Wireless communication systems are widely deployed to provide various telecommunication services such as telephony, video, data, messaging, and broadcasts. A wireless network may include one or more network nodes that support communication for wireless communication devices, such as a user equipment (UE).
The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
In situations where a user may or may not be able to directly place a voice emergency call to 911, service providers have introduced the ability to send a text message to 911 during an emergency. The user may send the text message to 911 via a UE. Such a feature is sometimes referred to as SMS text 911 and the feature may be useful when the user is unable to dial the number 911.
However, when a wireless network that directs the text message (e.g., an originating network) is overloaded, the text message may not have end-to-end overload handling among the various network elements in the wireless network. As a result, the text message may be treated similarly to other text-based related messages, and thus, may be dropped in case of network overload. Further, a Next Generation PSAP may not be able to determine whether a received SMS text 911 is from a valid user or not because a mechanism to prevent identity spoofing for text 911 may not exist, for example.
In some implementations, a mechanism may be defined to ensure that 911 text messaging receives priority handling in a wireless network. When a text message is determined as being associated with “SMS text 911”, the text message may be marked accordingly, such that in all subsequent steps through the network the text message may receive preferential treatment in the case of network overload. The text message may be marked with an enhanced 911 (e911) attribute, which may allow the text message to receive preferential treatment in the case of network overload. In a specific example, an RPH with an esnet namespace may be used to ensure that the 911 text messaging receives priority handling. A namespace may be a declarative region that provides a scope to identifiers (e.g., the names of types, functions, and/or variables) within the declarative region. Once the text message is received using a message, such as a SIP message, at a proxy call session control function (CSCF) (P-CSCF) in the wireless network, the P-CSCF may insert the e911 attribute in the message. Each network element may be able to detect the e911 attribute and use its internal overload control to provide preferential treatment to the text message when the wireless network is overloaded. The mechanism may be compatible with a traditional SMS architecture and an RCS architecture. Further, text messages may be given priority based on the types of users that initiate the text messages. For example, text messages associated with police officers or persons serving in a critical public safety position may receive preferential treatment.
In some implementations, for a traditional SMS architecture, an SMS application server (SMS-AS) may be enhanced to include an optional parameter in a short message peer-to-peer (SMPP) protocol to support the passing of an emergency indication, as indicated in the RPH with the esnet namespace. Similarly, the SMS-AS may map an optional parameter in the SMPP protocol to the corresponding RPH esnet namespace for SIP signaling and session priority attribute value pair (AVP) for diameter signaling. For an SMS RCS solution, an RCS application server (AS) and all Internet Protocol multimedia subsystem (IMS) network elements within an RCS flow may be enhanced to give higher priority to SIP messages with the RPH with the esnet namespace, as compared to other SIP messages.
In some implementations, for an IMS IP based network that supports a SIP interface, a Next Generation PSAP center may be able to detect spoofing of text messages, where the text messages may be based on SMS text 911. Spoofing may be detected using a STIR/SHAKEN framework. The STIR/SHAKEN framework may be applied for RCS-based SMS text 911. In addition to caller identity verification, the RPH may be verified, since the RPH may also be spoofed.
In some implementations, by supporting the e911 attribute (e.g., the RPH with the esnet namespace) in SIP messages, reliability of SMS text 911 may be improved when the wireless network is overloaded. Further, by implementing the STIR/SHAKEN framework for the text messages, spoofing of SMS text 911 at the Next Generation PSAP center may be reduced, thus allowing a PSAP operator to focus on actual emergency situations.
