WO2007130312A9 - Channel selection/translation based on user-preference - Google Patents

Channel selection/translation based on user-preference

Info

Publication number
WO2007130312A9
WO2007130312A9 PCT/US2007/010327 US2007010327W WO2007130312A9 WO 2007130312 A9 WO2007130312 A9 WO 2007130312A9 US 2007010327 W US2007010327 W US 2007010327W WO 2007130312 A9 WO2007130312 A9 WO 2007130312A9
Authority
WO
WIPO (PCT)
Prior art keywords
communication
network
identity
user
recipient
Prior art date
Application number
PCT/US2007/010327
Other languages
French (fr)
Other versions
WO2007130312A2 (en
WO2007130312A3 (en
Inventor
Ian Mclean Pattison
Michael Edward Luna
Roland Zink
Original Assignee
724 Solutions Software Inc
Ian Mclean Pattison
Michael Edward Luna
Roland Zink
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 724 Solutions Software Inc, Ian Mclean Pattison, Michael Edward Luna, Roland Zink filed Critical 724 Solutions Software Inc
Priority to EP07794405A priority Critical patent/EP2016714A2/en
Publication of WO2007130312A2 publication Critical patent/WO2007130312A2/en
Publication of WO2007130312A9 publication Critical patent/WO2007130312A9/en
Publication of WO2007130312A3 publication Critical patent/WO2007130312A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal

