摘要:
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based on the key generating value. A secure session invitation message is received from the first device. A master session key is generated and encrypted using the temporary session key associated with the first device. The encrypted master session key is transmitted to the first device.
摘要:
Different access networks may perform signaling and data delivery (bearer connection) for communication services. A device may determine, in response to a request for a service from a user of the device, whether the device is connected to a non-cellular access network. The device may transmit, when it is determined that the device is connected to the non-cellular access network, one or more control messages, relating to establishment of the service, using the non-cellular access network. The device may transmit, when it is determined that the device is not connected to the non-cellular access network, the one or more control messages, using a cellular access network. The device may establish, with a party with which the service is to connect, a bearer connection for the service over the cellular access network.
摘要:
A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network.
摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.
摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.
摘要:
A telecommunications network receives an indication that a user device, communicatively coupled to the telecommunications network, is a latency-insensitive device; receives connection information associated with a connection between the user device and the telecommunications network; stores, based on the indication that the user device is a latency-insensitive device, at least a portion of the connection information, associated with the connection between the user device and the telecommunications network, in a virtual memory of the server device; receives an indication that the connection is to become active; and places, based on receiving the indication that the connection is to become active, at least the portion of the connection information, associated with the connection between the user device and the telecommunications network, in a physical memory of the server device.
摘要:
An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.
摘要:
A user equipment (UE) provides for display, to a user, information identifying available over-the-top (OTT) services provided via voice-over-Long-Term Evolution (VoLTE), and receives, from the user, a selection of a particular OTT service of the available OTT services. The UE receives, from the user, information identifying a selected contact associated with the particular OTT service, and determines whether a particular UE associated with the selected contact is a VoLTE capable device or a non-VoLTE capable device. The UE provides a call to the particular UE, via a LTE network and an Internet protocol (IP) Multimedia Subsystem (IMS) network, when the particular UE is a VoLTE capable device.
摘要:
A device detects an impermissible behavior by a user device. The device further identifies a rule associated with the impermissible behavior and executes a response to the impermissible behavior based on the rule. The response restricts access of the user device to a service provided by or via a network device. The device also transmits, to the user device, a message that specifies the response. The device also verifies a termination of a cause of the impermissible behavior and restores the access of the user device to the service.
摘要:
A mobile device may monitor availability of access networks that provide connectivity for the mobile device. The mobile device may also store preference information, on a per-application basis, relating to preferences for using the access networks by applications executed by the mobile device. The mobile device may additionally select, in response to a request from an application to connect to the network, one of the access networks, based on the preference information for the application; and provide a communication channel for the application using the selected access network.