Patent classifications
H04Q3/00
Multiplexing and congestion control
Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.
Position parameterized recursive network architecture with topological addressing
A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
OPTIMIZED SYSTEM AND METHOD FOR NOTIFYING A CALLED PARTY OF A CALL ATTEMPT
A system and method for notifying a called party of a call attempt is provided. The method comprises initiating a communication request by a calling party; routing the communication request to an intelligent network via an mobile service center; validating the communication request by the intelligent network; and handing over the communication request to an intelligent platform by the intelligent network in the event of a nonstandard trigger event such as calling party insufficient balance. The processing of communication request by the intelligent platform includes monitoring number of call attempts, introducing a delay in sending notification, monitoring availability of called party and performing one or more actions based on the delay and the availability of the called party.
SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.
CROSS-DEVICE HANDOFFS
A first computing device may receive an indication of user input that is at least a part of a conversation between a user and a first assistant executing at the first computing device. The first assistant and/or an assistant executing at a digital assistant system may determine whether to handoff the conversation from the first assistant executing at the first computing device to a second assistant executing at a second computing device. In response to determining to handoff the conversation to the second assistant executing at the second computing device, the first assistant and/or the assistant executing at the digital assistant system may send to the second computing device a request to handoff the conversation which includes at least an indication of the conversation.
Toll-free telecommunications and data management platform
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
Systems and methods for communications node upgrade and selection
Implementations described and claimed herein provide systems and methods for intelligent node type selection in a telecommunications network. In one implementation, a customer set is obtained for a communications node in the telecommunications network. The customer set includes an existing customer set and a new customer set. A set of customer events is generated for a node type of the communications node using a simulator. The set of customer events is generated by simulating the customer set over time through a discrete event simulation. An impact of the customer events is modeled for the node type of the communications node. The node type is identified from a plurality of node types for a telecommunications build based on the impact of the customer events for the node type.
METHOD AND SYSTEM FOR CONFIGURING A FEATURE FOR AN ENERGY METER AS LEGALLY IMPORTANT OR LEGALLY NON-IMPORTANT
Methods and systems for access control involve dynamically controlling an access to firmware running a certified feature in an energy meter and a non-certified feature in the energy meter. The access can be based on a bifurcation between the certified feature and the non-certified feature running in the energy meter on one or more of a single microcontroller or a group of different microcontrollers.