Definitions

  • the present invention is generally related to the field of telecommunications, and more particularly, to systems and methods for communicating according to contextual based identity.
  • mobile networks use protocols that allow mobile device users to move from one location to another.
  • Examples of mobile devices include, without limitation, mobile phones, personal digital assistants (PDAs), and laptops, etc.
  • Fixed networks provide data services in a fixed environment.
  • An example of a fixed network is a DSL (digital subscriber line) network.
  • a fixed network may be fixed wireless or fixed wireline.
  • Fixed wireless is an alternative to fixed wireline, e.g., la ⁇ dline, coaxial cable, and copper connections.
  • Fixed wireless refers to the operation of wireless devices or systems in fixed locations such as homes and offices.
  • An example of fixed wireless is broadband wireless access in a home.
  • SMS Short Message Service
  • Multimedia Messaging Service is a communications technology that allows users to exchange multimedia messages and content between MMS-capable mobile phones and other MMS- capable devices.
  • MMS usually requires users to have the same or compatible clients on both ends.
  • Wireless Application Protocol is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging, etc. WAP-based services require special browsers or infrastructure to access services. While Internet access has been possible in the past, different manufacturers have used different technologies.
  • IP Multimedia Subsystem is defined by Third Generation Partnership Project (3GPP) as an architecture for multimedia sessions over IP.
  • IMS and other advanced IP-based services such as Voice over IP (VoIP), which rely on new network topologies and new clients for access, may be considered separate networks as their architecture may fail to consider interoperability, a subscriber's identity, target client, or services beyond basic voice services.
  • VoIP Voice over IP
  • a single subscriber may have multiple identities, including different identities for phone-based services, such as voice and SMS or MMS, as well as identities for other communication channels such as instant messaging and e-mail.
  • SMS for example, has SMS clients communicating across SMS servers in the network.
  • MMS servers use similar structure - MMS clients communicate via MMS servers on a network to other MMS clients. However, these may be two distinct networks. Thus, if an MMS message, even a MMS message containing only text content, is sent to an SMS client, the message will not be delivered.
  • Enabling users of differing technology to communicate typically involves limited or complex methods and is usually accomplished by the introduction of functionality tailored specifically to the types of technologies or protocols which it is desired to bridge.
  • an MMS to email communication is possible, but this is accomplished by instituting some specific piece of functionality into the MMS infrastructure which accomplishes this MMS to email communication (and which might not even accomplish an email to MMS communication).
  • a limitation of existing technology is that in most cases, either the originator of a message must use the correct identity of the recipient for the channel via which the message is to be delivered, or there is a fixed mapping for a target address for a given service, which may be supported by, for example, DNS ENUM (Domain Name System Electronic Numbering), to convert a MSISDN (Mobile Subscriber ISDN Number) to a mail address to allow MMS to e-mail routing.
  • DNS ENUM Domain Name System Electronic Numbering
  • MSISDN Mobile Subscriber ISDN Number
  • each new service introduced is associated with a means to bill, provision, or track usages of a service (e.g., to enable business logic associated with the services).
  • a means to bill, provision, or track usages of a service e.g., to enable business logic associated with the services.
  • a platform leverages existing standards to seamlessly connect next-generation networks to legacy networks without complex subscriber or network-based provisioning. More specifically, a legacy network (e.g. an existing network) and its subscribers appear as a seamless extension to any new networks.
  • An emulated interface as provided by embodiments of the present invention advantageously allows interoperability between new technology and existing technology without any specialized or proprietary support in the new technology domain. By providing an emulated interface between the networks and services, provisioning, management, and integration costs are advantageously reduced. Moreover, adoption of new technology is increased as a result of greater interoperability.
  • a method for communicating according to contextual identity comprising the acts of: receiving a communication from a user of a first network which communicates according to a first communication protocol, normalizing the communication into a network-independent form at, selecting a channel of communication for a recipient user of a second network which communicates according to a second communication protocol, and sending the communication to an identity of the second user via the selected channel of communication, wherein the communication includes an identity of the first user, wherein the first and second user identities are contextual to the channel of communication.
  • an identity comprises a routable address, such as an E.164 number, a phone number, or an MSISDN.
  • an identity comprises a SIP URI, an IP address, an e- mail address, or an IM identity.
  • the channel may be selected based on a recipient preference, on presence information associated with the recipient, on a classification of the sender by the recipient, or on the communication.
  • the present invention is further capable of selecting a second identity based on dynamic presence information associated with the first or second user.
  • the first network comprises an IMS network
  • the second network does not comprise an IMS network, such as a macro-cellular network, or an IP-based network.
  • the present invention is further capable of routing the normalized communication to an application operable to generate a response to the communication; and receiving a communication from the application server, wherein the communication received from the application server is sent to the identity of the second user.
  • a method for service delivery according to contextual identity comprising the acts of receiving a service request from a subscriber of a first network, normalizing the service request into a network-independent format, selecting a channel of communication for a recipient user of a second network, and sending the service request to an identity of the second user via the selected channel of communication, wherein the service request includes an identity of the first user, wherein the identity is contextual to the channel of communication.
  • the selected address comprises a routable messaging address, such as an E.164 number, a phone number, an MSISDN, a SIP URI, an IP address, or an e-mail address.
  • a routable messaging address such as an E.164 number, a phone number, an MSISDN, a SIP URI, an IP address, or an e-mail address.
  • the act of selecting the channel of communication is based on one or more preferences designated by the recipient, presence information associated with the recipient, a classification of the user by the recipient, or on the request.
  • Embodiments of the present invention may further include selecting a second address based on dynamic presence information associated with the recipient.
  • the service request may be, in some embodiments, a push-to-talk service request, an instant messaging service request, an MMS message, an SMS message.
  • One of the first and second networks may be an IMS network, and other network may be an IP-based network.
  • a system for contextual identity management includes a network bridge comprising a plurality of protocol adapters, each configured to adapt data received from any of a plurality of networks.
  • An application bridge is communicably coupled to the network bridge.
  • the application bridge is configured to receive and respond to service requests.
  • the network bridge further comprises a plurality of protocol gateways, each configured to route the adapted data to an appropriate application server in the application bridge.
  • the application bridge may receive information obtained by a presence network agent configured to provide presence information about a user to a presence server, such as an IMS based presence server for users who are not IMS subscribers.
  • the application or network bridge may further comprise an address resolution interface configured to determine a user address.
  • the application bridge may further comprise a user profile interface configured to provide one or more user preferences.
  • a billing bridge may be provided, which is communicably coupled to the network bridge, and is configured to control access to content and services.
  • Embodiments of the present invention described herein may be implemented by software or hardware or both.
  • a machine-readable medium having stored thereon a plurality of executable instructions for implementing the methods of the present invention may be provided.
  • the executable instructions may be stored as software code components or modules on one or more computer readable media (e.g., non-volatile memories, volatile memories, DASD arrays, magnetic tapes, floppy diskettes, hard drives, optical storage devices, or any other appropriate computer-readable medium or storage device).
  • the executable instructions may include lines of compiled C++, Java, HTML, or any other programming or scripting code.
  • FIGURE 1 depicts a block diagram for illustrating an exemplary implementation of one embodiment of the present invention for contextual identity when PoC is bridged to another network;
  • FIGURE 2 depicts a block diagram of an exemplary architecture for one embodiment of a network bridge with multiple channels;
  • FIGURE 3 depicts a block diagram for illustrating an exemplary embodiment of one embodiment of the present invention that provides for contextual-based identity;
  • FIGURES 4-8 depict exemplary embodiments of user interfaces for providing seamless interoperability between an instant messaging environment and a mobile environment with devices supporting MMS, SMS and PoC (Push to talk over Cellular); and
  • FIGURES 9-10 depict diagrams of one embodiment of contextual based identity processing.
  • a user may send a communication to an intended recipient utilizing an identity for the recipient based upon an identity valid in the originating user's context.
  • the communication can then be delivered to the recipient utilizing a selected identity, selected based on a set of criteria for the recipient, which may be a different identity than the initial identity.
  • identities for the delivery of messages to a recipient may be dynamically selected based upon a recipient's actions, whereabouts or a wide variety of other variables.
  • embodiments of the present invention may select an identity for the sender of the communication which is congruent to the selected identity for the recipient such that when the communication is delivered to the intended recipient it appears as if the communication originated from the identity selected for the sender, and thus may be in the correct context for the recipient.
  • Embodiments of the present invention may be better explained with a brief example.
  • a user on mobile phone wishes to send a text message to a recipient and uses an identity of the recipient which corresponds to the recipient's mobile phone (e.g. a phone number for the recipient) to send such a text message.
  • This text message may be received by an embodiment of the present invention and based on the initial identity for the recipient a set of criteria associated with the recipient may be evaluated. Based on this evaluation another identity may be selected for the recipient, where the identity may correspond to a different delivery format, protocol, device or the like. For example in this case an email address may be selected for the recipient.
  • the text message can then be delivered according to the selected identity for the recipient.
  • this may entail formulating the original text message as an email and sending this email to the recipient's email address (e.g. the selected identity).
  • embodiments of the present invention may utilize the identity of the sender (or other criteria associated with the sender), in this case the sender's phone number, to select an identity for the sender congruent with the identity selected for the recipient.
  • the sender's email address may be selected as an identity for the originator of the email.
  • the email is delivered to the recipients email address, it will appear as if the email originated from the sender's email address.
  • the set of criteria associated with the recipient may dynamically change (e.g.
  • the criteria may be updated to reflect that his computer has gone to sleep, or that a call has been placed from his mobile phone, etc.)- Consequently, if another text message is sent to the recipient an identity may be selected for the recipient which corresponds to the recipient's mobile device (e.g. using the updated set of criteria) and the message delivered according to this selected identity.
  • a communication may be delivered to a variety of identities corresponding to a recipient, where the identity selected may change according to a dynamically updated set of criteria or context associated with a particular recipient. In this way a communication may delivered to a recipient in a manner which may be convenient to the recipient.
  • the recipient replies the reply as addressed with identities in context for the corresponding user, and the message is delivered in correct context for the intended recipient, which may differ from how the reply is addressed and also how the original message was sent (e.g. the original sender has changed their context.)
  • FIGURE 1 depicts a block diagram for illustrating an exemplary embodiment of the present invention that enables for example, the extension of the PoC service from an IMS network to subscribers in a non-IMS network.
  • PoC allows a mobile phone to effectively function as a walkie-talkie.
  • a PoC user may connect via a dedicated button. No dialing phone number is needed.
  • a message is sent and played back via the recipient's speaker.
  • Half-duplex technology is typically provided.
  • PoC is advantageous to end-users by providing quick connect times, cheaper cost (single handset), group talking, simplicity of use, and expanded range (as compared to a walkie-talkie).
  • PoC is advantageous to operators by attracting new users, providing a new voice service, encouraging multiple participants to take up the service, providing efficient use of network resources, and utilizing existing cell towers, with greater distance coverage.
  • PoC is traditionally available only to PoC subscribers with PoC-enabled devices.
  • embodiments of the present invention may be utilized to communicate between an IMS device on an IMS network with a non- IMS enabled device on a non-IMS network.
  • an IMS subscriber Java
  • requests a PoC session with a non-IMS subscriber Carlos
  • Jane's cell phone 110 has PoC capability, while Carlos' cell phone 120 does not.
  • Carlos' cell phone 120 is, however, capable of handling SMS messages.
  • a SIP (Session Initiation Protocol) message is sent from Jane's cell phone 110 via a wireless access network 130, to which Jane subscribes, and an IMS core network 140.
  • the core IMS network includes a Controlling PoC server to which Jane's request is sent.
  • the Controlling PoC server forwards an invitation to Carlos which is routed to an access management server 150 (e.g. a network bridge).
  • the access management server 150 forwards the request to the appropriate legacy support server 160 (e.g. an application bridge).
  • the support server 160 forwards an SMS message to Carlos' cell phone 120 via the access management server 150 and a wireless access network 170 to which Carlos subscribes.
  • the message may be displayed on Carlos' phone 120, for example, as a message instructing Carlos on how to participate in the session.
  • the message may comprise an SMS message which reads as follows: "Jane wants to connect with you via push to talk. To talk dial 123.”
  • the message may comprise a MMS message which announces as follows: "Jane wants to connect with you via push to talk,” and Carlos may listen and reply with an MMS message with audio content.
  • the message sent to Carlos may be a voice signal formatted according to a PSTN protocol.
  • Embodiments of the present invention advantageously provides contextual identity mapping to ensure that Carlos not only receives the communication but receives the communication in a format appropriate for Carlos' device, with Jane's identity appearing in a format appropriate for Carlos 1 device. To Carlos, Jane appears to be communicating using the same protocol as Carlos.
  • Carlos' response whether SMS 1 MMS, or other format, is sent from Carlos' cell phone 120 via Carlos' access network 170, the access management server 150, and the support server 160.
  • the access management server 150 then formats a SIP message and sends it to Jane's cell phone 110 via the access management server 150, the IMS core network 140, and Jane's access network 130.
  • the present invention advantageously delivers the content in a format appropriate for Jane's device and Carlos' identity appears in a format appropriate for Jane's device. Communication between Jane and Carlos appear as if both devices are utilizing the same protocol and communication (messages, requests, responses, etc.) are exchanged seamlessly.
  • the PoC service is effectively deployed as an application in the non-IMS domain, whereas previously, the service could only be used by registered IMS subscribers. From the perspectives of the IMS subscribers and the non-IMS subscribers, it appears as if they are communicating within the same network rather than separate, different networks. The interoperability is transparent to the subscribers as well as the network operators.
