Sign In to Follow Application
View All Documents & Correspondence

Method And System For Dynamically Enriching Summary Logs Of Session(s)

Abstract: The present disclosure relates to a method and a system for dynamically enriching summary logs of session(s). The method encompasses receiving, by a transceiver unit [302] an encoded summary log data of the one or more sessions, wherein each session is either a call session or a data exchange session. Further, the method encompasses decoding, by a conductor unit [304] the encoded summary log data to generate a decoded summary log data. Furthermore, the method comprises dynamically implementing, by a normaliser unit [306] a set of user-defined enrichment policies on the decoded data to generate an enriched data and storing, in a first database [308], the enriched data. [Figure 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 July 2023
Publication Number
03/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Ankit Murarka
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Specification

FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR DYNAMICALLY ENRICHING SUMMARY LOGS OF SESSION(S)”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR DYNAMICALLY ENRICHING SUMMARY LOGS OF SESSION(S)
TECHNICAL FIELD
[0001] Embodiments of the present disclosure relate to network performance management systems. More particularly, embodiments of the present disclosure relate to method and system for dynamically enriching summary logs of one or more sessions.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. The third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless

communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] In order to monitor and analyse the network performance and troubleshoot the network (as and when needed), conventional systems would require physically probing the network. For continuously monitoring, analysing, and troubleshooting the network, physical probing is required to be done multiple times. It is needless to emphasize that such large number of physical probing of the network would be resource intensive, time consuming and inefficient for effective monitoring, analysing, and troubleshooting of the network. Existing enrichment solutions consumes extra time and requires manual intervention (code level changes, deployment, testing, downtime).
[0005] Thus, efforts have been made to develop methods and systems to probe the networks using software means. Enrichment of data in conventional systems is a tedious task and is done manually and offline and needs to be stored again. This also requires systems to be shut down for the time when such operations are being performed. Also, the data related to the networks may be used for various purposes of troubleshooting problems, analysis, etc. In this, if a new field is created, then the software program / code needs to be developed, tested, and deployed again according to the changes made due to the new field added in the data. This is time consuming and labour-intensive task which makes this expensive.
[0006] Thus, there exists an imperative need in the art to dynamically enrich the summary logs of the call sessions or the data exchange sessions, which the present disclosure aims to address.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description.

This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0008] An aspect of the present disclosure may relate to a method for dynamically enriching summary logs of one or more sessions. The method comprises receiving, by a transceiver unit, an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session. The method further comprises decoding, by a conductor unit, the encoded summary log data, to generate a decoded summary log data. The method further comprises dynamically implementing, by a normaliser unit, a set of user-defined enrichment policies on the decoded data to generate an enriched data. And the method comprises storing, in a first database, the enriched data.
[0009] In an exemplary aspect of the present disclosure, the method further comprises storing, in a second database, the encoded summary log data.
[0010] In an exemplary aspect of the present disclosure, in the disclosed method, the encoded summary log data of the one or more sessions is created at a base station after termination of a session.
[0011] In an exemplary aspect of the present disclosure, the method further comprises storing, in the first database, the decoded summary log data, wherein the decoded summary log data comprises at least one of a subscribe identity information (SIM) information and a device identity information.
[0012] In an exemplary aspect of the present disclosure, the method further comprises generating, by the normaliser unit, a subsequent summary log data of one or more subsequent sessions based on the user-defined enrichment policies.
[0013] Another aspect of the present disclosure may relate to a system for dynamically enriching summary logs of one or more sessions. The system

comprises a transceiver unit configured to receive, an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session. The system further comprises a conductor unit connected to at least the transceiver unit, the conductor unit is configured to decode the encoded summary log data, to generate a decoded summary log data. The system further comprises a normaliser unit is connected to at least the conductor unit. The normaliser unit is configured to dynamically implement a set of user-defined enrichment policies on the decoded data to generate an enriched data. And the system further comprises a first database connected to at least the normaliser unit, is configured to store the enriched data.
[0014] An another aspect of the present disclosure may relate to non-transitory computer readable storage medium storing instructions for dynamically enriching summary logs of one or more sessions, the instructions include executable code which, when executed by a one or more units of a system, causes: a transceiver unit of the system to receive an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session; a conductor unit of the system to decode the encoded summary log data, to generate a decoded summary log data; a normaliser unit of the system to dynamically implement a set of user-defined enrichment policies on the decoded data to generate an enriched data; and a first database of the system to store the enriched data.
[0015] Yet another aspect of the present disclosure may relate to a user equipment (UE) for dynamically enriching summary logs of one or more sessions. The UE is being configured to receive, via a selection unit, at least one of one or more operations to be performed on one or more fields of a decoded summary log data. The UE is further configured to create, via a creation unit, a set of user-defined enrichment policies, based on the received one or more operations.
OBJECTS OF THE DISCLOSURE

