with the appended processing string, the receiving entity requests removal the processing string. Upon successful verification of the receiving entity, the processing string is removed, and the message is returned to the receiving entity.
This invention is a system and method for implementing a VoLTE and circuit switched voice and SMS interworking function to provide voice and SMS service to roaming mobile devices at visiting network based on VoLTE roaming and 'SMS over SGs' towards VPLMN, and circuit-switched voice and SMS towards HPLMN. The interworking function enables and redirects IMS traffic at VPLMN towards a hosted IMS core with voice connectivity to PSTN via MGCF and MGW. The interworking function also performs circuit-switched location-update registration at HLR at HPLMN for receiving mobile-terminated voice calls and SMS.
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
A method and system for steering a mobile device to a preferred network, such as a Private LTE network or a 5G network, in a scenario in which the coverage area of the preferred network overlaps the coverage area of a non-preferred network. If a network function detects that the mobile device is located within the coverage area of the preferred network, the network steering procedure will be triggered. The mobile device will detach from its current network, place that network on a temporary forbidden list, and perform an automatic network selection. If mobile device selects another non-preferred network, the attachment request will be denied, and the mobile device will add that non-preferred network to the temporary forbidden list. This procedure is repeated until the mobile device attaches to the preferred network or a predefined duration expires.
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04W 60/06 - Annulation de l'enregistrement ou détachement
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
H04W 60/04 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 84/04 - Réseaux à grande échelleRéseaux fortement hiérarchisés
18.
Method of implementing 5G core roaming routing in an IPX network
A system and method for implementing Transport Layer Security (TLS) Routing Agent in an Internet Protocol Exchange (IPX) network for 5G core roaming. Transmission Control Protocol (TCP) connections are established between the TLS Routing Agent and consumer Security Edge Protection Proxy (cSEPP) and producer Security Edge Protection Proxy (pSEPP). TLS Routing Agent receives HTTP/2 CONNECT request from cSEPP. The TLS Routing Agent routes subsequent TLS handshake and HTTP/2 application messages to producer-SEPP transparently, so that the end-to-end TLS security is maintained. The TLS Routing Agent enables message firewall to protect mobile operator's SEPP. The TLS Routing Agent applies policy routing to route HTTP/2 message intelligently across the IPX network and improves TCP performance by dividing the long Round-Trip-Time between TCP end points into shorter segments.
A method of delivering an orphan delivery receipt for a mobile-terminated message to a messaging platform from which the mobile-terminated message originated. A network of data exchange connectors is deployed, wherein each data exchange connector is associated with a messaging platform. When one of the messaging platforms receives a delivery receipt it cannot reconcile, the delivery receipt is replicated to all data exchange connectors. The data exchange connector associated with the messaging platform from which the mobile-terminated message originated identifies and consumes the delivery receipt based on predefined filtering criteria. The data exchange connector publishes the delivery receipt to the originator messaging platform. The originator messaging platform correlates the delivery receipt with the mobile-terminated message and posts the delivery receipt to a corresponding enterprise customer.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 51/046 - Interopérabilité avec d'autres applications ou services réseau
A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier (DID) associated with the sending entity, resolves the DID into a DID document, and retrieves therefrom a public key associated with the sending entity. The receiving entity decrypts the hash value provided by the sending entity using the retrieved public key. The receiving entity independently computes a hash value based on the message content and compares the computed hash value against the decrypted hash value. If the hash values match, the message is verified and routed to its target recipient.
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communications services, namely, mobile telephone communications; providing access to telecommunications networks; communication services, namely, transmission of voice via wireless communications networks Platform-as-a-service (PAAS) featuring computer software platforms for technology support, global mobile connectivity, and cloud service provider connectivity; technical support, namely, monitoring technological functions of computer network systems, in particular, the connectivity and interoperability of telecommunications network systems; roaming subscriber behavior authentication management services
22.
Method of network-based steering of a mobile device positioned in an area having preferred and non-preferred overlapping network coverage
A method for steering a mobile device to a preferred network, such as a Private LTE network or a 5G network, in a scenario in which the coverage area of the preferred network overlaps the coverage area of a non-preferred network. A preferred network list is provisioned into a SIM/eSIM module at the mobile device side. The steering application is hosted at the home network and periodically triggers the home network to request from the visited network a set of values for attributes associated with a current location of the mobile device. Based on these values, the steering application determines whether the mobile device is within the coverage area of the preferred network and, if so, directs the home network to send a cancel location request to the non-preferred visited network, thereby triggering the mobile device to attach to the preferred network.
An enforcer application is configured to intercept signaling messages in a telecommunications network and select an optimal SGW, PGW, SMF/UPF and application servers in real time. More specifically, the enforcer intercepts and generates GSM MAP, Diameter, GTP-C and HTTP2/JSON signaling messages. The enforcer executes a policy to force the user devices to re-establish the data connection, thus anchoring at different SGW, PGW, SMF/UPF and application server to keep end-to-end routing path optimal, when the impacting factor changes. The enforcer can further feed its performance data and decision matrix into the analyzer and database to further optimize the decision process. Analyzer and KPI metrics databases are installed at central data centers to collect the KPI data from different probes and enforcer, calculate in real-time the optimal routing path with different decision factors considered, and interact with enforcer to update the latest optimal path status based on the data collected.
H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
H04W 24/10 - Planification des comptes-rendus de mesures
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
24.
Method of privatizing mobile communications using dynamic IMSI and MSISDN
A method of privatizing mobile communications using a dynamic International Mobile Subscriber Identity (IMSI) and Mobile Station International Subscriber Director Number (MSISDN). A first privacy token having an associated IMSI and MSISDN is provided to a User Equipment (UE). The first privacy token has a predefined validity period. The IMSI and MSISDN assigned to the privacy token are shared with a plurality of Mobile Network Operators (MNOs), while the International Mobile Equipment Identity (IMEI) of the UE remains concealed. A communications session for the UE can be established based on the first privacy token during the validity period thereof. Upon expiration of the validity period, the first privacy token and the associated IMSI and MSISDN are released to the token database, and their association with one another is deleted. The UE is then provided with a second privacy token having a different associated IMSI and MSISDN.
rd Party Merchant's online platform. The subscriber verification system intercepts a message sent from a first network node to a second network node during a data session establishment procedure. The subscriber verification system extracts a first set of identification values associated with a user equipment (UE) from the intercepted message. After the data session is established, the UE sends an encrypted request to access the Merchant server. The Merchant server identifies a second set of identification values associated with the encrypted request and sends them for validation to the subscriber verification system. The second set of identification values is compared against the first set of identification values. If the two set of identification values match, the UE is authenticated.
