The subject matter described herein generally relates to the allocation of voice resources in mobile networks. More specifically, the subject matter relates to methods, systems, and computer readable media for controlling access to voice resources in mobile networks using mobility management signaling messages.
A conventional mobile network may be composed of a voice network component and a signaling network component. The voice component may include one or more trunk lines divided into several bearer channels capable of transmitting voice data (i.e. calls) for a relatively small number of subscribers. For example, a single voice trunk may be only capable of carrying 32 channels simultaneously. As used herein, the term “voice resources” refers to the resources in the network that carry voice data.
In contrast, the signaling component of a mobile network may be capable of serving a relatively large number of subscribers. For example, a single signaling communications link may be capable of serving up to 50,000 subscribers, including call setup, call teardown, and other call maintenance modules. Additionally, the signaling network may be utilized for performing modules other than call setup and teardown, such as the delivery of simple message service (SMS) messages, multimedia message service (MMS) messages, or providing number portability (NP) functionality. The signaling network may also include one or more signaling nodes for managing the allocation of voice resources for mobile users. Therefore, voice resources are typically scarce in comparison to signaling resources in mobile communications networks.
During conventional operation, registration in a mobile network is open to any mobile user. For example, when a mobile user activates his or her mobile handset, the handset may automatically register with the mobile network in order to provide availability and location information to the mobile network. Upon registration, mobile users may place calls on a first-come, first-served basis. For example, a calling party may initiate a call to a called party by dialing a subscriber identifier associated with the called party into his or her handset. One or more signaling messages may then be exchanged between signaling nodes in order to setup the call which may include allocating voice resources. After voice resources are allocated, the call may be maintained until one of the parties initiates call teardown. For example, call teardown may be initiated when a party sends a signal from his or her handset (i.e. hangs up) and signaling messages may again be exchanged between signaling nodes so that voice resources may be released for use in another call.
An important assumption of conventional mobile network operation is that only a small percentage of registered users place calls simultaneously. Therefore, a larger number of users may be registered in the signaling component of the network than the voice component is capable of processing. For example, one million subscribers may be registered in a mobile network serving Raleigh, N.C. However, only one thousand calls may need to be connected and maintained simultaneously at any given time. Therefore, an implicit assumption of the mobile network is that no more than one percent of registered users will require access to voice resources at a given time.
One problem associated with conventional mobile networks is that high priority users may not have access to voice resources during an emergency or other high traffic event. For example, during an emergency (i.e., earthquake, tsunami, terrorist attack, etc.), a dramatic increase in the number of users placing mobile calls occurs. Some users may attempt to call loved ones, other users may be attempting to coordinate emergency services, while yet other users may be unaware of the emergency and be placing non-essential calls. During this time period, the number of call setup requests increases beyond the voice capacity of the voice network to handle it. As a result, users may be denied access to voice resources (i.e., placing mobile calls) on a first-come, first-served basis. Therefore, it is appreciated that during an emergency, the assumption that a small percentage of registered users desire to place calls simultaneously becomes invalid.
Because calls may be processed on a first-come, first-served basis, first responders or other high priority users may be prevented from placing mobile calls during an emergency resulting in an inefficient allocation of voice resources. A first come, first served system for allocating voice resources may harm emergency efforts by inhibiting communications between users such as policemen, firemen, and government officials. This problem may acutely impact areas in which there are no voice resources dedicated for emergency purposes. In such areas, first responders or other high priority users typically rely on mobile networks to provide high priority communications during an emergency, yet may be unable to do so due to overwhelmed conventional voice components of mobile networks.
Accordingly, in light of these difficulties, a need exists for improved methods and systems for controlling access to mobile voice resources during an emergency or other high traffic event.
Methods, systems, and computer readable media for controlling access to voice resources using mobility management messages are disclosed. According to one method, a mobility management message associated with a mobile subscriber is received. A priority level of the mobile subscriber is determined based on the mobility management message and access to voice resources in controlled based on the priority level.
A system for controlling access to voice resources using mobility management messages is also disclosed. The system includes a subscriber access database for associating mobility management information and a priority level, wherein the mobility management information and the priority level are associated with a mobile subscriber. A subscriber access module is configured to receive a mobility management message including the mobility management information and determine the priority level of the mobile subscriber based on the mobility management information. The subscriber access module is also configured to control access to voice resources based on the priority level.
The subject matter described herein for controlling access to voice resources using mobility management messages may be implemented using a computer readable medium having stored thereon computer executable instructions that when executed by a computer processor of a computer perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein includes disk memory devices, programmable logic devices, and application specific integrated circuits. In one implementation, the computer readable medium may include a memory accessible by a processor. The memory may include instructions executable by the processor for implementing any of the methods for routing a call described herein. In addition, a computer readable medium that implements the subject matter described herein may be distributed across multiple physical devices and/or computing platforms.
