摘要:
The system and methods of the various embodiments enable the efficient management and distribution of application filters or packet flow descriptions within a telecommunications network. A policy management system may be configured to receive a request message from a charging and enforcement (CaE) component, determine application identifiers for a data communication based on information included in the received request message, and determine policy rules. The policy management system may send a stimulus message that includes the determined application identifiers to a filter management system component so as to cause the filter management system to preemptively provision the charging and enforcement component with application filters. The policy management system may also send a response message that includes the determined policy rules to the CaE component. The charging and enforcement component may use the application filters to identify a data communication and implement the received policy rules for the identified data communication.
摘要:
Systems and computing devices may be configured to intelligently apply service-level policy, charging, licensing, and authorization controls in a telecommunication system that implements or uses network function virtualization technologies. A server computing device deployed in the telecommunication network may be configured to receive a policy request message relating to a network service lifecycle event from another network component, use the information included in the received policy request message to make a service-level policy decision, generate a trigger definition relating to the network service lifecycle event based on the policy decision, generate a policy response message that includes the trigger definition, and send the generated policy response message to the network component.
摘要:
Systems and computing devices may be configured to intelligently and dynamically allocate quotas for the access and use of a telecommunications network by consumers that use a shared balance account. The dynamic allocation of quotas may include computing a total reclaimable quota size value in response to determining that quota may not be allocated to a first consumer from the shared account balance without exceeding a balance threshold, reclaiming all or portions of currently active allocated quotas from a other consumers that use the shared balance account in response to determining that the total reclaimable quota size value is greater than or equal to the minimum quota allocation size, updating the shared account balance to include the reclaimed portions, and allocating quota to the first consumer from the updated shared balance account.
摘要:
The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.
摘要:
A server computing device may be deployed in telecommunication signaling network and configured to communicate with a subscriber profile repository, policy management component, a charging component, and/or other components in the network to intelligently determine whether a user equipment device should receive/use a service via a communication tunnel, to authorize and/or create a communication tunnel between a user equipment device and a tunnel termination function component, and to implement policy charging rules for the use of the service via the communication tunnel. The communication tunnel may carry a portion or a segment of a data flow for a specific service (or a portion of the communication link) between the user equipment device and a destination component. The server computing device may be configured to authorize/create different communication tunnels for different services and to implement different policy charging rules for different tunnels.
摘要:
A system and method for managing group-based charging for network usage and spending. A server computing device that includes an offline charging system (OFCS) component may be configured to receive a communication message that includes a first attribute, determine/identify a group of user equipments that includes a first user equipment device that is associated with the received communication message, and determine a charging attribute state for the determined group of user equipments based on the first attribute and a second attribute associated with a second user equipment device in the group of user equipments. The server may apply a charging event, determine whether the charging attribute state of the group of user equipments changed as a result of applying the charging event, and notifying a listener component of a new charging attribute state in response to determining that the charging attribute state of the group of user equipments changed.
摘要:
A network server may be configured to prevent user equipment (UE) from communicating payload information across a telecommunication network without paying for the access or use of the network. This may be accomplished by the network server receiving signaling information relating to the UE from a first network component, receiving data plane information relating to the UE from a second network component, determining whether the UE is a signaling-only device based on the received information, and performing a responsive operation when it is determined that the user equipment device is a signaling-only device. The responsive operation may include applying a policy rule to the signaling communications of the UE when it is determined that the UE is a signaling-only device. The policy rule may be charging rule that causes a charging system to bill a subscriber account or a network access rule that blocks the signaling communications of the UE.
摘要:
Methods, servers and systems for performing dynamic context based routing operations in a telecommunications signaling network in which a dynamic context based router may receive a first message encoding signaling information from a source component, decode the message into an internal representation, perform application level routing operations using contextual information derived from the internal representation to identify a destination component, encode signaling information contained in the internal representation into a second message, and send the second message to the identified destination component. Application level routing operations using contextual information may include generating keys based on the internal representation, transmitting the generated keys to an external resource, receiving supplementary information in response to the generated keys, and using the supplementary information to identify the destination component. The information in the internal representation may be modified to send a subset or a superset of the information contained in the first message.
摘要:
Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically associated with malware threats. A policy management system inside the control network accesses a user repository and a charging network, and performs pattern matching and/or observed behavior detection methods to determine if the data flows carry content (e.g., malware) that poses a security risk to network or wireless devices. The policy management system generates policy rules based on user preferences and risk-level. The policy management system sends the generated policy rules to a gateway/PCEF, which blocks the data flows, allows the data flows, or restricts the data flow based on the policy rules.
摘要:
Systems and methods for accomplishing charging operations in telecommunications networks that include multiple charging and enforcement components may include configuring a first charging and enforcement component to receive user traffic, determine usage information associated with the received user traffic, send the associated usage information to a charging system component, and send the user traffic and the associated usage information to a second charging and enforcement component. The second charging and enforcement component may be configured to receive the user traffic and usage information, compute updated usage information, and send the updated usage information to the charging system component. The charging system may use this updated usage information to ensure that the subscriber accounts were billed correctly.