Patent application number | Description | Published |
20090310763 | VOICE AUTHENTICATION FOR CALL CONTROL - A communication network is disclosed that uses voice authentication to provide call control. The communication network includes a call control function, a voice collection system, a voice authentication system, and a permission system. The voice collection system collects voice samples of a first party during the call to a second party, and transmits the collected voice samples to the voice authentication system. The voice authentication system compares the collected voice samples to stored voice samples to determine the identity of the first party. The permission system determines whether the first party is authorized for the call based on the identity of the first party. The permission system generates results based on the determination and transmits the results to the call control function. The call control function then processes the results, and interrupts the call if the first party is not authorized. | 12-17-2009 |
20120064857 | TEMPORARY DATA SERVICE IN WIRELESS NETWORKS - A wireless network and method are disclosed that provide temporary data service to a party. For the invention, a temporary data service system receives a request from a first party to establish temporary data service for a second party. The temporary data service system then configures the wireless network to establish temporary data service for the second party, such as by setting up a temporary subscriber profile or temporary account for the second party in the wireless network. A notification system then generates a notification message indicating that the temporary data service has been established for the second party, and transmits the notification message to the second party. The second party may use the temporary data service to access some type of data message or data file, such as a picture message sent by the first party. | 03-15-2012 |
20140004864 | Mechanism To Perform Call Admission Control For Multi-Standard Small Cell | 01-02-2014 |
20140321434 | METHOD AND APPARATUS FOR DETERMINATION OF ALMOST BLANK SUBFRAME PATTERN BY NETWORK LISTENING - A method of determining almost-blank subframe (ABS) information in a heterogeneous network (HetNet) including a macro cell and one or more small cells underlaid with respect to the macro cell, the method including obtaining, at a first base station (BS) of a first one of the one or more small cells, almost-blank subframe (ABS) information of the macro cell based on at least one of transmissions of the macro cell and transmissions of a UE attached to the first small cell. | 10-30-2014 |
Patent application number | Description | Published |
20080209564 | Security protection for a customer programmable platform - A method of preventing a customer programmable device from causing security threats to itself or to a communication system is provided. The method includes establishing one or more thresholds by programming or configuring of the device, detecting whether one or more of the thresholds have been exceeded using one or more detection mechanisms, and taking action in response to each threshold that has been exceeded. | 08-28-2008 |
20090003388 | METHOD AND APPARATUS FOR SYNCHRONIZING PORTED NUMBER DATA - A method of synchronizing ported number data within a telecommunications network in which a number portability administration center has received a request from a subscriber having a directory number (DN) to port is provided. The method comprises the steps of: a Number Portability data manager sending a subscription request to the NPDB to receive future notifications about subscriber ports to/from specific Location Routing Number(s); the NPDB honoring these subscriptions when a user ports their DN. If this is the initial LRN assigned to the DN, then the NPDB derives the LRN of the code holder. If the LRN from which the subscriber ported has a subscription, then the NPDB sends a notification message to the NP data manager with which the LRN is associated indicating that the DN ported out. If the LRN to which the subscriber ported has a subscription, then the NPDB sends a notification message to the NP data manager with which the LRN is associated indicating that the DN ported in. The method further comprises receiving a notification message for the LRN at a number portability data manager, wherein: if the notification message indicates that a DN has ported in, then the number portability data manager sends a request to an ENUM (telephone number mapping) server to turn the entry for that DN on; and if the notification message indicates that a DN has ported out, then the number portability data manager sends requests to the ENUM server and to a subscriber database to turn the entry for that DN off. | 01-01-2009 |
20090005066 | METHOD AND APPARATUS FOR OBTAINING A ZIP CODE - An apparatus for obtaining a zip code of where a user is at the moment is provided. The apparatus comprises: a core network; an access server operatively connected to the core network providing network access for the communication device; and a zip code location database server operatively connected to the core network, wherein the zip code location database server is adapted to store zip code location information for one or more IDs in the core network. | 01-01-2009 |
20090070127 | Method and apparatus for network-based mobile device coordination - A system and method for network-based coordination of a plurality of devices using precise timing methods is provided. The method includes registering a device for an event that utilizes precise timing. The method continues with identifying a list of devices that will participate in the event, downloading a set of tools that enable the devices to perform the event, and initiating the event for the list of devices coordinated by precise timing. The system for network-based precision includes a timing source that provides precise timing for the devices, a subscription handler that organizes the devices and event application server that provides a list of registered subscribers and initiates the group event. The method and system disclosed may be used to coordinate mobile devices for collecting data and/or provide coordination for mobile devices to display video and play audio in a group coordinated manner. | 03-12-2009 |
20090088147 | Method and system for correlating IP layer traffic and wirless layer elements in a UMTS/GSM network - The present invention relates to a correlation module for correlating IP layer traffic and wireless layer network elements in a network. According to an example embodiment, the correlation module includes an RNC analyzer, a Gn snoop unit, and/or a mapping unit. The RNC analyzer is configured to collect wireless layer network element information from at least one RNC. The Gn snoop unit is configured to collect wireless layer network element information and IP layer traffic information from at least one Gn interface between a serving GPRS support node and a gateway GPRS support node. The mapping unit is configured to map the IP layer traffic and the wireless layer network elements in the network based on the collected IP layer traffic information and the collected wireless layer network element information. A method of correlating IP layer traffic and wireless layer network elements in a network is also disclosed. | 04-02-2009 |
20100113016 | Methods for routing a call to a mobile unit that has been ported - The present invention provides a method for determining the HLR for a user who has been ported in to an IMS network. A call request is received for a mobile unit that has been ported. The communication system determines a Home Location Register (HLR) for the mobile unit. The communication system receives a temporary directory number associated with the mobile unit. The call request is completed to the mobile unit using the temporary directory number. | 05-06-2010 |
20100130209 | Methods for facilitating user control of handoffs - To address the need to have new techniques that are able to improve handoff decision-making, the network may employ a method such as that depicted in diagram | 05-27-2010 |
20110117889 | Methods for capacity limitation mitigation in a radio frequency device - Example embodiments provide a method and/or network element capable of mitigating one or more effects of operating at full capacity. According to an example embodiment, a network element may address load capacity by identifying that a first network element (e.g., a femto) is operating at a threshold capacity. If a communication from a second network element intended for the first network element is received, an operation is performed that informs the second network element of at least one of (i) that the first network element is operating at a threshold capacity and (ii) that the communication cannot be delivered to the first network element while the first network element is operating at a threshold capacity. | 05-19-2011 |
20130045740 | AUTOMATED TRIGGERS FOR APPLICATION OF CELL ASSOCIATION BIAS AND/OR INTERFERENCE MITIGATION TECHNIQUES - In a wireless telecommunications network, there is included: a macro cell ( | 02-21-2013 |
20150079997 | AUTOMATED TRIGGERS FOR APPLICATION OF CELL ASSOCIATION BIAS AND/OR INTERFERENCE MITIGATION TECHNIQUES - In a wireless telecommunications network, there is included: a macro cell ( | 03-19-2015 |