  • non-network users e.g., non-IMS subscribers
  • IMS foreign/remote domain
  • the IMS network and PoC service allow for interoperability with such foreign/remote IMS subscribers by routing requests to the foreign/remote IMS domain via an I-CSCF.
  • the network bridge access management server
  • subscriber identity management provides a means to allow mobile and fixed services to interact with users of existing clients in a seamless manner by ensuring the user's identity that is presented is in context to the client and application that the recipient is currently using. It also allows originators to identify recipients using an address in context to the originating client and not the recipient client (which may not be known at the point of origination) that receives the communication.
  • FIGURE 2 depicts a block diagram of an exemplary architecture for an embodiment of a network bridge with multiple channels which can be used for input and output.
  • Channel A 200 may comprise an SMS channel
  • Channel B 210 may comprise an MMS channel
  • Channel Z 220 may comprise an SIP/IMS channel. Additional channels of communication may be provided.
  • the channel selection and routing application 230 makes use of contextual identity mapping in order to route between channels.
  • Channel selection may be based on a set of criteria including fixed rules, presence information to determine what channels a user is currently accessible on, user preferences, service provider policy, a classification of the sender by the recipient, or an attribute of the request such as priority or content type to match the content type of the request to the content type supported by a channel on which a user may be reached, or any combination of the above or any additional criteria.
  • the contextual identity mapping layer 240 makes use of services such as presence, user profiles, and address resolution services to ensure that identities are mapped into, or selected according to, a form that is natural to the channel being used for communication.
  • Presence information such as in the presence sources, may be managed by any of a number of different ways. Presence information may be explicit. For example, presence may be user-controlled. Users may manage their presence via a web browser or offline web-based tool. Users may manipulate presence information from a phone. For example, a USSD (Unstructured Supplementary Services Data) application may set available or unavailable status. Presence information may also be implicit. For example, an IM user may be idle after a certain period of no activity. Presence information may be determined by other means. For example, a TapRoot or Bluetooth-enabled device may detect when a user has walked away from his or her computer or other client device.
  • Presence information may be determined by other means. For example, a TapRoot or Bluetooth-enabled device may detect when a user has walked away from his or her computer or other client device.
  • Presence information about a cell phone user may be obtained from a Home Location Register (HLR) for the mobile phone network.
  • Presence information about an IM user may be obtained from an IM presence server.
  • Presence information may be dynamic, and tracking changes in presence and changes in target UE (User Equipment) is advantageously provided.
  • presence information may be collected by monitoring activity to browser and fetch messages via the WAP (or other) gateway installed in the existing communication network. The act of collecting this information creates a "network presence agent" as part of the access management platform.
  • User profile information may include user preferences for access control rules, such as from whom users will accept calls, and rules for who can subscribe to the users' presence information. Users may also specify preferences for notification mechanisms, e.g., SMS, MMS 1 or callout; or callback or MMS with audio content. User profile information may comprise preferences for a hierarchy of devices. For example, a user who has three devices may prefer to have communications delivered to device A first, then to device B, and then to device C. User profile information may also be obtained from outside sources, such as Microsoft Active DirectoryTM or a HSS user profile.
  • Address contextual identity mapping component determines which address is to be used. For example, a database may be queried to determine a user's address for SMS messages. The user's phone number may be returned in response.
  • the contextual identity mapping component utilizes many sources that collect dynamic presence information from the network as well as static mapping databases. For example, messages are received from an HLR (Home Location Register) when a subscriber's cell phone becomes registered on the network. As another example, a SIP registration is received when a user registers into the IMS or Microsoft Live Communication Server environment, or a RADIUS message when the user logs into a corporate network via RADIUS (Remote Authentication Dial-In User Service). This component maintains information about on which channels/domains a user is reachable as well as any addressing/routing information for that domain obtained via presence.
  • HLR Home Location Register
  • RADIUS Remote Authentication Dial-In User Service
  • the receiver's identity is mapped using either a local or external database. Presence information which indicates the type of client/application that the receiver is using is obtained. The message is then formatted to the target UE and the network bridge dynamically maintains the identity mapping relationship between the specific session of the originator and the receiver.
  • the contextual identity database itself contains a mapping of the user routable addresses, associated client characteristics (which can also be determined dynamically), and the user's order/routing preference, if they cannot be located. For example, a user may prefer that if the user is not home, at his or her desk, or on his or her cell phone, that a message is sent via e-mail).
  • FIGURE 3 depicts a block diagram for illustrating an exemplary embodiment of the present invention that provides for contextual-based identity.
  • Providing for contextual-based identity ensures that the identities or addresses used are valid or desired for the channel being used for delivery of a service. For example, if a message is delivered via SMS or MMS, then both the originator and recipient addresses should be expressed as MSISDNs irrespective of whether the message was originated via a phone, IM, e-mail, or some other application.
  • Providing for contextual-based identity takes into account a number of factors in determining which delivery channel should be used to reach a user.
  • Such factors may include without limitation the media requirements of the service/message, the channels via which the subscriber is currently available, the subscriber's preferences, and how the originating subscriber is classified by the target subscriber (for example, e-mails from a user's family are delivered as MMS messages while the user is away from home).
  • Joe wishes to communicate with Fred. Joe's
  • MSISDN is +441234567890
  • Joe's SIP URI Uniform Resource Identifier
  • Fred's MSISDN is +440987654321
  • Fred's SIP URI is sip:fred@acme.com.
  • Joe and Fred have multiple IDs and can be reached via multiple channels.
  • Joe and Fred may be reached at additional addresses, such as E.164 numbers, IP addresses, other e-mail addresses, and various other routable messaging addresses.
  • Joe wishes to send an SMS message to Fred.
  • Joe's user equipment currently comprises a cellular phone
  • Fred's user equipment currently comprises a laptop.
  • Joe, as originator creates an SMS message, and selects Fred, as recipient, from an address book in Joe's cellular phone.
  • Joe sends the SMS to Fred's MSISDN (+440987654321) via a cellular network.
  • the network bridge looks up an association between Fred and Fred's number (e.g. using Fred's MSISDN).
  • the network bridge based on presence information which may be associated with Fred such as Fred's user profile, address resolution information or other factors, opens a channel of communication and creates an IM chat session to Fred's IM identity (i.e., SIP URI, sip:fred@acme.com.) Fred receives the chat session invitation on Fred's laptop, and Fred responds according to an appropriate protocol (i.e., accepts the chat session invitation), which appears from Joe's IM identity (i.e., SIP URI, sip:joe@acme.com.) Fred receives a text IM from Joe at sip:joe@acme.com.
  • the originator, Joe is able to identify the recipient, Fred, using an address in context to the originating client and not the recipient client.
  • Joe's identity is presented to Fred in context to the client and application that Fred is currently using.
  • Fred wishes to send a file to Joe.
  • Fred as originator, drags a file comprising a JPEG image and drops it onto his IM chat session window.
  • the image is sent as file transfer via IM chat session with sip:joe@acme.com.
  • the network bridge based on presence information, Joe's user profile, and address resolution information, or other factors, determines to deliver the image to Joe via MMS.
  • a MMS is created and sent to Joe at +441234567890, and is presented to Joe as if sent from +440987654321.
  • the MMS is received by Joe's cellular phone.
  • Joe's cellular phone maps the originator MSISDN to the phone book entry for Fred.
  • the originator, Fred is able to identify the recipient, Joe, using an address in context to the originating client and not the recipient client.
  • Fred's identity is presented to Joe in context to the client and application that Joe is currently using.
  • An ID can change dynamically, and therefore, tracking presence to track the UE may be provided.
  • Fred may move from his desk (where his laptop is) to his cell phone.
  • Fred has dynamically changed his presence (by one of many means such as idle timeout or proximity detection, for example).
  • his default routing changes dynamically, and the system updates and tracks this change to allow the next message to arrive (in context) on Fred's new device (his cell phone).
  • FIGURES 4, 5, and 6, depict exemplary user interfaces for providing seamless interoperability between an IM-enabled client, e.g., Microsoft® Office Communicator client, and a PoC-enabled client that is able to send and receive multimedia and video.
  • IM-enabled client e.g., Microsoft® Office Communicator client
  • PoC-enabled client that is able to send and receive multimedia and video.
  • a user of a mobile phone Ian Pattison
  • wishes to deliver MMS, PoC, and video to the IM user (Michael Luna).
  • FIGURE 4 one embodiment of a user interface for an IM client is depicted.
  • the IM user (Michael) receives an invitation to a conversation, delivered as an instant message from sip:ianp@sip. len.tantau.com. To Michael, the format of the identity it appears as though Ian is communicating in an IM context.
  • Michael is given the opportunity to accept or deny the invitation in a format supported by his device (i.e., pressing the Alt+C keys on a keyboard to Accept or Alt+D to Decline.)
  • Michael accepts the invitation and a notification is provided in a format supported by his device (i.e., the text message ⁇ ou have accepted the invitation from Ian Pattison to an Unwired LifestyleTM session." is presented)
  • FIGURE 6 a video message from Ian is delivered to Michael, with lan's identity appearing as sip:ianp@sip.len.tantau, even though the video image shows Ian communicating via a cellular phone with headset and as such would have addressed Michael via his MSISDN and the MMS infrastructure would have set the originating address to lan's MSISDN.
  • FIGURE 7 Michael wishes to send an image (sunset.jpg) from his computer to the Ian on his cellular phone. Michael drags and drops the image into the IM window.
  • the image (sunset.jpg) is formatted and sent to lan's mobile phone and displayed as an MMS message, as depicted in FIGURE 8.
  • both Ian and Michael are able to send and receive communication from each other, with each person sending and receiving the communication in a format based on the device each is using, and the other person appears as though he is using the same protocol.
  • FIGURES 9 and 10 depict flow diagrams for contextual based identity processing.
  • a client or application in Domain A sends a communication (e.g. request) to Network A.
  • Network A routes the request to a network bridge in accordance with the present invention, including one or more adapters, a router, a channel selection and routing application, or a contextual identity mapping application.
  • the adapters receive and normalize communications into a network-independent format.
  • One method for normalizing the communications is described in United States Patent 6,173,327 issued to Jeroen De Borst et al, which is incorporated by reference.
  • a router sends a request for an appropriate channel for the intended recipient to the channel selection and routing application.
  • the channel selection and routing application may use fixed rules, presence information, user profile information, address resolution information, policies (such as matching the content type of the request to one or more content types supported by a channel through which the recipient may be reached), and preferences to select an appropriate channel.
  • the router also sends a request for an appropriate identity to the contextual identity (ID) mapping application.
  • the contextual identity (ID) mapping application may also use presence information, user profile information, address resolution information, policies, and preferences to map the identities for both the sender and the recipient into addresses valid in the recipient's domain (Domain B).
  • the router sends the communication to a gateway.
  • the gateway generates a domain-specific message (communication) and sends the message to Network B.
  • Network B routes the message to the client/application in a contextual format for the recipient's device.
  • the recipient receives the request in the correct context of the target domain (e.g. Domain B) and therefore can use all normal or desired functions (e.g. reply.)
  • a protocol level acknowledgement may be part of the domain protocol, and so an acknowledgement communication (ACK message) is sent by the original recipient to the original sender.
  • the acknowledgement is sent to a Network B server, which routes it to the gateway of the present invention.
  • the gateway forwards the acknowledgement message to the router, which matches the acknowledgement message to the original communication.
  • the acknowledgement message is returned through the adapter to the Network A server, which routes it to the original sender.
  • the recipient in Network B may send a communication such as a reply or a new message.
  • Client B generates a reply or new message and sends the communication to a server in Network B.
  • Network B routes the communication to an adapter, which may or may not be the same adapter used in the original communication.
  • the communication (reply or new message) is normalized into a network- independent format and sent to a router.
  • the router sends a request for an appropriate channel for the intended recipient to the channel selection and routing application.
  • the channel selection and routing application can select an appropriate channel using any of the methods and processes used to determine the original channel, or may use different processes or methods.
  • the router also sends a request for an appropriate identity to the contextual identity (ID) mapping application.
  • ID contextual identity
  • the contextual identity (ID) mapping application may also use presence information, user profile information, address resolution information, policies, and preferences to map the identities for both the sender and the recipient into addresses valid in the recipient's domain (Domain B).
  • the router sends the communication to a gateway.
  • the present invention determines an appropriate channel and identity for each message, which enables users to switch devices without disrupting communication.
  • the gateway generates a domain-specific message (communication) and sends the message to Network A.
  • Network A routes the message to the client/application in a contextual format for the Client A's device.
  • Client A receives the request in the correct context of the target domain (e.g. Domain B) and therefore can use all normal functions (e.g. reply.)
  • a protocol level acknowledgement may be part of the domain protocol, and so an acknowledgement communication (ACK message) is sent by Client A to the original sender.
  • the acknowledgement is sent to a Network A server, which routes it to the gateway of the present invention.
  • the gateway forwards the acknowledgement message to the router, which matches the acknowledgement message to the original communication.
  • the acknowledgement message is returned through the adapter to the Network B server, which routes it to Client B.
  • the above examples illustrate how users may communicate with each other without needing to know about each other's technology requirements.
  • the senders do not need to be aware of which channel the receivers are using.
  • the senders' client devices and the receivers' client devices need not be unaltered.
  • the senders' software and the receivers' software need not be unaltered.
  • the senders and receivers do not need to subscribe to the same type of network or use the same type of service.
  • Messages and data are presented to the sender in the context of the sender's client, while messages and data are presented to the receiver in the context of the receiver's client.
  • the context can be dynamically updated during a communication session based on a change in the sender's client or the receiver's client.

