US20140241342A1 - Emergency services for packet networks - Google Patents

Emergency services for packet networks Download PDF

Info

Publication number
US20140241342A1
US20140241342A1 US14/268,044 US201414268044A US2014241342A1 US 20140241342 A1 US20140241342 A1 US 20140241342A1 US 201414268044 A US201414268044 A US 201414268044A US 2014241342 A1 US2014241342 A1 US 2014241342A1
Authority
US
United States
Prior art keywords
communication session
emergency
session initiation
initiation request
originator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/268,044
Inventor
Cristian Constantinof
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Clearinghouse LLC
Original Assignee
Rockstar Consortium US LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rockstar Consortium US LP filed Critical Rockstar Consortium US LP
Priority to US14/268,044 priority Critical patent/US20140241342A1/en
Publication of US20140241342A1 publication Critical patent/US20140241342A1/en
Assigned to RPX CLEARINGHOUSE LLC reassignment RPX CLEARINGHOUSE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOCKSTAR TECHNOLOGIES LLC, CONSTELLATION TECHNOLOGIES LLC, MOBILESTAR TECHNOLOGIES LLC, NETSTAR TECHNOLOGIES LLC, ROCKSTAR CONSORTIUM LLC, ROCKSTAR CONSORTIUM US LP
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1076Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
    • H04L65/1079Screening of IP real time communications, e.g. spam over Internet telephony [SPIT] of unsolicited session attempts, e.g. SPIT
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1045Proxies, e.g. for session initiation protocol [SIP]
    • H04L65/105
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/5116Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing for emergency applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/06Lines and connections with preferential service

