Mobile devices are leveraging new communication services that are traditionally associated with cellular systems which are being provided over several different media, including VoIP (Voice over Internet Protocol) and data access over Wi-Fi (under IEEE 802.11), VoIP and data access over cellular packet-switched data networking, and legacy cellular voice. While such new communication services can often provide satisfactory performance, opportunities exist to make them more effective with more comprehensive features and benefits to users.
This Background is provided to introduce a brief context for the Summary and Detailed Description that follow. This Background is not intended to be an aid in determining the scope of the claimed subject matter nor be viewed as limiting the claimed subject matter to implementations that solve any or all of the disadvantages or problems presented above.
A mobile device having a capability to connect to a hybrid telecommunications network using different connection types—for example, Wi-Fi and cellular voice and data connections—is configured to implement various mitigations to audio disruptions that may occur during the performance of a call handover between connections. The call handover may be utilized, for example, to maintain voice call continuity if a given connection starts to degrade and/or when a more optimal connection is available (such as one that is less expensive, more reliable, higher quality, provides additional features, etc.).
The particular mitigations utilized depend on the duration of the audio disruption so that negligible audio disruptions that do not impact the conversation between parties to the call are not mitigated at all, while relatively short audio disruptions are mitigated in a passive manner by playing background white noise or comfort sounds on the mobile device to indicate to its user that something is happening so the user does not hang up on the call while the handover is in progress. Audio disruptions having relatively longer duration are dealt with using more active mitigations in which audio tones are played and the mobile device's graphical user interface (GUI) is configured to indicate to the user that a handover is in progress. Audio disruptions having durations which are determined to be irrecoverable are handled by disconnecting the call and providing options to the user through the GUI to either call the other party back, send a message, or set a callback reminder.
The hybrid telecommunications network may be configured to provide audio mitigations for the party at the other end of the call (i.e., the remote party) as the handover is being performed for the user at the mobile device (i.e., the local party). The audio mitigation for the remote party includes, for example, a looped playback of a recorded message comprising one or more words such as “reconnecting” (or its non-English equivalents). In the case of an irrecoverable disruption, the hybrid telecommunications network can provide an audio menu to which the remote user can respond using DTMF (Dual Tone Multi-frequency) “touch tone” signaling to variously place a callback to the local user or leave a voicemail message.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure. It will be appreciated that the above-described subject matter may be implemented as a computer-controlled apparatus, a computer process, a computing system, or as an article of manufacture such as one or more computer-readable storage media. These and various other features will be apparent from a reading of the following Detailed Description and a review of the associated drawings.
Like reference numerals indicate like elements in the drawings. Elements are not drawn to scale unless otherwise indicated.
Other types of telephony equipment may also be present in the telecommunications environment 100 such as conventional desktop phones 120 which are operatively coupled to a public switched telephone network (PSTN). Other examples may include equipment that connects to the PSTN using private branch exchanges (PBXs) and equipment coupled to call services that are accessed using telephone numbers. This other telephony equipment may still be utilized in various scenarios involving a hybrid telecommunications network connection indicator, even though it might not implement such functionality itself. For example, a mobile phone 110 may make or receive a call to a desktop phone 120 and employ voice call continuity as the prevailing connection conditions change such as when the mobile device user moves from a car to home during a call.
The hybrid network 115 comprises several networks 1, 2 . . . N, identified in
Each mobile device 110 will typically have a prearranged association with one or more of the networks underlying the hybrid network 115. For example, a user 105 will typically be a subscriber to a cellular telephone service so that the user's mobile device 110 can access a given cellular network as valid and authenticated user equipment. Similarly, the mobile device 110 may include functionality and credentials to access a Wi-Fi network. The mobile devices 110 may also interoperate with a VoIP network (shown below in
In some situations, a mobile device may be placed in a dock or cradle that is coupled to the PSTN and thus could employ a wireline connection for a call which is often the least expensive network connection. Typically, the mobile devices 110 use the less expensive Wi-Fi connection whenever it is available and capable of providing a reasonable level of call quality. When Wi-Fi is not available or is inadequate for the voice call, the call may be made over one of the other available network connection options after determining that the selected connection will result in acceptable call quality. Cellular voice is typically the costliest connection alternative but also the most ubiquitous and so it is used to ensure that the user has access to calling services from as wide an area as possible. In the description that follows, the mobile devices 110 are considered to be VCC equipped unless otherwise indicated.