The subject matter described herein will now be explained with reference to the accompanying drawings of which:
In
Subscriber access module 120 may receive a mobility management message including a subscriber identifier, determine a priority level of the user based on the mobility management message, and limit access to voice resources based on the priority level. For example, subscriber access module may intercept MAP update location message 124 which is directed to HLR 121 and extract one or more parameters. In this case, MAP update location message 124 includes IMSI associated with user A 108, therefore subscriber access module 120 may extract and use IMSI A to query subscriber access database 122. As described above, subscriber access database 122 may associate mobility management information with one or more priority levels for a mobile subscriber. Therefore, the result of the query performed by subscriber access module based on IMSI A may include a priority level associated with user A 108. Subscriber access module 120 may use the determined priority level to control access to voice resources for user 108. For example, as shown in
Subscriber access database 122 may include one or more subscriber identifiers and priority level associated with a mobile subscriber. For example, in one embodiment, subscriber access database 122 may include calling party number (CgPN) 9195550000 associated with priority level 5, where priority level may range from 1-7, 1 being the lowest priority level and 7 being the highest priority level. It is appreciated that a variety of subscriber identifiers and mobility management information may be associated with a priority level for controlling access to voice resources. Mobility management information may include, but is not limited to, a directory number (DN), an international mobile equipment identifier (IMEI), an international mobile subscriber identifier (IMSI), a mobile subscriber integrated services digital network number (MSISDN), and a uniform resource indicator (URI).
As described above, one problem associated with conventional mobile networks is that during an emergency, or other high traffic event, first responders or other high priority users may not have access to voice resources. For example, during an emergency, such as an earthquake (tsunami, terrorist attack etc.), a dramatic increase in the number of users placing mobile calls occurs. Some users may be attempting to locate loved ones, other users may be attempting to coordinate emergency services, while other users may be unaware of the emergency and placing non-essential calls. The assumption that a small percentage of registered users desire to place calls simultaneously becomes invalid during the emergency. The number of call setup requests increases beyond the capacity of the voice network to handle it. As a result, users may be prevented from placing mobile calls on a first-come, first-served basis.
Calling party 108 may be a first responder or other government official, such as a firefighter, policeman, aid worker, or mayor. Each of these examples may be allowed to place calls during an emergency. Other users not associated with providing emergency services may be given a lower priority level and therefore may be preventing from registering in the network and tying up valuable voice resources.
It is appreciated that the subject matter described herein may be applied more broadly than just during emergencies. For example, a priority level may be assigned to users based on usage, price, etc. in addition to an emergency priority. Therefore, voice resources may be optimally used at all times to satisfy the highest priority level customers. In one such embodiment, basic plan customers may be assigned priority level 3 and premium plan subscribers may be assigned priority level 6. During off-peak hours, the priority level threshold may be set at 2 by a mobile system administrator. Accordingly, because both priority level 3 and priority level 6 customers meet the threshold, both users may register and use network 100 on a first come, first served basis. However, during peak hours, the priority level may be increased to level 5, thereby preventing basic plan subscribers from registering in network 100, while maintaining access to voice resources for premium plan subscribers.
In addition to network 100 illustrated in
For example, subscriber access module may intercept MAP SEND_AUTHENTICATION_INFO message 202 which is directed to HLR 121 and extract one or more parameters. In this case, MAP SEND_AUTHENTICATION_INFO message 202 includes IMSI A associated with user A 108, therefore subscriber access module 120 may extract and use IMSI A to query subscriber access database 122. As described above, subscriber access database 122 may associate mobility management information with one or more priority levels for a mobile subscriber. Therefore, the result of the query performed by subscriber access module 120 based on IMSI A may include a priority level associated with user A 108. Subscriber access module 120 may use the determined priority level to control access to voice resources for user 108. For example, as shown in
In network 100, equipment identity register (EIR) 304 may be connected to MSC 110 via STP/SG 112 and may include one or more IMEI numbers. When user 108 connects to MSC 110, a MAP CHECK_IMEI message may be generated by MSC 110 in order to determine whether the subscriber's handset has been stolen. All mobile handsets may be associated with a unique international mobile equipment identity (IMEI) number so that in the event that an unauthorized user steals another user's handset and attempts to place a call using a different SIM card, the theft may be detected and the call may be prohibited. In order to provide this feature, network 100 may include EIR 304 containing one or more IMEI numbers for responding to CHECK_IMEI queries. IMEI numbers stored in EIR 304 may, for example, comprise either a blacklist or a whitelist, where a blacklist indicates IMEI numbers that should be prevented from registering in network 100 and a whitelist indicates IMEI numbers that should be allowed to register in network 100. Thus, a CHECK_IMEI query message may be used to determine whether a particular handset connected to MSC 110 is authorized. If the IMEI numbers included in EIR 304 are associated with a blacklist, a lookup performed by EIR 304 locating a matching entry indicates that the IMEI is not authorized. In response to determining that the IMEI number is not authorized, EIR 304 may generate a CHECK_IMEI_ACK message 302 including a user error, such as “equipment unknown” and send the message to the query originator (i.e., MSC 110).