This invention relates generally to the field of security and remote data communications, specifically to data communications between applications running on different devices residing in different service provider networks. The invention includes methods and systems to resolve the application host based on user defined naming schema, automate the secure tunnel creation among the communication entities via Security Enforcement Servers, start up the applications via secure out of band control channel, perform packet inspection and anomaly detection based on injected user rules and historical traffic pattern, generate alert or notifications via email, text, etc. to specific users. The invention further tears down the secure connection based on application demand or inactivity timeout, generates event and statistic data records for troubleshooting and future auditing.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
38 - Services de télécommunications
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware; computer software, downloadable computer software, network access software; SIM cards; messaging software; enterprise software; software for connecting, operating and managing networked devices and systems in the internet of things (IoT). Online business information management; collection of general data; call processing services, namely, operation of telephone call centers for others; network services, namely, business operation and administration of telecommunications networks for others; business management systems and telecommunications networks for others, namely, managing telephone call centers for others; inter-carrier communications process business management and service order business administration and management services; database management services; validation of billing data, business administration services for others through management of agreements between parties, financial record-keeping; Invoicing services; payment accuracy reporting; business management and enterprise organization consultancy; operational business assistance to enterprises; business consulting services for enterprises; inter-carrier business consulting services. Electronic financial management services, namely, billing consolidation management services; clearing house services, namely, financial clearing and payment settlement transaction processing services; clearing house services; payment settlement. Communications services, namely, telephone and mobile communications; telecommunications services, namely, electronic telecommunications connections; providing access to telecommunications networks; telecommunication access services; consulting services in the field of communications; text, wireless digital, electronic messaging services; wireless digital messaging services, namely, multimedia, electronic, and text management services; communication services, namely, transmission of voice, data, images, audio, video, messages, and information via wireless and broadband power line communication networks; online services, namely, mobile messaging; providing frame relay connectivity services for data transfer in the nature of connection management and bandwidth-based control; facilitation of wireless telecommunication services, namely, wireless broadband communication services in the nature of wireless-based connectivity; inter-carrier telecommunications consulting services; consulting services in the field of mobile and electronic messaging; network consulting services, namely, consulting in the field of mobile messaging; exchange of general data; invoice distribution (telecommunication services). Educational services, namely, providing classes, seminars, workshops, lectures, webinars and online, non-downloadable educational videos in the field of communications, communications technologies and infrastructure, mobile technologies and infrastructures, computer software platforms, blockchain, and IoT technologies; computer education training; training in the field of communication technologies; teaching and training in business, industry and information technology; Translation of general data. Platform-as-a-service (PAAS) featuring computer software platforms for technology support, global mobile connectivity, cloud service provider connectivity; software as a service (SAAS) services featuring software for connectivity to cloud-based applications, analytics, and reporting for network security; Computer network configuration services; technical support, namely, monitoring technological functions of computer and telecommunications network systems; providing temporary use of online non-downloadable software for monitoring subscriber behavior, troubleshooting, information gathering; network engineering services; technical support services, namely, monitoring and troubleshooting of computer software for detecting fraud and data breaches; technical support services, namely, troubleshooting of computer software problems; providing authentication, issuance, validation and revocation of digital certificates; computer security services for protecting data and information from unauthorized access, namely, restricting unauthorized access to data and computer networks; electronic monitoring of computer systems and computer networks to detect fraud in the nature of unauthorized access or data breaches; identity authentication services in the nature of providing authentication, issuance, and validation of digital certificates; authentication services; quality control and authentication services; authentication services for computer security; consulting services in the field of network monitoring for enterprises; technological consulting services regarding networks and management of devices and systems in the internet of things (IoT); consulting services in the field of interoperability of computer networks; consulting services in the field of interoperability of computer and mobile networks including communication platforms.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
38 - Services de télécommunications
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware; computer software, downloadable computer software, network access software; SIM cards; messaging software; enterprise software; software for connecting, operating and managing networked devices and systems in the internet of things (IoT). Online business information management; collection of general data; call processing services, namely, operation of telephone call centers for others; network services, namely, business operation and administration of telecommunications networks for others; business management systems and telecommunications networks for others, namely, managing telephone call centers for others; inter-carrier communications process business management and service order business administration and management services; database management services; validation of billing data, business administration services for others through management of agreements between parties, financial record-keeping; Invoicing services; payment accuracy reporting; business management and enterprise organization consultancy; operational business assistance to enterprises; business consulting services for enterprises; inter-carrier business consulting services. Electronic financial management services, namely, billing consolidation management services; clearing house services, namely, financial clearing and payment settlement transaction processing services; clearing house services; payment settlement. Communications services, namely, telephone and mobile communications; telecommunications services, namely, electronic telecommunications connections; providing access to telecommunications networks; telecommunication access services; consulting services in the field of communications; text, wireless digital, electronic messaging services; wireless digital messaging services, namely, multimedia, electronic, and text management services; communication services, namely, transmission of voice, data, images, audio, video, messages, and information via wireless and broadband power line communication networks; online services, namely, mobile messaging; providing frame relay connectivity services for data transfer in the nature of connection management and bandwidth-based control; facilitation of wireless telecommunication services, namely, wireless broadband communication services in the nature of wireless-based connectivity; inter-carrier telecommunications consulting services; consulting services in the field of mobile and electronic messaging; network consulting services, namely, consulting in the field of mobile messaging; exchange of general data; invoice distribution (telecommunication services). Educational services, namely, providing classes, seminars, workshops, lectures, webinars and online, non-downloadable educational videos in the field of communications, communications technologies and infrastructure, mobile technologies and infrastructures, computer software platforms, blockchain, and IoT technologies; computer education training; training in the field of communication technologies; teaching and training in business, industry and information technology; Translation of general data. Platform-as-a-service (PAAS) featuring computer software platforms for technology support, global mobile connectivity, cloud service provider connectivity; software as a service (SAAS) services featuring software for connectivity to cloud-based applications, analytics, and reporting for network security; Computer network configuration services; technical support, namely, monitoring technological functions of computer and telecommunications network systems; providing temporary use of online non-downloadable software for monitoring subscriber behavior, troubleshooting, information gathering; network engineering services; technical support services, namely, monitoring and troubleshooting of computer software for detecting fraud and data breaches; technical support services, namely, troubleshooting of computer software problems; providing authentication, issuance, validation and revocation of digital certificates; computer security services for protecting data and information from unauthorized access, namely, restricting unauthorized access to data and computer networks; electronic monitoring of computer systems and computer networks to detect fraud in the nature of unauthorized access or data breaches; identity authentication services in the nature of providing authentication, issuance, and validation of digital certificates; authentication services; quality control and authentication services; authentication services for computer security; consulting services in the field of network monitoring for enterprises; technological consulting services regarding networks and management of devices and systems in the internet of things (IoT); consulting services in the field of interoperability of computer networks; consulting services in the field of interoperability of computer and mobile networks including communication platforms.
29.
5G core roaming network function proxy in an IPX network
This invention is a system and method for implementing Network Function (NF) Proxy in an IPX network for 5G core roaming. NF Discover queries from Visited Public Land Mobile Network (VPLMN) are manipulated such that the IPX NF Proxy's fully qualified domain name (FQDN) is returned as the FQDN of the Home Public Land Mobile Network (HPLMN) NF. NF Proxy queries the FQDN of a true HPLMN NF through a HPLMN Network Repository Function (NRF) Proxy. Application messages are routed to NF Proxy hosted in the IPX network. NF Proxy performs its proxy function and routes egress messages to the target NF in HPLMN or another location.
This invention is a system and method for implementing a VoLTE and circuit switched voice and SMS interworking function to provide voice and SMS service to roaming mobile devices at visiting network based on VoLTE roaming and ‘SMS over SGs’ towards VPLMN, and circuit-switched voice and SMS towards HPLMN. The interworking function enables and redirects IMS traffic at VPLMN towards a hosted IMS core with voice connectivity to PSTN via MGCF and MGW. The interworking function also performs circuit-switched location-update registration at HLR at HPLMN for receiving mobile-terminated voice calls and SMS.
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
H04L 61/5007 - Adresses de protocole Internet [IP]
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
This invention is a system and method for implementing a VoLTE and circuit switched voice and SMS interworking function to provide voice and SMS service to roaming mobile devices at visiting network based on VoLTE roaming and ‘SMS over SGs’ towards VPLMN, and circuit-switched voice and SMS towards HPLMN. The interworking function enables and redirects IMS traffic at VPLMN towards a hosted IMS core with voice connectivity to PSTN via MGCF and MGW. The interworking function also performs circuit-switched location-update registration at HLR at HPLMN for receiving mobile-terminated voice calls and SMS.
A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier (DID) associated with the sending entity, resolves the DID into a DID document, and retrieves therefrom a public key associated with the sending entity. The receiving entity decrypts the hash value provided by the sending entity using the retrieved public key. The receiving entity independently computes a hash value based on the message content and compares the computed hash value against the decrypted hash value. If the hash values match, the message is verified and routed to its target recipient.
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
33.
Method of providing data, voice, and SMS services to LTE subscribers roaming in 2G/3G visited networks
A method of providing voice call, data, and SMS services to a user equipment roaming in a 2G/3G visited network and subscribed to an LTE home network. An Interworking Function communicates with both the visited network and the home network. The Interworking Function translates between Mobile Application Part (MAP) protocol used by the 2G/3G visited network and Session Initiation Protocol (SIP) used by the LTE home network. The Interworking Function establishes both a MAP Registration with the 2G/3G visited network and also a SIP Registration with the LTE home network, thereby enabling provision of voice call, data, and SMS services to the roaming UE.
