This article is about the accurate method of account checking in the situation of 7.times.24 hours transactions between telecom multiple systems. The systems we discussed here provide services individually. There is an Account Checking Controlling Server, and all the systems are connected with the Account Checking Controlling Server, the transaction between systems is distributed by Account Checking Controlling Server. Account Checking Controlling Server is in charge of control and manage the transaction of account checking between systems, it is consists of transaction management module, account checking cycle management module, transaction flow module and account checking management module. Transaction management module is in charge of storage and handle the system information and the system distribute rules. Account checking cycle management module is responsible for create and manage the account checking cycle. Transaction flow module realize the specific transaction. Account checking management module is responsible for account checking. This invention realize account checking accurately, it can do account checking timely, accurately, and don't affect the systems 7*24 hours running, when account checking cycle ended, account checking is automatically invoked, so we can find problems as soon as possible.
The details of an apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment are disclosed herein. The ciphering activation time is determined for radio bearers other than RB2 by measuring the data rate on each target radio bearer during the time that it takes for a polling or RRC message sent from the user equipment UE to be acknowledged by the network UTRAN. For RB2, the uplink ciphering activation time is determined by taking into account the size of the RRC response message and the data already queued on RB2 for transmission.
A system for providing wireless telecommunications services to mobile devices includes structure and functionality for location-based services, and includes both server and client/mobile device apparatuses. One apparatus includes a data store storing at least a first record associated with a first wireless device or a second record associated with a second wireless device. A computer is coupled to the data store and is configured to receive a request from the first wireless device to obtain location information associated with the second wireless device. The computer is configured to receive a change location privileges request, and to update the first or second records in the data store based on the received change request. Other apparatuses provide additional structures and functions.
In accordance with various embodiments, a set of features are described for enabling an application server platform for telecom based applications. A system for providing an application server for telecom-based applications can include an application server that includes a session initiation protocol (SIP) adapter. The SIP adapter can use a connection oriented protocol and provides interactions with application code in an actor of said application server by means of asynchronized SIP protocol events. The SIP adapter can also provide stateless node mapping to a stateful server node hosting a specific session for the actor.
In accordance with various embodiments, a set of features are described for enabling an application server platform for telecom based applications. A system for providing an application server for telecom-based applications can include a computer, including a computer readable medium and processor. The system can also include an application server, executing on the computer. The application server can include an actor container that manages and provides lifecycle and runtime properties for application classes that are executed as actors in the application server. The actor container can manages a set of event transactions, wherein all storage operations are performed as part of the event transaction that spans each event handler invocation.
Audiovisual reproduction system comprising a central unit managing a sound control circuit, and a telecommunications modem connected to a distribution network controlled by a host server, through a multitask operating system created around a tools and services library, characterized in that the operating system comprises a function that adjusts the sound control circuit to couple volumes in the various areas in which the loudspeakers in the audiovisual reproduction system are used, this function being accessible through a management mode of the multitask operating system, the coupling maintaining the ratios between the various volumes in each area when the volume in one area is modified.
A method of establishing a communication link between a mobile terminal of a wireless network and a subscriber of a network, such as an enterprise network, and/or a residential network.
A communication system providing wireless communication among wireless users through a number of cellular base stations, each including at least transport management equipment and broadband equipment, at least one of which supports at least remote cellular station including RF equipment for communication with users of cellular devices. The system includes at lease one wireless narrow beam communication link operating at millimeter wave frequencies in excess of 60 GHz connecting a remote cellular station with a cellular base station equipped with broad band conversion electronic equipment and transport management equipment. In preferred embodiment the communication system includes a large number of remote cellular stations with each remote cellular station serving a separate communication cell. Each remote cellular station is equipped with a low frequency wireless transceiver for communicating with the wireless users within the cell at a radio frequency lower than 6 GHz and a narrow beam millimeter wave wireless transceiver operating at a millimeter wave frequency higher than 60 GHz for communicating with another millimeter wave transceiver at another remote cellular station or a millimeter wave transceiver at a base station.
For synchronizing a master device and a slave device connected by a data transfer link, the master device measures a phase offset in a signal received from the slave device with respect to the master's clock signal. The master determines a control symbol based on the phase offset. The master encodes the control symbol in a transmit signal for the slave. The slave decodes the control symbol from the signal received from the master. The slave uses the control symbol to adjust the phase shift to compensate for the phase offset of a signal to be transmitted to the master device. When the phase compensated signal is received at the master, its phase offset is smaller than the original phase offset. This procedure can be performed iteratively until the phase offset is within a desired tolerance.
A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of identity fraud, and a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. According to an implementation, one or more neural network models are defined, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class. The one or more neural network models are run to generate data requests about the subject's identity, and the data requests are passed to a detection system that monitor transactions associated with the subject. Additional data associated with the transactions is requested until a threshold certainty is achieved or until available data or models are exhausted.
A method and apparatus for managing institutional telephone activity utilizing a computer-based telephony management unit to connect institutional telephones with outside telephone lines. The unit provides institutional users with fully automated, direct dial and collect calling privileges for local, long distance, and international calls. The unit contains a database for storing the calling privileges and restrictions of institutional users, for recording calling transactions made by the users, and for managing user monetary accounts. The unit can record up to 400 hours of conversation in a digital format. The unit provides various administrative capabilities, including user account management, audit trails, transaction reports, centralized management and report capabilities, and detection of fraudulent calling.
A method and apparatus providing interconnectivity between several telephone networks. The apparatus receives a telephone transaction initiation message that originated with a telephone set located in a first network. The initiation message bears an originator's registration number identifying a subscriber whose home registration is located in a second network, the first and second networks using disparate signaling protocols. The apparatus then queries the originator's home registration database using the network protocol of the second network to determine the registration status of the originator. Finally, the registration status information is forwarded to the first network in the network protocol of the first network.
System has consent, signature, recording and retention functions. Near post-sessional data acquisition gathers nominal comm device information from participants. Active online phones are sent a SMS with the recorded event ID, a hyperlink and password for system access. Otherwise, data is acquired for another text message enabled phone or user email. If disconnected, the user is called for additional data. A contractual relationship is established with these functions. With an ACK-consent upon system access, an ACK-consent by the parties, a RECORD ON command, and a recorded intent-to-contract, the system creates an enforceable contract by storing the ACKs and recorded session.
A new sub-system, the core abstraction layer (CAL), is introduced to the middleware layer of the multi-core processor based modem board. This new module provides an abstraction for the multi-core FSL P4080 processor and its DPAA. For the deployment of this modem board, the CAL will provide various services such as zero copy lock free buffer management scheme to LTE L2 application, and the support for the new backplane Ethernet driver (BED) interface for the RLC SDU transmission and reception to and from the controller board for multi-cell configuration.
An optical resonator includes a reflective element and an optical fiber. The optical fiber is positioned relative to the reflective element such that light emitted from the optical fiber is reflected by the reflective element. The optical resonator has an optical resonance with a resonance lineshape that is asymmetric as a function of wavelength.
A diagnostic engine for remotely determining global line characteristics of a xDSL telecommunication line from an access node location. The diagnostic engine comprises first, second, and preferably third, measurement means adapted to measure respectively first, second and third line characteristics according to three distinct measurement techniques such as MELT, SELT and DELT. The diagnostic engine further comprises combining means able to combine the measured line characteristics in order to derive thereof global line characteristics or information relative to the physical state of the line as well as possible consequences on DSL service. By combining the three measurements in the combining means, the resulting global line characteristics of the line are improved with respect to performing separately interpretations of the three measurements.
A handheld communication device capable of transmitting and receiving at least voice and text communication. The device has a body assembly including a front face arranged to be directed toward an operator of the device when held in a text communicating orientation. A display screen and a text-input keyboard are included and are each exposed at the front face of the body assembly. The keyboard has a plurality of keys that include a set of alphabetic keys with which either QWERTY-, QWERTZ- AZERTY- or Dvorak-arranged alphabetic characters are associated. An integrated camera assembly is also included that is configured for taking photographs and the communication device enabled to wirelessly communicate photographs taken with the camera assembly to a remote receiver. The camera assembly includes a photo-initiating actuator having an actuated position and an unactuated position and at least one of a selective enablement device or a selective disablement device.
An Early Payment Discount (EPD) mechanism that enables customers to automatically receive an early payment discount for paying their invoice electronically, e.g., via electronic funds transfer (EFT), through an e-Billing system within a designated number of days from on-line invoice post date.
Method and apparatus are provided for encoding cell-specific information in a telecommunication system. Cell-specific information is encoded by a synchronization code. A synchronization signal including the synchronization code is sent, wherein the synchronization code includes a first repetitive cyclically permutable codeword generated from a first codeword ( c 1 , c 2 , c i , c M 2 ) , where M 2 ##EQU00001## is the smallest integer not less than M/2, 0.ltoreq.c.sub.i.ltoreq.N, 1.ltoreq.i.ltoreq.M for all i, M, N are positive integers, and the repetitive structure of the first repetitive cyclically permutable codeword is given by repeating the value of at least one codeword element of the first repetitive cyclically permutable codeword in at least one other codeword element position within the first repetitive cyclically permutable codeword.
