PROCESSING SMS MESSAGES
20190230220 ยท 2019-07-25
Inventors
Cpc classification
H04M7/0081
ELECTRICITY
H04M3/42246
ELECTRICITY
H04L51/48
ELECTRICITY
H04L51/42
ELECTRICITY
H04W4/14
ELECTRICITY
International classification
H04M3/42
ELECTRICITY
H04M7/00
ELECTRICITY
Abstract
A first telephony identifier and a second telephony identifier are used for communication with a first, multi-identity user. Each of the first and second telephony identifiers are configured for use as different destination addresses in different SMS messages sent to the first user. At least one SMS message is processed in SMS processing equipment in the network, and the SMS processing equipment performs identity management, in relation to the use of the first and second telephony identifiers for the first user, during processing of the at least one SMS message.
Claims
1. A method for processing communications in a telephony network, the method comprising: processing at least one SMS message in SMS processing equipment in the telephony network, wherein first and second telephony identifiers are associated with a first, multi-identity user, and wherein each of the first and second telephony identifiers is useable as a destination address in an SMS message sent to the first user; and performing identity management, in relation to the use of the first and second telephony identifiers for the first user, during said processing of the at least one SMS message at the SMS processing equipment, wherein said performing said identity management comprises: accessing stored data indicative of an association between at least one characteristic derivable from an SMS message and at least one of the first and second telephony identifiers; and selecting one of the first telephony identifier and the second telephony identifier on the basis of the stored data, wherein the telephony network comprises a circuit-switched core, a packet-switched core and gateway equipment connecting the circuit-switched core and the packet-switched core, wherein the gateway equipment implements transport layer interworking for SMS messages transmitted between the packet-switched core and the circuit-switched core, and wherein the identity management is performed at the gateway equipment.
2. The method of claim 1, wherein the SMS processing equipment comprises an IP Short Message Gateway (IP-SM-GW).
3. The method of claim 1, wherein the first and second telephony identifiers are each MSISDNs.
4. The method of claim 1, wherein said processing at least one SMS message at the SMS processing equipment comprises: receiving a mobile-originating SMS message from the first user; deriving a said characteristic from the mobile-originating SMS message; selecting one of the first telephony identifier and the second telephony identifier on the basis of the derived characteristic and the stored data; and transmitting an outgoing SMS message, the outgoing SMS message including an originating address comprising the selected telephony identifier.
5. The method of claim 4, wherein the derived characteristic is a third telephony identifier derived from a destination address of the mobile-originating SMS message, the third telephony identifier being an identifier for a second user, and wherein said selecting comprises, when the stored data is indicative of an association between the second telephony identifier and the third telephony identifier, selecting the second telephony identifier as the selected telephony identifier.
6. The method according of claim 5, wherein the stored data comprises communication data relating to the first user, the communication data comprising data indicative of one or more previous communications involving use of the second telephony identifier and the third telephony identifier.
7. The method of claim 6, wherein the communication data comprises data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier and the third telephony identifier as telephony party identifiers.
8. The method of claim 7, wherein the communication data comprises data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier as a called party identifier and the third telephony identifier as a calling party identifier.
9. The method of claim 7, wherein the communication data comprises data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier as a calling party identifier and the third telephony identifier as a called party identifier.
10. The method of claim 6, wherein the communication data is indicative of one or more previous SMS messages involving use of the second telephony identifier as a destination address and the third telephony identifier as an originating address.
11. The method of claim 10, wherein said processing the at least one SMS message at the SMS processing equipment comprises receiving an incoming SMS message, the incoming SMS message comprising the second telephony identifier as a destination address, and wherein said performing said identity management comprises: delivering the incoming SMS message to the first user and updating the communication data on the basis of the incoming SMS message.
12. The method of claim 6, wherein the method further comprises processing voice and/or video calls using call processing equipment in the telephony network, the call processing including: receiving incoming call establishment signalling, the incoming call establishment signalling including the second telephony identifier and the third telephony identifier as telephony party identifiers; and performing call-based identity management, during processing of the incoming call establishment signalling at the call processing equipment, comprising establishing a call and updating a call-related part of the communication data on the basis of the incoming call establishment signalling.