As shown in
As indicated above,
As shown in
As indicated above,
In some implementations, the UE may attach to an emergency packet data network (PDN) and perform an emergency SIP registration after completing an IMS SIP registration. Such signaling may be transmitted over a 4G or 5G PDN when the UE detects a text message sent to an emergency number (e.g., 911) and generates a SIP message, where the text message may be an SMS emergency text message. As shown by reference number 302, the UE may transmit the SIP message to the P-CSCF. The SIP message may indicate a content type (e.g., application/vnd.3gpp (or 3gpp2).sms). The SIP message may indicate an SMS encapsulated SMS peer-to-peer (P2P). The SIP message may indicate a request uniform resource identifier (R-URI) (e.g., urn:service:sos or 911). The SIP message may indicate that the SIP message is to 911 (To:911). The SIP message may indicate that the SIP message is from the UE (From:AT1). The SIP message may indicate that a preferred identity is the UE (P-Preferred-Identity:AT1). The P-CSCF may convert the R-URI of urn:service:sos to tel:911 when the UE sends such R-URI in the SIP message. The P-CSCF may convert the preferred identity to a P-Asserted-Identity (PAI) header (PAI:AT1). The P-CSCF may route the SIP message to the same S-CSCF that was used for an IMS SIP registration. Further, since the SIP message is associated with SMS text 911, the P-CSCF may add an e911 attribute, such as an RPH with an esnet namespace, in the SIP message.
As shown by reference number 304, the P-CSCF may transmit the SIP message to the S-CSCF. The SIP message may include the RPH with the esnet namespace. As shown by reference number 306, the S-CSCF may transmit, to the SMS-AS, the SIP message having the RPH with the esnet namespace. The SIP message may be routed to the SMS-AS (or SMSC) using initial filter criteria (iFC). The SMS-AS may detect that the SIP message has the RPH with the esnet namespace. The SMS-AS may give priority handling to these messages when a wireless network is overloaded. In other words, when the wireless network is overloaded, these messages may receive the highest priority.
As shown by reference number 308, the SMS-AS may transmit an OK message (e.g., SIP 200 OK) to the S-CSCF. The OK message may indicate {To:911, From:AT1, PAI:AT1}. As shown by reference number 310, the S-CSCF may transmit the OK message to the P-CSCF. As shown by reference number 312, the P-CSCF may transmit the OK message to the UE.
As shown by reference number 314, the SMS-AS may route the SIP message to the ECS for subsequent delivery to the PSAP. When the wireless network is overloaded, the SMS-AS may route the SIP message using the highest priority. When the wireless network is under normal conditions, the SMS-AS may route the SIP message using a normal priority. The SMS-AS may route the SIP message to the ECS since the SIP message is associated with the text message. Since the SIP message is associated with the text message, the SMS-AS may insert an optional parameter in an SMPP message to indicate SMS text 911 (e.g., mapping of the RPH esnet to the optional parameter). The SMS-AS may transmit the SMPP message to the ECS. The ECS may select an appropriate PSAP following a proper location-based services (LBS) procedure. As shown by reference number 316, the ECS may transmit the text message to the PSAP.
As shown by reference number 318, the PSAP may transmit an acknowledgement to the ECS. As shown by reference number 320, the ECS may transmit an SMPP (delivery receipt) message to the SMS-AS, which may include an optional parameter indicating the priority handling.
As shown by reference number 322, the SMS-AS may transmit a status query (user authorization request) with a session priority AVP to the DRA. The DRA may transmit the status query with the session priority AVP to the HSS. The HSS may transmit a status query response (user authorization answer) to the DRA. The DRA may transmit the status query response to the SMS-AS. The SMS-AS may query the HSS to determine a proper CSCF to which to send a subsequent SIP message. The SMS-AS sends the status query to the DRA, which determines the proper HSS to get the status query. Since there is an optional parameter indicating priority handling, the SMS-AS may insert the session priority AVP.
As shown by reference number 324, the SMS-AS may transmit a SIP message to the S-CSCF. The SIP message may indicate a delivery acknowledgement/report. Further, the SIP message may indicate {To:AT1, From:911, PAI:AT1, RPH esnet}. As shown by reference number 326, the S-CSCF may transmit the SIP message to the P-CSCF. The S-CSCF may use an IMS registration of the UE established over the IMS PDN to deliver the SIP message. As shown by reference number 328, the P-CSCF may transmit the SIP message to the UE.
As shown by reference number 330, the UE may transmit an OK message (e.g., SIP 200 OK) to the P-CSCF. The OK message may indicate {To:AT1, From:911, PAI:AT1}. As shown by reference number 332, the P-CSCF may transmit the OK message to the S-CSCF. As shown by reference number 334, the S-CSCF may transmit the OK message to the SMS-AS.
