Sonus Networks, Inc. Patent applications |
Patent application number | Title | Published |
20150280963 | METHODS AND SYSTEMS FOR INTEGRATING INDEPENDENT IMS AND WEBRTC NETWORKS - Independent IMS and WebRTC communications networks are integrated via an applications server including IMS and WebRTC functionality. A user equipment device including IMS and WebRTC capability is registered via the same application server with both the IMS and WebRTC networks. The application server is configured to make a routing determination whether to route a communications session over an IMS communications path or an RTC communications path when it is determined that parallel independent paths are available. | 10-01-2015 |
20150047036 | REAL-TIME NETWORK ATTACK DETECTION AND MITIGATION INFRASTRUCTURE - The invention features systems and methods for detecting and mitigating network attacks in a Voice-Over-IP (VoIP) network. A server is configured to receive information related to a mitigation action for a call. The information can include a complexity level for administering an audio challenge-response test to the call and an identification of the call. The server also generates i) a routing label based on the identification of the call, and ii) a script defining a plurality of variables that store identifications of a plurality of altered sound files for the audio challenge-response test. Each altered sound file is randomly selected by the server subject to one or more constraints associated with the complexity level. The server is further configured to transmit the script to a guardian module and the routing label to a gateway. | 02-12-2015 |
20140237089 | SYSTEMS AND METHODS FOR HANDLING A REGISTRATION STORM - Systems and methods for user device registration are disclosed. In certain embodiments, at least a first edge device in a group of edge devices enters a mass-restart mode. The first edge device receives a request for registration from a user device and determines whether the user device is currently registered through the first edge device. The first edge device generates a notification associated with the user device if the user device is not currently registered through the first edge device. A second edge device in the group of edge devices receives the notification and determines whether the user device is currently registered through the second edge device based on the notification. Registration information about the user device is deleted from the second edge device if the user device is currently registered through the second edge device. | 08-21-2014 |
20120196605 | Transfer of Sessions for Femtocells to Macro Mobile Networks - A method, server and computer program product is provided for transferring a session from a femtocell to a macromobile network. A request to transfer the session from the femtocell to a macromobile network is received. The request is translated into a format used by the macromobile network to receive session set-up requests and the translated request is provided to the macromobile network. | 08-02-2012 |
20120173711 | Identifying an Application Server in a Plurality of Application Servers Associated with a Shared Identifier - Methods and apparatuses, including computer program products, are described for identifying an application server in a plurality of application servers associated with a shared identifier in an Internet Protocol Multimedia Subsystem (IMS) network. The method includes receiving, from a Signaling System 7 (SS7) network, a message including a mobile device identifier associated with a mobile device connected to the IMS network and determining the identity of an application server in the plurality of application servers associated with the shared identifier. The determining step includes extracting the mobile device identifier from the message and retrieving, from a data storage module, an application server identifier associated with an application server based on the extracted mobile device identifier. The application server associated with the retrieved identifier provides service to the mobile device. The method also includes transmitting the message to the application server associated with the retrieved identifier. | 07-05-2012 |
20120163240 | Parameterized Telecommunication Intercept - Described are computer-based methods and apparatuses, including computer program products, for parameterized telecommunication intercept. A parameterized intercept request comprises (i) a set of intercept events for identifying a candidate telecommunication message for intercept, the set of intercept events comprising at least two of the following types of intercept events: an internet protocol event, a media event, or a signaling event, (ii) a criterion associated with the set of intercept events, and (iii) a set of intercept actions for processing the candidate telecommunication message. A first telecommunication message is received. The first telecommunication message is determined to match the set of intercept events based on the criterion. The set of intercept actions is executed based on the matched first telecommunication message. | 06-28-2012 |
20120005250 | Systems and Methods for Recording Communication Sessions - A system for recording a communication session is disclosed. The system includes an edge device configured to receive a message that includes information about the communication session, determine whether to record the communication session based on at least one criterion, and mark the message to indicate that the communication session should be recorded if the at least one criterion is satisfied. The system also includes a signaling entity configured to receive the message from the edge device and, if the at least one criterion is satisfied, direct the message to a recorder configured to record the communication session. | 01-05-2012 |
