Caller name identification using data structure synchronization of a wireline network and a wireless network

ABSTRACT

A device may receive a request to enable service on a wireless network for a user device. The user device may be associated with a wired network. The device may request network provisioning information, associated with the wired network, identifying service activation parameters. The device may provision the wireless network based on the request for network provisioning associated with the wired network. The device may synchronize caller information to a first caller information device, associated with the wireless network, from a second caller information device, associated with the wired network. The caller information may include caller identification information. The device may enable the service for the user device on the wireless network based on provisioning the wireless network and synchronizing the caller information to the first caller information device from the second caller information device.

BACKGROUND

Wireline connections may be vulnerable to interruptions due to naturaldisasters, accidental wire damage, etc. A wireline user may opt toutilize a wireless connection provided by a wireless service provider,by connecting via a bridge device, while maintaining subscriptionservice provided by the wireline service provider.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A and 1B are diagrams of an overview of an example implementationdescribed herein;

FIG. 2 is a diagram of an example environment in which systems and/ormethods described herein may be implemented;

FIG. 3 is a diagram of example components of one or more devices of FIG.2;

FIG. 4 is a flow chart of an example process for synchronizing callerinformation for wireline user devices using a wireless network;

FIGS. 5A and 5B are diagrams of an example implementation relating tothe example process shown in FIG. 4;

FIG. 6 is a flow chart of an example process for providing caller nameidentification, of wireline user devices using a wireless network, usinga synchronized data structure; and

FIGS. 7A-7C are diagrams of an example implementation relating to theexample process shown in FIG. 6.

DETAILED DESCRIPTION

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

A wireline network service provider may provide a user device with theoption to enable wireless network services (e.g., via a networkcollaboration agreement with a wireless network service provider) inregions where phone services are commonly interrupted, such as hurricanezones, construction areas, or the like. The user device may use a bridgedevice to connect legacy equipment (e.g., a wired phone) to a wirelessnetwork. A caller information device (e.g., a line information database(LIDB) device) may be used to store caller information, such as calleridentification information, caller location information, or the like.

The wireline network service provider may maintain a wireline callerinformation device that is separate from the wireless caller informationdevice associated with the wireless network service provider. In orderto provide caller identification information, when receiving a call fromthe user device, the wireless network service provider may access thewireline caller identification device associated with the wired networkservice provider. However, querying the wireline caller identificationdevice associated with the wireline network service provider may resultin network latency and increased cost for the network service providers.Implementations described herein may assist a wireless network serviceprovider in providing caller identification information by synchronizingthe wireless caller information device associated with the wirelessnetwork service provider and the wireline caller information deviceassociated with the wireline network service provider.

FIGS. 1A and 1B are diagrams of an overview of an example implementation100 described herein. Example implementation 100 may include a wirelinenetwork, a first user device, a bridge device, a wireline callerinformation device, a wireless network, a network device, and a wirelesscaller information device.

As shown in FIG. 1A, the first user device, the bridge device, and thewireline caller information device may be associated with the wirelinenetwork, and the network device and the wireless caller informationdevice may be associated with the wireless network. The network devicemay receive a request for a network service (e.g., wireless networkservice) from a user of the first user device (e.g., via the first userdevice, the bridge device, a network operator, another network device(not shown), etc.).

As further shown in FIG. 1A, the network device may request networkprovisioning and caller information synchronization from the wirelinenetwork (e.g., from a device associated with the wireline network). Thewireline network may authenticate the wireless caller informationdevice, and the wireline network and the network device may open acommunication channel (e.g., a file transfer protocol (FTP) channel, asecure shell file transfer protocol (SFTP) channel, etc.) between thewireline caller information device and the wireless caller informationdevice for caller information synchronization. The caller informationsynchronization may include providing caller identification informationassociated with the first user device to the wireless caller informationdevice for storage. The wireline network may provide provisioninginformation (e.g., service information, etc.) to the network device, andthe network device may enable the first user device to use the wirelessnetwork (e.g., via the bridge device).

As shown in FIG. 1B, the first user device may place a call (e.g., aphone call intended for a second user device). The call may betransmitted to the network device via the bridge device. The networkdevice may determine that the second user device is capable of receivingcaller information. The network device may query the wireless callerinformation device to determine caller information (e.g., calleridentification information) associated with the first user device. Thewireless caller information device, which is synchronized with thewireline caller information device, may provide caller information,associated with the first user device and stored during the initialcaller information synchronization and/or during subsequentsynchronizations, to the network device. The network device may providethe caller information (e.g., the caller name, the caller number, and/orthe caller location), via the wireless network, to the second userdevice (e.g., for display by the second user device). In this way,caller identification information, associated with a wireline userdevice connecting to a wireless network via a bridge device, may beprovided without requiring real-time queries to a wireline callerinformation device.

