Patent classifications
H04L65/1033
Segregating VPN traffic based on the originating application
Disclosed are various examples for segregating virtual private network (VPN) traffic based on the originating client application. A network gateway receives network traffic from a tunnel endpoint of an application-specific virtual private network tunnel. The network traffic originates from a client application executed in a client device. The network gateway identifies a particular virtual local area network through which the network traffic is received. The network gateway determines, using an identifier of the particular virtual local area network and a mapping of virtual local area network identifiers, characteristics of the client application or the client device from a set of mobile device management attributes. The network gateway determines whether to route the network traffic to a destination based at least in part on the characteristics.
UNIFIED COMMUNICATION SYSTEM BASED ON MICRO BASE STATION
The present invention disclosed a unified communication system based on micro base station. The system includes: a micro base station subsystem, a landline telephone network subsystem, an office network subsystem and a communication switching subsystem. The communication switching subsystem receives a voice service request from the micro base station subsystem and the landline telephone network subsystem, sends the voice service request to the micro base station subsystem when a called user in the voice service request is a mobile communication intranet user, sends the voice service request to the landline telephone network subsystem when the called user in the voice service request is a landline telephone network user, receives a service request from the micro base station subsystem, and sends the service request to the office network subsystem.
Use of alternate VoIP call-placement service in response to IMS processing failure
A method and system for responding to a processing failure of an Internet Protocol (IP) Multimedia Subsystem (IMS). An example method includes a computing system detecting the processing failure of the IMS and responsively causing one or more user equipment devices (UEs) to forgo using the IMS for voice over IP (VoIP) call placement and to instead use an alternate VoIP calling service for VoIP call placement. For instance, a given UE may be configured by default to use the IMS for VoIP call placement, but the UE may detect an IMS processing failure and may responsively instead make a next VoIP call placement attempt using an alternate VoIP calling service, such as a third party VoIP calling application running on the UE.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
JOINING ONGOING COMMUNICATIONS
A user device may join an ongoing communication of another user device by sending a request to the other user device to join the ongoing communication. The other user device may provide an option for the user of the other device to accept the request. Alternatively, the other user device may automatically add the user device to the ongoing communication or decline to the add the user device to the ongoing communication.
Apparatus and Method For Obtaining Emergency Data and Providing A Map View
A disclosed method includes receiving emergency data related to emergency calls emanating from mobile devices, independently from emergency call routing to an emergency network; determining an emergency network that should receive the emergency data; providing the emergency data to the emergency network; and providing a map view to the emergency network entity of the emergency network using the emergency data and displaying location indicators corresponding to locations of mobile devices identified by the emergency data. Another disclosed method includes receiving emergency data related to emergency calls emanating from mobile devices, independently from emergency call routing to an emergency network; detecting emergency call data received at the emergency network; and providing a map view to an emergency network entity of the emergency network using the emergency data, where the map view displays location indicators corresponding to locations of mobile devices identified by the emergency call data received at the emergency network.
DEVICE BINDING METHOD AND TERMINAL DEVICE
A device binding method is provided. The method includes: a user terminal collects a signal at a collection position, generates a first signal fingerprint, and sends the first signal fingerprint and a corresponding first account to a server. An intelligent terminal collects a signal at a set position, generates a second signal fingerprint, and sends the second signal fingerprint and a corresponding device identifier of the intelligent terminal to the server. The server determines that the second signal fingerprint matches the first signal fingerprint, to determine that the second signal fingerprint corresponds to the first account. The server binds the intelligent terminal to the first account based on a correspondence between the second signal fingerprint and the device identifier of the intelligent terminal.
METHOD AND APPARATUS FOR ROUTING SHORT MESSAGE, AND COMPUTER STORAGE MEDIUM
Disclosed are a method and apparatus for routing a short message and a computer storage medium. The method comprises: a short message service gateway acquires, from a short message service centre, a short message and identifier information of a called UE used for receiving the short message; after the short message service gateway acquires the short message and the identifier information of the called UE, the short message service gateway acquires a short message delivery domain of the called UE corresponding to the identifier information of the called UE by communicating with a short message delivery domain decision device; and the short message service gateway delivers the short message to the called UE according to the short message delivery domain of the called UE.
PROXY-CALL SESSION CONTROL FUNCTION (P-CSCF) SELECTION BY TRAFFIC TYPE
Solutions for providing proxy node (e.g., proxy-call session control function (P-CSCF)) selection by traffic type include: receiving, by a network node (e.g., a packet gateway (PGW)), from a network device (e.g., a user equipment (UE) or internet of things (IoT) device), a first message indicating a request for identification of a proxy node; receiving, by the network node, from the network device, an indication of a first data traffic type; based on at least the indication of the first data traffic type, selecting, by the network node, a first proxy node over a second proxy node to identify to the network device; and transmitting an identification of the first proxy node to the network device. Examples support network slicing and improve wireless priority service (WPS) and enhanced 911 (SECOND DATA TRAFFICE911).