Abstract:
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.
Abstract:
A system and method for telecommunications operators to enable group based dynamic policy controls for both pre-paid and post-paid subscribers, who are typically not managed in an Online Charging System (OCS), but rather in an Charging System or a Billing System. Examples of policy controls that may be enabled by this invention include tracking spending for post-paid subscribers, managing subscriber usage across fixed-line and mobile networks, and so on. This is achieved by introducing a new component called the Enhanced Charging System (ECS) and creating a new reference point and interface between the Policy Management System and the ECS.
Abstract:
The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.
Abstract:
A combination of an independent key routing (IKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores a first type of data relating to the subscriber by using a first key of the plurality of keys to query a data locality table, identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit, and send the first communication message and the plurality of keys to the first application processor.
Abstract:
Systems and computing devices may be configured to intelligently apply controls in a telecommunication system that implements or uses network slicing and/or virtualized network function technologies. A computing device may be configured to receive a request to instantiate a new network slice from a component in the telecommunication system. The computing device may determine that a virtualized network function (e.g., C-RAN virtual network function, MEC virtual network function, etc.) should be created for the new network slice, and determine whether a policy allows for the creation of the virtualized network function. The computing device may create the virtualized network function if the policy allows for its creation. The server computing device may be a charging and license management (CALM) component.
Abstract:
Systems and computing devices may be configured to intelligently apply service-level policy, charging, licensing, and authorization controls in a telecommunication system that implements or uses network function virtualization technologies. A server computing device deployed in the telecommunication network may be configured to receive a policy request message relating to a network service lifecycle event from another network component, use the information included in the received policy request message to make a service-level policy decision, generate a trigger definition relating to the network service lifecycle event based on the policy decision, generate a policy response message that includes the trigger definition, and send the generated policy response message to the network component.
Abstract:
A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory.
Abstract:
The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.
Abstract:
A system and method for managing group-based charging for network usage and spending. A server computing device that includes an offline charging system (OFCS) component may be configured to receive a communication message that includes a first attribute, determine/identify a group of user equipments that includes a first user equipment device that is associated with the received communication message, and determine a charging attribute state for the determined group of user equipments based on the first attribute and a second attribute associated with a second user equipment device in the group of user equipments. The server may apply a charging event, determine whether the charging attribute state of the group of user equipments changed as a result of applying the charging event, and notifying a listener component of a new charging attribute state in response to determining that the charging attribute state of the group of user equipments changed.
Abstract:
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.