FIG. 2 is a diagram of an example environment 200 in which systemsand/or methods described herein may be implemented. As shown in FIG. 2,environment 200 may include user devices 210-1 and 210-2 (hereinafterreferred to collectively as “user devices 210,” and individually as“user device 210”), a bridge device 220, network devices 230-1 and 230-2(hereinafter referred to collectively as “network devices 230,” andindividually as “network device 230”), caller information devices 240-1and 240-2 (hereinafter referred to collectively as “caller informationdevices 240,” and individually as “caller information device 240”), andnetworks 250-1 and 250-2 (hereinafter referred to collectively as“networks 250,” and individually as “network 250”). Devices ofenvironment 200 may interconnect via wired connections, wirelessconnections, or a combination of wired and wireless connections.

User device 210 may include one or more devices capable of placing acall to, or receiving a call from, another user device 210. For example,user device 210 may include a mobile phone (e.g., a smart phone), aradiotelephone, a personal communications system (PCS) terminal (e.g.,that may combine a cellular radiotelephone with data processing and datacommunications capabilities), a personal digital assistant (PDA) (e.g.,that may include a radiotelephone, a pager, Internet/intranet access,etc.), a computer (e.g., a desktop computer, a laptop computer, a tabletcomputer, etc.), or a similar type of device. In some implementations,user device 210 may include a wired phone connected to a wirelessnetwork 250 via bridge device 220. In some implementations, user device210 may include a phone (e.g., a wired phone, a wireless phone, etc.)receiving a call (e.g., via network 250) from another user device 210that is connected to network 250 via bridge device 220. In someimplementations, user device 210 may be capable of displaying callerinformation (e.g., caller identification information).

Bridge device 220 may include one or more devices capable of bridgingnetwork traffic between user device 210 and network 250. For example,bridge device 220 may include a network device, such as a router, agateway, a hub, a bridge, a switch, or the like. In someimplementations, bridge device 220 may connect to a wired user device210 and provide access to network 250 (e.g., a wireless network). Insome implementations, bridge device 210 may include a one times (1×)Radio Transmission Technology (RTT) device. Additionally, oralternatively, bridge device 210 may include a fixed wireless terminal.

Network device 230 may include one or more devices capable of receiving,processing, transferring and/or providing network traffic (e.g., betweenuser devices 210) via network 250. For example, network device 230 mayinclude a base station, a server, a router, a gateway, a hub, a bridge,a switch, or the like, capable of receiving a request for a connectionfrom a first user device 210 to a second user device 210 (e.g., vianetwork 250), and providing the connection. In some implementations,network device 230 may request and receive caller information (e.g.,caller identification information) from caller information device 240.In some implementations, a first network device 230 may provideprovisioning information, associated with user device 210, to a secondnetwork device 230.

Caller information device 240 may include one or more devices capable ofreceiving, generating, processing, storing, and/or providing callerinformation to network device 230. For example, caller informationdevice 240 may include a server device, such as a line informationdatabase (LIDB) device, a home subscriber server (HSS), or the like,capable of storing and/or providing caller information associated withuser device 210. In some implementations, caller information device 240may be associated with network 250 and/or network device 230. In someimplementations, a first caller information device 240 may providestored caller information to a second caller information device 240(e.g., by synchronizing with second caller information device 240).

Network 250 may include one or more wired and/or wireless networks. Forexample, network 250 may include a cellular network (e.g., a long termevolution (LTE) network, a code division multiple access (CDMA) network,etc.), a public land mobile network (PLMN), a Wi-Fi network, a localarea network (LAN), a wide area network (WAN), a metropolitan areanetwork (MAN), a telephone network (e.g., the Public Switched TelephoneNetwork (PSTN)), an ad hoc network, an intranet, the Internet, a fiberoptic-based network, and/or a combination of these or other types ofnetworks. In some implementations, network 250 may include one or moreconnections between user device 210, bridge device 220, network device230, and/or caller information device 240. In some implementations,network 250 may be associated with network device 230 and/or a networkservice provider.

The number of devices and networks shown in FIG. 2 is provided as anexample. In practice, there may be additional devices and/or networks,fewer devices and/or networks, different devices and/or networks, ordifferently arranged devices and/or networks than those shown in FIG. 2.Furthermore, two or more devices shown in FIG. 2 may be implementedwithin a single device, or a single device shown in FIG. 2 may beimplemented as multiple, distributed devices. For example, while networkdevice 230 and caller information device 240 are shown as separatedevices, network device 230 and caller information device 240 may beimplemented in a single device. Additionally, one or more of the devicesof environment 200 may perform one or more functions described as beingperformed by another one or more devices of environment 200.

