Abstract:
A wireless network that provides notify me service for calls directed to called stations not currently registered on a network. A wireless network includes a network interface that serves a call from a calling station, and a called station network that serves a called station. The calling station initiates a call to the called station through the network interface to the called station network. The called station network determines that the called station is not currently registered on the network. Responsive to the called station not being registered, the network interface receives a notify me dialing instruction from the calling station and transmits a notify me dialing indicator to the called station network. The called station network determines when the called station registers, and transmits an indication for receipt by the calling station that the called station is registered.
Abstract:
A method and apparatus for blocking unwanted messages (spam) in a telecommunications network. A location server of the network stores black lists of message sources which are known or believed to be generators of spam messages, or sources from which a particular destination does not wish to receive messages. When a location inquiry is made to a location server, such as a home location register (HLR) of a mobile network or a home subscriber server (HSS) of an Internet Protocol network, wherein is stored a table of sources which have been black listed because they are believed to be sources of spam messages. Advantageously, this arrangement avoids use of network resources to make extensive checks to identify spam messages.
Abstract:
Methods and apparatus are provided for tunneling (transparently transmitting) over a packet network, from a source to a destination, the spectrum of one or more bandpass channels individually selected from a larger spectrum at the source. Each channel is selected, translated to baseband (using sampling techniques), digitized, framed, merged with other digital services, transmitted (along with associated attribute information) using packet techniques, and later reconstructed. The present invention provides a selective and efficient use of available bandwidth, in that it is not necessary to transmit the entire spectrum, when only one or few portions of the spectrum are desired. This in turn, reduces bandwidth requirements all along the transmission path and at the source and destination. The reduced bandwidth requirements have associated reductions in power and costs.
Abstract:
An error correction decoder which includes a syndrome calculator, an error locator polynomial calculator, a standard error locator polynomial calculator, an error transform calculator and an inverse error transform calculator. These error correction decoder calculators provide a pipelined architecture for performing Reed-Solomon error correction calculations quickly. In the inverse error transform calculator, a method for calculating inverse error transforms is used. The method is adapted to receive error transforms in the same sequence as the error transforms are output by the error transform calculator without the need for buffering between the error transform calculator and the inverse error transform calculator and without the addition of substantial timing delays. In particular, the inverse error transform calculator is adapted to receive error transforms in the sequence E.sub.0, E.sub.1 . . . E.sub.N-1. The inverse error transform calculator is adapted to calculate inverse error transforms using the equation ##EQU1## In one embodiment, the inverse error transform calculator implements the method using a semiconductor device having adders, multipliers, memory elements and a recursive feedback loop to implement this equation. The inverse error transform calculator may use a plurality of cells to calculate a plurality of inverse error transforms.
Abstract:
Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if the application is authorized by a service provider based on information provided in the web service request. If the application is authorized, then the web service gateway identifies a profile for an end user that initiated the web service using the application, and determines if the web service is allowed for the end user based on the profile. If the web service is allowed for the end user, then the web service gateway determines that the application is authenticated, converts the web service request to a protocol used by a server that provides the web service, and transmits the web service request to the server.
Abstract:
A method of managing components of an AES includes: a) providing an application developer with access to a workflow designer engine via a developer portal, wherein the workflow designer engine and developer portal are in operative communication with an AES; b) activating a network application manager of the workflow designer engine in response to the application developer selecting a manage network application function via the user device in conjunction with a graphical user interface (GUI) controlled by the developer portal; and c) creating a new network application using archetypes of the workflow designer engine and repositories of the developer portal in response to the application developer defining at least some parameters for the new network application in conjunction with the GUI. An associated apparatus includes a workflow designer engine server with a workflow designer engine module; and a developer portal server with a developer portal module.
Abstract:
Systems and methods are disclosed for providing service management across different technology networks. A centralized telecom serving system (TSS) includes a plurality of interface gateways, a central adapter, and a common interface. When in operation, a first interface gateway receives a first service request from a first network, and converts the first service request from a signaling interface used in the first network to the common interface. The central adapter receives the first service request over the common interface, and processes service management logic to identify multiple services that trigger on the first service request and determine a sequence for providing the multiple services. For each service, the central adapter generates a second service request in the common interface, and transmits the second service request to a second interface gateway that is coupled to a second network.