Definitions

  • the present invention relates to communications, and in particular to ensuring emergency calls supported in part over a packet network are properly handled, even during overload conditions.
  • PSTN public switched telephone network
  • locations include 911 call centers, police departments, hospitals, fire stations, and various government agencies.
  • excessive network resources are reserved to ensure completion of emergency calls, and call setup requests for requesting the establishment of a call are given processing priority when they are within the various switching nodes within the PSTN. Accordingly, the PSTN currently has the ability to properly prioritize and handle emergency calls.
  • packet networks are increasingly being used to deploy voice-based communications using various types of voice over packet (VoP) calls.
  • VoIP voice over packet
  • the openness of packet-based architectures has presented a challenge for properly handling emergency calls.
  • packet-based devices which can filter and route calls, this is no overriding solution for ensuring emergency calls are properly processed and prioritized over non-emergency calls.
  • the present invention provides a technique for facilitating emergency services via packet networks.
  • Emergency service providers will implement emergency proxies to ensure that proper call setup requests for emergency services are forwarded to the appropriate entities, even if the network or those entities are in overload conditions.
  • the emergency proxies may authenticate and filter call setup requests to ensure that only proper call setup requests are forwarded to help prevent abusive, malicious or unauthorized use of emergency services.
  • the emergency proxy may operate solely in a packet network, as well as at the interface between a packet network and a circuit-switched network to assist in call setup requests originating from either the packet network or the circuit-switched network.
  • FIG. 1 is a block representation of a communication environment according to one embodiment of the present invention.
  • FIG. 2 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to one embodiment of the present invention.
  • FIG. 3 is a block representation of a communication environment according a second embodiment of the present invention.
  • FIG. 4 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to a second embodiment of the present invention.
  • FIG. 5 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to a third embodiment of the present invention.
  • FIG. 6 is a block representation of an emergency proxy according to one embodiment of the present invention.
  • a communication environment 10 wherein an originating element 12 is a communication device attempting to establish a call to a terminating element 14 via a packet network 16 .
  • the term “call” includes traditional voice-based calls, as well as media sessions, which include any type of data, audio, voice, or video based packet sessions.
  • the originating element 12 is supported by an emergency proxy 18
  • the terminating element 14 may be supported by a proxy 20 in traditional fashion, wherein the emergency proxy 18 and the proxy 20 will act as liaisons for call or session establishment messages involving the respective devices.
  • the originating element 12 will send a call setup request configured to initiate a call between the originating element 12 and the terminating element 14 .
  • the call setup request is received by the emergency proxy 18 , which will determine if the call setup request meets the emergency criteria of an emergency call setup request.
  • the emergency criteria are preferably provisioned by emergency services providers, such that these providers can effectively control how call setup requests are processed. If the emergency criteria are met, the emergency proxy 18 will modify the call setup request in a defined manner and forward the call setup request across the packet network 16 to initiate the call.
  • the call setup request may be forwarded to the terminating element 14 directly or indirectly via the proxy 20 .
  • the proxy 20 may be configured to analyze the call setup request to ensure that the call setup request is properly configured by the emergency proxy 18 as a condition to sending the call setup request to the terminating element 14 .
  • the emergency proxy 18 and perhaps the proxy 20 are configured to process call setup requests from the originating element 12 to ensure that only authorized call setup requests result in emergency calls, by effectively filtering call setup requests actually delivered to the terminating element 14 or supporting entities.
  • the emergency proxy 18 will authenticate the call setup request to ensure that the originating element 12 can initiate a request for an emergency call, as well as limit the call setup requests sent toward the terminating element 14 to those that are authenticated.
  • the emergency proxy 18 may add an additional field, referred to in general as an emergency header field, to the call setup request.
  • the emergency header field may include additional information that uniquely identifies the level of emergency, and information identifying the call, such as caller identification, to and from addresses, and the like.
  • the emergency proxy 18 may encrypt the emergency header field information in a manner allowing the proxy 20 , terminating element 14 , or other supporting entity to be able to decrypt information when attempting to establish an emergency call.
  • Authentication of call setup requests or an originating element 12 sending the call setup request may be based on the identity of the originating element 12 , a user of the originating element 12 , or authentication information provided when generating the call setup request.
  • the emergency proxy 18 will be provisioned with the necessary information to facilitate authentication of the various originating elements 12 that are served by the emergency proxy 18 .
  • the emergency proxy 18 may provide multiple levels of prioritization for various types of call setup requests and may filter call setup requests according to these priority levels and network conditions, as well as include indicia indicating an assigned prioritization level in each call setup request.
  • the receiving proxy 20 , terminating element 14 , any other intermediate proxy or supporting entity, if any, will process the incoming call setup request according to the assigned prioritization level, network conditions, and the like.
  • SIP Session Initiation Protocol
  • RRC Request for Comments
  • SIP is used to establish media sessions between any number of endpoints, such as the originating and terminating elements 12 , 14 .
  • endpoints may support any number or combination of data, audio, and voice media sessions, depending on the configuration of the device.
  • a SIP endpoint is capable of running an application, typically referred to as a user agent (UA), which is capable of facilitating media sessions using SIP.
  • UUA user agent
  • user agents may register their ability to establish sessions with a SIP proxy, such as the emergency proxy 18 or proxy 20 , by sending REGISTER messages to the SIP proxy.
  • the REGISTER message informs the SIP proxy of the SIP universal resource locator (URL) that identifies the user agent to the SIP network.
  • the REGISTER message also contains information about how to reach specific user agents over the SIP network, typically by providing the Internet Protocol (IP) address and port that the user agent will use for SIP sessions.
  • IP Internet Protocol
  • the user agent initiating the session may send an INVITE message to the SIP proxy and specify the target user agent in the TO header of the INVITE message.
  • Identification of the user agent takes the form of a SIP URL.
  • the SIP proxy will use the SIP URL in the TO header of the message to determine if the targeted user agent is registered with the SIP proxy.
  • the user name is unique within the name space of the specified domain.
  • the SIP proxy will forward the INVITE message directly to the targeted user agent.
  • the targeted user agent will respond with a 200 OK message, and a session between the respective user agents will be established as per the message exchange required in the SIP specification.
  • Media capabilities are passed between the two user agents of the respective endpoints as parameters embedded within the session setup messages, such as the INVITE, 200 OK, and acknowledgement (ACK) messages.
  • Media capabilities may be exchanged in other messages, such as the SIP INFO message.
  • Media capabilities are typically described using the Session Description Protocol (SDP).
  • a user agent is an application that contains both a user agent client and a user agent server.
  • a user agent client generally refers to a client application that initiates SIP requests, wherein a user agent server is an application that contacts the user when a SIP request is received, and returns a response on behalf of the user. Typically, the response accepts, rejects, or redirects the received request.
  • a communication flow diagram is provided from an exemplary scenario wherein one or more originating elements 12 are sending call setup requests in the form of INVITE messages to initiate a call via a SIP session with one or more terminating elements 14 .
  • the terminating elements 14 provide emergency services and only emergency calls should be handled by the terminating elements 14 .
  • the emergency proxy 18 will only forward incoming call setup requests, in the form of SIP INVITE messages, which meet the necessary criteria for being emergency call setup requests to the terminating elements 14 .
  • an INVITE message intended to establish a call with a terminating element 14 is sent from the originating element 12 (step 100 ).
  • the emergency proxy 18 will determine if the INVITE message meets the defined emergency criteria (step 102 ), and since this INVITE message would not meet the emergency criteria, the emergency proxy 18 will ignore the INVITE message and not forward the INVITE message toward the terminating element 14 (step 104 ).
  • the emergency proxy 18 may be configured to provide a response indicative of not forwarding the INVITE message back to the originating element 12 (not shown)
  • an appropriate originating element 12 sends a proper INVITE message for initiating an emergency call to the terminating element 14 .
  • the emergency proxy 18 will receive the INVITE message (step 106 ), and determine if the INVITE message meets the emergency criteria (step 108 ). Since the INVITE message meets the emergency criteria, the emergency proxy 18 generates an emergency header field (step 110 ) and adds the emergency header field to the INVITE message (step 112 ). The INVITE message is then forwarded toward the terminating element 14 (step 114 ). Since the terminating element 14 is associated with a proxy 20 , the proxy 20 will receive the INVITE message on behalf of the terminating element 14 and may be configured to determine if the proper emergency header field is present (step 116 ). If the proper emergency header field is present, the INVITE message is forwarded to the terminating element 14 wherein the session supporting the call can be established with the originating element 12 (step 118 ).
  • the proxy 20 In the event that the proxy 20 receives an INVITE message without the proper emergency header field from any device (step 120 ), the proxy 20 will determine if the proper emergency header field is present (step 122 ), and since the field is not present, may ignore the INVITE message (step 124 ). As such, the emergency proxy 18 provides the proper authentication and filtering for call setup requests to ensure that terminating elements 14 providing emergency services are only sent appropriate call setup requests. Further, the proxy 20 supporting the terminating elements 14 may provide further authentication and filtering to ensure that the terminating element 14 only receives appropriate call setup requests. Again, further security may be provided using encryption and decryption techniques between the emergency proxy 18 and the proxy 20 . The proxy 20 and the emergency proxy 18 may also monitor work conditions to help provide filtering for the various call setup requests, as well as prioritize the call setup requests based on any available criteria.
  • circuit-switched networks 22 such as the PSTN
  • an emergency proxy 18 is implemented in or in association with a gateway facilitating an interface between the packet network 16 and the circuit-switched network 22 .
  • the emergency proxy 18 can control circuit-switched call setup requests as well as packet-based call setup requests originating from the circuit-switched network 22 and the packet network 16 , respectively.
  • FIG. 4 An exemplary communication call flow for filtering call setup requests originating from the packet network 16 and intended for a device on the circuit-switched network 22 is provided in FIG. 4 .
  • an initial INVITE message which does not meet the emergency criteria, is sent from the originating element 12 to establish an emergency call with a device in the circuit-switched network 22 .
  • the emergency proxy 18 will receive the INVITE message (step 200 ) and determine if the INVITE message meets the emergency criteria (step 202 ). Since the emergency criteria are not met, the emergency proxy 18 will ignore the INVITE message (step 204 ) and perhaps report the same back to the originating element 12 (not shown).
  • the emergency proxy 18 When an appropriate INVITE message is sent from an originating element 12 (step 206 ), the emergency proxy 18 will receive the INVITE message and determine if the INVITE message meets the emergency criteria (step 208 ). Since the emergency criteria is met, the emergency proxy 18 may generate one or more emergency parameters (step 210 ) and create a call setup request with the emergency parameter (step 212 ), wherein the call setup request is configured to initiate a call in the circuit-switched network 22 .
  • An exemplary call setup request for the PSTN is an intelligent network Initial Address Message (IAM). As such, the emergency proxy 18 will send a call setup request to the appropriate entity in the circuit-switched network 22 to initiate the emergency call (step 214 ).
  • IAM Intelligent Network Initial Address Message
  • the call setup request will include the emergency parameters to assist the entities in the circuit-switched network 22 in determining whether the call setup request is appropriate.
  • the emergency parameters may be carried in signaling information elements as specified by the appropriate standards that define the Multi-Level Precedence and Preemption Supplementary Service, which is well known and provides for prioritizing voice traffic.
  • call setup requests in the form of IAMs are received by the emergency proxy 18 from the circuit-switched network 22 (step 300 ).
  • the emergency proxy 18 will determine that the call setup request does not meet the emergency criteria (step 302 ) and will ignore the call setup request (step 304 ).
  • the call setup request may be an IAM, which may include various parameters to assist in determining whether the emergency criteria are met.
  • the emergency proxy 18 will determine if the call setup request meets the emergency criteria (step 308 ) and since it does meet the emergency criteria, the emergency proxy 18 will generate an emergency header field (step 310 ) and create an INVITE message intended for the terminating element 14 with the emergency header field (step 312 ). The emergency proxy 18 will then send the INVITE message with the emergency header field toward the terminating element 14 .
  • the proxy 20 will receive the INVITE message (step 314 ) and may be configured to determine if a proper emergency header field is present (step 316 ).
  • the INVITE message is forwarded to the terminating element 14 to establish the emergency call (step 318 ).
  • the session between the emergency proxy 18 or associated gateway and the terminating element 14 may be a SIP session, wherein the connection within the circuit-switched network 22 will be a circuit-switched connection.
  • the proxy 20 may receive INVITE messages without the proper emergency header field (step 320 ), and then determine if the proper emergency header is present (step 322 ). When the proper emergency header field is not present, the INVITE message may be ignored (step 324 ).
  • the emergency proxy 18 will preferably be configured to ensure that a proper call setup request is always forwarded to or towards the terminating element 14 , even in overload conditions. Further, in non-overload conditions, the emergency proxy 18 as well as the proxy 20 may be configured to forward all of select INVITE messages or forward them based on desired criteria, yet prioritize emergency requests as well as eliminate non-emergency requests during overload conditions.
  • the emergency proxy 18 will typically include a control system 24 having memory 26 for storing the necessary software 28 to facilitate the above functionality.
  • the control system 24 will also be associated with one or more communication interfaces 30 for communicating over the packet network 16 , and perhaps the circuit-switched network 22 , as necessary.