Methods and systems for enhanced Colorful Ring-Back Tone (eCRBT) services by mixing multiple digital content streams in real time are provided, including audio, video, data, text-based message, and hypermedia object streams. One or more properties of the content streams, such as volume or pitch of an audio stream, or brightness and layout of a video stream, are gradually altered such that a prominence of the an individual content stream is dynamically and seamlessly changed relative to other content streams with time. An eCRBT controller controls mixing and playing of digital content either based on an internal algorithm in an application server, or selections received from subscribers through provisioning interfaces. Personalized content streams can be mixed and played in real time based on interactive response received from a calling subscriber. Content may also be personalized based on caller by service provider. Subscriber-chosen content, subscriber's current availability information, and promotional or informational content from a service provider or a third party may be mixed seamlessly on top of each other.
A method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates obtaining information concerning one or more characteristics of one or more monitored wireless signals or links, such as radio frequency (RF) signals, transmitted across a geographic area; and detecting a presence of an object in the geographic area according to a variation of a characteristic of one or more of the RF signals reflecting interference of the RF signal(s) by the object.
A disclosed enterprise instant messaging (IM) service aggregator enables validation of mobile stations and/or users for enterprise IM service through a wireless communication network; and in the examples, the enterprise IM service provides a secure messaging environment that allows IM traffic to/from wireless mobile stations. The security offered may be unique to and controlled by each enterprise, for example, by enabling each enterprise to generate its own encryption key for distribution through the aggregator and by allowing mobile stations to generate their own keys for distribution back through the aggregator to the enterprise IM servers. As disclosed, the login credentials are encrypted from the mobile station to the enterprise IM server. The use of standard encryption methods within the call flows allows a simple method of ensuring that only authorized users can access the enterprise servers and that the messages will be encrypted by the strongest possible means.
In accordance with various embodiments, a set of features are described for enabling an application server platform for telecom based applications. A system for providing an application server for telecom-based applications can include an application server that includes an event broker distributed across a cluster. The event broker can provide a distributed publish-subscribe mechanism that is a generic interface to all server nodes in the cluster. The event broker filters events with event attributes by way of matching criteria. Additionally, the event broker is used to dispatch events to specific listeners based on certain criteria.
A telecommunications module includes a plurality of adapters mounted at a front face. The adapters are provided in groups of two and are stacked extending from the top to the bottom of the module. The front face of the module defines a center portion, a right portion, and a left portion. According to one embodiment, the right and the left portions are generally angled forwardly at an acute angle relative to a line that is perpendicular to the sides of the module as they extend from the center toward the right and left sides of the module. Each angled portion defines a slope as it extends from the center portion toward the right and left sides. The angled portions define a stepped configuration as they extend from the center toward the sides. Each step in the stepped configuration defines adapter receptacles that are also angled at an acute angle with respect to a line that generally defines the slope of the angle of the right and left angled portions. According to another aspect of the disclosure, the right and the left portions of the front face are generally angled rearwardly at an acute angle with respect to a line that is perpendicular to the sides of the module as they extend from the center toward the right and left sides. Stacked adapters mounted to the angled portions have longitudinal axes that are perpendicular to slopes defined by the angled portions.
An embodiment of the invention provides for receiving a datavalue- location indication from which a set of data values that are to be normalized can be determined, determining columnheader and row-header information associated with the set of data values, and automatically creating a set of associations, wherein, for each data value in the set of data values, each association associates respective column-header and rowheader information with a single data value such that no data is duplicated per row of a table that is composed of rows of data created from the associations.
During semiconductor fabrication homogeneous gap-filling is achieved by depositing a thin dielectric layer into the gap, post deposition curing, and then repeating deposition and post deposition curing until gap-filling is completed. Embodiments include depositing a layer of low deposition temperature gapfill dielectric into a high aspect ratio opening, such as a shallow trench or a gap between closely spaced apart gate electrode structures, as at a thickness of about 10 .ANG. to about 500 .ANG., curing after deposition, as by UV radiation or by heating at a temperature of about 400.degree. C. to about 1000.degree. C., depositing another layer of low deposition temperature gapfilled dielectric, and curing after deposition. Embodiments include separately depositing and separately curing multiple layers.
General and algebraic-constructed contention-free memory mapping for parallel turbo decoding with algebraic interleave ARP (almost regular permutation) of all possible sizes. A novel means is presented in which contention-free memory mapping is truly achieved in the context of performing parallel decoding of a turbo coded signal. A novel means of performing the contentionfree memory mapping is provided to ensure that any one turbo decoder (of a group of parallel arranged turbo decoders) accesses only memory (of a group of parallel arranged memories) at any given time. In doing so, access conflicts between the turbo decoders and the memories are avoided.
The present invention relates to a digital telecommunications client system (52) for using of digital applications and services, based on at least one USSD protocol, said USSD client (52), and located in at least one mobile terminal (11). This USSD client includes means for receiving and interpreting at least one data and/or least one instruction from at least one telecommunications network (51), means for displaying in text and/or in graphic on a screen (12) and for presenting on said mobile terminal (11) at least one data and/or at least one instruction from said network (51), means for interpreting and for sending back to said network (51) at least one request and/or at least one message of at least one user, in function of at least one data and/or at least one presented service and means for communicating with at least one server of at least one third party such as any USSD server, on-device-portal server or other. Said USSD client (52) includes at least one transport module (53), including at least one encryption module (535), at least one decoder interpreter module (54) and at least one presentation module (55). It includes also at least one navigation module (56).
[Object] It is to raise operational frequency and S/N ratio of the pulsed homodyne detector to measure the quadrature amplitude of the signal pulse light. [Solution] The local pulse light in telecom band is yielded at repetition rate of 80 MHz. Two output lights are generated by interference of the local pulse light and the signal pulse light. The first photodiode and the second photodiode are connected differentially. The first photodiode converts one side output light to an electric signal. The second photodiode converts the other side output light to another electric signal. The M-derived low-pass filter eliminates the third harmonics of the local pulse light. Moreover, the higher frequency components than triple frequency of the repetition rate are eliminated. In this way, even when it is operated at high repetition rate of 80 MHz at maximum, the quadrature amplitude of the signal pulse light can be measured with high quantum efficiency of about 90% and with S/N ratio of more than 10 dB.
An identification system and method for recognizing a device as one of a plurality of different types of devices connected to at least one terminal of an information handling system includes supplying a test signal to a device in a test mode; measuring an electrical characteristic of the device in response to the test signal being applied to the device in the test mode; and matching a representation of the electrical characteristic of the device with representations of the electrical characteristics of the plurality of devices for recognizing the device connected to the terminal as one of the plurality of different devices.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for selecting an image of a caller associated with an incoming call. In one aspect, a method includes identifying a caller associated with an incoming call from an originating telecommunications device. The method also includes locating plurality images of the identified caller, and randomly displaying on the mobiletelecommunications device's display screen one or more images from among the located plurality images of the identified caller.
A user terminal in a telecommunications network includes a circuit-switched (CS) telephony device and a packet-switched (PS) data processing device. The CS telephony device receives a CS-alert signal from the network for an incoming CS call and derives from the CS-alert signal that an associated PS signal is to be expected within a predetermined time interval. The terminal postpones generation of a call-received alarm for a user during the predetermined time interval. The PS data processing device receives the associated PS signal within the predetermined time interval, wherein the PS signal includes a request that the user terminal automatically answer the incoming CS call. In response to the request, the PS data processing device passes a control signal to the CS telephony device causing the CS telephony device to switch to an automatic answering mode and transmit a CS-answer signal to the network without input from the user.
The invention relates to an information retrieval system in which a telecom network (1) is used for transmitting to a terminal (2) from a computer (3) packets of information represented visually as pages, said packets of information being stored b) the computer in the form of information blocks each comprising a first information packet (7) representing a message of a corresponding page and a second information packet (8) representing data relating to the same page. According to the invention, said message and said data relate to electronic receipts and warranty registrations, respectively, and said information blocks comprise a third information packet (9) arranged in combination with said first information packet to be received from a transaction equipment (10) via the telecom network and to instruct said computer to make said transmittals in such a way that said data relating to said warranty registrations are represented visually at said terminal as information added to said message relating to said electronic receipts and located inside a chosen subfield of said page.
There is described herein a method and apparatus for providing a telecommunications link between a first user and a second user in a telecommunications network. A request is received from the first user to provide atelecommunications link to the second user. The system then determines from a server hosting a networked community of users in which users interact over a communications network independent of thetelecommunications network whether the first user and the second user have a specified relationship in the community of users. At least one setting for the telecommunications link is specified based on whether the first user and the second user have a specified relationship in the community of users.
A keyboard for a mobile device 400 having a processor 618 for interpreting signals comprises a plurality of keys 410-424 and corresponding indicia including keys associated with alphabetic characters corresponding to an array of letters A-Z. The keys 410-419 that are associated with alphabetic characters number fewer than twenty-six and correspond to one of a QWERTY, QWERTZ, AZERTY, or DVORAK key arrangement. Each of the plurality of keys 410-424 have multiple input surfaces and are arranged in an array of rows and columns that include a first outer column, at least one middle column, and a last outer column. The first and last columns of keys are operable to input at least three different signals to a processor 618 of a mobile device 400 depending upon what input surface of the key 410-424 is pressed. A middle column of keys is operable to input at least five different signals to a processor 618 depending on what input surface of the key 410-424 is pressed.