As indicated above,
As shown by reference number 402, the UE may transmit a SIP message (911 or urn:service:sos) to the first P-CSCF. Since the SIP message is associated with SMS text 911, the first P-CSCF may add an e911 attribute, such as an RPH with an esnet namespace, in the SIP message. As shown by reference number 404, the first P-CSCF may transmit the SIP message (RPH esnet) to the first S-CSCF. The first S-CSCF may transmit the SIP message to the first RCS-AS. As shown by reference number 406, the first RCS-AS may transmit the SIP message to the first S-CSCF. As shown by reference number 408, the first S-CSCF may transmit the SIP message to the I-CSCF. The S-CSCF may perform an enumerated (ENUM) query based on a target to determine an appropriate I-CSCF or I-SBC.
As shown by reference number 410, the I-CSCF may transmit the SIP message to the first I-SBC. As shown by reference number 412, the first I-SBC may transmit the SIP message to the second I-SBC. As shown by reference number 414, the second I-SBC may transmit the SIP message to the second S-CSCF. As shown by reference number 416, the second S-CSCF may transmit the SIP message to the second RCS-AS. As shown by reference number 418, the second RCS-AS may transmit the SIP message to the second S-CSCF. The second S-CSCF may transmit the SIP message to the second P-CSCF. The second P-CSCF may transmit the SIP message to the PSAP.
As shown by reference number 420, the PSAP may transmit an OK message (e.g., SIP 200 OK) to the second P-CSCF. The second P-CSCF may transmit the OK message to the second S-CSCF. The second S-CSCF may transmit the OK message to the second RCS-AS. As shown by reference number 422, the second RCS-AS may transmit the OK message to the second S-CSCF. As shown by reference number 424, the second S-CSCF may transmit the OK message to the second I-SBC. As shown by reference number 426, the second I-SBC may transmit the OK message to the first I-SBC. As shown by reference number 428, the first I-SBC may transmit the OK message to the I-CSCF. As shown by reference number 430, the I-CSCF may transmit the OK message to the first S-CSCF. As shown by reference number 432, the first S-CSCF may transmit the OK message to the first RCS-AS. As shown by reference number 434, the first RCS-AS may transmit the OK message to the first S-CSCF. As shown by reference number 436, the first S-CSCF may transmit the OK message to the first P-CSCF. As shown by reference number 438, the first P-CSCF may transmit the OK message to the UE.
As shown by reference number 440, the UE may transmit an ACK to the first P-CSCF. As shown by reference number 442, the first P-CSCF may transmit the ACK to the first S-CSCF. As shown by reference number 444, the first S-CSCF may transmit the ACK to the first RCS-AS. As shown by reference number 446, the first RCS-AS may transmit the ACK to the first S-CSCF. As shown by reference number 448, the first S-CSCF may transmit the ACK to the I-CSCF. As shown by reference number 450, the I-CSCF may transmit the ACK to the first I-SBC. As shown by reference number 452, the first I-SBC may transmit the ACK to the second I-SBC. As shown by reference number 454, the second I-SBC may transmit the ACK to the second S-CSCF. As shown by reference number 456, the second S-CSCF may transmit the ACK to the second RCS-AS. As shown by reference number 458, the second RCS-AS may transmit the ACK to the second S-CSCF. As shown by reference number 460, the second S-CSCF may transmit the ACK to the second P-CSCF. As shown by reference number 462, the second P-CSCF may transmit the ACK to the PSAP.
As indicated above,
In some implementations, a STIR/SHAKEN framework may be supported for SIP messages to reduce spoofing of SMS text 911 at PSAP centers. By using the STIR/SHAKEN framework, SMS text 911 spoofing may be reduced, thereby reducing time wasted at the PSAP centers. When a text message is associated with SMS text 911, an originating service provider network may attest both a caller identity and an RPH (e.g., an RPH with an esnet namespace) indicated in a SIP message. The caller identity may be a P-Asserted Identity (PAID). A terminating IMS emergency network within a Next Generation emergency service complex may verify the caller identity and the RPH. An implementation of STIR/SHAKEN may be supported for the SIP message at both the originating service provider network and at the terminating IMS emergency network.