[0016] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0017] It is an object of the present disclosure to provide a system and a method to dynamically enrich summary logs of the call sessions or the data exchange sessions.
[0018] It is another object of the present disclosure to provide a solution that enables dynamically enriching the summary logs of the call session or the data exchange sessions which does not require system downtime, or manual changes to be made in software program codes.
[0019] It is yet another object of the present disclosure to provide a solution that enables dynamically enriching the summary logs of the call session or the data exchange sessions which is easy and time-saving.
DESCRIPTION OF THE DRAWINGS
[0020] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.

[0021] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
[0022] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
[0023] FIG. 3 illustrates an exemplary block diagram of a system for dynamically enriching summary logs of one or more sessions, in accordance with exemplary implementations of the present disclosure.
[0024] FIG. 4 illustrates a method flow diagram for dynamically enriching summary logs of one or more sessions, in accordance with exemplary implementations of the present disclosure.
[0025] FIG. 5 illustrates an exemplary block diagram of a system for dynamically enriching summary logs of the call sessions or the data exchange sessions, in accordance with exemplary embodiments of the present disclosure.
[0026] FIG. 6 illustrates an exemplary system architecture for dynamically enriching summary logs of one or more sessions, in accordance with exemplary embodiments of the present disclosure.
[0027] FIG. 7 illustrates an exemplary flow diagram, indicating the process for dynamic enrichment of the summary log data, in accordance with exemplary embodiments of the present disclosure.
[0028] The foregoing shall be more apparent from the following more detailed description of the disclosure.
DETAILED DESCRIPTION

[0029] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
[0030] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0031] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
[0032] Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations may be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process

is terminated when its operations are completed but could have additional steps not included in a figure.
[0033] The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
[0034] As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a (Digital Signal Processing) DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
[0035] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic, and/or computing device

or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, a detection unit and any other such unit(s) which are required to implement the features of the present disclosure. The user equipment may be capable of operating on any radio access technology including but not limited to IP-enabled communication, Zig Bee, Bluetooth, Bluetooth Low Energy, Near Field Communication, Z-Wave, Wi-Fi, Wi-Fi direct, etc. For instance, the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other device as may be obvious to a person skilled in the art for implementation of the features of the present disclosure.
[0036] As used herein, a “call log(s) data”, “summary logs”, “new radio summary logs (NRSL)”, “NRSL hex data” refers to data collected by using the process of collecting, analysing, and recording data during call sessions or data exchange sessions. The data can include the call origin, call destination, the length of the call, call start and end times, subscriber information, cell information, session type, network procedure information, clear codes, and the specific network used, and other transmission details. This NRSL hex data starts getting recorded when a call session or a data exchange session is established and stops when the session ends. After the session ends, a NRSL hex data is created with all the entries of the fields related to the call session or the data exchange session.
[0037] As used herein, “storage unit” or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable

medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
[0038] As used herein “interface” or “user interface refers to a shared boundary across which two or more separate components of a system exchange information or data. The interface may also be referred to a set of rules or protocols that define communication or interaction of one or more modules or one or more units with each other, which also includes the methods, functions, or procedures that may be called.
[0039] All modules, units, components used herein, unless explicitly excluded herein, may be software modules or hardware processors, the processors being a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array circuits (FPGA), any other type of integrated circuits, etc.
[0040] As used herein the transceiver unit include at least one receiver and at least one transmitter configured respectively for receiving and transmitting data, signals, information, or a combination thereof between units/components within the system and/or connected with the system.
[0041] Further, the user device may also comprise a “processor” or “processing unit” includes processing unit, wherein processor refers to any logic circuitry for processing instructions. The processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a

DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor is a hardware processor.
[0042] As portable electronic devices and wireless technologies continue to improve and grow in popularity, the advancing wireless technologies for data transfer are also expected to evolve and replace the older generations of technologies. In the field of wireless data communications, the dynamic advancement of various generations of cellular technology are also seen. The development, in this respect, has been incremental in the order of second generation (2G), third generation (3G), fourth generation (4G), and now fifth generation (5G), and more such generations are expected to continue in the forthcoming time.
[0043] Radio Access Technology (RAT) refers to the technology used by mobile devices/ user equipment (UE) to connect to a cellular network. It refers to the specific protocol and standards that govern the way devices communicate with base stations, which are responsible for providing the wireless connection. Further, each RAT has its own set of protocols and standards for communication, which define the frequency bands, modulation techniques, and other parameters used for transmitting and receiving data. Examples of RATs include GSM (Global System for Mobile Communications), CDMA (Code Division Multiple Access), UMTS (Universal Mobile Telecommunications System), LTE (Long-Term Evolution), and 5G. The choice of RAT depends on a variety of factors, including the network infrastructure, the available spectrum, and the mobile device's/device's capabilities. Mobile devices often support multiple RATs, allowing them to connect to different types of networks and provide optimal performance based on the available network resources.

