Patent classifications
H04M15/63
SYSTEM AND METHOD FOR EXECUTING ORIGINATING SERVICES IN A TERMINATING NETWORK FOR IMS AND NON-IMS APPLICATIONS
A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.
Network slicing awareness in IP multimedia subsystem
A method performed within a communication system comprising a 5G core network and an IP Multimedia Subsystem (IMS) network, where the 5G core network is configured to implement a plurality of virtual core network slices each having a slice identifier. The method comprises assigning one of said virtual core network slices to a User Equipment (UE) at or following registration of said UE with the IMS network, and sending from the UE or the 5G core network, to the IMS network, the slice identifier of the network slice assigned to the UE. The method further comprises receiving the slice identifier within the IMS network and storing in the IMS network a mapping between the UE and the received network slice identifier. The slice identifier is used within the IMS network to provision services to the UE.
System and method for executing originating services in a terminating network for IMS and non-IMS applications
A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.
ESTABLISHING A SESSION INITIATION PROTOCOL SESSION
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
Restricted Local Operator Services for a Wireless Network
A base station sends, to a wireless device, a system information block (SIB) indicating that restricted local operator services (RLOS) are supported by a public land mobile network, and receives, from the wireless device and based on the SIB indicating support for the RLOS, a preamble. The base station sends a random access response to the preamble and receives at least one first radio resource control (RRC) message comprising a first information element indicating that an RRC connection of the wireless device is for the RLOS and a second information element comprising an attach request message indicating, to a mobility management entity (MME) configured with an RLOS access point name, that an attach request of the wireless device is for the RLOS. The base station sends to the wireless device a second RRC message comprising an attach accept message indicating acceptance of the RLOS by the MME.
CHARGING AND COLLECTION FUNCTION IN MICROSERVICES
Various methods for a 3GPP defined Charging and Collection Function are employed that may use a microservices approach. The microservice approach may decompose the function of the network elements into component level functions that may be deployed as separate functional elements.
OPTIMIZATION OF NETWORK RESOURCES
A method for associating partial durations of a voice service session provided via a packet-switched network to parties of the voice service session, wherein the parties comprise a first party and a second party, and wherein dedicated network resources are assigned and/or released intermittently during the voice service session is disclosed. The method comprises invoking, when the voice service session is ongoing, a hold or temporary disconnect of the voice service session by either of the first and second party, storing a Session Description Protocol, (SDP) Offer as negotiated between the first and second party in a storage for a first time duration, and associating, to the party who invoked the hold or temporary disconnect of the voice service session, an intermediate partial duration of the voice service session that starts when the hold or temporary disconnect of the voice service session was invoked.
Methods, systems and computer program products for determining root causes of detected anomalies in a telecommunications network
Methods for determining a cause of a detected anomalous event in a telecommunications system are provided. The methods include detecting an anomalous event in the telecommunications system and retrieving relevant call detail record (CDR) data associated with the detected anomalous event for at least one identified time interval responsive to detecting the anomalous event. The relevant CDR data includes both current CDR data for the at least one identified time interval and historical CDR data for past intervals corresponding to the at least one identified time interval. The relevant CDR data including the current CDR data and the historical CDR data is preprocessed and the preprocessed relevant CDR data is processed to determine a root cause of the detected anomalous event. Processing the preprocessed relevant CDR data includes comparing the current CDR data and the historical CDR data to determine the root cause of the detected anomalous event.
Call flow system and method for use in a legacy telecommunication system
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
ZERO CHARGE SYSTEMS AND METHODS FOR PACKET-SWITCHED TELEPHONY
Asynchronous and/or synchronous telephony protocol systems and methods may include an asynchronous signaling node (ASN) and/or a call duration time quota from a charging onset to place and complete a call based on a first device call request as received from a first user mobile device on a packet switched network. The asynchronous systems include instructions to automatically modify the telephony address with a prefix and destination address when the first device has insufficient or independent balance or upon a network exception; route the modified call signal to the ASN; and deliver and automatically disconnect the call when the call is completed. The synchronous systems are balance-independent and include instructions to automatically set the call duration time quota upon such exception, and deliver and automatically disconnect the call from the second user telephony device when the call is completed or when the call duration time quota is exceeded.