Abstract

The present invention provides a technique for facilitating emergency services via packet networks. Emergency service providers will implement emergency proxies to ensure that proper call setup requests for emergency services are forwarded to the appropriate entities, even if those entities are in overload conditions. The emergency proxies may authenticate and filter call setup requests to ensure that only proper call setup requests are forwarded to help prevent such overload conditions. The emergency proxies may operate solely in a packet network, as well as at the interface between a packet network and a circuit-switched network to assist in call setup requests originating from either the packet network or the circuit-switched network.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • The present application is a continuation of U.S. patent application Ser. No. 13/021,134, filed on Feb. 4, 2011, which was a continuation of U.S. Pat. No. 7,899,174, which issued on Mar. 1, 2011, the disclosures of which are hereby incorporated by reference in their entirety.
  • FIELD OF THE INVENTION
  • The present invention relates to communications, and in particular to ensuring emergency calls supported in part over a packet network are properly handled, even during overload conditions.
  • BACKGROUND OF THE INVENTION
  • Providing emergency services, especially in overload conditions, is challenging since service providers have to ensure that emergency calls are established regardless of other non-emergency calls. In the public switched telephone network (PSTN), there are mechanisms to identify calls made from and to special locations which involve providing emergency services. These locations include 911 call centers, police departments, hospitals, fire stations, and various government agencies. Generally, excessive network resources are reserved to ensure completion of emergency calls, and call setup requests for requesting the establishment of a call are given processing priority when they are within the various switching nodes within the PSTN. Accordingly, the PSTN currently has the ability to properly prioritize and handle emergency calls.
  • With respect to packet-based communications, packet networks are increasingly being used to deploy voice-based communications using various types of voice over packet (VoP) calls. Unfortunately, the openness of packet-based architectures has presented a challenge for properly handling emergency calls. Although there are numerous packet-based devices which can filter and route calls, this is no overriding solution for ensuring emergency calls are properly processed and prioritized over non-emergency calls. Further, there is a need to ensure that emergency calls can be properly handled in overload conditions as well as ensure that the system is not abused by malicious users who improperly identify their calls as emergency calls or initiate malicious attacks, such as denial of service attacks.
  • SUMMARY OF THE INVENTION
  • The present invention provides a technique for facilitating emergency services via packet networks. Emergency service providers will implement emergency proxies to ensure that proper call setup requests for emergency services are forwarded to the appropriate entities, even if the network or those entities are in overload conditions. The emergency proxies may authenticate and filter call setup requests to ensure that only proper call setup requests are forwarded to help prevent abusive, malicious or unauthorized use of emergency services. The emergency proxy may operate solely in a packet network, as well as at the interface between a packet network and a circuit-switched network to assist in call setup requests originating from either the packet network or the circuit-switched network.
  • Those skilled in the art will appreciate the scope of the present invention and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
  • BRIEF DESCRIPTION OF THE DRAWING FIGURES
  • The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the invention, and together with the description serve to explain the principles of the invention.
  • FIG. 1 is a block representation of a communication environment according to one embodiment of the present invention.
  • FIG. 2 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to one embodiment of the present invention.
  • FIG. 3 is a block representation of a communication environment according a second embodiment of the present invention.
  • FIG. 4 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to a second embodiment of the present invention.
  • FIG. 5 is a communication flow diagram providing an exemplary scenario for implementing emergency services according to a third embodiment of the present invention.
  • FIG. 6 is a block representation of an emergency proxy according to one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the invention and illustrate the best mode of practicing the invention. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the invention and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
  • With reference to FIG. 1, a communication environment 10 is provided wherein an originating element 12 is a communication device attempting to establish a call to a terminating element 14 via a packet network 16. For the present invention, the term “call” includes traditional voice-based calls, as well as media sessions, which include any type of data, audio, voice, or video based packet sessions. In the illustrated embodiment, the originating element 12 is supported by an emergency proxy 18, and the terminating element 14 may be supported by a proxy 20 in traditional fashion, wherein the emergency proxy 18 and the proxy 20 will act as liaisons for call or session establishment messages involving the respective devices.
  • Accordingly, the originating element 12 will send a call setup request configured to initiate a call between the originating element 12 and the terminating element 14. In traditional proxy fashion, the call setup request is received by the emergency proxy 18, which will determine if the call setup request meets the emergency criteria of an emergency call setup request. The emergency criteria are preferably provisioned by emergency services providers, such that these providers can effectively control how call setup requests are processed. If the emergency criteria are met, the emergency proxy 18 will modify the call setup request in a defined manner and forward the call setup request across the packet network 16 to initiate the call. The call setup request may be forwarded to the terminating element 14 directly or indirectly via the proxy 20. In one embodiment, the proxy 20 may be configured to analyze the call setup request to ensure that the call setup request is properly configured by the emergency proxy 18 as a condition to sending the call setup request to the terminating element 14. As such, the emergency proxy 18 and perhaps the proxy 20 are configured to process call setup requests from the originating element 12 to ensure that only authorized call setup requests result in emergency calls, by effectively filtering call setup requests actually delivered to the terminating element 14 or supporting entities.
  • Preferably, the emergency proxy 18 will authenticate the call setup request to ensure that the originating element 12 can initiate a request for an emergency call, as well as limit the call setup requests sent toward the terminating element 14 to those that are authenticated. The emergency proxy 18 may add an additional field, referred to in general as an emergency header field, to the call setup request. The emergency header field may include additional information that uniquely identifies the level of emergency, and information identifying the call, such as caller identification, to and from addresses, and the like. For additional security to avoid malicious or unauthorized use of emergency services, the emergency proxy 18 may encrypt the emergency header field information in a manner allowing the proxy 20, terminating element 14, or other supporting entity to be able to decrypt information when attempting to establish an emergency call. Notably, private or public key encryption techniques may be employed that are well known in the art. Authentication of call setup requests or an originating element 12 sending the call setup request may be based on the identity of the originating element 12, a user of the originating element 12, or authentication information provided when generating the call setup request. The emergency proxy 18 will be provisioned with the necessary information to facilitate authentication of the various originating elements 12 that are served by the emergency proxy 18.
  • Notably, the emergency proxy 18 may provide multiple levels of prioritization for various types of call setup requests and may filter call setup requests according to these priority levels and network conditions, as well as include indicia indicating an assigned prioritization level in each call setup request. The receiving proxy 20, terminating element 14, any other intermediate proxy or supporting entity, if any, will process the incoming call setup request according to the assigned prioritization level, network conditions, and the like.
  • In a preferred embodiment, at least a portion of the communication sessions established between the originating element 12 and the terminating element 14 are facilitated using the Session Initiation Protocol (SIP). The specification for SIP is provided in the Internet Engineering Task Force's Request for Comments (RFC) 3261: Session Initiation Protocol Internet Draft, which is incorporated herein by reference in its entirety. In general, SIP is used to establish media sessions between any number of endpoints, such as the originating and terminating elements 12, 14. Typically, these endpoints may support any number or combination of data, audio, and voice media sessions, depending on the configuration of the device. A SIP endpoint is capable of running an application, typically referred to as a user agent (UA), which is capable of facilitating media sessions using SIP.
  • In certain embodiments, user agents may register their ability to establish sessions with a SIP proxy, such as the emergency proxy 18 or proxy 20, by sending REGISTER messages to the SIP proxy. The REGISTER message informs the SIP proxy of the SIP universal resource locator (URL) that identifies the user agent to the SIP network. The REGISTER message also contains information about how to reach specific user agents over the SIP network, typically by providing the Internet Protocol (IP) address and port that the user agent will use for SIP sessions. When a user agent wants to establish a session with another user agent, the user agent initiating the session may send an INVITE message to the SIP proxy and specify the target user agent in the TO header of the INVITE message. Identification of the user agent takes the form of a SIP URL. The SIP proxy will use the SIP URL in the TO header of the message to determine if the targeted user agent is registered with the SIP proxy. Generally the user name is unique within the name space of the specified domain.