H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
A system and method for routing of 5G mobile data traffic along a routing path in an Internetwork Packet Exchange (IPX) network having requisite Quality of Service (QoS). A proxy is deployed in the IPX network to intercept Session Create request and response messages exchanges between the home network and the visited network. The routing platform extracts Single-Network Slice Selection Assistance Information (S-NSSAI) attribute and uses this attribute and the geographic locations of the visited network and the home network to select a routing path in the IPX network having requisite QoS for the network slice use case. The routing platform uses layer-3 routing technique to anchor User Plane Function (UPF) Proxies deployed at different routing paths in the IPX network. Alternately, the routing platform uses layer-2 routing technique, with Software-Defined Networking (SDN) controller and SDN-switches to route traffic via the selected routing path in the IPX network.
H04W 76/12 - Établissement de tunnels de transport
H04W 40/20 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la position ou de la localisation géographique
H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
35.
Steering of roaming for 5G core roaming in an internet packet exchange network
A system and method for implementing Steering of Roaming for 5G core roaming in an Internet Packet Exchange (IPX) network. A Hypertext Transfer Protocol (HTTP)/2 Proxy is deployed in an IPX network. The HTTP/2 Proxy receives N32-f request message from a Visited Public Land Mobile Network (VPLMN). The N32-f request has an embedded N12 authorization request message or an embedded N8 registration request message. If VPLMN is a non-preferred roaming partner, the HTTP/2 Proxy appends a patch-request to N32-f request message and routes it to the Home Public Land Mobile Network (HPLMN). The patch-request causes the home Security Edge Protection Proxy (hSEPP) to replace Mobile Country Code (MCC) or Mobile Network Code (MNC) value with a predefined value that will trigger a rejection from HPLMN. The mobile device will select another VPLMN. If the VPLMN is a preferred roaming partner, the HTTP/2 Proxy routes the request without appending a patch-request.
The invention relates generally to the field of network connectivity management, specifically to provisioning and controlling the data access of multiple client devices to application servers via a connectivity management device. The invention includes apparatuses, methods, and systems for automating the management of such apparatus and its associating client devices. The management includes initializing and storing device data, ownership proof, connectivity credentials, and security policies into a management system, such as blockchain digital ledger or device management application server. The stored information is used for auto pairing and authenticating the devices via a second wireless technology and triggering secure connection setup over the first wireless technology. The method further includes changing the credential to establish data connection using the first wireless technology according to the device location and available data cost, detecting security attack events, and generating notifications for high data usage and attack detection results.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
37.
System and method of validating Internet of Things (IOT) devices
A system and method for validating an Internet of Thing (IoT) device on an IoT network. The IoT device captures and stores the historical sensor values, along with corresponding timestamps in a local memory. A controller receives the historical sensor values and also receives a heartbeat token over a network that is different than the IoT network. The controller calculates a historical hash value using the historical sensor value and the heartbeat token as inputs and stores the historical hash values and the corresponding timestamp in a blockchain ledger of an IoT management platform. At a later time, in response to a validation request from the IoT management platform, the controller polls the IoT device for the historical sensor value associated with a particular timestamp. The IoT device responds with the stored historical sensor value and the controller calculates a reconstructed hash value using the historical stored sensor value and a stored heartbeat token as inputs. If the reconstructed hash value matches the historical hash value, the IoT device is validated.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
H04L 12/26 - Dispositions de surveillance; Dispositions de test
38.
Methods and systems for LoRaWAN traffic routing and control
A system and method for routing LoRaWAN backend traffic between peer visited and home Network Server nodes to achieve global roaming in a scalable manner. A LoRaWAN Routing and Control System (LRCS) node is deployed between a visited Network Server and a home Network Server and is configured to proxy signaling and payload data messages therebetween. LRCS node can provide policy control, billing and rating based on roaming agreements between peer LoRaWAN roaming networks. LRCS node protects the overall network by discarding blacklisted and malicious traffic. LRCS node can enhance the message flow logic by adding routing information in the messages such that destination networks can identify that message is routed through a trustable source.
H04W 8/06 - Enregistrement dans un registre de localisation de réseau-serveur, un VLR ou un serveur de mobilité des utilisateurs
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
H04W 8/12 - Transfert de données de mobilité entre registres de localisation ou serveurs de mobilité
H04W 84/04 - Réseaux à grande échelleRéseaux fortement hiérarchisés
39.
Method for providing roaming services in which the home network uses S8HR model for out-bound roaming while the visited network uses LBO model for in-bound roaming
A roaming method that enables the home network (HPMN) to use S8 Home Routed (S8HR) model for out-bound roaming while the visited network (VPMN) uses Local Breakout (LBO) model for in-bound roaming. An IMS Roaming Gateway (IR-GW) establishes an IMS bearer between the IR-GW and the home network's Packet Data Network Gateway (P-GW). The IR-GW replaces the source IP address on the SIP-Register message with the client IP address assigned to the UE by the HPMN P-GW. Upon receiving a SIP-Response message responsive to successful authentication of the UE with the HPMN, the IR-GW inserts its own IP address into the SIP-Response message and forwards it to the UE. IR-GW performs network address translation (NAT) between the source IP assigned to the UE by the VPMN and the client IP assigned to the UE by the HPMN.
A method and system for steering a mobile device to a preferred network, such as a Private LTE network or a 5G network, in a scenario in which the coverage area of the preferred network overlaps the coverage area of a non-preferred network, such as a 3G or a 4G Public Land Mobile Network (PLMN). A preferred network list is provisioned into a SIM/eSIM module at the mobile device side. The mobile device periodically collects a set of values for attributes associated with a current location of the mobile device and reports the collected values to the Steering application, hosted at the network side. The Steering application detects whether the mobile device is within the coverage area of the preferred network and, if so, triggers the mobile device to perform network steering.
H04W 4/02 - Services utilisant des informations de localisation
H04W 48/18 - Sélection d'un réseau ou d'un service de télécommunications
H04W 4/50 - Fourniture de services ou reconfiguration de services
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
H04W 60/04 - Rattachement à un réseau, p. ex. enregistrementSuppression du rattachement à un réseau, p. ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
41.
System and method for general data protection regulation (GDPR) compliant hashing in blockchain ledgers
A computer implemented system and method for providing general data protection regulation (GDPR) compliant hashing in blockchain ledgers. The invention guarantees a user's right to be forgotten, in compliance with the GDPR regulations, utilizing blockchain technologies.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
42.
Methods and systems for 5G traffic routing in IPX with network slicing
A system and method for routing of 5G mobile data traffic along a routing path in an Internetwork Packet Exchange (IPX) network having requisite Quality of Service (QoS). A proxy is deployed in the IPX network to intercept Session Create request and response messages exchanges between the home network and the visited network. The routing platform extracts Single-Network Slice Selection Assistance Information (S-NSSAI) attribute and uses this attribute and the geographic locations of the visited network and the home network to select a routing path in the IPX network having requisite QoS for the network slice use case. The routing platform uses layer-3 routing technique to anchor User Plane Function (UPF) Proxies deployed at different routing paths in the IPX network. Alternately, the routing platform uses layer-2 routing technique, with Software-Defined Networking (SDN) controller and SDN-switches to route traffic via the selected routing path in the IPX network.
H04W 76/12 - Établissement de tunnels de transport
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
H04W 40/20 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la position ou de la localisation géographique
43.
