摘要:
Machine-to-Machine (M2M) communications, for various telemetry applications, such as meter reading, alarm applications or the like, utilize data communication service via a public mobile/wireless communication network, such as the short message service (SMS). However, such M2M communications may involve a large number of clients. To avoid the need to assign a telephone number, such as a mobile directory number (MDN) or the like, to each of the many remote M2M clients, routing through the network is based on another type of MSID (Mobile Station Identifier), such as the MIN (Mobile Identifier Number) or the IMSI (International Mobile Station Identifier) of the client. SMS messages transmissions originating at a client use a short code for the M2M application address, and SMS messages intended to terminate at a client use the MIN or IMSI as the routing address for the M2M device.
摘要:
Machine-to-Machine (M2M) communications, for various telemetry applications, such as meter reading, alarm applications or the like, utilize data communication service via a public mobile/wireless communication network, such as the short message service (SMS). However, such M2M communications may involve a large number of clients. To avoid the need to assign a telephone number, such as a mobile directory number (MDN) or the like, to each of the many remote M2M clients, routing through the network is based on another type of MSID (Mobile Station Identifier), such as the MIN (Mobile Identifier Number) or the IMSI (International Mobile Station Identifier) of the client. SMS messages transmissions originating at a client use a short code for the M2M application address, and SMS messages intended to terminate at a client use the MIN or IMSI as the routing address for the M2M device.
摘要:
A system may include one or more network devices. The one or more network devices may receive a short message service (SMS) message intended for an access terminal, embed the SMS message into a data message, determine whether a data session exists with the access terminal, the data session occurring over a data network, transmit the data message to the access terminal via the data network when the data session exists, and transmit the SMS message via a voice network when the data session does not exist.
摘要:
A device monitors a session description protocol (SDP) parameter associated with a voice over Internet protocol (VoIP) call provided via a network and a user equipment, and determines, based on the SDP parameter, whether the VoIP call changed from an active state to a hold state or from a hold state to an active state. The device also sends, after the VoIP call is determined to change from an active state to a hold state, a session initiation protocol (SIP) keep alive message to the user equipment to prevent the user equipment from entering a dormant state and to prevent a radio link connection between the user equipment and the network from being released.
摘要:
A device monitors a session description protocol (SDP) parameter associated with a voice over Internet protocol (VoIP) call provided via a network and a user equipment, and determines, based on the SDP parameter, whether the VoIP call changed from an active state to a hold state or from a hold state to an active state. The device also sends, after the VoIP call is determined to change from an active state to a hold state, a session initiation protocol (SIP) keep alive message to the user equipment to prevent the user equipment from entering a dormant state and to prevent a radio link connection between the user equipment and the network from being released.
摘要:
A device may obtain calling security parameters, may communicate the calling security parameters to a network device, and may receive, from the network device, a calling parameters identifier associated with the calling security parameters. The device may communicate the calling parameters identifier to a called device, may receive a called parameters identifier from the called device, and may communicate the called parameters identifier to the network device. The device may receive called security parameters from the network device, may create a security key based on the calling security parameters and the called security parameters, and may communicate with the called device using the security key.
摘要:
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.
摘要:
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.
摘要:
A system configured to receive a request to identify a quality of service (QoS) policy to be used to process traffic that is received from a user device associated with another network; obtain an interoperable QoS policy, where the interoperable QoS policy identifies a first QoS level, associated with the other network, that corresponds to a type of traffic received from the user device; obtain, from the interoperable QoS policy, a second QoS level that corresponds to the first QoS level; and send, to a device, an instruction to process the traffic based on the second QoS level.
摘要:
A device receives a call for a user device associated with an Internet protocol multimedia subsystem (IMS) network, where the call includes a mobile directory number (MDN) associated with the user device, and retrieves, from a home location register (HLR), an address of a wireless intelligent network (WIN) termination trigger service control point (SCP). The device sends, to the WIN termination trigger SCP, a first message that includes the MDN, receives, from the WIN termination trigger SCP, a second message that includes steering digits as a prefix to the MDN, and generates a third message that includes a called party number set to the MDN and omits the steering digits. The device also routes, based on the steering digits, the third message to a media gateway control function/media gateway (MGCF/MGW) of the IMS network, where the MGCF/MGW further processes the call.