[0044] As discussed in the background section, the current known solutions for enriching summary logs have several shortcomings related to involvement of resources such as human labour, time, costs, etc. at least due to the changes in software programs that need to be made. The present disclosure aims to overcome the above-mentioned and other existing problems in this field of technology by providing method and system of dynamically enriching summary logs of one or more sessions.
[0045] The present disclosure eliminates the need of changing the software program for introducing changes in the field of summary log data. These changes can be introduced due to various requirements related to use cases. For example, we need to apply operation of concatenating two or more field of data in the summary log data of the call sessions or the data exchange sessions. Also, the present solution enables faster and smooth dynamic enrichment of data, i.e., for example, application of the above operation of concatenation for the purpose of troubleshooting of issues, analysis of data, etc. In an embodiment, the solution may involve creation of a data exchange summary log which may be saved in the form of NRSL hex data. When the call session or the data exchange session starts, NRSL hex data starts getting recorded. This base station may be gNodeB as known and/or recognised in the fifth generation of mobile wireless communications technology or any other equivalent of the base station in the mobile wireless communications technology, in general, in any generation of the same. The call summary data or the NRSL hex data is dynamically enriched by introducing policies via the user interface. Once the policies are run at the probing unit, the need to change the software codes for creating the dynamic fields from static fields which involves human intervention, time, costs, is bypassed, and the code is automatically updated by the system.
[0046] Further, in accordance with the present disclosure, it is to be acknowledged that the functionality described for the various the components/units can be implemented interchangeably. While specific embodiments may disclose a

particular functionality of these units for clarity, it is recognized that various configurations and combinations thereof are within the scope of the disclosure. The functionality of specific units as disclosed in the disclosure should not be construed as limiting the scope of the present disclosure. Consequently, alternative arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
[0047] Hereinafter, exemplary embodiments of the present disclosure will be described with reference to the accompanying drawings.
[0048] FIG. 1 illustrates an exemplary block diagram representation of 5th generation (5G) core (5GC) network architecture [100], in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session Management Function (SMF) [108], a Service Communication Proxy (SCP) [110], an Authentication Server Function (AUSF) [112], a Network Slice Specific Authentication and Authorization Function (NSSAAF) [114], a Network Slice Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122], a Unified Data Management (UDM) [124], an application function (AF) [126], a User Plane Function (UPF) [128], a data network (DN) [130], wherein all the components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
[0049] The Radio Access Network (RAN) [104] is the part of a mobile telecommunications system that connects the user equipment (UE) [102] to a core network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and radio access technologies that enable wireless communication.

[0050] The Access and Mobility Management Function (AMF) [106] is the 5G core network function responsible for managing access and mobility aspects, such as the UE [102] registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
[0051] The Session Management Function (SMF) [108] is the 5G core network function responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) [128] for data forwarding and handles IP address allocation and QoS enforcement.
[0052] The Service Communication Proxy (SCP) [110] is the network function in the 5G core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
[0053] The Authentication Server Function (AUSF) [112] is the network function in the 5G core responsible for authenticating the UEs [102] during registration and providing security services. It generates and verifies authentication vectors and tokens.
[0054] The Network Slice Specific Authentication and Authorization Function (NSSAAF) [114] is the network function that provides authentication and authorization services specific to network slices. It ensures that the UEs [102] can access only the slices for which they are authorized.
[0055] The Network Slice Selection Function (NSSF) [116] is the network function responsible for selecting the appropriate network slice for the UE [102] based on factors such as subscription, requested services, and network policies.