Abstract

Systems and methods for communicating according to contextual identity are disclosed. Embodiments of the present invention provide identity management which may dynamically select appropriate identities or communication channels for communication between network users. More specifically, embodiments of the present invention may automatically select an appropriate identity from a plurality of identities for a user. Thus, users may be provided seamless access to different networks without having to subscribe to the same networks and without having to alter client devices or applications.

Description

TITLE OF THE INVENTION CONTEXTUAL BASED IDENTITY
CROSS-REFERENCE TO RELATED APPLICATION(S)
[0001] This application claims priority to U.S. Provisional Patent Application Serial No. 60/746,036 by inventors Ian McLean Pattison, Michael Edward Luna, and Roland Zink, entitled "Contextual Based Identity" filed on April 29, 2006, the entire contents of which are hereby expressly incorporated by reference for all purposes.
TECHNICAL FIELD OF THE INVENTION
[0002] The present invention is generally related to the field of telecommunications, and more particularly, to systems and methods for communicating according to contextual based identity.
BACKGROUND OF THE INVENTION
[0003] A number of different types of telecommunication networks and telecommunication protocols currently exist. For example, mobile networks use protocols that allow mobile device users to move from one location to another. Examples of mobile devices include, without limitation, mobile phones, personal digital assistants (PDAs), and laptops, etc.
[0004] Fixed networks provide data services in a fixed environment. An example of a fixed network is a DSL (digital subscriber line) network. A fixed network may be fixed wireless or fixed wireline. Fixed wireless is an alternative to fixed wireline, e.g., laπdline, coaxial cable, and copper connections. Fixed wireless refers to the operation of wireless devices or systems in fixed locations such as homes and offices. An example of fixed wireless is broadband wireless access in a home.
[0005] In addition, a number of different types of data services and different methods of communicating between or among devices currently exist. For example, Short Message Service (SMS) is a service for sending text messages to mobile phones and other devices.
[0006] As another example, Multimedia Messaging Service (MMS) is a communications technology that allows users to exchange multimedia messages and content between MMS-capable mobile phones and other MMS- capable devices. MMS usually requires users to have the same or compatible clients on both ends.
[0007] Wireless Application Protocol (WAP) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging, etc. WAP-based services require special browsers or infrastructure to access services. While Internet access has been possible in the past, different manufacturers have used different technologies.
[0008] IP Multimedia Subsystem (IMS) is defined by Third Generation Partnership Project (3GPP) as an architecture for multimedia sessions over IP. IMS and other advanced IP-based services such as Voice over IP (VoIP), which rely on new network topologies and new clients for access, may be considered separate networks as their architecture may fail to consider interoperability, a subscriber's identity, target client, or services beyond basic voice services.
[0009] Many other types of data services and methods of communicating exist, such as creating separate networks for IMS or other advanced services which also results in creating isolated services and islands of communities. This situation poses a barrier to interoperability.
[0010] Additionally, within these various mobile and fixed networks, there are multiple channels via which users can originate and/or receive messages or other forms of communication. In many cases, a single subscriber may have multiple identities, including different identities for phone-based services, such as voice and SMS or MMS, as well as identities for other communication channels such as instant messaging and e-mail.
SUMMARY OF THE INVENTION
[0011] Access to existing infrastructure and existing clients has been limited as specialized nodes are usually used for interworking and special provisioning usually must be made to enable access or inter-communication with existing subscribers. When new access methods and services are introduced, they are generally implemented in mobile and fixed wireless networks as discrete, end- to-end services which rely on specific clients or network technology to enable access. This typically limits the addressable subscriber population to only those with compatible technology. SMS, for example, has SMS clients communicating across SMS servers in the network. MMS servers use similar structure - MMS clients communicate via MMS servers on a network to other MMS clients. However, these may be two distinct networks. Thus, if an MMS message, even a MMS message containing only text content, is sent to an SMS client, the message will not be delivered.
[0012] Enabling users of differing technology to communicate typically involves limited or complex methods and is usually accomplished by the introduction of functionality tailored specifically to the types of technologies or protocols which it is desired to bridge. For example, an MMS to email communication is possible, but this is accomplished by instituting some specific piece of functionality into the MMS infrastructure which accomplishes this MMS to email communication (and which might not even accomplish an email to MMS communication).
[0013] These difficulties have created problems with up-take and adoption of new technologies (e.g. next generation networks or protocols) by forcing users to update clients and services to maintain connectivity with others in their community. It also increases the time to pay-back investment in the installation or use of such new services and network infrastructures.
[0014] As can be seen in the above-described cases, interoperability between existing services and/or existing clients is approached on a service-by-service basis. This approach results in closed environments where the vendor providing a solution for new services or new clients defines the level of interoperability with existing services and/or clients, resulting in inconsistent and proprietary solutions. It also results in additional costs as there is not a consistent platform for providing interoperability between disparate services and or clients.
[0015] In addition, a limitation of existing technology is that in most cases, either the originator of a message must use the correct identity of the recipient for the channel via which the message is to be delivered, or there is a fixed mapping for a target address for a given service, which may be supported by, for example, DNS ENUM (Domain Name System Electronic Numbering), to convert a MSISDN (Mobile Subscriber ISDN Number) to a mail address to allow MMS to e-mail routing. As a result of this limitation, there is no capability to take into account a subscriber's current environment in deciding which of a user's identities should be used for expressing the originator's or recipient's identity. This is especially a limitation in environments which attempt to bridge from one communication channel to another.
[0016] Since new network technologies often introduce new ways of identifying or routing messages to a subscriber, the problem of identity management across network types arises. The industry is addressing this with the concept of a single identity, but the problem is better solved not with a single identity, but rather, by selecting the right identity for the subscriber based for example, on the network and type of device he or she is using at a given time.
10017] As there are new data transport protocols and entire stacks introduced which manage the authentication, billing, and routing of messages in new networks. It would be desirable for these protocols to be seamlessly bridged between newer (e.g. next generation) networks or existing networks and legacy networks in a way that preserves both access management and billing services, as well as protocol transformation (which can be accomplished today with simple proxies and gateways).
[0018] Usually, each new service introduced is associated with a means to bill, provision, or track usages of a service (e.g., to enable business logic associated with the services). When considering inter-network interoperability, it would be desirable to provide a means to extend the business logic to subscribers that may be accessing the service from outside the network of origin.
[0019] This desire has driven the need for improved systems and methods for communication that overcome the deficiencies in the prior art. In accordance with one embodiment of the present invention, a platform is provided that leverages existing standards to seamlessly connect next-generation networks to legacy networks without complex subscriber or network-based provisioning. More specifically, a legacy network (e.g. an existing network) and its subscribers appear as a seamless extension to any new networks. An emulated interface as provided by embodiments of the present invention advantageously allows interoperability between new technology and existing technology without any specialized or proprietary support in the new technology domain. By providing an emulated interface between the networks and services, provisioning, management, and integration costs are advantageously reduced. Moreover, adoption of new technology is increased as a result of greater interoperability.
[0020] In accordance with one embodiment of the present invention, a method for communicating according to contextual based identity is disclosed. A method for communicating according to contextual identity, the method comprising the acts of: receiving a communication from a user of a first network which communicates according to a first communication protocol, normalizing the communication into a network-independent form at, selecting a channel of communication for a recipient user of a second network which communicates according to a second communication protocol, and sending the communication to an identity of the second user via the selected channel of communication, wherein the communication includes an identity of the first user, wherein the first and second user identities are contextual to the channel of communication.
[0021] In some embodiments, an identity comprises a routable address, such as an E.164 number, a phone number, or an MSISDN.
[0022] In some embodiments, an identity comprises a SIP URI, an IP address, an e- mail address, or an IM identity.
[0023] In one embodiment, the channel may be selected based on a recipient preference, on presence information associated with the recipient, on a classification of the sender by the recipient, or on the communication.
[0024] In some embodiments the present invention is further capable of selecting a second identity based on dynamic presence information associated with the first or second user.
[0025] In some embodiments, the first network comprises an IMS network, and the second network does not comprise an IMS network, such as a macro-cellular network, or an IP-based network.
[0026] In some embodiments, the present invention is further capable of routing the normalized communication to an application operable to generate a response to the communication; and receiving a communication from the application server, wherein the communication received from the application server is sent to the identity of the second user.
[0027] In accordance with another embodiment of the present invention, a method for service delivery according to contextual identity is provided. A method for service delivery according to contextual identity, the method comprising the acts of receiving a service request from a subscriber of a first network, normalizing the service request into a network-independent format, selecting a channel of communication for a recipient user of a second network, and sending the service request to an identity of the second user via the selected channel of communication, wherein the service request includes an identity of the first user, wherein the identity is contextual to the channel of communication.
[0028] In some embodiments, the selected address comprises a routable messaging address, such as an E.164 number, a phone number, an MSISDN, a SIP URI, an IP address, or an e-mail address.
[0029] In some embodiments, the act of selecting the channel of communication is based on one or more preferences designated by the recipient, presence information associated with the recipient, a classification of the user by the recipient, or on the request. Embodiments of the present invention may further include selecting a second address based on dynamic presence information associated with the recipient. The service request may be, in some embodiments, a push-to-talk service request, an instant messaging service request, an MMS message, an SMS message. One of the first and second networks may be an IMS network, and other network may be an IP-based network.
[0030] In accordance with another embodiment of the present invention, a system for contextual identity management includes a network bridge comprising a plurality of protocol adapters, each configured to adapt data received from any of a plurality of networks. An application bridge is communicably coupled to the network bridge. The application bridge is configured to receive and respond to service requests. The network bridge further comprises a plurality of protocol gateways, each configured to route the adapted data to an appropriate application server in the application bridge. The application bridge may receive information obtained by a presence network agent configured to provide presence information about a user to a presence server, such as an IMS based presence server for users who are not IMS subscribers. The application or network bridge may further comprise an address resolution interface configured to determine a user address. The application bridge may further comprise a user profile interface configured to provide one or more user preferences. A billing bridge may be provided, which is communicably coupled to the network bridge, and is configured to control access to content and services.
[0031] Embodiments of the present invention described herein may be implemented by software or hardware or both. For example, a machine-readable medium having stored thereon a plurality of executable instructions for implementing the methods of the present invention may be provided. The executable instructions may be stored as software code components or modules on one or more computer readable media (e.g., non-volatile memories, volatile memories, DASD arrays, magnetic tapes, floppy diskettes, hard drives, optical storage devices, or any other appropriate computer-readable medium or storage device). In one exemplary embodiment of the invention, the executable instructions may include lines of compiled C++, Java, HTML, or any other programming or scripting code.
[0032] These, and other, aspects of the invention will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. The following description, while indicating various embodiments of the invention and numerous specific details thereof, is given by way of illustration and not of limitation. Many substitutions, modifications, additions or rearrangements may be made within the scope of the invention, and the invention includes all such substitutions, modifications, additions or rearrangements