FIG. 3 is a diagram of example components of a device 300. Device 300may correspond to user device 210, bridge device 220, network device230, and/or caller information device 240. In some implementations, eachof user device 210, bridge device 220, network device 230, and/or callerinformation device 240 may include one or more devices 300 and/or one ormore components of device 300. As shown in FIG. 3, device 300 mayinclude a bus 310, a processor 320, a memory 330, an input component340, an output component 350, and a communication interface 360.

Bus 310 may include a path that permits communication among thecomponents of device 300. Processor 320 may include a processor (e.g., acentral processing unit, a graphics processing unit, an acceleratedprocessing unit), a microprocessor, and/or any processing component(e.g., a field-programmable gate array (FPGA), an application-specificintegrated circuit (ASIC), etc.) that interprets and/or executesinstructions. Memory 330 may include a random access memory (RAM), aread only memory (ROM), and/or another type of dynamic or static storagedevice (e.g., a flash, magnetic, or optical memory) that storesinformation and/or instructions for use by processor 320.

Input component 340 may include a component that permits a user to inputinformation to device 300 (e.g., a touch screen display, a keyboard, akeypad, a mouse, a button, a switch, etc.). Output component 350 mayinclude a component that outputs information from device 300 (e.g., adisplay, a speaker, one or more light-emitting diodes (LEDs), etc.).

Communication interface 360 may include a transceiver-like component,such as a transceiver and/or a separate receiver and transmitter, thatenables device 300 to communicate with other devices, such as via awired connection, a wireless connection, or a combination of wired andwireless connections. For example, communication interface 360 mayinclude an Ethernet interface, an optical interface, a coaxialinterface, an infrared interface, a radio frequency (RF) interface, auniversal serial bus (USB) interface, a Wi-Fi interface, a cellularnetwork interface, or the like.

Device 300 may perform one or more processes described herein. Device300 may perform these processes in response to processor 320 executingsoftware instructions included in a computer-readable medium, such asmemory 330. A computer-readable medium may be defined as anon-transitory memory device. A memory device may include memory spacewithin a single physical storage device or memory space spread acrossmultiple physical storage devices.

Software instructions may be read into memory 330 from anothercomputer-readable medium or from another device via communicationinterface 360. When executed, software instructions stored in memory 330may cause processor 320 to perform one or more processes describedherein. Additionally, or alternatively, hardwired circuitry may be usedin place of or in combination with software instructions to perform oneor more processes described herein. Thus, implementations describedherein are not limited to any specific combination of hardware circuitryand software.

The number of components shown in FIG. 3 is provided as an example. Inpractice, device 300 may include additional components, fewercomponents, different components, or differently arranged componentsthan those shown in FIG. 3.

FIG. 4 is a flow chart of an example process 400 for synchronizingcaller information for wireline user devices using a wireless network.In some implementations, one or more process blocks of FIG. 4 may beperformed by network device 230. Additionally, or alternatively, one ormore process blocks of FIG. 4 may be performed by another device or agroup of devices separate from or including network device 230, such asuser device 210, bridge device 220, and/or caller information device240.

As shown in FIG. 4, process 400 may include receiving a request toenable service on a network (block 410). For example, a first networkdevice 230 may receive a request, from user device 210, to enableservice on a first network 250. In this case, user device 210 may beassociated with a second network 250 that includes a second networkdevice 230. In some implementations, the request to enable service onfirst network 250 may be received via bridge device 220, via secondnetwork device 230, etc. In some implementations, the request to enableservice may be a request for a type of access, such as permanent accessto first network 250, temporary access to first network 250 (e.g.,selective access), backup access to first network 250 (e.g., emergencyaccess), or the like. Enabling network service may refer to subscribinguser device 210 to first network 250, and providing the ability toaccess the network. Access may include an ability, by user device 210,to place a call (e.g., a phone call, a voice-over internet protocol(VOIP) call, etc.), to transfer data (e.g., via dial-up internetaccess), etc., via first network 250.

First network 250 may include a wireless network, in someimplementations. For example, in locations where wireline telephony isunreliable, user device 210 may request backup service enablement on awireless network. In this case, second network 250 may include awireline network (e.g., a PSTN). In some implementations, second network250 may be associated with a wireline network service provider for userdevice 210, and may have a service agreement with a wireless networkservice provider, associated with first network 250, permitting userdevices 210 to receive network service associated with (e.g., to connectto) first network 250 while maintaining subscriber services from thewireline network service provider. Subscriber services may includeadministrative services, such as billing service, customer service,phone number localization service, a service plan (e.g., a number ofminutes allowed, etc.), or the like.

The request to enable service on first network 250 may includeinformation associated with approving the service enablement request, insome implementations. For example, a user of user device 210 may provideauthentication information (e.g., information identifying a subscriber,information identifying user device 210, information identifying aservice provider network, etc.), authorization information (e.g., anindication that the user is authorized to request service enablement),etc.