  • If the targeted user agent has registered with the SIP proxy, the SIP proxy will forward the INVITE message directly to the targeted user agent.
  • The targeted user agent will respond with a 200 OK message, and a session between the respective user agents will be established as per the message exchange required in the SIP specification. Media capabilities are passed between the two user agents of the respective endpoints as parameters embedded within the session setup messages, such as the INVITE, 200 OK, and acknowledgement (ACK) messages. Media capabilities may be exchanged in other messages, such as the SIP INFO message. Media capabilities are typically described using the Session Description Protocol (SDP). Once respective endpoints are in an active session with each other and have determined each other's capabilities, the specified media content may be exchanged during an appropriate media session.
  • According to the Internet Engineering Task Force's RFC 3261, a user agent is an application that contains both a user agent client and a user agent server. A user agent client generally refers to a client application that initiates SIP requests, wherein a user agent server is an application that contacts the user when a SIP request is received, and returns a response on behalf of the user. Typically, the response accepts, rejects, or redirects the received request.
  • With reference to FIG. 2, a communication flow diagram is provided from an exemplary scenario wherein one or more originating elements 12 are sending call setup requests in the form of INVITE messages to initiate a call via a SIP session with one or more terminating elements 14. Assume that the terminating elements 14 provide emergency services and only emergency calls should be handled by the terminating elements 14. Accordingly, the emergency proxy 18 will only forward incoming call setup requests, in the form of SIP INVITE messages, which meet the necessary criteria for being emergency call setup requests to the terminating elements 14. Initially, assume that an INVITE message intended to establish a call with a terminating element 14 is sent from the originating element 12 (step 100). Further assume that the originating element 12 is either unauthorized to establish an emergency call or that the INVITE message would not meet the necessary criteria for establishing an emergency call. As such, the emergency proxy 18 will determine if the INVITE message meets the defined emergency criteria (step 102), and since this INVITE message would not meet the emergency criteria, the emergency proxy 18 will ignore the INVITE message and not forward the INVITE message toward the terminating element 14 (step 104). The emergency proxy 18 may be configured to provide a response indicative of not forwarding the INVITE message back to the originating element 12 (not shown)
  • Next, assume that an appropriate originating element 12 sends a proper INVITE message for initiating an emergency call to the terminating element 14. The emergency proxy 18 will receive the INVITE message (step 106), and determine if the INVITE message meets the emergency criteria (step 108). Since the INVITE message meets the emergency criteria, the emergency proxy 18 generates an emergency header field (step 110) and adds the emergency header field to the INVITE message (step 112). The INVITE message is then forwarded toward the terminating element 14 (step 114). Since the terminating element 14 is associated with a proxy 20, the proxy 20 will receive the INVITE message on behalf of the terminating element 14 and may be configured to determine if the proper emergency header field is present (step 116). If the proper emergency header field is present, the INVITE message is forwarded to the terminating element 14 wherein the session supporting the call can be established with the originating element 12 (step 118).
  • In the event that the proxy 20 receives an INVITE message without the proper emergency header field from any device (step 120), the proxy 20 will determine if the proper emergency header field is present (step 122), and since the field is not present, may ignore the INVITE message (step 124). As such, the emergency proxy 18 provides the proper authentication and filtering for call setup requests to ensure that terminating elements 14 providing emergency services are only sent appropriate call setup requests. Further, the proxy 20 supporting the terminating elements 14 may provide further authentication and filtering to ensure that the terminating element 14 only receives appropriate call setup requests. Again, further security may be provided using encryption and decryption techniques between the emergency proxy 18 and the proxy 20. The proxy 20 and the emergency proxy 18 may also monitor work conditions to help provide filtering for the various call setup requests, as well as prioritize the call setup requests based on any available criteria.
  • Turning now to FIG. 3, the concepts of the present invention readily extend to circuit-switched networks 22, such as the PSTN, wherein an emergency proxy 18 is implemented in or in association with a gateway facilitating an interface between the packet network 16 and the circuit-switched network 22. In such a configuration, the emergency proxy 18 can control circuit-switched call setup requests as well as packet-based call setup requests originating from the circuit-switched network 22 and the packet network 16, respectively.
  • An exemplary communication call flow for filtering call setup requests originating from the packet network 16 and intended for a device on the circuit-switched network 22 is provided in FIG. 4. In this example, an initial INVITE message, which does not meet the emergency criteria, is sent from the originating element 12 to establish an emergency call with a device in the circuit-switched network 22. The emergency proxy 18 will receive the INVITE message (step 200) and determine if the INVITE message meets the emergency criteria (step 202). Since the emergency criteria are not met, the emergency proxy 18 will ignore the INVITE message (step 204) and perhaps report the same back to the originating element 12 (not shown).
  • When an appropriate INVITE message is sent from an originating element 12 (step 206), the emergency proxy 18 will receive the INVITE message and determine if the INVITE message meets the emergency criteria (step 208). Since the emergency criteria is met, the emergency proxy 18 may generate one or more emergency parameters (step 210) and create a call setup request with the emergency parameter (step 212), wherein the call setup request is configured to initiate a call in the circuit-switched network 22. An exemplary call setup request for the PSTN is an intelligent network Initial Address Message (IAM). As such, the emergency proxy 18 will send a call setup request to the appropriate entity in the circuit-switched network 22 to initiate the emergency call (step 214). The call setup request will include the emergency parameters to assist the entities in the circuit-switched network 22 in determining whether the call setup request is appropriate. The emergency parameters may be carried in signaling information elements as specified by the appropriate standards that define the Multi-Level Precedence and Preemption Supplementary Service, which is well known and provides for prioritizing voice traffic.
  • Turning now to FIG. 5, assume that entities in the circuit-switched network 22 are attempting to establish emergency calls with a terminating element 14 in the packet network 16. Accordingly, call setup requests in the form of IAMs are received by the emergency proxy 18 from the circuit-switched network 22 (step 300). Assume that the first call setup request would not meet the emergency criteria for establishing an emergency call with the terminating element 14, and as such, the emergency proxy 18 will determine that the call setup request does not meet the emergency criteria (step 302) and will ignore the call setup request (step 304). Again, the call setup request may be an IAM, which may include various parameters to assist in determining whether the emergency criteria are met.
  • Assume that another call setup request, which would meet the emergency criteria, is received by the emergency proxy 18 from the circuit-switched network 22 (step 306). The emergency proxy 18 will determine if the call setup request meets the emergency criteria (step 308) and since it does meet the emergency criteria, the emergency proxy 18 will generate an emergency header field (step 310) and create an INVITE message intended for the terminating element 14 with the emergency header field (step 312). The emergency proxy 18 will then send the INVITE message with the emergency header field toward the terminating element 14. The proxy 20 will receive the INVITE message (step 314) and may be configured to determine if a proper emergency header field is present (step 316). If the proper emergency header field is present, the INVITE message is forwarded to the terminating element 14 to establish the emergency call (step 318). Notably, the session between the emergency proxy 18 or associated gateway and the terminating element 14 may be a SIP session, wherein the connection within the circuit-switched network 22 will be a circuit-switched connection. As described above, the proxy 20 may receive INVITE messages without the proper emergency header field (step 320), and then determine if the proper emergency header is present (step 322). When the proper emergency header field is not present, the INVITE message may be ignored (step 324).
  • With any of the above embodiments, the emergency proxy 18 will preferably be configured to ensure that a proper call setup request is always forwarded to or towards the terminating element 14, even in overload conditions. Further, in non-overload conditions, the emergency proxy 18 as well as the proxy 20 may be configured to forward all of select INVITE messages or forward them based on desired criteria, yet prioritize emergency requests as well as eliminate non-emergency requests during overload conditions.
  • With reference to FIG. 6, a high level block diagram of an emergency proxy or device capable of performing the function of an emergency proxy is illustrated. The emergency proxy 18 will typically include a control system 24 having memory 26 for storing the necessary software 28 to facilitate the above functionality. The control system 24 will also be associated with one or more communication interfaces 30 for communicating over the packet network 16, and perhaps the circuit-switched network 22, as necessary.
  • Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present invention. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.

