摘要:
The graphical display capability and the digital data communication capability of wireless mobile handsets are used to present a customized directory of a called enterprise on the display screen of the mobile handset to allow the caller to identify their desired call destination by name. A directory database stores directory information for each call destination of the enterprise. An incoming call to an enterprise IVR unit causes a directory manager to generate a request for user data which is forwarded to the mobile handset via a gateway. The mobile handset opens a data connection and forwards the user data to the directory manager. The directory manager evaluates at least one access rule in response to the user data to select relevant directory information from the directory database, and the directory manager forwards the relevant directory information to the mobile handset for display. Then the user of the mobile handset selects a call destination based on the displayed directory information.
摘要:
Directory information is displayed on a mobile handset of a user when a dialed telephone number is a directory-capable number. A directory processor receives the dialed telephone number and checks whether the dialed telephone number appears in a database of directory-capable telephone numbers. A gateway pushes a data message including a data address of a directory server to the mobile handset. The directory server stores directory information for a plurality of call destinations with respective destination identifiers and respective access rules. A client application in the mobile handset responds to the data message. The directory server identifies relevant directory information based on the dialed telephone number and transmits it to the client application via the data call. The client application displays the relevant directory information and the user selects a call destination.
摘要:
A method of communication is provided. The method comprises receiving a voice call and, based on receiving the voice call, accessing a plurality of stored messages transmitted by an originator of the voice call. The method further comprises presenting the identity of the originator of the voice call and at least part of one of the stored messages.
摘要:
Disclosed is a method and system in which an intermediary is provided within a communication path through which a message is transmitted from its originator to a client device, and the intermediary operates to insert into the message a target port number based at least in part on the originator of the message. In a scenario where the message originator provided or is otherwise associated with a given application group on the client device, the intermediary may thus modify the message to have the message designate as target port number the port number that the client device associates with the application group. Ultimately, when the client device receives the message, the client device would read the target port number and responsively route the message to the appropriate application or application group.
摘要:
Disclosed are methods and systems for using transport-layer source ports to identify sources of packet payloads in mixed tethering and non-tethering environments so that, e.g., a provider may differentially bill between those two types of data communication. In particular, a wireless device capable of sending data from both tethered and non-tethered sources may use specified transport-layer source ports to identify data as coming from various different sources. Network entities that record data usage associated with the device may detect which port the device used to send data and use port-to-source (e.g., port-to-hardware-interface) mapping data to determine the source (e.g., the source hardware interface) of the data. The network entities may report this data usage, along with the determined data sources, to a billing system so that the billing system may accordingly differentially bill a subscriber associated with the device.
摘要:
A method of providing network access notification is provided. The method can include receiving an identification for a wireless device at an access gateway and determining that the wireless device is not authorized to access a communication network based on the received identification. The method can further include sending a rejection notification to a messaging node indicating that the wireless device is not authorized to access the communication network and sending an access notification from the messaging node to an authorization device when the rejection notification is received at the messaging node. The access notification can include network access information to enable the wireless device to access the communication network. The authorization device is determined based on the identification. The method can also include receiving a response from the authorization device based on the network access information, and enabling access from the wireless device to the communication network.
摘要:
Exemplary methods and systems may provide a soft-inactivity notification during a VoIP call, which according to an exemplary embodiment involves a SIP session and packet-data communications between participants in the VoIP call. The method comprises (a) detecting that packet-data communications in the VoIP call have been interrupted; (b) in response to determining that the packet-data communications have been interrupted, making a determination as to whether or not the SIP session is active; (c) if the SIP session is active, then initiating a soft-inactivity notification procedure; and (d) otherwise, if the SIP session is inactive, refraining from initiating the soft-inactivity notification procedure. The soft-inactivity notification thus notifies a user that while the call has been interrupted, the call may be re-established without requiring the user to reconnect.
摘要:
A wireless device comprises a first unit and a second unit. Each of the first and second units comprises a respective transceiver, controller, display, and housing to support the transceiver, controller, and display. When the first and second units communicate through the first and second transceivers, the wireless device communicates with a communication network through one of the first or second transceiver.
摘要:
An apparatus may comprise a location-aware application, a first location detector, and a data storage device. The storage device may contain service-access-point (SAP) data that identifies a first SAP through which the apparatus may access a second location detector. The first detector may obtain data from the second detector via the first SAP and use the obtained data to determine a location of the apparatus. This determined location may be provided to the location-aware application. The data storage may include program instructions for modifying the SAP data such that the SAP data identifies a second SAP through which the apparatus may access a third location detector. The first detector may obtain data from the third detector via the second SAP and then use the obtained data to determine a location of the apparatus. This determined location may be provided to another location-aware application that is executable at the apparatus.
摘要:
A mobile communication device. The mobile communication device comprises a radio transceiver to communicatively couple the mobile communication device to a radio access network by a wireless communication link, a memory, a processor, and an application stored in the memory. When executed by the processor, the application builds a communication history of the mobile communication device, analyzes the communication history of the mobile communication device to determine a pattern of communication usage of the mobile communication device, monitors recent communication usage of the mobile communication device, compares the recent communication usage of the mobile communication device to the pattern of communication usage of the mobile communication device, and when the recent communication usage of the mobile communication device differs from the pattern of communication usage of the mobile communication device by more than a predefined threshold, blocks at least one attempt to initiate communication by the mobile communication device.