Abstract:
Systems and methods are disclosed for providing online charging in an IMS network (100). An IMS gateway system (101) receives a first message (202) from a CSCF (110) through a first interface (112) for a call session, and processes the first message (204) to determine whether to contact an OCS (120) for online charging for the call session. If the determination is to contact the OCS, then the IMS gateway system generates a second message (208) that comprises a charging request to transmit to the OCS. The IMS gateway system then maps fields of the first message in the first protocol to fields in the second message in a second protocol used by the OCS (210), and transmits the second message to the OCS through a second interface (212). The second message provides the OCS the proper information to perform online charging functions for the call session.
Abstract:
An intelligent-networked telecommunication system avoids redundant billing for telephone transactions in which there is a billing conflict between the Intelligent Network (IN) and another component of the system by its Service Control Point (SCP) creating a service-dependent pseudo Calling Line Identifier (CLI). When a Pseudo CLI look-up table stored in the SCP database indicates that a pseudo CLI is to be created (based upon the Destination Number, DN, or the Service Key, SK), the SCP combines a prefix listed in the table with the Calling Party Number (CgPN) to form a pseudo CLI or create a totally new CLI number string. When the call is connected to the DN, the created pseudo CLI, rather than the original CLI, is transferred to the DN. A pseudo CLI is indicated where the IN is programmed to handle the billing of a particular transaction, and where the instrumentality of the DN (e.g., toll switch or special service platform) is also set up to handle billing. When the toll switch, special service platform, etc., attempts to bill for the transaction (already being billed by the IN) the pseudo CLI prevents it from billing an actual customer since no actual customer will have any of the pseudo CLIs. The service-dependent CLI also indicates to the toll switch, or special service platform, etc., that the current IN service call has already been billed through the IN.
Abstract:
Communication between a service switching point (SSP) and an external (or stand alone) Intelligent Peripheral (IP) has not been defined by any of the standard bodies. ITU-T Q.1600 and ETSI 300 374-1 defines the network configuration of SCP, SSP and stand-alone IP units using SS7 ISUP connection, but ITU-T Q.1600 and ETSI 300 374-1 does not specify in detail the SS7 ISUP messages for bi-directional communication between a SSP and an IP unit. This invention details the message flow between a SCP, a SSP and an ISUP IP unit, especially in the messages between the SSP and IP unit using SS7 ISUP protocol. With the signaling method of the present invention, SCP can send INAP operations, such as PA, PCUI to instruct an external IP unit to play an announcement or collect user information, then an IP unit can send back the related operations back to SCP. In this case, the resource of the IP unit can be shared by other switches and SSPs in the network.
Abstract:
A telephone calling card (prepaid or postpaid) service system with an intelligent network (IN) for automated call processing novelty associates a Virtual Destination Number (VDN) with each calling card account to significantly broaden service options to calling card account subscribers. As a result, a calling card customer ca n combine calling card service with voice mail service and call forwarding service, which was heretofore not possible. More particularly, the additional services include: the ability of a calling card customer to check a voice mailbox associated with the calling card VDN; the ability of a calling card customer to create and change voice mail greeting options; the ability of a calling card customer to establishing a call forwarding number; and the ability of third parties dialing the VDN to either be connected to a call forwarding number if established, or access the calling card account subscriber's voice mailbox.
Abstract:
Systems and methods are disclosed that allow for storing of data messages, such as text messages or multimedia messages, in a data message mailbox. If a data message is sent from a sender (112) to a recipient (122), then the communication network (100) receiving the data message attempts to deliver the data message to the recipient (122). If unsuccessful in delivering the data message, then the network (100) stores the data message for the recipient (122). If the communication network (100) later receives a request to retrieve the stored data message from the recipient (122), then the communication network (100) delivers the stored data message to the recipient (122).
Abstract:
Systems and methods are disclosed that determine whether a sender/recipient using an electronic messaging service (e.g., SMS messaging service or MMS messaging service) is located in a defined home zone. A communication network (100) in one embodiment includes a messaging system (102), such as an SMSC or an MMSC, and a home zone system (104). If the messaging system (102) receives an electronic message from a sender (121) to a recipient (122), then the home zone system (104) determines a location of the sender/recipient. The home zone system (104) also determines whether the sender/recipient is located in a home zone. If the home zone system (104) determines that the sender/recipient is located in a home zone, then the messaging system (102) forwards the electronic message to the recipient. If the home zone system (104) determines that the sender/recipient is not located in the home zone, then the messaging system (102) blocks the electronic message.
Abstract:
Call rating systems and methods using a mobile to mobile database with operator prefixes and a rating key table in which network operators subscribed to by mobile to mobile calling and called parties are identified by database queries and a rating key is obtained according to the prefixes to rate the call according to the rating key value representing agreed discounts for calls between subscribers of mobile network operators and mobile virtual network operators.
Abstract:
Communication networks (100) and associated methods are disclosed for dynamically defining service triggers. Responsive to receiving a session initiation message for a session, an application server (116-118) defines one or more subsequent service triggers for a service provided by the application server (116-118) for the session. The subsequent service triggers identify messages or conditions for the session of which the application server (116-118) desires to be notified. The application server (116-118) then transmits the subsequent service triggers to a session control function (112) that is setting up or maintaining the session. The session control function (112) then receives a subsequent message for the session. The session control function (112) processes the subsequent message and the subsequent service triggers to determine whether to transmit the subsequent message to the application server (116-118).
Abstract:
Communication networks (100) and methods are disclosed for providing charging for offhet sessions between an IMS network (102) and a legacy network (102). The IMS network (102) generates a charging ID for the session and includes the charging ED in charging records that are generated for the session. The IMS network (102) also transmits the charging ED to the legacy network (104) in the signaling transmitted from the IMS network to the legacy network for the session. The legacy network (104) receives the charging ID from the EMS network, and includes the charging ID in a charging record generated for the session. The billing system (106) can then correlate charging records generated by the IMS network for the session with a charging record generated by the legacy network for the session based on the charging ID included in the charging records.
Abstract:
Message spoofing is detected by an anti-spoofing application comparing a trusted switch address (i.e., corresponding to an originating switch having processed an incoming message) to an "affiliated" address (i.e., corresponding to a switch serving the location of the identified sender). Message spoofing is detected if the trusted address differs from the affiliated address.