A location continuity service having a location continuity application server (\"LCAS\") that utilizes location data generated by multiple networks to determine the location of a mobile device is disclosed. The LCAS specifies a suitable reconciliation process that identifies two or more location estimation techniques that are implemented by different access networks and indicates how to utilize the location data produced by the identified estimation techniques. The LCAS interacts with various access networks identified by the reconciliation process in order to receive location data (e.g., positioning measurements and/or estimated locations) generated by the access networks and analyzes the received data to determine the location of a mobile device and provide the determined location to a location-based service. In some examples, an LCAS also provides location continuity when a mobile device moves between a home communications system and a visited communications system.
A buffer management mechanism in a multi-core processor for use on a modem in a telecommunications network is described herein. The buffer management mechanism includes a buffer module that provides buffer management services for one or more Layer 2 applications, wherein the buffer module at least provides a user space application interface to application software running in user space. The buffer management mechanism also includes a buffer manager that manages a plurality of separate pools of tokens, wherein the tokens comprise pointers to memory areas in external memory. In addition, the buffer management mechanism includes a custom driver that manages Data Path Acceleration Architecture (DPAA) resources including buffer pools and frame queues to be used for user plane data distributing.
Techniques for performing messaging between mobile stations (MSs) and UMA network controllers (UNCs) in an unlicensed mobile access network (UMAN). URR (UMA radio resource) messages are exchanged between an MS and one or more UNCs to perform various operations associated with UMAN. The MS may access the UMAN via a wireless access point (AP) that is communicatively coupled to the UNC via an IP network. The URR messages are sent between MSs and UNCs using an Up interface comprising a set of layered protocols over an underlying IP transport.
A methane monitoring system including a filter, a flow restrictor and a methane level detector is disclosed. The sensor system draws gas from a piping system through a sample line into the filter. The filter removes moisture vapor from the gas, with the remaining gas passing into a flow meter. The flow meter regulates the gas pressure for the gas output to a sensing chamber containing the methane meter. The methane meter operates to sample the methane level in the gas and provides an electrical signal which can be output to a recording device such as a flash memory card or to real time remote reporting via direct connection or a wireless signal such as a cell phone, radio or satellite telecom system. Landfill gas which is introduced into the sensing chamber is then exhausted through vent slots in the housing.
A method for linking of a first characteristic of a first device and a second characteristic of a second device by a server is disclosed. The method comprises the steps of selecting a first linking information and a second linking information, the first linking information matching to the second linking information, sending from the server the first linking information to the first device and the second linking information to the second device, presenting by the first device the first linking information and by the second device the second linking information, entering into the first device an indication of the matching of the first linking information and the second linking information, and based on the entered indication of the matching, sending to the server a matching confirmation for confirming the matching to the server, and associating the first characteristic and the second characteristic based on the received matching confirmation.
A method and arrangement for detecting a radio coverage in a synchronous multicellular mobile radio system having a multitude of synchronous base stations that are connected to an evaluating unit are provided. All base stations are operated in succession in a measuring operating mod. A respective field intensity of base stations that are locally adjacent and in a normal operating mode is measured, and the respectively measured field intensity data are evaluated by the evaluating unit. This enables a sufficient radio coverage to be determined in a highly cost-effective manner and, optionally, to be corrected.
A filter arrangement comprises a first terminal that handles duplex radio antenna feeder signals for at least two transceiver modules, a second terminal that handles at least duplex signals for a first transceiver module, a third terminal that outputs a first multi carrier power amplifier system input signal, the input signal representing a transmit signal from the first transceiver module, and a fourth terminal that receives a multi carrier power amplifier system output signal. The output signal includes an amplified representation of the transmit signals from the two transceiver modules. The first and second terminals are connected via first a single filter, the second and third terminals are connected via a second single filter, and the fourth and first terminals are connected via a third single filter.
Embodiments of the present invention relate to network nodes and methods that allow for improved QoS control in a telecommunications network by providing combined reservation of transport resources and processing resources for a traffic flow. The amount of transport resources and the amount of processing resources required in connection with a traffic flow can be signaled in a signaling message from a sender node to a receiver node to enable reservation of appropriate amounts of processing resources as well as transport resources.
A method that may be implemented in a CSCF entity to acknowledge a REGISTER type request sent by a terminal. It comprises: a step (E30) of estimating, for at least one future time window, the number of REGISTER requests that are liable to be received by the CSCF entity during said future time window; a step of selecting a future time window; and a step (E110) of sending to the sending terminal an acknowledgment message (200, 503) including a period (EXPIRES) selected so that the next REGISTER request sent by that terminal will be sent during said selected future window.
An Advanced Telecom Computing Architecture system and a method for power management and control of the system are disclosed. The system includes a Front Board (FRB) and a Rear Transition Module (RTM)/Front Transition Module (FTM). The FRB includes a first power conversion/control module that supplies power to the FRB and RTM/FTM. The system further includes a control circuit that outputs control signal, and a second power conversion/control module that supplies power to the RTM/FTM according to the control signal.
A method (10) and system (200, 400, or 500) of call reverse can include initiating (12) a call by an originating party (204) to a terminating party (208), comparing (14) rate plans, and automatically reversing (26) the call if a rate plan for the terminating party is currently more economical than a rate plan for the originating party. The method can compare (22) rate plans at a server (206) having rate plan information for the parties. Alternatively, the method can send (16) rate plan information for the originating to the terminating party and compare rate plans at the terminating party. The method can pre-store (20) rate plan information for the originating party at a memory at the terminating party. The method can also use (24) Caller ID to detect a call from the originating party and compare pre-stored rate plan information for the originating party stored at the terminating party.
The present disclosure provides a method and a system for configuring telecom device, and telecom device. The method includes: receiving configuration data and a first confirmed-commit operation command that are sent by a user, to perform a confirmed-commit operation; cancelling the confirmed-commit operation upon receiving a cancelling command sent by the user; storing the configuration data in a candidate configuration database; and receiving modified configuration data and a second confirmed-commit operation command to perform a new confirmed-commit, where the modified configuration data and the second confirmed-commit operation command are obtained after the user modifies the candidate configuration database. In the present disclosure, by cancelling the confirmed-commit operation and reserving the configuration candidate database, a mechanism to intervene the confirmed-commit operation initiatively is provided to the user to improve configuration efficiency, and relieve data transmission pressure.
The present Invention relates to a method and to a system for identifying and characterizing the impact of network incidents on the telecommunication services offered to users. According to the invention, the system for identifying and characterizing an incident in a service offered to a user of a telecommunications network comprises an unavailability selection module (1), a consolidation module (4), an aggregation module (10), a stabilization module (12) and a notification module (14).
A method and systems for inputting user instructions to central controller of a service provider. The user instruction is inputted based on transmission of RFID identification data of a RFID transponder to the central controller. The RFID identification data of a RFID transponder is transmitted to a RFID transceiver, having a RFID transceiver identification, over an RFID interface. The RFID identification data and the RFID transceiver identification are then forwarded to the central controller of the service provider over a network connection between the RFID transceiver and the central controller, causing the central controller to select specific user instruction based on the RFID identification data and the RFID transceiver identification. The selected specific user instruction then causes the central controller to apply corresponding adjustment to operations that relate to the one or more electronic devices corresponding to the user of the RFID transponder.
When a network pages the temporary user mobile identifier of a mobile station, the mobile station sends a response to the network. Next, the network checks the authenticity of the user using a ciphering key, corresponding to the temporary user mobile identifier and a random number. If the temporary user mobile identifier is authenticated, a normal incoming call acceptance procedure is executed. If the mobile station is authenticated although the temporary user mobile identifier is wrong, the network reassigns a new temporary user mobile identifier to the mobile station and stops the current communication. In communication, the network and the mobile station mutually notify encipherment-onset time and negotiate about encipherment manner with each other. In addition, diversity handover is commenced upon a call attempt. Furthermore, if a branch replacement is necessary, the current branch is replaced by new branches capable of executing the diversity handover. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, the mobile station uses the same branch structure and the same communication frequency band for all of calls. Additionally, when a new call occurs to or from the mobile station capable of treating a plurality of calls simultaneously, a branch structure and a communication frequency band, which can continue all of the calls, are selected and used. Therefore, the mobile communications system is suitable for transmission of various sorts of data in accordance with the development of multimedia.
A method and system for providing a customer with a service upon a service request. The method includes retrieving a dataset from a database for identifying a qualified service person using information about the service, the service person and a customer; establishing communication with the customer; and providing the customer with the service. After the service is performed, the retrieved dataset is updated to maintain accurate information stored in the database.
A Provided is a method and system for providing a QoS in a broadband convergence network deploying a mobile IP. In the method, a service and policy is defined at a first network design stage for guaranteeing the QoS of the broadband convergence network. QoS parameters corresponding to the defined service and policy are reflected in a DSCP field corresponding to the defined service. The DSCP field and the QoS parameters are applied to an access router in a management network. Accordingly, the QoS can be guaranteed to be suitable for the service and policy and a seamless handover guaranteeing the QoS can be provided.
A method and system are disclosed. In at least one embodiment, the method includes at least one of obtaining and receiving information regarding at least one location reference at a server (302) for transmission to at least one remote device; determining at least one path of the at least one location reference corresponding to at least one pair of points within mapping information at the server (302); computing at least one focusing factor at the server (302) based upon encoded information corresponding to the determined at least one path of the at least one location reference, and enhancing the at least one location reference by the computed at least one focusing factor; and transmitting the at least one location reference enhanced by the computed at least one focusing factor from the server (302) to the at least one remote device.