In some implementations, the support of STIR/SHAKEN may be applicable only to RCS based SMS architecture solutions and only to a Next Generation 911 (NG911) emergency service network. The NG911 emergency service network may be responsible for performing the verification of the signed caller identity and RPH information received within the SIP message. The NG911 emergency service network may pass an appropriate indication to a PSAP operator. When a validation/verification of the signed caller identity and the RPH information associated with the SMS text 911 fails, the SMS text 911 may be delivered to the PSAP with the caller identity and the RPH information, as well as a result of the validation/verification (e.g., an indication that the caller identity and/or the RPH information was not successfully verified). A separate indicator may be provided for the caller identity and the RPH information. No SMS text 911 may be impacted for a failed validation/verification.
As shown by reference number 502, the SIP UA may transmit, to the first IMS, a SIP message associated with SMS text 911. As shown by reference number 504, the originating CSCF/I-BCF may transmit a request to the STI-AS. The request may be to attest a caller identity and an RPH associated with the SIP message (e.g., an RPH with an esnet namespace). As shown by reference number 506, the STI-AS may send a query to the SKS, and as shown by reference number 508, the SKS may provide a reply to the STI-AS. As shown by reference number 510, the STI-AS may provide, to the first IMS, a response that includes an identifier for both the caller identity and the RPH. The identity may be associated with an attestation of the caller identity and the RPH. As shown by reference number 512, the first IMS may transmit the SIP message to the first I-SBC. The identifier for both the caller identity and the RPH may be inserted into the SIP message.
As shown by reference number 514, the first I-SBC may transmit the SIP message to the second I-SBC. As shown by reference number 516, the second I-SBC may transmit the SIP message to the second IMS. As shown by reference number 518, the terminating CSCF/I-BCF may transmit a request to the STI-VS. The request may indicate the identifier for both the caller identity and the RPH. As shown by reference number 520, the STI-VS may send a query to the STI-CR, and as shown by reference number 522, the STI-CR may provide a reply to the STI-VS. As shown by reference number 524, the STI-VS may provide, to the second IMS, a response that validates the identifier for both the caller identity and the RPH in the SIP message. As shown by reference number 526, the second IMS core may transmit the SIP message to the PSAP. The SIP message may indicate that both the caller identity and the RPH have been successfully validated. Alternatively, the SIP message may indicate that the caller identity and/or the RPH have not been validated (e.g., validation has failed).
In some implementations, attestation may be applied to both the caller identity and the RPH of the SIP message. The second IMS, which may be associated with an emergency complex, may become aware of the validity of the caller identity and the RPH in the SIP message. The second IMS may pass an appropriate indication to a PSAP operator (e.g., whether an SMS text 911 is potential spam or not). Further, either a CSCF or the I-BCF may perform a hypertext transfer protocol (HTTP) request to the STI-AS or the STI-VS.
As indicated above,
As shown by reference number 602, the UE may transmit a SIP message to the first P-CSCF. Since the SIP message is associated with SMS text 911, the first P-CSCF may add an RPH with an esnet namespace in the SIP message. The first P-CSCF may transmit, to the first S/E-CSCF, the SIP message having the RPH with the esnet namespace. An STI-AS may be invoked by the first S/E-CSCF to perform attestation for both a caller identity and an RPH with an esnet namespace. The first S/E-CSCF may transmit the SIP message to the first RCS-AS. As shown by reference number 604, the first RCS-AS may transmit the SIP message to the first S/E-CSCF.
As shown by reference number 606, the first S/E-CSCF may transmit the SIP message to the I-CSCF. As shown by reference number 608, the I-CSCF may transmit the SIP message to the first I-SBC. The STI-AS may be invoked by the first I-SBC to perform attestation for both the caller identity and the RPH with the esnet namespace. In other words, the invocation of the STI-AS may be done at either the first S/E-CSCF or the first I-SBC. As shown by reference number 610, the first I-SBC may transmit the SIP message to the second I-SBC. The SIP message may indicate both the caller identity and the RPH with the esnet namespace. An STI-VS may be invoked by the second I-SBC to perform verification for both the caller identity and the RPH with an esnet namespace. As shown by reference number 612, the first I-SBC may transmit the SIP message to the second S/E-CSCF. The STI-VS may be invoked by the second S/E-CSCF to perform verification for both the caller identity and the RPH with an esnet namespace. In other words, the invocation of the STI-VS may be done at either the second I-SBC or the second S/E-CSCF. As shown by reference number 614, the second S/E-CSCF may transmit the SIP message to the second RCS-AS. As shown by reference number 616, the second RCS-AS may transmit the SIP message to the second S/E-CSCF. The second S/E-CSCF may transmit the SIP message to the second P-CSCF. The second P-CSCF may transmit the SIP message to the PSAP.