Claims (26)

What is claimed is:
1. A method of controlling access to an emergency service, comprising:
receiving a communication session initiation request from an originator, the communication session initiation request requesting initiation of a communication session with a terminating element associated with the emergency service;
determining whether the originator is authorized to initiate the communication session;
when the originator is determined to be authorized to initiate the communication session:
providing an indication that the originator is authorized to initiate the communication session in the communication session initiation request; and
forwarding the communication session initiation request including the indication toward the terminating element associated with the emergency service;
at least one of the receiving of the communication session initiation request and the forwarding of the communication session initiation request being via a packet network.
2. The method of claim 1, comprising, when the originator is determined not to be authorized to initiate the communication session, not forwarding the communication session initiation request toward the terminating element associated with the emergency service.
3. The method of claim 1, comprising, when the originator is determined to be authorized to initiate the communication session, creating emergency information for the communication session initiation request, wherein providing an indication that the originator is authorized to initiate the communication session in the communication session initiation request comprises adding the emergency information to the communication session initiation request.
4. The method of claim 1, wherein the providing an indication that the originator is authorized to initiate the communication session in the communication session initiation request comprises carrying the indication in a header of the communication session initiation request.
5. The method of claim 1, wherein the providing an indication that the originator is authorized to initiate the communication session in the communication session initiation request comprises carrying the indication in at least one parameter of the communication session initiation request.
6. The method of claim 1, comprising determining whether the originator is authorized to initiate the communication session only when at least one network resource required to forward the communication session initiation request toward the terminating element or the terminating element is in an overload condition.
7. The method of claim 5, when the originator is determined not to be authorized to initiate the communication session, not forwarding the communication session initiation request toward the terminating element associated with the emergency service.
8. The method of claim 7, comprising providing a response to the originator when not forwarding the communication session initiation request toward the terminating element associated with the emergency service, the response indicating that the communication session initiation request has not been forwarded.
9. The method of claim 1, comprising registering originators authorized to initiate communication sessions with the emergency service in response to received registration messages.
10. The method of claim 9, wherein determining whether the originator is authorized to initiate the communication session comprises determining whether the originator is registered.
11. The method of claim 1, comprising:
selecting a priority level of a plurality of priority levels for association with the communication session initiation request; and
providing an indication of the selected priority level in the communication session initiation request.
12. The method of claim 1, wherein the originator is a user of an originating device.
13. The method of claim 1, wherein the originator is an originating device.
14. The method of claim 1, wherein received communication session initiation request is a Session Initiation Protocol (SIP) invite message.
15. The method of claim 14, wherein the SIP invite message is received via a packet network.
16. The method of claim 1, wherein the forwarded communication session initiation request is a Session Initiation Protocol (SIP) invite message, and the SIP invite message is forwarded via packet network.
17. The method of claim 16, wherein the Indication comprises information in a header of the forwarded communication session initiation request, the information indicating that the forwarded communication session initiation request is associated with an emergency communication session.
18. The method of claim 16, wherein the Indication comprises information in at least one parameter of the forwarded communication session initiation request, the information indicating that the forwarded communication session initiation request is associated with an emergency communication session.
19. The method of claim 1, wherein received communication session initiation request is an Initial Address Message (IAM) requesting setup of a circuit switched communication session.
20. The method of claim 19, wherein the IAM is received via circuit switched communication network.
21. The method of claim 1, wherein the forwarded communication session initiation request is an Initial Address Message (IAM) forwarded via a circuit switched communication network.
22. The method of claim 21, wherein the Indication comprises emergency parameters in the IAM message.
23. The method of claim 1, comprising encrypting the indication in the communication session initiation request before forwarding the communication session initiation request toward the terminating element.
24. The method of claim 1, wherein the communication session initiation request is a request for a communication session of a type selected from the group consisting of data, audio, voice and video.
25. The method of claim 1, performed at an emergency proxy connected to the packet network.
26. The method of claim 25, wherein the emergency proxy is implemented at a gateway between a packet network and a circuit-switched communication network.
US14/268,044 2003-06-26 2014-05-02 Emergency services for packet networks Abandoned US20140241342A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/268,044 US20140241342A1 (en) 2003-06-26 2014-05-02 Emergency services for packet networks

