Patent application number | Description | Published |
20080293389 | Method and system of forwarding SMS messages - A method of forwarding messages in a wireless network is provided. The method comprises receiving a message destined for a first mobile station, processing the message based on call forwarding data to make a determination as to whether the message is to be forwarded to different mobile station, and transmitting the message to a message center responsive to the determination determining that the message is to be forwarded to a different mobile station. | 11-27-2008 |
20080305811 | STORING ACCESS NETWORK INFORMATION FOR AN IMS USER IN A SUBSCRIBER PROFILE - IMS networks and methods are disclosed for storing information on the access network of a user in a subscriber profile for the user. When a communication device of a user attempts to register with an IMS network, a P-CSCF receives a register request message from the communication device, and identifies access network information for the user. The P-CSCF then transmits another register request message to an S-CSCF that includes the access network information, and the S-CSCF in turn forwards the access network information to an HSS. The HSS then stores the access network information in the subscriber profile for the user. Nodes in the IMS network that retrieve the subscriber profile may acquire the access network information to provide services based on the access network information. | 12-11-2008 |
20090037540 | NOTIFICATION OF WAITING VOICEMAIL MESSAGES BETWEEN DIFFERENT TYPES OF COMMUNICATION NETWORKS - Systems and methods are disclosed that provide notification of waiting voicemail messages between different types of communication networks. A first communication network as described herein includes a voicemail server to store voicemail messages for a user of a communication device. A second communication network provides phone service to the communication device but uses a different signaling protocol than the first communication network. In order to notify the user of the waiting voicemail message in the voicemail server, a subscriber server (e.g., an HLR) in the first communication network receives a voicemail waiting indicator in the signaling protocol of the first communication network, identifies the signaling protocol of the second communication network, and converts the voicemail waiting indicator to the signaling protocol of the second communication network. The second communication network may then provide notification of the waiting voicemail message to the user. | 02-05-2009 |
20100003971 | REPEAT DIALING IN WIRELESS NETWORKS TO BUSY CALLED PARTIES - A wireless network is disclosed that provides repeat dialing to busy called parties. The wireless network includes an originating MSC system that serves a calling party, and a terminating MSC system that serves a called party. The calling party initiates a call to the called party through the originating MSC system, and the terminating MSC system determines that the called party is busy on another call. The originating MSC system then receives a repeat dialing instruction from the calling party and transmits a repeat dialing indicator to the terminating MSC system. The terminating MSC system identifies when the called party becomes available in substantially real time. When available, the terminating MSC system attempts to set up a call between the called party and the calling party. | 01-07-2010 |
20100009701 | METHOD AND APPARATUS FOR DATA MESSAGE DELIVERY TO A RECIPIENT MIGRATED ACROSS TECHNOLOGY NETWORKS - A method of providing SMS delivery to recipients migrated across different technology networks. The method includes receiving a short message service (SMS) text message from a sender at a short message service center (SMSC), wherein the SMS text message includes a destination number for a recipient of the SMS text message. A first routing request is sent to a database in a first network for SMS routing information for the destination number via a first signal transfer point (STP). The first STP determines whether the destination number is a migrated or a non-migrated destination number based on data received from the first database. An an error indication is provided to the SMSC if the destination number and the first routing request are for different communication networks. Finally, a second routing request is sent to a second database in a second network for SMS routing information for the destination number via a second STP. | 01-14-2010 |
20100267382 | REPEAT DIALING IN WIRELESS NETWORKS TO CALLED PARTIES THAT ARE POWERED OFF - A wireless network is disclosed that provides repeat dialing to called parties that are powered off. The wireless network includes an originating MSC system, a Home Location Register (HLR) system for a called party, and a serving MSC system that serves the called party. Responsive to identifying that the called party is powered off, the calling party transmits a repeat dialing instruction to the originating MSC system. The originating MSC system then transmits a repeat dialing indicator to the HLR system for the called party. The HLR system for the called party identifies when the called party powers on. When the called party does power on, the HLR system transmits an instruction to the serving MSC system to attempt to set up a call between the called party and the calling party. | 10-21-2010 |
20110212709 | ANONYMOUS CALL BLOCKING IN WIRELESS NETWORKS - Wireless networks and methods are disclosed that provide for anonymous call blocking in wireless networks. A wireless network of the invention includes an MSC system and an HLR system. When a calling party initiates a call to a called party, the MSC system receives the call and generates a call setup message for the call. The call is anonymous, so the call setup message does not include caller ID information for the calling party. The MSC system receiving the call transmits the call setup message to the HLR system. The HLR system determines if the call setup message includes caller ID information, and determines if the called party subscribes to anonymous call blocking. Responsive to determining that there is no caller ID information in the call setup message and that the called party subscribes to anonymous call blocking, the HLR system instructs the MSC system to block the call. | 09-01-2011 |
20110319075 | UNIVERSAL MOBILE MANAGER INTERWORKING FOR SHORT MESSAGE SERVICE FEATURE PARITY - The present invention provides a method that is implemented at a mobility management entity. One embodiment of the method includes converting a short message service (SMS) message from a first format to one or more second formats when one or more user profiles stored in a database indicate that one or more destinations of the SMS message use the second format(s). | 12-29-2011 |
20110319089 | UNIVERSAL MOBILE MANAGER INTERWORKING TO SUPPORT GLOBAL ROAMING - The present invention provides a method of interworking to support global roaming across circuit-switched and packet-switched domains. Embodiments of the methods include selecting a first routing number that identifies the mobility manager as a gateway to the originating domain. The selection is performed at a mobility manager in response to receiving a request from a first gateway in an originating domain to locate a user. Embodiments of the method further include identifying a second gateway that serves the user in a destination domain using a first user identifier included in the request received from the first gateway. Embodiments of the mobility manager can store information associating the first routing number with a second routing number that identifies the second gateway. | 12-29-2011 |