In some implementations, attestation may be a declaration made by a network operator associated with an originating network that a party placing a particular call is authorized to represent themselves by a particular calling identity. When verification of a signed caller identity or a SIP RPH associated with a 9-1-1 origination text passes, the 9-1-1 text may be delivered to the PSAP with the caller identity and the SIP RPH, along with results of the caller identity and RPH verification. In the case of successful verification, a corresponding verstat parameter may indicate that validation passed in a SIP message to the PSAP. When verification of the signed caller identity or the SIP RPH associated with the 9-1-1 origination text fails, the 9-1-1 text may be delivered to the PSAP with the caller identity and the SIP RPH, along with results of the caller identity and RPH verification. In the case of failure, the corresponding verstat parameter may indicate validation that failed in the SIP message to the PSAP.
As an example, the SIP message to the PSAP may indicate a PAID, a telephone number (TN), a verstat of “TN-Validation-Passed”, an RPH of esnet, and a verstat of “TN-RPH-Validation-Passed”. As another example, the SIP message to the PSAP may indicate a PAID, a telephone number, a verstat of “TN-Validation-Failed”, an RPH of esnet, and a verstat of “TN-RPH-Validation-Failed”.
As indicated above,
The UE 702 may include one or more devices capable of receiving, generating, storing, processing, and/or providing information, such as information described herein. For example, the UE 702 can include a mobile phone (e.g., a smart phone or a radiotelephone), a laptop computer, a tablet computer, a desktop computer, a handheld computer, a gaming device, a wearable communication device (e.g., a smart watch or a pair of smart glasses), a mobile hotspot device, a fixed wireless access device, customer premises equipment, an autonomous vehicle, or a similar type of device.
The RAN 704 may support, for example, a cellular radio access technology (RAT). The RAN 704 may include one or more base stations (e.g., base transceiver stations, radio base stations, node Bs, eNodeBs (eNBs), gNodeBs (gNBs), base station subsystems, cellular sites, cellular towers, access points, transmit receive points (TRPs), radio access nodes, macrocell base stations, microcell base stations, picocell base stations, femtocell base stations, or similar types of devices) and other network entities that can support wireless communication for the UE 702. A base station may be a disaggregated base station. The disaggregated base station may be configured to utilize a protocol stack that is physically or logically distributed among two or more nodes, which may include a radio unit (RU), a distributed unit (DU), and a centralized unit (CU). The RAN 704 may transfer traffic between the UE 702 (e.g., using a cellular RAT), one or more base stations (e.g., using a wireless interface or a backhaul interface, such as a wired backhaul interface), and/or the core network 706. The RAN 704 may provide one or more cells that cover geographic areas.
In some implementations, the RAN 704 may perform scheduling and/or resource management for the UE 702 covered by the RAN 704 (e.g., the UE 702 covered by a cell provided by the RAN 704). In some implementations, the RAN 704 may be controlled or coordinated by a network controller, which may perform load balancing, network-level configuration, and/or other operations. The network controller may communicate with the RAN 704 via a wireless or wireline backhaul. In some implementations, the RAN 704 may include a network controller, a self-organizing network (SON) module or component, or a similar module or component. In other words, the RAN 704 may perform network control, scheduling, and/or network management functions (e.g., for uplink, downlink, and/or sidelink communications of the UE 702 covered by the RAN 704).