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/606,687 US7899174B1 (en) 2003-06-26 2003-06-26 Emergency services for packet networks
US13/021,134 US8737594B2 (en) 2003-06-26 2011-02-04 Emergency services for packet networks
US14/268,044 US20140241342A1 (en) 2003-06-26 2014-05-02 Emergency services for packet networks

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/021,134 Continuation US8737594B2 (en) 2003-06-26 2011-02-04 Emergency services for packet networks

Publications (1)

Publication Number Publication Date
US20140241342A1 true US20140241342A1 (en) 2014-08-28

Family

ID=43617347

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/606,687 Expired - Fee Related US7899174B1 (en) 2003-06-26 2003-06-26 Emergency services for packet networks
US13/021,134 Expired - Fee Related US8737594B2 (en) 2003-06-26 2011-02-04 Emergency services for packet networks
US14/268,044 Abandoned US20140241342A1 (en) 2003-06-26 2014-05-02 Emergency services for packet networks

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US10/606,687 Expired - Fee Related US7899174B1 (en) 2003-06-26 2003-06-26 Emergency services for packet networks
US13/021,134 Expired - Fee Related US8737594B2 (en) 2003-06-26 2011-02-04 Emergency services for packet networks

Country Status (1)

Country Link
US (3) US7899174B1 (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US9591474B2 (en) 2009-01-28 2017-03-07 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US9609510B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Automated credential porting for mobile devices
US9609459B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Network tools for analysis, design, testing, and production of services
US9609544B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Device-assisted services for protecting network capacity
US9647918B2 (en) * 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9705771B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Attribution of mobile device data traffic to end-user application based on socket flows
US9769207B2 (en) 2009-01-28 2017-09-19 Headwater Research Llc Wireless network service interfaces
US9819808B2 (en) 2009-01-28 2017-11-14 Headwater Research Llc Hierarchical service policies for creating service usage data records for a wireless end-user device
US9942796B2 (en) 2009-01-28 2018-04-10 Headwater Research Llc Quality of service for device assisted services
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US9973930B2 (en) 2009-01-28 2018-05-15 Headwater Research Llc End user device that secures an association of application to service policy with an application certificate check
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9986413B2 (en) 2009-01-28 2018-05-29 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US10057141B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Proxy system and method for adaptive ambient services
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US10064033B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Device group partitions and settlement platform
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10070305B2 (en) 2009-01-28 2018-09-04 Headwater Research Llc Device assisted services install
US10080250B2 (en) 2009-01-28 2018-09-18 Headwater Research Llc Enterprise access control and accounting allocation for access networks
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US10794280B2 (en) 2017-05-15 2020-10-06 Pratt & Whitney Canada Corp. Air intake for gas turbine engine
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US11412366B2 (en) 2009-01-28 2022-08-09 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006078202A1 (en) * 2005-01-19 2006-07-27 Telefonktiebolaget Lm Ericsson (Publ) A method and apparatus for handling emergency calls
US10178522B2 (en) * 2005-08-02 2019-01-08 Qualcomm Incorporated VoIP emergency call support
US8976693B2 (en) * 2011-07-15 2015-03-10 Electronics And Telecommunications Research Institute Method for reporting emergency and terminal in mobile communication system
US9277408B2 (en) * 2011-10-10 2016-03-01 Lg Electronics Inc. Method and device for authorizing user equipment in a wireless communication system
US9621735B2 (en) 2014-06-25 2017-04-11 Textnow, Inc. Mobile electronic communications combining voice-over-IP and mobile network services
WO2016155827A1 (en) * 2015-04-01 2016-10-06 Telefonaktiebolaget L M Ericsson Ims emergency calls for roaming ues
US10750028B2 (en) 2017-06-29 2020-08-18 Textnow, Inc. Mobile communications with quality of service
US11075973B2 (en) * 2019-10-23 2021-07-27 Verizon Patent And Licensing Inc. Systems and methods for prioritized sip services using UE-specified sip register messages