20120082165 | CENTRALIZED TELECOM SERVER FOR DIFFERENT TECHNOLOGY NETWORKS - Systems and methods are disclosed for providing service management across different technology networks. A centralized telecom serving system (TSS) includes a plurality of interface gateways, a central adapter, and a common interface. When in operation, a first interface gateway receives a first service request from a first network, and converts the first service request from a signaling interface used in the first network to the common interface. The central adapter receives the first service request over the common interface, and processes service management logic to identify multiple services that trigger on the first service request and determine a sequence for providing the multiple services. For each service, the central adapter generates a second service request in the common interface, and transmits the second service request to a second interface gateway that is coupled to a second network. | 04-05-2012 |
20120254825 | METHOD AND APPARATUS FOR MANAGING COMPONENTS OF APPLICATION ENABLEMENT SUITE - A method of managing components of an AES includes: a) providing an application developer with access to a workflow designer engine via a developer portal, wherein the workflow designer engine and developer portal are in operative communication with an AES; b) activating a network application manager of the workflow designer engine in response to the application developer selecting a manage network application function via the user device in conjunction with a graphical user interface (GUI) controlled by the developer portal; and c) creating a new network application using archetypes of the workflow designer engine and repositories of the developer portal in response to the application developer defining at least some parameters for the new network application in conjunction with the GUI. An associated apparatus includes a workflow designer engine server with a workflow designer engine module; and a developer portal server with a developer portal module. | 10-04-2012 |
20120254899 | METHOD AND APPARATUS FOR PROVIDING APPLICATION WITH INTERFACE TO COMPOSITE NETWORK SERVICE - A method of providing an application with an interface to a composite network service includes: a) receiving a request for a composite network service at an exposure engine associated with an SCF, the composite network service associated with multiple network services, multiple service providers, multiple service networks, or multiple communication sessions; and b) selecting an API container based on the requested composite network service, the API container formed by a composition engine associated with the SCF and including composite service logic and composite enabler logic or composite normalization logic. The composite service logic including program calls. The composite enabler logic providing external protocol interfaces that do not require normalization. The composite normalization logic providing external protocol interfaces that require normalization. An apparatus for providing an application with an interface to a composite network service includes the exposure engine and API engine. | 10-04-2012 |
20120307734 | STORING ACCESS NETWORK INFORMATION FOR AN IMS USER IN A SUBSCRIBER PROFILE - IMS networks and methods are disclosed for storing information on the access network of a user in a subscriber profile for the user. When a communication device of a user attempts to register with an IMS network, a P-CSCF receives a register request message from the communication device, and identifies access network information for the user. The P-CSCF then transmits another register request message to an S-CSCF that includes the access network information, and the S-CSCF in turn forwards the access network information to an HSS. The HSS then stores the access network information in the subscriber profile for the user. Nodes in the IMS network that retrieve the subscriber profile may acquire the access network information to provide services based on the access network information. | 12-06-2012 |
20130074046 | APPLICATION PROTOYPING SUITE - Various exemplary embodiments relate to a method and related network node including one or more of the following: an application storage that stores code defining an application, wherein the code is received by the prototyping suite from the developer device; a testing controller configured to effect performance of at least one test in association with the application to produce at least one test result; a certification controller configured to analyze the at least one test result to determine whether the application meets a certification requirement of a first plurality of certification requirements; and an application marketplace server configured to provide the application to at least one other device when the certification controller has determined that the application meets each certification requirement of the first plurality of certification requirements. | 03-21-2013 |
20130109348 | Method for Selectively Exposing Subscriber Data | 05-02-2013 |
20130111545 | Privacy Management for Subscriber Data | 05-02-2013 |
20130325708 | APPLICATION ACCESS MANAGEMENT METHOD AND APPARATUS - An exemplary application access manager apparatus includes at least one computing device. A digital data storage comprises a relationship establishment program, an application access program and a revenue allocation program. A processor is configured to execute the relationship establishment program to apply a plurality of rules that govern a relationship between a user desiring access to at least one application and at least one of a service provider or an application provider. The processor is configured to execute the application access program to obtain information regarding any access by the user of the application. The processor is configured to execute the revenue allocation program to determine how to charge the user for any access to the application and to allocate any revenue to at least one of the service provider or the application provider. | 12-05-2013 |
20140189845 | AUTHENTICATION OF APPLICATIONS THAT ACCESS WEB SERVICES - Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if the application is authorized by a service provider based on information provided in the web service request. If the application is authorized, then the web service gateway identifies a profile for an end user that initiated the web service using the application, and determines if the web service is allowed for the end user based on the profile. If the web service is allowed for the end user, then the web service gateway determines that the application is authenticated, converts the web service request to a protocol used by a server that provides the web service, and transmits the web service request to the server. | 07-03-2014 |