METHODS AND SYSTEMS FOR 5G TRAFFIC ROUTING IN IPX WITH NETWORK SLICING
A system and method for routing of 5G mobile data traffic along a routing path in an Internetwork Packet Exchange (IPX) network having requisite Quality of Service (QoS). A proxy is deployed in the IPX network to intercept Session Create request and response messages exchanges between the home network and the visited network. The routing platform extracts Single-Network Slice Selection Assistance Information (S-NSSAI) attribute and uses this attribute and the geographic locations of the visited network and the home network to select a routing path in the IPX network having requisite QoS for the network slice use case. The routing platform uses layer-3 routing technique to anchor User Plane Function (UPF) Proxies deployed at different routing paths in the IPX network. Alternately, the routing platform uses layer-2 routing technique, with Software-Defined Networking (SDN) controller and SDN-switches to route traffic via the selected routing path in the IPX network.
H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans filLeurs installations
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
44.
Methods and systems for routing mobile data traffic in 5G networks
A routing platform for routing 4G and 5G mobile data traffic in a mobile core networks implementing Option-3 of 5G Non-Standalone deployment. The routing platform captures S6a Diameter messages sent between a Mobility Management Entity (MME) and a Home Subscriber Server (HSS) and examines the captured messages to determine whether a user equipment (UE) is configured for a 5G data connection. The routing platform intercepts a GTP Create-Session-Request message sent from a Serving Gateway (SGW) and determines whether the GTP message is associated with the UE previously determined to be configured for a 5G data connection. If the GTP message is associated with the UE configured for a 5G data connection, the GTP message is either sent to a dedicated 5G Packet Network Data Gateway (PGW) or the GTP message is modified so that a single PGW handling both 4G and 5G traffic can establish a 5G session for the UE.
A traffic hub system comprising a roaming data module to send and receive data for a roaming wireless network for a mobile device, the mobile device comprising a service utilizing a high-speed data network, a home data module to send and receive data for a home wireless network for the mobile device, the home wireless network being a different network than the roaming wireless network, the home wireless network comprising a packet data network gateway. The traffic hub system in one embodiment provides a static policy-based HTTP redirection. The traffic hub system in one embodiment, provides a dynamic policy based redirection. The traffic hub system in on embodiment, provides a seamless captive portal access. The traffic hub system in one embodiment provides data-offloading.
A Tokenized Communication Service Provider (TCSP) for providing secure messaging between a consumer and a message sender without exposing the consumer communication preferences and Personally Identifiable Information (PII) to the message sender. TCSP issues a communication token to be used for the communication between the consumer and the message sender. Consumer authorization is recorded in a blockchain ledger and a Zero Knowledge Proof mechanism is used to establish that the TCSP possesses the consumer contact information and authorization. The consumer authorization is revocable by the consumer, and the revocation is recorded in the blockchain ledger.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
47.
Detection and restriction of unwanted messages through time interval cluster analysis
Detecting and restricting floods of unwanted messages is implemented by cluster analysis over time intervals. Application of streaming machine learning clustering algorithms enables finding clusters of messages (P2P text messages, WHATSAPP, tweets) sharing the same content. Such clusters may be analyzed for finding out offensive messages, unwanted or spam messages, and rumors and take corrective actions as needed. The solution enables visualization of data and/or messages and identification of clusters as the solution works on the data and aggregates data into clusters over time intervals. Corrective actions may be applied on selected clusters based on visualized data clusters or by automated application of defined rules.
A virtualized Policy, Charging, Negotiation and Enforcement Entity (PCNE) is disclosed for serving cellular traffic across multiple networks. The PCNE manages signaling and user payloads to apply policies compliant to concerned networks in real time. The PCNE provides policy control to a Home network even when its outbound subscriber traffic is locally offloaded at a Visited network or IP Packet Exchange (IPX) cloud. The PCNE protects the Visited network against capacity overuse by inbound subscriber traffic, thereby providing joint control to the Home and Visited network operators resulting in optimal use of bandwidth and resources along with consistent subscriber experience. The PCNE enables the Home network operator to implement domestic quota buckets and policies while its subscriber is roaming in the Visited network by applying differential policy and charging rules. Traffic can be offloaded to a preferred packet data gateway after enforcing the negotiated policies.
The specialized networking and application system includes an enforcer configured to intercept the signaling messages and select an optimal SGW, PGW, SMF/UPF and application servers in real time. More specifically, the enforcer intercepts and generates GSM MAP, Diameter, GTP-C and HTTP2/JSON signaling messages. The enforcer executes a policy to force the user devices to re-establish the data connection, thus anchoring at different SGW, PGW, SMF/UPF and application server to keep end-to-end routing path optimal, when the impacting factor changes. The enforcer can further feed its performance data and decision matrix into the analyzer and database to further optimize the decision process. Analyzer and KPI metrics databases are installed at central data centers to collect the KPI data from different probes and enforcer, calculate in real-time the optimal routing path with different decision factors considered, and interact with enforcer to update the latest optimal path status based on the data collected.
H04W 40/12 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la qualité d'émission ou de la qualité des canaux
H04W 24/10 - Planification des comptes-rendus de mesures
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04W 24/02 - Dispositions pour optimiser l'état de fonctionnement
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Educational services, namely, providing classes, seminars, workshops, lectures, webinars and online, non-downloadable educational videos in the field of communications, communications technologies and infrastructure, mobile technologies and infrastructures, computer software platforms, blockchain, and IoT technologies; computer education training; training in the field of communication technologies; teaching and training in business, industry and information technology Consulting services in the field of network monitoring for enterprises; technological consulting services regarding networks and management of devices and systems in the internet of things (IoT); consulting services in the field of interoperability of computer and mobile networks including communication platforms
Application of streaming machine learning clustering algorithms enables finding clusters of messages (P2P text messages, WHATSAPP, tweets) sharing the same content. Such clusters may be analyzed for finding out offensive messages, unwanted or spam messages, and rumors and take corrective actions as needed. The solution enables visualization of data and/or messages and identification of clusters as the solution works on the data and aggregates data into clusters over time intervals. Corrective actions may be applied on selected clusters based on visualized data clusters or by automated application of defined rules.
A cross-network call identifying function for identifying instances of international call interconnect bypass telecommunications fraud. The cross-network call identifying function access call detail records of both the terminating network and the originating network. The cross-network call identifying function identifies an outgoing international phone call from a caller within the originating network to a callee within the terminating network. The call detail records of the terminating network are querried for an incoming call with a matching callee call identifier. Time information of the outgoing call and the incoming call are compared to determine whether there is a match. If the callee call identifiers and time information match, but the incoming phone call is recorded as a local call, then the incoming call is identified as an instance of international call interconnect bypass fraud.
A blockchain gateway device and associated method of use for reconciling and insuring the consistency of integrated blockchain networks and legacy database-based systems. The blockchain gateway device and associated blockchain scheme harmonizes and reconciles the data elements from multiple independent blockchain databases.
A blockchain gateway device and associated method of use for reconciling and insuring the consistency of integrated blockchain networks and legacy database-based systems. The blockchain gateway device and associated blockchain scheme harmonizes and reconciles the data elements from multiple independent blockchain databases.
G06F 7/00 - Procédés ou dispositions pour le traitement de données en agissant sur l'ordre ou le contenu des données maniées
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
55.
System and method of selective packet data network gateway discovery
rd Generation Partnership Project Authentication Authorization and Accounting (3GPP AAA) node on S6a/S6d/SWx interfaces of a Core Network. The Slicing Agent node selects the Packet Data Gateway (PGW) and communicates the identifying information of the selected PGW to SGSN/MME/3GPP AAA nodes. The PGW is selected to serve subscriber sessions based on the subscriber's profile, usage, and business needs. The Slicing Agent node can be positioned in any Core Network setup around the globe irrespective of whether it is a roaming or a non-roaming scenario for subscribers/devices having global or country-specific Subscriber Identity Modules (SIMs), without requiring any enhancements or upgrades in legacy or existing network nodes including SGSN, MME, 3GPP AAA and HSS.
A system and method of detecting false Short Messaging Service (SMS) delivery reports utilizing machine learning. A statistical model is prepared based on attributes of SMS delivery reports that are known to be genuine. An anomaly detection algorithm compares attributes of the subsequent SMS messages against the statistical model. The anomaly detection algorithm is used to detect, and flag false SMS delivery reports returned by aggregators and operators.