[0056] The Network Exposure Function (NEF) [118] is the network function that exposes capabilities and services of the 5G network to external applications, enabling integration with third-party services and applications.
[0057] The Network Repository Function (NRF) [120] is the network function that acts as a central repository for information about available network functions and services. It facilitates the discovery and dynamic registration of network functions.
[0058] The Policy Control Function (PCF) [122] is the network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies.
[0059] The Unified Data Management (UDM) [124] is the network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
[0060] The Application Function (AF) [126] is the network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
[0061] The User Plane Function (UPF) [128] is the network function responsible for handling user data traffic, including packet routing, forwarding, and QoS enforcement.
[0062] The Data Network (DN) [130] refers to the network that provides data services to user equipment (UE) [102] in a telecommunications system. The data services may include but are not limited to Internet services, private data network related services.
[0063] The present disclosure can be implemented on a computing device [200] as shown in FIG. 2. The computing device [200] implements the present disclosure in

accordance with a 5G communication network architecture (as shown in Fig. 1). FIG. 2 illustrates an exemplary block diagram of the computing device [200] (also referred to herein as a computer system [200]) upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure. In an implementation, the computing device [200] may also implement a method for dynamically enriching summary logs of one or more sessions utilising the system. In another implementation, the computing device [200] itself implements the method for dynamically enriching summary logs of one or more sessions using one or more units configured within the computing device [200], wherein said one or more units are capable of implementing the features as disclosed in the present disclosure.
[0064] The computing device [200] may include a bus [202] or other communication mechanism for communicating information, and a hardware processor [204] coupled with bus [202] for processing information. The hardware processor [204] may be, for example, a general-purpose microprocessor. The computing device [200] may also include a main memory [206], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [202] for storing information and instructions to be executed by the processor [204]. The main memory [206] also may be used for storing temporary variables or other intermediate information during execution of the instructions to be executed by the processor [204]. Such instructions, when stored in non-transitory storage media accessible to the processor [204], render the computing device [200] into a special-purpose machine that is customized to perform the operations specified in the instructions. The computing device [200] further includes a read only memory (ROM) [208] or other static storage device coupled to the bus [202] for storing static information and instructions for the processor [204].
[0065] A storage device [210], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [202] for storing information and instructions. The computing device [200] may be coupled via the bus [202] to a

display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [214], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the bus [202] for communicating information and command selections to the processor [204]. Another type of user input device may be a cursor controller [216], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [204], and for controlling cursor movement on the display [212]. The input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow the device to specify positions in a plane.
[0066] The computing device [200] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware, and/or program logic which in combination with the computing device [200] causes or programs the computing device [200] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computing device [200] in response to the processor [204] executing one or more sequences of one or more instructions contained in the main memory [206]. Such instructions may be read into the main memory [206] from another storage medium, such as the storage device [210]. Execution of the sequences of instructions contained in the main memory [206] causes the processor [204] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions.
[0067] The computing device [200] also may include a communication interface [218] coupled to the bus [202]. The communication interface [218] provides a two-way data communication coupling to a network link [220] that is connected to a local network [222]. For example, the communication interface [218] may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or

a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [218] may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the communication interface [218] sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information.
[0068] The computing device [200] can send messages and receive data, including program code, through the network(s), the network link [220] and the communication interface [218]. In the Internet example, a server [230] might transmit a requested code for an application program through the Internet [228], the ISP [226], the host [224], the local network [222] and the communication interface [218]. The received code may be executed by the processor [204] as it is received, and/or stored in the storage device [210], or other non-volatile storage for later execution.
[0069] The present disclosure is implemented by a system [300] (as shown in FIG. 3). The computing device [200] (as shown in FIG. 2) may include said system [300]. In an implementation, the computing device [200] may be connected to the system [300] to perform the present disclosure.
[0070] Referring to FIG. 3, an exemplary block diagram of the system [300] for dynamically enriching summary logs of one or more sessions, is shown, in accordance with the exemplary implementations of the present disclosure. The system [300] comprises at least one transceiver unit [302], at least one conductor unit [304], at least one normaliser unit [306], at least one first database [308], and at least one second database [310]. Also, all the components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system should also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown, however,

the system [300] may comprise multiple such units or the system [300] may comprise any such numbers of said units, as required to implement the features of the present disclosure. The system [300] may be connected to at least one base station [300B] in the 5G communication network. In an implementation, the base station [300B] may include the second database [310]. Further, in an implementation, the system [300] may be present in a user device/ user equipment (may also referred herein as a UE) to implement the features of the present disclosure. The system [300] may be a part of the user device / or may be independent of but in communication with the user device. In another implementation, the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity and partly in the user device.
[0071] The system [300] is configured for dynamically enriching summary logs of one or more sessions, with the help of the interconnection between the components/units of the system [300].
[0072] The transceiver unit [302] is configured to receive, an encoded summary log data of the one or more sessions (i.e., hexadecimal data), wherein each session of the one or more sessions is one of a call session and a data exchange session. In an exemplary aspect of the present disclosure, the encoded summary log data of the one or more sessions is created at the base station [300B] after termination of the session. In an exemplary aspect of the present disclosure, the second database [310] is configured to store the encoded summary log data.
[0073] The conductor unit [304] connected to at least the transceiver unit [302], the conductor unit [304] is configured to decode the encoded summary log data, to generate a decoded summary log data.
[0074] The normaliser unit [306] connected to at least the conductor unit [304], the normaliser unit [306] configured to dynamically implement a set of user-defined