BRIEF DESCRIPTION OF THE DRAWINGS
[0033] Embodiments of the inventive aspects of this disclosure will be best understood with reference to the following detailed description, when read in conjunction with the accompanying drawings, in which:
[0034] FIGURE 1 depicts a block diagram for illustrating an exemplary implementation of one embodiment of the present invention for contextual identity when PoC is bridged to another network;
[0035] FIGURE 2 depicts a block diagram of an exemplary architecture for one embodiment of a network bridge with multiple channels; [0036] FIGURE 3 depicts a block diagram for illustrating an exemplary embodiment of one embodiment of the present invention that provides for contextual-based identity;
[0037] FIGURES 4-8 depict exemplary embodiments of user interfaces for providing seamless interoperability between an instant messaging environment and a mobile environment with devices supporting MMS, SMS and PoC (Push to talk over Cellular); and
[0038] FIGURES 9-10 depict diagrams of one embodiment of contextual based identity processing.
DETAILED DESCRIPTION OF THE INVENTION
[0039] The invention and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well known starting materials, processing techniques, components and equipment are omitted so as not to unnecessarily obscure the invention in detail. Skilled artisans should understand, however, that the detailed description and the specific examples, while disclosing preferred embodiments of the invention, are given by way of illustration only and not by way of limitation. Various substitutions, modifications, additions or rearrangements within the scope of the underlying inventive concept(s) will become apparent to those skilled in the art after reading this disclosure.
[0040] Reference is now made in detail to the exemplary embodiments of the invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts (elements). Embodiments of the present invention may be utilized in conjunction with the platform for interoperability described in U.S. Patent Application Serial No. / by inventors Michael Edward Luna, Ian McLean Pattison, Hanni Doch and Roland Zink, entitled "Platform for Interoperability" filed on April 27, 2007 (ATTY DOCKET 1130-1), the entire contents of which are hereby expressly incorporated by reference for all purposes.
[0041] Attention is now directed to systems and methods for contextual identity mapping. More specifically, embodiments of the present invention are presented herein whereby a user may send a communication to an intended recipient utilizing an identity for the recipient based upon an identity valid in the originating user's context. The communication can then be delivered to the recipient utilizing a selected identity, selected based on a set of criteria for the recipient, which may be a different identity than the initial identity. As the set of criteria associated with a particular recipient may vary overtime and based upon the actions of a recipient, identities for the delivery of messages to a recipient may be dynamically selected based upon a recipient's actions, whereabouts or a wide variety of other variables.
[0042] Additionally, embodiments of the present invention may select an identity for the sender of the communication which is congruent to the selected identity for the recipient such that when the communication is delivered to the intended recipient it appears as if the communication originated from the identity selected for the sender, and thus may be in the correct context for the recipient.
[0043] Embodiments of the present invention may be better explained with a brief example. Suppose a user on mobile phone wishes to send a text message to a recipient and uses an identity of the recipient which corresponds to the recipient's mobile phone (e.g. a phone number for the recipient) to send such a text message. This text message may be received by an embodiment of the present invention and based on the initial identity for the recipient a set of criteria associated with the recipient may be evaluated. Based on this evaluation another identity may be selected for the recipient, where the identity may correspond to a different delivery format, protocol, device or the like. For example in this case an email address may be selected for the recipient. The text message can then be delivered according to the selected identity for the recipient. Here this may entail formulating the original text message as an email and sending this email to the recipient's email address (e.g. the selected identity).
[0044] Additionally, embodiments of the present invention may utilize the identity of the sender (or other criteria associated with the sender), in this case the sender's phone number, to select an identity for the sender congruent with the identity selected for the recipient. Thus, in this case the sender's email address may be selected as an identity for the originator of the email. When the email is delivered to the recipients email address, it will appear as if the email originated from the sender's email address. [0045] Suppose now that the recipient of the initial message leaves his desk and places a call on his mobile phone. Here the set of criteria associated with the recipient may dynamically change (e.g. the criteria may be updated to reflect that his computer has gone to sleep, or that a call has been placed from his mobile phone, etc.)- Consequently, if another text message is sent to the recipient an identity may be selected for the recipient which corresponds to the recipient's mobile device (e.g. using the updated set of criteria) and the message delivered according to this selected identity. As can be seen then, a communication may be delivered to a variety of identities corresponding to a recipient, where the identity selected may change according to a dynamically updated set of criteria or context associated with a particular recipient. In this way a communication may delivered to a recipient in a manner which may be convenient to the recipient. Similarly, if the recipient replies, the reply as addressed with identities in context for the corresponding user, and the message is delivered in correct context for the intended recipient, which may differ from how the reply is addressed and also how the original message was sent (e.g. the original sender has changed their context.)
[0046] Reference is now made to FIGURE 1 , which depicts a block diagram for illustrating an exemplary embodiment of the present invention that enables for example, the extension of the PoC service from an IMS network to subscribers in a non-IMS network. PoC allows a mobile phone to effectively function as a walkie-talkie. A PoC user may connect via a dedicated button. No dialing phone number is needed. A message is sent and played back via the recipient's speaker. Half-duplex technology is typically provided. PoC is advantageous to end-users by providing quick connect times, cheaper cost (single handset), group talking, simplicity of use, and expanded range (as compared to a walkie-talkie). PoC is advantageous to operators by attracting new users, providing a new voice service, encouraging multiple participants to take up the service, providing efficient use of network resources, and utilizing existing cell towers, with greater distance coverage. However, PoC is traditionally available only to PoC subscribers with PoC-enabled devices.
[0047] In the example of FIGURE 1 , embodiments of the present invention may be utilized to communicate between an IMS device on an IMS network with a non- IMS enabled device on a non-IMS network. Suppose an IMS subscriber (Jane) requests a PoC session with a non-IMS subscriber (Carlos). Jane's cell phone 110 has PoC capability, while Carlos' cell phone 120 does not. Carlos' cell phone 120 is, however, capable of handling SMS messages.
[0048] A SIP (Session Initiation Protocol) message is sent from Jane's cell phone 110 via a wireless access network 130, to which Jane subscribes, and an IMS core network 140. The core IMS network includes a Controlling PoC server to which Jane's request is sent. The Controlling PoC server forwards an invitation to Carlos which is routed to an access management server 150 (e.g. a network bridge). The access management server 150 forwards the request to the appropriate legacy support server 160 (e.g. an application bridge). The support server 160 forwards an SMS message to Carlos' cell phone 120 via the access management server 150 and a wireless access network 170 to which Carlos subscribes. The message may be displayed on Carlos' phone 120, for example, as a message instructing Carlos on how to participate in the session. For example, the message may comprise an SMS message which reads as follows: "Jane wants to connect with you via push to talk. To talk dial 123." As another example, if Carlos' cell phone 120 is an MMS-capable device, the message may comprise a MMS message which announces as follows: "Jane wants to connect with you via push to talk," and Carlos may listen and reply with an MMS message with audio content. As yet another example, the message sent to Carlos may be a voice signal formatted according to a PSTN protocol.
[0049] Embodiments of the present invention advantageously provides contextual identity mapping to ensure that Carlos not only receives the communication but receives the communication in a format appropriate for Carlos' device, with Jane's identity appearing in a format appropriate for Carlos1 device. To Carlos, Jane appears to be communicating using the same protocol as Carlos.
[0050] Carlos' response, whether SMS1 MMS, or other format, is sent from Carlos' cell phone 120 via Carlos' access network 170, the access management server 150, and the support server 160. The access management server 150 then formats a SIP message and sends it to Jane's cell phone 110 via the access management server 150, the IMS core network 140, and Jane's access network 130. When Jane receives Carlos' response, the present invention advantageously delivers the content in a format appropriate for Jane's device and Carlos' identity appears in a format appropriate for Jane's device. Communication between Jane and Carlos appear as if both devices are utilizing the same protocol and communication (messages, requests, responses, etc.) are exchanged seamlessly.
[0051] Thus, it can be seen that the PoC service is effectively deployed as an application in the non-IMS domain, whereas previously, the service could only be used by registered IMS subscribers. From the perspectives of the IMS subscribers and the non-IMS subscribers, it appears as if they are communicating within the same network rather than separate, different networks. The interoperability is transparent to the subscribers as well as the network operators.
[0052] In accordance with embodiments of the present embodiment, non-network users (e.g., non-IMS subscribers) appear as if they are network users (e.g., IMS subscribers) in a foreign/remote domain (IMS). In the example depicted in FIGURE 1, the IMS network and PoC service allow for interoperability with such foreign/remote IMS subscribers by routing requests to the foreign/remote IMS domain via an I-CSCF. The network bridge (access management server) appears to the IMS domain as an I-CSCF, allowing the new service to use standard interworking capabilities but reach the application bridge providing the PoC interoperability service to the legacy non-IMS subscribers.
[0053] In embodiments of the present invention, subscriber identity management is provided. This provides a means to allow mobile and fixed services to interact with users of existing clients in a seamless manner by ensuring the user's identity that is presented is in context to the client and application that the recipient is currently using. It also allows originators to identify recipients using an address in context to the originating client and not the recipient client (which may not be known at the point of origination) that receives the communication.
[0054] Reference is now made to FIGURE 2 which depicts a block diagram of an exemplary architecture for an embodiment of a network bridge with multiple channels which can be used for input and output. For example, Channel A 200 may comprise an SMS channel, Channel B 210 may comprise an MMS channel, and Channel Z 220 may comprise an SIP/IMS channel. Additional channels of communication may be provided. [0055] The channel selection and routing application 230 makes use of contextual identity mapping in order to route between channels. Channel selection may be based on a set of criteria including fixed rules, presence information to determine what channels a user is currently accessible on, user preferences, service provider policy, a classification of the sender by the recipient, or an attribute of the request such as priority or content type to match the content type of the request to the content type supported by a channel on which a user may be reached, or any combination of the above or any additional criteria.
[0056] The contextual identity mapping layer 240 makes use of services such as presence, user profiles, and address resolution services to ensure that identities are mapped into, or selected according to, a form that is natural to the channel being used for communication.
[0057] Presence information, such as in the presence sources, may be managed by any of a number of different ways. Presence information may be explicit. For example, presence may be user-controlled. Users may manage their presence via a web browser or offline web-based tool. Users may manipulate presence information from a phone. For example, a USSD (Unstructured Supplementary Services Data) application may set available or unavailable status. Presence information may also be implicit. For example, an IM user may be idle after a certain period of no activity. Presence information may be determined by other means. For example, a TapRoot or Bluetooth-enabled device may detect when a user has walked away from his or her computer or other client device. Presence information about a cell phone user may be obtained from a Home Location Register (HLR) for the mobile phone network. Presence information about an IM user may be obtained from an IM presence server. Presence information may be dynamic, and tracking changes in presence and changes in target UE (User Equipment) is advantageously provided. As a further example, presence information may be collected by monitoring activity to browser and fetch messages via the WAP (or other) gateway installed in the existing communication network. The act of collecting this information creates a "network presence agent" as part of the access management platform.
[0058] User profile information may include user preferences for access control rules, such as from whom users will accept calls, and rules for who can subscribe to the users' presence information. Users may also specify preferences for notification mechanisms, e.g., SMS, MMS1 or callout; or callback or MMS with audio content. User profile information may comprise preferences for a hierarchy of devices. For example, a user who has three devices may prefer to have communications delivered to device A first, then to device B, and then to device C. User profile information may also be obtained from outside sources, such as Microsoft Active Directory™ or a HSS user profile.
