摘要:
A system configured to receive a request to identify a quality of service (QoS) policy to be used to process traffic that is received from a user device associated with another network; obtain an interoperable QoS policy, where the interoperable QoS policy identifies a first QoS level, associated with the other network, that corresponds to a type of traffic received from the user device; obtain, from the interoperable QoS policy, a second QoS level that corresponds to the first QoS level; and send, to a device, an instruction to process the traffic based on the second QoS level.
摘要:
A system configured to receive, from a user device, traffic associated with a request to initiate a call session; detect a condition associated with the traffic; determine whether to establish the call session based on whether the condition, associated with the traffic, is a particular type of condition; send, to a server device, a notification to perform an operation to remedy the condition when the condition does not correspond to the particular type of condition, where sending the notification enables the server device to identify a type of condition, identify an operation that remedies the condition based on the type of condition, or initiate the operation to remedy the condition; and establish the call session when the type of condition corresponds to the particular type of condition, where establishing the call session enables a call, placed by the user device, to be processed as a normal call.
摘要:
A server device may identify that a user device is connected to a first radio access network (“RAN”), via a first technology. The server device may identify that the user device is capable of accessing a second RAN, via a second technology, where the second RAN is different from the first RAN, and where the second technology is different from the first technology. The server device may also receive an indication that the first RAN is congested. The server device may further determine, based on the indication that first RAN is congested, and further based on identifying that the user device is capable of accessing the second RAN via the second technology, that the user device should be handed over to the second RAN. Additionally, the server device may instruct the user device to connect to the second RAN via the second technology.
摘要:
A network device may store information identifying a coverage area associated with each of one or more cells that are associated with the network device. The network device may receive information identifying a geographic location of a user device. The network device may compare the geographic location of the user device to one or more of the stored coverage areas. The network device may also determine, based on the comparing, that the user device is within a particular coverage area of a particular cell, of the one or more cells. The network device may further send, to the user device, and based on determining that the user device is located within the particular coverage area of the particular cell, an instruction for the user device to connect to the particular cell, where the user device is to attempt to connect to the particular cell in response to the instruction.
摘要:
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device.
摘要:
Different access networks may perform signaling and data delivery (bearer connection) for communication services. A device may determine, in response to a request for a service from a user of the device, whether the device is connected to a non-cellular access network. The device may transmit, when it is determined that the device is connected to the non-cellular access network, one or more control messages, relating to establishment of the service, using the non-cellular access network. The device may transmit, when it is determined that the device is not connected to the non-cellular access network, the one or more control messages, using a cellular access network. The device may establish, with a party with which the service is to connect, a bearer connection for the service over the cellular access network.
摘要:
A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network.
摘要:
An approach for providing mobile device scanning is described. A file stored within a mobile device is received. A scan of the received file is initiated to determine a status relating to presence of an unauthorized code or to execution of an unauthorized activity. A notification message is generated based on the scan, wherein the notification message specifies information relating to the determined status.
摘要:
A mobile terminal receives a class identifier and receives a broadcast message with a backoff period definition for multiple classes of mobile terminals. The mobile terminal applies the class identifier to the backoff period definition to determine a backoff interval for the mobile terminal. The mobile terminal sends, to a base station, a radio resource control (RRC) connection request using the calculated backoff interval. Different backoff intervals are assigned to different classes of mobile terminals to control network access congestion at the base station.
摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.