Abstract:
A method for managing user service profiles by an entity for managing the profiles of user services in a nominal network, before dispatching to a third-party entity a service profile of a the user. The method includes determining whether the third-party entity is in a visited network different from the nominal network; if so, determining, on the basis of the service profile of the user recorded in the profiles management entity, if the user has at least one mark associated with an IN originating service; if so, checking to determine whether there exists an intelligent network agreement between an operator of the nominal network and an operator of the visited network and if relevant the nature of the agreement; and dispatching, to the third-party entity, a service profile of the user determined as a function of a type of the service and of the result of the checking.
Abstract:
A method and a device for supplying location information to an apparatus connected to a network access point. The a method is implemented by a network access point, which is capable of providing the apparatus with access to a communication network to which the access point is connected when the apparatus is connected to a local network of the network access point. The network access point obtains, from a server of the communication network, information on the location of the network access point, the location information being location information certified by the operator of the communication network. The network access point receives, from the apparatus, a request for location information and sends the certified location information obtained to the apparatus.
Abstract:
A method for achieving remote access to a voice assistant suitable for setting up telephone communications with a communication terminal via a telecommunications network. The method includes: setting up a first communication with a caller terminal; obtaining, via the set-up communication, a datum identifying the voice assistant; transmitting a setup message for setting up a second communication to the identified voice assistant, the message containing at least one parameter suitable for activating a remote operating mode of the voice assistant; and connecting the first and second communications.
Abstract:
A method and a device establish a communication initiated by a terminal sending a communication request to a shared public identity associated with at least two destination terminals. The terminal sending the request receives at least one provisional response to the communication request, originating from one of the two destination terminals. From the provisional response received, the terminal sending the request obtains an address identifying the destination terminal that sent the provisional response received. The terminal sending the request sends a message to find out the capacities of a terminal to said destination terminal using the address obtained and receives in return a response message to the message to find out the capacities of a terminal originating from the destination terminal; the response message includes the capacities supported by the destination terminal. The terminal sending the request can thus display information representative of the capacities supported by the destination terminal.
Abstract:
Described is a method of exchanging information that is performed by a first device with a second device, both of which devices are registered with a voice over IP core network, the first device having placed a call over a circuit-switched network to a third device, said call actually being set up between the first device and the second device. In one embodiment, the method comprises: receiving over the circuit-switched network a message confirming that the call has been set up with the second device, which message includes an identifier of the second device on the circuit-switched network; and exchanging information with the second device via the core network and using the identifier of the second device, which information relates to the capacity of the first and/or second device to support at least one rich communication multimedia service.
Abstract:
A method for suggesting applications applied by a terminal compatible with its operating system, is disclosed. One aspect of the method includes receiving a link for accessing the downloading of the application and restoring a message suggesting to the user the downloading; The method further includes determining at least one data structure including identifiers; selecting at least one identifier; generating from the identifier a domain name including an indication of the operating system; and sending the domain name to a server capable of providing a corresponding link for accessing the domain name. Lastly, the access link is received in response to said sending step. A system and device for implementing the method are also disclosed.
Abstract:
A method is described for determining a set of coding formats usable by a first terminal to establish communications with a second terminal. The method includes obtaining, from a server, a first set of coding formats permitted on the communication network, and associated with a type of access network and with a type of communication service, and obtaining a second set of coding formats supported by the terminal, a type of access network, and a type of communication service which are used by the terminal. A third set of coding formats are determined, corresponding to a set of coding formats supported by the terminal and permitted by the network with regard to the type of network access and to the type of communication service used by the terminal, and a setup message is transmitted to the second terminal including at least one coding format included in the third set when the third set is not empty.
Abstract:
The invention concerns a method for managing the connection of a first terminal connected to a first access network accessing a communication network and capable of connecting to a second access network accessing said communication network, implemented by a management module of the communication network, said management module being capable of determining a list of access networks to which the first terminal is likely to connect. After receiving (E209) a piece of connectivity information relative to a second terminal, the management method comprises a step (E210) of updating the list of access networks according to the received connectivity information and a step (E211) of transmitting said updated list to the first terminal such that the first terminal connects (E212) to the second access network.
Abstract:
A monitoring method implemented by an access point for a network that can maintain an address association table is described. The method can include selecting at least two entries in the address association table, storing at least one predetermined characteristic obtained over a predefined period of time for each inflow and each outflow associated with the selected entries, and comparing, for at least one pair of selected entries, at least one stored characteristic for an inflow associated with one of the entries of the pair with the at least one corresponding stored characteristic for an outflow associated with the other entry of the pair. If, for at least one pair of entries, the comparison step indicates that an inflow associated with one of the entries of the pair transports an application content of the same nature as an outflow associated with the other entry of the pair, a risk of fraud can be detected.
Abstract:
One embodiment relates to a processing method for a communication intended for at least one receiving terminal. The method may comprise receiving a communication intended for the at least one receiving terminal and obtaining a certified identifier and an uncertified identifier of a sender of the communication, the identifiers being comprised in a signal message for the communication. The method may further comprise comparing the certified identifier with the uncertified identifier and processing the communication including a process for searching for the certified identifier in a list containing certified identifiers for senders associated with uncertified identifiers of those senders; the processing process being based on the results of the comparison process and the searching process.