A traffic hub system comprising a roaming data module to send and receive data for a roaming wireless network for a mobile device, the mobile device comprising a service utilizing a high-speed data network, a home data module to send and receive data for a home wireless network for the mobile device, the home wireless network being a different network than the roaming wireless network, the home wireless network comprising a packet data network gateway. The traffic hub system in one embodiment provides a static policy-based HTTP redirection. The traffic hub system in one embodiment, provides a dynamic policy based redirection. The traffic hub system in on embodiment, provides a seamless captive portal access. The traffic hub system in one embodiment provides data-offloading.
A method of sending a targeted SMS message to a roamer. A messaging platform accesses signaling traffic between the roamer's user equipment, a visited network operator, and a home network operator. The messaging platform obtains the roamer's current location from the signaling traffic with the visited network operator and extracts demographic information associated with the roamer from data received from the home network operator. The messaging platform queries a messaging database for prestored messages corresponding to the roamer's current location. The messages corresponding to the roamer's current location are filtered based on the roamer's demographic information to identify the targeted message for the roamer, which is then transmitted to the roamer's user equipment.
A specialized networking and application system which includes a consent and campaign blockchain network for advertising campaigns. Off-chain databases are used to store a user's personal data records that are not suitable to be stored in blockchain ledger system. A user receives an opt-in request link prompting the user to consent to receiving advertising campaign messages. The invention verifies user's consent using a single-use token and, if the verification is successful, the advertising campaign messages are transmitted to the user. The invention enables users to centrally manage their consents/preferences for various enterprises, various channels and/or campaigns, storing encrypted subscribers' consents/preferences data into trusted blockchain network, validating the preferences before delivering a campaign message to the user, and providing audit trials and historical campaign messages with analytic data to the users.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
60.
Routing agent platform with a 3-tier architecture for diameter communication protocol in IP networks
This invention is a system and method for a high-performance Diameter Routing Agent (DRA) platform with a three-tier architecture. The DRA platform consists of a Diameter Connection Router (DCR), a Diameter Load Balancer (DLB), and multiple DRA Instances. DCR is a front-end to all external Peers and distributes Diameter connections to a DLB. DLB is a Diameter transaction load balancer and distributes individual Diameter transaction to a DRA. DRA is a Diameter Routing Agent to implement business logic to determine routing of an incoming request to a destination peer as well as message mediation. A public Internet Protocol (IP) address of the DCR is exposed to the external peers as a single point of contact between the peers and the computer network, wherein an internal topology of the computer network remains hidden from the peers.
A method for detecting SMS messaging service interruptions by classifying SMS messages as delivered or undelivered based upon the receipt of a successful conversion message within a predetermined time period. A current conversion rate is calculated for each network operator partner and destination network pair and the current conversion rate is compared against a reference conversion rate to identify a decrease in the conversion rate of the SMS messages. If the conversion rate decrease exceeds a predefined value, the channel between the network operator partner and the destination network pair is flagged and subsequent SMS messages are routed to end users via an alternative destination network.
H04W 4/18 - Conversion de format ou de contenu d'informations, p. ex. adaptation, par le réseau, des informations reçues ou transmises pour une distribution sans fil aux utilisateurs ou aux terminaux
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
62.
Method and system for interworking of RCS universal profile and pre-universal profile clients
This invention is a system and method for an interworking function that handles communications between Rich Communication Services (RCS) Pre-Universal Profile (Pre-UP) and Universal Profile (UP) clients, and their Controlling Function and Participating Function service points. The interworking function supports the interworking for Pre-UP and UP clients in the following scenarios: 1) CPM Standalone Messaging and CPM 1-to-1 Chat, 2) CPM Chat and IM/SIMPLE Chat, 3) File Transfer by MSRP and File Transfer by HTTP, and 4) Open Group Chat and Closed Group Chat. The interworking function performs the necessary SIP message conversation and/or headers and message bodies manipulation, acts as MSRP client and server, acts as a HTTP server to store file for file transfer interworking, and acts as message proxy for Controlling Function and Participating Function.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
A method for detecting SMS messaging service interruptions by classifying SMS messages as delivered or undelivered based upon the receipt of a successful conversion message within a predetermined time period. A current conversion rate is calculated for each network operator partner and destination network pair and the current conversion rate is compared against a reference conversion rate to identify a decrease in the conversion rate of the SMS messages. If the conversion rate decrease exceeds a predefined value, the channel between the network operator partner and the destination network pair is flagged and subsequent SMS messages are routed to end users via an alternative destination network.
A contextual SS7 firewall filter is inserted between a network operator and its roaming partners intra network and inter network SS7 traffic. SS7 firewall filter validates GSM MAP and GSM CAP messages based on specific criteria as provisioned for those message types and either allows them or blocks them from reaching their intended destination based on the validation results. The validation step involves verification of MSU correctness, verification of correctness of SS7 MTP fields for each MSU, and verification of correctness of SS7 SCCP fields for each MSU. SS7 firewall filter blocks GSM messages that fail at least one of the verification steps.
A Virtual Global Title Translation (V-GTT) Service implemented in a Signaling Connection Control Part (SCCP) Gateway using a single American National Standards Institute (ANSI) SS7 Point Code and a single International Telecommunications Union (ITU) SS7 Point Code for access to destination hubs on ITU and ANSI SS7 side of the SS7 network. The V-GTT enables ANSI SS7 and ITU SS7 operators to send their destination SS7 hub-specific traffic to a single hub-specific protocol for either the ANSI or ITU SS7 Point Code of V-GTT. The V-GTT Service application manages the traffic between ANSI/ITU SS7 operator and destination SS7 hub operators and performs ANSI SS7 to ITU SS7 (or ITU SS7 to ANSI SS7) protocol conversion if the destination hub is on a different SS7 protocol, thereby enabling an originating operator to send traffic to a single V-GTT Service hub-specific point code using the protocol that the originating operator currently employs.
A method of enabling a home network to identify a location of its subscriber roaming within a visited network. An Intelligent Data Routing (IDR) application functions as a proxy between a Serving GPRS Support Node (SGSN) of the visited network and a Gateway GPRS Support Node (GGSN) of the home network. The IDR receives a Create PDP Context Request message or an Update PDP Context Request message that is sent from the SGSN to GGSN. The IDR determines whether the Routing Area Identity (RAI) and User Location Information (ULI) Information Elements (IEs) of the Request message have been populated by the SGSN. If the IDR application determines that at least one of these IEs is absent, the IDR application populates them with appropriate values obtained from the SGSN. The routing application sends the modified Request message having the populated RAI and ULI IEs to the GGSN.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 8/12 - Transfert de données de mobilité entre registres de localisation ou serveurs de mobilité
67.
Proxy platform for inter-operator provisioning of eSIM profiles
A system for supporting the deployment of an embedded subscriber identification module (eSIM) provisioning management system on the ES3 interface between Subscription Manager Data Preparation (SM-DP) of a target mobile network operator (MNO) and Subscription Manager Secure Routing (SM-SR) of a current MNO. A SM-Proxy implements a SM-SR functionality on a first interface towards the SM-DP, and implements a SM-DP functionality on a second interface towards the SM-SR. A hosted SM-DP implements a RESTful API to receive SIM profile information from a provisioning server in the target MNO's network. An Agreement Management system controls a set of eSIM provisioning rules. A Service Portal enables the MNOs to manage their eSIM provisioning rules across their MNO partners.
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04B 1/3816 - Dispositions mécaniques pour loger des dispositifs d’identification, p. ex. cartes ou pucesÉmetteurs-récepteurs, c.-à-d. dispositifs dans lesquels l'émetteur et le récepteur forment un ensemble structural et dans lesquels au moins une partie est utilisée pour des fonctions d'émission et de réception avec des connecteurs pour programmer des dispositifs d’identification
H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Authentication of a mobile device by its subscription is automatically performed by extracting the IMSI value from the mobile device's operating system via a locally installed mobile app. The IMSI value is passed onto an authentication system that has the necessary authentication and authorization infrastructure to query a mobile operator's database for a MSISDN associated with the IMSI value. If a valid MSISDN is found, the MSISDN is returned from the mobile operator to the authentication system and finally to the mobile app on the mobile device.
