摘要:
A method of providing SMS delivery to recipients migrated across different technology networks. The method includes receiving a short message service (SMS) text message from a sender at a short message service center (SMSC), wherein the SMS text message includes a destination number for a recipient of the SMS text message. A first routing request is sent to a database in a first network for SMS routing information for the destination number via a first signal transfer point (STP). The first STP determines whether the destination number is a migrated or a non-migrated destination number based on data received from the first database. An error indication is provided to the SMSC if the destination number and the first routing request are for different communication networks. Finally, a second routing request is sent to a second database in a second network for SMS routing information for the destination number via a second STP.
摘要:
Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if the application is authorized by a service provider based on information provided in the web service request. If the application is authorized, then the web service gateway identifies a profile for an end user that initiated the web service using the application, and determines if the web service is allowed for the end user based on the profile. If the web service is allowed for the end user, then the web service gateway determines that the application is authenticated, converts the web service request to a protocol used by a server that provides the web service, and transmits the web service request to the server.
摘要:
IMS networks and methods are disclosed for storing information on the access network of a user in a subscriber profile for the user. When a communication device of a user attempts to register with an IMS network, a P-CSCF receives a register request message from the communication device, and identifies access network information for the user. The P-CSCF then transmits another register request message to an S-CSCF that includes the access network information, and the S-CSCF in turn forwards the access network information to an HSS. The HSS then stores the access network information in the subscriber profile for the user. Nodes in the IMS network that retrieve the subscriber profile may acquire the access network information to provide services based on the access network information.
摘要:
Systems and methods are disclosed that allow for storing of data messages (e.g., text messages or multimedia messages) in a data message mailbox. If a data message is sent from a sender to a recipient, then the communication network receiving the data message attempts to deliver the data message to the recipient. If unsuccessful in delivering the data message, then the network stores the data message for the recipient. If the communication network later receives a request to retrieve the stored data message from the recipient, then the communication network delivers the stored data message to the recipient.
摘要:
This invention relates to a method and apparatus for blocking spam messages originated in a different network. An anti-spam check is made in response to an initial Send Routing Information (SRI) message received in a destination network of a message. The result of this check is sent back to the originating network along with a destination address of a switch in the destination network, and SRI spam code and Mobile Terminated (MT) Routing Address Correlation ID. If SRI spam code indicates a spam, then subsequent transmission of the MT message with the same Correlation ID is blocked in the interworking switch or SMSC.
摘要:
A spam filtering system is simplified if it has a black list and white list of source terminals for each destination terminal since all traffic from a white list is automatically completed and all traffic from a black list is automatically blocked. In order to avoid traffic problems from problem sources on a white list, traffic measurements are made of traffic from white list sources. If the traffic level and other thresholds exceed a pre-provisioned parameter, then steps are taken to decrease the allowable traffic rate and other measurements from that source and to examine messages from that source to determine whether they include spam messages. Advantageously, the virtues of a white list (simple examination of messages to determine whether they can be passed) can be retained while avoiding the problems of excessive spam traffic from false white list sources.
摘要:
Systems and methods for authenticating applications that access web services. In one embodiment, a web service gateway intercepts a request for a web service from an application, and determines if the application is authorized by a service provider based on information provided in the web service request. If the application is authorized, then the web service gateway identifies a profile for an end user that initiated the web service using the application, and determines if the web service is allowed for the end user based on the profile. If the web service is allowed for the end user, then the web service gateway determines that the application is authenticated, converts the web service request to a protocol used by a server that provides the web service, and transmits the web service request to the server.
摘要:
A method of managing components of an AES includes: a) providing an application developer with access to a workflow designer engine via a developer portal, wherein the workflow designer engine and developer portal are in operative communication with an AES; b) activating a network application manager of the workflow designer engine in response to the application developer selecting a manage network application function via the user device in conjunction with a graphical user interface (GUI) controlled by the developer portal; and c) creating a new network application using archetypes of the workflow designer engine and repositories of the developer portal in response to the application developer defining at least some parameters for the new network application in conjunction with the GUI. An associated apparatus includes a workflow designer engine server with a workflow designer engine module; and a developer portal server with a developer portal module.
摘要:
Systems and methods are disclosed for providing service management across different technology networks. A centralized telecom serving system (TSS) includes a plurality of interface gateways, a central adapter, and a common interface. When in operation, a first interface gateway receives a first service request from a first network, and converts the first service request from a signaling interface used in the first network to the common interface. The central adapter receives the first service request over the common interface, and processes service management logic to identify multiple services that trigger on the first service request and determine a sequence for providing the multiple services. For each service, the central adapter generates a second service request in the common interface, and transmits the second service request to a second interface gateway that is coupled to a second network.
摘要:
Methods, systems, and apparatuses for selectively exposing subscriber data include maintaining subscriber data at a digital data storage, wherein the digital data storage is protected by a service provider firewall. A request to expose subscriber data from a third-party requestor is received. Selected subscriber data and a security condition associated with the request are determined, wherein the security condition is based on an identity of the third-party requestor. The selected subscriber data is retrieved if the security condition is satisfied, and the selected subscriber data is transmitted to the third-party requestor.