In some implementations, the core network 706 may include an example functional architecture in which systems and/or methods described herein may be implemented. For example, the core network 706 may include an example architecture of a 5G next generation (NG) core network included in a 5G wireless telecommunications system. While the example architecture of the core network 706 shown in
As shown in
The NSSF 708 may include one or more devices that select network slice instances for the UE 702. The NSSF 708 may allow an operator to deploy multiple substantially independent end-to-end networks potentially with the same infrastructure. In some implementations, each slice may be customized for different services. The NEF 710 may include one or more devices that support exposure of capabilities and/or events in the wireless telecommunications system to help other entities in the wireless telecommunications system discover network services.
The UDR 712 may include one or more devices that provide a converged repository, which may be used by network functions to store data. For example, a converged repository of subscriber information may be used to service a number of network functions. The UDM 714 may include one or more devices to store user data and profiles in the wireless telecommunications system. The UDM 714 may generate authentication vectors, perform user identification handling, perform subscription management, and perform other various functions. The AUSF 716 may include one or more devices that act as an authentication server and support the process of authenticating the UE 702 in the wireless telecommunications system.
The PCF 718 may include one or more devices that provide a policy framework that incorporates network slicing, roaming, packet processing, and/or mobility management, among other examples. The AF 720 may include one or more devices that support application influence on traffic routing, access to the NEF 710, and/or policy control, among other examples. The AMF 722 may include one or more devices that act as a termination point for non-access stratum (NAS) signaling and/or mobility management, among other examples. The SMF 724 may include one or more devices that support the establishment, modification, and release of communication sessions in the wireless telecommunications system. For example, the SMF 724 may configure traffic steering policies at the UPF 726 and/or may enforce UE internet protocol (IP) address allocation and policies, among other examples. The UPF 726 may include one or more devices that serve as an anchor point for intra-RAT and/or inter-RAT mobility. The UPF 726 may apply rules to packets, such as rules pertaining to packet routing, traffic reporting, and/or handling user plane QoS, among other examples. The message bus 728 may represent a communication structure for communication among the functional elements. In other words, the message bus 728 may permit communication between two or more functional elements.
The data network 730 may include one or more wired and/or wireless data networks. For example, the data network 730 may include an IMS, a public land mobile network (PLMN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), a private network such as a corporate intranet, an ad hoc network, the Internet, a fiber optic-based network, a cloud computing network, a third party services network, an operator services network, and/or a combination of these or other types of networks.
The number and arrangement of devices and networks shown in
The bus 810 may include one or more components that enable wired and/or wireless communication among the components of the device 800. The bus 810 may couple together two or more components of
The memory 830 may include volatile and/or nonvolatile memory. For example, the memory 830 may include random access memory (RAM), read only memory (ROM), a hard disk drive, and/or another type of memory (e.g., a flash memory, a magnetic memory, and/or an optical memory). The memory 830 may include internal memory (e.g., RAM, ROM, or a hard disk drive) and/or removable memory (e.g., removable via a universal serial bus connection). The memory 830 may be a non-transitory computer-readable medium. The memory 830 may store information, one or more instructions, and/or software (e.g., one or more software applications) related to the operation of the device 800. In some implementations, the memory 830 may include one or more memories that are coupled (e.g., communicatively coupled) to one or more processors (e.g., processor 820), such as via the bus 810. Communicative coupling between a processor 820 and a memory 830 may enable the processor 820 to read and/or process information stored in the memory 830 and/or to store information in the memory 830.
The input component 840 may enable the device 800 to receive input, such as user input and/or sensed input. For example, the input component 840 may include a touch screen, a keyboard, a keypad, a mouse, a button, a microphone, a switch, a sensor, a global positioning system sensor, a global navigation satellite system sensor, an accelerometer, a gyroscope, and/or an actuator. The output component 850 may enable the device 800 to provide output, such as via a display, a speaker, and/or a light-emitting diode. The communication component 860 may enable the device 800 to communicate with other devices via a wired connection and/or a wireless connection. For example, the communication component 860 may include a receiver, a transmitter, a transceiver, a modem, a network interface card, and/or an antenna.
The device 800 may perform one or more operations or processes described herein. For example, a non-transitory computer-readable medium (e.g., memory 830) may store a set of instructions (e.g., one or more instructions or code) for execution by the processor 820. The processor 820 may execute the set of instructions to perform one or more operations or processes described herein. In some implementations, execution of the set of instructions, by one or more processors 820, causes the one or more processors 820 and/or the device 800 to perform one or more operations or processes described herein. In some implementations, hardwired circuitry may be used instead of or in combination with the instructions to perform one or more operations or processes described herein. Additionally, or alternatively, the processor 820 may be configured to perform one or more operations or processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.