A characteristic of the hybrid network 115 is that two or more of the underlying networks (e.g., networks 125, 130, 135) are considered loosely coupled. That is, in one illustrative example, the VoIP network and the MO network are typically operated independently so that one network cannot exercise significant or substantial control over the operation of the other. However, as shown in
While such hybridization can provide cost-effective and high quality transport, the loose coupling has traditionally presented difficulties for voice call continuity. Voice call continuity functionality is defined here as the maintenance of ongoing voice calls for a device that is capable of placing and receiving voice calls in the face of changes in prevailing connection conditions perhaps due to user mobility or other environmental factors. For example, the connection currently being used, such as Wi-Fi under IEEE (Institute of Electrical and Electronic Engineers) 802.11 could start demonstrating worsening radio signal and/or network congestion conditions, or the user could move to a location where the Wi-Fi connection does not work at all. In addition, other connection options may become available that are lower cost, or provide a better user experience, and therefore either or both the user and network operator may wish to utilize such connection options.
For example, as shown in
If the handover is initiated so that both the original and newly selected connections are operative simultaneously, then there will be an intermediate state in which both call legs will be running in parallel. Media flows can be directed to and from the mobile device over these parallel connections, until one of the two flows is terminated. Such intermediate state enables the call to be maintained in an uninterrupted manner as perceived by the parties on both ends of the call. During the intermediate state, the mobile device can typically choose to connect to one of the two flows as it deems appropriate.
As depicted in
In scenarios in which normal calls are deliberately interrupted, such as a customer service representative placing a customer's call on hold, it is common practice to play sounds such as audio tones, music, and the like to mitigate the perceived disruption in the call. Such mitigation typically functions to inform the user that the call is still active and ongoing and not to hang up. Otherwise without hearing sounds (what is commonly referred to as experiencing “dead air”), the user might think the call got disconnected and hang up.
This technique, however, is unlikely to be successfully applied as-is to VCC scenarios because audio imperfections occur in Wi-Fi calls frequently, so playing audio tones at every single disruption can be expected to pollute the call with unnecessary interference and make the call interruptions seem even more disruptive. In addition, call transport handovers tend to be unpredictable and can occur without notice to the user which is thus a distinctly different experience for the user than being placed on hold.
Accordingly, it may be desirable that the content of the audio tones used to mitigate disruptions provide sufficient and clear indication to users to inform them as to what is happening with the handover and shape their expectations as to what will occur next. Such expectations can be different for a user on a VCC-equipped mobile device (referred to in the description below and the accompanying drawings as the “local party”) compared to a remote party using conventional equipment to whom the user is talking. In addition to audio mitigations, it can be helpful to provide a visual indication on the mobile device's graphical user interface (GUI) because oftentimes a user's first instinct in such situations is to take the phone off their ear and look at the display screen to see what may be occurring.
Existing solutions do not employ such mitigations and as a result they typically need to implement transport handovers prematurely—that is, while the Wi-Fi call is still healthy and has not degraded fully—in order to reduce the amount of time in which there is dead air/no audio. Such premature handovers can thus cause mobile devices to abandon the less expensive Wi-Fi connection sooner and stay on the more expensive cellular connection longer than necessary. Making the handover disruptions more tolerable to users of VCC-equipped mobile devices can advantageously delay triggering a handover thereby keeping the call on a Wi-Fi connection longer in some cases, and avoid unnecessary handovers altogether in others, which results in lower costs for the user per call.
In accordance with the present principles, the audio disruptions 405 are categorized into four different types, as shown in the table 500 in
A negligible disruption 505 is defined as an event in which audio is interrupted during a handover attempt for a very short period of time, for example, 0.5 seconds or less. Such negligible disruptions are deemed as “glitches” as they have been observed to have no meaningful impact on the conversation between the parties to a call. Accordingly, as indicated by reference numeral 510 in the right-hand column of table 500, no mitigations are implemented when a negligible disruption occurs during a handover.
A short disruption 515 is defined as an event in which audio is interrupted during a handover attempt for a relatively short period of a few seconds, for example, approximately 0.5-3 seconds. It can be expected that short disruptions have some moderate impact to the conversation between the parties but are generally “self-correcting.” A party may miss only a word or two, but not the entire sentence, and the conversation typically gets back on track when a party asks the other to repeat what was said.
It has been observed that there is generally a very low risk of a given user hanging up when experiencing a short disruption during a handover. As indicated by reference numeral 520 in table 500, the response to a short disruption includes what are termed “passive mitigations.” Passive mitigations employ relatively subtle techniques to keep the user from hanging up on the call and getting annoyed. In typical usage scenarios, the passive mitigations are effective in shaping behavior and expectations without necessarily being given significant conscious attention from most users.
As shown in
In some implementations, all interruptions of approximately 3 seconds or less, including negligible disruptions, can be handled as short disruptions using passive mitigations. It is also noted that passive mitigations are typically implemented only for the local party using a VCC-equipped mobile device. However, passive mitigations may also be implemented for the remote party in alternative implementations.