A method of enhancing end-to-end security of the Diameter protocol. A client transmits a Request message to the server. The request message has a signature, which is generated by encrypting a hash result calculated by the client using predefined AVPs of the Request message. The server validates the signature by independently calculating the hash result and determining whether the hash result within the signature matches the calculated result. Upon successful validation of the signature, the server transmits an Answer message to the client. The Answer message contains a nonce value and a request for Authenticator message from the client. The client transmits an Authenticator message having a second signature based on the hash result calculated using the nonce. The server compares the received hash result with the calculated hash result. If there is a match, the server updates the information requested in the Request message.
G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
This invention is a system and method for mobile authentication using HTTP redirect in GTP tunnels. The authentication procedure generates a one-time-token that returns to the Enterprise application that requests the authentication. The authentication platform injects a HTTP redirect response to the mobile device via the GTP-U tunnel that corresponds to the GTP session of the inputted-MSISDN. The HTTP redirect response carries a URL with the one-time-token as parameter. The Enterprise application authenticates the HTTP request by comparing the one-time-token in the HTTP request parameter against the value returned by the authentication platform during its authentication request API call.
A packet interceptor monitors GTP traffic for control signaling and data plane traffic. The interceptor reroutes a packet by modifying its IP addresses and forwards the packet to a packet data network gateway server. The server receives the GTP-U packet, performs identification based on the synchronized GTP session information, decapsulates the GTP tunnel information from the GTP-U packet and sends to either a proxy server or the destination application server directly. The proxy server performs message filtering, stores packet contents into storage and forwards the packet out to the destination application server. The filtering function of the proxy server can be trained and enhanced with machine learning algorithms. Thus, the proxy server can automatically detect the traffic type and allow or block the packet based on the detection result.
GTP firewall service to block or allow GTP-C v1 messages from specific SGSN/GGSN and GTP-C v2 messages from specific SGW/PGW to prevent fraudulent activity occurring from any specific serving node or home node. GTP Traffic from specific SGSN (3G) or SGW (4G) can be blocked going to specific home operator, including 3G GSM to 4G LTE and 4G LTE to 3G GSM protocol interoperability provided by GTP Firewall. Individual Information Elements within GTP-C v1 and GTP-C v2 messages will be monitored based on home and serve operator configuration as well as GTP messages and Information Elements mapped from GTP-C v1 to GTP-C v2 for 3G GSM to 4G LTE interoperability and GTP-C v2 to GTP-C v1 for 4G LTE to 3G GSM interoperability.
A traffic hub used in mobile communications for data offloading, diversion and security. The traffic hub includes an Evolved Packet Data Gateway (ePDG) module configured to transmit and receive data packets for a mobile device in Roaming Untrusted Wi-Fi network for secured access to an Evolved Packet Core (EPC) network, a Trusted WLAN Access Gateway (TWAG) module configured to transmit and receive the data packets for a mobile device in Roaming Trusted Wi-Fi network for secured access to the EPC network and a General Packet Radio Service (GPRS) Tunneling Protocol (GTP) Proxy (GProxy) module, the GProxy module being the core module of the traffic hub configured to enforce policy rules on the data packets prior to exchanging the data packets with logically selected Peer Gateway General Packet Radio Service (GPRS) Serving Node (GGSN)/Packet Data Network (PDN) Gateway (PGW) and ePDG/TWAG nodes. The GProxy also operates as a GTP-aware firewall to protect Home GGSN/PGW nodes from malicious traffic.
H04W 28/16 - Gestion centrale des ressourcesNégociation de ressources ou de paramètres de communication, p. ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
H04W 36/00 - Dispositions pour le transfert ou la resélection
A method of transmitting data to a virtual group consisting of multiple user devices. A plurality of network-connected user devices are grouped together into a virtual group using their International Mobile Subscriber Identification (IMSI) or Mobile Station International Subscriber Directory Number (MSISDN) contained within a SIM card residing within each user device. An application programming interface (API) and a single identification are established for the virtual group and are exposed to an application server. Data packets sent to the virtual group via a communications protocol from the application server are intercepted and directed to each user device within the virtual group. The plurality of user devices within the virtual group can simultaneously receive the data stream.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04W 4/06 - Répartition sélective de services de diffusion, p. ex. service de diffusion/multidiffusion multimédiaServices à des groupes d’utilisateursServices d’appel sélectif unidirectionnel
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 92/18 - Interfaces entre des dispositifs hiérarchiquement similaires entre des dispositifs terminaux
H04W 76/12 - Établissement de tunnels de transport
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 88/04 - Dispositifs terminaux adapté à la retransmission à destination ou en provenance d'un autre terminal ou utilisateur
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
A networking and application system for handling the data communications protocols in the mobile packet core network. General Packet Radio Service (GPRS) Tunneling Protocol (GTP) has a control plane for control signaling (GTP-C) and a data plane for user data (GTP-U). A GTP Switch interfaces with Serving GPRS Support Node (SGSN) and/or serving gateway (S-GW). The GTP Switch provides Interment Protocol (IP) address manipulation to hide the topology of distributed control plane and data plane instances. The GTP Switch also implements dynamic node selection to route the control signaling and data plane traffic to different instances, hosted on separate servers, thus enabling higher flexibility in the network routing path optimization and scalable and elastic handling of the data traffic.
A Virtual Global Title Translation (V-GTT) Service implemented in a Signaling Connection Control Part (SCCP) Gateway using a single American National Standards Institute (ANSI) SS7 Point Code and a single International Telecommunications Union (ITU) SS7 Point Code for access to destination hubs on ITU and ANSI SS7 side of the SS7 network. The V-GTT enables ANSI SS7 and ITU SS7 operators to send their destination SS7 hub-specific traffic to a single hub-specific protocol for either the ANSI or ITU SS7 Point Code of V-GTT. The V-GTT Service application manages the traffic between ANSI/ITU SS7 operator and destination SS7 hub operators and performs ANSI SS7 to ITU SS7 (or ITU SS7 to ANSI SS7) protocol conversion if the destination hub is on a different SS7 protocol, thereby enabling an originating operator to send traffic to a single V-GTT Service hub-specific point code using the protocol that the originating operator currently employs.
A method of enabling a home network to identify a location of its subscriber roaming within a visited network. An Intelligent Data Routing (IDR) application functions as a proxy between a Serving GPRS Support Node (SGSN) of the visited network and a Gateway GPRS Support Node (GGSN) of the home network. The IDR receives a Create PDP Context Request message or an Update PDP Context Request message that is sent from the SGSN to GGSN. The IDR determines whether the Routing Area Identity (RAI) and User Location Information (ULI) Information Elements (IEs) of the Request message have been populated by the SGSN. If the IDR application determines that at least one of these IEs is absent, the IDR application populates them with appropriate values obtained from the SGSN. The routing application sends the modified Request message having the populated RAI and ULI IEs to the GGSN.
H04W 4/02 - Services utilisant des informations de localisation
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
78.
Method for computationally detecting anomalies of digital device behavior on a communications network
The invention is a method of detecting malicious behavior of a network participant. Specific usage values observable at a network connectivity layer are defined. These usage values can be size of data transferred, quantity of data bursts, a quantity of IP address destinations, a network protocol being used, and/or a length of an encryption key. The invention measures the usage values for the network participant across multiple networks over a predetermined period of time and creates a statistical digital dossier representative of patterns of the measured usage values for the network participant. The invention monitors the behavior of the network participant by measuring current usage values. The current usage values are compared against the statistical digital dossier and, if a deviation beyond a predefined tolerance is detected, an alert signal is issued.