As further shown in FIG. 4, process 400 may include requesting networkprovisioning and caller information synchronization based on receivingthe request to enable service on the network (block 420). For example,first network device 230, associated with first network 250, may requestnetwork provisioning and caller information synchronization, from secondnetwork device 230, associated with second network 250. Provisioninginformation may include information used in providing network serviceenablement and/or network access, such as invoicing information, usersupport information, network connectivity information, user priorityclass information, or the like. Caller information synchronization mayinclude providing caller information to a first caller informationdevice 240, associated with first network 250, from a second callerinformation device 240, associated with second network 250.

For example, when user device 210 (e.g., a user device associated with awireline network) is requesting enablement of service on a wirelessnetwork, caller information stored on wireline caller information device240 (e.g., a caller information device associated with the wirelinenetwork) may be provided to wireless caller information device 240(e.g., a caller information device associated with the wirelessnetwork). Caller information may include information associated withidentifying a caller, such as caller name identification (CNAM)information, caller identification (ID) information, calling lineidentification (CLID) information, calling number identification (CNID)information, or the like.

As further shown in FIG. 4, process 400 may include provisioning thenetwork and synchronizing the caller information (block 430). Forexample, first network device 230 may receive provisioning informationfrom second network device 230, and may confirm that first callerinformation device 240 has been synchronized with second callerinformation device 240.

Synchronizing the caller information may include transferringinformation from second caller information device 240 (e.g., a callerinformation device associated with a wireline network) to first callerinformation device 240 (e.g., a caller information device associatedwith a wireless network). In some implementations, second network device230 may provide authentication information to first network device 230.The authentication information may include information identifying acollaboration agreement (e.g., an agreement to allow synchronizationbetween caller information devices 240), such as a pre-configuredcollaboration agreement, a real-time agreement (e.g., an agreementcreated in response to the request to enable network service), or thelike. In some implementations, first network device 230 may set up acommunication channel between first caller information device 240 andsecond caller information device 240. A communication channel mayinclude a connection for transferring caller information, such as an FTPconnection, an SFTP connection, an FTP over Secure Shell (FTP over SSH)connection, a hypertext transfer protocol (HTTP) connection, or thelike. In some implementations, the transfer may include duplication ofcaller information (e.g., providing a copy of the caller information).

The transfer of caller information (e.g., synchronizing a datastructure, associated with wireline caller information device 240, andanother data structure, associated with wireless caller informationdevice 240) may be based on a single request to enable service on firstnetwork 250, in some implementations. For example, first network device230 may set up the transfer of caller information for each request toenable network service. Additionally, or alternatively, first networkdevice 230 may initiate a transfer based on a threshold quantity ofrequests to enable service on first network 250 (e.g., from a thresholdquantity of user devices). In this case, first network device 230 maystore an indication of the request to enable service on first network250, and may synchronize caller information when the threshold issatisfied. Additionally, or alternatively, first network device 230 mayinitiate a transfer based on a pre-configured time. In this case, firstnetwork device 230 may synchronize caller information at a particulartime and/or after a particular time interval (e.g., once per day, onceper week, etc.).

As further shown in FIG. 4, process 400 may include enabling service onthe network based on provisioning the network and synchronizing thecaller information (block 440). For example, first network device 230may enable service on first network 250 for user device 210 (e.g., viabridge device 220). In some implementations, user device 210 may bedisconnected from second network device 230 (e.g., by being disconnectedfrom second network 250). In some implementations, first network device230 may provide an indication that user device 210 has been connected tofirst network 250. For example, first network device 230 may provide anindication via bridge device 220 that network service is enabled.

In this way, a user device (e.g., a wireline user device) may beconnected to a wireless network (e.g., via a bridge device), andprovisioning information and caller information may be synchronized tothe wireless network from the wireline network to support providingcaller identification information to other user devices.

Although FIG. 4 shows example blocks of process 400, in someimplementations, process 400 may include additional blocks, differentblocks, fewer blocks, or differently arranged blocks than those depictedin FIG. 4. Additionally, or alternatively, two or more of the blocks ofprocess 400 may be performed in parallel.

FIGS. 5A and 5B are diagrams of an example implementation 500 relatingto process 400 shown in FIG. 4. As shown in FIG. 5A, exampleimplementation 500 may include wireline network 250-1, user device 210,wireline network device 230-1, and wireless network device 230-2 (e.g.,connected to wireless network 250-2, not shown). Assume that user device210 and wireline network device 230-1 are associated with wirelinenetwork 250-1. As shown by reference number 510, a user of user device210 transmits a request, to enable wireless network service on wirelessnetwork 250-2, to network operator 520 (e.g., a customer servicerepresentative representing a wireline network service providerassociated with wireline network 250-1). As shown by reference number520, network operator 520 provides authorization of the request towireline network device 230-1. As shown by reference number 530,wireline network device 230-1 provides the request to wireless networkdevice 230-2. As shown by reference number 540, wireless network device230-2 requests network provisioning and requests caller informationsynchronization with wireless caller information device 240-2 (e.g., adevice including access to an LIDB).