20110271097 | Loosely-Coupled Encryption Functionality for Operating Systems - Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Modified encryption information is determined that does not comprise a desired security policy for the data packet and comprises null parameter(s) and is based on encryption information that comprises the desired security policy. A message comprising data indicative of the encryption information is transmitted. An operating system is unaware of a security nature of the transmission. A null-encryption routine is executed to generate an unencrypted data packet, wherein the null-encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device. The unencrypted data packet is encrypted based on the message transmitted from the first computing device to generate an encrypted data packet. | 11-03-2011 |
20110271096 | Loosely-Coupled Encryption Functionality for Operating Systems - Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Encryption information is determined that includes parameters for encrypting and decrypting data packets transmitted between the first computing device and the remote computer. A message comprising data indicative of the encryption information is transmitted to a second computing device, wherein an operating system being executed is unaware of a security nature of the transmission. A bypass encryption routine is executed to generate a unencrypted data packet, wherein the bypass encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device. The unencrypted data packet is encrypted based on the message transmitted from the first computing device to generate an encrypted data packet. | 11-03-2011 |
20110271005 | LOAD BALANCING AMONG VOIP SERVER GROUPS - Described are computer-based methods and apparatuses, including computer program products, for load balancing among VOIP servers. An identity table includes an identity entry for a plurality of servers, each identity entry comprising a FQDN and load balancing information. A persistence table stores persistence entries indicative of a persistent connection between a client and a server. Updated load balancing information determined by the first server is received. The identity table is updated based on the updated load balancing information. A service request is received from a client. If the client is not associated with a persistence entry, a second server is selected from the plurality of servers based on load balancing information for each identity entry in the identity table. A persistence entry is stored indicative of a persistent connection between the client and the selected second server, the persistence entry comprising a FQDN and an identifier for the client. | 11-03-2011 |
20110202645 | Methods and Apparatus to Test Network Elements - Described are computer-based methods and apparatuses, including computer program products, for testing network elements in a communication network. A record file is received, comprising one or more record file elements, each record file element including data indicative of a request received by a network element in a network during normal operation. A virtual client is created for each of one or more identified sources. One or more regenerated requests are generated, each of the one or more regenerated requests being generated based on data in a corresponding record file element from the one or more record file elements. For each of the one or more regenerated requests, the virtual client associated with the regenerated request transmits the regenerated request to a subject network element to test the subject network element, wherein the one or more regenerated requests simulate requests received by the network element during normal operation. | 08-18-2011 |
20110153834 | Transparent Recovery of Transport Connections Using Packet Translation Techniques - Methods and apparatuses, including computer program products, are described for transparent recovery of transport connections. The method includes collecting a state associated with a first connection between a first server and a remote server via a first network socket and transmitting the state from a first networking module to a second networking module. The method includes storing the state, opening a second network socket based on failure of the first networking module, intercepting outbound packets associated with a request to initiate a second connection between the first server and the remote server via the second socket, modifying the intercepted packets based on the state, and transmitting the modified packets to the remote server to elicit an acknowledgement to maintain the first connection. The method includes receiving packets associated with the acknowledgment from the remote server, and modifying the received packets to acknowledge the request to initiate the second connection. | 06-23-2011 |
20110149750 | SUBSCRIBER FALLBACK/MIGRATION MECHANISMS IN IMS GEOGRAPHIC REDUNDANT NETWORKS - A system and method for maintaining service availability for an Internet Protocol Multimedia Subsystem (IMS) network is provided. A primary network receives a request from one or more subscribers of the primary network to place a call. The primary network registers the one or more subscribers. The primary network assigns an identifier to data of the one or more registered subscribers for the registration. The identifier associates the one or more subscribers with the primary network upon migration of the one or more subscribers from the primary network to the secondary network. The secondary network monitors the primary network to detect an event on the primary network. The secondary network migrates the one or more subscribers from the secondary network to the primary network based on the identifier and after initiation of the migration in response to the occurrence of the event on the primary network. | 06-23-2011 |
