摘要:
A system and method for providing dynamic call disposition service to a wireless terminal that may be occupied or unoccupied. In response to a call to the wireless terminal in a voice domain, call disposition options are provided to the wireless terminal in a data domain. A call disposition action is then taken according to an option selection made at the wireless terminal as part of a cooperative effort between resources in the voice and data domains.
摘要:
A system and method for remote activation of customized telecommunication services are provided for data network telephony subscribers in a data network. In response to a call originator placing a call to a terminating telephony subscriber in the data network, a telephony server routes the call according to custom telecommunication service instructions provided in advance by the telephony subscriber and stored remotely from the telephony subscriber's point of presence on the data network. The call originator may be a data network telephony subscriber or a subscriber in the Public Switched Telephone Network (PSTN). The telephony server preferably performs the call routing based custom telecommunication service instructions (along with the subscriber's network address) retrieved from a subscriber profile server that maintains a subscriber profile database. A registration server may be provided to forward a data network address assigned to the telephony subscriber to the subscriber profile server when telephony service is invoked. Registration service may be provided on behalf of dial-up data network telephony subscribers in association with a network access server.
摘要:
A method is provided for administering a game over a wireless telecommunications network (30) serving a number of mobile terminals (20). The wireless telecommunications network (30) includes a number of base stations (32) providing wireless communication coverage for corresponding geographically defined cells (34). The method includes: establishing a game offering in response to a triggering event; designating a region in response to the established game offering; locating mobile terminals (20) within the designated region; sending over the wireless telecommunications network (30), to mobile terminals (20) within the designated region, an invitation to participate in a game in accordance with the established game offering; and, collecting over the wireless telecommunications network (30), from mobile terminals (20) to which the invitation was sent, responses to the invitation, the responses indicating that the invitation to participate in the game has been accepted or declined.
摘要:
In a system and method for providing data application-triggered call volume management, data application content is multicast to a plurality of wireless terminals, the data application content containing a voice call origination invitation. A high voice traffic warning is generated in response to the multicasting event, and resources are allocated for handling increased voice traffic in response to the high voice traffic warning.
摘要:
The priority communication system provides the capability to restrict access to wireless communications services to emergency service personnel, such that their access to wireless communication services is not interruptible. This is accomplished by provisioning the cell sites of a wireless communications system to respond to at least one service priority grouping, with emergency service personnel being assigned a selected service priority by a centralized emergency services agency. The service priority coverage area and emergency service personnel assigned the service priority are defined on a dynamic basis by the centralized emergency services agency and are indicated by a priority call access code that is transmitted to the emergency service personnel. In order to ensure the proper operation of the priority communication system, the priority call access codes are maintained in secrecy to thereby enable emergency service personnel to have access to wireless communications facilities.
摘要:
A system and method for providing data network-assisted conference service to a wireless terminal. Conference-related information is received from a conference originator and stored. Prior to conference establishment time, a conference notification message is sent to the wireless terminal. A conference connection request is sent by the wireless terminal in response to the conference notification message, and a conference connection is established between the wireless terminal and a conference bridge that connects all conference participants.
摘要:
Techniques are disclosed for lawfully intercepting information in communication environments with end-to-end encryption. For example, a method for intercepting encrypted communications exchanged between a first computing device and a second computing device in a communication network, wherein the interception is performed by a third computing device in the communication network, comprises the following steps. The third computing device obtains one or more packets having a packet address associated with one of the first computing device and the second computing device. The one or more packets are obtained by the third computing device, in response to at least one interception routing policy being implemented in at least one element in the communication network, such that the one or more obtained packets may be decrypted so as to obtain data contained therein. The third computing device preserves the packet address of the one or more obtained packets. The third computing device forwards the one or more packets toward a packet-destination one of the first computing device and the second computing device such that the packet-destination one of the first computing device and the second computing device is unable to detect from the one or more packets that the one or more packets were intercepted by the third computing device.
摘要:
A method of administering network selections for a mobile station between a second generation/third generation wireless network and wireless local area networks includes detecting when the mobile station encounters a wireless area network, and communicating an identity of the encountered wireless area network to the second generation/third generation wireless network. The communicating prompts a query for permission to establish a session between the mobile station and the encountered wireless local area network. When permission is granted, the method includes receiving a key distributed to the mobile station. The key is used by the mobile station to establish a session between the mobile station and the encountered wireless local area network.
摘要:
A method and apparatus for identifying a caller who does not provide caller identification on an unanswered call. The caller is asked to record his/her name (or some other characteristic utterance). If the call is unanswered, the record is retained and can be accessed by the called party when that party requests his/her stored voice mail. Advantageously, even on unanswered calls, the identity of the caller can be presented to the called party when that called party requests stored voice mail messages, even if the calling party has private service.
摘要:
An audible confirmation system automatically and seamlessly outputs an audible name of a call recipient to a calling party. This audible confirmation system is preferably configured to audibly identify the call recipient to the calling party prior to the call recipient and the calling party communicating with each other. The audible confirmation system preferably includes a text to speech converter coupled to an intelligent network architecture having at least one calling name database. The audible confirmation system allows the calling party to audibly identify the call recipient to the calling party without any input from the call recipient and without using any special equipment such as a display screen by the calling party. The audible confirmation system is especially useful when the call recipient does not have voice mail service and is not available to receive a call. For example, by utilizing the audible confirmation system, the calling party is able to confirm the identity of the call recipient prior to leaving a confidential message for the call recipient by utilizing the calling party's voice mail delivery system for automatically delivering the confidential message to the call recipient.