As shown in FIG. 5B, and by reference number 550, wireline networkdevice 230-1 provides the network provisioning information to wirelessnetwork device 230-2. As shown by reference number 560, wireline callerinformation device 240-1 synchronizes LIDBs with wireless callerinformation device 240-2 (e.g., provides caller information from awireline LIDB to a wireless LIDB). For example, wireline callerinformation device 240-1 provides caller information (e.g., “SubscriberIdentity: Smith, John”) to wireless caller information device 240-2. Asshown by reference number 570, wireless caller information device 240-2confirms LIDB synchronization to wireless network device 230-2. As shownby reference number 580, wireless network device 230-2 enables networkservice for user device 210 on wireless network 250-2 via bridge device220.

As indicated above, FIGS. 5A and 5B are provided merely as an example.Other examples are possible and may differ from what was described withregard to FIGS. 5A and 5B.

FIG. 6 is a flow chart of an example process 600 for providing callername identification, of wireline user devices using a wireless network,using a synchronized data structure. In some implementations, one ormore process blocks of FIG. 6 may be performed by network device 230.Additionally, or alternatively, one or more process blocks of FIG. 6 maybe performed by another device or a group of devices separate from orincluding network device 230, such as user device 210, bridge device220, and/or caller information device 240.

As shown in FIG. 6, process 600 may include receiving a request, from afirst user device, to place a call to a second user device using anetwork (block 610). For example, network device 230 may receive arequest from first user device 210 (e.g., via bridge device 220) toplace a call to second user device 210 using network 250. A call mayrefer to a connection between first user device 210 and second userdevice 210, such as for a phone call, a data transfer, or the like. Insome implementations, second user device 210 may be connected to network250 via a second bridge device 220. In some implementations, the requestmay be for a connection to multiple user devices 210 (e.g., for a groupcall, a conference call, etc.).

As further shown in FIG. 6, process 600 may include determining callerinformation, associated with the first user device, using a synchronizeddata structure associated with the network (block 620). For example,network device 230 may query caller information device 240 to receivecaller information, from a synchronized LIDB, associated with first userdevice 210. In some implementations, network device 230 may determinecaller information associated with first user device 210 based ondetermining that second user device 210 is capable of receiving thecaller information. For example, network device 230 may query asubscriber information data structure (e.g., an HSS) to determine thecaller information reception capability of second user device 210.

Determining caller information may include receiving caller informationfrom caller information device 240, in some implementations. Forexample, network device 230 may query caller information device 240(e.g., via a service request message) for caller information. In someimplementations, network device 230 may send an identifier of first userdevice 210. For example, network device 230 may provide informationidentifying first user device 210, such as a phone number, a mobiledevice identifier, a Universal Resource Indicator (URI), a UniversalResource Locator (URL), an Internet Protocol (IP) address, or the like.

Caller information device 240 may determine caller information based onthe information identifying first user device 210, in someimplementations. For example, caller information device 240 may map theuser device identifier to provisioning information to determine thatfirst user device 210 is a wireline subscriber that is subscribed towireless service associated with network 250. In this case, callerinformation device 240 may query a synchronized data structure that isassociated with caller information device 240, to determine callerinformation associated with first user device 210, and may provide thecaller information to network device 230. In some implementations, thesynchronized data structure may be an LIDB, associated with network 250,which is synchronized with another LIDB, which is associated withanother network. For example, a first LIDB, associated with network 250,may be synchronized with a second LIDB, associated with the subscriberservice provider of first user device 210, as described herein inconnection with FIG. 4. In this case, caller information device 240 mayaccess caller information associated with first user device 210 byquerying the first LIDB, and without needing to query the second LIDB.

As further shown in FIG. 6, process 600 may include providing the callerinformation to the second user device via the network (block 630). Forexample, network device 230 may provide the caller information (e.g.,caller ID information) to second user device 210, via network 250, fordisplay. In some implementations, the caller information may be providedas part of connecting the call to second user device 210.

In this way, a first network service provider, providing a first networkservice to a first user device associated with a second serviceprovider, may provide caller information associated with the first userdevice to a second user device concurrently with call connection,without querying a data structure associated with the second serviceprovider.

Although FIG. 6 shows example blocks of process 600, in someimplementations, process 600 may include additional blocks, differentblocks, fewer blocks, or differently arranged blocks than those depictedin FIG. 6. Additionally, or alternatively, two or more of the blocks ofprocess 600 may be performed in parallel.

