Patent application number | Description | Published |
20080254794 | GW coupled SIP proxy - In one embodiment, a method can include: (i) performing an initial authentication with a mobile device in an access gateway, the access gateway being a point of attachment; (ii) forwarding a first message from the mobile device to an edge proxy; (iii) receiving a second message from the edge proxy; and (iv) returning a modified version of the second message to the edge proxy for a final authentication of the mobile device. | 10-16-2008 |
20080270618 | Establishing and Modifying Network Signaling Protocols - Methods among nodes of a computer network for establishing a connection between the server and the client. A client node sends a session-invitation message to a server node. The session-invitation message is a message in a first protocol that establishes a channel at the level of the first protocol between the client and the server according to parameters of the session-invitation message that specify characteristics of session in a second protocol. An intermediary node of the network adding new information to the session-invitation message requesting modification of the session policies, and transmits the session-invitation message to the server node. The server receives the session-invitation message, and sends a provisional response back to the client, and holding in abeyance a success or failure response to the session-invitation, without establishing a channel at the level of the first protocol if no such channel is previously established, and without disrupting a channel at the level of the first protocol if such channel has been previously established. When the client receives the provisional response, it reconfigures the characteristics of the session of the second protocol, and sends an amended request to the server. When the server receives the amended request, the server sends a success or failure response to the client, the content of the response being based at least in part on the amended session-invitation, and being of a form defined in the protocol as being an appropriate response form for reply to the original session-invitation message. | 10-30-2008 |
20090003359 | Selecting a Visited Bearer Manager (VBM) - In one embodiment, a method includes, generating a first value at an Internet Protocol gateway (IPGW) corresponding to an identifier (ID) of an access terminal (AT). The method further includes identifying a first one of a plurality of visited bearer managers (VBMs) based on a correlation between the first value and a first Internet Protocol (IP) address of the first VBM and determining usability of the first VBM for the AT, the determination of the usability of the first VBM taking into account dynamic conditions at the first VBM. If the first VBM is usable for the AT, connection is allowed between the AT and the first VBM. If the first VBM is unusable for the AT, a second value corresponding to a modification of the ID is generated and a second one of the VBMs is identified. | 01-01-2009 |
20090046703 | USING AN IP REGISTRATION TO AUTOMATE SIP REGISTRATION - In one embodiment, a network device receives an Internet protocol (IP) registration request, such as a mobile IP registration request, from an access terminal. The network device may be a home agent that is configured to register the access terminal for IP services at the network layer. In addition to registering the access terminal at the network layer, the network device may facilitate registration at another layer, such as the application layer. In one example, registration information for the access terminal for an application layer registration, such as information needed to register for a session initiation protocol (SIP) services, is determined. The network device then facilitates registration at the application layer automatically using the registration information. | 02-19-2009 |
20100329453 | ROUNDING FOR SECURITY - A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second security key is generated differ by less than a non-zero predetermined amount. The second security key may be generated from the second value rounded to a multiple of a rounding interval that is nearest to the second value. The rounding information may include a rounding direction indication. The rounding direction indication may indicate the direction in which the second value is rounded to the multiple of the rounding interval nearest to the second value. | 12-30-2010 |
20110019612 | PICOCELL SYSTEM WITH LOCAL VOICE MEDIA SUPPORT - A methodology includes servicing a voice call between mobile User Equipment and an Enterprise Session Initiation Protocol (SIP) Services Environment using, at least in part, Voice over Internet Protocol Multimedia Subsystem (VoIMS), detecting that the User Equipment is moving out of range of Radio Access Point (RAP) infrastructure servicing the User Equipment, and in response to detecting, initiating a procedure to hand out the voice call and anchor the voice call in a Mobile Switching Center (MSC) of a macro service provider. | 01-27-2011 |
20110032940 | TRIGGERING BANDWIDTH RESERVATION AND PRIORITY REMARKING - In one embodiment, a reservation proxy monitors for received connectivity check messages or beginning-of-media-flow indication messages. When either type of message is observed, the reservation proxy requests resource allocation for a media flow associated with the received message. The amount of resource allocation requested may be coordinated by exchanging messages with a call controller or policy server for one of the endpoints of the media flow, or the amount of resource allocation may be identified within the received message. | 02-10-2011 |
20110113238 | CERTIFICATE ENROLLMENT WITH PURCHASE TO LIMIT SYBIL ATTACKS IN PEER-TO-PEER NETWORK - A system may protect against Sybil attacks on a peer-to-peer (P2P) network based on each one the nodes in the P2P network being identified by a corresponding certificate. In particular, a node may receive a license key, where the license key is evidence of a purchased product license. The node may transmit a message included in the license key to a certificate authority. The node may receive a certificate from the certificate authority in response to authentication of the message. The node may be identified in the P2P network with a node identifier included in the certificate. | 05-12-2011 |
20110314161 | SYSTEM AND METHOD FOR ENFORCING POLICY IN A COMMUNICATION NETWORK - A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a policy profile for a network user, and decide a proper allocation of network users based on the policy profile, the application, and available network resources. The policy server is further operable to communicate with a non-SIP application. The system also includes a network resource manager operably associated with the policy server and operable to monitor available network in the resources in the communication network. In addition, the network resource manager is functional to allocate network resource amongst a plurality of network users. The system also contains an application control point which is operably associated with the policy server and operable to communicate with a SIP application. The system is operable to use policy peering between the home and visited network to enable user-specific policies to be enforced while roaming. | 12-22-2011 |
20120213347 | SYSTEM AND METHOD FOR PROVIDING TELEPHONY SERVICES - In certain embodiments, the present invention comprises a system and method for providing feature services in a multimedia communication environment. The system and method comprise comparing signaling messages with control data to identify one or more service enablers and application servers that are responsive to the signaling message. Each responsive service enabler is invoked in accordance with an associated policy hook. | 08-23-2012 |
20130145044 | Discovering Security Devices Located on a Call Path and Extending Bindings at those Discovered Security Devices - In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic. | 06-06-2013 |
20130201991 | Triggering Bandwidth Reservation and Priority Remarking - In one embodiment, a reservation proxy monitors for received connectivity check messages or beginning-of-media-flow indication messages. When either type of message is observed, the reservation proxy requests resource allocation for a media flow associated with the received message. The amount of resource allocation requested may be coordinated by exchanging messages with a call controller or policy server for one of the endpoints of the media flow, or the amount of resource allocation may be identified within the received message. | 08-08-2013 |