摘要:
A method of processing short message service (SMS) calls for a subscriber's communication device in a communication network is provided. The method comprises: receiving an SMS request involving the communication device at a short message service center; accessing a family access control database storing family access control information received for the communication device; and determining whether the short message service request should be allowed or denied based on the information found in the database.
摘要:
A method of processing short message service (SMS) calls for a subscriber's communication device in a communication network is provided. The method comprises: receiving an SMS request involving the communication device at a short message service center; accessing a family access control database storing family access control information received for the communication device; and determining whether the short message service request should be allowed or denied based on the information found in the database.
摘要:
A wireless network is disclosed that provides repeat dialing to busy called parties. The wireless network includes an originating MSC system that serves a calling party, and a terminating MSC system that serves a called party. The calling party initiates a call to the called party through the originating MSC system, and the terminating MSC system determines that the called party is busy on another call. The originating MSC system then receives a repeat dialing instruction from the calling party and transmits a repeat dialing indicator to the terminating MSC system. The terminating MSC system identifies when the called party becomes available in substantially real time. When available, the terminating MSC system attempts to set up a call between the called party and the calling party.
摘要:
Wireless networks and methods are disclosed that provide for anonymous call blocking in wireless networks. A wireless network of the invention includes an MSC system and an HLR system. When a calling party initiates a call to a called party, the MSC system receives the call and generates a call setup message for the call. The call is anonymous, so the call setup message does not include caller ID information for the calling party. The MSC system receiving the call transmits the call setup message to the HLR system. The HLR system determines if the call setup message includes caller ID information, and determines if the called party subscribes to anonymous call blocking. Responsive to determining that there is no caller ID information in the call setup message and that the called party subscribes to anonymous call blocking, the HLR system instructs the MSC system to block the call.
摘要:
A wireless network is disclosed that provides repeat dialing to called parties that are powered off. The wireless network includes an originating MSC system, a Home Location Register (HLR) system for a called party, and a serving MSC system that serves the called party. Responsive to identifying that the called party is powered off, the calling party transmits a repeat dialing instruction to the originating MSC system. The originating MSC system then transmits a repeat dialing indicator to the HLR system for the called party. The HLR system for the called party identifies when the called party powers on. When the called party does power on, the HLR system transmits an instruction to the serving MSC system to attempt to set up a call between the called party and the calling party.
摘要:
Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if the application is authorized by a service provider based on information provided in the web service request. If the application is authorized, then the web service gateway identifies a profile for an end user that initiated the web service using the application, and determines if the web service is allowed for the end user based on the profile. If the web service is allowed for the end user, then the web service gateway determines that the application is authenticated, converts the web service request to a protocol used by a server that provides the web service, and transmits the web service request to the server.
摘要:
A method of managing components of an AES includes: a) providing an application developer with access to a workflow designer engine via a developer portal, wherein the workflow designer engine and developer portal are in operative communication with an AES; b) activating a network application manager of the workflow designer engine in response to the application developer selecting a manage network application function via the user device in conjunction with a graphical user interface (GUI) controlled by the developer portal; and c) creating a new network application using archetypes of the workflow designer engine and repositories of the developer portal in response to the application developer defining at least some parameters for the new network application in conjunction with the GUI. An associated apparatus includes a workflow designer engine server with a workflow designer engine module; and a developer portal server with a developer portal module.
摘要:
Systems and methods are disclosed for providing service management across different technology networks. A centralized telecom serving system (TSS) includes a plurality of interface gateways, a central adapter, and a common interface. When in operation, a first interface gateway receives a first service request from a first network, and converts the first service request from a signaling interface used in the first network to the common interface. The central adapter receives the first service request over the common interface, and processes service management logic to identify multiple services that trigger on the first service request and determine a sequence for providing the multiple services. For each service, the central adapter generates a second service request in the common interface, and transmits the second service request to a second interface gateway that is coupled to a second network.
摘要:
The invention describes process for demetallation of vegetable oils and animal fats to reduce metal content below 1 ppm to make them suitable for hydroprocessing feedstocks. The process comprises acid treatment with very low concentration of acids, utilizing synergistic effect of phosphoric acid and citric acid, followed by counter-current treatment with clay without intermediate step of water washing and treatment with ion exchange resin.
摘要:
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital data storage is protected by a service provider firewall. A request to expose subscriber data from a third-party requestor is received. Selected subscriber data and a security condition associated with the request are determined, wherein the security condition is based on an identity of the third-party requestor. The selected subscriber data is retrieved if the security condition is satisfied, and the selected subscriber data is transmitted to the third-party requestor.