摘要:
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.
摘要:
A system and method for telecommunications operators to enable group based dynamic policy controls for both pre-paid and post-paid subscribers, who are typically not managed in an Online Charging System (OCS), but rather in an Charging System or a Billing System. Examples of policy controls that may be enabled by this invention include tracking spending for post-paid subscribers, managing subscriber usage across fixed-line and mobile networks, and so on. This is achieved by introducing a new component called the Enhanced Charging System (ECS) and creating a new reference point and interface between the Policy Management System and the ECS.
摘要:
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment. The received charging request may include various types of information, including information for transferring cost or billing information from a first billing category to a second billing category.
摘要:
A combination of a common key routing (CKR) method and data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber via a database application programming interface (API) and the common key, store the first communication message in the first database memory included in the first logical scalable unit, and receive a second communication message in response to storing the first communication message in the first database memory and routing the second communication message to another component the telecommunication network.
摘要:
A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory.
摘要:
The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.
摘要:
A network server may be configured to generate, modify, augment, communicate, and/or manage the triggers and signaling communications so that they may be processed and communicated in a more intelligent, efficient, and/or cost effective manner than that which is available via conventional solutions. The network server may receive a trigger communication message that includes trigger parameters and information suitable for causing a destination device to automatically initiate an operation, determining a criterion for sending the trigger communication message to the destination device based on the trigger parameters included in the trigger communication message, monitoring a condition to determine whether the criterion has been satisfied, and send the trigger communication message to the destination device when it is determined that the criterion has been satisfied.
摘要:
A combination of an independent key routing (IKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores a first type of data relating to the subscriber by using a first key of the plurality of keys to query a data locality table, identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit, and send the first communication message and the plurality of keys to the first application processor.
摘要:
A combination of a common key routing (CKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers included in the first communication message, and identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber by querying a data locality table with the common key. The processor may also identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit and send the first communication message to the first application processor.
摘要:
The various embodiments include methods, computers and communication systems that enable decomposing abstract service requests into resources rules, which may include receiving an abstract service request (e.g., a request specifying a functional requirement) via an exposed public interface, generating domain-specific resource rules based on the received abstract service request, identifying relevant components in a telecommunications domain for enforcing the generated domain-specific resource rules, and send the domain-specific resource rules to the identified components (e.g., online charging server, policy management server, etc.) for enforcement. Generating domain-specific resource rules based on the received abstract service request may include generating the rules consistent with the existing resource rules of the domain.