Patent application number | Description | Published |
20080209564 | Security protection for a customer programmable platform - A method of preventing a customer programmable device from causing security threats to itself or to a communication system is provided. The method includes establishing one or more thresholds by programming or configuring of the device, detecting whether one or more of the thresholds have been exceeded using one or more detection mechanisms, and taking action in response to each threshold that has been exceeded. | 08-28-2008 |
20090003388 | METHOD AND APPARATUS FOR SYNCHRONIZING PORTED NUMBER DATA - A method of synchronizing ported number data within a telecommunications network in which a number portability administration center has received a request from a subscriber having a directory number (DN) to port is provided. The method comprises the steps of: a Number Portability data manager sending a subscription request to the NPDB to receive future notifications about subscriber ports to/from specific Location Routing Number(s); the NPDB honoring these subscriptions when a user ports their DN. If this is the initial LRN assigned to the DN, then the NPDB derives the LRN of the code holder. If the LRN from which the subscriber ported has a subscription, then the NPDB sends a notification message to the NP data manager with which the LRN is associated indicating that the DN ported out. If the LRN to which the subscriber ported has a subscription, then the NPDB sends a notification message to the NP data manager with which the LRN is associated indicating that the DN ported in. The method further comprises receiving a notification message for the LRN at a number portability data manager, wherein: if the notification message indicates that a DN has ported in, then the number portability data manager sends a request to an ENUM (telephone number mapping) server to turn the entry for that DN on; and if the notification message indicates that a DN has ported out, then the number portability data manager sends requests to the ENUM server and to a subscriber database to turn the entry for that DN off. | 01-01-2009 |
20090005066 | METHOD AND APPARATUS FOR OBTAINING A ZIP CODE - An apparatus for obtaining a zip code of where a user is at the moment is provided. The apparatus comprises: a core network; an access server operatively connected to the core network providing network access for the communication device; and a zip code location database server operatively connected to the core network, wherein the zip code location database server is adapted to store zip code location information for one or more IDs in the core network. | 01-01-2009 |
20090070127 | Method and apparatus for network-based mobile device coordination - A system and method for network-based coordination of a plurality of devices using precise timing methods is provided. The method includes registering a device for an event that utilizes precise timing. The method continues with identifying a list of devices that will participate in the event, downloading a set of tools that enable the devices to perform the event, and initiating the event for the list of devices coordinated by precise timing. The system for network-based precision includes a timing source that provides precise timing for the devices, a subscription handler that organizes the devices and event application server that provides a list of registered subscribers and initiates the group event. The method and system disclosed may be used to coordinate mobile devices for collecting data and/or provide coordination for mobile devices to display video and play audio in a group coordinated manner. | 03-12-2009 |
20090088147 | Method and system for correlating IP layer traffic and wirless layer elements in a UMTS/GSM network - The present invention relates to a correlation module for correlating IP layer traffic and wireless layer network elements in a network. According to an example embodiment, the correlation module includes an RNC analyzer, a Gn snoop unit, and/or a mapping unit. The RNC analyzer is configured to collect wireless layer network element information from at least one RNC. The Gn snoop unit is configured to collect wireless layer network element information and IP layer traffic information from at least one Gn interface between a serving GPRS support node and a gateway GPRS support node. The mapping unit is configured to map the IP layer traffic and the wireless layer network elements in the network based on the collected IP layer traffic information and the collected wireless layer network element information. A method of correlating IP layer traffic and wireless layer network elements in a network is also disclosed. | 04-02-2009 |
20100113016 | Methods for routing a call to a mobile unit that has been ported - The present invention provides a method for determining the HLR for a user who has been ported in to an IMS network. A call request is received for a mobile unit that has been ported. The communication system determines a Home Location Register (HLR) for the mobile unit. The communication system receives a temporary directory number associated with the mobile unit. The call request is completed to the mobile unit using the temporary directory number. | 05-06-2010 |
20100130209 | Methods for facilitating user control of handoffs - To address the need to have new techniques that are able to improve handoff decision-making, the network may employ a method such as that depicted in diagram | 05-27-2010 |
20110117889 | Methods for capacity limitation mitigation in a radio frequency device - Example embodiments provide a method and/or network element capable of mitigating one or more effects of operating at full capacity. According to an example embodiment, a network element may address load capacity by identifying that a first network element (e.g., a femto) is operating at a threshold capacity. If a communication from a second network element intended for the first network element is received, an operation is performed that informs the second network element of at least one of (i) that the first network element is operating at a threshold capacity and (ii) that the communication cannot be delivered to the first network element while the first network element is operating at a threshold capacity. | 05-19-2011 |
20130045740 | AUTOMATED TRIGGERS FOR APPLICATION OF CELL ASSOCIATION BIAS AND/OR INTERFERENCE MITIGATION TECHNIQUES - In a wireless telecommunications network, there is included: a macro cell ( | 02-21-2013 |
20150079997 | AUTOMATED TRIGGERS FOR APPLICATION OF CELL ASSOCIATION BIAS AND/OR INTERFERENCE MITIGATION TECHNIQUES - In a wireless telecommunications network, there is included: a macro cell ( | 03-19-2015 |