20110145639 | Method and Apparatus For Controlling Traffic Entry In A Managed Packet Network - A method for control of real-time traffic entry of a managed packet network includes the step of receiving, from a border element processor, a first message indicative of a new active registration request associated with a client. The border element processor is one of a plurality of border element processors at an edge of a managed packet network controlling packets (e.g., relating to real-time multimedia traffic) entering the managed packet network. The method also includes the step of load balancing, by a load balancing engine, the new active registration request across the plurality of border element processors and assigning the client to a designated border element processor. A second message is generated in response to the new activation registration request. The second message includes a parameter identifying the designated border element processor assigned to the client. | 06-16-2011 |
20110083175 | Methods and Apparatuses for Policing and Prioritizing of Data Services - Methods and apparatuses, including computer program products, are described for policing and prioritizing of data services. Each packet in a data stream is directed to a substream policer of a plurality of substream policers. Each packet is allowed through the substream policer based on rate parameters associated with the substream policer. The packets allowed by the substream policer are directed to an aggregate policer. Each packet allowed through the substream policer is allowed through the aggregate policer based on rate parameters associated with the aggregate policer. The substream policer and the aggregate policer are charged for each packet allowed by both the substream policer and the aggregate policer. The substream policer and the aggregate policer are not charged for each packet not allowed by either the substream policer or the aggregate policer. | 04-07-2011 |
20110078274 | Method and System for Implementing Redundancy at Signaling Gateway Using Dynamic SIGTRAN Architecture - Described are a method, a computer program product and apparatus for implementing signaling gateway redundancy. A signaling network management message is received, at a first signaling gateway, from a first signaling network. Routing control information associated with the first signaling gateway is updated based on the signaling network management message. A first SIGTRAN protocol signaling network management message is transmitted, from the first signaling gateway, to a first application server on a first IP network. The first SIGTRAN protocol signaling network management message is based on the signaling network management message. A second SIGTRAN protocol signaling network management message is transmitted, from the first signaling gateway, to a second signaling gateway on a second IP network. The second SIGTRAN protocol signaling network management message is based on the signaling network management message. The second signaling gateway is mated with the first signaling gateway. | 03-31-2011 |
20110075654 | Method and System for Implementing Redundancy at Signaling Gateway Using Dynamic SIGTRAN Architecture - Described are a method, a computer program product and apparatus for implementing signaling gateway redundancy. A first SIGTRAN protocol application server process maintenance message is received, at a first signaling gateway, from a first application server process. Connection control information associated with one or more connections to the first signaling gateway is updated based on the first SIGTRAN protocol application server process maintenance message. A second SIGTRAN protocol application server process maintenance message is transmitted, from the first signaling gateway, to a second signaling gateway. The second SIGTRAN protocol application server process maintenance message is based on the first SIGTRAN protocol application server process maintenance message. The second signaling gateway is mated with the first signaling gateway. | 03-31-2011 |
20110075564 | Methods and Apparatuses for Establishing M3UA Linksets and Routes - Methods and apparatuses, including computer program products, are described for establishing M3UA linksets and routes. The method includes generating, at a signaling gateway, a linkset that includes a plurality of M3UA links between two or more IP hosts on the signaling gateway and a single IP host on a signal transfer point. The method also includes configuring, at the signaling gateway, a route based on the linkset to direct messages from the signaling gateway to a single destination node. | 03-31-2011 |
