摘要:
VoIP networks and methods are disclosed for distributing media resources in a VoIP network for providing services. VoIP endpoints, media gateways, and/or other network nodes in the VoIP network report available media resources (i.e., available processing capacity) that are able to provide services, such as providing announcements, DTMF digit collection, etc, to a distributed resource server. The distributed resource server then assigns the available media resources among the VoIP endpoints and/or media gateways to perform services for calls in the VoIP network in order to distribute the tasks of performing services among different nodes of the VoIP network.
摘要:
Methods and systems for controlled provision of communications services to shared plan subscribers, in which a shared plan defines individual restrictions for a plurality of subscribers, wherein services are selectively provided services to the shared plan subscribers based on subscriber usage and the corresponding individual restrictions defined for the shared plan.
摘要:
IMS networks and associated methods are disclosed that provide charging for CAMEL services provided in the IMS network. If a CAMEL service is provided by an application server for a session in an IMS network, then the application server generates CAMEL charging data for the service provided and also generates a charging message, such as a Diameter ACR message. The application server includes the CAMEL charging data in the charging message and transmits the charging message to a charging collector system. The charging collector system generates a CDR for the session, and maps the CAMEL charging data from the charging message to the CDR. The charging collector system then transmits the CDR to a billing system. The billing system may then charge for the CAMEL service provided in the IMS network.
摘要:
IMS networks and methods are disclosed for authenticating a communication device and a user of the communication device. When a communication device attempts to register with an IMS network, the IMS network receives a register message from the device that includes device authentication information, such as a public or private identifier for the device. The IMS network processes the device authentication information to authenticate the communication device. The IMS network also receives user authentication information from the device, such as a password. The IMS network processes the user authentication information to authenticate the user of the device. The device and the user are both authenticated by the IMS network. Authentication of the user may also occur when originating a session or terminating a session over the IMS network with the device.
摘要:
This invention relates to apparatus and a method for assembling and coordinating call data records from a plurality of network elements of an Internet Protocol Multimedia System call to generate charging information. A pre-biller stores an integrated charging record and accesses a rating engine to obtain the charging information to complete a charging data record. Advantageously, the information from a plurality of network elements is integrated into a combined charging data record.
摘要:
Call rating systems and methods using a mobile to mobile database with operator prefixes and a rating key table in which network operators subscribed to by mobile to mobile calling and called parties are identified by database queries and a rating key is obtained according to the prefixes to rate the call according to the rating key value representing agreed discounts for calls between subscribers of mobile network operators and mobile virtual network operators.
摘要:
Systems and method for storing information of a user within a medical information card and for controlling access to the information by a third party. The medical information card comprises a storage medium adapted to store the medical records of the patient. The medical information card further comprises a processing system coupled to the storage medium adapted to receive a request for access to the medical records by the third party and to determine a subset of the medical records that the third party is authorized to access based on the request. The medical information card further comprises an interface system coupled to the processing system adapted to exchange the subset of the medical records with the external data system of the third party in response to authenticating the request.
摘要:
A method and apparatus for allowing a reseller to securely access and manage scratch cards at a recharge card management system that is maintained by the service provider. The service provider and reseller users of the recharge card management system can create a scratch card batch that is associated with the reseller account identification. The service provider and reseller users can search, view and modify scratch card data based on security and accessibility. Advantageously, the reseller or distributor can only manage and sell scratch card only to its own account identification, thus protecting such transactions against fraud.
摘要:
Systems and methods are disclosed that determine whether incoming calls are in a home local calling area (LCA) in a wireless network. One embodiment comprises an LCA determination system that includes a processing system and a mapping data structure. The mapping data structure includes a plurality of entries that map a switch/cell identifier (e.g., an MSC/cellsiteID) to a set of LCA identifiers. For a call in a wireless network, the processing system receives a switch/cell identifier, masks the sector identifier from the switch/cell identifier, and searches the mapping data structure based on the masked switch/cell identifier to identify an associated set of LCA identifiers. The processing system then compares the set of LCA identifiers to a subscriber profile to determine if an LCA identifier matches. If there is a match, then the processing system determines that the call is in a home LCA.
摘要:
Phonebook systems and associated methods are disclosed that provide a mechanism for protecting private information of a contact from being published in a network-based phonebook. A typical network-based phonebook service allows subscribers to set up network-based phonebooks, where each phonebook includes one or more contacts and associated contact information. Before contact information for a contact is included in a network-based phonebook for a subscriber, a phonebook system identifies privacy criteria for the contact. The privacy criteria may be predefined by the contact, predefined by the service provider, or predefined by another entity. The phonebook system then processes the privacy criteria to identify the contact information for the contact that is authorized to be included in the network-based phonebook. The processing system may then include the authorized contact information in the network-based phonebook, and block the unauthorized contact information from being included in the network-based phonebook.