In contrast to conventional methods, the embodiment shown in
In one embodiment, subscriber access module 120 may send CANCEL_LOCATION messages for subscribers associated with a non-emergency or low-priority class of service. For example, subscriber access module may compare one or more identifiers located in subscriber access database 122 to identifiers located in current registration information database 200. CANCEL_LOCATION messages may be generated for users indicated by database 200 as currently registered in network 100 yet having a priority level below a predetermined threshold as indicated by database 122 and sent to one or more MSCs 110 and 114. In response to receiving CANCEL_LOCATION message 400, MSC 110 may terminate an active call associated with user 108.
The effect of broadcasting CANCEL_LOCATION messages associated with one or more subscribers is to de-register the subscribers from network 100 and force them to re-register. Other methods as described herein may then be used in combination with de-registration to prevent re-registration of users based on their priority level.
The effect of generating and sending one or more MAP PURGE_LOCATION messages to HLR 121 associated with non-emergency or other low-priority subscribers includes removing routing information associated with low-priority subscribers from HLR 121. Subsequent routing information requests directed to HLR 121 for these subscribers will return a routing information response message indicating that the subscriber is not reachable in network 100. Call termination may thereby be prevented for non-emergency subscribers in a transparent manner by “tricking” the HLR into thinking that non-emergency subscribers as defined by subscriber access module 120 and subscriber access database 122 are not reachable.
One advantage of sending a MAP PURGE_MS message to HLR 121 is that redundant maintenance of last known MSC ID information for subscribers is avoided. Because a primary module of HLR 121 is to maintain last known MSC ID information, subscriber access module 120 may utilize the information by triggering HLR 121 to generate an appropriate de-registration mobility management message in response to receiving MAP PURGE_MS message 500.
Previously, SRI messages were used for providing routing information for mobile subscribers, whose location was independent of their identity. Consequently, SRI messages were not needed for landline-terminated calls, whose location was readily identifiable based on the called party identifier. However, telecommunications providers were required to provide number portability (NP) services for landline subscribers, so that their location may be independent of their subscriber identity. As a result, SRI queries and other NP lockups may be performed for both mobile-terminated and landline-terminate calls.
In one embodiment, subscriber access module 120 may intercept a SIP REGISTER 806 message or another SIP mobility management message associated with subscriber 108. Subscriber access module 120 may be configured to respond on behalf of the intended SIP destination by sending a negative acknowledgment message for subscribers having a low priority level. By generating a negative acknowledgment message, access to voice resources may be controlled by blocking and/or denying registration requests for low-priority SIP users.
For example, SIP user 108 may attempt to register in SIP network 800 by sending SIP REGISTER message 806 including a uniform resource indicator (URI) A associated with user 108. Register message 806 may be received by WiFi/WiMAX access point/router 802 and routed to SIP registrar node 804. However, subscriber access module 120 may intercept REGISTER message 806 and extract the URI associated with user 108, such as a URI. The subscriber identifier may be used to search subscriber access database 122 for determining a priority level associated with subscriber 108. By comparing the determined priority level to a priority level threshold set by a system administrator, subscriber access module 120 may limit access to voice resources for subscriber 108. Limiting access to voice resources may include, for example, generating a negative acknowledgment message such as SIP 403 Forbidden message 808, and sending the message to the query originator. It is appreciated, however, that other negative acknowledgment messages may be used without departing from the scope of the subject matter described herein.
In block 902, a priority level of the mobile subscriber is determined based on the mobility management message. For example, a lookup may be performed in subscriber access database 122 using mobility management information extracted from a mobility management message received by subscriber access module 120. For example, basic plan customers may be assigned priority level 3 and premium plan subscribers may be assigned priority level 6. For example, priority level 3 users may include blackberry devices for individual users and priority level 6 users may include cellular phones for the doctors in a hospital. During low-traffic times, the priority level may be set at 2 by the administrator of subscriber access module 120 indicating that all users may register in network 100 and place calls. During high-traffic times, the administrator may set the priority level at level 5, thereby preventing priority level 2 users from registering, while allowing access to voice resources for priority level 6 users.