FIGS. 7A-7C are diagrams of an example implementation 700 relating toprocess 600 shown in FIG. 6. As shown in FIG. 7A, example implementation700 includes user device 210-1, bridge device 220-1, wireless networkdevice 230 (e.g., associated with wireless network 250, not shown),bridge device 220-2, and user device 210-2. As shown by reference number710, user device 210-1 places a call via bridge device 220-1. Therequest for the call to be connected (e.g., by wireless network device230) includes information identifying the caller (e.g., “From:(555)-555-5555”) and the recipient (e.g., “To: (555)-234-5678”). Assumethat user device 210-1 is the caller (e.g., “(555)-555-5555”) and userdevice 210-2 is the recipient (e.g., “(555)-234-5678”). As shown byreference number 720, wireless network device 230 determines that therecipient device, user device 210-2, is capable of receiving a caller ID(e.g., a phone number of user device 210-1; a name of a user associatedwith user device 210-1; a location associated with user device 210-1,which may be provided by another network device; etc.).

As shown in FIG. 7B, and by reference number 730, wireless networkdevice 230 requests caller information (e.g., a caller ID) associatedwith user device 210-1. Wireless network device 230 provides the phonenumber associated with user device 210-1 to caller information device240-2 (e.g., a caller information device associated with wirelessnetwork device 230 and network 250). Assume that wireline callerinformation device 240-1 is associated with a wireline network serviceprovider that provides subscriber services to user device 210-1, andthat user device 210-1 is also subscribed to a wireless network serviceprovider (e.g., associated with wireless network device 230 and wirelessnetwork 250) for placing calls.

As shown by reference number 740, wireline caller information device240-1 includes a data structure storing subscriber information that hasbeen pre-synchronized with wireless caller information device 240-2, asdiscussed herein in connection with FIG. 4. As shown by reference number750, wireless caller information device 240-2 includes a database ofinformation identifying wireline subscribers, synchronized from wirelinecaller information device 240-1, as well as wireless subscribers (e.g.,for whom the wireless network service provider provides both networkservices and subscriber services). Wireless caller information device240-2 determines that user device 210-1 is a wireline subscriber andsearches for caller information, associated with user device 210-1,within wireless caller information device 240-2 (e.g., without queryingwireline caller information device 240-1 at the time of the call). Asshown by reference number 760, wireless caller information device 240-2provides a caller ID (e.g., “Subscriber Name: Smith, John”) to wirelessnetwork device 230.

As shown in FIG. 7C, and by reference number 770, wireless networkdevice 230 connects user device 210-1 (e.g., via bridge device 220-1) touser device 210-2 (e.g., via bridge device 220-2), and provides thecaller ID to user device 210-2. As shown by reference number 780, userdevice 210-2 displays the caller ID to identify user device 210-1 to auser of user device 210-2.

As indicated above, FIGS. 7A-7C are provided merely as an example. Otherexamples are possible and may differ from what was described with regardto FIGS. 7A-7C.

Implementations described herein may allow a wireless network deviceassociated with a wireless network to pre-synchronize caller informationfrom a wireline data structure associated with a wireline network to awireless data structure associated with the wireless network.Implementations described herein may further provide caller informationidentifying a first user device, associated with the wireline networkbut making a call via the wireless network, to a second user device, viathe wireless network, by querying the wireless data structure andwithout querying the wireline data structure when the call is beingmade.

The foregoing disclosure provides illustration and description, but isnot intended to be exhaustive or to limit the implementations to theprecise form disclosed. Modifications and variations are possible inlight of the above disclosure or may be acquired from practice of theimplementations.

As used herein, the term component is intended to be broadly construedas hardware, firmware, or a combination of hardware and software.

Some implementations are described herein in conjunction withthresholds. As used herein, satisfying a threshold may refer to a valuebeing greater than the threshold, more than the threshold, higher thanthe threshold, greater than or equal to the threshold, less than thethreshold, fewer than the threshold, lower than the threshold, less thanor equal to the threshold, equal to the threshold, etc.

To the extent the aforementioned implementations collect, store, oremploy personal information provided by individuals, it should beunderstood that such information shall be used in accordance with allapplicable laws concerning protection of personal information.Additionally, the collection, storage, and use of such information maybe subject to consent of the individual to such activity, for examplethrough “opt-in” or “opt-out” processes as may be appropriate for thesituation and type of information. Storage and use of personalinformation may be in an appropriately secure manner reflective of thetype of information, for example, through various encryption andanonymization techniques for particularly sensitive information.

It will be apparent that systems and/or methods, as described herein,may be implemented in many different forms of software, firmware, andhardware in the implementations illustrated in the figures. The actualsoftware code or specialized control hardware used to implement thesesystems and/or methods is not limiting of the implementations. Thus, theoperation and behavior of the systems and/or methods were describedwithout reference to the specific software code—it being understood thatsoftware and hardware can be designed to implement the systems and/ormethods based on the description herein.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of possible implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of possible implementations includes each dependent claim incombination with every other claim in the claim set.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems, and may be used interchangeably with “one or more.” Where onlyone item is intended, the term “one” or similar language is used.Further, the phrase “based on” is intended to mean “based, at least inpart, on” unless explicitly stated otherwise.