[0059] Address contextual identity mapping component determines which address is to be used. For example, a database may be queried to determine a user's address for SMS messages. The user's phone number may be returned in response. The contextual identity mapping component utilizes many sources that collect dynamic presence information from the network as well as static mapping databases. For example, messages are received from an HLR (Home Location Register) when a subscriber's cell phone becomes registered on the network. As another example, a SIP registration is received when a user registers into the IMS or Microsoft Live Communication Server environment, or a RADIUS message when the user logs into a corporate network via RADIUS (Remote Authentication Dial-In User Service). This component maintains information about on which channels/domains a user is reachable as well as any addressing/routing information for that domain obtained via presence.
[0060] According to one embodiment, in determining the appropriate receiver identity, the receiver's identity is mapped using either a local or external database. Presence information which indicates the type of client/application that the receiver is using is obtained. The message is then formatted to the target UE and the network bridge dynamically maintains the identity mapping relationship between the specific session of the originator and the receiver. The contextual identity database itself contains a mapping of the user routable addresses, associated client characteristics (which can also be determined dynamically), and the user's order/routing preference, if they cannot be located. For example, a user may prefer that if the user is not home, at his or her desk, or on his or her cell phone, that a message is sent via e-mail).
[0061] Reference is now made to FIGURE 3 which depicts a block diagram for illustrating an exemplary embodiment of the present invention that provides for contextual-based identity. Providing for contextual-based identity ensures that the identities or addresses used are valid or desired for the channel being used for delivery of a service. For example, if a message is delivered via SMS or MMS, then both the originator and recipient addresses should be expressed as MSISDNs irrespective of whether the message was originated via a phone, IM, e-mail, or some other application. Providing for contextual-based identity takes into account a number of factors in determining which delivery channel should be used to reach a user. Such factors may include without limitation the media requirements of the service/message, the channels via which the subscriber is currently available, the subscriber's preferences, and how the originating subscriber is classified by the target subscriber (for example, e-mails from a user's family are delivered as MMS messages while the user is away from home).
[0062] In the example of FIGURE 3, Joe wishes to communicate with Fred. Joe's
MSISDN is +441234567890, and Joe's SIP URI (Uniform Resource Identifier) is sip:joe@acme.com. Fred's MSISDN is +440987654321 , and Fred's SIP URI is sip:fred@acme.com. Thus, both Joe and Fred have multiple IDs and can be reached via multiple channels. Joe and Fred may be reached at additional addresses, such as E.164 numbers, IP addresses, other e-mail addresses, and various other routable messaging addresses.
[0063] Joe wishes to send an SMS message to Fred. Joe's user equipment currently comprises a cellular phone, while Fred's user equipment currently comprises a laptop. Joe, as originator, creates an SMS message, and selects Fred, as recipient, from an address book in Joe's cellular phone. Joe sends the SMS to Fred's MSISDN (+440987654321) via a cellular network. The network bridge looks up an association between Fred and Fred's number (e.g. using Fred's MSISDN). The network bridge, based on presence information which may be associated with Fred such as Fred's user profile, address resolution information or other factors, opens a channel of communication and creates an IM chat session to Fred's IM identity (i.e., SIP URI, sip:fred@acme.com.) Fred receives the chat session invitation on Fred's laptop, and Fred responds according to an appropriate protocol (i.e., accepts the chat session invitation), which appears from Joe's IM identity (i.e., SIP URI, sip:joe@acme.com.) Fred receives a text IM from Joe at sip:joe@acme.com. Thus, the originator, Joe, is able to identify the recipient, Fred, using an address in context to the originating client and not the recipient client. In addition, Joe's identity is presented to Fred in context to the client and application that Fred is currently using.
[0064] Next, Fred wishes to send a file to Joe. Fred, as originator, drags a file comprising a JPEG image and drops it onto his IM chat session window. The image is sent as file transfer via IM chat session with sip:joe@acme.com. The network bridge, based on presence information, Joe's user profile, and address resolution information, or other factors, determines to deliver the image to Joe via MMS. A MMS is created and sent to Joe at +441234567890, and is presented to Joe as if sent from +440987654321. The MMS is received by Joe's cellular phone. Joe's cellular phone maps the originator MSISDN to the phone book entry for Fred. Thus, the originator, Fred, is able to identify the recipient, Joe, using an address in context to the originating client and not the recipient client. In addition, Fred's identity is presented to Joe in context to the client and application that Joe is currently using.
[0065] An ID can change dynamically, and therefore, tracking presence to track the UE may be provided. For example, Fred may move from his desk (where his laptop is) to his cell phone. By doing so, Fred has dynamically changed his presence (by one of many means such as idle timeout or proximity detection, for example). As a result, his default routing changes dynamically, and the system updates and tracks this change to allow the next message to arrive (in context) on Fred's new device (his cell phone).
[0066] Reference is now made to FIGURES 4, 5, and 6, which depict exemplary user interfaces for providing seamless interoperability between an IM-enabled client, e.g., Microsoft® Office Communicator client, and a PoC-enabled client that is able to send and receive multimedia and video. In this example, a user of a mobile phone (Ian Pattison) wishes to deliver MMS, PoC, and video to the IM user (Michael Luna).
[0067] In FIGURE 4, one embodiment of a user interface for an IM client is depicted. In FIGURE 5, the IM user (Michael) receives an invitation to a conversation, delivered as an instant message from sip:ianp@sip. len.tantau.com. To Michael, the format of the identity it appears as though Ian is communicating in an IM context. Michael is given the opportunity to accept or deny the invitation in a format supported by his device (i.e., pressing the Alt+C keys on a keyboard to Accept or Alt+D to Decline.) In this example Michael accepts the invitation and a notification is provided in a format supported by his device (i.e., the text message Υou have accepted the invitation from Ian Pattison to an Unwired Lifestyle™ session.") is presented)
[0068] In FIGURE 6, a video message from Ian is delivered to Michael, with lan's identity appearing as sip:ianp@sip.len.tantau, even though the video image shows Ian communicating via a cellular phone with headset and as such would have addressed Michael via his MSISDN and the MMS infrastructure would have set the originating address to lan's MSISDN.
[0069] In FIGURE 7, Michael wishes to send an image (sunset.jpg) from his computer to the Ian on his cellular phone. Michael drags and drops the image into the IM window. Using the methods and systems of the present invention, the image (sunset.jpg) is formatted and sent to lan's mobile phone and displayed as an MMS message, as depicted in FIGURE 8. Thus, both Ian and Michael are able to send and receive communication from each other, with each person sending and receiving the communication in a format based on the device each is using, and the other person appears as though he is using the same protocol.
[0070] FIGURES 9 and 10 depict flow diagrams for contextual based identity processing. In FIGURE 9, initially a client or application in Domain A sends a communication (e.g. request) to Network A. Network A routes the request to a network bridge in accordance with the present invention, including one or more adapters, a router, a channel selection and routing application, or a contextual identity mapping application. The adapters receive and normalize communications into a network-independent format. One method for normalizing the communications is described in United States Patent 6,173,327 issued to Jeroen De Borst et al, which is incorporated by reference. Once the communication is normalized, a router sends a request for an appropriate channel for the intended recipient to the channel selection and routing application. The channel selection and routing application may use fixed rules, presence information, user profile information, address resolution information, policies (such as matching the content type of the request to one or more content types supported by a channel through which the recipient may be reached), and preferences to select an appropriate channel. The router also sends a request for an appropriate identity to the contextual identity (ID) mapping application. The contextual identity (ID) mapping application may also use presence information, user profile information, address resolution information, policies, and preferences to map the identities for both the sender and the recipient into addresses valid in the recipient's domain (Domain B).
[0071] Once an appropriate channel has been selected and appropriate identities have been mapped, the router sends the communication to a gateway. The gateway generates a domain-specific message (communication) and sends the message to Network B. Network B routes the message to the client/application in a contextual format for the recipient's device. Advantageously, the recipient receives the request in the correct context of the target domain (e.g. Domain B) and therefore can use all normal or desired functions (e.g. reply.)
[0072] Once the message is delivered to the recipient, a protocol level acknowledgement may be part of the domain protocol, and so an acknowledgement communication (ACK message) is sent by the original recipient to the original sender. The acknowledgement is sent to a Network B server, which routes it to the gateway of the present invention. The gateway forwards the acknowledgement message to the router, which matches the acknowledgement message to the original communication. The acknowledgement message is returned through the adapter to the Network A server, which routes it to the original sender.
[0073] Optionally, in one embodiment, the recipient in Network B may send a communication such as a reply or a new message. In FIGURE 10, Client B generates a reply or new message and sends the communication to a server in Network B. Network B routes the communication to an adapter, which may or may not be the same adapter used in the original communication. The communication (reply or new message) is normalized into a network- independent format and sent to a router. The router sends a request for an appropriate channel for the intended recipient to the channel selection and routing application. The channel selection and routing application can select an appropriate channel using any of the methods and processes used to determine the original channel, or may use different processes or methods. The router also sends a request for an appropriate identity to the contextual identity (ID) mapping application. [0074] The contextual identity (ID) mapping application may also use presence information, user profile information, address resolution information, policies, and preferences to map the identities for both the sender and the recipient into addresses valid in the recipient's domain (Domain B). Once an appropriate channel has been selected and appropriate identities have been mapped, the router sends the communication to a gateway. Advantageously, the present invention determines an appropriate channel and identity for each message, which enables users to switch devices without disrupting communication. The gateway generates a domain-specific message (communication) and sends the message to Network A. Network A routes the message to the client/application in a contextual format for the Client A's device. Advantageously, Client A receives the request in the correct context of the target domain (e.g. Domain B) and therefore can use all normal functions (e.g. reply.)
[0075] Once the message is delivered to Client A, a protocol level acknowledgement may be part of the domain protocol, and so an acknowledgement communication (ACK message) is sent by Client A to the original sender. The acknowledgement is sent to a Network A server, which routes it to the gateway of the present invention. The gateway forwards the acknowledgement message to the router, which matches the acknowledgement message to the original communication. The acknowledgement message is returned through the adapter to the Network B server, which routes it to Client B.
[0076] Thus, the above examples illustrate how users may communicate with each other without needing to know about each other's technology requirements. The senders do not need to be aware of which channel the receivers are using. Furthermore, the senders' client devices and the receivers' client devices need not be unaltered. The senders' software and the receivers' software need not be unaltered. The senders and receivers do not need to subscribe to the same type of network or use the same type of service. Messages and data are presented to the sender in the context of the sender's client, while messages and data are presented to the receiver in the context of the receiver's client. The context can be dynamically updated during a communication session based on a change in the sender's client or the receiver's client.
[0077] As a result, users of legacy networks can be seamlessly connected to users of next-generation networks. Hence, barriers to technology are advantageously removed. True roaming and enrichment for IM clients (such as Yahoo, Google Talk, MSN, Office Communicator, AOL's TalkNow, etc.) are enabled. The user experience is improved and the user community is expanded. Features of embodiments of the present invention spur adoption of new technology by extending the reach into legacy networks. Business models for new services can be driven from both the new and existing subscriber base. Usage of services is increased, leading to higher revenues for service providers. It should be understood that the inventive concepts disclosed herein are capable of many other modifications. To the extent such modifications fall within the scope of the appended claims and their equivalents, they are intended to be covered by this patent. It should also be understood that the term "a" as used herein generally means "one or more" and is not intended to be construed in a singular sense. In addition, the operations described in connection with the methods of the present invention need not necessarily be executed in the sequence described, as they may be executed in a different sequence consistent with the principles of the present invention.