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5572442A (en) 1994-07-21 1996-11-05 Information Highway Media Corporation System for distributing subscription and on-demand audio programming
WO1997025798A1 (en) 1996-01-11 1997-07-17 Mrj, Inc. System for controlling access and distribution of digital property
US5754786A (en) 1996-09-13 1998-05-19 At&T Corp System and method for integrated overload control and message distribution
US5987331A (en) * 1996-11-20 1999-11-16 Motorola, Inc. Communication system to communication system gateway method and apparatus
US6119143A (en) 1997-05-22 2000-09-12 International Business Machines Corporation Computer system and method for load balancing with selective control
US6256771B1 (en) 1997-10-16 2001-07-03 At&T Corp. Method and apparatus for providing a dynamic service composition software architecture
US6219346B1 (en) 1997-12-02 2001-04-17 At&T Corp. Packet switching architecture in cellular radio
US6370234B1 (en) * 1998-06-16 2002-04-09 Kroll Family Trust Public service answering point with automatic triage capability
US6490624B1 (en) 1998-07-10 2002-12-03 Entrust, Inc. Session management in a stateless network system
US6360270B1 (en) 1998-11-16 2002-03-19 Hewlett-Packard Company Hybrid and predictive admission control strategies for a server
US6182149B1 (en) 1999-01-11 2001-01-30 3Com Corporation System for managing dynamic processing resources in a network
EP1111894A1 (en) 1999-12-22 2001-06-27 Telefonaktiebolaget Lm Ericsson Communication system and method for establishing a conversation using different link layer thechnologies
US6944150B1 (en) 2000-02-28 2005-09-13 Sprint Communications Company L.P. Method and system for providing services in communications networks
KR20010092616A (en) 2000-03-22 2001-10-26 오지수 Data processing method and device for VDD system supporting a renting system based on a given period of time
GB2361389B (en) * 2000-04-15 2004-01-28 Ericsson Telefon Ab L M Telecommunications system
US6898278B1 (en) 2000-05-08 2005-05-24 Li Li Signaling switch for use in information protocol telephony
US6868450B1 (en) 2000-05-17 2005-03-15 Hewlett-Packard Development Company, L.P. System and method for a process attribute based computer network filter
US20020049930A1 (en) 2000-09-07 2002-04-25 Inrange Technologies Corporation Protocol analysis framework
US6801948B2 (en) 2000-12-15 2004-10-05 Hewlett-Packard Development Company, L.P. System and method for a streams based network access control for a computer
US7032243B2 (en) 2000-12-15 2006-04-18 Hewlett-Packard Development Company, L.P. System and method for a group-based network access control for computer
US7218722B1 (en) * 2000-12-18 2007-05-15 Westell Technologies, Inc. System and method for providing call management services in a virtual private network using voice or video over internet protocol
US6724874B2 (en) * 2001-01-17 2004-04-20 Sbc Technology Resources, Inc. Outgoing call screening
US7171678B2 (en) 2001-01-22 2007-01-30 N2 Broadband, Inc. Systems and methods for establishing and administering sessions in digital cable systems
US6904521B1 (en) 2001-02-16 2005-06-07 Networks Associates Technology, Inc. Non-repudiation of e-mail messages
US6944133B2 (en) 2001-05-01 2005-09-13 Ge Financial Assurance Holdings, Inc. System and method for providing access to resources using a fabric switch
US7136386B2 (en) 2001-07-19 2006-11-14 Sbc Technology Resources, Inc. Virtual private network over asynchronous transfer mode
US6885874B2 (en) * 2001-11-27 2005-04-26 Motorola, Inc. Group location and route sharing system for communication units in a trunked communication system
US7539186B2 (en) * 2003-03-31 2009-05-26 Motorola, Inc. Packet filtering for emergency service access in a packet data network communication system
US7342918B2 (en) 2003-04-15 2008-03-11 American Express Travel Related Services Co., Inc. Transaction card information access web service