In block 904, access to voice resources is limited based on the priority level. For example, if a priority level associated with a subscriber is below a predetermined threshold, subscriber access module 120 may prevent registration of the user in the network, de-register the user, or prevent termination of calls for a registered user. Subscriber access module 120 may implement these modules by, for example, discarding a mobility management message, purging data from an HLR, generating a CANCEL_LOCATION message, or generating a negative acknowledgment message containing an error code.
Additionally, access to voice resources may be limited differently depending on whether the subscriber is a calling party or a called party. For example, a first entry in subscriber access database 122 may associate a high priority level for user 108 if he or she is a called party and may associated a low priority level for user 108 when he or she is a calling party based on CgPN/CdPN information extracted from a mobility management message. This allows a system administrator to prioritize voice resources such that user 108 may, for example, receive calls during an emergency, but may not place calls.
In another embodiment, access to voice resources may be limited differently depending on the identity of the MSC serving the subscriber. For example, calling party 108 may attempt to register in network 100 by connecting to a BTS 104 located in BSS 102 and sending a mobility management message to MSC 110. Based on a lookup performed by subscriber access module 120 of subscriber access database 122, it may be determined that the priority level associated with subscriber 108 and MSC 110 is below the current threshold set by the administrator. However, subscriber 108 may move to an area served by BSS 118 and attempt to re-register in network 100. Similarly, a mobility management message may be sent from MSC 114 and intercepted by subscriber access module 120. A lookup may be performed in subscriber access database 122 based on the combination of user 108 and MSC 114. Because this combination may be associated with a different priority level, user 108 may be allowed to register in network 100 and access voice resources (i.e., make or receive a call). For example, user 108, when connected to MSC 114, may be assigned a priority level above the current threshold set by the administrator.
One advantage of controlling access to voice resources using a variety of mobility management information included in different typed of mobility management messages is that access to voice resources may be customized with greater granularity than otherwise possible if the determination were based solely on an identifier associated with user 108. Thus, in the event that the availability of voice resources is strained, even to high priority users, a system administrator may further control access to voice resources in order to ensure that the most immediate communications needs are met. For example, during a fire emergency, BSS 102 may serve firefighters at the scene of the fire and BSS 118 may serve government officials at city hall. While both of these groups of users may be categorized identically, there may be only enough voice resources in network 100 to serve one group. By using an MSCID in addition to a subscriber identifier, a system administrator may reserve voice resources first for the firefighters served by MSC 110 and second for the government officials served by MSC 114.
When a mobility management signaling message, such as an SRI query, is received by STP/SG 114, the message may be processed by LIM 1010, DCM 1006, or HSL 1008 depending on whether the message is sent over an SS7 link, an IP signaling link, or a high speed link. The message is passed up the communications protocol stack (e.g., MTP level 1&2 processing module 1012, discrimination module 1014, etc.) on the receiving communication module until it reaches the module's respective message distribution module 1018, which forwards the message to DSM 1022. In one embodiment, at least one DSM module 1022 in STP/SG 112 is equipped with a subscriber access module 120 and subscriber access database 122. That is, in one implementation, messages received by LIM 1010 or 1020, DCM 1006, or HSL 1008 may be processed at mobility module 116 and identified as candidates for subscriber access processing. For example, subscriber access module 120 may query subscriber access database 122 in the manner described above to determine whether the subscriber should be prevented from accessing voice resources.