What is claimed is:
 1. A device, comprising: one or more processors to:receive a request to enable service, on a wireless network, for a userdevice, the user device being associated with a wired network; requestnetwork provisioning information, associated with the wired network,identifying service activation parameters; provision the wirelessnetwork based on the request for network provisioning informationassociated with the wired network; synchronize caller information to afirst caller information device, associated with the wireless network,from a second caller information device, associated with the wirednetwork, the caller information including caller identificationinformation; and enable the service, for the user device, on thewireless network based on provisioning the wireless network andsynchronizing the caller information to the first caller informationdevice from the second caller information device.
 2. The device of claim1, where the user device is a first user device; and where the one ormore processors are further to: receive a request from the first userdevice to place a call using the wireless network, the call beingintended for a second user device; determine caller informationassociated with the first user device, the caller information beingretrieved from the first caller information device; and provide thecaller information to the second user device.
 3. The device of claim 2,where the one or more processors, when providing the caller informationto the second user device, are further to: provide the callerinformation, to the second user device, for display by the second userdevice.
 4. The device of claim 2, where the one or more processors arefurther to: provide information identifying the first user device to thefirst caller information device, the first caller information deviceincluding a data structure storing caller information, the datastructure having been previously synchronized with the second callerinformation device to receive the information identifying the first userdevice; and receive caller information, associated with the first userdevice, from the first caller information device based on providing theinformation identifying the first user device to the first callerinformation device; and where the one or more processors, whendetermining the caller information associated with the first userdevice, are further to: determine the caller information associated withthe first user device based on receiving the caller information from thefirst caller information device.
 5. The device of claim 2, where the oneor more processors, are further to: determine that the first user deviceis associated with the wired network; determine that the callerinformation associated with the first user device has been stored by thefirst caller information device based on determining that the first userdevice is associated with the wired network; and retrieve the callerinformation from the first caller information device based ondetermining that the caller information associated with the first userdevice has been stored by the first caller information device.
 6. Thedevice of claim 1, where the one or more processors, when synchronizingthe caller information, are further to: provide authenticationinformation to the wired network; determine that authentication has beenestablished; establish a communication channel between the first callerinformation device and the second caller information device based ondetermining that authentication has been established; receive the callerinformation from the second caller information device via thecommunication channel; and store the caller information using the firstcaller information device.
 7. The device of claim 6, where the one ormore processors, when establishing the communication channel between thefirst caller information device and the second caller informationdevice, are further to: provide an indication to the first callerinformation device that the first caller information device is toreceive the caller information from the second caller informationdevice; and receive confirmation that the first caller informationdevice has received the caller information from the second callerinformation device.
 8. The device of claim 1, where the one or moreprocessors are further to: determine a threshold period of time afterwhich the caller information is considered to be out of synchronization;and determine that the threshold period of time has elapsed; and wherethe one or more processors, when synchronizing the caller informationwith the wired network, are further to: synchronize the callerinformation with the wired network based on determining that thethreshold period of time has elapsed.
 9. A computer-readable mediumstoring instructions, the instructions comprising: one or moreinstructions that, when executed by one or more processors, cause theone or more processors to: receive a request to enable network service,for a user device, on a wireless network, the user device beingassociated with a wireline network and being capable of connecting tothe wireless network via a bridge device; query a wireline networkdevice for configuration information associated with enabling networkservice for the user device on the wireless network; request that callerinformation, associated with the user device, be transferred from awireline network caller information device to a data structureassociated with a wireless network caller information device; receive,from the wireless network caller information device, confirmation thatthe caller information has been transferred from the wireline callerinformation device to the data structure associated with the wirelesscaller information device, the confirmation indicating that the datastructure has been synchronized with caller information stored by thewireline caller information device; and enable the network service onthe wireless network for the first user device based on querying thewireline network device for configuration information and receivingconfirmation that the caller information has been transferred from thewireline caller information device to the data structure associated withthe wireless caller information device.
 10. The computer-readable mediumof claim 9, where the user device is a first user device; and where theone or more instructions, when executed by the one or more processors,further cause the one or more processors to: receive a request, from thefirst user device, for a connection to be made to a second user devicevia the wireless network; determine caller identification (ID)information, associated with the first user device, using thesynchronized data structure associated with the wireless network callerinformation device; and provide the caller ID information to the seconduser device.
