摘要:
Methods and systems for mapping user-defined identities in data communication networks. By mapping and translating identities based on a calling party identifier, a called party identifier, and the carrier instance, enhanced communication services are enabled. Enhanced communication services offer virtual private phone numbers, shared group numbers, and interconnection between different voice and messaging services and applications.
摘要:
Methods and systems for mapping user-defined identities in data communication networks. By mapping and translating identities based on a calling party identifier, a called party identifier, and the carrier instance, enhanced communication services are enabled. Enhanced communication services offer virtual private phone numbers, shared group numbers, and interconnection between different voice and messaging services and applications.
摘要:
A system and method that enables session-based and non-session-based application services to be controlled and managed within the IMS/NGN architecture. The IMS/NGN architecture includes a service layer and a transport layer. IMS service control functions are implemented within the service layer, and RACF and transport functions are implemented within the transport layer. The transport functions include access and core network functions, which have corresponding QoS resources. The access or core network function includes an application service control function (ASCF), which includes a PD-FE and a functional element for inspecting packet data flows, and identifying and classifying application services associated with the flows. The ASCF is employed to signal the IMS service control functions on behalf of non-session-based application services, and to reserve and allocate the QoS resources needed to support packet data flows associated with the non-session-based services. As a result, service providers can provide users or subscribers of such non-session-based services with guaranteed or differentiated QoS and/or differentiated service plans, thereby allowing charges to be calculated for the non-session-based services and service plans that are commensurate with the value of the respective service or plan.
摘要:
Methods and systems for identifying and preferring certain content transmissions over others for transport in a multiple subscriber computer network, such as public broadband access network. Preferred transport includes exempting participating content transmissions from bandwidth preservation policies, such as byte capping or rate limiting, or permitting the broadband access network provider to bill for certain identified content transmissions. The participating content transmissions are identified on a number of bases including by sending or receiving application, or by use of tags embedded by the content originator, sender or distributor. Those tagging techniques are also usable to enforce the content owner's distribution rights.
摘要:
Content resources are managed. A request is received from a user for access to a source of content resources. It is determined that the user is authorized for access to the source. A portal Web page is generated based on a set of content element data applicable to the subscriber. The portal Web page is returned to the user. A system for use in managing content resources has a switch for receiving requests from Web browsers, a content resource management engine in communication with the switch, and a billing system in communication with the content resource management engine.
摘要:
Methods and systems for providing scaleable flow based application control in private and public Internet. A flow table can be used to control the application and subscriber traffic for communication flows in access networks. The flow table entry can provide granular, unidirectional packet transmission of data for all or a subset of all host and application communications originating from or destined to network hosts in the access network. Using a flow table entry for multiple unidirectional packet transmissions of data provides efficient use of flow table entries and allows varying operator control of application communication exchanges between network hosts and applications. By using variable masking techniques, the flow table can be used for varying degrees of control over the packet transmissions in the network.
摘要:
Tailored application or service may be delivered via a communication device to a number of subscribers in a manner that avoids having to store individual copies of a service profile on the device for each subscriber receiving the application or service. Specifically, a packet is received requesting delivery of the application or service from the subscriber at a communication device. In response, the communication device retrieves a subscriber context, which references policies that describe each of the applications and services available to the subscriber. The application or service requested by the packet is compared with the policies referenced by the subscriber context to identify any matching policies. Subsequently, the requested application or service is delivered to the subscriber via the communication device according to the matching policies as described by a service profile. This service profile is accessible for describing the application or service when requested by other subscribers. In addition, in some cases each application or service is described by a single set of polices in the service profile. In these instances, each request for the application or service is fulfilled according to that single set of policies.
摘要:
Apparatus and method wherein multiple router interfaces are assigned the same IP network address, creating an IP work group. This enhances host mobility by allowing, in one embodiment, a host to be relocated anywhere in the work group without requiring reconfiguration of the host. As a further option, host address ranges may be specified (i.e., locked) to designated interfaces of the work group, to enhance security by restricting the allowed host mobility within the work group. An additional advantage is a reduced consumption of network and subnet addresses, because now a single address is used for several physical networks.
摘要:
Content resources are managed. A request is received from a user for access to a source of content resources. It is determined that the user is authorized for access to the source. A portal Web page is generated based on a set of content element data applicable to the subscriber. The portal Web page is returned to the user. A system for use in managing content resources has a switch for receiving requests from Web browsers, a content resource management engine in communication with the switch, and a billing system in communication with the content resource management engine.
摘要:
A system and method that enables session-based and non-session-based application services to be controlled and managed within the IMS/NGN architecture. The IMS/NGN architecture includes a service layer and a transport layer. IMS service control functions are implemented within the service layer, and RACF and transport functions are implemented within the transport layer. The transport functions include access and core network functions, which have corresponding QoS resources. The access or core network function includes an application service control function (ASCF), which includes a PD-FE and a functional element for inspecting packet data flows, and identifying and classifying application services associated with the flows. The ASCF is employed to signal the IMS service control functions on behalf of non-session-based application services, and to reserve and allocate the QoS resources needed to support packet data flows associated with the non-session-based services. As a result, service providers can provide users or subscribers of such non-session-based services with guaranteed or differentiated QoS and/or differentiated service plans, thereby allowing charges to be calculated for the non-session-based services and service plans that are commensurate with the value of the respective service or plan.