enrichment policies on the decoded data to generate an enriched data. It is to be noted that the set of user-defined enrichment policies involves the process of policy provisioning through a user interface (UI). This may include operations such as but not limited to substring, concatenation, split, fields on which the operation is to be performed and the enriched fieldname (derived field) and its data type. This set of user-defined enrichment policies support the enriching data while the data flows through the system [300]. It is to be noted that the enrichment policies may also be based upon enrichment of data by mapping said data with a key, where key is a unique identifier associated with date fields or derived data fields. It is further noted that the enriched data refers to a data having proper context and correct information (as opposed to raw data). In an exemplary aspect of the present disclosure, the normaliser unit [306] is further configured to cause the system [300] to generate a subsequent summary log data of one or more subsequent sessions based on the user-defined enrichment policies.
[0075] The first database [308] connected to at least the normaliser unit [306], the first database [308] is configured to store the enriched data. In an exemplary aspect of the present disclosure, the first database [308] is configured to store the decoded summary log data, wherein the decoded summary log data comprises at least one of a subscriber identity information (SIM), geographical information, and a device identity information. It is to be noted that the device identity information includes but not limited to TAC code for device, make, model, chipset, vendor details, etc.
[0076] Referring to FIG. 4, an exemplary method flow diagram [400] for dynamically enriching summary logs of one or more sessions, in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [300]. Further, in an implementation, the system [300] may be present in a server device to implement the features of the present disclosure. Also, as shown in FIG. 4, the method [400] starts at step [402].

[0077] At step [404], the method [400] comprises receiving, by a transceiver unit [302], an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session. In an exemplary aspect of the present disclosure, the method [400] further comprises storing, in a second database [310], the encoded summary log data. In an exemplary aspect of the present disclosure, in the disclosed method [400], the encoded summary log data of the one or more sessions is created at a base station [300B] after termination of the session.
[0078] At step [406], the method [400] comprises decoding, by a conductor unit [304], the encoded summary log data, to generate a decoded summary log data. In an exemplary aspect of the present disclosure, the method [400] further comprises storing, in the first database [308], the decoded summary log data, wherein the decoded summary log data comprises at least one of a subscribe identity information (SIM) and a device identity information. It is to be noted that the device identity information includes but not limited to TAC code for device, make, model, chipset, vendor details, etc.
[0079] At step [408], the method [400] comprises dynamically implementing, by a normaliser unit [306], a set of user-defined enrichment policies on the decoded data to generate an enriched data. It is to be noted that the set of user-defined enrichment policies involves the process of policy provisioning through a user interface (UI). This may include operations such as but not limited to substring, concatenation, split, fields on which the operation is to be performed and the enriched fieldname (derived field) and its data type. This set of user-defined enrichment policies support enriching data while the data flows through the system [300]. It is to be noted that the enrichment policies may also be based upon enrichment of data by mapping said data with a key, where key is a unique identifier associated with date fields or derived data fields. It is further noted that the enriched data refers to a data having proper context and correct information (as opposed to raw data).

[0080] At step [410], the method [400] comprises storing, in a first database [308], the enriched data.
[0081] Thereafter, the method [400] terminates at step [412].
[0082] In an exemplary aspect of the present disclosure, the method [400] further comprises generating, by the normaliser unit [306], a subsequent summary log data of one or more subsequent sessions based on the user-defined enrichment policies.
[0083] Referring to FIG. 5, an exemplary block diagram of a system [500] for dynamically enriching the summary logs [or the New Radio Session Log (NRSL)] hex data comprising a call session(s) or a data exchange session(s), is shown, in accordance with the exemplary embodiments of the present disclosure. The system [500] is another instance/ implementation of the system [300] (as shown in FIG. 3) for implementation of the present disclosure. The system [500] comprises at least one processing unit [502], at least one storage unit [504], at least one user interface [506] and at least one normaliser unit [514]. It may be noted that the term “storage unit” and the term “memory unit” may be construed as referring to a same entity and may be used interchangeably throughout the specification. Also, all of the components/ units of the system [500] are assumed to be connected to each other unless otherwise indicated below. Also, in Fig. 5 only a few units are shown, however, the system [500] may comprise multiple such units or the system [500] may comprise any such numbers of said units, as required to implement the features of the present disclosure. Further, in an implementation, the system [500] may be present in a user device/ user equipment (also referred to as UE) to implement the features of the present disclosure. The system [500] may be a part of the user device / or may be independent of but in communication with the user device. In another implementation, the system [500] may reside in a server or a network entity. In yet another implementation, the system [500] may reside partly in the server/ network entity and partly in the user device.