A system and method for authenticating a subscriber of a first network to access application services through a second network, wherein the second network is a packet data network. The system includes a mobile station connected to a cellular network and apt to generate access-request messages enclosed in data packets, the access-request messages being expressed with a syntax that complies with an application-level protocol; an allocation server apt to allocate an address in the second network to the subscriber and to provide a mapping between the subscriber's address and a first subscriber's identifier; a gateway which interfaces the first network to the second network and assigns the subscriber's address to the mobile station; a service token injector linked with the gateway and apt to intercept the data packets generated from the endpoint station and directed to the second network through the gateway and to capture in the data packet at least the subscriber's address, and an identity authority logical entity linked with the service token injector.
A method for calibrating a threshold for selecting a transmission format, from a plurality of transmission formats, in order to exchange data packets over a radio-frequency propagation channel, referred to as the \"channel\" (L,.sub.1,L.sub.2,L.sub.3) between a transmitting device and a receiving device of a satellite telecommunications system, includes: calculating a calibration table for the threshold, which associates transmission statistics,representative of an amount of estimated errors for a plurality of data packets received by the receiving device, with a plurality of values of the instantaneous channel quality; and updating the threshold, which, according to the calibration table, is a value of the instantaneous channel quality enabling a predefined value of the transmission statistics to be provided. A threshold calibration module, which can be included in a terrestrial terminal (2), and/or a satellite (3), and/or, more generally, in a satellite telecommunications system, is also described.
A method for calling up a media file wherein the content of the called up media file is presented unrequested to the user of one of the multiple telecommunication terminals via a connection established with a telecommunication terminal includes provisioning of an interface in the telecommunication control unit such that the media file stored outside a telecommunication system can be accessed via the interface. The establishment of the connection can also include installation of a media assignment target in the telecommunication control unit central to the telecommunication system, selection of the media assignment target by one of the multiple telecommunication terminals and placement of a link to the media file in the telecommunication control unit by means of which the media file is assigned, and call-up of the media file by the telecommunication control unit via the interface using the link placed in the telecommunication control unit.
The invention relates to a method for configuring a telecommunication system comprising at least one sending entity and one receiving entity between which the same link transmits several transport channels with different qualities of service. The sending entity matches the rate between the different coded transport channels with separate qualities of service, and the different coded transport channels are then multiplexed. The matching rate specific to each coded transport channel is determined from at least one first parameter representative of the expected Eb/I ratio and a second parameter representative of the capacity of the physical channel.
Embodiments of a method for creating a graph database which is arranged to store or process data in the form of graph tuples comprising n-parts, are described. In an embodiment, each tuple-part is encoded into a unique part identifier (hereinafter called a UPI), each UPI comprises a tag at a fixed position within the UPI. The tag indicates the datatype of the encoded tuple-part. The content data for the tuple-part is encoded in a code that is configured to reflect the ranking or order of the content data, corresponding to each datatype, relative to other tuples in a set of tuples. For content data that comprises a character-string, the code comprises a hashcode; and for content data that comprises or includes a numeric value, the code comprises an immediate value that directly stores the numeric value without encoding.
A radio network node of a mobile telecommunication network. The radio network node configured to determine a TCP session based on TCP parameters adapted for a radio link on which end user traffic is to be transported. The radio network node also configured to originate the TCP session which is used to transport the end user traffic.
The present disclosure is directed to a method for hierarchical Very Large Scale Integrated (VLSI) mask layout data interrogation. The method displays a tree diagram of the layout hierarchy and then allows the user to interrogate the mask layout shapes by using a cross probing feature.
The invention relates to a method for improving the quality of service of a cellular telecommunication network wherein cells (101, 201) are irradiated by radio beams (102, 104, 106, 108, 110, 112; 202, 204, 206, 208, 210, 212) generated by base stations, each base station (100, 120) comprising means to irradiate at different time different areas (103, 105; 203, 205) of an associated cell by forming different radio beams, characterized in that it comprises the step of synchronizing a first sequence of radio beams (104, 106), generated by a first base station (100), with at least one other sequence of radio beams (204, 206), generated by at least one other base station (120), in order to limit the radio interferences between said first base station (100) and said at least one other base station (120).
A method for legitimately unlocking a SIM card lock, using an unlocking server connected to a USSD gateway, is for unlocking a SIM card lock set by a telecommunications service provider to a mobile terminal of a subscriber. Upon receiving an unlocking request that is transmitted from the mobile terminal and through the USSD gateway and that includes subscriber data and a USSD code representing activation of the unlocking request, the unlocking server requests the telecommunications service provider to verify, with reference to the subscriber data, whether the subscriber has a right to unlock the SIM card lock. Upon receiving verification from the telecommunications service provider that the subscriber has the right to unlock, the unlocking server transmits an unlocking program and an unlocking password to the mobile terminal such that the mobile terminal may execute the unlocking program and load the unlocking password for unlocking the SIM card lock.
A method for locating mobile terminals is provided. First, information of a home Public Land Mobile Network (PLMN) of a target mobile terminal, the location of which is to be determined, is checked in response to a location service request from a client. Then, information of a visited PLMN, where the target mobile terminal is currently located, is checked based on the checked information of the home PLMN. The home PLMN calculates location assistance information of the visited PLMN using specific location information of the visited PLMN. The location assistance information is transferred to the target mobile terminal. This allows location information of a mobile terminal to be obtained irrespective of the area or communication network where the mobile terminal is located. It is thus possible to locate a mobile terminal in an area where no location assistance information is provided.
Method for managing on-line commercial transactions between a user and a seller of goods/services that interact through respective data processing systems communicating through a data network. The method includes: upon receipt, from a computer system of an institute issuing payment cards, of a request of transaction with debit on the payment card of the user coming from the seller of goods/services, having the computer system of the institute issuing the payment cards preliminarily requesting a confirmation of the transaction to the buyer through a mobile telephony terminal of the buyer, and, in case the confirmation of the transaction is received, having the computer system of the institute issuing the payment cards processing the transaction, whereas in case the confirmation of the transaction is denied, not processing the transaction and informing the seller. Both or one of the request of confirmation of the transaction or the confirmation of the transaction are sent through communication over a data channel with the mobile telephony terminal of the buyer.
Presented is a method of managing the operation of a system including a processing subsystem configured to run a multimedia application and a telecommunication subsystem. The method includes determining telecom environment conditions, and selecting a working point from a plurality of predetermined working points. The selecting is based at least in part on the determined environmental conditions. The method also includes setting control parameters in the multimedia application and/or the telecommunication subsystem to configure the system to operate at the selected working point, and operating the system at the selected working point.
A method is disclosed for performing a handoff in a telecommunication system. The method comprises: performing a first multi-cell joint detection process for decoding the communications within the home cell when a mobile terminal enters a handoff region between a home cell and one or more neighboring cells; performing a handoff process when the mobile terminal is in the home cell to join a target neighboring cell; and performing a second multi-cell joint detection process for decoding the communications between the mobile terminal and the target neighboring cell. In this manner, decoding for uplink and/or downlink communications is improved, and throughout and performance of the telecommunication system is enhanced.
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA'1, LSA'2, . . . LSA'n) is transmitted, at least one sending fingerprint (hash(LSA'1), hash(LSA'2), . . . hash(LSA'n)) of the lists to be transmitted, and The step of comparing the receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) to the sending fingerprint (hash(LSA'1), hash(LSA'2), . . . hash(LSA'n) such that the sending of a list of links (LSA1, LSA2, LSAn) is inhibited if the receiving fingerprint is different from the sending fingerprint.
Provided are a method for providing a personalized internet phone, and a terminal using the same. The method includes operations: (S10) of a user (20) using a terminal capable of internet connection to connect to a personalized internet phone service web server (10) and register for service, and store and set personal information in databases (11 and 12) of the personalized internet phone service web server (10); (S20) of the user (20) using a wired/wireless internet phone terminal (21) of an internet phone service provider being used, to connect to the personalized internet phone service web server (10); (S30) of using the wired/wireless internet phone terminal (21) to perform personal authentication and select a billing method, on a displayed screen provided by the personalized internet phone service web server (10); (S40) of, following the personal authentication and billing method selection, using the wired/wireless internet phone terminal (21) to call a phone number from a personally set phone number directory stored in the personal phone number directory storage database (12) of the personalized internet phone service web server (10) and make a phone call to a counterpart (30), or make a phone call using a phone number additionally provided by the personalized internet phone service web server (10); and (S50) of, when a call is made to a new phone number not stored in the personal phone number directory storage database (12), storing call details and the new phone number in the personal phone number directory storage database (12), and then ending the use of the wired/wireless internet phone terminal (21). Accordingly, an internet connecting member provided on a terminal may be used to connect to the personalized internet phone service web server and call a phone number list stored in the user's mobile phone terminal directly from a personal phone number directory storage database, or a list of phone numbers may be received from an additionally provided phone number directory storage database by business type in an area of interest or the current area which is provided by the web server, and the called or provided phone number may be used to make a call. Therefore, a wired/wireless internet phone terminal capable of being used for internet calling with an existing internet phone service provider may be used to connect to the personalized internet phone service web server and make the searching and calling of a phone number to be called as easy as when using the user's own mobile phone terminal, such that wired/wireless internet phone terminals may be popularized.
