Patent classifications
H04L2101/65
SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND DEVICES IN A CONTROLLED ENVIRONMENT
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
Method and apparatus for zero-touch bulk identity assignment, provisioning and network slice orchestration for massive IOT (MIOT) deployments
In one illustrated example, automated or semi-automated system operations for Massive IoT (MIoT) deployment may involve the automatic assignment of external IDs, subscriber IDs (e.g. IMSIs), and mobile network IDs (e.g. MSISDNs) to IoT devices of a group, followed by the provisioning of assigned identities at the relevant network nodes and the IoT devices themselves. The process may continue seamlessly with network slice orchestration for the creation of a network slice instance (NSI) and the provisioning of its associated Network Slice Selection Assistance Information (NSSAI) and NSI ID at the relevant network nodes. Network Slice Selection Policies (NSSP) may be derived and sent to a policy function and subsequently to IoT devices of the group. Signaling efficiency may be achieved by performing operations on a group basis.
Web real-time voice communication method implemented based on scanning two-dimensional code
The disclosure relates to a method for web real-time voice communication based on two-dimensional code scanning which, even when the called party does not have its own web, can automatically generate a temporary web embedded with a web communication plug-in for the called party by a network voice communication SIP server, and realizes web real-time voice communication based on two-dimensional code scanning. In addition, by using the web real-time voice communication technology, the calling party can communicate with the called party without downloading and installing the client, and the calling party can call and communicate with the called party answering terminal by the web real-time communication SIP server and the network voice communication SIP server, only with the need to scan a two-dimensional code to use the web communication plug-in on the web of the called party or the temporarily generated web.
System and method for enhanced messaging using external identifiers
A network device obtains an External Identifier for a user device. The External identifier includes a <Local Identifier>@<Domain Identifier> format. The network device generates a message, the message including a user identity field for the user device. The user identity field includes the External Identifier. The network device sends, to another network device, the message via an Sh interface.
SYSTEM AND METHOD FOR DE-ANONYMIZING ACTIONS AND MESSAGES ON NETWORKS
A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
Method for requesting transportation services
A method for safely and efficiently requesting transportation services through the use of mobile communications devices capable of geographic location is described. Individual and package transportation may be provided. New customers may be efficiently serviced, and the requester and transportation provider locations may be viewed in real time on the mobile devices.
Method and system for implementing telephone solicitation prevention
Novel tools and techniques are provided for implementing telephone solicitation prevention using enhanced voice over Internet protocol (VoIP) functionalities in conjunction with STIR/SHAKEN protocols. In various embodiments, in response to receiving a call setup message or a call request from a calling party, a call server might send a verification request to a secure telephone identity (STI) verification server (VS). The STI-VS might verify and send the call setup message to a no solicitation application server, which might instruct a media server to connect to a first gateway device and to play a no solicitation message requesting a response from the calling party, and which might verify whether the response is an appropriate response. If so, a call is established. If not, the call might be disconnected and/or forwarded to a voicemail server to play a voicemail message to the calling party in accordance with preferences of the called party.
TELEPHONE NUMBER PLATFORM
A unified platform for managing telephone number (TN) ordering and procurement lifecycles is provided. The unified platform provides or interacts with functionality for reservations, porting, conflict checks, testing, and industry notification functionality. An associated graphical user interface provides the functionality to a variety of users including customers, salespeople, and order managers.
SYSTEMS AND METHODS FOR SUGGESTING CONTACTS
An example method of suggesting contacts in a communications routing system includes: routing, via a routing engine, communications events between a communications device and a plurality of further communications devices coupled to the communications routing system as VoIP calls using respective VoIP telephone numbers; storing, for a user account associated with the communications device, a contact database representing VoIP telephone numbers stored in a contact tracking application of the communications device; storing, in the contact database for the user account, a log of communications events including a record for each new telephone number; and when the record for a new telephone number satisfies a threshold condition, providing a prompt, at the communications device, to add the new telephone number to the contact tracking application.
Session control logic with internet protocol (IP)-based routing
Disclosed is an architecture that distributes session control logic across multiple points of a telecommunications network. Also disclosed are techniques and systems using Internet Protocol (IP)-based routing to establish communication sessions. A user equipment (UE) may receive user input to initiate a communication session, derive a destination IP address, generate a session request having at least the destination IP address, and send the session request a server. The server may receive the session request from the UE, replace the destination IP address in the session request with an IP address of an endpoint device to generate a modified session request, and route the modified session request to the endpoint device based at least in part on the IP address of the endpoint device.