Returning to
Active mitigations typically employ more overt techniques compared to the relatively subtle techniques utilized for passive mitigations. Here, the user's attention is explicitly sought. For example as shown in
Audio active mitigations 800 can be implemented for the remote party on the call as shown in
In this illustrative example, a combination of audio tones 805 and a single spoken word 810 (here, “reconnecting”) played in a repeating loop is presented to the remote party as shown. Other spoken words and/or combinations of words can be utilized in alternative implementations with or without use of the tones. However, it is generally desirable that the spoken word be short enough in duration that the call can be resumed quickly as soon as audio starts flowing in order to minimize the feeling that a half spoken sentence got interrupted.
In addition to audio treatments, GUI active mitigations may be utilized to provide a visual indication that a handover is in progress. As shown in
A text string 920 with graphic object 925 is also positioned as an overlay 930 on top of the content normally displayed on the GUI 905 during calls. In this illustrative example, the text string comprises the single word “reconnecting” and the graphic object 925 includes a group of substantially rectangular elements. In some cases animation, including motion, color and brightness changes, and the like may be applied to either or both the text and the graphic object in the overlay 930.
As noted above, GUI active mitigations can be responsive to the user's natural tendency to look at the mobile device's display screen when an audio interruption occurs. Here, when the user sees the “reconnecting message in the overlay 930, the meaning of the audio tones is described and/or reinforced for the user.
The GUI active mitigations 900 may also include a feature in which the GUI 905 is partially disabled to prevent the user from invoking functions that would be inappropriately executed or not technically possible to execute while the call handover is in progress. This feature is shown in
Returning again to
Post-call options may also be provided to either or both the local and remote parties in response to an occurrence of an irrecoverable disruption. For the local party, an illustrative set of post-call options 1000 are shown in
The user may invoke a new call to be placed to the remote party from the prior disconnected call by using the call-back button 1015. A text message can be composed and sent to the remote party by using the message button 1020. The user can invoke a reminder menu with notification button 1025 in order to set a reminder to contact the remote party at some future time. It is emphasized that these particular call-back options for the local party are illustrative and that other options can provided as may be appropriate for a particular implementation.
For the remote party, an illustrative set of post-call options 1100 are shown in
The UX service 315 can thus play the voice menu 1105 to the remote user to provide options for reconnecting to the local party including calling back and leaving a voicemail message, as shown. The remote user can responsively invoke a selected one of the various options 1100 using DTMF (Dual-tone Multi-frequency) signaling by pressing the appropriate number key or key combination on the phone or other device. The UX service 315 and/or other network elements 310 in the VoIP network 210 can then initiate the reconnection options to the local party in response to the received DTMF signaling from the remote party.
Some aspects of the method 1200 may be performed on VCC-equipped mobile device 110. For example, the mobile device can be configured with functionality and/or components implemented in code that is instantiated in various ones of applications, middleware, operating system, firmware, and hardware (or combinations and sub-combinations thereof) that execute on the mobile device 110 to support the present user experiences. Other aspects of the method 1200 can be implemented using the UX service 315 (
In step 1205, the UX service 315 monitors a currently active call between the local and remote parties for audio disruptions. In step 1210, when a disruption is detected, the type of disruption is determined. For example, a detected disruption may be one of the types shown in table 500 in
In step 1235, if the detected disruption is a long disruption, then active mitigations can be implemented. These include implementing active mitigations using audio by playing audio tones at the audio endpoint of the mobile device 110 for the local party in step 1240. Active mitigations using audio can be implemented for the remote party by the UX service 315 by playing an audio announcement (which can be looped) in step 1245 and/or by playing audio tones in step 1250.
Active mitigations using the GUI on the mobile device 110 may be implemented for the local party in step 1255 by indicting a handover is in progress, as illustratively shown in
In step 1270, if the detected disruption is an irrecoverable disruption, then the call with the local party is disconnected and all the mitigations are discontinued. Post-call options are provided to the local party in step 1275 on the GUI of the mobile device 110. These options may include calling back the remote party, sending a message to the remote party, or setting a reminder, as illustratively shown in
Post-call options are provided to the remote party in step 1280 by the UX service 315 playing an audio menu as shown in
A number of program modules may be stored on the hard disk 1328, magnetic disk 1333, optical disk 1343, ROM 1317, or RAM 1321, including an operating system 1355, one or more application programs 1357, other program modules 1360, and program data 1363. A user may enter commands and information into the computer system 1300 through input devices such as a keyboard 1366 and pointing device 1368 such as a mouse. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, trackball, touchpad, touch screen, touch-sensitive device, voice-command module or device, user motion or user gesture capture device, or the like. These and other input devices are often connected to the processor 1305 through a serial port interface 1371 that is coupled to the system bus 1314, but may be connected by other interfaces, such as a parallel port, game port, or universal serial bus (USB). A monitor 1373 or other type of display device is also connected to the system bus 1314 via an interface, such as a video adapter 1375. In addition to the monitor 1373, personal computers typically include other peripheral output devices (not shown), such as speakers and printers. The illustrative example shown in
The computer system 1300 is operable in a networked environment using logical connections to one or more remote computers, such as a remote computer 1388. The remote computer 1388 may be selected as another personal computer, a server, a router, a network PC, a peer device, or other common network node, and typically includes many or all of the elements described above relative to the computer system 1300, although only a single representative remote memory/storage device 1390 is shown in
When used in a LAN networking environment, the computer system 1300 is connected to the local area network 1393 through a network interface or adapter 1396. When used in a WAN networking environment, the computer system 1300 typically includes a broadband modem 1398, network gateway, or other means for establishing communications over the wide area network 1395, such as the Internet. The broadband modem 1398, which may be internal or external, is connected to the system bus 1314 via a serial port interface 1371. In a networked environment, program modules related to the computer system 1300, or portions thereof, may be stored in the remote memory storage device 1390. It is noted that the network connections shown in
The architecture 1400 illustrated in
The mass storage device 1412 is connected to the CPU 1402 through a mass storage controller (not shown) connected to the bus 1410. The mass storage device 1412 and its associated computer-readable storage media provide non-volatile storage for the architecture 1400.