The present invention provides a method for receiving an incoming call at a first mobile communication terminal including registering an identity of at least one second mobile communication terminal capable of performing local wireless communication with a first mobile communication terminal; checking, after receiving the incoming call at the first mobile communication terminal, whether a user's input is received by the first mobile communication terminal to accept the incoming call during a first time duration; and transmitting, if the user input is not received by the first mobile communication terminal, absence information to the second mobile communication terminal notifying the second mobile communication terminal of reception of the incoming call at the first mobile communication terminal using local wireless communication. The method also enables a second user to receive an incoming call through the first or second mobile communication terminals instead of the first user during the first user's absence, thereby minimizing the inconvenience to the first user of missing important calls made to the first mobile communication terminal.
A method and system of transferring messages from a message source to a mobile station in a cellular system comprises assigning to each message a priority characteristic before the message is transmitted to mobile station. The message is then transmitted together with the assigned priority characteristic, depending on the priority characteristic. The priority characteristic is examined at the mobile station and the message is processed at the mobile station depending on the priority characteristic.
A method of configuring modules for identifying users of a telecommunication network able to cover a service area cut into a plurality of geographical sub areas, each identification module including an identification code stored in the module, the identification code including:--an operator identifier;--a user identification number; the method including assigning a part of the user identification number to the operator, the part being used for purposes other than identification of the user.
The invention relates to a method of inter base station communication comprising: receiving a first message (118) being indicative of a neighboring second base station (2) by a first base station (1), sending a second message (120) to the second base station, in response to the second message, receiving a third message (124) comprising information being indicative of at least a third base station (3), the third base station being a neighbor of the second base station, using the information received with the third message for enabling communication (128) between the first base station and the third base station, independently of any user equipment detection of the third base station.
As a realistic alternative to traditional business cards for fast and flawless electronic exchange of contact data, a search for additional mobile telecommunication terminals within a predetermined range of a mobile telecommunication terminal is conducted using a wireless connection. When a second mobile telecommunication terminal is within the predetermined range, an identification element associated with the user of the additional mobile telecommunication terminal is loaded into memory of the first mobile telecommunication terminal and displayed together with a confirmation control element on a user interface of the first telecommunication terminal. Upon actuation the confirmation control element, presence of a consent element generated by the user of the second telecommunication terminal and associated with the user of the first telecommunication terminal is checked. When the consent element is present, contact data of the user of the second mobile telecommunication terminal are loaded into the memory of the first mobile telecommunication terminal.
A method of performing a financial transaction via unsecured public telecommunication infrastructure comprising collecting data relating to a specified financial transaction type; building a transaction token including collected data and/or data derived from the collected data; encrypting the transaction token; creating a financial transaction protocol message incorporating the encrypted transaction token as dependent on a selected transport channel through which the message is to be conveyed; and conveying the financial transaction protocol message using the selected transport channel and by way of the unsecured public telecommunication infrastructure to a destination where the financial transaction protocol message will be further processed is disclosed.
A method of tracking a lost mobile electronic device connected to a wireless or wired network is provided. The method includes: storing user identity information included in a user identity card inserted into the mobile device, a warning message, and information regarding a destination of the warning message; and when a new user identity card is inserted into the mobile device, comparing user identity information stored in the new user identity card with the stored user identity information and automatically transmitting the warning message to the destination of the warning message if the user identity information stored in the new user identity card is not identical to the stored user identity information. Accordingly, it is possible to easily track a lost mobile electronic device connected to a wireless or wired network.
The invention concerns a method for sponsoring a communication service, wherein said communication service is made available directly, in particular to a user of said communication service, and wherein a rule, in particular applicable for charging a sponsor of said communication service, is determined dynamically.
Methods and apparatus for use in reducing power consumption in battery-powered mobile communication devices in wireless local area networks (WLANs) are described. In one illustrative example, a mobile device in a WLAN is configured to normally refrain from receiving broadcast messages so that it may remain in a low power mode of operation. A network server is configured to convert broadcast messages into unicast messages for receipt by the mobile device only if the message or protocol type of the broadcast message is one in which the mobile device needs to process. As the mobile device is still configured to receive unicast messages, it will receive and decode such a unicast message and process the broadcast information within it accordingly. Advantageously, battery power is conserved at the mobile device.
Apparatuses and methods for controlling a manner of delivering content to a content user in a mobile telecommunication network are provided. The content is sent to the content user using first a first transmission rate when the content user is in a first radio state and uses a first battery power, and then using a second transmission rate that is lower than the first transmission rate, when the content user is in a second radio state and uses a second battery power that is smaller than the first battery power. The sending is performed such as, (A) while delivering the content, an amount of the content already received by the content user to exceed an amount of the content used by the content user, and (B) to minimize an energy used by the content user during delivery.
The present invention relates to methods and arrangements for providing a more flexible configuration of SRS transmission. This is achieved by dynamically triggering a mobile terminal to transmit SRS. Thus, embodiments of the invention allow dynamically trigged SRS in any uplink subframe, even without necessarily reserving resources semi-statically on cell level. This is done by signaling to the terminal whether the mobile terminal should leave the predefined uplink symbol empty for sounding reference signals or use it for data transmission. In case a terminal leaves the last symbol empty for sounding reference signals, there are two possibilities, either the UE shall transmit one or several reference signals from one or several antennas, or the terminal shall leave the last symbol blank since another terminal may be using the resource for sounding. Accordingly, in a specific embodiment, there are at least three different messages that can be conveyed to the terminal: use the predefined uplink symbol for data, leave it blank or use it for sounding reference signals.
Methods and arrangements for facilitating the promotion of telecom applications. Promotion filter criteria is accepted, and bids on telecom information elements relating to promotion dissemination are accepted. A promotion is associated with a telecom customer based on matchmaking between the promotion and the customer, based on the filter criteria and on the bids on telecom information elements.
Methods and arrangements for monetizing telecom application. Advertising input is accepted, as well as contractual input relating to advertisement dissemination. An advertisement is associated with a telecom customer based on matchmaking criteria, and the advertisement is output to the customer based on the contractual input. This outputting includes propagating the advertisement selectively via at least one of: an in-application channel, wherein the advertisement is associated with a telecom application used by the customer; and an out-of-application channel, wherein the advertisement is propagated directly to the customer.
The present invention relates to a method and arrangement for controlling re-transmission in a user equipment supporting uplink spatial multiplexing. The method comprises the steps of detecting an uplink grant on a physical downlink control channel (102), the uplink grant being valid for at least one transport block; detecting that at least one transport block is disabled (103), such that no grant is associated with the at least one transport block; and interpreting (106) the at least one disabled transport block as an acknowledgement, ACK, of previous transmission corresponding to said disabled transport block irrespective of which indication is received on the reception status feedback channel for said previous transmission.
The present invention relates to a method and a device for supporting positioning with a minimum of assistance data signalling The method in the radio device that shall perform the positioning measurements comprises determining (440) a positioning reference signal pattern, based on a cell identity and a pre-defined mapping between the cell identity and the positioning reference signal pattern, and performing (450) positioning measurements based on the determined positioning reference signal pattern.
The disclosure relates to controlling uplink transmissions according to closed loop multi-antenna techniques such as closed loop uplink transmit diversity and uplink multiple-input multiple-output (MIMO). An exemplary method for use in a user equipment (81) configured for multi-antenna transmissions comprises a step of estimating (62) reception quality of a physical channel carrying pre-coding weight information to the user equipment (61). The method further comprises a step of determining (64) that the reception quality of the physical channel is inferior if the estimated reception quality is below a threshold and otherwise considering (65) the reception quality of the physical channel to be sufficient, in a further step the UE (61) applies (52) the pre-coding weight information received on the physical channel for uplink transmission only if the reception quality of the physical channel is considered to be sufficient
A method in a user equipment (140) for controlling transmission from the user equipment (140), a method in a first radio network node (110) for selecting one or more radio emission control parameters and a user equipment (140) and a first radio network node (110) configured to perform the methods are provided. The user equipment (140) sends (C001), to the first radio network node (110), one or more parameters associated with supported duplexer arrangement characteristics of the user equipment (140) for a first operating frequency band. The first radio network node (110) selects (C004) said one or more radio emission control parameters based on said one or more parameters associated with said supported duplexer arrangement characteristics of the user equipment (140) for the first operating frequency band. The user equipment (140) receives (C005) and applies (C006) said one or more radio emission control parameters from the first radio network node (110) such as to control transmission from the user equipment (140).
Embodiments of a mechanism for implementing mobile agents in peer-to-peer networks. An initiating peer may generate a mobile agent to perform one or more tasks on or gather information from other peers in the peer-to-peer network. The mobile agent may include an itinerary of peers that the mobile agent may visit. The mobile agent may be transmitted on communications channels in the peer-to-peer network to each peer on the itinerary in turn, and return to the initiating peer after visiting or attempting to visit each peer on the itinerary. In one embodiment, the mobile agent may traverse its itinerary via virtual communication channels (pipes) implemented according to a peer-to-peer platform. A mobile agent may include information identifying input pipes for each peer on its itinerary. Peers may generate and advertise input pipes for use by mobile agents.
A system including a mobile telepresence robot, a telepresence computing device in wireless communication with the robot, and a host computing device in wireless communication with the robot and the telepresence computing device. The host computing device relays User Datagram Protocol traffic between the robot and the telepresence computing device through a firewall.
