Patent application number | Description | Published |
20080214173 | Method and System For Provisioning Services In A Telecommunications Network - The present invention is a telecommunication system, comprising of at least one base station connected to a telecommunication network, a plurality of subscriber stations each cooperating with the base station to establish a connection between a user device operably connected to the subscriber station and the telecommunication network. The base station is also connected with a subscriber database to maintain the subscriber records that contain provisioning information for services, features and account information, and an interactive response system operable to create and modify a subscriber record in the subscriber database in response to input received over the connection from a subscriber using the user device to select services, features and account information for the subscriber station. | 09-04-2008 |
20090106677 | MECHANISM FOR PUBLISHING PRESENCE INFORMATION WITHIN A PRESENCE SERVICE AND USER INTERFACE FOR CONFIGURING SAME - The presence information of a presentity within a presence service includes a first presence attribute and a second presence attribute. The first presence attribute is published within the presence service only if at least one watcher within the presence service has subscribed to it, while the second presence attribute is published within the presence service regardless of whether any watcher has subscribed to it. A user interface may be provided to configure the publishing of presence information on an attribute-by-attribute basis. An exemplary user interface includes, for each presence attribute comprising the presence information, a user interface control permitting selection of the publication mechanism for that presence attribute. The control has a plurality of options including a first option for causing the presence attribute to be published only if at least one watcher has subscribed to it and a second option for causing the presence attribute to be published regardless of whether any watcher has subscribed to it. | 04-23-2009 |
20100110989 | Transport Protocol Performance Using Network Bit Rate Information - A method for communicating in a telecommunications system is provided. The method comprises conveying a downlink bit rate and an uplink bit rate associated with an access point name to a user agent. | 05-06-2010 |
20100223333 | METHOD AND SYSTEM FOR DISTRIBUTION OF PRESENCE INFORMATION - A method and system for distributing data between a first user and a second user by detecting direct or indirect communication between the first user and the second user, creating an entry for the second user in a roster for the first user, populating the entry for the second user in the roster of the first user with data elements and attributes of the data elements, the data elements and attributes of the data elements indicating what data can be shared with the second user and how the data is to be shared and utilizing the roster of the first user to distribute data reflecting the first user to the second user. | 09-02-2010 |
20110212704 | SYSTEM AND METHOD TO MEASURE THE EFFECTIVENESS OF CLICK TO CALL ADVERTISEMENT - Provided is a method and system for measuring the effectiveness of click to call advertisements or for gathering information from calls made using a click to call service. An agent residing on a user's mobile device monitors communications initiated through click to call advertisements on a mobile device. This agent logs the information gathered from the monitored communications. This information may then be communicated to a remote server. The remote server receives similar logged information from other mobile devices. This collected information can then be used to target or improve targeting of advertisements. The logged information from a plurality of mobile devices for a particular advertised click to call service may be sent to the provider of that service. The provider may then use that information to better target their advertisements or to measure the success of certain click to call advertisements. | 09-01-2011 |
20110271099 | AUTHENTICATION SERVER AND METHOD FOR GRANTING TOKENS - An authentication server and method are provided for generating tokens for use by a mobile electronic device for accessing a service. Communications between the device and the authentication server are through a relay. A memory stores a secret shared with a service server from which the service is provided. A processor is configured to generate the token using the shared secret and based on a reliance on the relay to ensure that the device has authorization to access the service. One or more computer readable medium having computer readable instructions stored thereon that cause the device to obtain proof of authorization to access the service is also provided. The instructions implement a method comprising: outputting via a wireless connection to a relay a request addressed to an authentication server for a token and receiving the token from the authentication server via the relay. | 11-03-2011 |
20110307559 | System and method for enabling push based email service over IMS with IMS based service gateway decomposition and IMS based external service server - An apparatus in one example, comprising an external server, where the external server is non-IMS compliant, and wherein the external server further comprises a server redirector that is configured to package an email, where packaging the email comprises wrapping the email in an email envelope. The external server further comprises an IMS module configured to perform peer-to-peer IMS compliant communications. | 12-15-2011 |
20120084368 | DATA CHANNEL SET UP LATENCY REDUCTION - A method is disclosed for reducing setup latency in commencing data exchange between two devices seeking to exchange data across a networked data channel. Control messages are exchanged across a control channel while establishing the data channel according to a protocol. The control messages contain some of the data to be exchanged. The remaining data is exchanged across the data channel once established. The data both in the control messages and exchanged across the data channel may be tagged with a file transfer identifier to facilitate reconstruction of the data at the receive end. If data encryption is desired, the data in the control messages may be encrypted by the sender with a temporary key and a shared key may be established by the devices. Once the key has been established, the temporary key may be encrypted with the shared key and exchanged across the data channel to permit decryption of the data in the control messages at the receive end. | 04-05-2012 |