Although the description of computer-readable storage media contained herein refers to a mass storage device, such as a hard disk or CD-ROM drive, it should be appreciated by those skilled in the art that computer-readable storage media can be any available storage media that can be accessed by the architecture 1400.
By way of example, and not limitation, computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. For example, computer-readable media includes, but is not limited to, RAM, ROM, EPROM (erasable programmable read only memory), EEPROM (electrically erasable programmable read only memory), Flash memory or other solid state memory technology, CD-ROM, DVDs, HD-DVD (High Definition DVD), Blu-ray, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the architecture 1400.
According to various embodiments, the architecture 1400 may operate in a networked environment using logical connections to remote computers through a network. The architecture 1400 may connect to the network through a network interface unit 1416 connected to the bus 1410. It should be appreciated that the network interface unit 1416 also may be utilized to connect to other types of networks and remote computer systems. The architecture 1400 also may include an input/output controller 1418 for receiving and processing input from a number of other devices, including a keyboard, mouse, or electronic stylus (not shown in
It should be appreciated that the software components described herein may, when loaded into the CPU 1402 and executed, transform the CPU 1402 and the overall architecture 1400 from a general-purpose computing system into a special-purpose computing system customized to facilitate the functionality presented herein. The CPU 1402 may be constructed from any number of transistors or other discrete circuit elements, which may individually or collectively assume any number of states. More specifically, the CPU 1402 may operate as a finite-state machine, in response to executable instructions contained within the software modules disclosed herein. These computer-executable instructions may transform the CPU 1402 by specifying how the CPU 1402 transitions between states, thereby transforming the transistors or other discrete hardware elements constituting the CPU 1402.
Encoding the software modules presented herein also may transform the physical structure of the computer-readable storage media presented herein. The specific transformation of physical structure may depend on various factors, in different implementations of this description. Examples of such factors may include, but are not limited to, the technology used to implement the computer-readable storage media, whether the computer-readable storage media is characterized as primary or secondary storage, and the like. For example, if the computer-readable storage media is implemented as semiconductor-based memory, the software disclosed herein may be encoded on the computer-readable storage media by transforming the physical state of the semiconductor memory. For example, the software may transform the state of transistors, capacitors, or other discrete circuit elements constituting the semiconductor memory. The software also may transform the physical state of such components in order to store data thereupon.
As another example, the computer-readable storage media disclosed herein may be implemented using magnetic or optical technology. In such implementations, the software presented herein may transform the physical state of magnetic or optical media, when the software is encoded therein. These transformations may include altering the magnetic characteristics of particular locations within given magnetic media. These transformations also may include altering the physical features or characteristics of particular locations within given optical media to change the optical characteristics of those locations. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this discussion.
In light of the above, it should be appreciated that many types of physical transformations take place in the architecture 1400 in order to store and execute the software components presented herein. It also should be appreciated that the architecture 1400 may include other types of computing devices, including handheld computers, embedded computer systems, smartphones, PDAs, and other types of computing devices known to those skilled in the art. It is also contemplated that the architecture 1400 may not include all of the components shown in
The illustrated mobile device 110 can include a controller or processor 1510 (e.g., signal processor, microprocessor, microcontroller, ASIC (Application Specific Integrated Circuit), or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions. An operating system 1512 can control the allocation and usage of the components 1502, including power states, above-lock states, and below-lock states, and provides support for one or more application programs 1514. The application programs can include common mobile computing applications (e.g., image-capture applications, email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application.
The illustrated mobile device 110 can include memory 1520. Memory 1520 can include non-removable memory 1522 and/or removable memory 1524. The non-removable memory 1522 can include RAM, ROM, Flash memory, a hard disk, or other well-known memory storage technologies. The removable memory 1524 can include Flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM (Global System for Mobile communications) systems, or other well-known memory storage technologies, such as “smart cards.” The memory 1520 can be used for storing data and/or code for running the operating system 1512 and the application programs 1514. Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks.