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the subject matter described herein is defined by the claims as set forth hereinafter.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/025,563 filed Feb. 1, 2008; the disclosure of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5809239 | Dan et al. | Sep 1998 | A |
5822534 | Yamunachari et al. | Oct 1998 | A |
5835720 | Nelson et al. | Nov 1998 | A |
5878115 | Valentine et al. | Mar 1999 | A |
5926463 | Ahearn et al. | Jul 1999 | A |
6023725 | Ozawa et al. | Feb 2000 | A |
6046981 | Ramamurthy et al. | Apr 2000 | A |
6067457 | Erickson et al. | May 2000 | A |
6076108 | Courts et al. | Jun 2000 | A |
6128644 | Nozaki | Oct 2000 | A |
6130898 | Kostreski et al. | Oct 2000 | A |
6167445 | Gai et al. | Dec 2000 | A |
6201790 | Teboul | Mar 2001 | B1 |
6324184 | Hou et al. | Nov 2001 | B1 |
6366577 | Donovan | Apr 2002 | B1 |
6385454 | Bahl et al. | May 2002 | B1 |
6463454 | Lumelsky et al. | Oct 2002 | B1 |
6466980 | Lumelsky et al. | Oct 2002 | B1 |
6490727 | Nazarathy et al. | Dec 2002 | B1 |
6571288 | Sarukkai | May 2003 | B1 |
6578076 | Putzolu | Jun 2003 | B1 |
6594826 | Rao et al. | Jul 2003 | B1 |
6597920 | Yegani et al. | Jul 2003 | B2 |
6680922 | Jorgensen | Jan 2004 | B1 |
6708209 | Ebata et al. | Mar 2004 | B1 |
6728887 | Dziekan et al. | Apr 2004 | B1 |
6731932 | Rune et al. | May 2004 | B1 |
6738390 | Xu et al. | May 2004 | B1 |
6745043 | Lester et al. | Jun 2004 | B1 |
6771595 | Gilbert et al. | Aug 2004 | B1 |
6771639 | Holden | Aug 2004 | B1 |
6798757 | Mizutani | Sep 2004 | B2 |
6804717 | Bakshi et al. | Oct 2004 | B1 |
6898641 | Kobayashi | May 2005 | B1 |
6930984 | Nomura et al. | Aug 2005 | B1 |
6947378 | Wu et al. | Sep 2005 | B2 |
6973488 | Yavatkar et al. | Dec 2005 | B1 |
6975594 | Byers | Dec 2005 | B1 |
6988148 | Sheth | Jan 2006 | B1 |
7024199 | Massie et al. | Apr 2006 | B1 |
7027391 | Sahinoglu et al. | Apr 2006 | B2 |
7113502 | Oz et al. | Sep 2006 | B2 |
7126920 | Venkatesulu et al. | Oct 2006 | B2 |
7139813 | Wallenius | Nov 2006 | B1 |
7143433 | Duan et al. | Nov 2006 | B1 |
7168086 | Carpenter et al. | Jan 2007 | B1 |
7174375 | King et al. | Feb 2007 | B2 |
7236791 | Chambers et al. | Jun 2007 | B2 |
7274662 | Kalmanek, Jr. et al. | Sep 2007 | B1 |
7319691 | Qing et al. | Jan 2008 | B2 |
7330710 | Xu et al. | Feb 2008 | B1 |
7430187 | Holt et al. | Sep 2008 | B2 |
7451475 | Oz et al. | Nov 2008 | B1 |
7535888 | Carlucci et al. | May 2009 | B1 |
7738440 | Riley et al. | Jun 2010 | B2 |
7805515 | Riley | Sep 2010 | B2 |
7904541 | Swildens et al. | Mar 2011 | B2 |
8595787 | Riley et al. | Nov 2013 | B2 |
8619630 | Riley et al. | Dec 2013 | B2 |
8750279 | Riley et al. | Jun 2014 | B2 |
20010042097 | Lapine | Nov 2001 | A1 |
20010055305 | Oz et al. | Dec 2001 | A1 |
20020010938 | Zhang et al. | Jan 2002 | A1 |
20020029274 | Allen | Mar 2002 | A1 |
20020032794 | Nishida et al. | Mar 2002 | A1 |
20020036983 | Widegren et al. | Mar 2002 | A1 |
20020042924 | Adams | Apr 2002 | A1 |
20020059274 | Hartsell | May 2002 | A1 |
20020059638 | Oz et al. | May 2002 | A1 |
20020087995 | Pedlow, Jr. | Jul 2002 | A1 |
20020122422 | Kenney et al. | Sep 2002 | A1 |
20020126633 | Mizutani et al. | Sep 2002 | A1 |
20020126699 | Cloonan | Sep 2002 | A1 |
20020150044 | Wu et al. | Oct 2002 | A1 |
20020151312 | Rosemarijn Bos et al. | Oct 2002 | A1 |
20020169794 | Jones | Nov 2002 | A1 |
20030055971 | Menon | Mar 2003 | A1 |
20030069954 | Ma | Apr 2003 | A1 |
20030069972 | Yoshimura et al. | Apr 2003 | A1 |
20030086425 | Bearden et al. | May 2003 | A1 |
20030204856 | Buxton | Oct 2003 | A1 |
20030208609 | Brusca | Nov 2003 | A1 |
20030217368 | Ramaswamy | Nov 2003 | A1 |
20030229692 | Vo | Dec 2003 | A1 |
20040015986 | Carver et al. | Jan 2004 | A1 |
20040039803 | Law | Feb 2004 | A1 |
20040044762 | Peacock | Mar 2004 | A1 |