[0084] The system [500] is configured for dynamically enriching the summary logs of call sessions or data exchange sessions, with the help of the interconnection between the components/units of the system [500].
[0085] In order to dynamically enrich the summary logs of call sessions or data exchange sessions, the processing unit [502] of the system [500] is configured to receive data from the base station [300B] (as shown in FIG. 3) that the user device is connected with. The processing unit [502] may be in the form of, or be implemented in, the server. In operation, when the user device connects with the base station [300B] (e.g., gNodeB) and registers itself with the same for establishing a call session or a data exchange session, the flow of data takes place after successful establishment of the session. With the successful establishment of the call session or a data exchange session, the creation of NRSL hex data is initiated. Finally, when the call session or the data exchange session ends, the NRSL hex data is created. This NRSL hex data is received by the processing unit [502]. In an embodiment, the summary log data in the form of NRSL hex data, is communicated from base stations [300B] (e.g., gNodeBs) to the probing entity [508] and is then transferred from the probing entity [508] to the processing unit [502].
[0086] The processing unit [502] is also configured to encode summary log hex data to generate an encoded summary log hex data.
[0087] The user-connected base station refers to the base station [300B] with which the user device is connected. From the user device, the user-connected base station is configured to receive a radio resource control (RRC) setup request while the processing unit [502] creates the summary log hex data of the session after termination of the session. After the receiving of the RRC setup request by the user-connected base station, the processing unit [502] is also configured to set-up the radio resource control. The processing unit [502] is also configured to receive a trace reference, and a trace recording session reference information from the user-connected base station.

[0088] The processing unit [502] is also configured to enrich the summary log hex data of the call session or the data exchange session based at least on the trace reference, and the trace recording session reference information. The user-connected base station is configured to communicate the encoded summary log hex data to a probing unit [508]. The probing unit [508] is configured to send the encoded summary log hex data to a conductor unit [512]. The conductor unit [512] is configured to decode the encoded summary log hex data in order to generate decoded summary log data. The conductor unit [512] is also configured to store an information extracted from decoded summary log data in a first database [510]. It is to be noted that the information comprises at least one of the sim identity information, geographical information, and the device identity information. The system [500] also comprises a normaliser unit [514] which is configured to receive the decoded data from the first database [510]. The normaliser unit [514] is also configured to implement a set of policies on the decoded data received from the first database [510] in order to generate a processed data. The normaliser unit [514] is also configured to store the processed data in a second database [518].
[0089] In an embodiment, the NRSL hex data may be stored in a storage unit [504] that is configured to store a data of any form.
[0090] Further, the data in the NRSL hex data is sent to the first database [510] which then sends the data to the conductor unit [512]. The conductor unit [512] is configured to decode the data from the NRSL hex data and send back the decoded data to the first database [510]. In an embodiment, the storage unit [504] and the first database [510] or the second database [518] may be a same entity, while in another embodiment, the storage unit [504] and the first database [510] or the second database [518] are different entities. The decoded data is sent from the second database [510] to the normaliser unit [514]. At the normaliser unit [514], policies related to the field of the NRSL hex data are defined. The policies may be defined in the system [500] via a user interface [506].

[0091] Once the policies are defined at the normaliser unit [514] in the system [500], via the user interface [506], the software program for introducing changes in the field of summary log data is automatically updated by the Probing unit [508]. For example, a policy is run which includes introducing an operation of concatenation of two static fields “A” and “B” in the data of the NSRL hex data and then introducing another field “C” reflecting the concatenation of the field “A” and field “B” of the data. For this purpose, the policies are introduced via the user interface [506] and the changes are reflected in the output without making manual changes in the existing software codes and/or without developing any new software module for the same.
[0092] Referring to FIG. 6, it illustrates an exemplary system [600] architecture, for dynamically enriching summary logs of one or more sessions, in accordance with exemplary embodiments of the present disclosure. The system [600] is an instance of the system [300] (as shown in FIG. 3) for implementation of the present disclosure.
[0093] The NRSL data flows from gNB [602], [604] and [606] to a Trace Collection Engine (TCE) solution over Transmission Control Protocol (TCP). The TCE may be a probing [608]. The probing [608] receives a set of instructions for decoding of the NRSL data. The NRSL data may be segregated on the basis of the session type, data type and size of one or more data and the data is sent to a message broker [610]. The message broker [610] parses the segregated data byte by byte on the basis of size and type of message and sends it to a conductor [612] for decoding. The conductor [612], on successful decoding, again sends back the decoded data back to the message broker [610]. The successfully decoded data is then further sent to a normaliser [614] to standardize the data and an AIDR writer [618] to automatically detect and respond to network incidents, anomalies, or security threats in real-time. The data from the AIDR writer [618] gets stored in an ingestion layer [620] which further goes to a distributed file system [632]. The data from the

