Abstract:
A device is configured to detect an emergency call from a user device associated with a device identifier, the device identifier including information that identifies the user device. The device is configured to detect that the user device is not associated with a valid originating telephone number, based on detecting the emergency call. The device is configured to determine a temporary originating telephone number, based on detecting that the user device is not associated with a valid originating telephone number, and to store an association between the device identifier and the temporary originating telephone number. The device is configured to transmit the emergency call, with information identifying the temporary originating telephone number, to an emergency call device, the temporary originating telephone number permitting the emergency call device to place a return call to the user device.
Abstract:
A device may receive, from multiple user devices associated with a shared identifier, registration information that includes a unique identifier for each user device of the multiple user devices, and capability information that identifies one or more capabilities of each user device. The device may store the registration information. The device may receive, from a service provider device, a query associated with providing a service, requiring a particular capability, to at least one of the user devices associated with the shared identifier. The query may include the shared identifier. The device may determine, based on the query and the stored registration information, a set of unique identifiers associated with the shared identifier, and may determine a set of capabilities corresponding to each unique identifier. The device may provide, to the service provider device, information that identifies the set of unique identifiers and the set of capabilities.
Abstract:
A system may receive a registration request that identifies a first user device identifier. The system may determine that the first user device identifier is not registered. The system may transmit an authentication challenge. The authentication challenge may request one or more credentials associated with a subscriber profile. The first user device identifier may be associated with the subscriber profile. The system may cause the first user device identifier to be registered based on a challenge response. The first user device identifier may be registered based on a result of authenticating the registration request. The system may receive subscriber information that is associated with the first user device identifier, based on causing the first user device identifier to be registered. The system may determine that the subscriber information identifies a second user device that may be associated with the subscriber profile. The system may provide a notification.
Abstract:
A device may receive, from a mobile device and via a first radio access network, a request for a service. The device may receive a mobile device identifier that identifies the mobile device on a second radio access network. The second radio access network may be a different type of radio access network than the first radio access network. The device may provide the mobile device identifier to an equipment identity register. The device may receive, from the equipment identity register, an authentication indicator that indicates whether to permit or deny access to the service by the mobile device and via the first radio access network. The device may selectively permit or deny the mobile device access to the service, via the first radio access network, based on the authentication indicator.
Abstract:
A method, a device, and a non-transitory storage medium having instructions are provided to receive an attach request from a wireless device to attach to the device; obtain a mobile telephone number of the wireless device from another device of a home wireless network of the wireless device, based on the attach request; receive subsequent to an attachment of the wireless device, a request to establish an unauthenticated Voice over Long Term Evolution (VoLTE) emergency call, wherein the wireless device is not registered with a visited Internet Protocol Multimedia Subsystem and the visited IMS is not communicatively coupled to a home IMS of the wireless device; and provide during an establishment of the unauthenticated VoLTE emergency call, the mobile telephone number to a public access safety point.
Abstract:
An access control device may include logic configured to receive a request from a user device to set up a packet connection for an emergency session to a packet data network via an access network. The logic may be further configured to determine a location associated with the user device; identify a public safety answering point associated with the determined location; determine whether a connection capacity associated with the identified public safety answering point has been reached; and reject the request to set up the packet connection for the emergency session, in response to determining that the connection capacity associated with the identified public safety answering point has been reached.
Abstract:
A device may receive a first request to authenticate a user device for an emergency phone call requested by the user device via a wireless local area network (WLAN). The device may authenticate the user device based on the first request. The device may provide an authentication acceptance message, indicating that the user device is authenticated, based on authenticating the user device. The device may receive a second request, based on providing the authentication message, to establish the emergency phone call. The second request may include an emergency access point name (APN). The device may determine that the emergency APN is not provisioned for the user device. The device may provide, based on determining that the emergency APN is not provisioned, an instruction to allow the emergency phone call from the user device using the preconfigured APN.
Abstract:
A system may receive a registration request that identifies a first user device identifier. The system may determine that the first user device identifier is not registered. The system may transmit an authentication challenge. The authentication challenge may request one or more credentials associated with a subscriber profile. The first user device identifier may be associated with the subscriber profile. The system may cause the first user device identifier to be registered based on a challenge response. The first user device identifier may be registered based on a result of authenticating the registration request. The system may receive subscriber information that is associated with the first user device identifier, based on causing the first user device identifier to be registered. The system may determine that the subscriber information identifies a second user device that may be associated with the subscriber profile. The system may provide a notification.
Abstract:
A device is configured to detect that a user device has failed to receive a call attempt for a call intended for the user device and from a calling party, and determine, based on the detection, that the calling party has not left a voicemail message associated with the call. The device is configured to store missed call information, associated with the call, and send a first missed call notification to the user device, where the first missed call notification includes the missed call information. The device is configured to detect that the user device has not received the first missed call notification, and send a second missed call notification to the user device, where the second missed call notification includes the missed call information.
Abstract:
A method that includes establishing a connection with a default access point, transmitting a request to access or utilize an application, a service, or a resource, receiving a response to the request that includes a location of a serving access point that provides the application, the service, or the resource, establishing a connection with the serving access point, and receiving an assignment of a network address that is anchored by the serving access point.