Claims

WHAT IS CLAIMED IS:
1. A method for communicating according to contextual identity, the method comprising the acts of: receiving a communication from a user of a first network which communicates according to a first communication protocol; normalizing the communication into a network-independent format; selecting a channel of communication for a recipient user of a second network which communicates according to a second communication protocol; and sending the communication to an identity of the second user via the selected channel of communication, wherein the communication includes an identity of the first user; wherein the first and second user identities are contextual to the channel of communication.
2. The method of claim 1, wherein an identity comprises a routable address, an E.164 number, a phone number, an MSISDN, a SIP URI, an IP address, an e-mail address, or an IM identity.
3. The method of claim 1 , wherein the act of selecting the channel of communication is based on a recipient preference, presence information associated with the recipient, a classification of the sender by the recipient, service provider policy, or an attribute of the request.
4. The method of claim 1 , further comprising the act of selecting a second identity based on dynamic presence information associated with the first or second user.
5. The method of claim 1 , wherein the second network comprises a macro-cellular network or an IP-based network.
6. The method of Claim 1 , further comprising the acts of: routing the normalized communication to an application server operable to generate a response to the communication; and receiving a communication from the application server, wherein the communication received from the application server is sent to the identity of the second user.
7. A method for service delivery according to contextual identity, the method comprising the acts of: receiving a service request from a subscriber of a first network; normalizing the service request into a network-independent format; selecting a channel of communication for a recipient user of a second network; and sending the service request to an identity of the second user via the selected channel of communication, wherein the service request includes an identity of the first user, wherein the identity is contextual to the channel of communication.
8. The method of claim 0, wherein the selected address comprises a routable messaging address, an E.164 number, a phone number, an MSISDN, a SIP URI, an IP address, an email address, or an IM address.
9. The method of claim 0, wherein the act of selecting the channel of communication is based on one or more preferences designated by the recipient.
10. The method of claim 0, wherein the act of selecting the channel of communication is based on presence information associated with the recipient.
11. The method of claim 0, wherein the act of selecting the channel of communication is based on a classification of the user by the recipient.
12. The method of claim 7, wherein the act of selecting the channel of communication is based on service provider policy.
13. The method of claim 0, wherein the act of selecting the channel of communication is based on an attribute of the request.
14. The method of claim 0, further comprising the act of selecting a second address based on dynamic presence information associated with the recipient.
15. The method of claim 0, wherein the service request comprises a push-to-talk service request or an instant messaging service request.
16. The method of claim 0, wherein the response comprises a MMS message.
17. The method of claim 0, wherein the response comprises an SMS message.
18. The method of Claim 7, wherein the response comprises a file transfer.
19. The method of claim 0, wherein one of the first and second networks is an IMS network or macro-cellular network, and wherein the other of the first and second networks is an IP-based network or macro-cellular network.
20. The method of claim 0, further comprising the act of receiving a message from the IMS network.
21. The method of claim 0, further comprising the act of receiving a message from the IP-based network.
22. The method of claim 0, further comprising the act of adapting the message for the IMS network.
23. The method of claim 0, further comprising the act of routing the adapted message to the application server.
24. The method of claim 0, further comprising the act of receiving a second response from the application server.
25. The method of claim 0, further comprising the act of sending the second response to the IMS network.
26. A system for contextual identity management, the system comprising: a network bridge comprising an adapter configured to normalize a request received by the network bridge; a plurality of channels configured for communication with a plurality of networks; a presence interface adapted to communicate with a plurality of presence sources to receive presence information; a user profile interface adapted to communicate with a plurality of user profile sources to receive user profile information; an address resolution interface adapted to communicate with a plurality of address resolution sources to receive address resolution information; a channel selection and routing application configured to select one of the plurality of channels; and a contextual identity mapping application communicably coupled to the presence, user profile, and address resolution interfaces to determine an appropriate identity for one or more users, wherein the network bridge is configured to send the request using a selected channel to an appropriate identity of a user.
27. The system of claim 0, wherein the plurality of presence sources comprises a local database.
28. The system of claim 0, wherein the plurality of presence sources comprises an external database.
29. The system of claim 0, further comprising a billing bridge communicably coupled to the network bridge, wherein the billing bridge is configured to control access to content and services.
30. A machine-readable medium having stored thereon a plurality of executable instructions, the plurality of executable comprising instructions for. receiving a request from a user of a first network which communicates according to a first communication protocol; selecting a channel of communication; selecting an identity, from a plurality of identities, of a recipient user of a second network which communicates according to a second communication protocol; adapting the request for the second communication protocol; routing the adapted request to an application server; receiving a response from the application server; and sending the response to the selected identity via the selected channel of communication.
PCT/US2007/010327 2006-04-29 2007-04-27 Channel selection/translation based on user-preference WO2007130312A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07794405A EP2016714A2 (en) 2006-04-29 2007-04-27 Contextual based identity

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US74603606P 2006-04-29 2006-04-29
US60/746,036 2006-04-29

Publications (3)

Publication Number Publication Date
WO2007130312A2 WO2007130312A2 (en) 2007-11-15
WO2007130312A9 true WO2007130312A9 (en) 2008-07-03
WO2007130312A3 WO2007130312A3 (en) 2009-01-29

Family

ID=38668214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/010327 WO2007130312A2 (en) 2006-04-29 2007-04-27 Channel selection/translation based on user-preference

Country Status (3)

Country Link
US (1) US8078153B2 (en)
EP (1) EP2016714A2 (en)
WO (1) WO2007130312A2 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007096366A (en) * 2005-09-26 2007-04-12 Nec Corp Group session management apparatus and group voice communication system
WO2007127422A2 (en) 2006-04-29 2007-11-08 724 Solutions Software Inc. Platform for interoperability
WO2007130312A2 (en) 2006-04-29 2007-11-15 724 Solutions Software Inc. Channel selection/translation based on user-preference
US8327024B2 (en) 2006-04-29 2012-12-04 724 Solutions Software, Inc. System and method for SMS/IP interoperability
US7778231B2 (en) * 2007-02-21 2010-08-17 At&T Intellectual Property I, L.P. System and method of communication in an IP multimedia subsystem network
IL184305A0 (en) * 2007-06-28 2008-03-20 Oleg Golobrodsky Method, apparatus and system for enabling communications between users
US9276775B2 (en) * 2007-09-05 2016-03-01 Microsoft Patent Licensing, LLC Identity-based interactive response message
US20090161575A1 (en) * 2007-12-19 2009-06-25 Research In Motion Limited Long Term Evolution User Equipment Multi-Packet Data Network Connectivity Control
US20090181702A1 (en) * 2008-01-14 2009-07-16 Microsoft Corporation Multi-mode communication
US9325638B2 (en) 2008-04-30 2016-04-26 International Business Machines Corporation Conversational asyncronous multichannel communication through an inter-modality bridge
US20100124906A1 (en) * 2008-11-14 2010-05-20 Nokia Corporation Method and Apparatus for Transmitting and Receiving Data
US8542674B2 (en) * 2008-12-02 2013-09-24 International Business Machines Corporation System and method to initiate a presence driven peer to peer communications session on non-IMS and IMS networks
US20100250756A1 (en) * 2009-03-31 2010-09-30 Morris Robert P Methods, Systems, And Computer Program Products For Establishing A Shared Browsing Session Between A User Of A Web Browser With A User Of Another Web Browser
CA2760108A1 (en) * 2009-05-13 2010-11-18 Research In Motion Limited System and method for providing and managing a target list on behalf of a user agent client
DE102009050312B4 (en) 2009-10-22 2015-01-22 Airbus Operations Gmbh Digital broadcasting
US8995965B1 (en) * 2010-03-25 2015-03-31 Whatsapp Inc. Synthetic communication network method and system
US9628831B2 (en) 2010-03-25 2017-04-18 Whatsapp, Inc. Multimedia transcoding method and system for mobile devices
US8499048B2 (en) 2010-10-27 2013-07-30 Facebook, Inc. Indexing and organizing messages in a messaging system using social network information
US8706824B2 (en) 2011-08-08 2014-04-22 Facebook, Inc. Rescinding messages in a messaging system with multiple messaging channels
US9203796B2 (en) 2010-11-12 2015-12-01 Facebook, Inc. Messaging system with multiple messaging channels
US8880627B2 (en) 2011-08-08 2014-11-04 Facebook, Inc. Providing transparency in a messaging system with multiple messaging channels
KR101830986B1 (en) * 2011-06-30 2018-04-04 엘지전자 주식회사 Method and apparatus for message delivery
US9258172B2 (en) * 2012-10-24 2016-02-09 Microsoft Technology Licensing, Llc Calling an unready terminal
US9992021B1 (en) 2013-03-14 2018-06-05 GoTenna, Inc. System and method for private and point-to-point communication between computing devices
CN104348697B (en) 2013-07-25 2019-08-13 腾讯科技(深圳)有限公司 The processing method of video communication information, apparatus and system
US10051075B1 (en) * 2015-09-09 2018-08-14 Google Llc Systems and methods for maintaining an asynchronous communication via an intermediary
US10469997B2 (en) 2016-02-26 2019-11-05 Microsoft Technology Licensing, Llc Detecting a wireless signal based on context
US10475144B2 (en) 2016-02-26 2019-11-12 Microsoft Technology Licensing, Llc Presenting context-based guidance using electronic signs
US10452835B2 (en) 2016-06-30 2019-10-22 Microsoft Technology Licensing, Llc User-management of third-party user information