The memory 1520 may also be arranged as, or include, one or more computer-readable storage media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, Flash memory or other solid state memory technology, CD-ROM (compact-disc ROM), DVD, (Digital Versatile Disc) HD-DVD (High Definition DVD), Blu-ray, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the mobile device 110.
The memory 1520 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment. The mobile device 110 can support one or more input devices 1530; such as a touch screen 1532; microphone 1534 for implementation of voice input for voice recognition, voice commands and the like; camera 1536; physical keyboard 1538; trackball 1540; and/or proximity sensor 1542; and one or more output devices 1550, such as a speaker 1552 and one or more displays 1554. Other input devices (not shown) using gesture recognition may also be utilized in some cases. Other possible output devices (not shown) can include piezoelectric or haptic output devices. Some devices can serve more than one input/output function. For example, touchscreen 1532 and display 1554 can be combined into a single input/output device.
A wireless modem 1560 can be coupled to an antenna (not shown) and can support two-way communications between the processor 1510 and external devices, as is well understood in the art. The modem 1560 is shown generically and can include a cellular modem for communicating with the mobile communication network 1504 and/or other radio-based modems (e.g., Bluetooth 1564 or Wi-Fi 1562). The wireless modem 1560 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN).
The mobile device can further include at least one input/output port 1580, a power supply 1582, a satellite navigation system receiver 1584, such as a Global Positioning System (GPS) receiver, an accelerometer 1586, a gyroscope (not shown), and/or a physical connector 1590, which can be a USB port, IEEE 1394 (FireWire) port, and/or an RS-232 port. The illustrated components 1502 are not required or all-inclusive, as any component can be deleted and other components can be added.
Based on the foregoing, it should be appreciated that technologies for user experiences during call handovers on a hybrid telecommunications network have been disclosed herein. Although the subject matter presented herein has been described in language specific to computer structural features, methodological and transformative acts, specific computing machinery, and computer-readable storage media, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features, acts, or media described herein. Rather, the specific features, acts, and mediums are disclosed as example forms of implementing the claims.
The subject matter described above is provided by way of illustration only and should not be construed as limiting. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the present invention, which is set forth in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6148206 | Karanja et al. | Nov 2000 | A |
6335927 | Elliott et al. | Jan 2002 | B1 |
6343220 | Van Der Salm | Jan 2002 | B1 |
6490449 | Thibert et al. | Dec 2002 | B1 |
6518957 | Lehtinen | Feb 2003 | B1 |
6763226 | McZeal, Jr. | Jul 2004 | B1 |
7010002 | Chow et al. | Mar 2006 | B2 |
7110750 | Oishi et al. | Sep 2006 | B2 |
7411911 | Huotari et al. | Aug 2008 | B2 |
7483984 | Jonker et al. | Jan 2009 | B1 |
7631270 | Cunningham et al. | Dec 2009 | B2 |
7697479 | Metke et al. | Apr 2010 | B2 |
7706291 | Luft et al. | Apr 2010 | B2 |
7746989 | Mazor | Jun 2010 | B2 |
7796998 | Zellner et al. | Sep 2010 | B1 |
7830863 | Biage et al. | Nov 2010 | B2 |
7835751 | Ibe | Nov 2010 | B2 |
7894807 | Drennan | Feb 2011 | B1 |
7903794 | Bales et al. | Mar 2011 | B1 |
7986943 | Bumiller | Jul 2011 | B2 |
7995565 | Buckley et al. | Aug 2011 | B2 |
8000710 | Jagadeesan et al. | Aug 2011 | B2 |
8032122 | Sigmund et al. | Oct 2011 | B2 |
8126465 | Lu et al. | Feb 2012 | B2 |
8155084 | Long et al. | Apr 2012 | B2 |
8254986 | Russell | Aug 2012 | B2 |
8976950 | Kramarenko | Mar 2015 | B2 |