20040083267 | Thompson | Apr 2004 | A1 |
20040088730 | Gopalan et al. | May 2004 | A1 |
20040125779 | Kelton et al. | Jul 2004 | A1 |
20040213166 | Rambaldi | Oct 2004 | A1 |
20040225687 | Larsson et al. | Nov 2004 | A1 |
20050039213 | Matarese et al. | Feb 2005 | A1 |
20050053085 | Doh et al. | Mar 2005 | A1 |
20050073997 | Riley et al. | Apr 2005 | A1 |
20050076336 | Cutrell et al. | Apr 2005 | A1 |
20050091505 | Riley et al. | Apr 2005 | A1 |
20050120128 | Willes et al. | Jun 2005 | A1 |
20050125832 | Jost et al. | Jun 2005 | A1 |
20050149940 | Calinescu et al. | Jul 2005 | A1 |
20050163060 | Riley et al. | Jul 2005 | A1 |
20050188415 | Riley | Aug 2005 | A1 |
20050228892 | Riley et al. | Oct 2005 | A1 |
20050289619 | Melby | Dec 2005 | A1 |
20060038877 | Richardson et al. | Feb 2006 | A1 |
20060068762 | Baldwin et al. | Mar 2006 | A1 |
20070043558 | Schwarz et al. | Feb 2007 | A1 |
20070047478 | Balachandran et al. | Mar 2007 | A1 |
20070149203 | Sliva | Jun 2007 | A1 |
20080125152 | Hou | May 2008 | A1 |
20080151881 | Liu et al. | Jun 2008 | A1 |
20100306369 | Riley | Dec 2010 | A1 |
20100316064 | Riley et al. | Dec 2010 | A1 |
Number | Date | Country |
---|---|---|
2004247256 | Nov 2010 | AU |
2005208846 | Feb 2011 | AU |
2005208847 | Mar 2011 | AU |
2 276 526 | Jul 1998 | CA |
2 528 871 | Jan 2014 | CA |
2 528 648 | Apr 2014 | CA |
1 631 917 | Dec 2010 | EP |
4582346 | Sep 2010 | JP |
10-2001-0027383 | Apr 2001 | KR |
WO 0011879 | Mar 2000 | WO |
WO 0079794 | Dec 2000 | WO |
WO 03009629 | Jan 2003 | WO |
WO 03014958 | Feb 2003 | WO |
WO 03042856 | May 2003 | WO |
WO 03052993 | Jun 2003 | WO |
WO 2005033899 | Apr 2005 | WO |
WO 2005072320 | Aug 2005 | WO |
WO 2005072321 | Aug 2005 | WO |
Entry |
---|
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration of International Application No. PCT/US2009/032746 (Aug. 26, 2009). |
Non-Final Official Action for U.S. Appl. No. 12/646,542 (Mar. 24, 2011). |
Official Action for U.S. Appl. No. 10/867,159 (Mar. 21, 2011). |
Certificate of Patent for Japanese Patent Application No. 2006-551387 (Dec. 24, 2010). |
Official Action for Japanese Application No. 2006-551384 (Dec. 20, 2010). |
Notice of Acceptance for Australian Patent Application No. 2005208847 (Nov. 22, 2010). |
Allowance Notice for Japanese Patent Application No. 2006-551387 (Nov. 16, 2010). |
Notice of Acceptance for Australian Patent Application No. 2005208846 (Oct. 27, 2010). |
Examiner's Report for Australian Patent Application No. 2005208847 (Oct. 14, 2010). |
Communication of European publication number and information on the application of Article 67(3) EPC for European application No. 09709156.5 (Oct. 13, 2010). |
Supplementary European Search Report for European Application No. 05706071.7 (Sep. 8, 2010). |
Notice of Allowance for JP 2006-533793 (Jul. 20, 2010). |
Official Action for U.S. Appl. No. 10/867,159 (Jul. 19, 2010). |
Examiner's Answer for U.S. Appl. No. 10/867,157 (Jul. 8, 2010). |
Official Action for Japanese Patent Application No. 2006-551387 (Jul. 6, 2010). |
Communication under Rule 71(3)EPC for European Application No. 04755299.7 (Jun. 21, 2010). |
Supplemental Notice of Allowability for U.S. Appl. No. 11/041,918 (Jun. 10, 2010). |
Communication pursuant to Article 94(3) EPC for European application No. 04755130.4 (Apr. 27, 2010). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 11/041,918 (Apr. 21, 2010). |
Official Action for Japanese Patent Application No. 2006-551387 (Mar. 15, 2010). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 10/867,158 (Jan. 15, 2010). |
Notice of Panel Decision from Pre-Appeal Brief Review for U.S. Appl. No. 10/867,157 (Dec. 18, 2009). |
Advisory Action for U.S. Appl. No. 10/867,157 (Sep. 23, 2009). |
Japanese Official Action issued for 2006-533793, 1 page (Sep. 15, 2009). |