20120254316 | COMMUNICATIONS SYSTEM INCLUDING TRUSTED SERVER TO VERIFY A REDIRECTION REQUEST AND ASSOCIATED METHODS - A communications system includes a mobile wireless communications device, a trusted server, and a plurality of host servers. A given one of the host servers is in communication with the mobile wireless communications device. The given host server is configured to generate and send a redirection request to the mobile wireless communications device, the redirection request requesting the mobile wireless communications device to communicate with an other one of the host servers. The mobile wireless communications device is configured to send the redirection request to the trusted server, and the trusted server configured to send the redirection request to the mobile wireless communications device based upon verification of the redirection request. | 10-04-2012 |
20130024251 | COMMUNICATING PRESENTATION DATA RELATING TO PRESENTATION OF INFORMATION - Presentation data related to presentation of information at an electronic device is provided, where the presentation data includes an indicator of a zoom level at which the information was presented. An effectiveness measure relating to an analysis of the presentation data can be derived to indicate an effectiveness of the presented information. | 01-24-2013 |
20130097123 | Method and System for Determining Eligible Communication Partners Utilizing an Entity Discovery Engine - A method and system for determining eligible communication partners utilizing an entity discovery engine is provided. The entity discovery engine coordinates the discovery of eligible communication partners. The entity discovery engine enables participants to discover other communication partners through the application of inputs. Starting with a data set of potential communication partners, the entity discovery engine uses inputs to identify eligible communication partners from the data set of potential communication partners. Inputs include policies that are applied broadly to limit categories of potential communication partners from being suggested as eligible communication partners. Identified eligible communication partners are suggested to enable communication relationships. Suggested eligible communication partners may be selected by a user or by an electronic communication device for initiating a communication relationship. In this manner, the entity discovery engine enables the discovery of new communication partners. | 04-18-2013 |
20130268751 | METHOD, SYSTEM AND APPARATUS FOR MANAGING PERSONA-BASED NOTIFICATIONS AT A COMMUNICATION DEVICE - A method, system and apparatus for managing persona-based notifications at a communication device are provided. A port is dynamically assigned to an application on the basis of a persona at a communication device, the application enabled to receive notifications from a given provider. The port is registered with a server to receive the notification. The port is opened to receive notifications associated with the persona for the application from the server. | 10-10-2013 |
20140123267 | METHOD AND SYSTEM FOR TCP TURN OPERATION BEHIND A RESTRICTIVE FIREWALL - A method at a computing client located behind a NAT and restrictive-access firewall, including establishing a control connection with a TCP TURN server utilizing a port capable of traversing the restrictive-access firewall; requesting an allocation of an client service identity from the TCP TURN server; and receiving, from the TCP TURN server, a response containing the client service identity, the client service identity being independent of any port used to communicate with the TCP TURN server. Further a method at a TCP TURN server, including listening on a first port for communications from a computing client, the computing client being behind a restrictive access firewall and the first port capable of traversing the restrictive-access firewall; establishing a control connection with the client on the first port; receiving a request for an allocation of an client service identity from the computing client; and sending a response containing the client service identity. | 05-01-2014 |
20140298415 | METHOD AND SYSTEM FOR PROVIDING CONNECTIVITY FOR AN SSL/TLS SERVER BEHIND A RESTRICTIVE FIREWALL OR NAT - A method and a relay service node to facilitate establishment of a secure connection between a first node within a restrictive access network, and a second node, the method accepting a control connection from the first node; accepting a second connection from the second node, and receiving, over the second connection, a message requesting secure connection establishment with the first node and providing an identifier for the first node; sending, over the control connection, a connection attempt request to establish a third connection from the first node; accepting the third connection from the first node; binding the second connection with the third connection; and forwarding the message requesting secure connection establishment with the first node to the first node. | 10-02-2014 |
20140310512 | SECURE NETWORK TUNNEL BETWEEN A COMPUTING DEVICE AND AN ENDPOINT - The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The computing device can include any electronic device such as a computer, a server, an application server, a mobile device or tablet. The endpoint can be any electronic device as well that is located within an enterprise network. In at least one embodiment, the secure coupling of the mobile device with a computing device can include a security gateway server. In one example, the security gateway server can be a tunnel service server. In another embodiment, an application server can include a tunnel service module to provide the secure coupling with the mobile device. | 10-16-2014 |