 11. The computer-readable medium of claim 10, where the oneor more instructions, when executed by the one or more processors,further cause the one or more processors to: provide informationidentifying the first user device to the wireless network callerinformation device, the information including a phone number; where theone or more instructions, that cause the one or more processors todetermine the caller ID information using the synchronized datastructure associated with the wireless network caller informationdevice, further cause the one or more processors to: determine thecaller ID information based on providing the information identifying thefirst user device to the wireless network caller information device. 12.The computer-readable medium of claim 10, where the one or moreinstructions, when executed by the one or more processors, further causethe one or more processors to: determine that the first user device,associated with the wireline network, has had network service enabled onthe wireless network; determine that the caller information, associatedwith the first user device, is stored in the synchronized data structureassociated with the wireless caller information device, based ondetermining that the first user device has had network service enabledon the wireless network; and where the one or more instructions, thatcause the one or more processors to determine the caller ID informationusing the synchronized data structure associated with the wirelessnetwork caller information device, further cause the one or moreprocessors to: determine the caller ID information using thesynchronized data structure associated with the wireless network callerinformation device based on determining that the caller information,associated with the first user device, is stored in the synchronizeddata structure.
 13. The computer-readable medium of claim 9, where thedata structure is a first data structure; and where the one or moreinstructions, that cause the one or more processors to request that thecaller information be transferred from the wireline network callerinformation device to the first data structure associated with thewireless network caller information device, further cause the one ormore processors to: provide authentication information to the wirelinenetwork device; determine that the authentication information has beenaccepted by the wireline network device; establish a communicationchannel between the wireless network caller information device and thewireline network caller information device; synchronize a second datastructure, associated with the wireline network caller informationdevice, and the first data structure; and where the one or moreinstructions, that cause the one or more processors to receiveconfirmation that the caller information has been transferred, furthercause the one or more processors to: receive confirmation that thecaller information has been transferred based on synchronizing thesecond data structure and the first data structure.
 14. Thecomputer-readable medium of claim 9, where the one or more instructions,that cause the one or more processors to query the wireline networkdevice for configuration information associated with enabling networkservice for the user device on the wireless network, further cause theone or more processors to: receive configuration information associatedwith provisioning the wireless network based on querying the wirelinenetwork device for the configuration information; determine one or moresubscriber services to be performed by a wireline network serviceprovider associated with the wireline network device; and provideinformation, associated with performing the one or more subscriberservices, to the wireline network service provider.
 15. Thecomputer-readable medium of claim 14, where the one or more subscriberservices include at least one of: a billing service; a service plan; acustomer service; an information storage service; or an administrativeservice.
 16. A method, comprising: receiving, by a network deviceassociated with a wireless network service provider, a request to enablenetwork service, for a first user device, on a wireless network, thefirst user device being associated with a wireline network serviceprovider; determining, by a network device, that the wireless networkservice provider and the wireline network service provider have anetwork collaboration agreement; receiving, by a network device, networkprovisioning information associated with enabling network service, forthe first user device, on the wireless network; requesting, by a networkdevice, that a first data structure, associated with a first callerinformation device, be synchronized with a second data structureassociated with a second caller information device, the first callerinformation device being associated with the wireless network serviceprovider, the second caller information device being associated with thewireline network service provider; receiving, by a network device,confirmation that the first data structure and the second data structurehave been synchronized; enabling, by a network device, network serviceon the wireless network for the first user device based on receiving thenetwork provisioning information and receiving the confirmation that thefirst data structure and the second data structure have beensynchronized; receiving, by a network device, a request for a call to beplaced from the first user device to a second user device using thewireless network; querying, by a network device, the first datastructure for caller information associated with the first user device;and providing, by a network device, the caller information to the seconduser device based on querying the first data structure.
 17. The methodof claim 16, further comprising: determining that a period of time,associated with synchronizing the caller information between the firstdata structure and the second data structure, has expired; and whererequesting that the first data structure be synchronized with the seconddata structure further comprises: requesting that the first datastructure be synchronized with the second data structure based ondetermining that the period of time associated with synchronizing thecaller information has expired.
 18. The method of claim 16, furthercomprising: determining that the first user device is associated withthe wireline network service provider; determining that the callerinformation, associated with the first user device, has been transferredfrom the second data structure to the first data structure, based ondetermining that the first user device is associated with the wirelinenetwork service provider; and where querying the first data structurefor the caller information associated with the first user device furthercomprises: querying the first data structure for the caller information,associated with the first user device, based on determining that thecaller information, associated with the first user device, has beentransferred from the second data structure to the first data structure.19. The method of claim 16, further comprising: providing authorizationinformation to a network device associated with the wireline networkservice provider, the authorization information being based on thenetwork collaboration agreement; establishing a secure shell filetransfer protocol (SFTP) data stream between the first data structureand the second data structure; and where requesting that the first datastructure be synchronized with the second data structure furthercomprises: requesting that the first data structure and the second datastructure be synchronized using the SFTP data stream.
 20. The method ofclaim 16, where providing the caller information further comprises:providing the caller information, to the second user device, for displayby the second user device.