Family Cites Families (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3798817A (en) 1971-08-31 1974-03-26 Franchi Spa Luigi Gun
US4941170A (en) * 1989-03-20 1990-07-10 Tandem Computers Incorporated Facsimile transmissions system
US5826017A (en) 1992-02-10 1998-10-20 Lucent Technologies Apparatus and method for communicating data between elements of a distributed system using a general protocol
US6343313B1 (en) 1996-03-26 2002-01-29 Pixion, Inc. Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability
GB2313524A (en) 1996-05-24 1997-11-26 Ibm Providing communications links in a computer network
US6173327B1 (en) 1996-07-11 2001-01-09 Jeroen De Borst Object-oriented method and apparatus for information delivery
US5991812A (en) 1997-01-24 1999-11-23 Controlnet, Inc. Methods and apparatus for fair queuing over a network
US6085236A (en) 1998-01-06 2000-07-04 Sony Corporation Of Japan Home audio video network with device control modules for incorporating legacy devices
US6640248B1 (en) 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US7185049B1 (en) 1999-02-01 2007-02-27 At&T Corp. Multimedia integration description scheme, method and system for MPEG-7
US6785730B1 (en) 1999-02-16 2004-08-31 Rebecca S. Taylor Generic communications protocol translator
US6199099B1 (en) 1999-03-05 2001-03-06 Ac Properties B.V. System, method and article of manufacture for a mobile communication network utilizing a distributed communication network
US6760580B2 (en) 2000-03-06 2004-07-06 America Online, Incorporated Facilitating instant messaging outside of user-defined buddy group in a wireless and non-wireless environment
US7200634B2 (en) 2000-05-10 2007-04-03 Chikka Pte Ltd. Instant messaging account system
CN100499872C (en) 2000-06-02 2009-06-10 雷迪塞斯公司 Voice-over IP communication without echo cancellation
US6823373B1 (en) 2000-08-11 2004-11-23 Informatica Corporation System and method for coupling remote data stores and mobile devices via an internet based server
US6757365B1 (en) 2000-10-16 2004-06-29 Tellme Networks, Inc. Instant messaging via telephone interfaces
US20020065935A1 (en) 2000-10-18 2002-05-30 Koperda Frank R. Method and system for a modular residential gateway
US6922389B1 (en) * 2000-11-15 2005-07-26 Qualcomm, Incorporated Method and apparatus for reducing transmission power in a high data rate system
US20020122547A1 (en) * 2000-12-21 2002-09-05 Hinchey Allan J. Method and apparatus for telephony route selection
US6912389B2 (en) 2001-01-12 2005-06-28 Lucent Technologies Inc. Interworking and interoperability of GPRS systems with systems of other technology families
TW582022B (en) 2001-03-14 2004-04-01 Ibm A method and system for the automatic detection of similar or identical segments in audio recordings
US7512407B2 (en) 2001-03-26 2009-03-31 Tencent (Bvi) Limited Instant messaging system and method
US20030028386A1 (en) 2001-04-02 2003-02-06 Zinser Richard L. Compressed domain universal transcoder
US7215643B2 (en) * 2003-07-29 2007-05-08 Level 3 Communications, Llc System and method for providing alternate routing in a network
US6792431B2 (en) 2001-05-07 2004-09-14 Anadarko Petroleum Corporation Method, system, and product for data integration through a dynamic common model
US7295579B2 (en) 2001-06-05 2007-11-13 Tekelec Methods and systems for communicating signaling information using a normalized signaling protocol
WO2003001770A2 (en) 2001-06-22 2003-01-03 Emblaze Systems, Ltd. Mms system and method with protocol conversion suitable for mobile/portable handset display
US20030016639A1 (en) * 2001-07-19 2003-01-23 Ericsson Inc. Telecommunications system and method for delivery of short message service messages to a mobile terminal in data mode
AU2002334720B8 (en) 2001-09-26 2006-08-10 Interact Devices, Inc. System and method for communicating media signals
US6865384B2 (en) 2001-11-02 2005-03-08 Motorola, Inc. Method and communication network for routing a real-time communication message based on a subscriber profile
US20070016390A1 (en) 2002-03-06 2007-01-18 Bernardo Diego D Systems and methods for reverse engineering models of biological networks
US7266611B2 (en) 2002-03-12 2007-09-04 Dilithium Networks Pty Limited Method and system for improved transcoding of information through a telecommunication network
US7016978B2 (en) 2002-04-29 2006-03-21 Bellsouth Intellectual Property Corporation Instant messaging architecture and system for interoperability and presence management
US6957077B2 (en) 2002-05-06 2005-10-18 Microsoft Corporation System and method for enabling instant messaging on a mobile device
US20030224814A1 (en) 2002-05-29 2003-12-04 Hai Qu Method and apparatus for sending a message from a wireless device
US7280559B2 (en) 2002-08-16 2007-10-09 Mitsubishi Electric Research Laboratories, Inc. Distributed application layer protocol converter for communications network
US7428580B2 (en) 2003-11-26 2008-09-23 Aol Llc Electronic message forwarding
US7043264B2 (en) * 2002-12-18 2006-05-09 America Online, Inc. Message transmission system in a GPRS environment
US7154901B2 (en) * 2003-02-07 2006-12-26 Mobile 365, Inc. Intermediary network system and method for facilitating message exchange between wireless networks
US7650415B1 (en) 2003-03-10 2010-01-19 Network Equipment Technologies, Inc. Gateway for conversion of messages between multiple protocols using separate sessions
US7171190B2 (en) * 2003-06-25 2007-01-30 Oracle International Corporation Intelligent messaging
US7461126B2 (en) 2003-10-30 2008-12-02 Radvision Ltd. System and method for distributed multipoint conferencing with automatic endpoint address detection and dynamic endpoint-server allocation
US7181538B2 (en) 2003-11-14 2007-02-20 Sybase 365, Inc. System and method for providing configurable, dynamic multimedia message service pre-transcoding
US8886824B2 (en) 2004-01-26 2014-11-11 Core Wireless Licensing, S.a.r.l. Media adaptation determination for wireless terminals
US8285403B2 (en) 2004-03-04 2012-10-09 Sony Corporation Mobile transcoding architecture
US8161117B2 (en) 2004-09-03 2012-04-17 Oracle International Corporation Multi-media messaging
US8150437B2 (en) * 2004-09-09 2012-04-03 Nextel Communications Company L.P. Architecture to facilitate the monetization of disparate, inter-worked pushed to talk technologies
US7509431B2 (en) 2004-11-17 2009-03-24 Cisco Technology, Inc. Performing message and transformation adapter functions in a network element on behalf of an application
WO2006066632A1 (en) 2004-12-24 2006-06-29 Telecom Italia S.P.A. Media transcoding in multimedia delivery services
WO2007130312A2 (en) 2006-04-29 2007-11-15 724 Solutions Software Inc. Channel selection/translation based on user-preference
WO2007127422A2 (en) 2006-04-29 2007-11-08 724 Solutions Software Inc. Platform for interoperability
US8327024B2 (en) 2006-04-29 2012-12-04 724 Solutions Software, Inc. System and method for SMS/IP interoperability

Also Published As

Publication number Publication date
WO2007130312A2 (en) 2007-11-15
US20080182548A1 (en) 2008-07-31
US8078153B2 (en) 2011-12-13
WO2007130312A3 (en) 2009-01-29
EP2016714A2 (en) 2009-01-21

Similar Documents

Publication Publication Date Title
US8078153B2 (en) System and method for dynamic provisioning of contextual-based identities
US8327024B2 (en) System and method for SMS/IP interoperability
US7805532B2 (en) Platform for interoperability
US9800528B2 (en) Real-time messaging method and apparatus
US8849927B2 (en) Method for implementing real-time voice messaging on a server node
US8688789B2 (en) Progressive messaging apparatus and method capable of supporting near real-time communication
US8825772B2 (en) System and method for operating a server for real-time communication of time-based media
US8645477B2 (en) Progressive messaging apparatus and method capable of supporting near real-time communication
US20050267969A1 (en) Providing information on a resource in a communication system
JP5650748B2 (en) Method for providing interworking service between Converged IP Messaging (CPM) and Short Message Service (SMS) and Internet Protocol Short Message Gateway (IP-SM-GW)
EP2220842B1 (en) Ip-based interworking methods and apparatus for voice and data communications
US9900353B2 (en) Method and apparatus for enabling communications between users
US20090163201A1 (en) Presence-based call switching
KR100369982B1 (en) System for Internet phone service
EP2301225B1 (en) Methods, telecommunications node, and user equipment for transmission of user identifier
CA2746734C (en) Email client capable of supporting near real-time communication and methods for using the addressing, protocols and the infrastructure of email to support near real-time communication
US9641646B1 (en) Distributed multimedia system for IP networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07794405

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007794405

Country of ref document: EP