Abdelkader Benaouda - Danville CA, US Priscilla Lau - Fremont CA, US Kwai Yeung Lee - San Jose CA, US Xiaomei Wang - Walnut Creek CA, US Loc Ba Vo - Pleasant Hill CA, US
International Classification:
H04Q 7/20
US Classification:
455466
Abstract:
Machine-to-Machine (M2M) communications, for various telemetry applications, such as meter reading, alarm applications or the like, utilize data communication service via a public mobile/wireless communication network, such as the short message service (SMS). However, such M2M communications may involve a large number of clients. To avoid the need to assign a telephone number, such as a mobile directory number (MDN) or the like, to each of the many remote M2M clients, routing through the network is based on another type of MSID (Mobile Station Identifier), such as the MIN (Mobile Identifier Number) or the IMSI (International Mobile Station Identifier) of the client. SMS messages transmissions originating at a client use a short code for the M2M application address, and SMS messages intended to terminate at a client use the MIN or IMSI as the routing address for the M2M device.
William Chung KING - Lafayette CA, US Priscilla LAU - Fremont CA, US Kwai Yeung LEE - San Jose CA, US Loc Ba VO - Pleasant Hil CA, US
Assignee:
Verizon Corporate Services Group Inc. - Basking Ridge NJ
International Classification:
H04W 4/12
US Classification:
455466
Abstract:
A system may include one or more network devices. The one or more network devices may receive a short message service (SMS) message intended for an access terminal, embed the SMS message into a data message, determine whether a data session exists with the access terminal, the data session occurring over a data network, transmit the data message to the access terminal via the data network when the data session exists, and transmit the SMS message via a voice network when the data session does not exist.
Short Messaging Service Delivery Architecture In Hybrid Lte/Cdma/Gsm Networks
Xuming CHEN - San Ramon CA, US Loc B. Vo - Pleasant Hill CA, US Kwai Y. Lee - Pittsburg CA, US
Assignee:
Verizon Patent and Licensing, Inc. - Basking Ridge NJ
International Classification:
H04W 4/12
US Classification:
455466
Abstract:
A method includes a network device receiving a request from a user, to deliver a service messaging service (SMS) message, to another user, where the other user is roaming; sending, to a first device, a user registration query; receiving, from the first device and by the network device, a user registration response, where the user registration response indicates whether the other user, in which the SMS message is to be delivered, is registered with zero networks, one network, or two networks; forwarding, by the network device, the SMS message associated with the request, via at least one of the one network or the two networks, when the user registration response indicates that the other user is registered with at least one of the one network or the two networks; and sending to a second device, by the network device, another user registration query, when the user registration response indicates that the other user is registered with zero networks.
William C. KING - Lafayette CA, US Priscilla Lau - Fremont CA, US Kwai Yeung Lee - Pittsburg CA, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
H04L 9/32 G06F 9/00
US Classification:
713 2, 713171, 713169
Abstract:
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.
William C. KING - Lafayette CA, US Lawrence S. RYBAR - Doylestown PA, US Bjorn HJELM - Livermore CA, US Xuming CHEN - San Ramon CA, US Kwai Y. LEE - Pittsburg CA, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
A device receives enterprise information associated with enterprises supported by a network, and determines enterprise identifiers for one or more enterprises identified in the enterprise information. The device also receives information associated with devices and subscribers of the network, and determines security key parameters based on the information associated with the devices and the subscribers of the network. The device further generates, based on the security key parameters, a security key for each of the enterprise identifiers.
Network Optimization For Secure Connection Establishment Or Secure Messaging
William C. KING - Lafayette CA, US Kwai Y. LEE - Pittsburg CA, US
Assignee:
VERIZON PATENT AND LICENSING INC. - Basking Ridge NJ
International Classification:
H04L 9/00 H04L 9/32
US Classification:
713155, 713150, 713168
Abstract:
A first device is configured to receive an instruction to establish a secure connection with a second device or to send a secure message to the second device. The instruction may include a secure connection invitation or a message. The first device may send information, associated with the second device, to a first server; receive a response from the first server; obtain parameters based on the response indicating that the second device is subscribed to the first server; communicate the parameters to the first server; receive a parameters identifier associated with the parameters; store the parameters identifier in the secure connection invitation or the message; and send the secure connection invitation or the message to the second device. The second device may receive the parameters identifier to obtain the parameters to establish the secure connection or to decrypt the secure message.
- Arlington VA, US Priscilla LAU - Fremont CA, US Kwai Yeung LEE - Pittsburg CA, US
International Classification:
H04L 29/06 H04L 9/08
Abstract:
A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device.