13. The method of claim 12, wherein the incoming call establishment signalling comprises the second telephony identifier as a called party identifier and the third telephony identifier as a calling party identifier, and wherein said performing call-based identity management comprises: establishing a call to the first user; and updating the call-related part of the communication data on the basis of the incoming call establishment signalling.
14. The method of claim 12, wherein the incoming call establishment signalling comprises the second telephony identifier as a calling party identifier and the third telephony identifier as a called party identifier, and wherein said performing call-based identity management comprises: establishing a call to the second user; and updating the call-related part of the communication data on the basis of the incoming call establishment signalling.
15. The method of claim 6, wherein the method further comprises processing MMS messages using MMS processing equipment in the telephony network, the MMS message processing including: processing an incoming MMS message at the MMS message processing equipment, the incoming MMS message including the second telephony identifier and the third telephony identifier as one of a destination address and an originating address, respectively; and performing MMS-based identity management, during processing of the incoming MMS message at the MMS message processing equipment, comprising transmitting an MMS message to the first user, or the second user, and updating an MMS-related part of the communication data on the basis of the incoming MMS message.
16. The method of claim 1, comprising: receiving a further SMS message from the first user; selecting to use the first telephony identifier for the first user instead of the second telephony identifier; and transmitting an outgoing SMS message, the outgoing SMS message including an originating address, the originating address comprising the first telephony identifier.
17. The method of claim 1, wherein the telephony network comprises an Internet Protocol Multimedia Subsystem (IMS) core.
18. Apparatus configured to perform the method of claim 1.
19. A computer program arranged, when executed, to perform the method of claim 1.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0010]
[0011]
DETAILED DESCRIPTION OF CERTAIN INVENTIVE EMBODIMENTS
[0012] A telephony network (also referred to as a telephone network) is a type of telecommunications network in which telephony services including voice calls (also referred to as telephone calls or calls), video calls and messaging services can be provided and such telephony services can be conducted between two or more users of the telephony network. Such users may be known as entities, parties, subscribers or end users.
[0013] In the example shown in
[0014] The IP-SM-GW 26 may be SMS processing equipment which operates according to the 3GPP standards, inter alia 3GPP TS 24.341. The IP-SM-GW may implement transport-layer interworking for SMS messages transmitted between the CS core 4 and the PS core 6, for example according to the GSMA IR.92 version 9.0 specification. In this example, the IP-SM-GW 26 is a Metaswitch Sentinel IP-SM-GW.
[0015] In this example, the PS core network 6 is an Internet Protocol Multimedia Subsystem (IMS) core network.
[0016] The first and second user equipment 12, 14 and/or the SMS processing equipment may comprise one or more processors and one or more memories. One or more computer programs comprising computer-readable instructions may be stored in the one or more memories. The one or more processors may be configured to execute the computer-readable instructions and perform at least some of the methods and techniques described herein as result.
[0017] In the examples described herein, the first and second user equipment 12, 14 are both user equipment (also referred to as endpoints, endpoint devices and subscriber devices), it being understood that one or both of the first and second user equipment 12, 14 may not be user devices. An example of a user equipment that is not a user device is a voicemail server. User equipment are used by users of the telephony network and may take various different forms. Examples of user equipment include, but are not limited to, mobile (also referred to as cellular) telephones, including smartphones and feature phones, tablet computing devices, laptop computing devices, desktop computing devices, in-vehicle entertainment systems and smart watches. In this example, the first user equipment 12 is associated with a first user and the second user equipment 14 is associated with a second, different user. In other examples, the first and second user equipment 12, 14 are associated with the same user.
