Patent classifications
H04L61/4588
Mobile electronic communications using internet protocol
A database stores unique associations between account identifiers and mobile-network telephone numbers assigned by a mobile network to mobile communications devices. The account identifiers are also associated with voice-over-IP (VoIP) telephone numbers. Voice calls between the mobile communications devices are made as voice-over-IP (VoIP) calls using respective VoIP telephone numbers. Tracking of the VoIP calls is performed through the mobile network using respective mobile-network telephone numbers, so that a prepaid balance can be enforced.
Mobile electronic communications using internet protocol
A database stores unique associations between account identifiers and mobile-network telephone numbers assigned by a mobile network to mobile communications devices. The account identifiers are also associated with voice-over-IP (VoIP) telephone numbers. Voice calls between the mobile communications devices are made as voice-over-IP (VoIP) calls using respective VoIP telephone numbers. Tracking of the VoIP calls is performed through the mobile network using respective mobile-network telephone numbers, so that a prepaid balance can be enforced.
METHOD FOR ESTABLISHING A BIDIRECTIONAL COMMUNICATION CHANNEL BETWEEN A SERVER AND A SECURE ELEMENT, CORRESPONDING SERVERS AND SECURE ELEMENT
The invention concerns a method for establishing a bidirectional communication channel between a server and a secure element cooperating with a terminal in a cellular telecommunication network for exchanging data and commands, the method comprising: a—Sending a first attachment request signaling message from the terminal to the server, the first message comprising a MCC and a MNC of the server, and at least a part of a unique identifier of the secure element, the server being provisioned with the unique identifier; b—Sending from the server to the secure element, in at least a firstsignaling message: At least a command; A correlation identifier if further messages have to be sent from the secure element to the server; A first payload comprising data; c—Executing at the secure element the command.
Receiver directed anonymization of identifier flows in identity enabled networks
A method implemented by a receiving host entity comprises transmitting, by a transmitter of the receiving host entity, an anonymized identifier of the receiving host entity, wherein the anonymized identifier is a temporary and recyclable identifier identifying the receiving host entity, and receiving, by a receiver of the receiving host entity, a data packet from a sending host entity, wherein the data packet includes the anonymized identifier.
CALLER IDENTIFIER
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server, a request to initiate a telephone call between a calling phone and a callee phone, wherein the request includes a telephone number of the calling phone. The actions further include determining, by the server, a name that corresponds to the telephone number. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include, based on the calling history that indicates previous telephone calls of the phone number, determining, by the server, whether to generate a notification that includes the name that corresponds to the telephone number.
CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES
An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.
Method for querying and for subscribing PCF binding events for an address range in a 5G system
A 5G system (5GS) includes a Network Function (NF) Service Consumer and a functional entity, wherein the functional entity includes binding information stored therein and the binding information includes: Protocol Data Unit (PDU) sessions information and a list comprising one or more subscribers identities (IDs) and/or Policy Control Function (PCF) instance IDs. A method for querying PCF binding information for an address range in the 5GS includes: querying, from the NF Service Consumer to the functional entity, based on one or a combination of query parameters, for all binding information matching the query parameters; and notifying, from the functional entity to the NF Service Consumer, any binding information that matches the query parameters.
Methods, systems, and devices for registering a communication device utilizing a virtual network
Aspects of the subject disclosure may include, for example, a system that registers a communication device with a temporary IMSI shared among multiple communication devices with a virtual registration function. Further, the system provisions an active IMSI using a virtual Over-the-Air (OTA) function onto the communication device and indicates to the communication device to register with a registration function using the active IMSI. Other embodiments are disclosed.
DATA TRANSMISSION SYSTEM AND METHOD FOR EDGE COMPUTING AND COMPUTER READABLE MEDIUM THEREOF
A data transmission system and method thereof for edge computing are provided. A terminal mobile station international subscriber directory number (MSISDN) and a terminal IP of a target terminal are obtained with a domain name system (DNS) by a device providing communication services from the data transmission system. After data packets are sent to the data transmission system, if the target terminal is in an idle mode, a paging message is sent by a terminal wake-up module to enable the target terminal to return to a connected mode for communication. Before a connection is established between the data transmission system and the target terminal, downlink data packets can be temporarily stored, and the packets can be sent after the target terminal is in the connected mode. A computer readable medium for executing the data transmission method is also provided.
Caller identifier
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server, a request to initiate a telephone call between a calling phone and a callee phone, wherein the request includes a telephone number of the calling phone. The actions further include determining, by the server, a name that corresponds to the telephone number. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include, based on the calling history that indicates previous telephone calls of the phone number, determining, by the server, whether to generate a notification that includes the name that corresponds to the telephone number.