A mobile terminal may use an antenna unit of a second device to transmit and/or receive data. The mobile terminal may allow a second device to use its antenna unit to transmit and/or receive data. The mobile terminal may suspend control of its antenna unit if a second device is transmitting or receiving from the antenna unit. A communication method allows a mobile terminal to use the antenna unit of a second device to transmit and/or receive and the second terminal to use the antenna unit of the mobile terminal to transmit and/or receive.
A mobile terminal and method of controlling an image photographing therein are disclosed, by which a user interface for effectively receiving an input of a control command for each of a plurality of cameras provided to a mobile terminal can be provided. The present invention includes receiving an input of a first image and an input of a second image using a first camera and a second camera, respectively, setting a first photographing condition for the first camera and a second photographing condition for the second camera, photographing the first image and the second image using the first camera and the second camera according to the set first photographing condition and the set second photographing condition, respectively, generating a third image by synthesizing the photographed first and second images together, and displaying the generated third image as a photographed image.
The invention pertains to a mobile terminal for servicing a telecommunication system, wherein the telecommunication system comprises a system controller and at least one module and/or at least one interface port (that is externally accessible in the inserted state of the module), wherein the mobile terminal features an identification device in order to identify a module or an interface port. The invention further pertains to a utilization of such a mobile terminal, as well as an arrangement consisting of a telecommunication system and such a mobile terminal.
A computerized method, computer system, and computerreadable media for monitoring network functions concurrently on a performance display is provided. In particular, the performance display is presented to an operator at a userinterface display that includes performance images that represent various network functions. These network functions may be selected from a listing of network functions by the operator for a personalized display. Upon selection, configuration settings are compiled based on the selected network functions and other information. The configuration settings direct a web server to retrieve corresponding performance images stored in a known location by a communications-network server that generates the network performance images from network-function data files. These performance images may be populated onto a layout pattern to generate the performance display. Accordingly, the operator is provided with a mechanism to monitor a plurality of network functions at the same time on a single user-interface display.
A docking system for a personal communication terminal includes a base and a motorized mount joining the dock to the base and configured to rotate the dock about a vertical axis in response to a pan signal and about a horizontal axis in response to a tilt signal. The docking system further comprises a sensor array to produce signals indicative of the location of a user, a processor to convert the sensor output signals to tracking signals, and a controller to convert the tracking signals to pan and tilt signals, thereby to aim a camera.
A system that provisions a multimode mobile or converged device with local time information and network provider identification when the multimode mobile device is operating within the purview of a wireless local area network (WLAN). The system includes components that receive protocol data and that extract network provider identification from the received protocol data as well as utilizing the received protocol data to ascertain the local time.
A method of operating a mobile telecommunications system having a base station, a plurality of users and a plurality of spectral resource blocks, some of which are not allocated to users. The method includes, (a) for each user, assigning a score to each resource block based on the energy efficiency with which the user can use the resource block, and determining which of the plurality of resource blocks is favored, i.e. has a score indicating that it will be the most energy efficient for the user. For each user, either (b) if the user's favored resource block is not allocated, and is not favored by any other user, that resource block is allocated to that user; or (c) in the event that the same resource block is favored by more than one user, it is allocated to the user who will use it with the greatest energy efficiency.
A phase adjustable adapter that can maintain its value of characteristic impedance in a manner that is independent of its electrical length. Embodiments of the adapter include a center conductor and an adapter body in surrounding relation to the center conductor so as to form an insulative gap. The adapter body has form factor that is defined by the ratio of an outer dimension of the adapter body to the length of the adapter body, where the form factor changes in accordance with the change in the length of the adapter body.
Method, computer program product and computer system for predictive caching for telecommunication towers having associated local servers, using propagation of identification of items of high demand data at a geographic level comprising the steps of: receiving within a region at least one request for an item of data made by a user device to a local server associated with a telecommunication tower within the region; and determining if the request is for an item of high demand data. If the item is identified as high threshold data, instructing the local servers within the region to cache the item of data; and if the item is identified as second threshold high demand data, sending an indication to at least one centralized server in an adjacent region, such that the centralized server in the adjacent region causes the local servers within the adjacent region to cache the item of data.
A device, a system and a procedure to reduce the signalling load in a cellular mobile telephone system that supports packet switched services. One of a set of mobile stations included in a cellular mobile telephone system is switched between a first mode in a first state, here called Ready State, respective to a second state, here called Standby State, depending on a time parameter which indicates a time when the mobile station shall remain in the first state, to switch to the second state afterward. The value of the time parameter is set currently depending on the current speed of the mobile station through the cell network of the mobile telephone system.
A method for protecting data contained in a security module of a telecommunication device equipped with a near-field communication router and with a microcontroller, wherein data relative to the routing between the security module and gates of the router assigned to near-field communications are transmitted over a channel accessible by the router only, or by a control signal which is not generated by the microcontroller for the router.
A method and medium are provided for regulating a flow of data traffic that is communicated between a mobile device and a wireless telecommunications network. The method includes performing a data-packet-inspection process on at least a portion of the flow and applying a network policy to a specific wireless telecommunications area based on the results of the inspection. The network policy may be based on the wireless coverage area, the application, or the subscriber from which a data-packet originates. The network policy should also determine the way in which to regulate the flow of data if a policy applies to that particular flow. To enforce the policy, the value of a reverse activity bit may be set in connection with the wireless coverage area so as to regulate the flow of data as dictated by the network policy.
Systems, products, and methods are disclosed for performing a method of protecting system-provider information stored within a mobile communications device that has one or more communications ports and one or more radios. Illustratively, the method includes receiving a request to access the system-provider information, determining that the request was communicated over the air by way of a wireless telecommunications network that the mobile communications device is authorized to access, which network is accessible by way of the one or more radios; and permitting access to the system-provider information after determining that the request was communicated over the air, such that any request to modify the system-provider information by any of the one or more communications ports is denied, and only the request communicated over the air is allowed to be used to modify the system-provider information.
The invention relates to a method of communicating in a mobile telecommunication network (100; 200), the mobile telecommunication network comprising a plurality of cells (102; 104; 106), wherein resource blocks are used for transmitting data in the mobile telecommunication network, and wherein the method comprises:--dividing (S2) a resource into at least a first plurality of resource blocks and a second plurality of resource blocks, wherein the resource blocks of the first plurality do not overlap with the resource bocks of the second plurality;--assigning (S3) the first plurality of resource blocks to a first group of cells and assigning the second plurality of resource blocks to a second group of cells;--scheduling (S4) first data transmissions in the first group of cells on the first plurality of resource blocks;--scheduling (S5) second data transmissions in the second group of cells on the second plurality of resource blocks;--scheduling (S6) third data transmissions in the first group of cells on the second plurality of resource blocks, when all resource blocks of the first plurality are already used for data transmissions; and--scheduling (S7) fourth data transmissions in the second group of cells on the first plurality of resource blocks, when all resource blocks of the second plurality are already used for data transmissions.
A device for stowing and deploying a handheld device such as a telecommunications handset within an aircraft or other vehicle has a housing, a pivoting cradle attached to the inner surface of the housing, means for limiting the range of permitted pivoting motion of the cradle within the housing, optional biasing means such as a coil spring between the housing and the pivoting cradle, and means for mounting the housing to a secure place in the aircraft. The cradle has an elongate base with a handset receiving section, and a pivoting mount affixed or integrally molded on each side of the housing. The symmetrical pivoting mount may be a series of at least two slots arrayed in a radius from the geometric pivot point, i.e., the axis of rotation of the handset cradle. The slots engage a complementary series of pins affixed to the housing and which effectively permit a limited range of pivoting motion sufficient to allow secure stowage of the handset under severe linear inertial forces while also permitting easy storage and retrieval as desired by a user.
A telecommunication device including a battery capable of providing a first power supply voltage to circuits of the device, among which at least one security module; a near-field communication module capable of providing a second power supply voltage to the security module; and a circuit for activating the provision of the second power supply voltage, including a switch controllable at least by one element accessible from outside of the device.
Embodiments of the present invention provide a method, system and computer program product for deploying and delivering composite services in an NGN network. In one embodiment, a method for selectively synchronizing content across different views of a composite service can be provided. The method can include establishing for a common session, multiple channels of access to a composite service and providing content to a view for one of the channels of access for synchronization across others of the channels of access to the common session. A set of user preferences can be consulted to determine whether synchronization of the content is permitted for individual ones of the channels of access to the common session. Subsequently, the content can be synchronized only to channels of access to the common session that are permitted by the set of user preferences.
An optical arrangement comprising first and second guided structures for providing first and second beams of electromagnetic energy and a node for coherently combining said first and second beams in free space, that is, with an unguided structure. In the illustrative embodiment, the first and second structures are first and second fiber oscillators. The first and second fiber oscillators may be of unequal lengths. The node may be implemented with a polarizing beam splitter or a semi-reflective surface. Beam shaping optics are included in the node to collimate the first and second beams and provide a flat profile mode thereof. The outputs of plural first and second fiber oscillators are combined via plural nodes to provide a single high energy output beam. Amplifying elements may be disposed between nodes. The plural nodes may be disposed in a single integrated structure along with an outcoupler mirror to coherently phase lock the outputs of the plural oscillators.
