Patent classifications
H04M7/0093
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
Message routing using location routing numbers
Various embodiments provide for a way of routing messages using location routing numbers. More specifically, some embodiments can route calls on different legacy networks by using features of existing telecommunication policy and databases. For example, a location routing number can be registered in a number portability administration center database. The location routing number may be in a native number block of a facility carrier and a company registering the location routing number in the number portability administration center database may not be the facility carrier. The destination switch of the facility carrier can be programmed to accept traffic associated with the location routing number. As a result, components of the network can route the message for the company to a destination switch of the facility carrier.
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
MESSAGE ROUTING USING LOCATION ROUTING NUMBERS
Various embodiments provide for a way of routing messages using location routing numbers. More specifically, some embodiments can route calls on different legacy networks by using features of existing telecommunication policy and databases. For example, a location routing number can be registered in a number portability administration center database. The location routing number may be in a native number block of a facility carrier and a company registering the location routing number in the number portability administration center database may not be the facility carrier. The destination switch of the facility carrier can be programmed to accept traffic associated with the location routing number. As a result, components of the network can route the message for the company to a destination switch of the facility carrier.
Method and apparatus for prioritizing voice over internet protocol signaling messages
A method and apparatus for enabling prioritization of signaling messages in a communication network are disclosed. For example, the method receives at least one signaling message, and classifies each of the at least one signaling message. The method schedules each of the at least one signaling message for processing, and discards selectively one or more signaling messages that have been scheduled under an overload condition.
Permanent presence for polite block and confirm
The present invention relates to a method and devices for operating a communication network, in particular a presence SIMPLE network applying polite block and confirm for subscribers to presence data. A method for operating a communication system comprising a presence server and a presence document server is provided, the communication system being adapted to communicate with a first client requesting subscription to the presence data of a presentity using a second client, the method comprising the steps of: sending, in case the subscription is to be confirmed or politely blocked, a request for presence data from the presence server to the presence document server; receiving a message comprising presence data of the presentity from the presence document server; and sending a notification message to the first client based on the received presence data of the presentity.
Systems and methods for coexistence of MBMS and VoIP services
Systems and methods for coexistence of Multimedia Broadcast Multicast Services (MBMS) and Voice over Internet Protocol (VoIP) services are disclosed. In one embodiment, a method of operation of a network node in a cellular communications network is provided. The method includes determining a number of MBMS subframes for an MBMS allocation period. The method also includes, for each MBMS subframe of the number of MBMS subframes, assigning a frame number and a subframe number for the MBMS subframe such that a probability of a VoIP packet transmission during the MBMS subframe is mitigated. By mitigating the probability that a VoIP packet transmission occurs during a scheduled MBMS subframe, a VoIP user equipment (UE) may miss fewer packets and/or experience reduced battery drain.
Message routing using location routing numbers
Various embodiments provide for a way of routing messages using location routing numbers. More specifically, some embodiments can route calls on different legacy networks by using features of existing telecommunication policy and databases. For example, a location routing number can be registered in a number portability administration center database. The location routing number may be in a native number block of a facility carrier and a company registering the location routing number in the number portability administration center database may not be the facility carrier. The destination switch of the facility carrier can be programmed to accept traffic associated with the location routing number. As a result, components of the network can route the message for the company to a destination switch of the facility carrier.
Network node and method of routing messages in an IP-based signaling network
A method of routing messages in an IP-based signaling network is provided. Further, a network node for performing such a routing of messages in an IP-based signaling network is provided. The network node comprises at least two interfaces and a processing unit configured to route an incoming message received at a first of the at least two interfaces to a second interface of the at least two interfaces. Further, a relay network comprising plural of such network nodes as relay nodes is provided.