The number and arrangement of components shown in
As shown in
As shown in
As shown in
In some implementations, the CSCF may transmit, to an STI-AS, a request to attest a caller identity and the e911 attribute. The CSCF may receive, from the STI-AS, a response that includes an identifier associated with an attestation of the caller identity and the e911 attribute. The CSCF may insert the identifier associated with the attestation of the caller identity and the e911 attribute into the message. The attestation of the caller identity and the e911 attribute may be based on a STIR/SHAKEN framework, which may be implemented in an originating service provider network that includes the CSCF and a terminating IMS emergency network. Further, an indication associated with a validation of the identity associated with the attestation of the caller identity and the e911 attribute may be provided with the text message to a PSAP system, where the identity associated with the attestation of the caller identity and the e911 attribute may be validated using an STI-VS.
Although
As used herein, the term “component” is intended to be broadly construed as hardware, firmware, or a combination of hardware and software. It will be apparent that systems and/or methods described herein may be implemented in different forms of hardware, firmware, and/or a combination of hardware and software. The actual specialized control hardware or software code used to implement these systems and/or methods is not limiting of the implementations. Thus, the operation and behavior of the systems and/or methods are described herein without reference to specific software code—it being understood that software and hardware can be used to implement the systems and/or methods based on the description herein.
As used herein, satisfying a threshold may, depending on the context, refer to a value being greater than the threshold, greater than or equal to the threshold, less than the threshold, less than or equal to the threshold, equal to the threshold, not equal to the threshold, or the like.
To the extent the aforementioned implementations collect, store, or employ personal information of individuals, it should be understood that such information shall be used in accordance with all applicable laws concerning protection of personal information. Additionally, the collection, storage, and use of such information can be subject to consent of the individual to such activity, for example, through well known “opt-in” or “opt-out” processes as can be appropriate for the situation and type of information. Storage and use of personal information can be in an appropriately secure manner reflective of the type of information, for example, through various encryption and anonymization techniques for particularly sensitive information.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of various implementations. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one claim, the disclosure of various implementations includes each dependent claim in combination with every other claim in the claim set. As used herein, a phrase referring to “at least one of” a list of items refers to any combination of those items, including single members. As an example, “at least one of: a, b, or c” is intended to cover a, b, c, a-b, a-c, b-c, and a-b-c, as well as any combination with multiple of the same item.
When “a processor” or “one or more processors” (or another device or component, such as “a controller” or “one or more controllers”) is described or claimed (within a single claim or across multiple claims) as performing multiple operations or being configured to perform multiple operations, this language is intended to broadly cover a variety of processor architectures and environments. For example, unless explicitly claimed otherwise (e.g., via the use of “first processor” and “second processor” or other language that differentiates processors in the claims), this language is intended to cover a single processor performing or being configured to perform all of the operations, a group of processors collectively performing or being configured to perform all of the operations, a first processor performing or being configured to perform a first operation and a second processor performing or being configured to perform a second operation, or any combination of processors performing or being configured to perform the operations. For example, when a claim has the form “one or more processors configured to: perform X; perform Y; and perform Z,” that claim should be interpreted to mean “one or more processors configured to perform X; one or more (possibly different) processors configured to perform Y; and one or more (also possibly different) processors configured to perform Z.”
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items, and may be used interchangeably with “one or more.” Further, as used herein, the article “the” is intended to include one or more items referenced in connection with the article “the” and may be used interchangeably with “the one or more.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, or a combination of related and unrelated items), and may be used interchangeably with “one or more.” Where only one item is intended, the phrase “only one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise. Also, as used herein, the term “or” is intended to be inclusive when used in a series and may be used interchangeably with “and/or,” unless explicitly stated otherwise (e.g., if used in combination with “either” or “only one of”).
In the preceding specification, various example embodiments have been described with reference to the accompanying drawings. It will, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded in an illustrative rather than restrictive sense.