20110038259 | Priority Policing of Requests with Deferred Determination of Priority Level - Methods and apparatuses, including computer program products, are described for priority policing of requests with deferred determination of priority level. The method includes directing each packet in a data stream to a policer. The method also includes determining whether to allow, reject, or conditionally pass each packet through the policer based on parameters associated with the policer. The method also includes directing each packet conditionally passed by the policer to a classifier associated with the policer. The method also includes determining, by the classifier, a priority value of each packet received from the policer. The method also includes directing, by the classifier, each prioritized packet to the policer. The method also includes determining whether to allow or reject each prioritized packet through the policer based on the priority value. | 02-17-2011 |
20100274893 | METHODS AND APPARATUS FOR DETECTING AND LIMITING FOCUSED SERVER OVERLOAD IN A NETWORK - Computer-based methods and apparatuses, including computer program products, are described for detecting and limiting focused server overload in a network. A feedback message is received from a downstream server, wherein the feedback message includes a communication protocol statistic. The methods and apparatuses determine which of one or more counters that store a number of feedback messages received that include the statistic, from an array of counters, are associated with the downstream server using one or more hash functions based on information included in the feedback message. The one or more counters are incremented in response to the feedback message including the statistic. Using the one or more hash functions, a value of the number stored in the one or more counters is determined. The value is determined to be indicative of an overload episode in the network for the downstream server based on whether the value satisfies a predetermined criteria. | 10-28-2010 |
20100271947 | ADAPTIVE RATE CONTROL BASED ON OVERLOAD SIGNALS - Described are methods and apparatuses, including computer program products, for limiting server overload via client control. A first set of a plurality of requests are transmitted to a server at a first transmission rate during a first period of time. The first transmission rate is limited to be less than or equal to a first transmission limit rate. An overload value is determined based on whether at least two or more requests of the first set of requests for service satisfy an overload criterion. A second transmission limit rate is determined based on the overload value and the first transmission limit rate. A second set of a plurality of requests is transmitted to the server at a second transmission rate during a second period of time. The second transmission rate is limited to be less than or equal to the second transmission limit rate. | 10-28-2010 |
20100180033 | Hybrid Server Overload Control Scheme for Maximizing Server Throughput - Described are methods and apparatuses, including computer program products, for controlling server resources. An occupancy value of a buffer and a first utilization value of a first processor are measured. The buffer is configured to store one or more requests for service from at least a first client. The first processor is configured to receive and process the one or more requests from the buffer. A buffer size value is determined based on a processor throughput calculation, and a first service request limit for the first client is determined based on the occupancy value, the first utilization value, and the buffer size value. | 07-15-2010 |
20080298354 | Packet Signaling Content Control on a Network - Described are computer-based methods and apparatuses, including computer program products, for packet signaling content control on a network. The content control includes two sets of filters—an ingress filter set and an egress filter set. For packets coming into an internal network, the packets (e.g., SIP packets) are filtered by an ingress filter associated with the external network and which determines whether to discard sets of information from the packet description information (e.g., a header, an optional header). The packet is also filtered by an egress filter associated with the internal network and which determines whether to discard sets of information from the packet description information. The packet is transmitted to the internal network. For packets leaving the internal network, the filtering occurs in the opposite direction (e.g., egress filter associated with the internal network and then ingress filter associated with the external network). | 12-04-2008 |
20080275941 | Service Integration on a Network - Described are computer-based methods and apparatuses, including computer program products, for service integration on a network. Telecommunication services (e.g., calendar, television, phone, location) on a network are integrated using service codelets designed to interface with the services. A default codelet associated with the user (e.g., via a service plan) dynamically calls the service codelets to request information from the associated services (e.g., calendar data) and/or perform tasks with the associated services (e.g., update calendar). The service codelets can dynamically call other service codelets based on the results of their requests for information. The information from the services is integrated and returned to the user. | 11-06-2008 |
20080274755 | Personal Service Integration on a Network - Described are computer-based methods and apparatuses, including computer program products, for personal service integration on a network. A personal service monitors and stores user requests for services. The stored user requests are processed to determine usage patterns. The personal service processes the usage patterns to determine future requests and/or to determine how to fulfill a request. The personal service processes the request. | 11-06-2008 |