9001787 | Conant | Apr 2015 | B1 |
20020059453 | Eriksson et al. | May 2002 | A1 |
20020146000 | Jonsson et al. | Oct 2002 | A1 |
20030231759 | Bedingfield, Sr. et al. | Dec 2003 | A1 |
20040047339 | Wang et al. | Mar 2004 | A1 |
20040121761 | Tripathy et al. | Jun 2004 | A1 |
20040203607 | Satapathy | Oct 2004 | A1 |
20040240430 | Lin et al. | Dec 2004 | A1 |
20050070291 | Shi | Mar 2005 | A1 |
20050186960 | Jiang | Aug 2005 | A1 |
20050249196 | Ansari et al. | Nov 2005 | A1 |
20050286466 | Tagg et al. | Dec 2005 | A1 |
20060029049 | Kobayashi et al. | Feb 2006 | A1 |
20060030357 | Jiang | Feb 2006 | A1 |
20060045069 | Zehavi et al. | Mar 2006 | A1 |
20060121902 | Jagadeesan et al. | Jun 2006 | A1 |
20060133582 | McCulloch | Jun 2006 | A1 |
20060187900 | Akbar | Aug 2006 | A1 |
20060198360 | Biage et al. | Sep 2006 | A1 |
20060245413 | Skalecki et al. | Nov 2006 | A1 |
20070070948 | Kezys et al. | Mar 2007 | A1 |
20070081518 | Jain et al. | Apr 2007 | A1 |
20070083918 | Pearce et al. | Apr 2007 | A1 |
20070086584 | Rossini | Apr 2007 | A1 |
20070197224 | Winkler | Aug 2007 | A1 |
20070206568 | Silver | Sep 2007 | A1 |
20070206571 | Silver | Sep 2007 | A1 |
20070217366 | Sagi et al. | Sep 2007 | A1 |
20070263613 | Hara et al. | Nov 2007 | A1 |
20080026732 | Goldfarb | Jan 2008 | A1 |
20080032695 | Zhu et al. | Feb 2008 | A1 |
20080056235 | Albina et al. | Mar 2008 | A1 |
20080096560 | Felske et al. | Apr 2008 | A1 |
20080102815 | Sengupta et al. | May 2008 | A1 |
20080113683 | Paas | May 2008 | A1 |
20080123625 | Buckley | May 2008 | A1 |
20080192900 | Liu | Aug 2008 | A1 |
20080232352 | Terrill et al. | Sep 2008 | A1 |
20080242299 | Edwards | Oct 2008 | A1 |
20080254797 | Achtari et al. | Oct 2008 | A1 |
20080279176 | Cheng | Nov 2008 | A1 |
20090003316 | Lee | Jan 2009 | A1 |
20090086937 | Horn et al. | Apr 2009 | A1 |
20090097450 | Wallis et al. | Apr 2009 | A1 |
20090141682 | Zou et al. | Jun 2009 | A1 |
20090191876 | Jain et al. | Jul 2009 | A1 |
20090233602 | Hughes | Sep 2009 | A1 |
20090249247 | Tseng | Oct 2009 | A1 |
20090285175 | Nix | Nov 2009 | A1 |
20090305732 | Marcellino | Dec 2009 | A1 |
20100080128 | Hovey et al. | Apr 2010 | A1 |
20100124897 | Edge | May 2010 | A1 |
20100172323 | Rexhepi et al. | Jul 2010 | A1 |
20100172483 | Weiner | Jul 2010 | A1 |
20100226339 | Stephenson et al. | Sep 2010 | A1 |
20100246785 | Wang | Sep 2010 | A1 |
20100285785 | Wang | Nov 2010 | A1 |
20100304724 | Lawler | Dec 2010 | A1 |
20100316199 | Martin, II | Dec 2010 | A1 |
20110044293 | Nagasawa | Feb 2011 | A1 |
20110103576 | Partington et al. | May 2011 | A1 |
20120014273 | Notton et al. | Jan 2012 | A1 |
20120115490 | Nicholson et al. | May 2012 | A1 |
20120120914 | Sedlacek et al. | May 2012 | A1 |
20120196644 | Scherzer et al. | Aug 2012 | A1 |
20120236868 | Yan | Sep 2012 | A1 |
20120296963 | Lu | Nov 2012 | A1 |
20130007286 | Mehta et al. | Jan 2013 | A1 |
20130035138 | Abbott | Feb 2013 | A1 |
20130064106 | Sylvain | Mar 2013 | A1 |
20130067056 | Purkayastha et al. | Mar 2013 | A1 |
20130100887 | Kim | Apr 2013 | A1 |
20130196706 | Patel et al. | Aug 2013 | A1 |
20130331101 | Thomas et al. | Dec 2013 | A1 |
20140068314 | Kim | Mar 2014 | A1 |
20140070991 | Liu | Mar 2014 | A1 |
20140254491 | Lindholm et al. | Sep 2014 | A1 |
20140269495 | Frantz | Sep 2014 | A1 |
20150038156 | Kilpatrick, II | Feb 2015 | A1 |
20150065134 | Vandemoere et al. | Mar 2015 | A1 |
Number | Date | Country |
---|---|---|
101656922 | Feb 2010 | CN |
1432219 | Jun 2004 | EP |
1519526 | Mar 2005 | EP |
1858270 | Nov 2007 | EP |
2009887 | Dec 2008 | EP |
2096843 | Sep 2009 | EP |
2112849 | Oct 2009 | EP |
2271171 | Jan 2011 | EP |
2002-262336 | Sep 2002 | JP |
0013454 | Mar 2000 | WO |
0211475 | Feb 2002 | WO |
2004057845 | Jul 2004 | WO |
2005055626 | Jun 2005 | WO |
2005101785 | Oct 2005 | WO |
2008110664 | Sep 2008 | WO |
2009040645 | Apr 2009 | WO |
2013025698 | Feb 2013 | WO |
Entry |
---|