A method of assessing the security of a user's connection to a Sequenced Packet Exchange (SPX) network and the user's consumption of services via the SPX network. The invention includes digitally accessing a plurality of network nodes and obtaining data transmissions through said plurality of network nodes. Each transmission corresponds to a security implementation of a current state of the user's connection or consumption of SPX services. A coefficient is determined for each security implementation, wherein the coefficient corresponds to a weight given to each security implementation in determining a level of security of the user's connection or consumption. A security score representative of the level of security of the user's connection is calculated as a function of the security implementation and their corresponding coefficients. The security score is output to the user.
A contextual SS7 firewall filter is inserted between a network operator and its roaming partners intra network and inter network SS7 traffic. SS7 firewall filter validates GSM MAP and GSM CAP messages based on specific criteria as provisioned for those message types and either allows them or blocks them from reaching their intended destination based on the validation results. The validation step involves verification of MSU correctness, verification of correctness of SS7 MTP fields for each MSU, and verification of correctness of SS7 SCCP fields for each MSU. SS7 firewall filter blocks GSM messages that fail at least one of the verification steps.
GTP firewall service to block or allow GTP-C v1 messages from specific SGSN/GGSN and GTP-C v2 messages from specific SGW/PGW to prevent fraudulent activity occurring from any specific serving node or home node. GTP Traffic from specific SGSN (3G) or SGW (4G) can be blocked going to specific home operator, including 3G GSM to 4G LTE and 4G LTE to 3G GSM protocol interoperability provided by GTP Firewall. Individual Information Elements within GTP-C v1 and GTP-C v2 messages will be monitored based on home and serve operator configuration as well as GTP messages and Information Elements mapped from GTP-C v1 to GTP-C v2 for 3G GSM to 4G LTE interoperability and GTP-C v2 to GTP-C v1 for 4G LTE to 3G GSM interoperability.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 76/18 - Gestion du rejet ou de l'échec de l'établissement
82.
Method and system of enabling roaming services in a data-only network to a user equipment requiring a dual attachment to packet and circuit switched networks
A method and system of providing a roaming data service to a User Equipment (UE) that requires a dual attachment to a Packet Switched (PS) network for the data service and a Circuit Switched (CS) network for a voice service, but the visited network is a data-only PS network. When the UE sends a dual attach request, the visited network communicates with the home network via a Diameter Agent to obtain the UE's PS profile needed to complete attachment of the UE in the visited network for data services. To enable CS attach of the UE with the visited network, a custom function, titled a SGs-Agent, is deployed. The SGs-Agent provides a predefined CS profile to the visited network, thereby enabling the UE to complete the CS attach with the visited network. The visited network provides data services to the UE, but the voice services are denied.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communications services, namely, telephone and mobile communications; telecommunications services, namely, electronic telecommunications connections; providing access to telecommunications networks; telecommunication access services; consulting services in the field of communications; text, wireless digital, electronic messaging services; wireless digital messaging services, namely, multimedia, electronic, and text management services; communication services, namely, transmission of voice, data, images, audio, video, messages, and information via wireless and broadband power line communication networks; online services, namely, mobile messaging; providing frame relay connectivity services for data transfer in the nature of connection management and bandwidth-based control; facilitation of wireless telecommunication services, namely, wireless broadband communication services in the nature of wireless-based connectivity; inter-carrier telecommunications consulting services; consulting services in the field of mobile and electronic messaging; network consulting services, namely, consulting in the field of mobile messaging Online business information management; general data clearing house services for the collection, translation, and exchange of general data; call processing services, namely, operation of telephone call centers for others; network services, namely, operation and administration of telecommunications networks for others; provision and management of telecommunications systems and telecommunications networks for others, namely, managing telephone services for other carriers; inter-carrier communications process business management and service order business administration and management services; database management services; general business information clearing house services, namely, validation of billing data, business administration services for others through management of agreements between parties, financial record-keeping and invoicing services, namely, invoice distribution, payment settlement and accuracy reporting; business management and enterprise organization consultancy; operational business assistance to enterprises; business consulting services for enterprises; inter-carrier business consulting services Electronic management services, namely, billing consolidation management services; clearing house services, namely, financial clearing and payment settlement transaction processing services Platform-as-a-service (PAAS) featuring computer software platforms for technology support, global mobile connectivity, cloud service provider connectivity; software as a service (SAAS) services featuring software for connectivity to cloud-based applications, analytics, and reporting for network security; Computer network configuration services; technical support, namely, monitoring technological functions of computer and telecommunications network systems; providing temporary use of online non-downloadable software for monitoring subscriber behavior, troubleshooting, information gathering; network engineering services; technical support services, namely, monitoring and troubleshooting of computer software for detecting fraud and data breaches; technical support services, namely, troubleshooting of computer software problems; providing authentication, issuance, validation and revocation of digital certificates; computer security services for protecting data and information from unauthorized access, namely, restricting unauthorized access to data and computer networks; electronic monitoring of computer systems and computer networks to detect fraud in the nature of unauthorized access or data breaches; identity authentication services in the nature of providing authentication, issuance, and validation of digital certificates; roaming subscriber behavior authentication management services; consulting services in the field of network monitoring for enterprises; technological consulting services regarding networks and management of devices and systems in the internet of things (IoT); consulting services in the field of interoperability of computer networks
85.
Method of providing data, voice, and SMS services to LTE subscribers roaming in 2G/3G visited networks
A method of providing voice call, data, and SMS services to a user equipment roaming in a 2G/3G visited network and subscribed to an LTE home network. An Interworking Function communicates with both the visited network and the home network. The Interworking Function translates between Mobile Application Part (MAP) protocol used by the 2G/3G visited network and Session Initiation Protocol (SIP) used by the LTE home network. The Interworking Function establishes both a MAP Registration with the 2G/3G visited network and also a SIP Registration with the LTE home network, thereby enabling provision of voice call, data, and SMS services to the roaming UE.
H04W 80/10 - Protocoles de couche supérieure adaptés à la gestion de sessions, p. ex. protocole d'initiation de session [SIP Session Initiation Protocol]
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Communications services, namely, telephone and mobile communications; telecommunications services, namely, electronic telecommunications connections; providing access to telecommunications networks; telecommunication access services; consulting services in the field of communications; text, wireless digital, electronic messaging services; wireless digital messaging services, namely, multimedia, electronic, and text management services; communication services, namely, transmission of voice, data, images, audio, video, messages, and information via wireless and broadband power line communication networks; online services, namely, mobile messaging; Providing frame relay connectivity services for data transfer in the nature of connection management and bandwidth-based control; facilitation of wireless telecommunication services, namely, wireless broadband communication services in the nature of wireless-based connectivity; inter-carrier telecommunications consulting services; consulting services in the field of mobile and electronic messaging; network consulting services, namely, consulting in the field of mobile messaging Electronic management services, namely, billing consolidation management services; clearing house services, namely, financial clearing and payment settlement transaction processing services Platform-as-a-service (PAAS) featuring computer software platforms for technology support, global mobile connectivity, cloud service provider connectivity; software as a service (SAAS) featuring software for connectivity to cloud-based applications, analytics, and reporting for network security; Computer network configuration services; technical support, namely, monitoring technological functions of computer and telecommunications network systems; providing temporary use of online non-downloadable software for monitoring subscriber behavior, troubleshooting, information gathering; network engineering services; technical support services, namely, monitoring and troubleshooting of computer software for detecting fraud and data breaches; technical support services, namely, troubleshooting of computer software problems; providing authentication, issuance, validation and revocation of digital certificates; computer security services for protecting data and information from unauthorized access, namely, restricting unauthorized access to data and computer networks; Electronic monitoring of computer systems and computer networks to detect fraud in the nature of unauthorized access or data breaches; identity authentication services in the nature of providing authentication, issuance, and validation of digital certificates; roaming subscriber behavior authentication management services; consulting services in the field of network monitoring for enterprises; technological consulting services regarding networks and management of devices and systems in the internet of things (IoT); consulting services in the field of interoperability of computer software and networks
A method of establishing connectivity between a mobile network operator (MNO) and a machine type communications (MTC) service provider. A machine type communications interworking function (MTC-IWF) Proxy is hosted on an IPX network service. MTC-IWF Proxy is connected to a MTC-IWF of the MNO and is also connected to a Service Capacities Center (SCS) of the MTC service provider. MTC-IWF Proxy connects to the MNO and the MTC service providers via trigger-service provider (Tsp) interface. Identity mapping services are provided between a first set of subscriber identifiers used by the MNO and a second set of subscriber identities used by the MTC service provider. The MTC-IWF Proxy hides the internal topology and relays signaling protocols used over a Tsp interface, thus enabling the MTC service providers and MNOs communicate without modifying their internal signaling protocols.