The present invention relates generally to computer operating systems, and more specifically, to operating system calls in a symmetric multiprocessing (SMP) environment. Existing SMP strategies either use a single lock or multiple locks to limit access to critical areas of the operating system to one thread at a time. These strategies suffer from a number of performance problems including slow execution, large software and execution overheads and deadlocking problems. The invention applies a single lock strategy to a micro kernel operating system design which delegates functionality to external processes. The micro kernel has a single critical area, the micro kernel itself, which executes very quickly, while the external processes are protected by proper thread management. As a result, a single lock may be used, overcoming the performance problems of the existing strategies.
A system and method that enables the collaborative creation and editing of content on a VoiceSite over a telephone. The system and method enables the collaborative creation and editing of content on the VoiceSite by allowing one or multiple users (authors) to generate and edit the content of the VoiceSite at the same or different times. A Collaboration Manager is utilized to manage calls to/from one or more users. A VoiGen component utilizes voice-activated prompts to allow the one or more users to perform at least one of specify user preferences, load templates, store user preferences and service options, parse through obtained data, and generate/edit the VoiceSite based on the inputs provided by the one or multiple users. A Session Manager stores user specific information and ensures that the content provided by multiple users, including edits/changes, is integrated without conflicts.
A network server may be configured to communicate triggers across a telecommunication network by receiving a trigger communication message that includes information suitable for causing a destination machine-to-machine device to perform operations in response to receiving the trigger communication message, receiving policy or charging information from a component in the telecommunication network, determining whether the trigger communication message should be sent to the destination machine-to-machine based on the received policy or charging information, and sending the trigger communication message to the destination component only when it is determined that the trigger communication message should be sent to the destination machine-to-machine based on the received policy or charging information.
A method for handling call originations is provided. The method includes sending origination information from a mobile device to an application server in an enterprise network using Short Message Service (SMS) and determining whether a hotline feature is present in a subscriber profile associated with the mobile device. Data is then routed from the mobile device to a predetermined destination based on the hotline feature.
The disclosed embodiment relates to identifying telecom users. An exemplary method comprises collecting, with a computing device, call usage data based on the call usage of a new telecom user, comparing, with a computing device, the collected call usage data with existing call usage data stored within a call usage database to determine if the collected call usage data for the new telecom user corresponds with the existing call usage data for an existing telecom user, assigning the new telecom user a user identifier corresponding to the existing telecom user if it is determined that the collected call usage data for the new telecom user corresponds with the existing call usage data for an existing telecom user, and assigning the new telecom user a new user identifier if it is determined that the collected call usage data for the new telecom user does not correspond with the existing call usage data for an existing telecom user. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods.
A method for performing a telecommunication service, including identifying, on a Service Delivery Platform (SDP) and by a processor, the telecommunication service, selecting, on the SDP and by the processor, the telecommunication service, and executing, on the SDP and by the processor, the telecommunication service on a cellular network, where the SDP is configured to implement the telecommunication service on the cellular network.
A system and method for providing a call back option to a customer of a call center. According to one embodiment, the system includes a telecommunications switch and an automatic call distributor in communication with the telecommunications switch via first and second communications links. The system also includes means for providing the customer with a call back option in response to a first call from the customer, wherein the first call is routed to the automatic call distributor by the telecommunications switch over the first communications link, and means for establishing a second call between the automatic call distributor and the customer over the second communications link when the customer accepts the call back option.
A network service access gateway is described that provides a pluggable state management architecture for storing state information. The gateway typically processes requests between entities such as external applications and subscriber mobile devices. In processing data, the gateway can implement multiple storage providers which are selected according to the data access requirements of the specific request. Each storage provider can implement a different caching or data management technique in order to provide access to the required information. Examples of the storage providers include in-memory only caches, write-through disk based storage provider, write-behind disk based storage provider and non-cached disk-based storage provider. The particular storage provider can be selected based on a configuration file and according to the traffic path associated with the request.
A network server may be configured to prevent user equipment (UE) from communicating payload information across a telecommunication network without paying for the access or use of the network. This may be accomplished by the network server receiving signaling information relating to the UE from a first network component, receiving data plane information relating to the UE from a second network component, determining whether the UE is a signaling-only device based on the received information, and performing a responsive operation when it is determined that the user equipment device is a signaling-only device. The responsive operation may include applying a policy rule to the signaling communications of the UE when it is determined that the UE is a signaling-only device. The policy rule may be charging rule that causes a charging system to bill a subscriber account or a network access rule that blocks the signaling communications of the UE.
Telephone calls, data and other multimedia information is routed through a hybrid network which includes transfer of information across the internet. A media order entry captures complete user profile information for a user. This profile information is utilized by the system throughout the media experience for routing, billing, monitoring, reporting and other media control functions. Users can manage more aspects of a network than previously possible, and control network activities from a central site. The hybrid network also contains logic for responding to requests for quality of service and reserving the resources to provide the requested services.
User Equipment (UE) receiving non-voice packet switched services in an Evolved Universal Mobile Telecommunications System Terrestial Radio Access Network (eUTRAN) cell undergoes handover to a circuit switched GSM/Edge Radio Access Network (GERAN)/UTRAN cell in response to a voice service page. An eNodeB of the active eUTRAN cell uses a measurement report history for the UE to select an available circuit switched cell for handover. The voice service is established in the circuit switched domain of a GERAN/UTRAN cell to ensure service continuity regardless of UE mobility that would otherwise not be possible if the voice service was established in the eUTRAN cell. A Gs-like interface between a Mobile Switching Center (MSC) of the CS Core Network and the Mobility Management Entity (MME) of the Evolved Packet Core provides an interface for page requests and location update procedures to be performed.
A system for linking standard telephony communications with internet protocols. Standard telephony equipment, such as a telephone, can communicate using the internet without special adapters or the like. A network of Internet servers may be connected to the Internet and telephony communications system, enabling telephony communications equipment access to the Internet.
The invention relates to a system for switching, controlling, programming and operating communications devices, particularly communications terminals or communications systems. According to the invention, the at least one communications device (TE1, TE2, MOF, SYS) can be connected to at least one entertainment terminal (FER) via at least one interface (IEE), and the communications device TE1, TE2, MOF, SYS) and the at least one entertainment terminal (FER) are configured for exchanging signals and/or data via the at least one interface (IEE). The communication device is configured to switch from a first mode to an administrative mode to search for an active entertainment terminal. The entertainment terminal (FER) advantageously has at least one display (ANZ) and at least one input (BED). The entertainment terminal is, for example, a television set (FER).
A virtualized telecom system and a method for managing service continuity and mobility in a virtualized telecom system. The system comprises a plurality of execution nodes each configured to execute a network function by registering; and a manager node for registering each of the plurality of execution nodes, assigning a node identifier (Node ID) to each of the plurality of execution nodes, periodically polling each of the plurality of execution nodes for a status, and issuing control instructions to each of the plurality of execution nodes based upon the status of a respective execution node. Each of the plurality of execution node responds to the polling by transmitting its status to the manager node. The status includes runtime information and pre-configuration information.
A system, method, and computer-readable storage medium for outsourcing telecom billing are disclosed for issuing one or more first billing statements and one or more second billing statements from a first telecom network; and transmitting at least the one or more first billing statements to a second telecom network. The one or more first billing statements may reflect one or more charges from the first telecom network to the second telecom network, and the one or more second billing statements may reflect one or more charges from the second telecom network to one or more customers thereof. The one or more charges of the first and second billing statements may reflect the same service(s).
In one of many possible embodiments, a system is provided for modeling telecommunication switch investments. The exemplary system includes a telecommunication switch modeling application configured to determine equipment quantities having capacity to satisfy switch design parameters descriptive of at least one model telecommunication switch, and calculate model investments associated with the equipment quantities. The exemplary system also includes a telecommunication switch investment modeling application configured to weight the model investments in accordance with at least one of a network parameter descriptive of an actual telecommunication switch and a \"what-if\" input descriptive of a hypothetical telecommunication switch configuration to form weighted investments that are specific to at least one of the actual telecommunication switch and the hypothetical telecommunication switch configuration.
A method of transmitting value via a telephone system, includes receiving a request from a Grantor to designate a predetermined number of minutes that are to be reserved to fund a telephone call between a telephone number associated with a Beneficiary and a telephone number belonging to the Grantor, receiving a request to establish the telephone call between the telephone number associated with the Beneficiary and the telephone number belonging to the Grantor, establishing the telephone call between the telephone number associated with the Beneficiary and the telephone number belonging to the Grantor, and deducting from the predetermined number of minutes a number of minutes corresponding to a length of time of the call between the telephone number associated with the Beneficiary and the telephone number belonging to the Grantor.
Embodiments of the invention broadly contemplate systems, methods, apparatuses and program products that leverage the mobile web, especially the spoken (telecom) web, to handle transactions. According to embodiments of the invention, in essence, a mobile device such as a phone is used as a terminal, remote authentication is employed, and a challenge response using a per transaction audio based code is used as a confirmation. Embodiments of the invention also provide further protection against repudiation, and greater trust in the transaction, by employing witnesses.
Attaching wind turbines to towers built for many uses is highly advantageous. The ways of doing that in novel uses and ways are presented.