Cited By (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10694385B2 (en) 2009-01-28 2020-06-23 Headwater Research Llc Security techniques for device assisted services
US9674731B2 (en) 2009-01-28 2017-06-06 Headwater Research Llc Wireless device applying different background data traffic policies to different device applications
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US9591474B2 (en) 2009-01-28 2017-03-07 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US9609510B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Automated credential porting for mobile devices
US9609459B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Network tools for analysis, design, testing, and production of services
US9609544B2 (en) 2009-01-28 2017-03-28 Headwater Research Llc Device-assisted services for protecting network capacity
US9615192B2 (en) 2009-01-28 2017-04-04 Headwater Research Llc Message link server with plural message delivery triggers
US9641957B2 (en) 2009-01-28 2017-05-02 Headwater Research Llc Automated device provisioning and activation
US9647918B2 (en) * 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US10716006B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc End user device that secures an association of application to service policy with an application certificate check
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9705771B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Attribution of mobile device data traffic to end-user application based on socket flows
US9749899B2 (en) 2009-01-28 2017-08-29 Headwater Research Llc Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications
US9749898B2 (en) 2009-01-28 2017-08-29 Headwater Research Llc Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems
US9769207B2 (en) 2009-01-28 2017-09-19 Headwater Research Llc Wireless network service interfaces
US9819808B2 (en) 2009-01-28 2017-11-14 Headwater Research Llc Hierarchical service policies for creating service usage data records for a wireless end-user device
US9866642B2 (en) 2009-01-28 2018-01-09 Headwater Research Llc Wireless end-user device with wireless modem power state control policy for background applications
US9942796B2 (en) 2009-01-28 2018-04-10 Headwater Research Llc Quality of service for device assisted services
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US9973930B2 (en) 2009-01-28 2018-05-15 Headwater Research Llc End user device that secures an association of application to service policy with an application certificate check
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9986413B2 (en) 2009-01-28 2018-05-29 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US10028144B2 (en) 2009-01-28 2018-07-17 Headwater Research Llc Security techniques for device assisted services
US10057141B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Proxy system and method for adaptive ambient services
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US10064033B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Device group partitions and settlement platform
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10070305B2 (en) 2009-01-28 2018-09-04 Headwater Research Llc Device assisted services install
US10080250B2 (en) 2009-01-28 2018-09-18 Headwater Research Llc Enterprise access control and accounting allocation for access networks
US10171988B2 (en) 2009-01-28 2019-01-01 Headwater Research Llc Adapting network policies based on device service processor configuration
US10171990B2 (en) 2009-01-28 2019-01-01 Headwater Research Llc Service selection set publishing to device agent with on-device service selection
US10171681B2 (en) 2009-01-28 2019-01-01 Headwater Research Llc Service design center for device assisted services
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US10237146B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc Adaptive ambient services
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US10237773B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc Device-assisted services for protecting network capacity
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US10320990B2 (en) 2009-01-28 2019-06-11 Headwater Research Llc Device assisted CDR creation, aggregation, mediation and billing
US10321320B2 (en) 2009-01-28 2019-06-11 Headwater Research Llc Wireless network buffered message system
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US10326675B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Flow tagging for service policy implementation
US10462627B2 (en) 2009-01-28 2019-10-29 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US10536983B2 (en) 2009-01-28 2020-01-14 Headwater Research Llc Enterprise access control and accounting allocation for access networks
US10582375B2 (en) 2009-01-28 2020-03-03 Headwater Research Llc Device assisted services install
US10681179B2 (en) 2009-01-28 2020-06-09 Headwater Research Llc Enhanced curfew and protection associated with a device group
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US11750477B2 (en) 2009-01-28 2023-09-05 Headwater Research Llc Adaptive ambient services
US10749700B2 (en) 2009-01-28 2020-08-18 Headwater Research Llc Device-assisted services for protecting network capacity
US10771980B2 (en) 2009-01-28 2020-09-08 Headwater Research Llc Communications device with secure data path processing agents
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US10791471B2 (en) 2009-01-28 2020-09-29 Headwater Research Llc System and method for wireless network offloading
US10798254B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc Service design center for device assisted services
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10798558B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc Adapting network policies based on device service processor configuration
US10803518B2 (en) 2009-01-28 2020-10-13 Headwater Research Llc Virtualized policy and charging system
US10834577B2 (en) 2009-01-28 2020-11-10 Headwater Research Llc Service offer set publishing to device agent with on-device service selection
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10848330B2 (en) 2009-01-28 2020-11-24 Headwater Research Llc Device-assisted services for protecting network capacity
US10855559B2 (en) 2009-01-28 2020-12-01 Headwater Research Llc Adaptive ambient services
US10869199B2 (en) 2009-01-28 2020-12-15 Headwater Research Llc Network service plan design
US10985977B2 (en) 2009-01-28 2021-04-20 Headwater Research Llc Quality of service for device assisted services
US11039020B2 (en) 2009-01-28 2021-06-15 Headwater Research Llc Mobile device and service management
US11096055B2 (en) 2009-01-28 2021-08-17 Headwater Research Llc Automated device provisioning and activation
US11134102B2 (en) 2009-01-28 2021-09-28 Headwater Research Llc Verifiable device assisted service usage monitoring with reporting, synchronization, and notification
US11190545B2 (en) 2009-01-28 2021-11-30 Headwater Research Llc Wireless network service interfaces
US11190427B2 (en) 2009-01-28 2021-11-30 Headwater Research Llc Flow tagging for service policy implementation
US11190645B2 (en) 2009-01-28 2021-11-30 Headwater Research Llc Device assisted CDR creation, aggregation, mediation and billing
US11219074B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Enterprise access control and accounting allocation for access networks
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US11228617B2 (en) 2009-01-28 2022-01-18 Headwater Research Llc Automated device provisioning and activation
US11337059B2 (en) 2009-01-28 2022-05-17 Headwater Research Llc Device assisted services install
US11363496B2 (en) 2009-01-28 2022-06-14 Headwater Research Llc Intermediate networking devices
US11405224B2 (en) 2009-01-28 2022-08-02 Headwater Research Llc Device-assisted services for protecting network capacity
US11405429B2 (en) 2009-01-28 2022-08-02 Headwater Research Llc Security techniques for device assisted services
US11412366B2 (en) 2009-01-28 2022-08-09 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US11425580B2 (en) 2009-01-28 2022-08-23 Headwater Research Llc System and method for wireless network offloading
US11477246B2 (en) 2009-01-28 2022-10-18 Headwater Research Llc Network service plan design
US11494837B2 (en) 2009-01-28 2022-11-08 Headwater Research Llc Virtualized policy and charging system
US11516301B2 (en) 2009-01-28 2022-11-29 Headwater Research Llc Enhanced curfew and protection associated with a device group
US11533642B2 (en) 2009-01-28 2022-12-20 Headwater Research Llc Device group partitions and settlement platform
US11538106B2 (en) 2009-01-28 2022-12-27 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US11563592B2 (en) 2009-01-28 2023-01-24 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US11570309B2 (en) 2009-01-28 2023-01-31 Headwater Research Llc Service design center for device assisted services
US11582593B2 (en) 2009-01-28 2023-02-14 Head Water Research Llc Adapting network policies based on device service processor configuration
US11589216B2 (en) 2009-01-28 2023-02-21 Headwater Research Llc Service selection set publishing to device agent with on-device service selection
US11665186B2 (en) 2009-01-28 2023-05-30 Headwater Research Llc Communications device with secure data path processing agents
US11665592B2 (en) 2009-01-28 2023-05-30 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US11923995B2 (en) 2009-01-28 2024-03-05 Headwater Research Llc Device-assisted services for protecting network capacity
US11757943B2 (en) 2009-01-28 2023-09-12 Headwater Research Llc Automated device provisioning and activation
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US11743717B2 (en) 2013-03-14 2023-08-29 Headwater Research Llc Automated credential porting for mobile devices
US10834583B2 (en) 2013-03-14 2020-11-10 Headwater Research Llc Automated credential porting for mobile devices
US10171995B2 (en) 2013-03-14 2019-01-01 Headwater Research Llc Automated credential porting for mobile devices
US10794280B2 (en) 2017-05-15 2020-10-06 Pratt & Whitney Canada Corp. Air intake for gas turbine engine

Also Published As

Publication number Publication date
US8737594B2 (en) 2014-05-27
US7899174B1 (en) 2011-03-01
US20110128955A1 (en) 2011-06-02

Similar Documents

Publication Publication Date Title
US8737594B2 (en) Emergency services for packet networks
EP1386509B1 (en) User equipment, network element, and method and communication system for establishing an emergency session
US7408948B2 (en) Packet mode speech communication
US6788676B2 (en) User equipment device enabled for SIP signalling to provide multimedia services with QoS
EP1885096B1 (en) Application session border element
US7792065B2 (en) Securely establishing sessions over secure paths
KR100701637B1 (en) Circuit-switched and packet-switched communications
US7590122B2 (en) Method and apparatus for session control
US20090041006A1 (en) Method and system for providing internet key exchange
TW200304296A (en) Apparatus and method for computer telephone integration in parkcet switched telephone networks
AU2004306243B2 (en) Method and system for providing a secure communication between communication networks
EP1111892B1 (en) Methods and systems for internet protocol (IP) network surveillance
US8539552B1 (en) System and method for network based policy enforcement of intelligent-client features
US7742463B2 (en) Security gatekeeper for a packetized voice communication network
US7366183B1 (en) Detecting multimedia capability of a caller
US7620167B2 (en) Apparatus to override the redirect or reject feature at an SIP end point
US20030046403A1 (en) Method for routing data streams of a communication connection between users of a connectionless packet data network, and a packet data network, a control device and a program module therefore
US6363430B1 (en) Methods and systems for providing an absent addressing service to customers in a communications network
JP2006515698A (en) Communications system
CN101622815B (en) Dynamic key exchange for call forking scenarios
US20030154408A1 (en) Method and apparatus for secured unified public communication network based on IP and common channel signaling
EP2045991A1 (en) Method and device for processing data and communication system comprising such device
WO2001019018A1 (en) Security with authentication proxy
KR100418398B1 (en) method for authentication of subscriber using the Mac address
CN114531426A (en) End-to-end streaming media routing method based on back-to-back authentication mode

Legal Events

Date Code Title Description
AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779

Effective date: 20150128

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION