Abstract:
A mobile device may receive user input for requesting personal information for a subject in proximity of a mobile device and based on the user input, selecting one of available functions. The functions may include a first function for obtaining personal information using a first identifier. The functions may also include a second function for obtaining the personal information using the first identifier. The mobile device may output the personal information as an image to a display or as speech to speaker.
Abstract:
A system may receive a registration request that identifies a first user device identifier. The system may determine that the first user device identifier is not registered. The system may transmit an authentication challenge. The authentication challenge may request one or more credentials associated with a subscriber profile. The first user device identifier may be associated with the subscriber profile. The system may cause the first user device identifier to be registered based on a challenge response. The first user device identifier may be registered based on a result of authenticating the registration request. The system may receive subscriber information that is associated with the first user device identifier, based on causing the first user device identifier to be registered. The system may determine that the subscriber information identifies a second user device that may be associated with the subscriber profile. The system may provide a notification.
Abstract:
A network device receives signaling associated with a wireless device of a subscriber to a delay-tolerant wireless network service, and downloads a service profile of the subscriber from a Home Subscriber Server (HSS) associated with a wireless network. The network device retrieves, from the downloaded service profile, a signaling priority value associated with the subscriber or with the wireless device, and identifies whether the signaling priority value indicates a low priority value. The network device prioritizes the processing of signaling associated with a plurality of wireless devices based on whether the signaling priority value indicates the low priority value, wherein the plurality of wireless devices includes the wireless device.
Abstract:
A method for determining a Quality of Service (QoS) policy can be based on requested bandwidth. The method may initially receive a connection request which includes a requested bandwidth that corresponds to an application. The method may then determine a policy for an application data flow associated with the application based on the connection request. A bandwidth designation, which is based on the requested bandwidth, may be assigned to the application data flow based on the determined policy. Finally, the policy and the bandwidth designation may be provided so that a bearer can be assigned.
Abstract:
A method for determining a Quality of Service (QoS) policy can be based on requested bandwidth. The method may initially receive a connection request which includes a requested bandwidth that corresponds to an application. The method may then determine a policy for an application data flow associated with the application based on the connection request. A bandwidth designation, which is based on the requested bandwidth, may be assigned to the application data flow based on the determined policy. Finally, the policy and the bandwidth designation may be provided so that a bearer can be assigned.
Abstract:
A method, a device, and a non-transitory storage medium having instructions are provided to receive an attach request from a wireless device to attach to the device; obtain a mobile telephone number of the wireless device from another device of a home wireless network of the wireless device, based on the attach request; receive subsequent to an attachment of the wireless device, a request to establish an unauthenticated Voice over Long Term Evolution (VoLTE) emergency call, wherein the wireless device is not registered with a visited Internet Protocol Multimedia Subsystem and the visited IMS is not communicatively coupled to a home IMS of the wireless device; and provide during an establishment of the unauthenticated VoLTE emergency call, the mobile telephone number to a public access safety point.
Abstract:
An access control device may include logic configured to receive a request from a user device to set up a packet connection for an emergency session to a packet data network via an access network. The logic may be further configured to determine a location associated with the user device; identify a public safety answering point associated with the determined location; determine whether a connection capacity associated with the identified public safety answering point has been reached; and reject the request to set up the packet connection for the emergency session, in response to determining that the connection capacity associated with the identified public safety answering point has been reached.
Abstract:
A first server device, associated with a first carrier network, may provide a first identifier of a first application device to a second server device to cause the second server device to store the first identifier. The second server device may be accessible from the first carrier network and from a different second carrier network. The first server device may receive a first message from the first application device; transmit the first message and the first identifier of the first application device towards a client device via the first carrier network and the second carrier network; receive, from a second application device associated with the second carrier network, a second message; identify the second application device based on information, maintained by the second server, associating the second application device with the second identifier; identify a set of policies based on the second identifier; and apply the set of policies.
Abstract:
Bandwidth for a radio access network may be efficiently allocated for certain voice over LTE (VoLTE) services. In one implementation, a request associated with traffic flows may be received. Each of the traffic flows may be associated with an amount of guaranteed bit rate (GBR) traffic. The method may further include selectively summing the GBR traffic, to obtain an aggregate bandwidth value. The method may further include reserving an amount of GBR bandwidth corresponding to the previous version of the aggregate bandwidth value when a comparison indicates that the aggregate bandwidth value is less than the previous version of the aggregate bandwidth value; and reservation an amount of GBR bandwidth corresponding to the aggregate bandwidth value when a comparison indicates that the aggregate bandwidth value is not less than the previous version of the aggregate bandwidth value.
Abstract:
A system may receive a registration request that identifies a first user device identifier. The system may determine that the first user device identifier is not registered. The system may transmit an authentication challenge. The authentication challenge may request one or more credentials associated with a subscriber profile. The first user device identifier may be associated with the subscriber profile. The system may cause the first user device identifier to be registered based on a challenge response. The first user device identifier may be registered based on a result of authenticating the registration request. The system may receive subscriber information that is associated with the first user device identifier, based on causing the first user device identifier to be registered. The system may determine that the subscriber information identifies a second user device that may be associated with the subscriber profile. The system may provide a notification.