Non-Final Official Action for U.S. Appl. No. 11/041,918 (Aug. 25, 2009). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 10/867,158 (Aug. 5, 2009). |
Final Official Action for U.S. Appl. No. 11/041,779 (Jun. 24, 2009). |
European Search Report issued for European Application No. 05797862 (Jun. 3, 2009). |
Final Official Action for U.S. Appl. No. 10/867,157 (Apr. 17, 2009). |
Examiner's Report for Australian Patent Application No. 2005208847 (Feb. 27, 2009). |
Examiner's First Report for Australian Patent Application No. 2005208846 (Jan. 15, 2009). |
Final Official Action for U.S. Appl. No. 11/041,918 (Dec. 22, 2008). |
Australian Examiner's Report issued for Application No. 2004247256 (Nov. 18, 2008). |
Advisory Action for U.S. Appl. No. 10/867,159 (Oct. 22, 2008). |
Official Action for U.S. Appl. No. 10/867,158 (Oct. 17, 2008). |
Supplementary European Search Report for European Application No. EP05706073.3 (Oct. 6, 2008). |
Official Action for U.S. Appl. No. 10/867,157 (Sep. 26, 2008). |
Non-Final Official Action for U.S. Appl. No. 11/041,779 (Aug. 21, 2008). |
Final Official Action for U.S. Appl. No. 10/867,159 (May 16, 2008). |
Non-Final Official Action for U.S. Appl. No. 11/041,918 (May 6, 2008). |
Final Official Action for U.S. Appl. No. 10/867,157 (Mar. 24, 2008). |
Official Action for U.S. Appl. No. 10/867,159 (Oct. 4, 2007). |
Official Action for U.S. Appl. No. 10/867,157 (Sep. 20, 2007). |
European Patent Office, Supplementary European Search Report for European Patent Application No. 04755130.4 (Sep. 4, 2007). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration for International Application No. PCT/US05/02260 (Apr. 26, 2007). |
European Search Report for European Application No. 04755299.7 (Mar. 23, 2007). |
Notification of European publication number and information on the application of Article 67(3) EPC for European Application No. 05706073.3 (Nov. 15, 2006). |
Notification of Transmittal of the International Search Report and the Written Opinion of the International Search Authority, or the Declaration for International Application No. PCT/US05/02264 (Sep. 7, 2006). |
Notification of European publication number and information on the application of Article 67(3) EPC for European Application No. 05706071.7 (Sep. 6, 2006). |
“Data Over Cable System Interface Specification Quality of Service Management Information Base (DOCSIS-QOS MIB),” (Feb. 2005). |
International Search Report for International Application No. PCT/US04/19024 (Dec. 9, 2004). |
“PacketCable Dynamic Quality-of-Service-Specification,” PKT-SP-DQOS-I09-040402, I09 (Apr. 2, 2004). |
“PacketCable Multimedia Architecture Framework Technical Report,” PKT-TR-MM-ARCH-V01-030627, V01 (Jun. 27, 2003). |
“PacketCable Multimedia Specification,” PKT-SP-MM-I01-030627, I01 (Jun. 27, 2003). |
“SIP: Session Initiation Protocol,” RFC 3261 (Jun. 2002). |
Kutscher et al., “Session Description and Capability Negotiation Draft-IETF-MUSIC-SDPNG-03. TXT” IETF Request for Comments, pp. 1-61, XP002205059 (Nov. 21, 2001). |
Ed Miller et al., “The PacketCable Architecture,” IEEE Communications Magazine, IEEE Service Center, Piscataway, US, vol. 39, No. 6, pp. 90-96, XP011091736 ISSN: 0163-6804 (Jun. 2001). |
“PacketCable 1.2 Architecture Framework Technical Report,” PKT-TR-ARCH1.2-V01-001229, V01 (Dec. 29, 2000). |
“SDP: Session Description Protocol,” RFC 2327 (Apr. 1998). |
Schulzrinne et al., “Real Time Streaming Protocol (RTSP),” RFC 2326, pp. 1-92 (Apr. 1998). |
Shenker et al., “Specification of Guaranteed Quality of Service,” RFC 2212, pp. 1-20 (Sep. 1997). |
Wroclawski, “Specification of the Controlled-Load Network Element Service,” RFC 2211, pp. 1-19 (Sep. 1997). |
Wroclawski, “The Use of RSVP with IETF Integrated Services,” RFC 2210, pp. 1-33 (Sep. 1997). |
Braden et al., “Resource ReSerVation Protocol (RSVP) —Version 1 Functional Specification,” RFC 2205, pp. 1-112 (Sep. 1997). |
