Patent classifications
H04L61/4557
CROSS NETWORK RICH COMMUNICATIONS SERVICES CONTENT
When a Rich Communications Services (RCS) data file is to be provided to a terminating user equipment (UE) that is on a different mobile communications network than an originating UE, the network address, or uniform resource locator (URL), of the RCS data file may be modified to indicate that the RCS data file is to traverse a network-to-network interface (NNI). An RCS system on the originating mobile communications network may identify if the terminating UE is on the same or different mobile communications network. If the terminating UE is on a different mobile communications network, then the RCS system may modify the URL to indicate the originating and terminating mobile communications networks and send the URL to an RCS system of the terminating mobile communications network. The modified URL enables retrieval of the RCS data file network by a content system of the terminating mobile communications network.
CALL CENTER MOBILE MESSAGING
A method and system enables communications with a call center via SMS/MMS and provides an additional communications channel to communicate with the call center in addition to voice, Internet email/IM chat and fax. The call center obtains location information and images from a customer using SMS messages and web pages via a messaging hub.
Enabling Internet Protocol Carrier Peering to Foreign Network Domains
Concepts and technologies pertaining to enabling internet protocol carrier peering to foreign network domains are provided. A method includes identifying, by a computer system executing within an originating carrier network, a plurality of numbering plan area identifiers corresponding to a receiving carrier network. The method further includes accessing, by the computer system executing within the originating carrier network based on the plurality of numbering plan area identifiers, a plurality of numbering plan area zone file records stored on a private enabled telephone number mapping server. The method also includes creating, by the computer system executing within the originating carrier network, a single instance of a name authority pointer record placeholder within each of the plurality of numbering plan area zone file records stored on the private enabled telephone number mapping server.
Systems for verifying identities of parties participating in distributed network communication
Verification of the identities of parties participating in network-based communication, such as telephone communication, including SMS/text communication, email communication and the like is provided. Communication identifiers (IDs) (e.g., telephone numbers, email addresses or the like) are verified as being associated with one or more communication parties and, in response, a verified communication (ID) database is established. The verified communication ID database is relied upon when a user/communication is selecting a communication ID as an address for an impending communication or receiving a communication for determining whether the communication ID is verifiably associated with a known communication party. If the communication ID is determined to be verifiably associated with a known communication party, a visual or audible output may be provided on the user's device or within the communication that indicates that the communication ID is verifiably associated with the known communication party.
Systems for verifying identities of parties participating in distributed network communication
Verification of the identities of parties participating in network-based communication, such as telephone communication, including SMS/text communication, email communication and the like is provided. Communication identifiers (IDs) (e.g., telephone numbers, email addresses or the like) are verified as being associated with one or more communication parties and, in response, a verified communication (ID) database is established. The verified communication ID database is relied upon when a user/communication is selecting a communication ID as an address for an impending communication or receiving a communication for determining whether the communication ID is verifiably associated with a known communication party. If the communication ID is determined to be verifiably associated with a known communication party, a visual or audible output may be provided on the user's device or within the communication that indicates that the communication ID is verifiably associated with the known communication party.
Method and system for sending a message through a secure connection
The method and system enable secure forwarding of a message from a first computer to a second computer via an intermediate computer in a telecommunication network. A message is formed in the first computer or in a computer that is served by the first computer, and in the latter case, sending the message to the first computer. In the first computer, a secure message is then formed by giving the message a unique identity and a destination address. The message is sent from the first computer to the intermediate computer after which the destination address and the unique identity are used to find an address to the second computer. The current destination address is substituted with the found address to the second computer, and the unique identity is substituted with another unique identity. Then the message is forwarded to the second computer.
KEY SYSTEM MODULE FOR SOFTPHONE OR EMBEDDED VOICE APPLICATIONS
Disclosed herein are methods and apparatus for a key system module which enables a presentable key system on devices provisioned with softphone and embedded voice applications. A method includes provisioning a key system module for operation with the softphone to enable the key system, establishing, by the softphone application using a service provider Internet Protocol (IP) telephony server, a non-shared line association with the key system, establishing, by the softphone application using the service provider IP telephony server, associations with key lines in the key system, receiving, from the service provider IP telephony server, key line statuses, generating, by the key system module, a key line user interface based on at least the statuses of the key lines, and presenting, by the softphone application and the key system module on a device associated with the softphone client, the key line user interface with the key lines in the key system.
GATEWAY REGISTRY METHODS AND SYSTEMS
Methods, systems, and apparatuses are described for managing a gateway device. A user may establish an account for managing a gateway device. The account may be assigned to a remote server to allow remote management of the gateway device. The gateway device may be configured by sending the connection information of the remote server to the gateway device.
Enhanced caller information used for nuisance caller management
A system may include one or more of a called device, a calling device, configured to call the called device, and a network module. The network module is configured to process incoming call information of a call placed to the called device and configured to route the call to a destination based on preferences of the called device.
SECURELY BRIDGING ADVERTISING IDENTIFIERS FOR TARGETED ADVERTISING
Aspects of the subject disclosure may include, for example, a mobile device gateway that receives an HTTP POST message including an advertising identifier from a mobile device, determining whether a uniform resource locator of the HTTP POST message is on a list of URLs for data management platforms; and routing the HTTP POST message to the Internet responsive to determining that the URL of the HTTP POST message is not on the list of URLs for data management platforms. Other embodiments are disclosed.