“International Search Report and Written Opinion Issued in PCT Patent Application No. PCT/US2015/020848”, Mailed Date: Jun. 9, 2015, (11 Pages total). |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2014/068685”, Mailed Date: Jun. 26, 2015, (6 Pages total). |
“International Search Report & Written Opinion Received for PCT Application No. PCT/US2015/023453”, Mailed Date: Jun. 22, 2015, (12 Pages total). |
Whitwam, Ryan, “Republic Wireless Moto X Review: A Great Deal with Very Few Compromises”, Published on: Dec. 4, 2013, Available at: http://www.androidpolice.com/2013/12/03/republic-wireless-moto-x-review-a-great-deal-with-very-few-compromises/ (12 pages total). |
Bellavista, et al., “An IMS Vertical Handoff Solution to Dynamically Adapt Mobile Mulitmedia Services”, IEEE Symposium on Computers and Communications, Jul. 6, 2008, pp. 764-771, 8 pages. |
Perenson, Melissa, “Republic Wireless: Everything You Need to Know”, Published on: Aug. 28, 2013, Available at: http://blog.laptopmag.com/republic-wireless-faq (6 pages total). |
“ip4calls-iTelHybridDialer”, Published on: Jul. 17, 2013, Available at: https://play.google.com/store/apps/details?id=com.revesoft.hybriddialer.first—united—international—general—trading—.ip4calls&hl=en (2 pages total). |
Whitwam, Ryan, “A Google Engineer Explains Why KitKat has White Status Bar Icons and Only Shows Connectivity in Quick Settings”, Published on: Nov. 18, 2013, Available at: http://www.androidpolice.com/2013/11/18/a-google-engineer-explains-why-kitkat-has-white-status-bar-icons-and-only-shows-connectivity-in-quick-settings/ (9 pages total). |
Ormond, et al., “Dynamic Network Selection in Wireless LAN/MAN Heterogeneous Networks”, In Proceedings of Mobile WiMAX: Towards Broadband Wireless Metropolitan Area Networks, Dec. 10, 2007, (60 pages total). |
Alkhwlani, et al., “Access Network Selection using Combined Fuzzy Control and MCDM in Heterogeneous Networks”, In Proceedings of International Conference on Computer Engineering & Systems, Nov. 27, 2007, (6 pages total). |
Porjazoski, et al., “Radio Access Technology Selection in Heterogeneous Wireless Networks Based on Service Type and User Mobility”, In Proceedings of 18th International Conference on Systems, Signals and Image Processing, Jun. 16, 2011, (4 pages total). |
Adamopoulou, et al., “Intelligent Access Network Selection in Heterogeneous Networks”, In 2nd International Symposium on Wireless Communication Systems, Sep. 7, 2005, (5 pages total). |
Alkhawlani, et al., “Hybrid Approach for Radio Network Selection in Heterogeneous Wireless Networks”, In International Journal of Advanced Science and Technology, vol. 44, Jul. 2012, (16 pages total). |
Cai, et al., “Dynamic and User-Centric Network Selection in Heterogeneous Networks”, In Proceedings of IEEE International Performance, Computing, and Communications Conference, Apr. 11, 2007, (7 pages total). |
Gharsellaoui, et al., “Optimizing Access Point Selection in Wireless Local Area Networks”, In Proceedings of International Conference on Communications and Information Technology, Mar. 29, 2011, (6 pages total). |
Achour et al., “Inter-Domain Mobility Management Solution for Service Continuity in IMS-Based Networks”, IEEE Consumer Communications and Networking Conference, Jan. 14, 2012, pp. 559-564, 6 pages. |
Calhan, et al., “An Adaptive Neuro-Fuzzy Based Vertical Handoff Decision Algorithm for Wireless Heterogeneous Networks”, In IEEE 21st International Symposium Personal Indoor and Mobile Radio Communications, Sep. 26, 2010, (6 pages total). |
Yan, et al., “A Survey of Vertical Handover Decision Algorithms in Fourth Generation Heterogeneous Wireless Networks”, In Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, Issue 11, Aug. 2010, (16 pages total). |
Liu, et al., “Performance Analysis and Optimization of Handoff Algorithms in Heterogeneous Wireless Networks”, In IEEE Transactions on Mobile Computing, vol. 7, Issue 7, Jul. 2008, (12 pages total). |
Wong, et al., “A Pattern Recognition System for Handoff Algorithms”, In IEEE Journal on Selected Areas in Communications, vol. 18, Issue 7, Jul. 2000, (12 pages total). |