“Cable Modem Termination System —Network Side Interface Specification,” SP-CMTS-NSII01-960702, I01 (Jul. 2, 1996). |
Rose et al, “Concise MIB Definitions,” RFC 1212, pp. 1-19 (Mar. 1991). |
Case et al, “A Simple Network Management Protocol (SNMP),” RFC 1157, pp. 1-36 (May 1990). |
Rose et al, “Structure and Identification of Management Information for TCP/IP-based Internets,” RFC 1155, pp. 1-22 (May 1990). |
Final Official Action for U.S. Appl. No. 12/646,542 (Oct. 25, 2011). |
Final Official Action for U.S. Appl. No. 10/867,159 (Jul. 16, 2012). |
Non-Final Official Action for U.S. Appl. No. 12/757,544 (Jun. 4, 2012). |
Second Office Action for Canadian Application No. 2,528,648 (May 22, 2012). |
First Office Action for Canadian Application No. 2 528 871 (Jan. 24, 2012). |
First Office Action for Canadian Patent Application No. 2,528,648 (Aug. 12, 2011). |
Notice of Panel Decision from Pre-Appeal Brief Review for U.S. Appl. No. 10/867,159 (May 30, 2013). |
Notice of Allowance for Canadian Application No. 2,528,871 (May 21, 2013). |
Decision on Appeal for U.S. Appl. No. 10/867,157 (Apr. 11, 2013). |
First Office Action for Canadian Application No. 2,554,177 (Mar. 11, 2013). |
Third Office Action for Canadian Application No. 2,528,648 (Jan. 22, 2013). |
Second Office Action for Canadian Application No. 2,528,871 (Jan. 21, 2013). |
First Office Action for Chinese Application No. 200980111437.X (Jan. 4, 2013). |
Final Office Action for U.S. Appl. No. 12/757,544 (Jan. 3, 2013). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 12/757,544 (Sep. 10, 2012). |
First Office Action for Canadian Application No. 2,554,176 (Aug. 27, 2012). |
Non-Final Office Action for U.S. Appl. No. 12/646,542 (Nov. 6, 2014). |
Notice of Allowance for Canadian Application No. 2,554,177 (Oct. 30, 2014). |
Third Office Action for Chinese Application No. 200980111437.X (Aug. 11, 2014). |
Reexamination Decision for Chinese Application No. 200980111437.X (Jul. 24, 2014). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 12/646,542 (Jul. 22, 2014). |
Advisory Action Before the Filing of an Appeal Brief for U.S. Appl. No. 12/646,542 (Jul. 10, 2014). |
Extended European Search Report for European Application No. 10184422.3 (Apr. 30, 2014). |
Final Office Action for U.S. Appl. No. 12/646,542 (Apr. 16, 2014). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 12/646,542 (Mar. 30, 2015). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 12/646,542 (Mar. 12, 2015). |
Office Action for Canadian Application No. 2,840,432 (Feb. 17, 2015) |
Office Action for Canadian Application No. 2,554,176 (Feb. 4, 2015). |
Letter Regarding Decision to Grant for Chinese Application No. ZL200980111437.X (Feb. 3, 2015). |
Final Office Action for Chinese Application No. 200980111437.X (Mar. 4, 2014). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 12/757,544 (Feb. 5, 2014). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 12/646,542 (Jan. 31, 2014) |
Non-Final Office Action for U.S. Appl. No. 12/646,542 (Oct. 25, 2013). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 10/867,159 (Aug. 20, 2013). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 10/867,157 (Jul. 22, 2013). |
Non-Final Office Action for U.S. Appl. No. 12/757,544 (Jul. 8, 2013). |
Second Office Action for Canadian Application No. 2,554,177 (Jan. 10, 2014). |
Extended European Search Report for European Application No. 09709156.5 (Dec. 5, 2013). |
Notice of Allowance for Canadian Application No. 2,528,648 (Nov. 25, 2013). |
Second Office Action for Canadian Application No. 2,554,176 (Nov. 12, 2013). |
Second Office Action for Chinese Application No. 200980111437.X (Oct. 22, 2013). |
Number | Date | Country | |
---|---|---|---|
20090196269 A1 | Aug 2009 | US |
Number | Date | Country | |
---|---|---|---|
61025563 | Feb 2008 | US |