[0018] In this example, the first user (associated with the first user equipment 12) is a multi-identity user. The first user has multiple identities, including first and second identities. The first user may have more than two identities. For example, the first user may have a first identity and one or more additional identities including, at least, a second identity. The first and second identities are associated with one or more telephony service providers. A telephony service provider provides a telephony service to the first user. Examples of telephony service providers include, but are not limited to, mobile network operators (MNOs) and virtual mobile network operators (VMNOs). The first and second identities of the first user may be associated with different telephony service providers (for example an MNO and a VMNO respectively). Alternatively, the first and second identities of the first user may be associated with the same telephony service provider as each other. The first user may have a first account associated with the first identity and a second account associated with the second identity. Both accounts may be with the same telephony service provider where the same telephony service provider is associated with the first and second identities, or the first account may be associated with the first telephony service provider and the second account may be associated with the second telephony service provider where the first and second accounts are associated with first and second telephony service providers respectively. Examples of telephony identifiers include, but are not limited to, telephone numbers, telephony service usernames and Session Initiation Protocol (SIP) Uniform Resource Indicators (URIs). The first and second accounts may be associated with the same type of telephony service, or may be associated with different types of telephony services. Examples of such telephony services include, but are not limited to, landline telephony services, mobile telephony services, mobile Voice over Internet Protocol (VoIP) telephony services and non-mobile VoIP telephony services.
[0019] The first identity may be a personal identity and the second identity may be a business identity. However, the first and second identities need not be personal and business identities respectively. For example, the first and second identities could both be personal identities, the first and second identities could both be business identities, the first identity may not be a personal identity and the second identity may not be a business identity.
[0020] The first user equipment 12, used by the first user to access the telephony network 2, is associated with a first telephony identifier ID.sub.A and a second telephony identifier ID.sub.B. The second user equipment 14, used by the second user to access the telephony network 2, is associated with a third telephony identifier ID.sub.C. Whilst one is shown connected via the CS core network 4 and another is shown connected via the PS core network 6, either of them may be connected via either network and may dynamically change the radio access they use depending on coverage in a current location of each respective user.
[0021]
[0022] In an example of a method for processing communications in the telephony network 2, the first telephony identifier ID.sub.A and the second telephony identifier ID.sub.B are configured for use as different destination addresses in different SMS messages sent to the first user equipment 12. During processing of at least one SMS message at the SMS processing equipment, identity management is performed in relation to the first telephony ID.sub.A and the second telephony identifier ID.sub.B.
[0023] In the example of
[0024] In the example of
[0025] According to an example of the method described above, performing identity management includes accessing stored data indicative of an association between at least one characteristic derivable from an SMS message and at least one of the first and second telephony identifiers ID.sub.A and ID.sub.B, and selecting either the first telephony identifier ID.sub.A or the second telephony identifier ID.sub.B on the basis of the stored data. In the example of
[0026] In some examples, one of the characteristics derivable from an SMS message is derived during the processing of an SMS message at the SMS processing equipment. In one such example, referring to the
[0027] In some examples, the characteristic derived from an SMS message is a third telephony identifier derived from a destination address of the mobile-originating SMS message. In one example the third telephony identifier ID.sub.C is an identifier for the user of the second user equipment 14. In this example, the stored data is indicative of an association between the second telephony identifier ID.sub.B and the third telephony identifier ID.sub.C, and the method includes selecting the second telephony identifier ID.sub.B.
[0028] In some examples, the stored data includes communication data relating to the user of the first user equipment 12. In some examples, the communication data includes data indicative of one or more previous communications involving use of the second telephony identifier ID.sub.B and the third telephony identifier ID.sub.C. Selecting a telephony identifier dependent on communication data as described may be used to ensure that the telephony identifier is selected consistently with a telephony identifier associated with a previous communication, as will be described hereafter with reference to further examples.
[0029] In some examples, the communication data includes data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier ID.sub.B and the third telephony identifier ID.sub.C as telephony party identifiers. In these examples, during the previous voice and/or video calls, the communication data is sent from the call identity management module 124 of the AS 24 to the identity management database 100, where the data is stored. During processing of an SMS message, the IP-SM-GW 26 sends a request for stored data from the identity management database 100.