A telecommunication behavior statistical analysis system is disposed to a telecommunication machine room to gather statistics of and analyze motion behaviors of at least a mobile phone user in an application store. The system receives a plurality of transmission data from a telecommunication machine room through a receiving module and collects data to form a plurality of behavior information of the same mobile phone user and then obtains platform information, a target program, a request time and a request content of requests through analysis of a filter module. Request times, time and motion contents of each target program are performed with statistic and analysis by utilizing a processing module so that at least a statistical table is drawn and displayed in a display module. Accordingly, the telecommunication operator could easily handle consumers' favorite and purchasing tend with respect to different kinds of application programs applied in mobile phones.
A system for monitoring of telephone calls on a plurality of inbound and outbound voice channels made to and originating from a common private branch exchange (PBX) to detect fraudulent activity. Monitors and detects audio data on two or more of the voice channels. Includes analysis of binary data streams on at least one inbound voice channel and at least one outbound voice channel and comparing said streams by a sliding window to slide a sample frame of one channel binary data stream backwards and/or forwards relative to the other binary data stream to synchronize the inbound voice channel and outbound voice channel. The comparison determines if a data match is present between the compared inbound channel and the outbound channel and blocks the at least one outbound voice channel, if a data match is found with at least one inbound voice channel.
A method of communicating a telecommunication request initiated by a subscriber in a telecommunication network. The method according to an embodiment includes: receiving a request for a voice or data communication by a radio access network; and communicating the received request to a network switching subsystem for processing by a demand-driven, dynamically-configurable IP based computing infrastructure.
A mobile telecommunications network includes a core and a radio access network having radio means for wireless communication with mobile terminals registered with the network, wherein the radio access network includes control means 700 operable to control the use of network resources by the mobile terminals. The control means processes control plane signalling.
At the time of carrying out a DHO, a DHO execution unit encodes data to be transmitted and interleaves it, followed by dividing it into segment data and sending out from respective transmission paths. When receiving data, the unit receives pieces of segment data from the respective transmission paths, combines them together, de-interleaves them and receives data by decoding it. When dividing into segment data, it allocates segment data with larger amount of data to a transmission path with a high transmission quality, and that with smaller amount of data to a transmission path with a low transmission quality, in accordance with the transmission quality.
The subject of the invention is a satellite comprising at least one central router, a source terminal and a destination terminal. The source terminal comprises means for transmitting, via the central router, IP packets fragmented into at least one level-2 fragment to the destination terminal to which a destination IP address is allocated. The said central router is composed of a satellite and of a ground router. The satellite comprises means for implementing a switching of the IP packets without reassembling the level-2 fragments sent by the source terminal to the destination terminal, the said fragments comprising a reference to the Destination IP address used as basis for the switching. The ground router comprises means for determining IP routing parameters, the said parameters being transmitted by the ground router to the satellite so as to configure the way in which the switching is carried out by the said satellite.
Telecommunication systems using multiple Nyquist zone operations are provided. In one aspect, a telecommunication system can include a first section and a second section. The first section can receive signals from at least one transmitting base station or transmitting terminal device. The received signals have frequencies in multiple frequency bands. The first section can also sample the received signals such that the received signals are aliased. The first section can also combine the aliased signals from the frequency bands into a combined frequency band in a common Nyquist zone. The second section can extract signals from the combined frequency band. The extracted signals are to be transmitted at frequencies in a frequency band from a Nyquist zone that is different than the common Nyquist zone. The second section can also transmit the extracted signals to at least one receiving base station or receiving terminal device.
A signal transmitted in a radio telecommunications network is received (41). This radio signal carries a common pilot channel and another channel, with said other channel carrying state information. Then one obtains (42), from the radio signal, a first signal by channel estimation on the common pilot channel and a second signal by correlation of the received radio signal with a reference code. Next, a resulting signal is obtained (43) by complex conjugate multiplication of the first signal with the second signal. Lastly, a value for the state information indicated in the second signal is determined (44) on the basis of the resulting signal.
A transmitting apparatus transmits signals in a digital telecommunication system and a synchronising method is used for synchronizing such signals at a receiving apparatus. The transmitting apparatus prepares for transmission of a reference symbol having at least two repetition patterns, whereby one of the at least two repetition patterns is phase-shifted in relation to the other repetition pattern, and a synchronizing mechanism in the digital telecommunication system uses the reference symbol once received for synchronization. The synchronizing mechanism uses a cross-correlation mechanism to cross-correlate at least one of the two repetition patterns within a correlation window having a predetermined length.
Described is a system of disparate telecommunications networks having managed identities, a service, such as voicemail, abstracted from the underlying access networks, and an operational support system (OSS)/business support system (BSS) coupled to the networks to manage authentication and subscription information. A single authentication/subscription manager which is common to the disparate telecommunicationsnetworks is enabled by a Service Delivery Platform (SDP) which can be open-standards based and extensible as needed.
A communications system  includes both cellular and land based telecommunications such as PSTN telephone , , as well as cellular telephone . A subcriber may use prepaid cellular phone  to make and receive calls via cellular network . A Mobile Switching Center (MSC)  routes the subscriber's calls to and/or from wireline network  for domestic connections and/or network  for international connection. A Mobile Virtual Network Operator (MVNO) operates a prepaid vendor service control point (SCP) , Prepaid Vendor Service Platform (PSP) , and connected databases , , and . A method of providing a universal communications account includes: providing at least one account to a customer, enabling use of the account for a first type of connection and a second type of connection; and debiting the account based at least i part on one of the first type of connection and the second type of connection.
A voice-based telecommunications login system which includes a login process controller; a speech recognition module; a speaker verification module; a speech synthesis module; and a user database. Responsive to a user-provided first verbal answer to a first verbal question, the first verbal answer is converted to text and compared with data previously stored in the user database. The speech synthesis module provides a second question to the user, and responsive to a user-provided second verbal answer to the second question, the speaker verification module compares the second verbal answer with a voice print of the user previously stored in the user database and validates that the second verbal answer matches a voice print of the user previously stored in the user database. Also disclosed is a method of logging in to the telecommunications system and a computer program product for logging in to the telecommunications system.
A telecommunication conference device, system and method for enhancing participation within a conference call. The present application relates to telecommunications, and more particularly, to a conference phone capable of being connected with wireless devices such that they can be used as microphone extensions. In one embodiment, the conference phone can include a wireless interface and a microphone. The conference phone can connect with one or more wireless devices through the wireless interface. The conference phone can receive audio from the one or more wireless devices and at the same time, can receive audio from the microphone on the conference phone. The audio received by the conference phone, through the one or more wireless devices and the microphone, can be combined into a single audio stream using an audio mixer. The teleconference phone can remove echoing effects that are within the audio stream and then transmit the audio over a telephone network.
Wireless hands-free system with silent user signaling. Silent alerting capability is provided for any hands-free device that relies on a short-range, wireless connection to interface to a terminal. The silent alerting action can be provided by any non-audible signaling mechanism, for example a vibrator or a light. A hands-free device establishes the short-range wireless connection with the communication terminal in question. When an alert message, such as for an incoming call, is received over the short-range wireless connection, the silent alerting action is produced in response to the alert message. The invention can find use in any wireless hands-free device, for example, a \"Bluetooth\" headset.
A lens-based millimeter wave transceiver for use in wireless communication systems operating in the E-band spectrum consistent with the FCC rules regulating the 71-76 GHz and 81-86 GHz bands. The transceiver includes a single lens adapted for transmission of millimeter radiation to form communication beams in one band of either a band of about 71-76 GHz or a band of 81-86 GHz and for collection and focusing of millimeter wave radiation from communication beams in the other of the two bands. It includes a feed horn adapted to broadcast millimeter radiation through said single lens and to collect incoming millimeter wave radiation collected and focused by said single lens. A millimeter wave diplexer separates incoming and outgoing millimeter wave radiation.
A wireless telecommunication device including a foreground unit, and a background unit that is physically separated from the foreground unit and in local communication with the foreground unit. The foreground unit is provided to support incoming calls independently of the background unit. Furthermore, the foreground unit and the background unit cooperate to support outgoing calls. The scope of the invention also includes a method for doing business by offering the foreground unit for sale in a packaging having a form factor selected from the group consisting of: a pen, a pen cap, a wristwatch, and a necklace.
A wireless telecommunication device including a foreground unit, and a background unit that is physically separated from the foreground unit and in local communication with the foreground unit. The foreground unit is provided to support incoming calls independently of the background unit. Furthermore, the foreground unit and the background unit cooperate to support outgoing calls. The scope of the invention also includes a method for doing business by offering the foreground unit for sale in a packaging having a form factor selected from the group consisting of a pen, a pen cap, a wristwatch, and a necklace.
A method and apparatus for processing a message in a mobile, telecommunications device. The method comprises: receiving a Cell Update Confirm (CUC) message; determining whether the device has an empty C_RNTI variable; when the device has an empty C_RNTI variable, determining whether the CUC message includes a new C_RNTI; when the CUC message includes a new C_RNTI and the CUC message would cause the device to enter a state which requires the UE to respond to the message before entering the state, carrying out at least one further step prior to entering the state.
A surveillance system and method for remote viewing of inputs associated with at least one wireless input capture device ICD(s) monitoring a target environment, and a corresponding digital input recorder (DIR) and/or another ICD, including the steps of providing base system and at least one user accessing the DIR or ICD(s) via user interface remotely from a remote viewing device.
� Copyright©2013. Inventi Journals Pvt.Ltd. All Right Reserved.