normaliser [614] is sent to a Graphical User Interface (GUI) [636] for end-users to access, configure, monitor, and manage the data in the network. The data further passes through a workflow [616] to enhance the efficiency and smooth operation across functions. The data from the workflow [616] then goes to a computation engine [630] to analyse and process the received large volume of data, which is further sent to distributed file system [632]. The data gets stored in a database [622]. The stored data then goes through artificial intelligence (AI)/ machine learning (ML) algorithms [624]. The data is then sent to the distributed file system [632]. The data from the distributed file system [632] is sent to a computation layer [634], wherein the data is processed, analysed, fraud detection and predictive maintenance of the data.
[0094] Referring to FIG. 7, it illustrates exemplary method [700] flow, indicating the process for dynamically enriching summary logs of one or more sessions, in accordance with exemplary embodiments of the present disclosure. The system [300], along with its instance i.e., the system [600] (as shown in FIG. 6) are used to implementation said process. The process encompasses:
- Step (S1) of providing enrichment policies, by a user interface [701]. These enrichment policies are then fed to a normaliser [702].
- Step (S2) of enriching, by the normaliser [702], the data polled by a message broker [703], for a session.
- Step (S3) of sending the enriched data to a database [704].
[0095] It is to be noted that the changes due to the enrichment policies are then reflected in the output without having to make changes in the existing code or make a new module.
[0096] The present disclosure further discloses a non-transitory computer readable storage medium storing instructions for dynamically enriching summary logs of one or more sessions, the instructions include executable code which, when executed by a one or more units of a system, causes: a transceiver unit [302] to receive an

encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session; a conductor unit [304] to decode the encoded summary log data, to generate a decoded summary log data; a normaliser unit [306] to dynamically implement a set of user-defined enrichment policies on the decoded data to generate an enriched data; and a first database [308] to store the enriched data.
[0097] The present disclosure also discloses a user equipment (UE) for dynamically enriching summary logs of one or more sessions. The UE is being configured to receive, via a selection unit, at least one of one or more operations to be performed on one or more fields of a decoded summary log data. The UE is further configured to create, via a creation unit, a set of user-defined enrichment policies, based on the received one or more operations.
[0098] As is evident from the above, the present disclosure provides a technically advanced solution for dynamically enriching summary logs of one or more sessions. The present solution thus enriches the summary logs (of call session(s) or data exchange session(s)) without requiring any system downtime, or manual changes that are made in the software program code(s). Also, since the method [400] implemented by the system [300] do not require any manual inputs related to changing the software program codes, the present disclosure provide a cost-effective and more user-friendly way of data enrichment rather than requiring offline and tedious processing. The present disclosure thus provides live data stream enrichment which allows for more immediate and dynamic data analysis, providing real-time insights and improving the overall efficiency of the enrichment process. Thus, once the policy is provisioned via the set of user-defined data enrichment policies, the present disclosure enriches the stream data dynamically and indexes it to the database. With the above-mentioned way of real-time data enrichment, one can enrich the data on the fly and directly index it in the database. This functionality is particularly crucial when there is a need to send enriched data to multiple nodes or services, such as databases and other analytic tools, in real time in the network.

By enriching the data in real time, one can ensure the most up-to-date and enriched information being readily available for immediate use across various systems and services.
[0099] While considerable emphasis has been placed herein on the disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations without departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.

We Claim:
1. A method [400] for dynamically enriching summary logs of one or more
sessions, the method [400] comprising:
- receiving, by a transceiver unit [302], an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session;
- decoding, by a conductor unit [304], the encoded summary log data, to generate a decoded summary log data;
- dynamically implementing, by a normaliser unit [306], a set of user-defined enrichment policies on the decoded summary log data to generate an enriched data; and
- storing, in a first database [308], the enriched data.