Method for providing roaming services in which the home network uses S8HR model for out-bound roaming while the visited network uses LBO model for in-bound roaming
A roaming method that enables the home network (HPMN) to use S8 Home Routed (S8HR) model for out-bound roaming while the visited network (VPMN) uses Local Breakout (LBO) model for in-bound roaming. An IMS Roaming Gateway (IR-GW) establishes an IMS bearer between the IR-GW and the home network's Packet Data Network Gateway (P-GW). The IR-GW replaces the source IP address on the SIP-Register message with the client IP address assigned to the UE by the HPMN P-GW. Upon receiving a SIP-Response message responsive to successful authentication of the UE with the HPMN, the IR-GW inserts its own IP address into the SIP-Response message and forwards it to the UE. IR-GW performs network address translation (NAT) between the source IP assigned to the UE by the VPMN and the client IP assigned to the UE by the HPMN.
A traffic hub system comprising a roaming data module to send and receive data for a roaming wireless network for a mobile device, the mobile device comprising a service utilizing a high-speed data network, a home data module to send and receive data for a home wireless network for the mobile device, the home wireless network being a different network than the roaming wireless network, the home wireless network comprising a packet data network gateway. The traffic hub system comprising a bandwidth negotiation module to negotiate bandwidth for the mobile device with the roaming wireless network based on a home network policy when the mobile device is in the roaming wireless network, and a traffic control module, the traffic control module comprising a processor to update a quality of service parameter based on the negotiated bandwidth, transparently to the roaming wireless network and without enforcement of the home network policy by the home wireless network, the enforcement including providing the negotiated bandwidth.
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
H04W 36/28 - La resélection étant déclenchée par des paramètres spécifiques par des paramètres de communication agréés ou négociés impliquant une pluralité de liaisons, p. ex. des liaisons multi-appels ou multi-porteuses
91.
Method for determining inbound roaming traffic market share on cellular networks
A method of determining inbound roaming market share of a host network is disclosed. The network subscribers are identified by their subscriber identity (IMSI). Each IMSI is categorized based on its roaming status. The roaming categories are as follows: successfully roaming, roaming but steered to another network, not roaming due to errors related to steering, not roaming due to errors not related to steering, roaming below a threshold, roaming below a threshold duration, and roaming on rival networks. SRI-for-SM results of SMS activity are used to determine the count of IMSIs roaming on rival networks. Market share is determined by calculating a quotient of the count of IMSI's categorized as successfully roaming on the host network and the difference between the total count of the IMSIs and the count of IMSIs categorized as not roaming due to errors not related to steering.
A method of providing enhanced mobile communications services through collecting, analyzing, and utilizing cellular network data is described. The method configures an intelligence engine based on a set of rules. The method receives the set of rules through a user interface or generates the set of rules through performing an analysis on the network data by the intelligence engine. The method receives network data events and correlates the received network data events. The intelligence engine determines an action in response to a correlated network data event. The action includes sending a text message or email containing an offer to a mobile communications services subscriber, or updating a database. The method then performs the action.
A method of providing enhanced mobile communications services through collecting, analyzing, and utilizing cellular network data is described. The method configures an intelligence engine based on a set of rules. The method receives the set of rules through a user interface or generates the set of rules through performing an analysis on the network data by the intelligence engine. The method receives network data events and correlates the received network data events. The intelligence engine determines an action in response to a correlated network data event. The action includes sending a text message or email containing an offer to a mobile communications services subscriber, or updating a database. The method then performs the action.
A method of utilizing mobile communication roaming data is described. The method receives a roaming data authorization from a user to allow using roaming data related to the user. The method receives roaming data related to the user from a set of mobile network operators. The method receives an information request related to the user. The method performs an analysis on the roaming data related to the user to retrieve the requested information. The method then sends a response containing the requested information.
H04W 8/02 - Traitement de données de mobilité, p. ex. enregistrement d'informations dans un registre de localisation nominal [HLR Home Location Register] ou de visiteurs [VLR Visitor Location Register]Transfert de données de mobilité, p. ex. entre HLR, VLR ou réseaux externes
A wireless data-oriented service provides toll free data access to wireless users, such as GSM or CDMA-based users, when accessing specified content. The content provider pays for (“sponsors”) access to specific content for wireless users, often in conjunction with advertisement campaigns. In one embodiment a separate access point name is used when making the request to distinguish between sponsored data and conventional data access requests. In another embodiment, a portal proxy is used and sponsored data is distinguished from conventional data by the address of the destination web site. Wireless users accessing the sponsored content are not billed for usage, but rather the content provider is billed for usage. A data session management platform generates appropriate call data records indicating the session usage and transmits the records to reconcile accounts between the mobile network operator and the content provider.
A method and apparatus provide access to communication services using dynamically assigned user credentials. The method includes establishing a communication connection with a first communication network (such as GSM, UMTS, CDMA, or LTE networks) using a real user credential (e.g., a SIM, a USIM, or an R-UIM card or certificates) in a first communication module, utilizing the first communication connection to request the dynamically assigned user credential from a remote management system, and registering a second communication module into the second communication network. The second communication connection is then tethered to allow other devices to access the Internet or other network.
A method and system for completing the authentication process in a second communication network (such as Wi-Fi or WiMAX) utilizes a user credential of a first communication network, such as GSM, UMTS, CDMA, or LTE. Preferably, the user credential is a SIM card, a USIM card, a R-UIM card, or a functionally similar component. The system includes a client and an authentication platform that retrieves Service State information of the user credential in the first communication network and passes the information to the authentication platform of the second communication network. The client is granted access to the second communication network after the authentication platform validates the client=s service and subscription status with the first communication network.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
98.
Methods, apparatuses and computer program products for facilitating toll free data access
An apparatus for facilitating toll free data access includes a processor and memory storing executable computer code causing the apparatus to at least perform operations including sending a request to a device requesting identification of one or more content providers that provide data to users in which the content providers pay for data, accessed from the content providers, on behalf of users. The accessed data is not considered data usage accrued by the users during a billing cycle or against a prepaid data plan. The computer program code may further cause the apparatus to receive an indication from the device of a content provider(s) that pays for the provision of the data on behalf of users. The computer program code may further cause the apparatus to determine whether a selected content provider pays for the provision of the data to users. Corresponding methods and computer program products are also provided.
An apparatus for facilitating toll free data access includes a processor and memory storing executable computer code causing the apparatus to at least perform operations including sending a request to a device requesting identification of one or more content providers that provide data to users in which the content providers pay for data, accessed from the content providers, on behalf of users. The accessed data is not considered data usage accrued by the users during a billing cycle or against a prepaid data plan. The computer program code may further cause the apparatus to receive an indication from the device of a content provider(s) that pays for the provision of the data on behalf of users. The computer program code may further cause the apparatus to determine whether a selected content provider pays for the provision of the data to users. Corresponding methods and computer program products are also provided.
A wireless data-oriented service provides toll free data access to wireless users, such as GSM or CDMA-based users, when accessing specified content. The content provider pays for ("sponsors") access to specific content for wireless users, often in conjunction with advertisement campaigns. In one embodiment a separate access point name is used when making the request to distinguish between sponsored data and conventional data access requests. In another embodiment, a portal proxy is used and sponsored data is distinguished from conventional data by the address of the destination web site. Wireless users accessing the sponsored content are not billed for usage, but rather the content provider is billed for usage. A data session management platform generates appropriate call data records indicating the session usage and transmits the records to reconcile accounts between the mobile network operator and the content provider.