[0030] In an example, the communication data comprises data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier as a called party identifier ID.sub.B and the third telephony identifier ID.sub.C as a calling party identifier. In another example, the communication data comprises data indicative of one or more previous voice and/or video calls involving use of the second telephony identifier as a calling party identifier and the third telephony identifier as a called party identifier.
[0031] In some examples in which the stored data comprises communication data relating to the user of the first user equipment 12, the communication data is indicative of one or more previous SMS messages involving use of the second telephony identifier ID.sub.B as a destination address and the third telephony identifier ID.sub.C as an originating address. In these examples, on receipt of the previous SMS message, the communication data is sent from the SMS identity management module 126 of the IP-SM-GW 26 to the identity management database 100, where the data is stored. During processing an SMS message, the IP-SM-GW 26 sends a request for stored data from the identity management database 100.
[0032] In some examples, processing the at least one SMS message at the SMS processing equipment includes receiving an incoming SMS message for which the second telephony identifier ID.sub.B is a destination address, and performing identity management includes delivering the incoming SMS message to the first user equipment 12 and updating the communication data on the basis of the incoming SMS message. Updating the communication data as described may be used to ensure that when a later SMS message is sent from the first user equipment 12 to the sender of the previous incoming SMS message, the second telephony identifier ID.sub.B is used as the originating address of the later SMS message.
[0033] Some examples in which the stored data includes communication data relating to the user of the first user equipment 12 further include processing voice and/or video calls using call processing equipment in the telephony network. The call processing in such examples includes receiving incoming call establishment signalling, the incoming call establishment signalling including the second telephony identifier ID.sub.B and the third telephony identifier ID.sub.C as telephony party identifiers, and performing call-based identity management during processing of the incoming call establishment signalling at the call processing equipment. Referring to
[0034] In an example, the incoming call establishment signalling includes the second telephony identifier ID.sub.B as a called party identifier and the third identifier ID.sub.C as a calling party identifier, and performing call-based identity management includes establishing a call to the first user equipment 12, and updating the call-related part of the communication data on the basis of the incoming call establishment signalling. Updating the communication data as described may be used to ensure that when a later SMS message is sent from the first user equipment 12 to the previous calling party, the second telephony identifier ID.sub.B is used as the originating address of the later SMS message.
[0035] In an example, the incoming call establishment signalling includes the second telephony identifier ID.sub.B as a calling party identifier and the third identifier ID.sub.C as a called party identifier, and performing call-based identity management includes establishing a call to the second user equipment 14, and updating the call-related part of the communication data on the basis of the incoming call establishment signalling. Updating the communication data as described may be used to ensure that when a later SMS message is sent from the first user equipment 12 to the previous called party, the second telephony identifier ID.sub.B is used as the originating address of the later SMS message.
[0036] Some examples in which the stored data comprises communication data relating to the user of the first user equipment 12 further include processing MMS messages using MMS processing equipment in the telephony network 2. In such examples, the MMS message processing includes processing an incoming MMS message at the MMS message processing equipment, the incoming MMS message including the second telephony identifier ID.sub.B and the third telephony identifier ID.sub.C as one of a destination address and an originating address, respectively. Such examples further include performing MMS-based identity management during processing of the incoming MMS message at the MMS message processing equipment. Referring to
[0037] Some examples of methods according to the present invention include receiving a further SMS message from the first user, selecting to use the first telephony identifier ID.sub.A for the first user equipment 12 instead of the second telephony identifier ID.sub.B, and transmitting an outgoing SMS message including an originating address that includes the first telephony identifier ID.sub.A.
[0038] The above are to be understood as illustrative examples. Further examples are envisaged. For example, a multi-identity user may have more identities and have one or more telephony identifiers, other than the first telephony identifier and the second telephony identifier, managed by one or more identity management systems as described above.
[0039] It is to be understood that any feature described in relation to any one example may be used alone, or in combination with other features described, and may also be used in combination with one or more features of any other of the examples, or any combination of any other of the examples. Furthermore, equivalents and modifications not described above may also be employed without departing from the scope of the invention, which is defined in the accompanying claims.