Patent classifications
H04M15/63
SESSION RECOVERY FROM DEDICATED BEARER FAILURE
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.
CALL FLOW SYSTEM AND METHOD FOR USE IN A LEGACY TELECOMMUNICATION SYSTEM
A method of operating a network server, such as a mobile application gateway, connect devices on a cellular or carrier network with individual networks, such as enterprise voice and data networks or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network, such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise.
SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK
A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.
Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.
Mobile computing device having dynamically reconfigurable session initiation protocol (SIP) phone services
An apparatus enables communication between a user device and a communication server. The apparatus receives a device identifier of the user device and determines after searching a device-to-token database that the device identifier is not associated with any device communication token. The apparatus activates a predetermined application on the user device, and thereafter receives a device communication token of the predetermined application. A mapping of the device communication token with the device identifier is stored in the device-to-token database after which a communication account is created for the user device on a communication server. A login credential for the communication account is sent to the user device in a message addressed to the predetermined application and transmitted via a message server. The predetermined application on the user device receives the message, and thereafter automatically logs in to the communication server according to the login credential in the message.
Restricted local operator services for a wireless network
A base station sends, to a wireless device, a system information block (SIB) indicating that restricted local operator services (RLOS) are supported by a public land mobile network, and receives, from the wireless device and based on the SIB indicating support for the RLOS, a preamble. The base station sends a random access response to the preamble and receives at least one first radio resource control (RRC) message comprising a first information element indicating that an RRC connection of the wireless device is for the RLOS and a second information element comprising an attach request message indicating, to a mobility management entity (MME) configured with an RLOS access point name, that an attach request of the wireless device is for the RLOS. The base station sends to the wireless device a second RRC message comprising an attach accept message indicating acceptance of the RLOS by the MME.
Trigger management for roaming calls in IMS networks
An IP Multimedia Subsystem Service Control Point (IMS-SCP) module of a carrier network may provide trigger management for a request for a circuit switched (CS) call. For example, an IMS-SCP module may receive an request for a CS call associated with a user equipment. The IMS-SCP module may determine handling of the request for the CS call includes one or more first operations by a first feature platform and one or more second operations by a second feature platform. In response to the determining, the IMS-SCP module may perform trigger management associated with the request for the CS call. The trigger management may include invoking, by the IMS-SCP module, the one or more first operations of the first feature platform and, subsequent to the invoking the one or more first operations, invoking the one or more second operations of the second feature platform.
CALL ALERT DEVICE, CALL ALERT SYSTEM, CALL ALERT METHOD, AND CALL ALERT PROGRAM
When an SIP server receives a call signal addressed to a callee side terminal, the SIP server transmits a warning signal to the callee side terminal before transmitting the call signal to the callee side terminal when an international call identifier indicating that the call signal passes through a foreign country is set in the call signal. In addition, when the SIP server receives the call signal addressed to the callee side terminal, the SIP server includes a warning that the caller number is disguised in a warning signal when an international call identifier indicating that the call signal passes through a foreign country is set in the call signal and the caller number of the call signal is a number from a country in which the callee side terminal is located.
Device failure influence range grasping apparatus, device failure influence range grasping method, and program
Provided are an apparatus failure influence range recognition apparatus, an apparatus failure influence range recognition method, and a program capable of billing for a proper call charge for a call suspected of non-provision of a service. An apparatus failure influence range recognition apparatus includes a reception unit configured to receive apparatus failure information which is failure information of an element constituting a network, user information which is information regarding a user of a service, and call details information of an IP telephone, and a calculation unit configured to calculate, by linking the apparatus failure information, the user information, and the call details information with each other, a subtracted call charge with respect to a call charge for a suspected call influenced by an apparatus failure.
Session recovery from dedicated bearer failure
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.