2. The method [400] as claimed in claim 1, wherein the encoded summary log data of the one or more sessions is created at a base station [300B] after termination of a session.
3. The method [400] as claimed in claim 1, further comprising:
- storing, in a second database [310], the encoded summary log data.
4. The method [400] as claimed in claim 1, further comprising:
- storing, in the first database [308], the decoded summary log data,
wherein the decoded summary log data comprises at least one of a
subscribe identity information (SIM) information and a device identity
information.
5. The method [400] as claimed in claim 1, wherein the method [400] further
comprising:
- generating, by the normaliser unit [306], a subsequent summary log data
of one or more subsequent sessions based on the user-defined
enrichment policies.
6. A system [300] for dynamically enriching summary logs of one or more
sessions, the system [300] comprising:

- a transceiver unit [302] configured to receive, an encoded summary log data of the one or more sessions, wherein each session of the one or more sessions is one of a call session and a data exchange session;
- a conductor unit [304] connected to at least the transceiver unit [302], the conductor unit [304] configured to:
o decode the encoded summary log data, to generate a decoded summary log data;
- a normaliser unit [306] connected to at least the conductor unit [304],
the normaliser unit [306] configured to:
o dynamically implement a set of user-defined enrichment policies on the decoded summary log data to generate an enriched data; and
- a first database [308] connected to at least the normaliser unit [306], the
first database [308] configured to store the enriched data.
7. The system [300] as claimed in claim 6, wherein the encoded summary log data of the one or more sessions is created at a base station [300B] after termination of a session.
8. The system [300] as claimed in claim 6, wherein a second database [310] is configured to store the encoded summary log data.
9. The system [300] as claimed in claim 6, wherein the first database [310] is configured to store the decoded summary log data, wherein the decoded summary log data comprises at least one of a subscriber identity information (SIM) and a device identity information.
10. The system [300] as claimed in claim 6, wherein the normaliser unit [306] is further configured to cause the system [300] to generate a subsequent summary log data of one or more subsequent sessions based on the user-defined enrichment policies.
11. A user equipment (UE) for dynamically enriching summary logs of one or more sessions, the UE being configured to:

- receive, via a selection unit, at least one of one or more operations to be performed on one or more fields of a decoded summary log data; and
- create, via a creation unit, a set of user-defined enrichment policies, based on the received one or more operations.

Documents

Application Documents

# Name Date
1 202321046798-STATEMENT OF UNDERTAKING (FORM 3) [12-07-2023(online)].pdf 2023-07-12
2 202321046798-PROVISIONAL SPECIFICATION [12-07-2023(online)].pdf 2023-07-12
3 202321046798-FORM 1 [12-07-2023(online)].pdf 2023-07-12
4 202321046798-FIGURE OF ABSTRACT [12-07-2023(online)].pdf 2023-07-12
5 202321046798-DRAWINGS [12-07-2023(online)].pdf 2023-07-12
6 202321046798-FORM-26 [13-09-2023(online)].pdf 2023-09-13
7 202321046798-Proof of Right [23-10-2023(online)].pdf 2023-10-23
8 202321046798-ORIGINAL UR 6(1A) FORM 1 & 26)-011223.pdf 2023-12-08
9 202321046798-ENDORSEMENT BY INVENTORS [01-07-2024(online)].pdf 2024-07-01
10 202321046798-DRAWING [01-07-2024(online)].pdf 2024-07-01
11 202321046798-CORRESPONDENCE-OTHERS [01-07-2024(online)].pdf 2024-07-01
12 202321046798-COMPLETE SPECIFICATION [01-07-2024(online)].pdf 2024-07-01
13 202321046798-FORM 3 [02-08-2024(online)].pdf 2024-08-02
14 Abstract-1.jpg 2024-08-05
15 202321046798-Request Letter-Correspondence [14-08-2024(online)].pdf 2024-08-14
16 202321046798-Power of Attorney [14-08-2024(online)].pdf 2024-08-14
17 202321046798-Form 1 (Submitted on date of filing) [14-08-2024(online)].pdf 2024-08-14
18 202321046798-Covering Letter [14-08-2024(online)].pdf 2024-08-14
19 202321046798-CERTIFIED COPIES TRANSMISSION TO IB [14-08-2024(online)].pdf 2024-08-14
20 202321046798-FORM 18A [11-03-2025(online)].pdf 2025-03-11
21 202321046798-FER.pdf 2025-05-30
22 202321046798-FORM 3 [01-07-2025(online)].pdf 2025-07-01
23 202321046798-FER_SER_REPLY [05-07-2025(online)].pdf 2025-07-05
24 202321046798-US(14)-HearingNotice-(HearingDate-21-11-2025).pdf 2025-11-06
25 202321046798-FORM-26 [17-11-2025(online)].pdf 2025-11-17
26 202321046798-Correspondence to notify the Controller [17-11-2025(online)].pdf 2025-11-17

Search Strategy

1 202321046798_SearchStrategyNew_E_SearchStrategyMatrixE_13-03-2025.pdf
2 202321046798_SearchStrategyAmended_E_search_strategyAE_23-09-2025.pdf