“Optimal Call Routing”, Retrieved on: Dec. 31, 2013, Available at: http://www.bics.com/content/ocr (2 pages total). |
Kalmanek, et al., “A Network-Based Architecture for Seamless Mobility Services”, In IEEE Communications Magazine, vol. 44, Issue 6, Jun. 2006 (7 pages total). |
Salkintzis, et al., “Voice Call Handover Mechanisms in Next-Generation 3GPP Systems”, In IEEE Communications Magazine, vol. 47, Issue 2, pp. 46-56, Feb. 2009 (11 pages total). |
Voice Call Flow Overview, 2007 Cisco Systems, Inc., pp. 1-14, Retrieved from: http://www.cisco.com/en/US/docs/ios/voice/monitor/configuration/guide/vt—callflow—ov.pdf, Retrieved on: Jun. 17, 2013 (14 pages total). |
J. Rosenberg, “Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols”, IETF Trust (Apr. 2010), Retrieved from: http://www.rfc-editor.org/rfc/rfc5245.txt, Retrieved on: Sep. 12, 2013 (110 pages total). |
M. Baugher, et al., “The Secure Real-time Transport Protocol (SRTP)”, The Internet Society (Mar. 2004), Retrieved from: http://www.rfc-editor.org/rfc/rfc3711.txt, Retrieved on: Sep. 12, 2013 (53 pages total). |
J. Rosenberg, et al., “SIP: Session Initiation Protocol”, The Internet Society (Jun. 2002), Retrieved from: http://www.rfc-editor.org/rfc/rfc3261.txt, Retrieved on: Sep. 12, 2013 (252 pages total). |
H. Schulzrinne, et al., “RTP: A Transport Protocol for Real-Time Applications”, The Internet Society (Jul. 2003), Retrieved from: http://www.rfc-editor.org/rfc/rfc3550.txt, Retrieved on: Sep. 12, 2013 (98 pages total). |
Bryan, et al., “SOSIMPLE: A SIP/SIMPLE Based P2P VoIP and IM System,” Computer Science Department, College a of William and Mary, Williamsburg, VA, Retrieved from: http://www.enseirb.fr/˜kadionik/sip/paper, Retrieved Date: Sep. 16, 2013 (6 pages total). |
Rauhala, J., “Universal SIP client for consumer devices,” Helsinki University of Technology, Department of Electrical Communications Engineering, Thesis submitted May 13, 2003, Retrieved from: http://scholar.google.com/url?sa=U&q=http://antoine.fressancourt.free.fr/exjobb/BX—Universal, Retrieved Date: Sep. 16, 2013 (64 pages total). |
Santos, et al., “Deployment of a Wireless Hybrid and Mobile Network for VoIP Services Based on Open Source Software,” Universidade Federal de Campina Grande, Retrieved From: http:/www.inf.int-evry.fr/˜olberger/wfs2006/danilo, Retrieved Date: Sep. 16, 2013 (20 pages total). |
“Route to Home”, Published on: Mar. 10, 2012, Available at: http://www.inovar.com/products/RouteToHome.html (1 page total). |
“Smart Call Routing”, Retrieved on: Dec. 31, 2013, Available at: http://www.roamware.com/downloads/datasheets/Smart%20Call%20Routing.pdf (2 pages total). |
“Roaming Call Optimizer,” Published on: Mar. 22, 2011, Available at: http://www.starhome.com/call-optimization.html (1 page total). |
“Mobile Collaboration”, Retrieved on: Dec. 31, 2013, Available at: http://www.cisco.com/en/US/docs/voice—ip—comm/cucm/srnd/collab09/mobilapp.htmln (39 pages total). |
“International Search Report and Written Opinion Received for PCT Patent Application No. PCT/US2014/068685”, Mailed Date: Feb. 11, 2015, 7 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2015/39310”, Mailed Date: Oct. 14, 2015, (10 Pages total). |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2015/028679”, Mailed Date: Aug. 26, 2015, (11 Pages total). |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2014/054633”, Mailed Date: Aug. 21, 2015, 6 Pages total. |
Ryan Whitman, “A Google Engineer Explains Why KitKat Has White Status Bar Icons and Only Shows Connectivity in Quick Settings”, available at <http://www.androidpolice.com/2013/11 /1 8/a-goog le-eng ineer-explains-why-kitkat-has-wh ite-status-baricons-and-only-shows-connectivity-in-quick-settings/>, available on Nov. 18, 2013, (3 pages total). |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2015/056290”, Mailed Date: Feb. 1, 2016, (15 Pages total). |
“Second Written Opinion Issued in PCT Application No. PCT/US2015/023453”, Mailed Date: Mar. 1, 2016, 6 Pages. |
Number | Date | Country | |
---|---|---|---|
20150289168 A1 | Oct 2015 | US |